From 0c430b4aaf9e2724b8925e6e42090c2b14405708 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 6 Sep 2024 16:03:17 +0000 Subject: [PATCH] Auto-Update: 2024-09-06T16:00:17.996592+00:00 --- CVE-2020/CVE-2020-241xx/CVE-2020-24198.json | 8 +- CVE-2020/CVE-2020-249xx/CVE-2020-24918.json | 10 +- CVE-2022/CVE-2022-488xx/CVE-2022-48867.json | 70 +++- CVE-2022/CVE-2022-488xx/CVE-2022-48869.json | 106 +++++- CVE-2022/CVE-2022-488xx/CVE-2022-48870.json | 82 +++- CVE-2022/CVE-2022-488xx/CVE-2022-48871.json | 94 ++++- CVE-2022/CVE-2022-488xx/CVE-2022-48872.json | 126 ++++++- CVE-2022/CVE-2022-488xx/CVE-2022-48873.json | 126 ++++++- CVE-2022/CVE-2022-488xx/CVE-2022-48885.json | 85 ++++- CVE-2022/CVE-2022-488xx/CVE-2022-48886.json | 85 ++++- CVE-2022/CVE-2022-488xx/CVE-2022-48887.json | 85 ++++- CVE-2022/CVE-2022-488xx/CVE-2022-48889.json | 85 ++++- CVE-2022/CVE-2022-488xx/CVE-2022-48890.json | 85 ++++- CVE-2022/CVE-2022-488xx/CVE-2022-48891.json | 144 ++++++- CVE-2023/CVE-2023-311xx/CVE-2023-31102.json | 32 +- CVE-2023/CVE-2023-342xx/CVE-2023-34259.json | 34 +- CVE-2023/CVE-2023-450xx/CVE-2023-45024.json | 34 +- CVE-2023/CVE-2023-463xx/CVE-2023-46352.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46404.json | 34 +- CVE-2023/CVE-2023-468xx/CVE-2023-46817.json | 34 +- CVE-2023/CVE-2023-469xx/CVE-2023-46958.json | 34 +- CVE-2023/CVE-2023-469xx/CVE-2023-46980.json | 34 +- CVE-2023/CVE-2023-472xx/CVE-2023-47204.json | 34 +- CVE-2023/CVE-2023-517xx/CVE-2023-51785.json | 24 +- CVE-2023/CVE-2023-55xx/CVE-2023-5528.json | 27 +- CVE-2024/CVE-2024-255xx/CVE-2024-25584.json | 56 +++ CVE-2024/CVE-2024-273xx/CVE-2024-27394.json | 10 +- CVE-2024/CVE-2024-346xx/CVE-2024-34641.json | 393 +++++++++++++++++++- CVE-2024/CVE-2024-346xx/CVE-2024-34656.json | 59 ++- CVE-2024/CVE-2024-383xx/CVE-2024-38321.json | 258 ++++++++++++- CVE-2024/CVE-2024-419xx/CVE-2024-41912.json | 76 +++- CVE-2024/CVE-2024-422xx/CVE-2024-42257.json | 70 +++- CVE-2024/CVE-2024-439xx/CVE-2024-43918.json | 47 ++- CVE-2024/CVE-2024-440xx/CVE-2024-44082.json | 6 +- CVE-2024/CVE-2024-447xx/CVE-2024-44739.json | 39 +- CVE-2024/CVE-2024-448xx/CVE-2024-44837.json | 56 +++ CVE-2024/CVE-2024-451xx/CVE-2024-45195.json | 24 +- CVE-2024/CVE-2024-453xx/CVE-2024-45321.json | 6 +- CVE-2024/CVE-2024-454xx/CVE-2024-45446.json | 96 ++++- CVE-2024/CVE-2024-454xx/CVE-2024-45447.json | 96 ++++- CVE-2024/CVE-2024-454xx/CVE-2024-45448.json | 66 +++- CVE-2024/CVE-2024-454xx/CVE-2024-45449.json | 91 ++++- CVE-2024/CVE-2024-64xx/CVE-2024-6445.json | 78 ++++ CVE-2024/CVE-2024-74xx/CVE-2024-7493.json | 60 +++ CVE-2024/CVE-2024-75xx/CVE-2024-7599.json | 72 ++++ CVE-2024/CVE-2024-76xx/CVE-2024-7611.json | 60 +++ CVE-2024/CVE-2024-76xx/CVE-2024-7622.json | 64 ++++ CVE-2024/CVE-2024-81xx/CVE-2024-8181.json | 12 +- CVE-2024/CVE-2024-82xx/CVE-2024-8298.json | 73 +++- CVE-2024/CVE-2024-84xx/CVE-2024-8428.json | 60 +++ README.md | 75 ++-- _state.csv | 196 +++++----- 52 files changed, 3432 insertions(+), 313 deletions(-) create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25584.json create mode 100644 CVE-2024/CVE-2024-448xx/CVE-2024-44837.json create mode 100644 CVE-2024/CVE-2024-64xx/CVE-2024-6445.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7493.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7599.json create mode 100644 CVE-2024/CVE-2024-76xx/CVE-2024-7611.json create mode 100644 CVE-2024/CVE-2024-76xx/CVE-2024-7622.json create mode 100644 CVE-2024/CVE-2024-84xx/CVE-2024-8428.json diff --git a/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json b/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json index b096c0c21db..cdefe800e9f 100644 --- a/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json +++ b/CVE-2020/CVE-2020-241xx/CVE-2020-24198.json @@ -2,13 +2,13 @@ "id": "CVE-2020-24198", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-09T15:15:10.660", - "lastModified": "2024-09-05T19:15:12.033", + "lastModified": "2024-09-06T15:15:12.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.' NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network." + "value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.'" }, { "lang": "es", @@ -102,10 +102,6 @@ "Third Party Advisory" ] }, - { - "url": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918", - "source": "cve@mitre.org" - }, { "url": "https://www.sourcecodester.com/php/14366/stock-management-system-php.html", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-249xx/CVE-2020-24918.json b/CVE-2020/CVE-2020-249xx/CVE-2020-24918.json index fb1823da61a..c9b0486cf16 100644 --- a/CVE-2020/CVE-2020-249xx/CVE-2020-24918.json +++ b/CVE-2020/CVE-2020-249xx/CVE-2020-24918.json @@ -2,13 +2,13 @@ "id": "CVE-2020-24918", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-30T12:15:07.460", - "lastModified": "2021-05-07T14:15:10.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T15:15:12.280", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example." + "value": "A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example. NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network." }, { "lang": "es", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918", + "source": "cve@mitre.org" + }, { "url": "https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json index af8e42533be..19e96d3bacf 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48867.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48867", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:03.860", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:15:33.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: evita el use after free la memoria al finalizar. Al descargar el controlador, los descriptores pendientes se eliminan en el momento en que se libera la interrupci\u00f3n: idxd_dmaengine_drv_remove() -> drv_disable_wq() -> idxd_wq_free_irq () -> idxd_flush_pending_descs(). Si hay alg\u00fan descriptor presente que deba eliminarse, este flujo desencadena un error de p\u00e1gina \"no presente\" como se muestra a continuaci\u00f3n: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ff391c97c70c9040 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000 ) - p\u00e1gina no presente La direcci\u00f3n que desencadena la falla es la direcci\u00f3n del descriptor que se liber\u00f3 momentos antes a trav\u00e9s de: drv_disable_wq()->idxd_wq_free_resources() Corrige el use-after-free liberando los descriptores despu\u00e9s de cualquier posible uso. Esto se hace despu\u00e9s de idxd_wq_reset() para garantizar que la memoria permanezca accesible durante posibles escrituras completas por parte del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "14893A53-0846-4D56-BC73-9FC4261FDAB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1beeec45f9ac31eba52478379f70a5fa9c2ad005", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9e8e3fcfec625fc1c2f68f684448aeeb882625b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json index df368e71044..90ea55ec5fe 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48869.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48869", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.080", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:19:58.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: gadgetfs: corrige la ejecuci\u00f3n entre montar y desmontar Syzbot fuzzer y Gerald Lee han identificado un error de use-after-free en el controlador gadgetfs, que involucra procesos que montan y desmontan simult\u00e1neamente los gadgetfs. sistema de archivos. En particular, gadgetfs_fill_super() puede competir con gadgetfs_kill_sb(), provocando que este \u00faltimo desasigne the_device mientras el primero lo est\u00e1 usando. El resultado de KASAN dice, en parte: ERROR: KASAN: use-after-free en instrument_atomic_read_write include/linux/instrumented.h:102 [en l\u00ednea] ERROR: KASAN: use-after-free en atomic_fetch_sub_release include/linux/atomic/atomic -instrumented.h:176 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en __refcount_sub_and_test include/linux/refcount.h:272 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en __refcount_dec_and_test include/linux/refcount.h :315 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en refcount_dec_and_test include/linux/refcount.h:333 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en put_dev drivers/usb/gadget/legacy/inode.c :159 [en l\u00ednea] ERROR: KASAN: use-after-free en gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff8880276d7840 mediante la tarea syz-executor126/18689 CPU: 0 PID: 18689 Comunicaci\u00f3n: syz-executor126 No contaminado 6.1.0-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Seguimiento de llamadas: ... atomic_fetch_sub_release include/linux/ atomic/atomic-instrumented.h:176 [en l\u00ednea] __refcount_sub_and_test include/linux/refcount.h:272 [en l\u00ednea] __refcount_dec_and_test include/linux/refcount.h:315 [en l\u00ednea] refcount_dec_and_test include/linux/refcount.h:333 [en l\u00ednea ] put_dev drivers/usb/gadget/legacy/inode.c:159 [en l\u00ednea] gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 deactivate_locked_super+0xa7/0xf0 fs/super.c:332 vfs_get_super fs /super.c:1190 [en l\u00ednea] get_tree_single+0xd0/0x160 fs/super.c:1207 vfs_get_tree+0x88/0x270 fs/super.c:1531 vfs_fsconfig_locked fs/fsopen.c:232 [en l\u00ednea] La soluci\u00f3n m\u00e1s sencilla es garantizar que gadgetfs_fill_super() y gadgetfs_kill_sb() se serializan haciendo que ambos adquieran un nuevo mutex." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.230", + "matchCriteriaId": "D96CFFAF-9D69-4742-997E-484E7278F62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/616fd34d017000ecf9097368b13d8a266f4920b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/856e4b5e53f21edbd15d275dde62228dd94fb2b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a39f4626b361ee7aa10fd990401c37ec3b466ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2e075f40122d8daf587db126c562a67abd69cf9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d18dcfe9860e842f394e37ba01ca9440ab2178f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json index 86b2e816b18..c3ed222bec1 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48870.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48870", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.143", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:20:52.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: corrige posible null-ptr-defer en spk_ttyio_release Ejecute las siguientes pruebas en la plataforma qemu: syzkaller:~# modprobe Speakup_audptr input: Speakup as /devices/virtual/input/input4 dispositivo inicializado: /dev/synth, nodo (MAJOR 10, MINOR 125) Speakup 3.1.6: el nombre del sintetizador inicializado en la entrada es: (nulo) la sonda de sintetizador spk_ttyio_initialise_ldisc fall\u00f3 porque tty_kopen_exclusive devolvi\u00f3 un error (errno -16), luego elimine el m\u00f3dulo, obtendremos un problema de aplazamiento de ptr nulo, como sigue: syzkaller:~# modprobe -r Speakup_audptr liberando sintetizador audptr ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000080 #PF: acceso de escritura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0002 ) - p\u00e1gina no presente PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP PTI CPU: 2 PID: 204 Comm: modprobe No contaminado 6.1.0-rc6-dirty #1 RIP: 0010:mutex_lock+0x14/0x30 Llamada Seguimiento: spk_ttyio_release+0x19/0x70 [speakup] synth_release.part.6+0xac/0xc0 [speakup] synth_remove+0x56/0x60 [speakup] __x64_sys_delete_module+0x156/0x250? fpregs_assert_state_consistent+0x1d/0x50 do_syscall_64+0x37/0x90 entry_syscall_64_after_hwframe+0x63/0xcd m\u00f3dulos vinculados en: sheakup_audptr (-) volcando ftrace b\u00fafer: in_synth->> nth-> dev para corregir este error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "82544A71-562D-4C2F-B75E-7193C3B97CD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2da67bff29ab49caafb0766e8b8383b735ff796f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5abbeebd8296c2301023b8dc4b5a6c0d5229b4f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64152e05a4de3ebf59f1740a0985a6d5fba0c77b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json index cad23aad5ad..373c8f3ed47 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48871.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48871", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.207", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:23:03.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: serial: qcom-geni-serial: corrige los l\u00edmites fuera de los l\u00edmites en el b\u00fafer RX FIFO La sonda del controlador asigna memoria para RX FIFO (puerto->rx_fifo) seg\u00fan el valor predeterminado Profundidad FIFO de RX, por ejemplo, 16. M\u00e1s adelante, durante el inicio en serie, qcom_geni_serial_port_setup() actualiza la profundidad FIFO de RX (puerto->rx_fifo_profundidad) para que coincida con las capacidades reales del dispositivo, por ejemplo, a 32. El c\u00f3digo de identificador de RX UART leer\u00e1 el n\u00famero \"puerto->rx_fifo_profundidad\" de palabras en el b\u00fafer \"port->rx_fifo\", excediendo as\u00ed los l\u00edmites. Esto se puede observar en ciertas configuraciones con el dispositivo Qualcomm Bluetooth HCI UART y KASAN: Bluetooth: hci0: QCA ID de producto: 0x00000010 Bluetooth: hci0: QCA SOC Version: 0x400a0200 Bluetooth: hci0: QCA ROM Version: 0x00000200 Bluetooth: hci0: QCA Patch Version :0x00000d2b Bluetooth: hci0: versi\u00f3n del controlador QCA 0x02000200 Bluetooth: hci0: QCA Descargando qca/htbtfw20.tlv bluetooth hci0: La carga directa del firmware para qca/htbtfw20.tlv fall\u00f3 con el error -2 Bluetooth: hci0: QCA No se pudo solicitar el archivo: qca/ htbtfw20.tlv (-2) Bluetooth: hci0: QCA Error al descargar el parche (-2) =============================== ==================================== ERROR: KASAN: losa fuera de los l\u00edmites en handle_rx_uart+ 0xa8/0x18c Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff279347d578c0 mediante task swapper/0/0 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-rt5-00350-gb2450b7e00be-dirty #26 Nombre de hardware: Qualcomm Technologies, Inc Rob\u00f3tica RB5 (DT) Seguimiento de llamadas: dump_backtrace.part.0+0xe0/0xf0 show_stack+0x18/0x40 dump_stack_lvl+0x8c/0xb8 print_report+0x188/0x488 kasan_report+0xb4/0x100 __asan_store4+0x80/0xa4 handle_rx_uart+0xa. 8/0x18c qcom_geni_serial_handle_rx+ 0x84/0x9c qcom_geni_serial_isr+0x24c/0x760 __handle_irq_event_percpu+0x108/0x500 handle_irq_event+0x6c/0x110 handle_fasteoi_irq+0x138/0x2cc generic_handle_domain_irq+0x48/0x64 Si la profundidad FIFO de RX cambia despu\u00e9s sonda, aseg\u00farese de cambiar el tama\u00f1o del b\u00fafer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "5D1B38E6-531E-4689-A204-9E0178E886F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/894681682dbefdad917b88f86cde1069140a047a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8caf69a6946e18ffebad49847e258f5b6d52ac2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb53a3366eb28fed67850c80afa52075bb71a38a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd524ca7fe45b8a06dca2dd546d62684a9768f95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json index 4208fc86ea0..1fb6e5414cb 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48872.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48872", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.267", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:30:06.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,137 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: corrige la condici\u00f3n de ejecuci\u00f3n de use-after-free para mapas. Es posible que entre llamadas a fastrpc_map_get() hasta que se tome map->fl->lock en fastrpc_free_map() , otro hilo puede llamar a fastrpc_map_lookup() y obtener una referencia a un mapa que est\u00e1 a punto de ser eliminado. Vuelva a escribir fastrpc_map_get() para aumentar solo el recuento de referencias de un mapa si no es cero. Propague esto a las personas que llaman para que puedan saber si un mapa est\u00e1 a punto de ser eliminado. Corrige esta advertencia: refcount_t: adici\u00f3n en 0; use-after-free. ADVERTENCIA: CPU: 5 PID: 10100 en lib/refcount.c:25 refcount_warn_saturate... Rastreo de llamadas: refcount_warn_saturate [fastrpc_map_get inlined] [fastrpc_map_lookup inlined] fastrpc_map_create fastrpc_internal_invoke fastrpc_device_ioctl __arm64_sys_ioctl invoke_sy llamar" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.230", + "matchCriteriaId": "D5DAF18C-BC5F-4D9D-A710-21074AD7750B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.2", + "matchCriteriaId": "CDB2EE10-7AC0-4F90-BC35-A5139EEE551B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/079c78c68714f7d8d58e66c477b0243b31806907", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/556dfdb226ce1e5231d8836159b23f8bb0395bf4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61a0890cb95afec5c8a2f4a879de2b6220984ef1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96b328d119eca7563c1edcc4e1039a62e6370ecb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b171d0d2cf1b8387c72c8d325c5d5746fa271e39", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json index 45ed66a94fc..26184330a7f 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48873.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48873", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.323", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:44:16.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,137 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: no elimine el mapa en creater_process y device_release. No elimine el mapa de la lista en la ruta de error en fastrpc_init_create_process; en su lugar, llame a fastrpc_map_put para evitar el use-after-free. Tampoco lo elimine en fastrpc_device_release; en su lugar, llame a fastrpc_map_put. fastrpc_free_map es el \u00fanico lugar adecuado para eliminar el mapa. Esto se llama solo despu\u00e9s de que el recuento de referencias sea 0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.4.230", + "matchCriteriaId": "992F0F86-442F-4A88-A85E-FDAD945116C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/193cd853145b63e670bd73740250983af1475330", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1b7b7bb400dd13dcb03fc6e591bb7ca4664bbec8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/35ddd482345c43d9eec1f3406c0f20a95ed4054b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b5c44e924a571d0ad07054de549624fbc04e4d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5bb96c8f9268e2fdb0e5321cbc358ee5941efc15", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json index c34f06669f2..9c8d6eff878 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48885.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48885", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.037", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:46:30.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: soluciona una posible p\u00e9rdida de memoria en ice_gnss_tty_write(). El ice_gnss_tty_write() regresa directamente si falla la asignaci\u00f3n write_buf, filtrando el cmd_buf. Corrija mediante cmd_buf gratuito si falla la asignaci\u00f3n de write_buf." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9A23C236-3F02-4454-B9C9-0A91464BDE09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/500ca1da9d0876244eb4d1b0ece6fa0e9968d45d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f58985620f55580a07d40062c4115d8c9cf6ae27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json index 5182817cdc2..6ef7f17c661 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48886.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48886", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.090", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:48:20.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: Agregar verificaci\u00f3n para kzalloc Agregue la verificaci\u00f3n para el valor de retorno de kzalloc para evitar la desreferencia al puntero NULL. Adem\u00e1s, utilice la etiqueta goto para compartir el c\u00f3digo limpio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9A23C236-3F02-4454-B9C9-0A91464BDE09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/40543b3d9d2c13227ecd3aa90a713c201d1d7f09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96a9873188552ebb2afe76033d7329a5ecabef6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json index 1ff79202a4e..773607f169a 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48887.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48887", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.143", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:55:46.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/vmwgfx: elimina los bloqueos de rcu de los recursos del usuario. Las b\u00fasquedas de recursos del usuario utilizaron rcu para evitar dos \u00e1tomos adicionales. Desafortunadamente, las rutas de rcu ten\u00edan errores y era f\u00e1cil hacer que el controlador fallara al enviar b\u00faferes de comando desde dos subprocesos diferentes. Debido a que las b\u00fasquedas nunca aparecen en los perfiles de rendimiento, reempl\u00e1celas con un bloqueo de giro normal que corrige las ejecuciones en los accesos a esos recursos compartidos. Corrige los fallos del kernel en la prueba de esfuerzo vmwgfxexecution_b\u00fafer de IGT y los fallos observados en las aplicaciones que utilizan recursos compartidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "2D63FB2D-B092-4364-B732-F4FD54A43619" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7ac9578e45b20e3f3c0c8eb71f5417a499a7226a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a309c7194e8a2f8bd4539b9449917913f6c2cd50", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json index 5d7195eb151..ddafb5fb9c8 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48889.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48889", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.243", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T15:08:10.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: Intel: sof-nau8825: corrige el desbordamiento del alias del m\u00f3dulo La longitud m\u00e1xima del nombre para una entrada platform_device_id es de 20 caracteres, incluido el byte NUL final. El archivo sof_nau8825.c excede eso, lo que provoca un oscuro mensaje de error: sound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: codificaci\u00f3n de caracteres ilegal en cadena literal [-Werror,- Codificaci\u00f3n de fuente v\u00e1lida de Win] MODULE_ALIAS(\"plataforma:adl_max98373_nau8825\"); ^~~~ include/linux/module.h:168:49: nota: ampliado desde la macro 'MODULE_ALIAS' ^~~~~~ include/linux/module.h:165:56: nota: ampliado desde la macro 'MODULE_INFO' ^~~~ include/linux/moduleparam.h:26:47: nota: ampliado desde la macro '__MODULE_INFO' = __MODULE_INFO_PREFIX __stringify(tag) \"=\" info No pude entender c\u00f3mo hacer que el m\u00f3dulo sea lo suficientemente robusto para manejar esto mejor, pero como soluci\u00f3n r\u00e1pida, usar nombres ligeramente m\u00e1s cortos que sigan siendo \u00fanicos evita el problema de compilaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "96403C94-C711-476F-BE5F-C7510379207B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e78986a840d59dd27e636eae3f52dc11125c835", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fba1b23befd88366fe646787b3797e64d7338fd2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json index a658e6be531..61ad41d4a7f 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48890.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48890", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.303", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T15:11:16.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: storvsc: corrige la fuga del b\u00fafer de rebote swiotlb en una VM confidencial storvsc_queuecommand() asigna la lista de dispersi\u00f3n/recopilaci\u00f3n usando scsi_dma_map(), que en una VM confidencial asigna buffers de rebote swiotlb. Si el env\u00edo de E/S falla en storvsc_do_io(), la E/S normalmente se reintenta mediante c\u00f3digo de nivel superior, pero la memoria del b\u00fafer de rebote nunca se libera. La causa m\u00e1s com\u00fan de falla en el env\u00edo de E/S es un b\u00fafer de anillo de canal VMBus lleno, lo cual no es infrecuente bajo cargas de E/S elevadas. Con el tiempo, se pierden suficientes memorias del b\u00fafer de rebote como para que la m\u00e1quina virtual confidencial no pueda realizar ninguna E/S. El mismo problema puede surgir en una m\u00e1quina virtual no confidencial con el par\u00e1metro de arranque del kernel swiotlb=force. Solucione este problema haciendo scsi_dma_unmap() en el caso de un error de env\u00edo de E/S, lo que libera la memoria del b\u00fafer de rebote." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "96403C94-C711-476F-BE5F-C7510379207B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/67ff3d0a49f3d445c3922e30a54e03c161da561e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87c71e88f6a6619ffb1ff88f84dff48ef6d57adb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json index 86da81e3eca..5c11a278504 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48891.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48891", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.360", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T15:39:03.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,159 @@ "value": "En el kernel de Linux se ha solucionado la siguiente vulnerabilidad: regulator: da9211: Usar irq handler cuando est\u00e9 listo Si el sistema no viene del reset (como cuando es kexec()), es posible que el regulador tenga una IRQ esper\u00e1ndonos. Si habilitamos el controlador IRQ antes de que sus estructuras est\u00e9n listas, fallamos. Este parche corrige: [1.141839] No se puede manejar la lectura del kernel desde una memoria ilegible en la direcci\u00f3n virtual 0000000000000078 [1.316096] Rastreo de llamadas: [1.316101] blocking_notifier_call_chain+0x20/0xa8 [ 1.322757] cpu cpu0: suministros ficticios no permitidos para solicitudes exclusivas [ 1.327 823] regulador_notificador_call_chain +0x1c/0x2c [ 1.327825] da9211_irq_handler+0x68/0xf8 [ 1.327829] irq_thread+0x11c/0x234 [ 1.327833] kthread+0x13c/0x154" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.14.303", + "matchCriteriaId": "201B76DB-8AF9-4EC9-BE08-907DEFA3435E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.270", + "matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.229", + "matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.164", + "matchCriteriaId": "CA742E66-32D2-459E-AB19-171C4DB3B1F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.89", + "matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/02228f6aa6a64d588bc31e3267d05ff184d772eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c1afcb8839b91c09d211ea304faa269763b1f91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/470f6a9175f13a53810734658c35cc5bba33be01", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad1336274f733a7cb1f87b5c5908165a2c14df53", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d443308edbfb6e9e757b478af908515110d1efd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4aa749e046435f054e94ebf50cad143d6229fae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f75cde714e0a67f73ef169aa50d4ed77d04f7236", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31102.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31102.json index d0c716dfd03..83bd6ff1a2a 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31102.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31102.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31102", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T04:15:20.793", - "lastModified": "2023-11-20T00:15:06.277", + "lastModified": "2024-09-06T14:35:01.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-191" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34259.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34259.json index be130bce8dd..141c205b673 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34259.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34259.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34259", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T04:15:20.853", - "lastModified": "2023-11-13T17:49:14.460", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:03.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45024.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45024.json index 957e0061ebf..3e2974c6088 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45024.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45024.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45024", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T05:15:30.687", - "lastModified": "2023-11-13T19:29:46.800", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:03.993", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46352.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46352.json index 0cb9a02e805..079b1842164 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46352.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46352.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46352", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:09.203", - "lastModified": "2023-11-10T04:13:07.300", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:04.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46404.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46404.json index 02928d28700..561c1f9f7d7 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46404.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46404.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46404", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T16:15:31.050", - "lastModified": "2023-11-13T17:52:03.397", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:05.673", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46817.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46817.json index d67f1b770c2..946f889e580 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46817.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46817.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46817", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T05:15:30.867", - "lastModified": "2023-11-13T19:30:38.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:06.507", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46958.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46958.json index 7b722d5f8b6..ee869c67f09 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46958.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46958.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46958", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:09.250", - "lastModified": "2023-11-09T20:10:12.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:08.110", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46980.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46980.json index 08bad7d0752..5baaf1cc853 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46980.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46980.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46980", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T16:15:31.103", - "lastModified": "2023-11-14T13:37:31.637", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:08.953", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47204.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47204.json index b0b63de18ce..dd169ffe1eb 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47204.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47204.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47204", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T06:15:08.517", - "lastModified": "2023-11-09T17:48:32.863", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T14:35:09.823", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json index 0dcfc91587c..bb504d4bdd5 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51785.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51785", "sourceIdentifier": "security@apache.org", "published": "2024-01-03T10:15:09.130", - "lastModified": "2024-01-09T20:18:47.197", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T15:35:02.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json index 09b55a10480..8d45deb794b 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5528", "sourceIdentifier": "jordan@liggitt.net", "published": "2023-11-14T21:15:14.123", - "lastModified": "2024-01-19T16:15:10.280", + "lastModified": "2024-09-06T15:15:12.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -161,31 +161,6 @@ "tags": [ "Mailing List" ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/", - "source": "jordan@liggitt.net", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/", - "source": "jordan@liggitt.net", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/", - "source": "jordan@liggitt.net", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240119-0009/", - "source": "jordan@liggitt.net" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25584.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25584.json new file mode 100644 index 00000000000..2c9745ff617 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25584.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25584", + "sourceIdentifier": "security@open-xchange.com", + "published": "2024-09-06T15:15:12.950", + "lastModified": "2024-09-06T15:15:12.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dovecot accepts dot LF DOT LF symbol as end of DATA command. RFC requires that it should always be CR LF DOT CR LF. This causes Dovecot to convert single mail with LF DOT LF in middle, into two emails when relaying to SMTP. Dovecot will split mail with LF DOT LF into two mails. Upgrade to latest released version. No publicly available exploits are known." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2024/oxdc-adv-2024-0001.json", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json index 7dc5ffdc7ae..e063307008e 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27394", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:27.363", - "lastModified": "2024-07-03T01:50:36.103", + "lastModified": "2024-09-06T14:35:11.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,8 +22,8 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", @@ -31,10 +31,10 @@ "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.1, + "baseScore": 7.4, "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.2, + "exploitabilityScore": 1.4, "impactScore": 5.9 } ] diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34641.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34641.json index e1ee9d39628..225fb1f357a 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34641.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34641.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34641", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:12.460", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T15:27:40.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,377 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34656.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34656.json index 3b473784530..2914890b89d 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34656.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34656", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:15.950", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T15:57:25.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:notes:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.21.62", + "matchCriteriaId": "1E2501DD-98AF-407C-AC64-2C26EA3248F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38321.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38321.json index 53bcaf6d1a7..6b5626ee87a 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38321.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38321", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-03T14:15:48.013", - "lastModified": "2024-08-05T12:41:45.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:50:53.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,244 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:containers:*:*:*", + "matchCriteriaId": "AEB1C9C9-69C0-41CA-8FE8-9E2C142DC112" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:containers:*:*:*", + "matchCriteriaId": "B9C41C12-BD6B-4E49-9BA4-288524FF55C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.2:*:*:*:containers:*:*:*", + "matchCriteriaId": "9FDDD905-95EA-4DCC-B359-7E6DAEFC537D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*", + "matchCriteriaId": "12725407-1B9F-43B7-8D66-F0E3B0181830" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*", + "matchCriteriaId": "00F5E82D-712A-4AB2-B0B2-BF03507D17D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*", + "matchCriteriaId": "0063E78F-2978-43F6-884D-B375E1111E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*", + "matchCriteriaId": "CF6317BE-98DF-4A46-9F5B-326177D6AD68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*", + "matchCriteriaId": "72A22C4B-AAF2-4A84-AF39-C1C396031D98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*", + "matchCriteriaId": "39015A02-D36E-4CC9-A5E3-877DFD923ACD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*", + "matchCriteriaId": "19586E74-8802-4C09-A240-D698EE30C570" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*", + "matchCriteriaId": "4B06D109-E327-4A2A-9FC9-A5F454022C0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*", + "matchCriteriaId": "E67BEF93-133E-4507-B938-79D943AB82CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*", + "matchCriteriaId": "84689E35-3C11-44D2-B719-0F47CC7DE6B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*", + "matchCriteriaId": "05248E0A-BE7C-4AA1-80B8-5397382D742E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*", + "matchCriteriaId": "0852419C-62F1-49BA-BD99-96700D33ED64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*", + "matchCriteriaId": "628B7F15-103F-4B84-90ED-EBFAD633BCE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*", + "matchCriteriaId": "91E22A7B-18F4-461C-9986-0CECBAB879F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*", + "matchCriteriaId": "4FE832E4-BE4B-4923-A98D-3B127758C103" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if028:*:*:containers:*:*:*", + "matchCriteriaId": "EE7E0724-C7FB-4436-A702-EC2102205175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if029:*:*:containers:*:*:*", + "matchCriteriaId": "40505E62-F229-45B5-8D22-30487471477C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if030:*:*:containers:*:*:*", + "matchCriteriaId": "D8E150F5-F27C-471C-A911-C2CC07E31EBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if031:*:*:containers:*:*:*", + "matchCriteriaId": "3F8FA6E0-01CF-458A-8AD3-3388BBA4FE5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if032:*:*:containers:*:*:*", + "matchCriteriaId": "2CAF9596-964B-4E58-BB9D-07138F4566F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if033:*:*:containers:*:*:*", + "matchCriteriaId": "08853431-59B4-4730-88E3-812DF7B6691B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if034:*:*:containers:*:*:*", + "matchCriteriaId": "1BDB3D3C-1964-42F1-8035-2B4F2752E535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:containers:*:*:*", + "matchCriteriaId": "A157A0AD-B1AB-4FBB-AD00-348ADAE52173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:containers:*:*:*", + "matchCriteriaId": "F2F5CF83-2F00-476D-BA79-5BD0AF71D929" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:containers:*:*:*", + "matchCriteriaId": "AC67163F-742E-46BC-BF63-75F15F8D2DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:containers:*:*:*", + "matchCriteriaId": "A99644F1-3E98-4156-B155-7FA642EA7BBC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "19.0.0.1", + "versionEndIncluding": "19.0.0.3", + "matchCriteriaId": "DB90C98C-7A38-4B9B-878C-028DD872D19C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "20.0.0.1", + "versionEndIncluding": "20.0.0.2", + "matchCriteriaId": "1FD8E8F7-6B5F-4A21-90AF-483A8DFE4CFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "21.0.1", + "versionEndIncluding": "21.0.3.0", + "matchCriteriaId": "07308147-9441-4231-9BC0-231C3181F255" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "22.0.1", + "versionEndIncluding": "22.0.2", + "matchCriteriaId": "5CA224F7-AF29-4F8C-BD70-E9C0A7A2B366" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", + "versionStartIncluding": "23.0.1", + "versionEndIncluding": "23.0.2", + "matchCriteriaId": "A510FD89-9F92-4514-A706-52719EDC59E0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:enterprise_service_bus:*:*:*", + "versionStartIncluding": "23.0.1", + "versionEndIncluding": "23.0.2", + "matchCriteriaId": "981B50AE-8B79-4E39-87AA-34DFA93B607A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:enterprise_service_bus:*:*:*", + "matchCriteriaId": "3E9B8E36-CA86-459C-A0CF-F00F179119FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294868", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.ibm.com/support/pages/node/7162334", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41912.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41912.json index e77391ece0b..f7ec5bfb549 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41912.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41912.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41912", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-08-07T20:15:50.877", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T15:13:26.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,79 @@ "value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware hasta 10.10.2.2 en dispositivos Poly Clariti Manager. La falla del firmware no implementa adecuadamente los controles de acceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:poly_clariti_manager_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.10.2.2_100", + "matchCriteriaId": "BDAFC172-AA9F-4B89-932D-3F13D10F99C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:poly_clariti_manager:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B85257C9-48C2-4B7F-8B0D-D2BF6C49C618" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_11006235-11006266-16/hpsbpy03958", - "source": "hp-security-alert@hp.com" + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42257.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42257.json index f4e0e733632..b32de246c1a 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42257.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42257", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-08T09:15:08.623", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T14:12:22.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: use memtostr_pad() para s_volume_name Al igual que con las otras cadenas en la estructura ext4_super_block, s_volume_name no tiene terminaci\u00f3n NUL. Las otras cadenas se marcaron en el commit 072ebb3bffe6 (\"ext4: agregue anotaciones que no sean cadenas a ext4.h\"). Usar strscpy() no es el reemplazo adecuado para strncpy(); deber\u00eda usar memtostr_pad() en su lugar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.1", + "matchCriteriaId": "CC5B6890-A2E7-41F8-AA56-E3202E9FB075" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4378be89ddb7de88d984b67ecfd6191686c42817", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/be27cd64461c45a6088a91a04eba5cd44e1767ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json index 135123928a0..df10ce807d2 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43918", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T15:15:29.010", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T15:51:25.957", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:woobewoo:product_table:*:*:pro:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.5", + "matchCriteriaId": "1492771E-D665-4404-B3CA-50720F09EE17" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woo-producttables-pro/wordpress-wbw-product-table-pro-plugin-1-9-4-unauthenticated-arbitrary-sql-query-execution-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44082.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44082.json index eb94d1beb59..6bf4d041fb4 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44082.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44082.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44082", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-06T01:15:11.150", - "lastModified": "2024-09-06T12:08:04.550", + "lastModified": "2024-09-06T15:15:13.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,6 +21,10 @@ "url": "https://bugs.launchpad.net/ironic/+bug/2071740", "source": "cve@mitre.org" }, + { + "url": "https://security.openstack.org/ossa/OSSA-2024-003.html", + "source": "cve@mitre.org" + }, { "url": "https://www.openwall.com/lists/oss-security/2024/09/04/4", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44739.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44739.json index aad0aa1773b..5e8fe5615c2 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44739.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44739.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44739", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-06T13:15:04.323", - "lastModified": "2024-09-06T13:15:04.323", + "lastModified": "2024-09-06T15:35:02.807", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Sourcecodester Simple Forum Website v1.0 has a SQL injection vulnerability in /php-sqlite-forum/?page=manage_user&id=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/zach341/Cve_report/blob/main/simple-forum-website/SQLi-1.md", diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44837.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44837.json new file mode 100644 index 00000000000..51bfda4b74f --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44837.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-44837", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-06T14:15:12.517", + "lastModified": "2024-09-06T14:35:11.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the component \\bean\\Manager.java of Drug v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user parameter." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://kaput-raptorex-7c1.notion.site/drug-1-0-DOM-based-cross-site-scripting-fae620f769304f67a7488a961d048672", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json index d17912778cf..51ead84c2b8 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45195", "sourceIdentifier": "security@apache.org", "published": "2024-09-04T09:15:04.397", - "lastModified": "2024-09-05T17:44:25.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T15:35:05.483", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json index 959be5f44a0..8d4dcac3217 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45321", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T04:15:09.010", - "lastModified": "2024-08-27T14:35:13.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:35:13.113", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-494" } ] } diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45446.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45446.json index 4884ca5546a..4c9883f456a 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45446.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45446.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45446", "sourceIdentifier": "psirt@huawei.com", "published": "2024-09-04T03:15:04.010", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:01:37.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -51,10 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45447.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45447.json index 4c1f669786d..9d15d32dbc4 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45447.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45447.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45447", "sourceIdentifier": "psirt@huawei.com", "published": "2024-09-04T03:15:04.210", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:17:55.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -51,10 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45448.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45448.json index b1f360c35dd..d576c425fbc 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45448.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45448.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45448", "sourceIdentifier": "psirt@huawei.com", "published": "2024-09-04T03:15:04.413", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:24:21.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -51,10 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45449.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45449.json index 228f75609e2..cc72cd69f37 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45449.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45449.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45449", "sourceIdentifier": "psirt@huawei.com", "published": "2024-09-04T03:15:04.610", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:38:08.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -51,10 +81,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6445.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6445.json new file mode 100644 index 00000000000..78db489df25 --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6445.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-6445", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-09-06T14:15:12.683", + "lastModified": "2024-09-06T14:15:12.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DataFlowX Technology DataDiodeX allows Path Traversal.This issue affects DataDiodeX: before v3.5.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1409", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7493.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7493.json new file mode 100644 index 00000000000..ffa194a80c4 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7493.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7493", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-06T14:15:12.860", + "lastModified": "2024-09-06T14:15:12.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WPCOM Member plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.5.2.1. This is due to the plugin allowing arbitrary data to be passed to wp_insert_user() during registration. This makes it possible for unauthenticated attackers to update their role to that of an administrator during registration." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.5.2/includes/form-validation.php#L267", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec7f3e0c-a07c-4082-9b6b-12d0fbe0fdc8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7599.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7599.json new file mode 100644 index 00000000000..c6c746c56fc --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7599.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-7599", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-06T14:15:13.107", + "lastModified": "2024-09-06T14:15:13.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Advanced Sermons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018sermon_video_embed\u2019 parameter in all versions up to, and including, 3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/advanced-sermons/trunk/admin/meta/sermon-details.php#L396", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/advanced-sermons/trunk/include/templates/sections/video-template.php#L124", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/advanced-sermons/trunk/include/templates/sections/video-template.php#L18", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3147283/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41859e1c-1ae0-49f1-82d3-5af3c15994ef?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7611.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7611.json new file mode 100644 index 00000000000..48337239570 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7611.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-7611", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-06T14:15:13.330", + "lastModified": "2024-09-06T14:15:13.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Enter Addons \u2013 Ultimate Template Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' attribute of the Events Card widget in all versions up to, and including, 2.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/enteraddons/trunk/widgets/events_card/traits/Templates_Components.php#L25", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7580145-03da-4aff-b804-39125e7daad1?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7622.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7622.json new file mode 100644 index 00000000000..a3e424fea69 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7622.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-7622", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-06T14:15:13.553", + "lastModified": "2024-09-06T14:15:13.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Revision Manager TMC plugin for WordPress is vulnerable to unauthorized arbitrary email sending due to a missing capability check on the _a_ajaxQuickEmailTestCallback() function in all versions up to, and including, 2.8.19. This makes it possible for authenticated attackers, with subscriber-level access and above, to send emails with arbitrary content to any individual through the vulnerable web server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/revision-manager-tmc/trunk/src/Components/Notifications.php#L357", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3147298/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c8a6ff9-6aa8-4e0f-b058-759561a55508?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8181.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8181.json index b2a782d906c..70e7e9cbc0e 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8181.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8181.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8181", "sourceIdentifier": "vulnreport@tenable.com", "published": "2024-08-27T13:15:06.820", - "lastModified": "2024-09-04T12:15:05.833", + "lastModified": "2024-09-06T15:35:07.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8298.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8298.json index 70021686d3f..67a9c96a1c2 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8298.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8298.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8298", "sourceIdentifier": "psirt@huawei.com", "published": "2024-09-04T03:15:05.047", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T14:53:06.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@huawei.com", "type": "Secondary", @@ -51,10 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342" + } + ] + } + ] + } + ], "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/", + "source": "nvd@nist.gov", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8428.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8428.json new file mode 100644 index 00000000000..12b43acd1d9 --- /dev/null +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8428.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8428", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-06T14:15:13.823", + "lastModified": "2024-09-06T14:15:13.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ForumWP \u2013 Forum & Discussion Board Plugin plugin for WordPress is vulnerable to Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 2.0.2 via the submit_form_handler due to missing validation on the 'user_id' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to change the email address of administrative user accounts which can then be leveraged to reset the administrative users password and gain access to their account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/forumwp/trunk/includes/frontend/class-actions-listener.php#L179", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5818587-0a52-4734-8f75-263b4ab5020e?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d06b763cbd2..d79b756243b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-06T14:00:18.143882+00:00 +2024-09-06T16:00:17.996592+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-06T13:56:00.207000+00:00 +2024-09-06T15:57:25.657000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262059 +262067 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `8` -- [CVE-2024-1744](CVE-2024/CVE-2024-17xx/CVE-2024-1744.json) (`2024-09-06T13:15:03.467`) -- [CVE-2024-44739](CVE-2024/CVE-2024-447xx/CVE-2024-44739.json) (`2024-09-06T13:15:04.323`) -- [CVE-2024-45039](CVE-2024/CVE-2024-450xx/CVE-2024-45039.json) (`2024-09-06T13:15:04.400`) -- [CVE-2024-45040](CVE-2024/CVE-2024-450xx/CVE-2024-45040.json) (`2024-09-06T13:15:04.893`) -- [CVE-2024-45299](CVE-2024/CVE-2024-452xx/CVE-2024-45299.json) (`2024-09-06T13:15:05.253`) -- [CVE-2024-45300](CVE-2024/CVE-2024-453xx/CVE-2024-45300.json) (`2024-09-06T13:15:05.537`) -- [CVE-2024-45405](CVE-2024/CVE-2024-454xx/CVE-2024-45405.json) (`2024-09-06T13:15:05.830`) +- [CVE-2024-25584](CVE-2024/CVE-2024-255xx/CVE-2024-25584.json) (`2024-09-06T15:15:12.950`) +- [CVE-2024-44837](CVE-2024/CVE-2024-448xx/CVE-2024-44837.json) (`2024-09-06T14:15:12.517`) +- [CVE-2024-6445](CVE-2024/CVE-2024-64xx/CVE-2024-6445.json) (`2024-09-06T14:15:12.683`) +- [CVE-2024-7493](CVE-2024/CVE-2024-74xx/CVE-2024-7493.json) (`2024-09-06T14:15:12.860`) +- [CVE-2024-7599](CVE-2024/CVE-2024-75xx/CVE-2024-7599.json) (`2024-09-06T14:15:13.107`) +- [CVE-2024-7611](CVE-2024/CVE-2024-76xx/CVE-2024-7611.json) (`2024-09-06T14:15:13.330`) +- [CVE-2024-7622](CVE-2024/CVE-2024-76xx/CVE-2024-7622.json) (`2024-09-06T14:15:13.553`) +- [CVE-2024-8428](CVE-2024/CVE-2024-84xx/CVE-2024-8428.json) (`2024-09-06T14:15:13.823`) ### CVEs modified in the last Commit -Recently modified CVEs: `47` +Recently modified CVEs: `42` -- [CVE-2024-45097](CVE-2024/CVE-2024-450xx/CVE-2024-45097.json) (`2024-09-06T12:51:59.750`) -- [CVE-2024-45098](CVE-2024/CVE-2024-450xx/CVE-2024-45098.json) (`2024-09-06T13:01:44.023`) -- [CVE-2024-45157](CVE-2024/CVE-2024-451xx/CVE-2024-45157.json) (`2024-09-06T12:08:21.290`) -- [CVE-2024-45158](CVE-2024/CVE-2024-451xx/CVE-2024-45158.json) (`2024-09-06T12:08:21.290`) -- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-45392](CVE-2024/CVE-2024-453xx/CVE-2024-45392.json) (`2024-09-06T13:24:34.353`) -- [CVE-2024-45400](CVE-2024/CVE-2024-454xx/CVE-2024-45400.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-06T12:08:21.290`) -- [CVE-2024-45443](CVE-2024/CVE-2024-454xx/CVE-2024-45443.json) (`2024-09-06T13:33:10.347`) -- [CVE-2024-45444](CVE-2024/CVE-2024-454xx/CVE-2024-45444.json) (`2024-09-06T13:48:17.260`) -- [CVE-2024-45445](CVE-2024/CVE-2024-454xx/CVE-2024-45445.json) (`2024-09-06T13:54:42.663`) -- [CVE-2024-45751](CVE-2024/CVE-2024-457xx/CVE-2024-45751.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-6449](CVE-2024/CVE-2024-64xx/CVE-2024-6449.json) (`2024-09-06T13:15:06.110`) -- [CVE-2024-6450](CVE-2024/CVE-2024-64xx/CVE-2024-6450.json) (`2024-09-06T13:15:06.343`) -- [CVE-2024-6792](CVE-2024/CVE-2024-67xx/CVE-2024-6792.json) (`2024-09-06T13:35:02.020`) -- [CVE-2024-7211](CVE-2024/CVE-2024-72xx/CVE-2024-7211.json) (`2024-09-06T13:23:07.237`) -- [CVE-2024-7349](CVE-2024/CVE-2024-73xx/CVE-2024-7349.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-7415](CVE-2024/CVE-2024-74xx/CVE-2024-7415.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-06T12:08:21.290`) -- [CVE-2024-8247](CVE-2024/CVE-2024-82xx/CVE-2024-8247.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-8292](CVE-2024/CVE-2024-82xx/CVE-2024-8292.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-8317](CVE-2024/CVE-2024-83xx/CVE-2024-8317.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-8395](CVE-2024/CVE-2024-83xx/CVE-2024-8395.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-8427](CVE-2024/CVE-2024-84xx/CVE-2024-8427.json) (`2024-09-06T12:08:04.550`) -- [CVE-2024-8480](CVE-2024/CVE-2024-84xx/CVE-2024-8480.json) (`2024-09-06T12:08:04.550`) +- [CVE-2023-46352](CVE-2023/CVE-2023-463xx/CVE-2023-46352.json) (`2024-09-06T14:35:04.850`) +- [CVE-2023-46404](CVE-2023/CVE-2023-464xx/CVE-2023-46404.json) (`2024-09-06T14:35:05.673`) +- [CVE-2023-46817](CVE-2023/CVE-2023-468xx/CVE-2023-46817.json) (`2024-09-06T14:35:06.507`) +- [CVE-2023-46958](CVE-2023/CVE-2023-469xx/CVE-2023-46958.json) (`2024-09-06T14:35:08.110`) +- [CVE-2023-46980](CVE-2023/CVE-2023-469xx/CVE-2023-46980.json) (`2024-09-06T14:35:08.953`) +- [CVE-2023-47204](CVE-2023/CVE-2023-472xx/CVE-2023-47204.json) (`2024-09-06T14:35:09.823`) +- [CVE-2023-51785](CVE-2023/CVE-2023-517xx/CVE-2023-51785.json) (`2024-09-06T15:35:02.360`) +- [CVE-2023-5528](CVE-2023/CVE-2023-55xx/CVE-2023-5528.json) (`2024-09-06T15:15:12.640`) +- [CVE-2024-27394](CVE-2024/CVE-2024-273xx/CVE-2024-27394.json) (`2024-09-06T14:35:11.027`) +- [CVE-2024-34641](CVE-2024/CVE-2024-346xx/CVE-2024-34641.json) (`2024-09-06T15:27:40.647`) +- [CVE-2024-34656](CVE-2024/CVE-2024-346xx/CVE-2024-34656.json) (`2024-09-06T15:57:25.657`) +- [CVE-2024-38321](CVE-2024/CVE-2024-383xx/CVE-2024-38321.json) (`2024-09-06T14:50:53.583`) +- [CVE-2024-41912](CVE-2024/CVE-2024-419xx/CVE-2024-41912.json) (`2024-09-06T15:13:26.177`) +- [CVE-2024-42257](CVE-2024/CVE-2024-422xx/CVE-2024-42257.json) (`2024-09-06T14:12:22.577`) +- [CVE-2024-43918](CVE-2024/CVE-2024-439xx/CVE-2024-43918.json) (`2024-09-06T15:51:25.957`) +- [CVE-2024-44082](CVE-2024/CVE-2024-440xx/CVE-2024-44082.json) (`2024-09-06T15:15:13.180`) +- [CVE-2024-44739](CVE-2024/CVE-2024-447xx/CVE-2024-44739.json) (`2024-09-06T15:35:02.807`) +- [CVE-2024-45195](CVE-2024/CVE-2024-451xx/CVE-2024-45195.json) (`2024-09-06T15:35:05.483`) +- [CVE-2024-45321](CVE-2024/CVE-2024-453xx/CVE-2024-45321.json) (`2024-09-06T14:35:13.113`) +- [CVE-2024-45446](CVE-2024/CVE-2024-454xx/CVE-2024-45446.json) (`2024-09-06T14:01:37.120`) +- [CVE-2024-45447](CVE-2024/CVE-2024-454xx/CVE-2024-45447.json) (`2024-09-06T14:17:55.720`) +- [CVE-2024-45448](CVE-2024/CVE-2024-454xx/CVE-2024-45448.json) (`2024-09-06T14:24:21.837`) +- [CVE-2024-45449](CVE-2024/CVE-2024-454xx/CVE-2024-45449.json) (`2024-09-06T14:38:08.067`) +- [CVE-2024-8181](CVE-2024/CVE-2024-81xx/CVE-2024-8181.json) (`2024-09-06T15:35:07.267`) +- [CVE-2024-8298](CVE-2024/CVE-2024-82xx/CVE-2024-8298.json) (`2024-09-06T14:53:06.890`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1d15efd953d..4818ce8a41a 100644 --- a/_state.csv +++ b/_state.csv @@ -153867,7 +153867,7 @@ CVE-2020-24194,0,0,5b90090107d29f2f11ff3959af64bb5060c6e7bed49ac494e26c0b24ecefb CVE-2020-24195,0,0,befd0c430e4d1ef7b8a1be08af12bb8b3d414beb9eb254d56854047c04294665,2020-09-15T16:59:25.990000 CVE-2020-24196,0,0,86645ebba61d71fb4d54ae9f027af99a5843de1e042289ac6312e8444a51d9b6,2020-09-02T16:49:40.777000 CVE-2020-24197,0,0,723e3ae6da543830e22e28fe2841d413930a5160a1f609bc252a3f53abb68f35,2020-09-15T15:50:04.857000 -CVE-2020-24198,0,0,fd8a1be30f42699047d45910f4c2657d99b491b075ee8fed0d45a49aadac9b8e,2024-09-05T19:15:12.033000 +CVE-2020-24198,0,1,15ddfff1da837863ab2bdf8815d9035fea495d2b5bb6f9cf42ee157b0201e21b,2024-09-06T15:15:12.180000 CVE-2020-24199,0,0,f39282985de3f1cad9fa2006126026f95615216b580c10b1cf47f7ef1f2b756d,2020-09-10T01:58:07.613000 CVE-2020-24200,0,0,48903473c4f64a50e47cde0aab311c57314f4bff29894dee5f9fcbc3511b6517,2023-11-07T03:19:51.410000 CVE-2020-24202,0,0,aca9347d15938f12c32a4656c36fccdbf170812ee017f7739b90841c9cc9796a,2020-08-31T16:06:50.940000 @@ -154337,7 +154337,7 @@ CVE-2020-24913,0,0,e7cc4322e4e552018a9027030e57e1e0c5e1d0e78c1263e54eddd7993641b CVE-2020-24914,0,0,03b58b08021d6e1b841516f2339a6e8f01016f0a889416f9cf7ca471d80b5df2,2021-07-21T11:39:23.747000 CVE-2020-24916,0,0,def4fdcfe97ccf043aa11b2e8023b978c448dd6bbab71e5ac737219593b61974,2022-12-06T21:08:01.340000 CVE-2020-24917,0,0,ec0ce60520eb05835c6b098cd8f2093d6c866d0c6bad9500b001d4a88bc8919c,2020-09-03T18:19:41.233000 -CVE-2020-24918,0,0,0b4316278a1c5f998b05459c3a1dcb13d459a335fceedb55ebdb6250234f59d6,2021-05-07T14:15:10.947000 +CVE-2020-24918,0,1,1e0bb67e08fa945b90fe2eb589d12262d9187a77aab2d1dff68a8c1c6d54689d,2024-09-06T15:15:12.280000 CVE-2020-2492,0,0,4d71359ecf0867fee72611f87f7b96254f2f4c1403d0a5fcb64ef508981e2b31,2020-11-30T17:24:19.097000 CVE-2020-24922,0,0,6b22fbc97fcd8c2e9a4e6abbf3224edf5c6ea30e7ce8a56830914bb3619687a2,2023-08-17T02:04:52.340000 CVE-2020-24924,0,0,c8aafbd48cc46995bc350dddb141565fd756c4e1f1fb69e1490ed1b6dae8cfdb,2020-09-18T20:13:24.157000 @@ -212396,13 +212396,13 @@ CVE-2022-48863,0,0,0b99b60ca586a6da4e957e9e6764f579d04f3de517666b5d23308eb74a032 CVE-2022-48864,0,0,20a93d8c717514ed3619da6525932e50b688bd0d476c290094d596cb506d7b10,2024-07-23T14:44:00.093000 CVE-2022-48865,0,0,131f2466a64b0e56f3543f09aa08c5ba9a2688ed851b0bd16452f38d0b32c199,2024-07-23T14:42:20.300000 CVE-2022-48866,0,0,dd9632abea944a27af10a71970d4f3466ac4d00c77d7597d39b4974e89d54588,2024-07-23T14:36:54.493000 -CVE-2022-48867,0,0,5e92639844a09f49c2e2880d2798301ed6ee53d5c7e39f5782a94358dc2e50e0,2024-08-21T12:30:33.697000 +CVE-2022-48867,0,1,89034f4334adb42c738a2be5473270c0911dc0d920f1ac0b4d28776cb614bd16,2024-09-06T14:15:33.733000 CVE-2022-48868,0,0,71930151dd2da4effce87b0c58f00690726edc337608125881b75d568929e549,2024-09-04T18:38:59.113000 -CVE-2022-48869,0,0,173192c29b79b7256dc08619df2dc37adbf52bdcfa3083471b4fd39780223b58,2024-08-21T12:30:33.697000 -CVE-2022-48870,0,0,ff2e02721578bc37fe89d4bf345a3f9ac419b3ec104e6d113601d8d741041376,2024-08-21T12:30:33.697000 -CVE-2022-48871,0,0,a7ab0efb32cb12de0391c14350b9234df7cac9b75c62f09ce0060789923d9ab9,2024-08-21T12:30:33.697000 -CVE-2022-48872,0,0,ee4d8f8a3991e2bec8ac24188bd97f88a4a2a81debc8e8a87273c1aa8e4f4952,2024-08-21T12:30:33.697000 -CVE-2022-48873,0,0,126f5bc7205e96dcf9533a79fc89b99529bbfd5ccd8d6cb5c8905ec1069b380b,2024-08-21T12:30:33.697000 +CVE-2022-48869,0,1,81cd4ff86b96462ecc32eabab5dc68a611a20d50189b0c7defb877a6ec4a6bc6,2024-09-06T14:19:58.030000 +CVE-2022-48870,0,1,052813c05f68cd1137ebb2d6c98a2533be475a75001381ffb2e8d1dcdfd83aa8,2024-09-06T14:20:52.290000 +CVE-2022-48871,0,1,54c92c84f06585b0cd1c34723550764f6703255705ce6e16624f4ee65b310912,2024-09-06T14:23:03.010000 +CVE-2022-48872,0,1,a3443f4aed44991e8ffdbfd238d0e943d43a4860a6c9c651e9a7e87452acbecd,2024-09-06T14:30:06.730000 +CVE-2022-48873,0,1,393b434d14e5250aa2645834684365ee6b2c73719b32b9c93d10b0bc701cbbc4,2024-09-06T14:44:16.677000 CVE-2022-48874,0,0,b7c8e23068e04a991fde0d03cbdf1c4f3ccb10a413c897663da1c235e44314de,2024-08-29T02:42:02.070000 CVE-2022-48875,0,0,e2caa42e0dd6ec750fd9e46e92848849f463307e55477fd45d25751b4883f44b,2024-09-04T18:33:03.537000 CVE-2022-48876,0,0,dd7145c2e72a17454bb985d184ad79104309aabd2355fce75e49acbb3b771a5f,2024-08-29T02:41:34.627000 @@ -212415,14 +212415,14 @@ CVE-2022-48881,0,0,b70be3d1ee4e769ba4344a8e2f0e797098bfa307c63cbc3c862df6517648d CVE-2022-48882,0,0,a4cc9ef14b31d7f9d8718b6e7650e6d5e257977ea609b6e0ca6de853f5e46dfd,2024-08-29T02:36:29.837000 CVE-2022-48883,0,0,393ba512ffb574163a9f61b49138c9f5fd99ee611a3c62b415a0eaf8e576afe0,2024-08-21T12:30:33.697000 CVE-2022-48884,0,0,442f30c7bc460d0b750d0d62192aad9e98cf9980141831c7f81e4f22265a3feb,2024-08-21T12:30:33.697000 -CVE-2022-48885,0,0,4eaaf96e489fd3f5fdbe027aacf73aa33e96341274abed26c4fa1795e0f9090d,2024-08-21T12:30:33.697000 -CVE-2022-48886,0,0,e3f8a632d16b887efd73f9de9b8718b94deb11a996364b3168b83b0f0443678f,2024-08-21T12:30:33.697000 -CVE-2022-48887,0,0,e77f585c3d791c318523b7218645ec0f9895bc8755d7239633b08f6e25494dc5,2024-08-21T12:30:33.697000 +CVE-2022-48885,0,1,96a2bdaa99e975d1de06bd449b235bf2aad940ee327e3c25406244d9ddb292ad,2024-09-06T14:46:30.067000 +CVE-2022-48886,0,1,32b6f7b27749a93c357033c3466e2b43f740116b44efe497d8cefb500ee1a0bd,2024-09-06T14:48:20.907000 +CVE-2022-48887,0,1,03b8fd7e085deadf361cc8da2df815cc48acdfd7e0c823a279cecbdf2eb6da9c,2024-09-06T14:55:46.460000 CVE-2022-48888,0,0,42d6982698129b610dfcc8d0e9291c31502606f4c6a721867d9f51b6d6879cfd,2024-08-29T02:36:17.273000 -CVE-2022-48889,0,0,29463f28e482fdefb7d8002387d5e32ed2c38bd0b6ab34a0f42f487921647b9a,2024-08-21T12:30:33.697000 +CVE-2022-48889,0,1,26fe6c772af27a72a4dbc4a4042cab4c16d41f4bffb83c7a9c5c75fe7d3e69ec,2024-09-06T15:08:10.060000 CVE-2022-4889,0,0,e28145e6bac3566714c615b828c485e97008b42961c16fdc8c566e13678a4601,2024-05-17T02:17:01.537000 -CVE-2022-48890,0,0,645168073778a3a097b7418c6b0d9bdc7fe490075cef45390788017857faa2de,2024-08-21T12:30:33.697000 -CVE-2022-48891,0,0,6785941c50af1e5ec9463a15423dd25eac720b3f8d6610cec85f9ad9de30dc78,2024-08-21T12:30:33.697000 +CVE-2022-48890,0,1,86d632bf5df80684b404ab7b8921bbf892e25d0ec1b61ff33de7d34236ea41bb,2024-09-06T15:11:16.120000 +CVE-2022-48891,0,1,e53cdfff9c40301449889e2be599113f4029581bf8c097ee401be6555cedf27f,2024-09-06T15:39:03.433000 CVE-2022-48892,0,0,e5d1d64acbb59160918aa70cc9f19716880e808c7570261094b023c94b7fa4ef,2024-08-29T02:35:56.343000 CVE-2022-48893,0,0,63e898874aefd1107ff228212c8a194675f7243efe81828dac0b0a89625bb2d3,2024-08-21T12:30:33.697000 CVE-2022-48894,0,0,f64cef72f9d2bc85e042e4ad9d8fef3cc48a4f3edb26d765133492c365bf2387,2024-08-21T12:30:33.697000 @@ -223443,7 +223443,7 @@ CVE-2023-31099,0,0,316dca47a441bcbff49b7c01682f0edc834d3579c34610a0d65d4f7cacad7 CVE-2023-3110,0,0,cb45d3e424e5f4d9ba44917b64a5258a7d77c882331cea6e65d589e098116cad,2023-06-28T15:59:59.863000 CVE-2023-31100,0,0,52728b9e8ab26aa70b0ab55039f170907999be466f5e8b560dabc4fb805a29bd,2024-02-01T02:30:22.687000 CVE-2023-31101,0,0,77f4e544f11b5e739b1479f6e19b6ccd2456975f67b8561aaa2c58229b75968c,2023-05-27T02:26:38.467000 -CVE-2023-31102,0,0,427462b7abc20e907a8ae1aa683e6574df323303024a67c4e41dab819876dcea,2023-11-20T00:15:06.277000 +CVE-2023-31102,0,1,5080e71e8f917eeae0dd70983299a81d3f1547c01aad2307d315c1afe001c7a1,2024-09-06T14:35:01.717000 CVE-2023-31103,0,0,6ebfd0cb1ac0bdf08f28442094dae38ea2ac9a0d7b487e908849ac1cf56c0fa7,2023-05-27T02:19:27.643000 CVE-2023-3111,0,0,88f6d634aaf66868e24baf1dc9c03254a9f0153d8412ca9a1ccbb2e70bf88d7f,2023-11-07T04:17:55.503000 CVE-2023-31114,0,0,a2299262529dc59f23001a6935a0db69324f1ad31cfb90d0de3beb6d9fb6507e,2023-06-14T13:43:45.193000 @@ -225928,7 +225928,7 @@ CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a CVE-2023-34256,0,0,06e655546c54f56248a7bbbb0bd9dfe93b8c16a4183434e9ab515b7b0eb05a57,2024-08-02T16:16:11.203000 CVE-2023-34257,0,0,0320d12b069a7394c51c703bc5f9098562946b70a12bfe53ad75f5a07d652796,2024-08-02T16:16:11.363000 CVE-2023-34258,0,0,2e656b6b465dd8addf89d28d27a2f63785e04de044f2ca4973a2e285fba2546b,2023-06-08T17:26:19.893000 -CVE-2023-34259,0,0,77865eb37ec9e879b884ab83d521cd0d5d91beca2dafdb28593025e053d2e1f8,2023-11-13T17:49:14.460000 +CVE-2023-34259,0,1,710e591d41187a09c0c879c2b28e77b17f59e8df4a70e82104fd10051415f806,2024-09-06T14:35:03.133000 CVE-2023-3426,0,0,935e9c3168851c6b164d09f4971cdc352a7eb4e1fb48d323d9ca5e3f69c4f253,2023-08-05T03:45:57.627000 CVE-2023-34260,0,0,c253d0086191543f48833b7cd2c6b64feac20efd450b29e43c25d5bd3f3dfe93,2023-11-13T17:38:02.170000 CVE-2023-34261,0,0,1729daad30a7372c87b9ad3bf7407e2b7cbc075d6b545c22578d51675898073f,2024-09-05T15:35:08.697000 @@ -233648,7 +233648,7 @@ CVE-2023-45017,0,0,65e43eb5c20215dbd8113ce9610636bdf9d663f68632a4e6e9ea172ebce7e CVE-2023-45018,0,0,4b3aa2e7aa53bf1137cdeaf696b6e89c047ec9b2d6e185fc8ed7340212f35ae1,2023-11-08T23:12:44.263000 CVE-2023-45019,0,0,6756673a243c148f6687da7c598825f2cacee4f4acf7e92cd0d342c7394f6dcb,2023-11-08T23:12:33.400000 CVE-2023-4502,0,0,795bfd0690e1416eff545f176193f92114ef18497bc171c578f98c2d3fa302e9,2023-11-07T04:22:40.457000 -CVE-2023-45024,0,0,c7b3d879c1933a90f3af2c2eae73d53e6b29a79b21133e214d669c02c1d995a0,2023-11-13T19:29:46.800000 +CVE-2023-45024,0,1,f2d68990083eaed6e2e393d4f47a7412a386d70e98010fcd59f705eae07e764a,2024-09-06T14:35:03.993000 CVE-2023-45025,0,0,22225a208e6e749be5e365a5cd6088b337e24ebc60fa184bb20debdf2e56d502,2024-02-08T03:50:56.280000 CVE-2023-45026,0,0,ace3e9e7504a230bf0f52db55a017c6a164facec9477c23b480dab35f3cfa63c,2024-02-06T20:04:57.903000 CVE-2023-45027,0,0,dec72d4ea7216f1091be3baa008ddf528eb2aa0aa6fe7400dfe1915525e3c842,2024-02-06T20:19:44.367000 @@ -234633,7 +234633,7 @@ CVE-2023-46349,0,0,fa8706ca991001eb68023bbbd50f48c04c1e6773c2aa28b396804205566f7 CVE-2023-4635,0,0,2a1da06dc8a738bf0c0dd49928ef7b27b3967b3b9559f3ca5bbf110ed4883c15,2023-11-07T04:22:48.320000 CVE-2023-46350,0,0,ebcd02500bbe1a318214c2b2ba01ffcc512b6c2abbc3ace41f39f107e3e685ac,2024-02-15T19:28:38.503000 CVE-2023-46351,0,0,0734126f837adf1ad2f4c776d84e59edd8ea1ef20a4f3dcd58b32efefc748414,2024-01-25T20:14:36.637000 -CVE-2023-46352,0,0,901c910a2ccb32c64f4e6990d702ca14937151870a3d2988152ba06cfd6e34ed,2023-11-10T04:13:07.300000 +CVE-2023-46352,0,1,c36e4aaa6be42e94fbe892ec2efa133418c229b57ab90e554fa69bb1b0cad042,2024-09-06T14:35:04.850000 CVE-2023-46353,0,0,fd411c6eaa4e91c547796857513980a4c12bd13c784beb220df409a1749f9a21,2023-12-09T04:52:16.587000 CVE-2023-46354,0,0,646d4c6f527aa08230069854fd8f4ca59ccefe3c7118324409117f6f903ba93e,2023-12-09T04:52:09.277000 CVE-2023-46355,0,0,4ee96b2791ee4c5e055da2defa499604a3040d03bdefc4968b32dec7604cd73f,2023-12-01T21:17:19.887000 @@ -234671,7 +234671,7 @@ CVE-2023-46394,0,0,a4de4800ba9072f54d1bc0271928ac028c9cbec6c3baa0f74abcd72cfb575 CVE-2023-46396,0,0,74f481bd37b42e6c5810d0851c91d8d9d55975de01fc2eeba4f5140ada061430,2023-11-02T15:03:59.683000 CVE-2023-4640,0,0,ef517ea28d5508716f101ef0a0cba846372ee2fe78cf6a3f47954c41f51018f6,2023-09-05T15:22:15.190000 CVE-2023-46402,0,0,b1fd8b46799103c9e0b2fb413484e3dcb6319b937b704740b5bc888e6a7e65f7,2023-11-28T18:15:08.910000 -CVE-2023-46404,0,0,2f261cdb2b07e55263e4fa97c6283a376a5eaa0ed39a9244e56121b72767329e,2023-11-13T17:52:03.397000 +CVE-2023-46404,0,1,1e6a766bbfb5b2e5616335c5b7c891f0a8dbf45897aa6b28c2cd67072296b8e5,2024-09-06T14:35:05.673000 CVE-2023-46407,0,0,8a56926a3b97b20a2e3d962774aa035f3b6a36c5705fa9e9f85d167876e00393,2024-01-30T20:17:05.310000 CVE-2023-46408,0,0,969e60cfa27859d12bc5027e1c21c739d529469acc8a1688fabf2be4ac44b061,2023-11-01T16:34:49.837000 CVE-2023-46409,0,0,9c51efb60b1edd50700983003f7e7d932e6c553a120828d87024c27ce7705834,2023-11-01T16:34:59.410000 @@ -235002,7 +235002,7 @@ CVE-2023-46813,0,0,54a5b81ea9d5fb0a268b9293a603071610c41491ab8bbea7095535d094697 CVE-2023-46814,0,0,3cecb5f50c237020a17039ffce04adce16d590a4b77f65a0bce23076a5def1ab,2023-11-29T18:54:35.827000 CVE-2023-46815,0,0,73a8d2839a8f681dd5b4deacb0da64bfc7a2eb89a272b7c57e16fb00a27289cd,2023-11-07T20:46:40.287000 CVE-2023-46816,0,0,457f8b7969b679493dd123ee82eb2b848a16353b6b57ef98524a216099740713,2023-11-07T20:47:44.823000 -CVE-2023-46817,0,0,169f8cbd9052d358564e0a00ac3e45f8df8d45fc8d06a14066888adca73dcf8d,2023-11-13T19:30:38.760000 +CVE-2023-46817,0,1,c622a0bab2dc85efdb3e6cac535b776216f5068d508925e89ceecc35669aaa4c,2024-09-06T14:35:06.507000 CVE-2023-46818,0,0,f234f9e3a48282f81299c3ff6ed7b1a1d071eb6e821f675508ca8b30a7e7e109,2023-12-13T00:15:07.247000 CVE-2023-46819,0,0,b9144c8b43b7e50be02f0a7adb87559b3a81cc8b960f11a9c9b61dc6bebac590,2024-09-04T19:35:08.043000 CVE-2023-4682,0,0,c1c0d3bcf2f406c6bcb06b0a440260f9dabf84e5ad23fa025bbfa655e8c647fb,2023-09-05T16:24:54.687000 @@ -235080,7 +235080,7 @@ CVE-2023-46952,0,0,4bcf3948e8ecb1744ce911545c8fe6c861e6c40af1d5cc477719602d32e4f CVE-2023-46953,0,0,a872c64c0c4c630030a60d7892d6bcb58eb0d3a3b33b50c7787cc33ab267e7ac,2024-01-11T17:06:37.437000 CVE-2023-46954,0,0,4555002c4c62abc01ac36bee743cac877d3c7eea57b71b3900e5569dd91ed77c,2023-11-09T21:38:55.393000 CVE-2023-46956,0,0,31cbd0a04e29ac22bd9f823d3179040618ffc4e9e1a4e90764004517af632bb2,2023-12-06T18:39:39.687000 -CVE-2023-46958,0,0,31f8b75382fc3c74f5a3e2ab21d8f78785fc9b74284c4de658492d100aed0607,2023-11-09T20:10:12.967000 +CVE-2023-46958,0,1,598349dfda94719665577de5fe0aa92d56da1b66528cb3b507f9540b0549c2e6,2024-09-06T14:35:08.110000 CVE-2023-4696,0,0,c17d353a65b5fe55231e71fd5dd8d9e90c20a1609f561de61d8d7b05e4fee642,2023-09-01T13:06:59.890000 CVE-2023-46960,0,0,60db2322c4a9b765f494d0ebafcd8efdc2e2d2d8adcbfbca9f64c33ec63e600d,2024-08-01T13:45:04.950000 CVE-2023-46963,0,0,35077921eccf07ef2dd7ed76ca66b1edda65dcfed35fff2218ba7101c90c7075,2023-11-14T17:37:06.293000 @@ -235093,7 +235093,7 @@ CVE-2023-46977,0,0,718dedcf7e8d60c50f7c513c762fe46ed89e1b2889465f858307796b59884 CVE-2023-46978,0,0,5f5770b9875ebf3fd6d8857acc9e9b125d758788e26c96e3b1b178fd0c24a635,2023-11-08T02:58:11.953000 CVE-2023-46979,0,0,eae1994492758c7970bddfa5af4bb3178bdebcc096f9f0f555ab9653a8becdcc,2023-11-08T02:56:22.127000 CVE-2023-4698,0,0,f67219d933e95e412da2b616588dd9f7b8818435fbd1498ccb40e5f4049ed99a,2023-09-01T13:07:30.360000 -CVE-2023-46980,0,0,e1ab81e03e19ee74cc737d01e47d0240b189c5f552d3b88398ffc12dd2440c5d,2023-11-14T13:37:31.637000 +CVE-2023-46980,0,1,cc67874b097e0fe762ff091e7672831ece4fc0faa50aca2caad3a6a3a1cb63e5,2024-09-06T14:35:08.953000 CVE-2023-46981,0,0,865ec0b7ef3df7198714d9479b263e54d44d5181af5d1cf0172c63bfd8768173,2023-11-13T19:37:07.107000 CVE-2023-46987,0,0,374b064ecd125c9b3c77e3133bffffe989aa2b01517a094fbc764346da32f40e,2024-01-05T17:03:26.977000 CVE-2023-46989,0,0,fd52fc2c8815b71d6a3aa76a5b70a3b0954c93b4887d037a1f94f52ffb7b26c9,2024-01-04T17:14:27.397000 @@ -235269,7 +235269,7 @@ CVE-2023-4720,0,0,46591defb0eac08427334746c7818447cf582c5424371a76c1075c34de9c7b CVE-2023-47200,0,0,025c71894267700a5e7056344c512f44bc82a3ded295dbf8eeddf8b55a5f0af2,2024-01-30T17:24:40.857000 CVE-2023-47201,0,0,010269aeda58fc1e6a818783c5fc20cf915d7f9eb250e73afd49bb3845663cd5,2024-08-29T20:35:26.107000 CVE-2023-47202,0,0,cd0a9ef7969c2c659da6bda7e00d321e0d90cfae7491531717def749ce6d1fb2,2024-01-29T19:57:32.707000 -CVE-2023-47204,0,0,b3cc2fc7ab40a44855805f963a967c4090f45bc4da4f19700ff7cca6f2f5801b,2023-11-09T17:48:32.863000 +CVE-2023-47204,0,1,5056a1187ced6a17077a06f6a567308da8d7f19e695c5a1ded59952e9bfba957,2024-09-06T14:35:09.823000 CVE-2023-47207,0,0,0cbc0cd1878f3c8c27d3c0cfe52bfac26630ea0fde092dbaaacacf727f3ed4e9,2023-12-06T18:48:48.427000 CVE-2023-47209,0,0,8c71bbf11f39ea38c0f1ca1872233ee269a7df5592660f74d12bf31cfdf93912,2024-02-09T02:10:45.003000 CVE-2023-4721,0,0,5bed59ffe75b8be3189e2ebb35f3a3a5791725bfc9ef99b944f3d40b2e758745,2023-09-06T00:15:28.960000 @@ -238404,7 +238404,7 @@ CVE-2023-51780,0,0,7d213db1d3b1f7169b1ee960fe76bc900ec825971d3159c6587e7ccc180c3 CVE-2023-51781,0,0,be5054a4d6b1496efeb300d0972eaa9aed760c8f3595ab6d8f076735cf23d2df,2024-01-18T19:58:50.630000 CVE-2023-51782,0,0,226d3cdca2a1281d03aacf683fa229f2432a76022577875d6f89499a1a72964d,2024-01-18T19:31:37.630000 CVE-2023-51784,0,0,7d601840dd52665386e56042b61153e0dd9d156e79737ee0b7e9f683c831f447,2024-01-09T19:19:59.413000 -CVE-2023-51785,0,0,af6e089d4b220f7ed1c33a8e658fcc887cbb36e7a814321622f657ea15e4ed43,2024-01-09T20:18:47.197000 +CVE-2023-51785,0,1,a5a445bd201beb0ef44e66fc50da12391cbc8ef78a9e16c735ecec117160c9c5,2024-09-06T15:35:02.360000 CVE-2023-51786,0,0,ff2ae0afd5896bfcccd08328ace3cce896bcb8fbd8728c747c3e38d3deae4327,2024-08-27T21:35:04.790000 CVE-2023-51787,0,0,32045d14c29a8e094b6fc542eae69fe0fa1d19c1ca4a4442151912591cfe915f,2024-08-01T13:45:32.003000 CVE-2023-5179,0,0,ad8ed58fdb4084553e041d0d1d973d60d06712443de8134346a8a8ead34c4da1,2023-11-14T21:29:41.243000 @@ -239350,8 +239350,8 @@ CVE-2023-52911,0,0,d583bf0c3994a5cde3f25badb72d8404d832e6fe0d8e110e053203df0effa CVE-2023-52912,0,0,76d151333b77b2bd9a44e2c7429e02509b46f2a3384c99f9d0812059fa9223aa,2024-08-21T12:30:33.697000 CVE-2023-52913,0,0,e1054c26f9dea56ffd68b68caf0b3e79a17694aea6f3abb40c24e04a641898c2,2024-08-21T12:30:33.697000 CVE-2023-52914,0,0,ea9dbf463cbd5598879fed8b6374213941d18b44baa0478af4d6ebdab43bbea1,2024-08-21T12:30:33.697000 -CVE-2023-52915,0,1,bdbca90dfa4b589cc2bab16f5f9ec310914d13bc7088a137789758c7368c9dcd,2024-09-06T12:08:04.550000 -CVE-2023-52916,0,1,5bbab86a5a2f596b1e1ed53b9221822f4b413f719a69472a8344983675045bd3,2024-09-06T12:08:04.550000 +CVE-2023-52915,0,0,bdbca90dfa4b589cc2bab16f5f9ec310914d13bc7088a137789758c7368c9dcd,2024-09-06T12:08:04.550000 +CVE-2023-52916,0,0,5bbab86a5a2f596b1e1ed53b9221822f4b413f719a69472a8344983675045bd3,2024-09-06T12:08:04.550000 CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 @@ -239571,7 +239571,7 @@ CVE-2023-5523,0,0,bdd48092e4d5ab76434220a199e56d98fa47c395fbcc23ebc7c69d7e127f5d CVE-2023-5524,0,0,5169d7d8052a7012dbff7cd323a414cd5852b5c7221b30db93dc2bf8e43af6f6,2024-08-28T09:15:09.707000 CVE-2023-5525,0,0,543ec82aa94363be260145436c9c180cacc4af427707ae230febd3148ae15c39,2023-11-30T20:15:18.223000 CVE-2023-5527,0,0,1e958c164e488718f37dd43daa67a175a10841217dba121ce89025ac9ba89004,2024-07-05T14:11:01.873000 -CVE-2023-5528,0,0,7bdfbebcf9e7ec10c748abe0927b7e446f525fa7172280dd961465780d041565,2024-01-19T16:15:10.280000 +CVE-2023-5528,0,1,d1db7bd851cb1f2811816c0e6d89bc69ee1d3bf5f3cb446769f932c51fef40f9,2024-09-06T15:15:12.640000 CVE-2023-5530,0,0,c3e6a7cea79bf4cfc7586400dcaf9455390e41ce881f41dcf28765de1970c973,2023-11-14T15:31:50.170000 CVE-2023-5531,0,0,9076d00a4817e2fe00125f34f0d658f0ea9c411a20b192f3479cd194c21f8dc0,2023-11-07T04:24:07.297000 CVE-2023-5532,0,0,f74dbaab5b090b0e034d237c85162d6bdfa882ba3950ea1c5ed23a1cc57994d9,2023-11-14T18:17:45.437000 @@ -242693,7 +242693,7 @@ CVE-2024-1740,0,0,974b4647e97273950b6a297affa420d08f59acef309aa37814c6598a456898 CVE-2024-1741,0,0,9b90ffeb3b03d37716707b75f2cc4dbd5a37dfb34e59e240c9be2fa85842dcc2,2024-04-15T18:15:09.937000 CVE-2024-1742,0,0,ef8e2131c95185fddee2b27fa43b85956207ef471d56b7605b9d2e6a1c53a4d4,2024-03-22T12:45:36.130000 CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000 -CVE-2024-1744,1,1,46a92b6e23a003fa03614f282fe8f61945617d9a5cfebce37256108fa317faa9,2024-09-06T13:15:03.467000 +CVE-2024-1744,0,0,46a92b6e23a003fa03614f282fe8f61945617d9a5cfebce37256108fa317faa9,2024-09-06T13:15:03.467000 CVE-2024-1745,0,0,1e43ec903cdd08626f0d20b4612f3ce6507e55e2bd5bb05034398a450502f6f7,2024-08-05T19:35:01.720000 CVE-2024-1746,0,0,8022383f443dbbb627f1c414153375fa50b320afeba598d9c8de3dc5c8a81f57,2024-04-15T13:15:31.997000 CVE-2024-1747,0,0,62057f23570bb0721b1db5127075f49bb03ce7c371cab177ae217aa948df9df2,2024-08-01T15:35:05.150000 @@ -246065,7 +246065,7 @@ CVE-2024-24755,0,0,e4708ab22e90c108e98e9aa20d9e6f52aac9c365db4852f4f377c09577dad CVE-2024-24756,0,0,a8c8a136cbb94318b9ac39b1cf6ca26aedd9fd478d8deeb2b541a1b5348e8aea,2024-02-09T19:47:10.213000 CVE-2024-24757,0,0,cf8db7e707a60167d50958ed833b092b480adb19351f319a3150e724530329a6,2024-02-10T04:10:36.420000 CVE-2024-24758,0,0,4afdd9a8b1527f6df073ab9304d324073fd35a999bf5b108c831c515c647ab95,2024-05-01T18:15:14.833000 -CVE-2024-24759,0,1,196dd3d6a390d0f8adf696e748e9652eea5e67c303d007f2b608d7022ae5651d,2024-09-06T13:06:18.623000 +CVE-2024-24759,0,0,196dd3d6a390d0f8adf696e748e9652eea5e67c303d007f2b608d7022ae5651d,2024-09-06T13:06:18.623000 CVE-2024-2476,0,0,80675065379b57841f9cc91f89004ea3a59650c216e07d02b5d96eca99c32b3c,2024-03-29T12:45:02.937000 CVE-2024-24760,0,0,712e50ebe0dfd036080457db09cbfac631236bade7f3aab0fefe0bd1d6c7650e,2024-02-10T04:04:55.743000 CVE-2024-24761,0,0,b1f2bf902e5fec122e2292b6e3e60586d417fb53e3af18ffd9589198f195ec1f,2024-03-06T21:42:48.053000 @@ -246635,6 +246635,7 @@ CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8c CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000 CVE-2024-25582,0,0,62d9159e0b1a2860275799366d4e29ceadc17aa10726dd8de14b9c6e306d70ce,2024-08-19T12:59:59.177000 CVE-2024-25583,0,0,6e3f5afaa55d00544b0a17a1114934680c9d4fc2071988d62cf80e5688bf7955,2024-05-01T17:15:29.917000 +CVE-2024-25584,1,1,89b20e5dcd3d8c4c3ce9109e9e1254d69764a5640f158a1eab12a09150002c22,2024-09-06T15:15:12.950000 CVE-2024-2559,0,0,642c1f03947aacfb3c18bcf4d539f5f80f1fa8009f630aa1b6518220561e974a,2024-05-17T02:38:19.053000 CVE-2024-25591,0,0,e315c0ed01e598ec7e003ff81cc81e0d8a90e92647ce95f4238660e2e3cb63e0,2024-03-17T22:38:29.433000 CVE-2024-25592,0,0,13e401ed83dddc5e0ca4a766450281e95f13649cc9bdbd70b9d6ebf050e92c48,2024-03-15T16:26:49.320000 @@ -246757,10 +246758,10 @@ CVE-2024-25738,0,0,708ab77db4798450f178306dfdce8e54e50af183337435b77974d77b7119e CVE-2024-25739,0,0,976dd73cb281097b08298328a4164e038521b14231c5653569f9d2458078f4f3,2024-06-27T13:15:55.520000 CVE-2024-2574,0,0,0663b3bf620e7eaea35e1b3237dc263b6d897527ed31c7e8166e509390c6cb16,2024-05-17T02:38:20.537000 CVE-2024-25740,0,0,6ba085d5463d39f02fcd8a1bcb6b0d08f943a0acf58c18d3b1c39a6a03f005b3,2024-02-26T21:11:27.837000 -CVE-2024-25741,0,1,96d212b2133c541e969943e90a0b05654d2d127733a0b62e987df5513a4bce9f,2024-09-06T13:00:04.567000 +CVE-2024-25741,0,0,96d212b2133c541e969943e90a0b05654d2d127733a0b62e987df5513a4bce9f,2024-09-06T13:00:04.567000 CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000 CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000 -CVE-2024-25744,0,1,9215f14f6525e55efbddb4ffcee42204248a5f87f3501314f6b7ff3022ecec1d,2024-09-06T13:11:05.520000 +CVE-2024-25744,0,0,9215f14f6525e55efbddb4ffcee42204248a5f87f3501314f6b7ff3022ecec1d,2024-09-06T13:11:05.520000 CVE-2024-25746,0,0,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000 CVE-2024-25748,0,0,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000 CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000 @@ -248172,7 +248173,7 @@ CVE-2024-27390,0,0,fd939b5a46e3db47e38737677dc08895d4507457dc8c59f804a220890fafa CVE-2024-27391,0,0,c609df1ae4a0d8b672f84b73ef5e4ba82e2a581d1583d7f5330bf8875e22776f,2024-05-01T19:50:25.633000 CVE-2024-27392,0,0,d71bd39d141dc4709bff7fbbc837ba796224bb31c86e71592537c5234c653cf4,2024-05-01T19:50:25.633000 CVE-2024-27393,0,0,0d122d1a50515c52a623d15f9a0d95a22f7e02938fb8b22e82a5712750ad9006,2024-06-10T17:16:23.223000 -CVE-2024-27394,0,0,67112e71836ab43c8ed49fc976b35d6b12c82b3bc282714292ffbd79ee2fef5b,2024-07-03T01:50:36.103000 +CVE-2024-27394,0,1,08a27f4278e90895db869570c2ad1394d2b1b7ce2eebd13c81985e703b3d5763,2024-09-06T14:35:11.027000 CVE-2024-27395,0,0,f509312d757b52ad19fbd73ceeb6a726f1f69fc5206c32a2cd50e6d3c74db34b,2024-06-27T12:15:24.577000 CVE-2024-27396,0,0,e14a9534df6188e2d3948f71aa579b6ff342c8dd8805de92331af3aa294e2094,2024-06-27T12:15:24.647000 CVE-2024-27397,0,0,a0f40ad4c2f891849c489ae4b9841685ad4e227c084159373a42e20fef210207,2024-08-19T05:15:06.293000 @@ -253171,7 +253172,7 @@ CVE-2024-34638,0,0,91fe3b834e3462c15fbf154ef3d7ab38d545a9a64e15797ac8088d6d5c627 CVE-2024-34639,0,0,5126f9cb6c976682c17d65ace1405f88764b328ae3db088d28e0b57940c92216,2024-09-05T18:04:37.677000 CVE-2024-3464,0,0,9e608448fda895152ed315d883c9d4488539c5d01a2437614b47cfb67b0a4466,2024-05-17T02:39:57.540000 CVE-2024-34640,0,0,4c7fde7ff03197842352a86e70dbc537d9f440fdf4872caf494fd8acfe50d0ca,2024-09-05T18:04:28.607000 -CVE-2024-34641,0,0,2b30fd1a9f5ae753629925215ca156579576fd060a975f5387ccb7d58dd694d8,2024-09-04T13:05:36.067000 +CVE-2024-34641,0,1,c77ca2edd0db150eb0811c6441d08a57704276bdc068d117b8e1f90660357ea8,2024-09-06T15:27:40.647000 CVE-2024-34642,0,0,54c219cd85c017e71c929c36652a56a6824f245d2f9be41abdf874c9b8dc39de,2024-09-05T18:03:57.407000 CVE-2024-34643,0,0,fbb923e6665e4b9fcb93b30b65b07d4c83673c639c27d25afd12c5e752b948df,2024-09-05T18:03:12.323000 CVE-2024-34644,0,0,3e53979f9850d51f064780cf789bbea28badd5caf32db28756d92b8a7c8bcf96,2024-09-05T18:03:00.687000 @@ -253187,7 +253188,7 @@ CVE-2024-34652,0,0,5fcd4fa460cbaeec0f8df845e452b826bda7eb569c47b7926c3e1d9633ab5 CVE-2024-34653,0,0,677330c93a4b4f53244647b85632be75f577b8d63e27df66036ceaf9279b43ee,2024-09-05T18:04:40.810000 CVE-2024-34654,0,0,6f465f944e3d70bce6526d6d1148c1e634bb7c08992888ceb1abb536af6c667d,2024-09-05T18:00:07.057000 CVE-2024-34655,0,0,dfac8eb7e02ea4fde394dff14f36d75c33b2306795d4e4e527cae6398c8df500,2024-09-05T18:00:39.270000 -CVE-2024-34656,0,0,4b5097936519572ad489ac32cb14e42c878e2a5293e1ee1278fd186194deceef,2024-09-04T13:05:36.067000 +CVE-2024-34656,0,1,9b7706f2da7b41644d68334787754fd19696d282433ff97b1c940cde45b0d353,2024-09-06T15:57:25.657000 CVE-2024-34657,0,0,e76dd3b191c96b6eebc5e6b8603c75eeff96d8eae90f914ab3a15f3eb419d2ec,2024-09-05T13:48:54.077000 CVE-2024-34658,0,0,0bdbae0b2b42061a8353c4769a7cf5c4aeee0cbc7bbbfd2a997adcca4577f91e,2024-09-05T13:48:52.273000 CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24946,2024-09-05T13:48:55.767000 @@ -255630,7 +255631,7 @@ CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea CVE-2024-38313,0,0,99d0ffe48700cf0aafe0ab7664577089c510c6757d7ad1e1517ef516a283543d,2024-06-17T12:43:31.090000 CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804509,2024-06-24T12:57:36.513000 CVE-2024-3832,0,0,9a695728462575e75497ca13bb41d4307d467f786773e32ceb92b024954b50b9,2024-08-14T20:35:21.240000 -CVE-2024-38321,0,0,2cb9045d51fd54daeac3702ceaa87df8b4f19bbab20424161fab4c08e362da38,2024-08-05T12:41:45.957000 +CVE-2024-38321,0,1,2710f443b4070c40eb4ddb90b32a5c6553d12d8c8899edd19abf3192e0c71b2d,2024-09-06T14:50:53.583000 CVE-2024-38322,0,0,74b9e97c7c82afcc24ac902608f17e4ba9d4e2fd0a18a6e0da522de36e8692a9,2024-08-20T17:27:59.567000 CVE-2024-38329,0,0,515bd4f8a6975d0242eb5160bb598bf35297ce9bdbe7a3832edd58be7833ade0,2024-08-03T12:15:16.803000 CVE-2024-3833,0,0,d8bd7ba32ab0c5df93ed1bc71c84eca78bd804cb628236293c000739d365ad50,2024-08-01T13:56:42.740000 @@ -255734,7 +255735,7 @@ CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 CVE-2024-38482,0,0,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000 CVE-2024-38483,0,0,d89f0c1af2745eaf3307200f5493e8a825a53b577d01487f0db0b0e51a7359ef,2024-08-14T13:00:37.107000 -CVE-2024-38486,0,1,87c5a44f92182ecc40db642dc01535c94130abe40a32815737960b8bbbb09711,2024-09-06T12:08:04.550000 +CVE-2024-38486,0,0,87c5a44f92182ecc40db642dc01535c94130abe40a32815737960b8bbbb09711,2024-09-06T12:08:04.550000 CVE-2024-38489,0,0,93d5075288eb71dc5e05de45f3028a8abf40e549af9e7f74c8d90c91ab2994de,2024-08-02T13:54:55.697000 CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000 CVE-2024-38490,0,0,6064da0857e13bb34f5161ce76072357349aff2d15fba2fd034148c6aa00cdc4,2024-08-02T13:54:51.277000 @@ -256198,7 +256199,7 @@ CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc9 CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000 CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000 CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 -CVE-2024-39278,0,1,0601498c3389c5dd00f8ed9530dea3d77d09d81c315f48a8850ef30911e72e8d,2024-09-06T12:08:04.550000 +CVE-2024-39278,0,0,0601498c3389c5dd00f8ed9530dea3d77d09d81c315f48a8850ef30911e72e8d,2024-09-06T12:08:04.550000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 CVE-2024-39283,0,0,b7e0387ba5dd8a48e1248bb2bf0b89b8e5d589734af2917b519d63ca9a728676,2024-08-14T17:49:14.177000 CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 @@ -256436,7 +256437,7 @@ CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f086204 CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000 CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 -CVE-2024-39585,0,1,bf0d12ad0e5692587be63c1809ed232ada783d92c2da2c6ee712874c5362a09b,2024-09-06T12:08:04.550000 +CVE-2024-39585,0,0,bf0d12ad0e5692587be63c1809ed232ada783d92c2da2c6ee712874c5362a09b,2024-09-06T12:08:04.550000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000 CVE-2024-39592,0,0,541b14c1914f7693bac69344218050bd21bf7511f9226d6471041f73dd5bbff5,2024-08-29T19:25:41.740000 @@ -256991,7 +256992,7 @@ CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe6 CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000 -CVE-2024-40865,0,1,b915f771e330e9eacff27353ae6f81425515122bd098dc3b5152c9be16cadf86,2024-09-06T12:08:04.550000 +CVE-2024-40865,0,0,b915f771e330e9eacff27353ae6f81425515122bd098dc3b5152c9be16cadf86,2024-09-06T12:08:04.550000 CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 @@ -257125,7 +257126,7 @@ CVE-2024-41007,0,0,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181c4a,2024-07-16T13:43:58.773000 CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000 CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000 -CVE-2024-41011,0,1,0ea0f8cc21c6447d8c7d604f8cb128d5314c6d4d9477517c491af1541a3fc28d,2024-09-06T13:19:10.197000 +CVE-2024-41011,0,0,0ea0f8cc21c6447d8c7d604f8cb128d5314c6d4d9477517c491af1541a3fc28d,2024-09-06T13:19:10.197000 CVE-2024-41012,0,0,100aa94909001769d833a9407cf1a1d29626a5b74fec5cc1935ff6c4fd015723,2024-07-29T07:15:05.083000 CVE-2024-41013,0,0,e60bba3e408ef7ae0e4e783aa0f35051774aa2a8d236b750438ef4fbd7846f74,2024-07-29T14:12:08.783000 CVE-2024-41014,0,0,705963fa55cb8c9deb35bac026b5f0f3c8c6d9abda445da5a02c7d95e767c33f,2024-07-29T14:12:08.783000 @@ -257608,7 +257609,7 @@ CVE-2024-41908,0,0,4395c5591073b43f4724f4131ff7c57ca0e5c0cbe6832eb0944957596ef1d CVE-2024-41909,0,0,ae6686d5ad4d2ebfd635dbae6d1f881b365882bc35a01efb94a8b8f78e60a1e9,2024-08-30T18:32:14.467000 CVE-2024-41910,0,0,06fef1a1746e307a7b6963424f9e76401a3fb6190b3818fc37dc793d73a60b2e,2024-08-13T13:06:13.467000 CVE-2024-41911,0,0,b542ab6549d1a6ba75d487319609cd34daa1d1d30a8cdf77ef05c27a0b475654,2024-08-13T13:06:50.707000 -CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000 +CVE-2024-41912,0,1,87ea3b9bad9f8b63d89c4540ebebc21c4d13ff1285933095e3aece696e2e2968,2024-09-06T15:13:26.177000 CVE-2024-41913,0,0,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe42f,2024-08-13T13:06:48.547000 CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000 CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000 @@ -257856,13 +257857,13 @@ CVE-2024-42248,0,0,a4c871a843ec4ebaf7266331bbf45bb853808d9d58017b146752d4bde19f2 CVE-2024-42249,0,0,273d2e61a1b49951ffbd8c20389c9c76559ac159ab90b5fda4da3c7651f4a6a8,2024-08-08T20:55:25.943000 CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000 CVE-2024-42250,0,0,7d78385b950f6f638c0eea124fbfec17d170acdf08ae1ee68e3b5c1e1327945f,2024-08-08T20:55:19.780000 -CVE-2024-42251,0,1,73aa915a400823306ef1cb983389facfb9add41605622ba6741c8575de328546,2024-09-06T13:21:23.203000 -CVE-2024-42252,0,1,c3750782261f7fe98514cd211a68de1e9ce09485c24e3a6229648794f161cc8d,2024-09-06T13:37:31.460000 -CVE-2024-42253,0,1,6e0fa931ea229e2f23314c5453d8b7e015461615e534d12df0d8c2957c5e1eab,2024-09-06T13:38:36.103000 -CVE-2024-42254,0,1,e0173cdd4809cbf30e0c1ff24a3b56e94fae700787305a6587ee3f29a79ddd0f,2024-09-06T13:40:04.737000 -CVE-2024-42255,0,1,34fe6ca394a4d37dfeae64c43b4e81284ae1fd88f707998530c97485d050831b,2024-09-06T13:41:30.843000 -CVE-2024-42256,0,1,f03d3d34e99a43b4ab4d3700a1810230a20f71fae4e12698f26d3c94c2fbe1db,2024-09-06T13:56:00.207000 -CVE-2024-42257,0,0,069b5a4e96675c66db46a639aa141686ff5530ef6ed9e06efaaa21582e67ad7d,2024-08-08T13:04:18.753000 +CVE-2024-42251,0,0,73aa915a400823306ef1cb983389facfb9add41605622ba6741c8575de328546,2024-09-06T13:21:23.203000 +CVE-2024-42252,0,0,c3750782261f7fe98514cd211a68de1e9ce09485c24e3a6229648794f161cc8d,2024-09-06T13:37:31.460000 +CVE-2024-42253,0,0,6e0fa931ea229e2f23314c5453d8b7e015461615e534d12df0d8c2957c5e1eab,2024-09-06T13:38:36.103000 +CVE-2024-42254,0,0,e0173cdd4809cbf30e0c1ff24a3b56e94fae700787305a6587ee3f29a79ddd0f,2024-09-06T13:40:04.737000 +CVE-2024-42255,0,0,34fe6ca394a4d37dfeae64c43b4e81284ae1fd88f707998530c97485d050831b,2024-09-06T13:41:30.843000 +CVE-2024-42256,0,0,f03d3d34e99a43b4ab4d3700a1810230a20f71fae4e12698f26d3c94c2fbe1db,2024-09-06T13:56:00.207000 +CVE-2024-42257,0,1,dd66a8bc9ea528d2f2ed1dbef8528f021678b42931c435b735ebdb99ef0374d3,2024-09-06T14:12:22.577000 CVE-2024-42258,0,0,6b21eaebf58128d72e1ceab7d48900d2d3972b04dba8579ddc705c6be6f5d3cd,2024-08-14T14:15:27.727000 CVE-2024-42259,0,0,29b4a2e7ef9e0c3eb8144aa95f30b45d14ba1954b7d6ca5651fd3521fa620dbb,2024-08-19T05:15:07.053000 CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000 @@ -258038,9 +258039,9 @@ CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca76 CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000 -CVE-2024-42491,0,1,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000 +CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000 CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000 -CVE-2024-42495,0,1,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000 +CVE-2024-42495,0,0,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000 CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 @@ -258720,7 +258721,7 @@ CVE-2024-43914,0,0,cecc040296533d16ec68f112b8d7429d7c31abfac86050a6f05da890be7d2 CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000 CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000 CVE-2024-43917,0,0,763320422d1f5f6b627e67997133b73d2d81c353f19b439bce5f72673e32a57d,2024-08-30T13:00:05.390000 -CVE-2024-43918,0,0,6f6745b88f3678813198257c945602dc7ab029c467f62ff1519da2102b72bdb4,2024-08-30T13:00:05.390000 +CVE-2024-43918,0,1,ddd56bcf8df0ced2fd43f465099ef1734f47f7e198c9ebd8d1474897ffb0a07e,2024-09-06T15:51:25.957000 CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000 CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000 CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000 @@ -258772,7 +258773,7 @@ CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543f CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000 CVE-2024-44073,0,0,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000 CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 -CVE-2024-44082,0,1,70a8331cd768c2e9835adf6e103b27ce2f8e12a3bda067b4ac62b7cc192aa0c1,2024-09-06T12:08:04.550000 +CVE-2024-44082,0,1,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000 CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 @@ -258856,10 +258857,10 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037 CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000 CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000 CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 -CVE-2024-44727,0,1,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000 -CVE-2024-44728,0,1,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000 +CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000 +CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 -CVE-2024-44739,1,1,becaa1e1fb57b43902ec5f1b659b9594db9683938046ea549f808aec70003811,2024-09-06T13:15:04.323000 +CVE-2024-44739,0,1,508250faa2e35fa83b62df00c700ebac0a014366777587ff05f9ffe009e520f2,2024-09-06T15:35:02.807000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000 @@ -258887,6 +258888,7 @@ CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a CVE-2024-44820,0,0,f15637d2ac032c543e5fcbbe9f5d1cb1b7c83c8e990be9337cf6d7655fcc3e7a,2024-09-04T19:35:13.010000 CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000 CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000 +CVE-2024-44837,1,1,aa232528d672ffea9aad1130f1b32dbe0d70ea6a605d547dc9751c510d261d22,2024-09-06T14:35:11.887000 CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000 CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000 CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000 @@ -258998,9 +259000,9 @@ CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000 CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000 -CVE-2024-45039,1,1,8dff50a2b407ef59c03c573a53a6c1d07ac352c0d299898c5535283308bfc0d4,2024-09-06T13:15:04.400000 +CVE-2024-45039,0,0,8dff50a2b407ef59c03c573a53a6c1d07ac352c0d299898c5535283308bfc0d4,2024-09-06T13:15:04.400000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 -CVE-2024-45040,1,1,f0d49bbb1adcbd0063af224744665e5c90152971b42a20e3b85899112dcb5dce,2024-09-06T13:15:04.893000 +CVE-2024-45040,0,0,f0d49bbb1adcbd0063af224744665e5c90152971b42a20e3b85899112dcb5dce,2024-09-06T13:15:04.893000 CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000 CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000 CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000 @@ -259024,9 +259026,9 @@ CVE-2024-45075,0,0,970063a21cc69312ed5905047a4f8f95237496df40f08985a6b50e18ab5ad CVE-2024-45076,0,0,0d010c89a424f0e84ebaa9873d815dffe8bb1375c669731f5cae4948fe4c87e7,2024-09-05T12:53:21.110000 CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000 CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000 -CVE-2024-45096,0,1,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 -CVE-2024-45097,0,1,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 -CVE-2024-45098,0,1,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000 +CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 +CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 +CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000 CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000 CVE-2024-45107,0,0,5e2ac9906d55f0e5240ab60036468d760c6dd02ed6b1d647a490b90389e8644b,2024-09-05T12:53:21.110000 CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3d1,2024-06-04T19:20:40.443000 @@ -259034,9 +259036,9 @@ CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb5 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 -CVE-2024-45157,0,1,d58bd885a4fcef10cfad0a9d93a615cd495a5bbfc21d5630267708b64bb78509,2024-09-06T12:08:21.290000 -CVE-2024-45158,0,1,e8dad9aa7119acceed96ded66f8c813d55b79ddf2fce9fd5c4249e0498a3d4b5,2024-09-06T12:08:21.290000 -CVE-2024-45159,0,1,2284ec9dffd6d9b5beb59a13f4fb4f54c368aa4f9f2ebc89a8730d5a788e014a,2024-09-06T12:08:04.550000 +CVE-2024-45157,0,0,d58bd885a4fcef10cfad0a9d93a615cd495a5bbfc21d5630267708b64bb78509,2024-09-06T12:08:21.290000 +CVE-2024-45158,0,0,e8dad9aa7119acceed96ded66f8c813d55b79ddf2fce9fd5c4249e0498a3d4b5,2024-09-06T12:08:21.290000 +CVE-2024-45159,0,0,2284ec9dffd6d9b5beb59a13f4fb4f54c368aa4f9f2ebc89a8730d5a788e014a,2024-09-06T12:08:04.550000 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 @@ -259064,7 +259066,7 @@ CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943 CVE-2024-45191,0,0,8410bc983e36e5828d4c81d5e10811b72eb1342d768b1b1249b7ba20875ec3a3,2024-09-01T22:15:13.697000 CVE-2024-45192,0,0,5da4aeb150ce1f250e3c04f3741f974ba0c69f3ea24005aed7598a0020d8fabe,2024-09-01T22:15:13.880000 CVE-2024-45193,0,0,1554745324792bf9e818f523be327d3eb138b0a7e9f93b1f1c9abf081b45aade,2024-09-01T22:15:13.943000 -CVE-2024-45195,0,0,34c5e59a697b1b18d598c708f966cb61644746f7a7560c269f56903739b49916,2024-09-05T17:44:25.040000 +CVE-2024-45195,0,1,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 @@ -259095,9 +259097,9 @@ CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb5 CVE-2024-45287,0,0,b8f5d1a4e2e5997ea2c47b168fd9a9add6545241bf0ce8d4616381f847e8f565,2024-09-05T13:35:02.927000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 -CVE-2024-45299,1,1,6949881772edebd6b9c3e13d4dce18df4b3e6bef001cad1a646e9b1ac6fc6d97,2024-09-06T13:15:05.253000 +CVE-2024-45299,0,0,6949881772edebd6b9c3e13d4dce18df4b3e6bef001cad1a646e9b1ac6fc6d97,2024-09-06T13:15:05.253000 CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 -CVE-2024-45300,1,1,0da933355136fae05e1ca75338f285bff861224029440e3ffe2a75dabc63f08d,2024-09-06T13:15:05.537000 +CVE-2024-45300,0,0,0da933355136fae05e1ca75338f285bff861224029440e3ffe2a75dabc63f08d,2024-09-06T13:15:05.537000 CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000 CVE-2024-45304,0,0,1414ce8fe9746c46bc2063f6428cc45402e10f1afbb5a5e378e238c2ed3a1fbe,2024-09-03T12:59:02.453000 CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000 @@ -259111,7 +259113,7 @@ CVE-2024-45312,0,0,3ab127ae457c159e255763a9cac499b257dedfb3025d06ab78788175895c2 CVE-2024-45313,0,0,7f2c32db2a1d116c11ba8b1d5ff95be26c7a6f4c5dba7ff892eb13c5baf4c8a1,2024-09-03T12:59:02.453000 CVE-2024-45314,0,0,b63eb7e37a749fb3c308d5e710eb140bbcfefc4e3df4519b3385c13ecabef564,2024-09-05T12:53:21.110000 CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000 -CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000 +CVE-2024-45321,0,1,fb18f1dc20e468dc3e9b1a9f0b38a9a704b0b668d302eb3f364e6f7d26aab3c7,2024-09-06T14:35:13.113000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 @@ -259124,14 +259126,14 @@ CVE-2024-45389,0,0,9f0fa9283a2a5f874fd0dba70c8232c3ec84e221a6ccb67b23537b0164ce9 CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000 CVE-2024-45390,0,0,332342778ea7f712e3a75a5f422837c59f0b8fc1cd3d7840f34f23531141c0dc,2024-09-04T13:05:36.067000 CVE-2024-45391,0,0,9c5789b02ec0149b6dd4c299f7c2076a4f5ab5f425e6ba50511de158538b434d,2024-09-04T13:05:36.067000 -CVE-2024-45392,0,1,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000 +CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000 CVE-2024-45394,0,0,2ba0026e07469dbf430ebd158b45587c8559adbe0d6d259ad77063b3124f324c,2024-09-04T13:05:36.067000 CVE-2024-45395,0,0,e86751a06dbfe92039318153ae3e40334cccb8072cf74037173dfdb8955c4b2b,2024-09-05T12:53:21.110000 CVE-2024-45399,0,0,a1cf7f5ebf189fb42f167aadd6e82f696503abfd38953cb1d8591d5d8cf1b025,2024-09-05T12:53:21.110000 CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000 -CVE-2024-45400,0,1,e1cbf68a489f22b5a95eced8c7088417f4e5cd32b236fc73a99dbc623ef016c3,2024-09-06T12:08:04.550000 -CVE-2024-45401,0,1,6fc32f001fc61968bb9f618abcd6061edaccad267666bcf7a6b24833d7a60445,2024-09-06T12:08:21.290000 -CVE-2024-45405,1,1,586bc54971d05dcddee15980f3c82c87d64b20f9ffd26dfb8d5cb4920d02acf0,2024-09-06T13:15:05.830000 +CVE-2024-45400,0,0,e1cbf68a489f22b5a95eced8c7088417f4e5cd32b236fc73a99dbc623ef016c3,2024-09-06T12:08:04.550000 +CVE-2024-45401,0,0,6fc32f001fc61968bb9f618abcd6061edaccad267666bcf7a6b24833d7a60445,2024-09-06T12:08:21.290000 +CVE-2024-45405,0,0,586bc54971d05dcddee15980f3c82c87d64b20f9ffd26dfb8d5cb4920d02acf0,2024-09-06T13:15:05.830000 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000 @@ -259142,13 +259144,13 @@ CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c15 CVE-2024-45440,0,0,9239656ddb6aeda0c2c6efeace5c8dd620d5a27bf71f1e1bdb521249d601edd3,2024-09-03T18:15:08.967000 CVE-2024-45441,0,0,cc95800eacd4a409644c50c2e99659b2320195778e3ff42b199a8b4fa829f44f,2024-09-04T13:05:36.067000 CVE-2024-45442,0,0,2c6961d1d58c78433d275cad97385307540e57f4ac06bb8459d4fa71156da060,2024-09-04T13:05:36.067000 -CVE-2024-45443,0,1,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000 -CVE-2024-45444,0,1,321f9f6e4d1f412085fa1b37c689a5a7d228fe4c829fe455b2d62bd64bdb658e,2024-09-06T13:48:17.260000 -CVE-2024-45445,0,1,45a1c87a577b88492ff7122c62a15d952a88af2f589f552d69e64885c645bd1f,2024-09-06T13:54:42.663000 -CVE-2024-45446,0,0,8eeeac4c0f558dd1ae996c12e7f896e6c8c39087a3aee9dc30eaec10b0f5f7e5,2024-09-04T13:05:36.067000 -CVE-2024-45447,0,0,e42099412998fdb6eb1847c3692348897eb18af9a010eac106f09831cb60c645,2024-09-04T13:05:36.067000 -CVE-2024-45448,0,0,a03bcda0dbaa0fba892faf51db889c52eae6fa5919c1e27c6680cadfc8e8fd81,2024-09-04T13:05:36.067000 -CVE-2024-45449,0,0,ca75a5fec52aea90cbaac2cb16d5730874e6238683b38adee96cd2d054441131,2024-09-04T13:05:36.067000 +CVE-2024-45443,0,0,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000 +CVE-2024-45444,0,0,321f9f6e4d1f412085fa1b37c689a5a7d228fe4c829fe455b2d62bd64bdb658e,2024-09-06T13:48:17.260000 +CVE-2024-45445,0,0,45a1c87a577b88492ff7122c62a15d952a88af2f589f552d69e64885c645bd1f,2024-09-06T13:54:42.663000 +CVE-2024-45446,0,1,af4d9be5af37ce7556a9f76528c376e7df21ae3230b2a446b998a2c4c80f381b,2024-09-06T14:01:37.120000 +CVE-2024-45447,0,1,b1ca5bf01175d943b0546e709af95ed880695cf0a55c8b64522f7e1c895fa3c7,2024-09-06T14:17:55.720000 +CVE-2024-45448,0,1,baaac6177753b9ef1526bea7e39de3dc043a4ca1913a07543e6e5e11685c2217,2024-09-06T14:24:21.837000 +CVE-2024-45449,0,1,16fcc8f3add1fcba18b36fc04f0c4a19c97d176cb514abd9722e7bafd45dc227,2024-09-06T14:38:08.067000 CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000 CVE-2024-45450,0,0,c06e5e6343abf6ab1ba08a36cd39179f5f795e20e409c99cf975d7573fa7a254,2024-09-04T13:05:36.067000 CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 @@ -259205,7 +259207,7 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 -CVE-2024-45751,0,1,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46551,2024-09-06T12:08:04.550000 +CVE-2024-45751,0,0,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46551,2024-09-06T12:08:04.550000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 @@ -260796,10 +260798,11 @@ CVE-2024-6438,0,0,dda5c3ef0b29175f6296e0b89d7c12c3e07fe51c2f0cc30ea59ffede8f2663 CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a09a,2024-07-02T17:58:39.773000 CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000 +CVE-2024-6445,1,1,16567ab0b3fb9a93fe14c1d341ae72ba8fd54bee773d71d9baca06ce19334323,2024-09-06T14:15:12.683000 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 CVE-2024-6448,0,0,29c9fba3b86c8e9eb615a2e1f73377ed9eea71e4eb21902a2662b1cd45074970,2024-08-28T12:57:27.610000 -CVE-2024-6449,0,1,21995eacdcc0c8443a9e9f3d4edb41f9e9ea5b155f883c2dcc53c4e74b6c4d69,2024-09-06T13:15:06.110000 -CVE-2024-6450,0,1,df77a962eb8911939efd97340d1702803ad1baf719c452d1d7fa8308fe5c3838,2024-09-06T13:15:06.343000 +CVE-2024-6449,0,0,21995eacdcc0c8443a9e9f3d4edb41f9e9ea5b155f883c2dcc53c4e74b6c4d69,2024-09-06T13:15:06.110000 +CVE-2024-6450,0,0,df77a962eb8911939efd97340d1702803ad1baf719c452d1d7fa8308fe5c3838,2024-09-06T13:15:06.343000 CVE-2024-6451,0,0,6a9c0fb65fad3a5f99e557f5250ddd026fdc81cb51b281650e16075ca1a8cd9e,2024-08-19T17:35:23.417000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,997e33861988fe67139dbc94cb45099acca0539b377b12d39324c5c718a66e9d,2024-08-21T14:37:10.103000 @@ -261048,7 +261051,7 @@ CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a8 CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000 CVE-2024-6789,0,0,231bd77c8db40b763ff18cdedd6d2a472872c681c24ea5a4e63b0563b010d2cc,2024-08-27T13:01:37.913000 CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000 -CVE-2024-6792,0,1,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000 +CVE-2024-6792,0,0,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000 CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000 CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000 CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000 @@ -261317,7 +261320,7 @@ CVE-2024-7204,0,0,1772f71824e8e67d08dd960b8980267be3eb60b7db474bb1b3294ba0efdcc4 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 -CVE-2024-7211,0,1,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000 +CVE-2024-7211,0,0,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000 CVE-2024-7212,0,0,d8e81c1df21541a2a61b1ee61c0b13c7c5575d5a7c0cad80faa94c0502ea9af9,2024-08-06T14:06:56.937000 CVE-2024-7213,0,0,91cf0399575fcf8bfe7dc21faeb9bce09b9c6ac55860924943cc84f28093279f,2024-08-06T14:07:30.757000 CVE-2024-7214,0,0,3a78281a383bf44c352cba681f12759123f996c9d59985652a6e46e161f7ed5e,2024-08-06T14:08:05.393000 @@ -261416,7 +261419,7 @@ CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac18 CVE-2024-7346,0,0,cef11b112b151333dc0322cebc750df5acd76278a7b270f016213e5f5d953fa0,2024-09-05T14:03:24.040000 CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5f7,2024-08-20T19:25:17.513000 CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000 -CVE-2024-7349,0,1,c0f6b57771ba8916c1a972b9722d966521ad6be44f6b402b994c07bc1fc94248,2024-09-06T12:08:04.550000 +CVE-2024-7349,0,0,c0f6b57771ba8916c1a972b9722d966521ad6be44f6b402b994c07bc1fc94248,2024-09-06T12:08:04.550000 CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000 CVE-2024-7351,0,0,46112fbe28a33af24a9aafee0e565b5b19cc9895d9dd5029b9f8903f830d37b0,2024-08-26T12:47:20.187000 CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000 @@ -261466,7 +261469,7 @@ CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e327 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 CVE-2024-7413,0,0,cc9a3132dbf30c713a640687e195177085da2f3a67f589d16f765a82cdaabb61,2024-08-12T13:41:36.517000 CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f70,2024-08-12T13:41:36.517000 -CVE-2024-7415,0,1,635de2a957d86d33c8ae8c57c08ec9a59fa790990e371bc472902145ad47b98e,2024-09-06T12:08:04.550000 +CVE-2024-7415,0,0,635de2a957d86d33c8ae8c57c08ec9a59fa790990e371bc472902145ad47b98e,2024-09-06T12:08:04.550000 CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000 CVE-2024-7418,0,0,5654c2ea5f680ee7442f7881c310f72c8023f64985fe11e829ea249b0084006d,2024-08-29T13:25:27.537000 CVE-2024-7420,0,0,212201dc70782f8f787a94c9803febdbce3768abc9739a3b9300a43932a4c1b3,2024-08-15T13:01:10.150000 @@ -261514,6 +261517,7 @@ CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f9 CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000 CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000 CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000 +CVE-2024-7493,1,1,3983f8f12bcdac52d18ee94fdbe74777367d291efcf4374db0d074a462506bb4,2024-09-06T14:15:12.860000 CVE-2024-7494,0,0,3a598ade67522bffd51a3365723ddb5bff4182d602034c8ec8df719958075683,2024-08-19T17:34:50.933000 CVE-2024-7495,0,0,c193334e09e583bf41cda7d073dca2acbe46aabc3be2513a6c4a0be4587cb1db,2024-08-19T17:10:27.693000 CVE-2024-7496,0,0,427bcb1106924d8f1bd58fd00923557097983d876631b3e46ebbaafc9076bb1e,2024-08-19T16:48:09.717000 @@ -261588,9 +261592,10 @@ CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e6 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 -CVE-2024-7591,0,1,93e76a9c527669096be2abfdb6462a0311db24e202fd8d23d80d88ff40dd1ed7,2024-09-06T12:08:21.290000 +CVE-2024-7591,0,0,93e76a9c527669096be2abfdb6462a0311db24e202fd8d23d80d88ff40dd1ed7,2024-09-06T12:08:21.290000 CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000 CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 +CVE-2024-7599,1,1,d2cfbe8b9504a24c243969ff7e7c7980806c2c4d9052825181e0fce0f65f025c,2024-09-06T14:15:13.107000 CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000 CVE-2024-7602,0,0,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000 @@ -261601,12 +261606,14 @@ CVE-2024-7606,0,0,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed CVE-2024-7607,0,0,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000 CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000 CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000 +CVE-2024-7611,1,1,bf291dbcbb039addec6a2c6c79a7915577b4807ea6d2d84fb3da08156a618706,2024-09-06T14:15:13.330000 CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000 CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000 +CVE-2024-7622,1,1,cad29f0e85c68145b0137f39a5c768eea33e114cdeca8620411f143343f84ae8,2024-09-06T14:15:13.553000 CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000 CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000 CVE-2024-7627,0,0,af96392fc36e867c15605b6e1dc599aeac0b5c5d59eb872427406ab6bc591879,2024-09-05T12:53:21.110000 @@ -261926,7 +261933,7 @@ CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da68 CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000 CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 CVE-2024-8178,0,0,2a2797f6457c9a816d7cd4650d8d0f80ee22a85af7d3d544cabca5e14371a945,2024-09-05T21:21:06.637000 -CVE-2024-8181,0,0,3c630c74e0a5e892a66667409ec22f499f363f5b25e34ef38a41031abbd935c0,2024-09-04T12:15:05.833000 +CVE-2024-8181,0,1,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000 @@ -261962,7 +261969,7 @@ CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000 CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000 CVE-2024-8235,0,0,d5aa509f85958c98e1ad9dcfec5d574bff6f5e3781d6d0bbdba4997de15951d1,2024-09-03T12:59:02.453000 -CVE-2024-8247,0,1,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000 +CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000 CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000 CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000 CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000 @@ -261971,17 +261978,17 @@ CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a37 CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000 CVE-2024-8285,0,0,3b0be068594bf7034dac9ef4fa68f5d83c55fdc692ee8082bd0a6e0eca73c78a,2024-09-03T12:59:02.453000 CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000 -CVE-2024-8292,0,1,27ea852dc3661b1a76e4e5c3ea5100bde241ea5a5c464db16708c938d4cf0c30,2024-09-06T12:08:04.550000 +CVE-2024-8292,0,0,27ea852dc3661b1a76e4e5c3ea5100bde241ea5a5c464db16708c938d4cf0c30,2024-09-06T12:08:04.550000 CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000 CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000 CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000 CVE-2024-8297,0,0,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000 -CVE-2024-8298,0,0,908da60f30ca3c3afa19b305cc0058d178aa922b6d0d48bb7b9dd9364a746926,2024-09-04T13:05:36.067000 +CVE-2024-8298,0,1,b6e0265f7e06064f96a4b1454f4843c935b76c78438dc3aea3b160aebd5f455b,2024-09-06T14:53:06.890000 CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000 CVE-2024-8302,0,0,bda50b555854cd31882c0ef2167f779bd3ff1746a67f4e225a03fe8a32f42f3f,2024-08-30T13:00:05.390000 CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000 CVE-2024-8304,0,0,02fe3479f6e17fb07e472eabe123127bcfa4991aa0aa38b065a739eef0a9393c,2024-08-30T13:00:05.390000 -CVE-2024-8317,0,1,14f0c71616d0bf53804a454dd89ddfdc27bbf8ffffc05a1e254c94e626690c0a,2024-09-06T12:08:04.550000 +CVE-2024-8317,0,0,14f0c71616d0bf53804a454dd89ddfdc27bbf8ffffc05a1e254c94e626690c0a,2024-09-06T12:08:04.550000 CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000 CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000 CVE-2024-8325,0,0,6acbe28b7e23bada826026212a2fb1b0115adaa2c5e690e584f377990b0f6742,2024-09-04T13:05:36.067000 @@ -262027,7 +262034,7 @@ CVE-2024-8387,0,0,cccfa2a9463c00af390408978c7133aa456cc8cd4e2c49e9e0114842d3fd1c CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f97c,2024-09-04T15:49:19.170000 CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000 CVE-2024-8391,0,0,6ffd51df6432b1e5cadf1919587edc296707fce8f9413505ec3bec8317c9d0a8,2024-09-05T12:53:21.110000 -CVE-2024-8395,0,1,10c6e3be3a1861aa869e0c4efda44dd094344a7e5d86fc81c1f9f94b8a222ae9,2024-09-06T12:08:04.550000 +CVE-2024-8395,0,0,10c6e3be3a1861aa869e0c4efda44dd094344a7e5d86fc81c1f9f94b8a222ae9,2024-09-06T12:08:04.550000 CVE-2024-8399,0,0,3faa142573b2658da1828ae3d2ac176955aecf342f632daae5bde690c496cf4c,2024-09-04T13:05:36.067000 CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000 CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000 @@ -262041,7 +262048,8 @@ CVE-2024-8415,0,0,d8c5585e64bc4323fcda510a16df97bcb1ec11253c5d38c080bb7195e38687 CVE-2024-8416,0,0,c7d13bc001a0210b2e719e08e8651ac5ae2e4ed0ee9e6e0088ac4a7e467de1ca,2024-09-05T12:53:21.110000 CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076fcb,2024-09-05T12:53:21.110000 CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000 -CVE-2024-8427,0,1,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000 +CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000 +CVE-2024-8428,1,1,48e8956360ad489ac607d313b2c10fa73efbec1a6a07f94a1767a2771b07c260,2024-09-06T14:15:13.823000 CVE-2024-8445,0,0,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000 CVE-2024-8460,0,0,9f3f8eceb3112773f2710cd04ce3ea02c4b8eea37add051a54caa5d3f11f68a4,2024-09-05T12:53:21.110000 CVE-2024-8461,0,0,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000 @@ -262057,4 +262065,4 @@ CVE-2024-8470,0,0,bea6b0b968688b42b5644ab4cec20c893536d252388507a633ee5ebbe07507 CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76cb,2024-09-06T11:44:22.510000 CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 -CVE-2024-8480,0,1,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000 +CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000