Auto-Update: 2024-11-11T15:00:19.382180+00:00

This commit is contained in:
cad-safe-bot 2024-11-11 15:03:22 +00:00
parent d0262c5e97
commit 0d7ce1bece
16 changed files with 763 additions and 70 deletions

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-10314",
"sourceIdentifier": "security@puppet.com",
"published": "2024-11-11T14:15:14.190",
"lastModified": "2024-11-11T14:15:14.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the auto-generation function was identified. Reported by Karol Wi\u0119sek."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@puppet.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "security@puppet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://portal.perforce.com/s/detail/a91PA000001SZNFYA4",
"source": "security@puppet.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-10344",
"sourceIdentifier": "security@puppet.com",
"published": "2024-11-11T14:15:14.453",
"lastModified": "2024-11-11T14:15:14.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the refuse function was identified. Reported by Karol Wi\u0119sek."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@puppet.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "security@puppet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://portal.perforce.com/s/detail/a91PA000001SZOrYAO",
"source": "security@puppet.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-10345",
"sourceIdentifier": "security@puppet.com",
"published": "2024-11-11T14:15:14.563",
"lastModified": "2024-11-11T14:15:14.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. Reported by Karol Wi\u0119sek."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@puppet.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "security@puppet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://portal.perforce.com/s/detail/a91PA000001SZQTYA4",
"source": "security@puppet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-34014",
"sourceIdentifier": "security@acronis.com",
"published": "2024-11-11T14:15:14.693",
"lastModified": "2024-11-11T14:15:14.693",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arbitrary file overwrite during recovery due to improper soft link handling. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 818, Acronis Backup extension for Plesk (Linux) before build 599, Acronis Backup plugin for DirectAdmin (Linux) before build 181."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7592",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-34015",
"sourceIdentifier": "security@acronis.com",
"published": "2024-11-11T14:15:14.993",
"lastModified": "2024-11-11T14:15:14.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sensitive information disclosure during file browsing due to improper soft link handling. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 818."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7601",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-43427",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-11T13:15:03.530",
"lastModified": "2024-11-11T13:15:03.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in moodle. When creating an export of site administration presets, some sensitive secrets and keys are not being excluded from the export, which could result in them unintentionally being leaked if the presets are shared with a third party."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304255",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=461195",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-43429",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-11T13:15:03.880",
"lastModified": "2024-11-11T13:15:03.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in moodle. Some hidden user profile fields are visible in gradebook reports, which could result in users without the \"view hidden user fields\" capability having access to the information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304257",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=461197",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-43430",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-11T13:15:04.053",
"lastModified": "2024-11-11T13:15:04.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in moodle. External API access to Quiz can override contained insufficient access control."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304258",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=461198",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-43432",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-11T13:15:04.233",
"lastModified": "2024-11-11T13:15:04.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304260",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=461200",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-43433",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-11T13:15:04.410",
"lastModified": "2024-11-11T13:15:04.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in moodle. Matrix room membership and power levels are incorrectly applied and revoked for suspended Moodle users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304261",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=461202",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-43435",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-11T13:15:04.580",
"lastModified": "2024-11-11T13:15:04.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in moodle. Insufficient capability checks make it possible for users with access to restore glossaries in courses to restore them into the global site glossary."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304263",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=461205",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-43437",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-11T13:15:04.757",
"lastModified": "2024-11-11T13:15:04.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in moodle. Insufficient sanitizing of data when performing a restore could result in a cross-site scripting (XSS) risk from malicious backup files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304266",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=461207",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -2,36 +2,15 @@
"id": "CVE-2024-50219",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-09T11:15:07.373",
"lastModified": "2024-11-09T11:15:07.373",
"vulnStatus": "Received",
"lastModified": "2024-11-11T14:15:15.210",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/page_alloc: let GFP_ATOMIC order-0 allocs access highatomic reserves\n\nUnder memory pressure it's possible for GFP_ATOMIC order-0 allocations to\nfail even though free pages are available in the highatomic reserves. \nGFP_ATOMIC allocations cannot trigger unreserve_highatomic_pageblock()\nsince it's only run from reclaim.\n\nGiven that such allocations will pass the watermarks in\n__zone_watermark_unusable_free(), it makes sense to fallback to highatomic\nreserves the same way that ALLOC_OOM can.\n\nThis fixes order-0 page allocation failures observed on Cloudflare's fleet\nwhen handling network packets:\n\n kswapd1: page allocation failure: order:0, mode:0x820(GFP_ATOMIC),\n nodemask=(null),cpuset=/,mems_allowed=0-7\n CPU: 10 PID: 696 Comm: kswapd1 Kdump: loaded Tainted: G O 6.6.43-CUSTOM #1\n Hardware name: MACHINE\n Call Trace:\n <IRQ>\n dump_stack_lvl+0x3c/0x50\n warn_alloc+0x13a/0x1c0\n __alloc_pages_slowpath.constprop.0+0xc9d/0xd10\n __alloc_pages+0x327/0x340\n __napi_alloc_skb+0x16d/0x1f0\n bnxt_rx_page_skb+0x96/0x1b0 [bnxt_en]\n bnxt_rx_pkt+0x201/0x15e0 [bnxt_en]\n __bnxt_poll_work+0x156/0x2b0 [bnxt_en]\n bnxt_poll+0xd9/0x1c0 [bnxt_en]\n __napi_poll+0x2b/0x1b0\n bpf_trampoline_6442524138+0x7d/0x1000\n __napi_poll+0x5/0x1b0\n net_rx_action+0x342/0x740\n handle_softirqs+0xcf/0x2b0\n irq_exit_rcu+0x6c/0x90\n sysvec_apic_timer_interrupt+0x72/0x90\n </IRQ>\n\n[mfleming@cloudflare.com: update comment]\n Link: https://lkml.kernel.org/r/20241015125158.3597702-1-matt@readmodwrite.com"
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/189b954469cf82f8b8cf496f8de94b006d2d4746",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/281dd25c1a018261a04d1b8bf41a0674000bfe38",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4c4e238d3adad3c94bb255d0f117d3685bbfdd33",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b958948ae1cb3e39c48e9f805436fd652103c71e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d0fdacfb85a3e1223b894cc6e60091ec91049e9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50263",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-11T14:15:15.473",
"lastModified": "2024-11-11T14:15:15.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfork: only invoke khugepaged, ksm hooks if no error\n\nThere is no reason to invoke these hooks early against an mm that is in an\nincomplete state.\n\nThe change in commit d24062914837 (\"fork: use __mt_dup() to duplicate\nmaple tree in dup_mmap()\") makes this more pertinent as we may be in a\nstate where entries in the maple tree are not yet consistent.\n\nTheir placement early in dup_mmap() only appears to have been meaningful\nfor early error checking, and since functionally it'd require a very small\nallocation to fail (in practice 'too small to fail') that'd only occur in\nthe most dire circumstances, meaning the fork would fail or be OOM'd in\nany case.\n\nSince both khugepaged and KSM tracking are there to provide optimisations\nto memory performance rather than critical functionality, it doesn't\nreally matter all that much if, under such dire memory pressure, we fail\nto register an mm with these.\n\nAs a result, we follow the example of commit d2081b2bf819 (\"mm:\nkhugepaged: make khugepaged_enter() void function\") and make ksm_fork() a\nvoid function also.\n\nWe only expose the mm to these functions once we are done with them and\nonly if no error occurred in the fork operation."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/3b85aa0da8cd01173b9afd1f70080fbb9576c4b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/985da552a98e27096444508ce5d853244019111f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-11T09:00:21.339790+00:00
2024-11-11T15:00:19.382180+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-11T08:15:09.423000+00:00
2024-11-11T14:15:15.473000+00:00
```
### Last Data Feed Release
@ -33,39 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
269004
269017
```
### CVEs added in the last Commit
Recently added CVEs: `19`
Recently added CVEs: `13`
- [CVE-2024-11016](CVE-2024/CVE-2024-110xx/CVE-2024-11016.json) (`2024-11-11T07:15:04.400`)
- [CVE-2024-11017](CVE-2024/CVE-2024-110xx/CVE-2024-11017.json) (`2024-11-11T07:15:04.910`)
- [CVE-2024-11018](CVE-2024/CVE-2024-110xx/CVE-2024-11018.json) (`2024-11-11T07:15:05.210`)
- [CVE-2024-11019](CVE-2024/CVE-2024-110xx/CVE-2024-11019.json) (`2024-11-11T07:15:05.517`)
- [CVE-2024-11020](CVE-2024/CVE-2024-110xx/CVE-2024-11020.json) (`2024-11-11T08:15:03.610`)
- [CVE-2024-11021](CVE-2024/CVE-2024-110xx/CVE-2024-11021.json) (`2024-11-11T08:15:04.987`)
- [CVE-2024-11062](CVE-2024/CVE-2024-110xx/CVE-2024-11062.json) (`2024-11-11T08:15:05.530`)
- [CVE-2024-11063](CVE-2024/CVE-2024-110xx/CVE-2024-11063.json) (`2024-11-11T08:15:06.120`)
- [CVE-2024-11064](CVE-2024/CVE-2024-110xx/CVE-2024-11064.json) (`2024-11-11T08:15:06.653`)
- [CVE-2024-11065](CVE-2024/CVE-2024-110xx/CVE-2024-11065.json) (`2024-11-11T08:15:07.180`)
- [CVE-2024-11066](CVE-2024/CVE-2024-110xx/CVE-2024-11066.json) (`2024-11-11T08:15:07.730`)
- [CVE-2024-11067](CVE-2024/CVE-2024-110xx/CVE-2024-11067.json) (`2024-11-11T08:15:08.263`)
- [CVE-2024-11068](CVE-2024/CVE-2024-110xx/CVE-2024-11068.json) (`2024-11-11T08:15:08.850`)
- [CVE-2024-52350](CVE-2024/CVE-2024-523xx/CVE-2024-52350.json) (`2024-11-11T07:15:06.293`)
- [CVE-2024-52351](CVE-2024/CVE-2024-523xx/CVE-2024-52351.json) (`2024-11-11T07:15:06.583`)
- [CVE-2024-52352](CVE-2024/CVE-2024-523xx/CVE-2024-52352.json) (`2024-11-11T07:15:06.907`)
- [CVE-2024-52353](CVE-2024/CVE-2024-523xx/CVE-2024-52353.json) (`2024-11-11T07:15:07.223`)
- [CVE-2024-52354](CVE-2024/CVE-2024-523xx/CVE-2024-52354.json) (`2024-11-11T07:15:07.500`)
- [CVE-2024-52355](CVE-2024/CVE-2024-523xx/CVE-2024-52355.json) (`2024-11-11T07:15:07.790`)
- [CVE-2024-10314](CVE-2024/CVE-2024-103xx/CVE-2024-10314.json) (`2024-11-11T14:15:14.190`)
- [CVE-2024-10344](CVE-2024/CVE-2024-103xx/CVE-2024-10344.json) (`2024-11-11T14:15:14.453`)
- [CVE-2024-10345](CVE-2024/CVE-2024-103xx/CVE-2024-10345.json) (`2024-11-11T14:15:14.563`)
- [CVE-2024-34014](CVE-2024/CVE-2024-340xx/CVE-2024-34014.json) (`2024-11-11T14:15:14.693`)
- [CVE-2024-34015](CVE-2024/CVE-2024-340xx/CVE-2024-34015.json) (`2024-11-11T14:15:14.993`)
- [CVE-2024-43427](CVE-2024/CVE-2024-434xx/CVE-2024-43427.json) (`2024-11-11T13:15:03.530`)
- [CVE-2024-43429](CVE-2024/CVE-2024-434xx/CVE-2024-43429.json) (`2024-11-11T13:15:03.880`)
- [CVE-2024-43430](CVE-2024/CVE-2024-434xx/CVE-2024-43430.json) (`2024-11-11T13:15:04.053`)
- [CVE-2024-43432](CVE-2024/CVE-2024-434xx/CVE-2024-43432.json) (`2024-11-11T13:15:04.233`)
- [CVE-2024-43433](CVE-2024/CVE-2024-434xx/CVE-2024-43433.json) (`2024-11-11T13:15:04.410`)
- [CVE-2024-43435](CVE-2024/CVE-2024-434xx/CVE-2024-43435.json) (`2024-11-11T13:15:04.580`)
- [CVE-2024-43437](CVE-2024/CVE-2024-434xx/CVE-2024-43437.json) (`2024-11-11T13:15:04.757`)
- [CVE-2024-50263](CVE-2024/CVE-2024-502xx/CVE-2024-50263.json) (`2024-11-11T14:15:15.473`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2024-47295](CVE-2024/CVE-2024-472xx/CVE-2024-47295.json) (`2024-11-11T08:15:09.423`)
- [CVE-2024-50219](CVE-2024/CVE-2024-502xx/CVE-2024-50219.json) (`2024-11-11T14:15:15.210`)
## Download and Usage

View File

@ -242591,6 +242591,7 @@ CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700
CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c653,2024-11-04T13:06:20.190000
CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000
CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000
CVE-2024-10314,1,1,20b0cb09bc8cc2bf5f9ce62e7caccc420ade2ce546f6fd908a532c2d4632d7d4,2024-11-11T14:15:14.190000
CVE-2024-10318,0,0,c9c0b32165e110789e705dc55263c8f26a928f9dce25281896f08d394c1b97f7,2024-11-08T19:51:49.380000
CVE-2024-10319,0,0,521a2584bb331a8cf29df932b8069e068af4d281b03c20cc06073eb127cb6582,2024-11-08T15:25:16.317000
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
@ -242609,6 +242610,8 @@ CVE-2024-10340,0,0,86c71b5cd9d3256a3a96f0206fa643848ca73015f559230bc3985df65e9e3
CVE-2024-10341,0,0,cee111fac6415e06ee00d7cd99c9382c566a15f39228a22e729de830098b01dd,2024-11-05T17:51:44.597000
CVE-2024-10342,0,0,a674c6499a8c6205c44b5186f38cedfb618a6a3a28286164189d9d013947c529,2024-11-05T17:52:00.610000
CVE-2024-10343,0,0,4101b5a530cab96c4e2ed3f7591bd8e9e62c4ce861db441511cf50880ecd2465,2024-10-25T12:56:07.750000
CVE-2024-10344,1,1,6b367377738905d2b651cdfc4a15df75962fa7d5b2cd7e74e65faee55643165f,2024-11-11T14:15:14.453000
CVE-2024-10345,1,1,2ad6c65a7bd3adee3eaccfec951044ecea4e01fbaafc475d9365658bbd35944b,2024-11-11T14:15:14.563000
CVE-2024-10348,0,0,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000
CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000
CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000
@ -242945,13 +242948,13 @@ CVE-2024-10998,0,0,41f387fbf1645aa90b35c52ac0db0cc1b6181351deba62e7b43db2377129b
CVE-2024-10999,0,0,25c169fccdcc9e88a3876005f32d4643213fc0492b1ed51816b7a93f6109fc6e,2024-11-08T19:01:03.880000
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
CVE-2024-11000,0,0,4fb6c84b88e18aeb98d1b738e518210fb6a3e1010153945ab3cfa9fceb300001,2024-11-08T19:01:03.880000
CVE-2024-11016,1,1,7465894c7af1d565ba268d39a530680d544c45a4359be3062d88a668f248bcab,2024-11-11T07:15:04.400000
CVE-2024-11017,1,1,f72b8ad7548754f9615c91bcc8484923ef204ce648a38ba7dd6aae8d9fe23056,2024-11-11T07:15:04.910000
CVE-2024-11018,1,1,84bc06d70da2a8d3d4381a8197c78a4f42f8e160be38709587a0a67216e3d45b,2024-11-11T07:15:05.210000
CVE-2024-11019,1,1,c8352ec68076cde3a9971175007a10a5c740bcc0ac7d448dd20b91cb82e11677,2024-11-11T07:15:05.517000
CVE-2024-11016,0,0,7465894c7af1d565ba268d39a530680d544c45a4359be3062d88a668f248bcab,2024-11-11T07:15:04.400000
CVE-2024-11017,0,0,f72b8ad7548754f9615c91bcc8484923ef204ce648a38ba7dd6aae8d9fe23056,2024-11-11T07:15:04.910000
CVE-2024-11018,0,0,84bc06d70da2a8d3d4381a8197c78a4f42f8e160be38709587a0a67216e3d45b,2024-11-11T07:15:05.210000
CVE-2024-11019,0,0,c8352ec68076cde3a9971175007a10a5c740bcc0ac7d448dd20b91cb82e11677,2024-11-11T07:15:05.517000
CVE-2024-1102,0,0,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685dd,2024-10-16T15:15:15.150000
CVE-2024-11020,1,1,2aac63b0be46a7cb6153ef907562bfe3c4fb09e49ebef49020f205ed3740ecad,2024-11-11T08:15:03.610000
CVE-2024-11021,1,1,4c49697a18afd986b1675870cfbd40b7e00131792b262a9794ecb2d492713f6d,2024-11-11T08:15:04.987000
CVE-2024-11020,0,0,2aac63b0be46a7cb6153ef907562bfe3c4fb09e49ebef49020f205ed3740ecad,2024-11-11T08:15:03.610000
CVE-2024-11021,0,0,4c49697a18afd986b1675870cfbd40b7e00131792b262a9794ecb2d492713f6d,2024-11-11T08:15:04.987000
CVE-2024-11026,0,0,dcff611dc02692ea0927ae09a065a279384099427d4514b9fc6a9bc987d8eec0,2024-11-08T22:15:14.610000
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000
@ -242970,13 +242973,13 @@ CVE-2024-11059,0,0,4701f67edbe381eeaf9aee2ff329a7f7c3dee9bcc39cff6c54d2e0d0b473d
CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000
CVE-2024-11060,0,0,ae6231a406a1fd5610f9cf7c5ceeb4bdd25f4c48ad30275dd841c0c6b22ad009,2024-11-11T01:15:04.233000
CVE-2024-11061,0,0,6fa245e1ab0816939be164d71268563d1e94aa2fe2c1a714e0c865f2942b8e9d,2024-11-11T01:15:04.523000
CVE-2024-11062,1,1,ee4bf6a7e3cf254580c3b6f836f55381060121e386a8c1751e03d7192d5725e8,2024-11-11T08:15:05.530000
CVE-2024-11063,1,1,f85461dd32a663d5852309f964eae66bfb880b75a5900b88dcdb09d2bf7cc216,2024-11-11T08:15:06.120000
CVE-2024-11064,1,1,173044f1af0392f52bfc676843c2ca0597de61039f4d49845c47657bd0ebdc51,2024-11-11T08:15:06.653000
CVE-2024-11065,1,1,6cc19f2e7837a3778332a2818999229deb69d452d2631d06d1542a01b5f14569,2024-11-11T08:15:07.180000
CVE-2024-11066,1,1,4401024f2ee49fc7054bda4de38149a419c2e21669ad66d6d4c7a1a13fbb7b78,2024-11-11T08:15:07.730000
CVE-2024-11067,1,1,9083bf332bd380cf8afdf0b36996857eb44d20d84bddd464e7741201bbf169c5,2024-11-11T08:15:08.263000
CVE-2024-11068,1,1,2870daa3b3e2ca018fa6082f45bf760fc57f2be6e37445170731581a3ce222a4,2024-11-11T08:15:08.850000
CVE-2024-11062,0,0,ee4bf6a7e3cf254580c3b6f836f55381060121e386a8c1751e03d7192d5725e8,2024-11-11T08:15:05.530000
CVE-2024-11063,0,0,f85461dd32a663d5852309f964eae66bfb880b75a5900b88dcdb09d2bf7cc216,2024-11-11T08:15:06.120000
CVE-2024-11064,0,0,173044f1af0392f52bfc676843c2ca0597de61039f4d49845c47657bd0ebdc51,2024-11-11T08:15:06.653000
CVE-2024-11065,0,0,6cc19f2e7837a3778332a2818999229deb69d452d2631d06d1542a01b5f14569,2024-11-11T08:15:07.180000
CVE-2024-11066,0,0,4401024f2ee49fc7054bda4de38149a419c2e21669ad66d6d4c7a1a13fbb7b78,2024-11-11T08:15:07.730000
CVE-2024-11067,0,0,9083bf332bd380cf8afdf0b36996857eb44d20d84bddd464e7741201bbf169c5,2024-11-11T08:15:08.263000
CVE-2024-11068,0,0,2870daa3b3e2ca018fa6082f45bf760fc57f2be6e37445170731581a3ce222a4,2024-11-11T08:15:08.850000
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
@ -254171,6 +254174,8 @@ CVE-2024-34010,0,0,7772431fddbfa4456518c6f3c79bfb5e61dd9e04f9a0c45164641cb3c48c8
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
CVE-2024-34014,1,1,228b12bf0954afaf81d91cbcc152d2076318e9206db7ad072c74687c12910396,2024-11-11T14:15:14.693000
CVE-2024-34015,1,1,9b27ecbd02b158c25cd9ca305f135fcb92845106dbe4761fb9c01e59e8e283fa,2024-11-11T14:15:14.993000
CVE-2024-34016,0,0,0c2a3147a84e04c06db0d6af075b8e16276b7cf9e5f22acd81f74dbeca1a1c49,2024-09-20T12:31:20.110000
CVE-2024-34017,0,0,379da20aff6514952cc55653119ad0cbc16efa57414348c26e21b9e45ed9a8a1,2024-09-12T17:16:09.890000
CVE-2024-34018,0,0,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a22992906144958936b,2024-09-12T17:17:20.873000
@ -260734,10 +260739,17 @@ CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34
CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000
CVE-2024-43425,0,0,938233c36f296352d9985e1fd2ce4b16f2764e2564dfb74da585a571295076c0,2024-11-08T19:01:03.880000
CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300921,2024-11-08T19:01:03.880000
CVE-2024-43427,1,1,581bee939c9e34fe119a8c608c0d866cf5e94ff0a94c54cceddda25eceda6b73,2024-11-11T13:15:03.530000
CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000
CVE-2024-43429,1,1,d3c44340c3bd6ae311e6f014dd25b6ccb57223b7de2b908763ecbeaacac4942f,2024-11-11T13:15:03.880000
CVE-2024-43430,1,1,cb9411ba76a50e8ba09950d9b570a9c5198d9d39254a440a1515f1ef49079492,2024-11-11T13:15:04.053000
CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000
CVE-2024-43432,1,1,e70dfa1ead67b49c5774974a49a0d388fe5aae9064243fff3ff9679c2dc80e67,2024-11-11T13:15:04.233000
CVE-2024-43433,1,1,074b7b449f98213f5e417d5bdf6e5c01493abde20d62136d3d64c93894d45cef,2024-11-11T13:15:04.410000
CVE-2024-43434,0,0,8ffb2c6afb4ed4c9c792f8915838fc9f8b7d930620a4823c5b60db456a6beae1,2024-11-08T19:01:03.880000
CVE-2024-43435,1,1,3d7507433dbdaf669ffe2bd3e815b4ba28fd1460314f079d452f0d8ad41c3607,2024-11-11T13:15:04.580000
CVE-2024-43436,0,0,d5a3a1ab85fb023046251b174592264fb917cdc48f222f2755feafd455c0e61d,2024-11-08T19:01:03.880000
CVE-2024-43437,1,1,b7778e9263c7714a5b663e3d51f77430d9db4e33c3b07a19b5fd3b6dcc35bcd2,2024-11-11T13:15:04.757000
CVE-2024-43438,0,0,875baee488d8f8241783e175bd68620af647e40659767e34acd9ef245d347a44,2024-11-08T19:01:03.880000
CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000
CVE-2024-43440,0,0,3deee55ee11303962828a1a1b49c99d7d9284f6df5f48904a5eb9b6fe3a55147,2024-11-08T19:01:03.880000
@ -262993,7 +263005,7 @@ CVE-2024-47291,0,0,b405a6fecb729547c889865c82ddc892ef58104fc3d0eeff1326133541441
CVE-2024-47292,0,0,50a5f55d1cd7f04a27961f6de324de9237d82ece0981e52bba9e38c14afb7e8b,2024-10-01T14:23:58.267000
CVE-2024-47293,0,0,8066415ca7197eb9a32d1acacaf53d321554e5f9cb22e4a1be994c73edda7213,2024-10-01T14:25:31.430000
CVE-2024-47294,0,0,616aaa0c0c25f743060360eec6e57e8d54e0c598ed571a7197a1a165758173ad,2024-10-01T14:27:54.577000
CVE-2024-47295,0,1,bcb8f9b2d38f79d43b5ba2ae907ffeb5190dfdfa52d0686289d9d07df91da0a8,2024-11-11T08:15:09.423000
CVE-2024-47295,0,0,bcb8f9b2d38f79d43b5ba2ae907ffeb5190dfdfa52d0686289d9d07df91da0a8,2024-11-11T08:15:09.423000
CVE-2024-47297,0,0,15d553d29468050e1f2a6334078655d58f66ba424ad7f6feb79e743b75124a29,2024-10-07T17:47:48.410000
CVE-2024-47298,0,0,5e0bf18d2c868a02c3648bb82b90ba712a7f3ace13e60223733e9f9b2a10b740,2024-10-07T17:47:48.410000
CVE-2024-47299,0,0,69ddc217eb16e2f207164d9621a98f8efcecc43a8fd19b4abba37eee03e8ebfa,2024-10-07T17:47:48.410000
@ -264605,7 +264617,7 @@ CVE-2024-50215,0,0,51deedf9e51b9010196feb8434c74c41c571fa0dfa190b3bcc95c654d401a
CVE-2024-50216,0,0,dd18627c652b541fcc71e8055f8b9b54a97ee1c452f87671395ddb6c7c0effe5,2024-11-09T11:15:06.987000
CVE-2024-50217,0,0,f1f9a2585721ca44599dff7237e3c4e7abb72e154ac4bfb5a6e8176e15581aa4,2024-11-09T11:15:07.103000
CVE-2024-50218,0,0,a1e0ddbb039c77513f3d3ef127e35268d6a74599810a96ae07cfefd1c53ddc78,2024-11-09T11:15:07.213000
CVE-2024-50219,0,0,06813312321501feccb3f75265b5fab72869e03153e4e88d16e6d98c0d01b70a,2024-11-09T11:15:07.373000
CVE-2024-50219,0,1,57ca6b6c0667d0c6ff47560f6866cfa36318c7798583ecd36bd30e6bd0856676,2024-11-11T14:15:15.210000
CVE-2024-5022,0,0,b83f09821687b900e7e3c962c3fdf76320d3bf46277a4004f5c59e7ba07e152d,2024-10-28T21:35:22.210000
CVE-2024-50220,0,0,3378fdb1fc18a5a841a545e889b5ac91573032b494633fa4e5ccfb9c04f87e68,2024-11-09T11:15:07.487000
CVE-2024-50221,0,0,6b968bc1e5c76dac654c3003b7e391fdfa86fc18c244cdd09f5cb172c0577127,2024-11-09T11:15:07.600000
@ -264653,6 +264665,7 @@ CVE-2024-50259,0,0,9505f119d634507830457a8481da367105cd2d69e5a787778823d77383895
CVE-2024-50260,0,0,fc4cef5cf9d349d410ca1c97d5743d6a1870d568c5b285bfc5df24088371adb6,2024-11-09T11:15:11.550000
CVE-2024-50261,0,0,c7b0c5cb53afcfabb0ce1805397f6b93d637df35741bb2601e07e11bb4679803,2024-11-09T11:15:11.610000
CVE-2024-50262,0,0,3571cc23e83cb0fd0612ed425e1b46385cde83393258e2fe4bbbc81ff1ef3dba,2024-11-09T11:15:11.687000
CVE-2024-50263,1,1,748014e2b774d64f4e051bec86180e6c3664073e1b19a8534d7635fa9f3b703c,2024-11-11T14:15:15.473000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
@ -265350,12 +265363,12 @@ CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3b
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000
CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000
CVE-2024-52350,1,1,b1a9847e39d8b6bad9956bc978664b7f1d9f26efb721ee2fd1d29ca9f456224a,2024-11-11T07:15:06.293000
CVE-2024-52351,1,1,8b7440e51d76b6a6e3db8edd41d646f56472df2df316cfa7f263581553106079,2024-11-11T07:15:06.583000
CVE-2024-52352,1,1,ae11f439ee59fd361beed6fb8c37d042ed2bb07923f0c7f9a97ed227d2d09410,2024-11-11T07:15:06.907000
CVE-2024-52353,1,1,35c8faefb66ea97c9758ead937372e7b7fda8bc858c187127c3214512e995223,2024-11-11T07:15:07.223000
CVE-2024-52354,1,1,f36017b491bdb9f444c8cb8c774543c454bc279243e6ecbf6d57f052d88d708c,2024-11-11T07:15:07.500000
CVE-2024-52355,1,1,1ead65e1d79b86e687339a1717ce8829747806135620cfe7850e9da57c237f01,2024-11-11T07:15:07.790000
CVE-2024-52350,0,0,b1a9847e39d8b6bad9956bc978664b7f1d9f26efb721ee2fd1d29ca9f456224a,2024-11-11T07:15:06.293000
CVE-2024-52351,0,0,8b7440e51d76b6a6e3db8edd41d646f56472df2df316cfa7f263581553106079,2024-11-11T07:15:06.583000
CVE-2024-52352,0,0,ae11f439ee59fd361beed6fb8c37d042ed2bb07923f0c7f9a97ed227d2d09410,2024-11-11T07:15:06.907000
CVE-2024-52353,0,0,35c8faefb66ea97c9758ead937372e7b7fda8bc858c187127c3214512e995223,2024-11-11T07:15:07.223000
CVE-2024-52354,0,0,f36017b491bdb9f444c8cb8c774543c454bc279243e6ecbf6d57f052d88d708c,2024-11-11T07:15:07.500000
CVE-2024-52355,0,0,1ead65e1d79b86e687339a1717ce8829747806135620cfe7850e9da57c237f01,2024-11-11T07:15:07.790000
CVE-2024-52356,0,0,0553acbf2e8e39a312cff7320beec0b9bcbfe62f41a3f3b85802b78b1abedebd,2024-11-11T06:15:10.153000
CVE-2024-52357,0,0,e8fdb161598d26c1fc31a1b648593dd8160fca2dcc96e2a7336c53a573f39fc4,2024-11-11T06:15:10.440000
CVE-2024-52358,0,0,4e891ee49c0a084a921d2e6a3c04a1bbfa51eca5c1025b9c9f9183cd5dd21da2,2024-11-11T06:15:10.737000

Can't render this file because it is too large.