mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-10-31T15:00:33.966268+00:00
This commit is contained in:
parent
db4768ea8b
commit
1429e7eed5
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46746",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2024-08-13T17:15:17.787",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"lastModified": "2024-10-31T14:35:00.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-47089",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-04T18:15:07.560",
|
||||
"lastModified": "2024-03-05T13:41:01.900",
|
||||
"lastModified": "2024-10-31T14:35:02.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kfence: repara la p\u00e9rdida de memoria cuando los objetos cat kfence Hulk robot inform\u00f3 un problema kmemleak: objeto sin referencia 0xffff93d1d8cc02e8 (tama\u00f1o 248): comm \"cat\", pid 23327, jiffies 4624670141 (edad 495992.217s ) volcado hexadecimal (primeros 32 bytes): 00 40 85 19 d4 93 ff ff 00 10 00 00 00 00 00 00 .@.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................. rastreo inverso: seq_open+0x2a/0x80 full_proxy_open+0x167/0x1e0 do_dentry_open+0x1e1/0x3a0 path_openat+0x961/0xa20 do_filp_open+0xae/0x120 do_sys_openat2+0x216/0x2f0 do_sys_open+0x57/0x80 do_syscall_64+0x33/0x40 Entry_SYSCALL_64_after_hwframe+0x44/0xa9 objeto sin referencia 0xffff93d419854000 (tama\u00f1o 4096): comm \"cat\", pid 23327, Jiffies 4624670141 (edad 495992,217 s) volcado hexadecimal (primeros 32 bytes) : 6b 66 65 6e 63 65 2d 23 32 35 30 3a 20 30 78 30 kfence-#250: 0x0 30 30 30 30 30 30 30 37 35 34 62 64 61 31 32 2d 0000000754bda1 2- rastreo inverso: seq_read_iter+0x313/0x440 seq_read+ 0x14b/0x1a0 full_proxy_read+0x56/0x80 vfs_read+0xa5/0x1b0 ksys_read+0xa0/0xf0 do_syscall_64+0x33/0x40 Entry_SYSCALL_64_after_hwframe+0x44/0xa9 Creo que podemos reproducir f\u00e1cilmente este problema con los siguientes comandos: cat /sys/kernel/ depurar/ kfence/objects echo scan > /sys/kernel/debug/kmemleak cat /sys/kernel/debug/kmemleak La memoria filtrada se asigna en la pila siguiente: do_syscall_64 do_sys_open do_dentry_open full_proxy_open seq_open ---> alloc seq_file vfs_read full_proxy_read seq_read seq_read_iter traverse - --> alloc seq_buf Y deber\u00eda haberse liberado en el siguiente proceso: do_syscall_64 syscall_exit_to_user_mode exit_to_user_mode_prepare task_work_run ____fput __fput full_proxy_release ---> free aqu\u00ed Sin embargo, la funci\u00f3n de liberaci\u00f3n correspondiente a file_operatives no est\u00e1 implementada en kfence. Como resultado, se produce una p\u00e9rdida de memoria. Por tanto, la soluci\u00f3n a este problema es implementar la funci\u00f3n de liberaci\u00f3n correspondiente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0129ab1f268b6cf88825eae819b9b84aa0a85634",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47594",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:53.983",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:25:38.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: nunca permitir que el PM cierre un subflujo de escucha Actualmente, al eliminar un endpoint, el PM de netlink atraviesa todos los sockets MPTCP locales, independientemente de su estado. Si un socket de escucha MPTCP est\u00e1 vinculado a la IP que coincide con el endpoint de eliminaci\u00f3n, el socket TCP de escucha se cerrar\u00e1. Esto es inesperado, el PM solo deber\u00eda afectar los subflujos de datos. Adem\u00e1s, syzbot pudo activar una desreferencia de ptr NULL debido a lo anterior: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref en el rango [0x0000000000000018-0x0000000000000001f] CPU: 1 PID: 6550 Comm: syz-executor122 No contaminado 5.16.0-rc4-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__lock_acquire+0xd7d/0x54a0 kernel/locking/lockdep.c:4897 C\u00f3digo: 0f 0e 41 be 01 00 00 00 0f 86 c8 00 00 00 89 05 69 cc 0f 0e e9 bd 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 f3 2f 00 00 48 81 3b 20 75 17 8f 0f 84 52 f3 ff RSP: 0018:ffffc90001f2f818 EFLAGS: 00010016 RAX: 00 RBX: 0000000000000018 RCX: 0000000000000000 RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 R10: 0000000000000000 R11: 000000000000000 a R12: 0000000000000000 R13: ffff88801b98d700 R14: 0000000000000000 R15: 0000000000000001 FS: 00007f177cd3d700(0000) GS:ffff8880b9d00000 (0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f177cd1b268 CR3: 000000001dd55000 CR4: 0000000000350ee0 Seguimiento de llamadas: lock_acquire kernel/locking/lockdep.c:5637 [en l\u00ednea] +0x1ab/0x510 kernel/locking/lockdep.c:5602 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [en l\u00ednea] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 Finish_wait+0xc0/0x270 kernel/sched/wait.c:400 inet_csk_wait_for_connect net/ipv4/inet_connection_sock.c:464 [en l\u00ednea] inet_csk_accept+0x7de/0x9d0 net/ipv4/inet_connection_sock.c:497 mptcp_accept+0xe5/0x500 net/mptcp/protocol.c:2865 inet_accept+0xe4/0x7b0 net/ipv4/af_inet.c:739 e7/0x10e0 net/mptcp/protocol.c:3345 do_accept+0x382/0x510 net/socket.c:1773 __sys_accept4_file+0x7e/0xe0 net/socket.c:1816 __sys_accept4+0xb0/0x100 net/socket.c:1846 __do_sys_accept net/socket. c:1864 [en l\u00ednea] __se_sys_accept net/socket.c:1861 [en l\u00ednea] __x64_sys_accept+0x71/0xb0 net/socket.c:1861 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x35/0xb0 arch /x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f177cd8b8e9 C\u00f3digo: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f177cd3d308 EFLAGS: 00000246 ORIG_RAX: 000000000000002b RAX : ffffffffffffffda RBX: 00007f177ce13408 RCX: 00007f177cd8b8e9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f177 ce13400 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f177ce1340c R13: cde1004 R14: 6d705f706374706d R15: 0000000000022000 Arreglar el problema al omitir expl\u00edcitamente el socket MPTCP en el estado TCP_LISTEN."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.13",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "D42075C1-1BC2-41C8-B06D-3A7E0EDABE84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1456a0004cc54c58adb2501cb0c95dc8b3c83e9e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b0cdc5dbcf2ba0d99785da5aabf1b17943805b8a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47595",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:54.097",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:27:04.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/sched: sch_ets: no elimine las clases inactivas de la lista de turnos Shuang inform\u00f3 que el siguiente script: 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bandas 8 estricto 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 2) mausezahn ddd0 -A 10.10.10.1 -B 10.10.10.2 -c 0 -a propio -b 00:c1:a0: c1:a0:00 -t udp & 3) tc qdisc change dev ddd0 handle 10: ets bands 4 estricto 2 cuantos 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 falla sistem\u00e1ticamente cuando la l\u00ednea 2) se comenta: corrupci\u00f3n list_del, ffff8e028404bd30->el siguiente es LIST_POISON1 (dead000000000100) ------------[ cortar aqu\u00ed ]------------ ERROR del kernel en lib/list_debug. c:47! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 954 Comunicaciones: tc Not tainted 5.16.0-rc4+ #478 Nombre de hardware: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066 +0f1aadab 01/04/2014 RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47 C\u00f3digo: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 4 8 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff <0f> 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe RSP: 0018:ffffae46807a3888 EFLAGS: 246 RAX: 000000000000004eRBX : 0000000000000007 RCX: 0000000000000202 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff RBP: ffffae46807a3a10 R08: 00000000000 00000 R09: c0000000ffff7fff R10: 00000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800 R13: ffff8e028404bd30 R14: dead000000000100 R15: e02fafa2400 FS: 00007efdc92e4480(0000) GS:ffff8e02fb600000 (0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 000000000035 0ef0 Seguimiento de llamadas: ets_qdisc_change+0x58b/0xa70 [sch_ets] tc_modify_qdisc+0x323/0x880 rtnetlink_rcv_msg+0x169/ 0x4a0 netlink_rcv_skb+0x50/0x100 netlink_unicast+0x1a5/0x280 netlink_sendmsg+0x257/0x4d0 sock_sendmsg+0x5b/0x60 ____sys_sendmsg+0x1f2/0x260 ___sys_sendmsg+0x7c/0xc0 __sys_sendmsg+0x57/0xa0 do_syscall_64+0x3a/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033: 0x7efdc8031338 C\u00f3digo: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55 RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: de RBX: 0000000061b37a97 RCX: 00007efdc8031338 RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940 R10: 000000000000000c R11: 00000000000000246 R12: 0000000000000001 R 13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000 M\u00f3dulos vinculados en: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common pcs pkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [\u00faltima descarga: sch_ets] ---[ fin de seguimiento f35878d191 2655c2 ]--- RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47 C\u00f3digo: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff <0f> 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe RSP: 0018:ffffae46807a3888 EFLAGS: 00010246 RAX: 000000000000004e RBX: 0000000000000007 RCX 000 0000000000202 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff R10: 0000000000000001 R11: FFFFFAE46807A36A8 R12: FFFFF8E028404B800 R13: FFFF8E028404BD30 R14: Dead000000000100 R15: FFFFF8E02FAFA2400 FUT: GS: FFFF8E02FB600000 (0000) KNLGS: 000000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000 - --truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.83",
|
||||
"versionEndExcluding": "5.10.88",
|
||||
"matchCriteriaId": "8CE254F6-35BF-434F-B6CA-BDFCD944AAA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.6",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "1A3B9E2F-A621-4129-9702-D8D427A1E747"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/491c1253441e2fdc8f6a6f4976e3f13440419b7a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81fbdd45652d8605a029e78ef14a6aaa529c4e72",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c062f2a0b04d86c5b8c9d973bea43493eaca3d32",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47599",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:54.483",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:36:53.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: utilice Latest_dev en btrfs_show_devname El caso de prueba btrfs/238 informa la siguiente advertencia: ADVERTENCIA: CPU: 3 PID: 481 en fs/btrfs/super.c:2509 btrfs_show_devname+0x104 /0x1e8 [btrfs] CPU: 2 PID: 1 Comunicaci\u00f3n: systemd Contaminado: GWO 5.14.0-rc1-custom #72 Nombre de hardware: QEMU M\u00e1quina virtual QEMU, BIOS 0.0.0 06/02/2015 Rastreo de llamadas: btrfs_show_devname+0x108/ 0x1b4 [btrfs] show_mountinfo+0x234/0x2c4 m_show+0x28/0x34 seq_read_iter+0x12c/0x3c4 vfs_read+0x29c/0x2c8 ksys_read+0x80/0xec __arm64_sys_read+0x28/0x34 x50/0xf8 do_el0_svc+0x88/0x138 el0_svc+0x2c/0x8c el0t_64_sync_handler +0x84/0xe4 el0t_64_sync+0x198/0x19c Motivo: mientras btrfs_prepare_sprout() mueve fs_devices::devices a fs_devices::seed_list, btrfs_show_devname() busca los dispositivos y no encuentra ninguno, lo que genera la advertencia como se muestra arriba. Soluci\u00f3n: last_dev se actualiza seg\u00fan los cambios en la lista de dispositivos. Eso significa que podr\u00edamos usar el \u00faltimo_dev->name para mostrar el nombre del dispositivo en /proc/self/mounts, el puntero siempre ser\u00e1 v\u00e1lido tal como est\u00e1 asignado antes de que el dispositivo se elimine de la lista en eliminar o reemplazar. La protecci\u00f3n de la RCU es suficiente, ya que la estructura del dispositivo se libera despu\u00e9s de la sincronizaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "B271E1AF-BC45-4C3E-9614-055846520592"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6605fd2f394bba0a0059df2b6cfc87b0b6d393a2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e342c2558016ead462f376b6c6c2ac5efc17f3b1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47602",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:54.760",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:41:15.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,142 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mac80211: rastrea solo frameworks de datos QoS para control de admisi\u00f3n. Para el control de admisi\u00f3n, obviamente todo eso solo funciona para frameworks de datos QoS; de lo contrario, ni siquiera podemos acceder al campo QoS en el encabezado. Syzbot inform\u00f3 (ver m\u00e1s abajo) un valor no inicializado aqu\u00ed debido al estado de un paquete nullfunc sin QoS, que ni siquiera es lo suficientemente largo para contener el encabezado de QoS. Solucione este problema para hacer algo \u00fanicamente con los paquetes de datos QoS."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.19",
|
||||
"versionEndExcluding": "4.19.222",
|
||||
"matchCriteriaId": "B0BC14FA-8634-4F5B-B7C6-F55C27A50523"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.168",
|
||||
"matchCriteriaId": "195EBAA1-4CCE-4898-9351-F4A0DBCAA022"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.88",
|
||||
"matchCriteriaId": "A657B2D0-5B9D-42BE-A3BF-228DBC1B057C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/42d08e97b196479f593499e887a9ab81446a34b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46b9e29db2012a4d2a40a26101862e002ccf387b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69f054d6642c8f6173724ce17e7ee3ff66b8f682",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d5e568c3a4ec2ddd23e7dc5ad5b0c64e4f22981a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eed897a22230e3231a740eddd7d6d95ba476625f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47603",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:54.863",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:46:39.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,163 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: auditor\u00eda: mejora la solidez del manejo de la cola de auditor\u00eda. Si el daemon de auditor\u00eda alguna vez se atascara en un estado detenido, kauditd_thread() del kernel podr\u00eda bloquearse al intentar enviar registros de auditor\u00eda al espacio de usuario. daemon de auditor\u00eda. Con el subproceso del n\u00facleo bloqueado, es posible que la cola de auditor\u00eda crezca sin l\u00edmites, ya que ciertos eventos que generan registros de auditor\u00eda deben estar exentos de los l\u00edmites de la cola, de lo contrario, el sistema entrar\u00e1 en un estado de bloqueo. Este parche resuelve este problema reduciendo el tiempo de espera de env\u00edo del socket del subproceso del n\u00facleo de MAX_SCHEDULE_TIMEOUT a HZ/10 y modifica la funci\u00f3n kauditd_send_queue() para gestionar mejor las distintas colas de auditor\u00eda cuando se producen problemas de conexi\u00f3n entre el n\u00facleo y el daemon de auditor\u00eda. Con este parche, el trabajo pendiente puede crecer temporalmente m\u00e1s all\u00e1 de los l\u00edmites definidos cuando se detiene el daemon de auditor\u00eda y el sistema est\u00e1 bajo una fuerte presi\u00f3n de auditor\u00eda, pero kauditd_thread() continuar\u00e1 progresando y drenando las colas como lo har\u00eda con otros problemas de conexi\u00f3n. Por ejemplo, con el daemon de auditor\u00eda en estado detenido y el sistema configurado para auditar cada llamada al sistema, a\u00fan era posible apagar el sistema sin p\u00e1nico en el kernel, interbloqueo, etc.; Por supuesto, el sistema tard\u00f3 en cerrarse, pero eso es de esperarse dada la presi\u00f3n extrema de registrar cada llamada al sistema. El valor de tiempo de espera de HZ/10 se eligi\u00f3 principalmente a trav\u00e9s de la experimentaci\u00f3n y el \"instinto\" de este desarrollador. Probablemente no exista un valor perfecto, pero como este escenario tiene un alcance limitado (se necesitar\u00edan privilegios de root para enviar SIGSTOP al daemon de auditor\u00eda), probablemente no valga la pena exponerlo como un ajuste ajustable en este momento. Esto siempre se puede hacer en una fecha posterior si resulta necesario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10.7",
|
||||
"versionEndExcluding": "4.11",
|
||||
"matchCriteriaId": "002AFF57-621F-4DFC-BA33-323006B9E2CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.11",
|
||||
"versionEndExcluding": "4.14.259",
|
||||
"matchCriteriaId": "F52B82B4-2759-4BAE-914F-9BCD47B64147"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.222",
|
||||
"matchCriteriaId": "2D0D89BC-6CF8-4BFB-8C91-472348052528"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.168",
|
||||
"matchCriteriaId": "195EBAA1-4CCE-4898-9351-F4A0DBCAA022"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.88",
|
||||
"matchCriteriaId": "A657B2D0-5B9D-42BE-A3BF-228DBC1B057C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d3277eabd542fb662be23696e5ec9f390d688e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4cc6badff97f74d0fce65f9784b5df3b64e4250b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/75fdb751f84727d614deea0571a1490c3225d83a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8389f50ceb854cb437fefb9330d5024ed3c7c1f5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5f4d17daf2e6cd7c1d9676b476147f6b4ac53f2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f4b3ee3c85551d2d343a3ba159304066523f730f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47605",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:55.067",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:50:27.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: vduse: corrige corrupci\u00f3n de memoria en vduse_dev_ioctl() El \"config.offset\" proviene del usuario. Es necesario realizar un control para evitar que est\u00e9 fuera de los l\u00edmites. Las variables \"config.offset\" y \"dev->config_size\" son ambas del tipo u32. Entonces, si el desplazamiento est\u00e1 fuera de los l\u00edmites, entonces la resta \"dev->config_size - config.offset\" da como resultado un valor u32 muy alto. El desplazamiento fuera de los l\u00edmites puede provocar da\u00f1os en la memoria."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "7A70FD7B-2EDC-4C3B-ADE0-880AA759CDD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e6c67560b4341914bec32ec536e931c22062af65",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff9f9c6e74848170fcb45c8403c80d661484c8c9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47606",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:55.153",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:58:05.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,173 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: netlink: af_netlink: Evite el skb vac\u00edo agregando una marca en len. Agregar una verificaci\u00f3n en el par\u00e1metro len para evitar skb vac\u00edo. Esto evita un error de divisi\u00f3n en la funci\u00f3n netem_enqueue que se produce cuando skb->len=0 y skb->data_len=0 en el paso de corrupci\u00f3n aleatoria como se muestra a continuaci\u00f3n. skb->datos[prandom_u32() % skb_headlen(skb)] ^= 1<<(prandom_u32() % 8); Informe de fallo: [343.170349] netdevsim netdevsim0 netdevsim3: establecer [1, 0] tipo 2 familia 0 puerto 6081 - 0 [343.216110] netem: versi\u00f3n 1.3 [343.235841] error de divisi\u00f3n: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 80] CPU : 3 PID: 4288 Comm: reproductor No contaminado 5.16.0-rc1+ [ 343.237569] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 01/04/2014 [ 343.238707] RIP: 0010:netem_enqueue+0x1590/0x33c0 [sch_netem] [ 343.239499] C\u00f3digo: 89 85 58 ff ff ff e8 5f 5d e9 d3 48 8b b5 48 ff ff ff 8b 8d 50 ff ff 8b 85 58 ff ff 4 8 8b bd 70 y sigs. ff ff 31 d2 2b 4f 74 f1 48 b8 00 00 00 00 00 fc ff df 49 01 d5 4c 89 e9 48 c1 e9 03 [ 343.241883] RSP: 0018:ffff88800bcd7368 EFLAGS: 46 [343.242589] RAX: 00000000ba7c0a9c RBX: 0000000000000001 RCX: 0000000000000000 [ 343.243542] RDX: 0000000000000000 RSI: ffff88800f8edb10 RDI: ffff88800f8eda40 [ 343.244474] RBP: ff88800bcd7458 R08: 0000000000000000 R09: ffffffff94fb8445 [ 343.245403] R10: ffffffff94fb8336 R11: ffffffff94fb8445 R12: 0000000000000000 [ 343. 246355] R13: ffff88800a5a7000 R14: ffff88800a5b5800 R15 : 0000000000000020 [ 343.247291] FS: 00007fdde2bd7700(0000) GS:ffff888109780000(0000) knlGS:0000000000000000 [ 343.248350] CS: 0010 DS: 000 ES: 0000 CR0: 0000000080050033 [ 343.249120] CR2: 00000000200000c0 CR3: 000000000ef4c000 CR4: 00000000000006e0 [ 343.250076] Seguimiento de llamadas: [ 343.250423] [ 343.250713] ? memcpy+0x4d/0x60 [343.251162]? netem_init+0xa0/0xa0 [sch_netem] [ 343.251795] ? __sanitizer_cov_trace_pc+0x21/0x60 [ 343.252443] netem_enqueue+0xe28/0x33c0 [sch_netem] [ 343.253102] ? stack_trace_save+0x87/0xb0 [343.253655]? filter_irq_stacks+0xb0/0xb0 [343.254220]? netem_init+0xa0/0xa0 [sch_netem] [ 343.254837] ? __kasan_check_write+0x14/0x20 [343.255418]? _raw_spin_lock+0x88/0xd6 [ 343.255953] dev_qdisc_enqueue+0x50/0x180 [ 343.256508] __dev_queue_xmit+0x1a7e/0x3090 [ 343.257083] ? netdev_core_pick_tx+0x300/0x300 [343.257690]? check_kcov_mode+0x10/0x40 [343.258219]? _raw_spin_unlock_irqrestore+0x29/0x40 [343.258899]? __kasan_init_slab_obj+0x24/0x30 [343.259529] ? setup_object.isra.71+0x23/0x90 [343.260121]? nueva_losa+0x26e/0x4b0 [ 343.260609] ? kasan_poison+0x3a/0x50 [ 343.261118] ? kasan_unpoison+0x28/0x50 [343.261637]? __kasan_slab_alloc+0x71/0x90 [343.262214]? memcpy+0x4d/0x60 [343.262674]? write_comp_data+0x2f/0x90 [343.263209]? __kasan_check_write+0x14/0x20 [343.263802]? __skb_clone+0x5d6/0x840 [343.264329]? __sanitizer_cov_trace_pc+0x21/0x60 [ 343.264958] dev_queue_xmit+0x1c/0x20 [ 343.265470] netlink_deliver_tap+0x652/0x9c0 [ 343.266067] netlink_unicast+0x5a0/0x7f0 [ 343. 266608] ? netlink_attachskb+0x860/0x860 [343.267183]? __sanitizer_cov_trace_pc+0x21/0x60 [ 343.267820] ? write_comp_data+0x2f/0x90 [343.268367] netlink_sendmsg+0x922/0xe80 [343.268899]? netlink_unicast+0x7f0/0x7f0 [343.269472]? __sanitizer_cov_trace_pc+0x21/0x60 [343.270099] ? write_comp_data+0x2f/0x90 [343.270644]? netlink_unicast+0x7f0/0x7f0 [343.271210] sock_sendmsg+0x155/0x190 [343.271721] ____sys_sendmsg+0x75f/0x8f0 [343.272262] ? kernel_sendmsg+0x60/0x60 [343.272788]? write_comp_data+0x2f/0x90 [343.273332]? write_comp_data+0x2f/0x90 [ 343.273869] ___sys_sendmsg+0x10f/0x190 [ 343.274405] ? sendmsg_copy_msghdr+0x80/0x80 [343.274984]? slab_post_alloc_hook+0x70/0x230 [343.275597]? futex_wait_setup+0x240/0x240 [343.276175]? security_file_alloc+0x3e/0x170 [343.276779]? write_comp_d ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.4.296",
|
||||
"matchCriteriaId": "1FF3BCF2-4788-45E7-BDAC-845DEBF8922F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.294",
|
||||
"matchCriteriaId": "BEC14782-2EE3-4635-A927-91559E4F451C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.259",
|
||||
"matchCriteriaId": "390D64FF-1DB7-4DD1-ADEF-CE96BEA2607C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.222",
|
||||
"matchCriteriaId": "2D0D89BC-6CF8-4BFB-8C91-472348052528"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.167",
|
||||
"matchCriteriaId": "942818CD-79A1-41C4-8695-4C9BA6D2A2DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.87",
|
||||
"matchCriteriaId": "CFD35461-7F6C-4537-840D-5ED5BAB2D315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.10",
|
||||
"matchCriteriaId": "D4F036E6-108C-4D1F-A4E0-234DC09AA0E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/40cf2e058832d9cfaae98dfd77334926275598b6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4c986072a8c9249b9398c7a18f216dc26a9f0e35",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/54e785f7d5c197bc06dbb8053700df7e2a093ced",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c0315e93552e0d840e9edc6abd71c7db82ec8f51",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c54a60c8fbaa774f828e26df79f66229a8a0e010",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dadce61247c6230489527cc5e343b6002d1114c5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f123cffdd8fe8ea6c7fded4b88516a42798797d0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff3f517bf7138e01a17369042908a3f345c0ee41",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47607",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:55.263",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:07:03.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: corrige la fuga de direcci\u00f3n del kernel en el registro auxiliar r0 de atomic cmpxchg. La implementaci\u00f3n de BPF_CMPXCHG en un nivel alto tiene los siguientes par\u00e1metros: .-[old-val] .-[new-val ] BPF_R0 = cmpxchg{32,64}(DST_REG + insn->off, BPF_R0, SRC_REG) `-[mem-loc] `-[old-val] Dado un BPF insn solo puede tener dos registros (dst, src), el R0 es fijo y se utiliza como registro auxiliar para la entrada (valor anterior), as\u00ed como para la salida (devolver el valor anterior desde la ubicaci\u00f3n de la memoria). Si bien el verificador realiza una serie de comprobaciones de seguridad, no rechaza los programas sin privilegios donde R0 contiene un puntero como valor antiguo. A trav\u00e9s de la fuerza bruta, en mi m\u00e1quina se necesitan aproximadamente 16 segundos para filtrar un puntero del kernel con BPF_CMPXCHG. B\u00e1sicamente, PoC busca direcciones del kernel almacenando la direcci\u00f3n adivinada en la ranura del mapa como un escalar y usando el puntero del valor del mapa como R0, mientras que SRC_REG tiene un valor canario para detectar una direcci\u00f3n coincidente. Solucionelo comprobando R0 en busca de punteros y rech\u00e1celo si ese es el caso de los programas sin privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "9E292CA0-C53B-4C70-B5CE-94AC1BC7673F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a82fe085f344ef20b452cd5f481010ff96b5c4cd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f87a6c160ecc8c7b417d25f508d3f076fe346136",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47608",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-19T15:15:55.360",
|
||||
"lastModified": "2024-06-20T12:43:25.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:16:04.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: corrige la fuga de la direcci\u00f3n del kernel en la recuperaci\u00f3n at\u00f3mica. El cambio en el commit 37086bfdc737 (\"bpf: propaga los l\u00edmites de la pila a los registros en at\u00f3micos con BPF_FETCH\") alrededor del manejo de check_mem_access() tiene errores ya que esto permitir\u00eda a usuarios sin privilegios filtrar punteros del kernel. Por ejemplo, una recuperaci\u00f3n at\u00f3mica/y con -1 en un destino de pila que contiene un puntero derramado migrar\u00e1 el tipo de registro derramado a un escalar, que luego se puede exportar fuera del programa (ya que escalar! = puntero) volc\u00e1ndolo en un valor de mapa. La implementaci\u00f3n original de XADD evitaba esta situaci\u00f3n mediante el uso de una llamada doble a check_mem_access(), una con BPF_READ y otra posterior con BPF_WRITE, en ambos casos pasando -1 como valor de marcador de posici\u00f3n en lugar de registrarse seg\u00fan la sem\u00e1ntica de XADD, ya que no lo hac\u00eda contener una recuperaci\u00f3n de valor. BPF_READ tambi\u00e9n incluy\u00f3 una verificaci\u00f3n en check_stack_read_fixed_off() que rechaza el programa si la ranura de la pila es de __is_pointer_value() si dst_regno < 0. Esto \u00faltimo es para distinguir si estamos tratando con un derrame/llenado de pila regular o alguna operaci\u00f3n aritm\u00e9tica que no est\u00e1 permitido en valores no escalares, consulte tambi\u00e9n 6e7e63cbb023 (\"bpf: Prohibir XADD en punteros dispersos para usuarios sin privilegios\") para obtener m\u00e1s contexto sobre check_mem_access() y su manejo del valor del marcador de posici\u00f3n -1. Una opci\u00f3n m\u00ednimamente intrusiva para solucionar la fuga es que el caso BPF_FETCH verifique inicialmente el caso BPF_READ mediante check_mem_access() con -1 como registro, seguido del caso de carga real con load_reg no negativo para propagar los l\u00edmites de la pila a los registros."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12",
|
||||
"versionEndExcluding": "5.15.11",
|
||||
"matchCriteriaId": "9E292CA0-C53B-4C70-B5CE-94AC1BC7673F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/423628125a484538111c2c6d9bb1588eb086053b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7d3baf0afa3aa9102d6a521a8e4c41888bb79882",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48999",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:11.630",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:44:10.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,117 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: Controlar el intento de eliminar una ruta multipath cuando fib_info contiene una referencia nh Gwangun Jung inform\u00f3 un acceso fuera de los l\u00edmites en fib_nh_match: fib_nh_match+0xf98/0x1130 linux-6.0-rc7/net/ipv4/fib_semantics.c:961 fib_table_delete+0x5f3/0xa40 linux-6.0-rc7/net/ipv4/fib_trie.c:1753 inet_rtm_delroute+0x2b3/0x380 linux-6.0-rc7/net/ipv4/fib_frontend.c:874 Los objetos de siguiente salto separados son mutuamente excluyentes con la especificaci\u00f3n multipath heredada. Arreglar fib_nh_match para que regrese si la configuraci\u00f3n de la ruta que se va a eliminar contiene una especificaci\u00f3n de rutas m\u00faltiples mientras fib_info usa un objeto nexthop."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3",
|
||||
"versionEndExcluding": "5.4.226",
|
||||
"matchCriteriaId": "AC1AB8B7-B0BF-4B35-ACB8-88D567D14FEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.158",
|
||||
"matchCriteriaId": "D0FB1AF1-0A0B-4419-B25F-C61F17380E18"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.82",
|
||||
"matchCriteriaId": "0DC20DB6-73C1-4465-B931-117BFB8EBB02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.12",
|
||||
"matchCriteriaId": "D6D56E90-F3EE-413D-B3E2-B518932F0C7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0b5394229ebae09afc07aabccb5ffd705ffd250e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/25174d91e4a32a24204060d283bd5fa6d0ddf133",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/61b91eb33a69c3be11b259c5ea484505cd79f883",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bb20a2ae241be846bc3c11ea4b3a3c69e41d51f2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cc3cd130ecfb8b0ae52e235e487bae3f16a24a32",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49000",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:11.710",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:56:17.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,138 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: Se soluciona la fuga de recuento de referencias del dispositivo PCI en has_external_pci(). for_each_pci_dev() se implementa mediante pci_get_device(). El comentario de pci_get_device() dice que aumentar\u00e1 el recuento de referencias para el pci_dev devuelto y tambi\u00e9n disminuir\u00e1 el recuento de referencias para el pci_dev de entrada @from si no es NULL. Si interrumpimos el bucle for_each_pci_dev() con pdev no NULL, debemos llamar a pci_dev_put() para disminuir el recuento de referencias. Agregue el pci_dev_put() faltante antes de 'return true' para evitar la fuga del recuento de referencias."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0",
|
||||
"versionEndExcluding": "5.10.158",
|
||||
"matchCriteriaId": "E0A5D883-5366-4620-8752-31B3CE410088"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.82",
|
||||
"matchCriteriaId": "0DC20DB6-73C1-4465-B931-117BFB8EBB02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.12",
|
||||
"matchCriteriaId": "D6D56E90-F3EE-413D-B3E2-B518932F0C7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/10ed7655a17f6a3eaecd1293830488259ccd5723",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/17f67414718e6aba123335a33b7d15aa594fff34",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/afca9e19cc720bfafc75dc5ce429c185ca93f31d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b6eea8b2e858a20ad58ac62dc2de90fea2413f94",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-40112",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-15T23:15:08.543",
|
||||
"lastModified": "2024-02-16T13:37:55.033",
|
||||
"lastModified": "2024-10-31T14:35:03.023",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En ippSetValueTag de ipp.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local de trabajos de impresi\u00f3n anteriores u otra informaci\u00f3n relacionada con la impresi\u00f3n, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/services/BuiltInPrintService/+/d7cb53cb5b47f4afdb84cb0e161d84fdc2c32ce7",
|
||||
|
56
CVE-2024/CVE-2024-104xx/CVE-2024-10454.json
Normal file
56
CVE-2024/CVE-2024-104xx/CVE-2024-10454.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-10454",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-10-31T13:15:14.580",
|
||||
"lastModified": "2024-10-31T13:15:14.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Clickjacking vulnerability in Clibo Manager v1.1.9.12 in the '/public/login' directory, a login panel. This vulnerability occurs due to the absence of an X-Frame-Options server-side header. An attacker could overlay a transparent iframe to perform click hijacking on victims."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/clickjacking-vulnerability-clibo-manager",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,36 +2,128 @@
|
||||
"id": "CVE-2024-10460",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-10-29T13:15:03.800",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:32:10.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " El origen de un mensaje de un controlador de protocolo externo podr\u00eda haberse ocultado utilizando una URL data: dentro de un `iframe`. Esta vulnerabilidad afecta a Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4 y Thunderbird < 132."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
|
||||
"versionEndExcluding": "128.4.0",
|
||||
"matchCriteriaId": "2E3F4DEC-8BEF-4DDD-BE8E-306B973FB76E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "132.0",
|
||||
"matchCriteriaId": "9225583C-3EB5-40BF-9E73-2AEAD1FAA2C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.4",
|
||||
"matchCriteriaId": "F0C57515-1FB2-455D-A61F-7333823559BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "129",
|
||||
"versionEndExcluding": "132",
|
||||
"matchCriteriaId": "8B5105E1-529F-4B0F-A7C9-4BDCC7DB91DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912537",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-55/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-56/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-58/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-59/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10487",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-10-29T22:15:03.430",
|
||||
"lastModified": "2024-10-30T14:35:07.303",
|
||||
"lastModified": "2024-10-31T14:35:04.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,19 +22,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10488",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-10-29T22:15:03.523",
|
||||
"lastModified": "2024-10-30T14:35:07.517",
|
||||
"lastModified": "2024-10-31T14:35:04.517",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,19 +22,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
@ -49,16 +49,6 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20347",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-04-03T17:15:49.107",
|
||||
"lastModified": "2024-04-03T17:24:18.150",
|
||||
"lastModified": "2024-10-31T14:35:05.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20420",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:13.957",
|
||||
"lastModified": "2024-10-22T15:12:47.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T14:35:05.980",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,6 +79,16 @@
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20421",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:14.193",
|
||||
"lastModified": "2024-10-22T17:51:08.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T14:35:06.853",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,6 +79,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20460",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:14.880",
|
||||
"lastModified": "2024-10-22T18:24:59.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T14:35:07.573",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,6 +79,16 @@
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20462",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:15.357",
|
||||
"lastModified": "2024-10-22T18:33:31.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T14:35:08.380",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,6 +79,16 @@
|
||||
"value": "CWE-257"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20463",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:15.670",
|
||||
"lastModified": "2024-10-22T18:36:35.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T13:35:02.373",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,6 +79,16 @@
|
||||
"value": "CWE-305"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20466",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-08-21T20:15:08.737",
|
||||
"lastModified": "2024-09-11T16:15:05.683",
|
||||
"lastModified": "2024-10-31T14:35:09.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21120",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:34.427",
|
||||
"lastModified": "2024-04-17T12:48:07.510",
|
||||
"lastModified": "2024-10-31T13:35:03.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21206",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:09.050",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"lastModified": "2024-10-31T13:35:04.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21208",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:09.437",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-31T13:35:05.287",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21210",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:09.843",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"lastModified": "2024-10-31T13:35:06.037",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21211",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:10.050",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-31T13:35:06.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21233",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:12.293",
|
||||
"lastModified": "2024-10-21T16:17:34.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T13:35:07.607",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21251",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:15.257",
|
||||
"lastModified": "2024-10-21T18:00:45.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T13:35:08.347",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21583",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-07-19T05:15:10.373",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"lastModified": "2024-10-31T14:35:10.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "CWE-15"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-565"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22371",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-02-26T16:27:56.557",
|
||||
"lastModified": "2024-02-26T16:32:25.577",
|
||||
"lastModified": "2024-10-31T13:35:09.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://camel.apache.org/security/CVE-2024-22371.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22889",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-06T00:15:52.633",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-10-31T14:35:11.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Debido al control de acceso incorrecto en la versi\u00f3n v6.0.9 de Plone, los atacantes remotos pueden ver y enumerar todos los archivos alojados en el sitio web mediante el env\u00edo de una solicitud manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2465",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-03-21T15:16:54.553",
|
||||
"lastModified": "2024-03-21T15:24:35.093",
|
||||
"lastModified": "2024-10-31T14:35:14.937",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Una vulnerabilidad de redirecci\u00f3n abierta en la aplicaci\u00f3n CDeX permite redirigir a los usuarios a sitios web arbitrarios a trav\u00e9s de una URL especialmente manipulada. Este problema afecta a las versiones de la aplicaci\u00f3n CDeX hasta la 5.7.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26735",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:51.147",
|
||||
"lastModified": "2024-06-27T12:15:20.317",
|
||||
"lastModified": "2024-10-31T14:35:12.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ipv6:sr: corrige posible use-after-free y null-ptr-deref La estructura de operaciones pernet para el subsystem debe registrarse antes de registrar la familia netlink gen\u00e9rica."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:14:18.277",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-10-31T13:35:09.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Sourcecodester School Task Manager 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de add-task.php?task_name=."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/unrealjbr/CVE-2024-28276",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29734",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-03T08:15:49.173",
|
||||
"lastModified": "2024-04-03T12:38:04.840",
|
||||
"lastModified": "2024-10-31T14:35:13.830",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Existe un problema de elemento de ruta de b\u00fasqueda no controlado en SonicDICOM Media Viewer 2.3.2 y versiones anteriores, lo que puede provocar que las bibliotecas de v\u00ednculos din\u00e1micos se carguen de forma insegura. Como resultado, se puede ejecutar c\u00f3digo arbitrario con los privilegios de la aplicaci\u00f3n en ejecuci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN40367518/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35919",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-19T11:15:48.303",
|
||||
"lastModified": "2024-05-20T13:00:04.957",
|
||||
"lastModified": "2024-10-31T14:35:15.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: mediatek: vcodec: a\u00f1adir bloqueo para proteger la lista de contexto del codificador. Agregue un bloqueo para ctx_list, para evitar acceder a un puntero NULL dentro de la funci\u00f3n 'vpu_enc_ipi_handler' cuando se ha eliminado ctx_list debido a un comportamiento inesperado en el bloque de IP de SCP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/41671f0c0182b2bae74ca7e3b0f155559e3e2fc5",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37087",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-06-25T15:15:12.767",
|
||||
"lastModified": "2024-06-25T18:50:42.040",
|
||||
"lastModified": "2024-10-31T14:35:15.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3785",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-04-15T14:15:08.767",
|
||||
"lastModified": "2024-04-15T19:12:25.887",
|
||||
"lastModified": "2024-10-31T14:35:17.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-28T01:15:08.793",
|
||||
"lastModified": "2024-08-15T16:15:20.100",
|
||||
"lastModified": "2024-10-31T14:35:16.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.delinea.com/online-help/privilege-manager/release-notes/12.0.1-combined.htm",
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-41153",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-10-29T13:15:04.600",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:37:48.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Command injection vulnerability in the Edge Computing UI for the\nTRO600 series radios that allows for the execution of arbitrary system commands. If exploited, an attacker with write access to the\nweb UI can execute commands on the device with root privileges,\nfar more extensive than what the write privilege intends."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n de comandos en la interfaz de usuario de Edge Computing para las radios de la serie TRO600 que permite la ejecuci\u00f3n de comandos arbitrarios del sistema. Si se explota, un atacante con acceso de escritura a la interfaz de usuario web puede ejecutar comandos en el dispositivo con privilegios de root, mucho m\u00e1s amplios que los que pretende el privilegio de escritura."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,102 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.0.0",
|
||||
"versionEndExcluding": "9.2.0.5",
|
||||
"matchCriteriaId": "D5C2D2E0-5383-44E5-B8C6-C743503A8E51"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3A46C6E-9314-40EB-A8BE-0D3A26B5FE4C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.0.0",
|
||||
"versionEndExcluding": "9.2.0.5",
|
||||
"matchCriteriaId": "4BE01813-8087-4E9B-8B2B-FF813C0E9506"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC979E74-6316-4BED-87A6-4DC9B9747E0F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.0.0",
|
||||
"versionEndExcluding": "9.2.0.5",
|
||||
"matchCriteriaId": "A6A94F87-2875-46C9-8BD3-BE3EA9F71648"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E84F6910-1D58-4AE7-94EF-797C9BD52690"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-41156",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-10-29T13:15:04.847",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:49:39.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Profile files from TRO600 series radios are extracted in plain-text\nand encrypted file formats. Profile files provide potential attackers\nvaluable configuration information about the Tropos network. Profiles\ncan only be exported by authenticated users with write access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Los archivos de perfil de las radios de la serie TRO600 se extraen en formato de texto plano y en formato de archivo cifrado. Los archivos de perfil proporcionan a los posibles atacantes informaci\u00f3n valiosa sobre la configuraci\u00f3n de la red Tropos. Los perfiles solo pueden ser exportados por usuarios autenticados con acceso de escritura."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-212"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,102 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:tro610_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.0.0",
|
||||
"versionEndExcluding": "9.2.0.5",
|
||||
"matchCriteriaId": "D5C2D2E0-5383-44E5-B8C6-C743503A8E51"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hitachienergy:tro610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3A46C6E-9314-40EB-A8BE-0D3A26B5FE4C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:tro620_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.0.0",
|
||||
"versionEndExcluding": "9.2.0.5",
|
||||
"matchCriteriaId": "4BE01813-8087-4E9B-8B2B-FF813C0E9506"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hitachienergy:tro620:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC979E74-6316-4BED-87A6-4DC9B9747E0F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:tro670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.0.0",
|
||||
"versionEndExcluding": "9.2.0.5",
|
||||
"matchCriteriaId": "A6A94F87-2875-46C9-8BD3-BE3EA9F71648"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hitachienergy:tro670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E84F6910-1D58-4AE7-94EF-797C9BD52690"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000147&LanguageCode=en&DocumentPartId=&Action=launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-428xx/CVE-2024-42835.json
Normal file
21
CVE-2024/CVE-2024-428xx/CVE-2024-42835.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42835",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T14:15:05.610",
|
||||
"lastModified": "2024-10-31T14:15:05.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/langflow-ai/langflow/issues/2908",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43795",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-02T20:15:10.927",
|
||||
"lastModified": "2024-10-08T14:01:16.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T14:15:05.723",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -127,6 +127,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSMOS",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44203",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-10-28T21:15:05.977",
|
||||
"lastModified": "2024-10-30T21:35:06.443",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-31T14:08:10.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46977",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-02T20:15:11.400",
|
||||
"lastModified": "2024-10-08T14:02:04.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-31T14:15:05.870",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,6 +133,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSMOS",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47529",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-02T20:15:11.740",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"lastModified": "2024-10-31T14:15:05.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -81,6 +81,10 @@
|
||||
{
|
||||
"url": "https://github.com/OpenC3/cosmos/security/advisories/GHSA-4xqv-47rm-37mm",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-127_GHSL-2024-129_OpenC3_COSMOS",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47968",
|
||||
"sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
|
||||
"published": "2024-10-07T22:15:04.480",
|
||||
"lastModified": "2024-10-10T12:57:21.987",
|
||||
"lastModified": "2024-10-31T13:35:11.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://www.solidigm.com/support-page/support-security.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47974",
|
||||
"sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
|
||||
"published": "2024-10-07T21:15:18.927",
|
||||
"lastModified": "2024-10-18T17:15:13.283",
|
||||
"lastModified": "2024-10-31T13:35:11.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solidigm.com/support-page/support-security.html",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-48112",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-30T21:15:14.393",
|
||||
"lastModified": "2024-10-30T21:15:14.393",
|
||||
"lastModified": "2024-10-31T14:35:19.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A deserialization vulnerability in the component \\controller\\Index.php of Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de deserializaci\u00f3n en el componente \\controller\\Index.php de Thinkphp v6.1.3 a v8.0.4 permite a los atacantes ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/Thinkphp/CVE-2024-48112.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4811",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2024-07-25T05:15:26.513",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"lastModified": "2024-10-31T14:35:19.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.octopus.com/post/2024/sa2024-05/",
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-49636",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-29T13:15:05.367",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:51:06.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Prashant Mavinkurve Agile Video Player Lite allows Reflected XSS.This issue affects Agile Video Player Lite: from n/a through 1.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Prashant Mavinkurve Agile Video Player Lite permite XSS reflejado. Este problema afecta a Agile Video Player Lite: desde n/a hasta 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:prashantmavinkurve:agile_video_player_lite:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "AEA3580F-E648-4F46-90A0-67DD88BE288C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/agile-video-player/wordpress-agile-video-player-lite-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-49637",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-29T13:15:05.590",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:52:42.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Foxskav Bet WC 2018 Russia allows Reflected XSS.This issue affects Bet WC 2018 Russia: from n/a through 2.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Foxskav Bet WC 2018 Rusia permite XSS reflejado. Este problema afecta a Bet WC 2018 Rusia: desde n/a hasta 2.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:foxskav:bet_wc_2018_russia:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1",
|
||||
"matchCriteriaId": "9445E523-56B5-4142-AFCC-D205F858AB51"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/bet-wc-2018-russia/wordpress-bet-wc-2018-russia-plugin-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49980",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:18.613",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T14:58:27.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,108 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vrf: revert \"vrf: Remove unexpected RCU-bh critical section\" Esto revierte el commit 504fc6f4f7f681d2a03aa5f68aad549d90eab853. Se espera que dev_queue_xmit_nit se llame con BH deshabilitado. __dev_queue_xmit tiene lo siguiente: /* Deshabilitar irqs suaves para varios bloqueos a continuaci\u00f3n. Tambi\u00e9n * detiene la preempci\u00f3n para RCU. */ rcu_read_lock_bh(); VRF debe seguir esta invariante. el commit a la que se hace referencia elimin\u00f3 esta protecci\u00f3n. Lo que activ\u00f3 una advertencia de lockdep: ================================= ADVERTENCIA: estado de bloqueo inconsistente 6.11.0 #1 Tainted: GW -------------------------------- uso inconsistente de {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W}. btserver/134819 [HC0[0]:SC0[0]:HE1:SE1] toma: ffff8882da30c118 (rlock-AF_PACKET){+.?.}-{2:2}, en: tpacket_rcv+0x863/0x3b30 {IN-SOFTIRQ-W} el estado se registr\u00f3 en: lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 packet_rcv+0xa33/0x1320 __netif_receive_skb_core.constprop.0+0xcb0/0x3a90 __netif_receive_skb_list_core+0x2c9/0x890 netif_receive_skb_list_internal+0x610/0xcc0 [...] otra informaci\u00f3n que podr\u00eda ayudar Depuremos esto: Posible escenario de bloqueo inseguro: CPU0 ---- lock(rlock-AF_PACKET); lock(rlock-AF_PACKET); *** BLOQUEO INTERMEDIO *** Seguimiento de llamadas: dump_stack_lvl+0x73/0xa0 mark_lock+0x102e/0x16b0 __lock_acquire+0x9ae/0x6170 lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 tpacket_rcv+0x863/0x3b30 dev_queue_xmit_nit+0x709/0xa40 vrf_finish_direct+0x26e/0x340 [vrf] vrf_l3_out+0x5f4/0xe80 [vrf] __ip_local_out+0x51e/0x7a0 [...]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "5F23DA31-E148-44C0-BE2A-2BF42A564DC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/718a752bd746b3f4dd62516bb437baf73d548415",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8c9381b3138246d46536db93ed696832abd70204",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b04c4d9eb4f25b950b33218e33b04c94e7445e51",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e61f8c4d179b2ffc0d3b7f821c3734be738643d0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-50479",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-28T13:15:06.093",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:02:20.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Mansur Ahamed Woocommerce Quote Calculator permite la inyecci\u00f3n SQL ciega. Este problema afecta a Woocommerce Quote Calculator: desde n/a hasta 1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mansurahamed:woocommerce_quote_calculator:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1",
|
||||
"matchCriteriaId": "A8F99F04-98CA-4DA4-B7CB-C6C16FD1156C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-50483",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-28T13:15:06.340",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:12:11.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authorization Bypass Through User-Controlled Key vulnerability in Meetup allows Privilege Escalation.This issue affects Meetup: from n/a through 0.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n a trav\u00e9s de una clave controlada por el usuario en Meetup permite la escalada de privilegios. Este problema afecta a Meetup: desde n/a hasta 0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tareqhasan:meetup:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.1",
|
||||
"matchCriteriaId": "68092F80-1586-4B74-94A2-36BA8A8944F5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/meetup/wordpress-meetup-plugin-0-1-broken-authentication-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-50488",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-28T13:15:06.617",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:19:42.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Priyabrata Sarkar Token Login allows Authentication Bypass.This issue affects Token Login: from n/a through 1.0.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en Priyabrata Sarkar Token Login permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a Token Login: desde n/a hasta 1.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -37,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:priyabratasarkar:token_login:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.3",
|
||||
"matchCriteriaId": "10A1C98D-601C-4A5A-9013-F64AD904510A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/token-login/wordpress-token-login-plugin-1-0-3-broken-authentication-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-50497",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-28T13:15:07.200",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:55:14.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BuyNowDepot Advanced Online Ordering and Delivery Platform allows PHP Local File Inclusion.This issue affects Advanced Online Ordering and Delivery Platform: from n/a through 2.0.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en BuyNowDepot Advanced Online Ordering and Delivery Platform permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a la Plataforma avanzada de pedidos y entrega en l\u00ednea: desde n/a hasta 2.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -37,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:buynowdepot:advanced_online_ordering_and_delivery_platform:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.0.0",
|
||||
"matchCriteriaId": "36023E90-9BD2-421D-B569-964084197EF9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/advanced-online-ordering-and-delivery-platform/wordpress-advanced-online-ordering-and-delivery-platform-plugin-2-0-0-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-50501",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-28T13:15:07.573",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:51:19.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Climax Themes Kata Plus allows Stored XSS.This issue affects Kata Plus: from n/a through 1.4.7."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Climax Themes Kata Plus permite XSS almacenado. Este problema afecta a Kata Plus: desde n/a hasta 1.4.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:climaxthemes:kata_plus:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.0",
|
||||
"matchCriteriaId": "C783528F-15A9-4661-99EF-48BF482A58BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/kata-plus/wordpress-kata-plus-plugin-1-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-50502",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-28T13:15:07.797",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:43:03.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CozyThemes Cozy Blocks allows Stored XSS.This issue affects Cozy Blocks: from n/a through 2.0.18."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CozyThemes Cozy Blocks permite XSS almacenado. Este problema afecta a Cozy Blocks: desde n/a hasta 2.0.18."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cozythemes:cozy_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.19",
|
||||
"matchCriteriaId": "31D9C569-F044-4E43-9477-46D70D9140F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cozy-addons/wordpress-cozy-blocks-plugin-2-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-512xx/CVE-2024-51254.json
Normal file
21
CVE-2024/CVE-2024-512xx/CVE-2024-51254.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51254",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T14:15:06.140",
|
||||
"lastModified": "2024-10-31T14:15:06.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the sign_cacertificate function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-512xx/CVE-2024-51259.json
Normal file
21
CVE-2024/CVE-2024-512xx/CVE-2024-51259.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51259",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-31T14:15:06.260",
|
||||
"lastModified": "2024-10-31T14:15:06.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-8013",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-10-28T13:15:10.200",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-31T13:33:03.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A bug in query analysis of certain complex self-referential $lookup subpipelines may result in literal values in expressions for encrypted fields to be sent to the server as plaintext instead of ciphertext. Should this occur, no documents would be returned or written. This issue affects mongocryptd binary (v5.0 versions prior to 5.0.29, v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) and mongo_crypt_v1.so shared libraries (v6.0 versions prior to 6.0.17, v7.0 versions prior to 7.0.12 and v7.3 versions prior to 7.3.4) released alongside MongoDB Enterprise Server versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un error en el an\u00e1lisis de consultas de ciertas subcanalizaciones autorreferenciales complejas de $lookup puede dar como resultado que los valores literales en las expresiones de los campos cifrados se env\u00eden al servidor como texto plano en lugar de texto plano. Si esto ocurriera, no se devolver\u00eda ni escribir\u00eda ning\u00fan documento. Este problema afecta al binario mongocryptd (versiones v5.0 anteriores a 5.0.29, versiones v6.0 anteriores a 6.0.17, versiones v7.0 anteriores a 7.0.12 y versiones v7.3 anteriores a 7.3.4) y a las librer\u00edas compartidas mongo_crypt_v1.so (versiones v6.0 anteriores a 6.0.17, versiones v7.0 anteriores a 7.0.12 y versiones v7.3 anteriores a 7.3.4) publicadas junto con las versiones de MongoDB Enterprise Server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,74 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongo_crypt_v1.so:*:*:*:*:*:mongodb:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndExcluding": "6.0.17",
|
||||
"matchCriteriaId": "4F0AB171-D947-49C0-9316-7F9E24EA043D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongo_crypt_v1.so:*:*:*:*:*:mongodb:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.12",
|
||||
"matchCriteriaId": "8212FEB4-CBC2-467F-9481-B5732508F2A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongo_crypt_v1.so:*:*:*:*:*:mongodb:*:*",
|
||||
"versionStartIncluding": "7.3.0",
|
||||
"versionEndExcluding": "7.3.4",
|
||||
"matchCriteriaId": "F532507C-3BFE-4572-BFF9-231660EF723C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongocryptd:*:*:*:*:*:mongodb:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.0.29",
|
||||
"matchCriteriaId": "DAEF92CF-08B5-4856-A435-6DB3B55C2CD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongocryptd:*:*:*:*:*:mongodb:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndExcluding": "6.0.17",
|
||||
"matchCriteriaId": "49E86F43-2733-48AB-AA5F-48F52039F01C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongocryptd:*:*:*:*:*:mongodb:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.12",
|
||||
"matchCriteriaId": "E2808417-A762-4018-AF46-699F6F07B9E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongocryptd:*:*:*:*:*:mongodb:*:*",
|
||||
"versionStartIncluding": "7.3.0",
|
||||
"versionEndExcluding": "7.3.4",
|
||||
"matchCriteriaId": "AC25FA9D-AC61-4795-8B8C-8578F1DE6B2C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-96254",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-89xx/CVE-2024-8934.json
Normal file
56
CVE-2024/CVE-2024-89xx/CVE-2024-8934.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8934",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-10-31T13:15:15.040",
|
||||
"lastModified": "2024-10-31T13:15:15.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A local user with administrative access rights can enter specialy crafted values for settings at the user interface (UI) of the TwinCAT Package Manager which then causes arbitrary OS commands to be executed."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.vde.com/en/advisories/VDE-2024-064",
|
||||
"source": "info@cert.vde.com"
|
||||
}
|
||||
]
|
||||
}
|
47
README.md
47
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-31T13:00:31.169177+00:00
|
||||
2024-10-31T15:00:33.966268+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-31T12:47:57.037000+00:00
|
||||
2024-10-31T14:58:27.613000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,26 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
267724
|
||||
267729
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-10454](CVE-2024/CVE-2024-104xx/CVE-2024-10454.json) (`2024-10-31T13:15:14.580`)
|
||||
- [CVE-2024-42835](CVE-2024/CVE-2024-428xx/CVE-2024-42835.json) (`2024-10-31T14:15:05.610`)
|
||||
- [CVE-2024-51254](CVE-2024/CVE-2024-512xx/CVE-2024-51254.json) (`2024-10-31T14:15:06.140`)
|
||||
- [CVE-2024-51259](CVE-2024/CVE-2024-512xx/CVE-2024-51259.json) (`2024-10-31T14:15:06.260`)
|
||||
- [CVE-2024-8934](CVE-2024/CVE-2024-89xx/CVE-2024-8934.json) (`2024-10-31T13:15:15.040`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `7`
|
||||
Recently modified CVEs: `62`
|
||||
|
||||
- [CVE-2021-45046](CVE-2021/CVE-2021-450xx/CVE-2021-45046.json) (`2024-10-31T12:17:17.820`)
|
||||
- [CVE-2023-1413](CVE-2023/CVE-2023-14xx/CVE-2023-1413.json) (`2024-10-31T11:45:26.367`)
|
||||
- [CVE-2023-1414](CVE-2023/CVE-2023-14xx/CVE-2023-1414.json) (`2024-10-31T11:45:26.367`)
|
||||
- [CVE-2023-25708](CVE-2023/CVE-2023-257xx/CVE-2023-25708.json) (`2024-10-31T11:45:26.367`)
|
||||
- [CVE-2023-31470](CVE-2023/CVE-2023-314xx/CVE-2023-31470.json) (`2024-10-31T12:47:57.037`)
|
||||
- [CVE-2023-6529](CVE-2023/CVE-2023-65xx/CVE-2023-6529.json) (`2024-10-31T11:45:26.367`)
|
||||
- [CVE-2024-10449](CVE-2024/CVE-2024-104xx/CVE-2024-10449.json) (`2024-10-31T12:47:08.810`)
|
||||
- [CVE-2024-29734](CVE-2024/CVE-2024-297xx/CVE-2024-29734.json) (`2024-10-31T14:35:13.830`)
|
||||
- [CVE-2024-35919](CVE-2024/CVE-2024-359xx/CVE-2024-35919.json) (`2024-10-31T14:35:15.330`)
|
||||
- [CVE-2024-37087](CVE-2024/CVE-2024-370xx/CVE-2024-37087.json) (`2024-10-31T14:35:15.630`)
|
||||
- [CVE-2024-3785](CVE-2024/CVE-2024-37xx/CVE-2024-3785.json) (`2024-10-31T14:35:17.530`)
|
||||
- [CVE-2024-39708](CVE-2024/CVE-2024-397xx/CVE-2024-39708.json) (`2024-10-31T14:35:16.610`)
|
||||
- [CVE-2024-41153](CVE-2024/CVE-2024-411xx/CVE-2024-41153.json) (`2024-10-31T14:37:48.533`)
|
||||
- [CVE-2024-41156](CVE-2024/CVE-2024-411xx/CVE-2024-41156.json) (`2024-10-31T14:49:39.800`)
|
||||
- [CVE-2024-43795](CVE-2024/CVE-2024-437xx/CVE-2024-43795.json) (`2024-10-31T14:15:05.723`)
|
||||
- [CVE-2024-44203](CVE-2024/CVE-2024-442xx/CVE-2024-44203.json) (`2024-10-31T14:08:10.090`)
|
||||
- [CVE-2024-46977](CVE-2024/CVE-2024-469xx/CVE-2024-46977.json) (`2024-10-31T14:15:05.870`)
|
||||
- [CVE-2024-47529](CVE-2024/CVE-2024-475xx/CVE-2024-47529.json) (`2024-10-31T14:15:05.980`)
|
||||
- [CVE-2024-47968](CVE-2024/CVE-2024-479xx/CVE-2024-47968.json) (`2024-10-31T13:35:11.047`)
|
||||
- [CVE-2024-47974](CVE-2024/CVE-2024-479xx/CVE-2024-47974.json) (`2024-10-31T13:35:11.790`)
|
||||
- [CVE-2024-4811](CVE-2024/CVE-2024-48xx/CVE-2024-4811.json) (`2024-10-31T14:35:19.917`)
|
||||
- [CVE-2024-48112](CVE-2024/CVE-2024-481xx/CVE-2024-48112.json) (`2024-10-31T14:35:19.053`)
|
||||
- [CVE-2024-49636](CVE-2024/CVE-2024-496xx/CVE-2024-49636.json) (`2024-10-31T14:51:06.170`)
|
||||
- [CVE-2024-49637](CVE-2024/CVE-2024-496xx/CVE-2024-49637.json) (`2024-10-31T14:52:42.927`)
|
||||
- [CVE-2024-49980](CVE-2024/CVE-2024-499xx/CVE-2024-49980.json) (`2024-10-31T14:58:27.613`)
|
||||
- [CVE-2024-50479](CVE-2024/CVE-2024-504xx/CVE-2024-50479.json) (`2024-10-31T13:02:20.793`)
|
||||
- [CVE-2024-50483](CVE-2024/CVE-2024-504xx/CVE-2024-50483.json) (`2024-10-31T13:12:11.813`)
|
||||
- [CVE-2024-50488](CVE-2024/CVE-2024-504xx/CVE-2024-50488.json) (`2024-10-31T13:19:42.087`)
|
||||
- [CVE-2024-50497](CVE-2024/CVE-2024-504xx/CVE-2024-50497.json) (`2024-10-31T13:55:14.493`)
|
||||
- [CVE-2024-50501](CVE-2024/CVE-2024-505xx/CVE-2024-50501.json) (`2024-10-31T13:51:19.780`)
|
||||
- [CVE-2024-50502](CVE-2024/CVE-2024-505xx/CVE-2024-50502.json) (`2024-10-31T13:43:03.177`)
|
||||
- [CVE-2024-8013](CVE-2024/CVE-2024-80xx/CVE-2024-8013.json) (`2024-10-31T13:33:03.953`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
143
_state.csv
143
_state.csv
@ -185625,7 +185625,7 @@ CVE-2021-45040,0,0,ed85eb8e42efe4f89449225fa1dbff8dac0145c13ebbbfbb3a64fe612b539
|
||||
CVE-2021-45041,0,0,6e20f68b6bbebd2668054670e3b85bd681a2868c8cc1d9236cfcb5d84f9f6b82,2022-01-04T16:37:32.703000
|
||||
CVE-2021-45042,0,0,2c175e9e102c18ead9c2ca459d1ac51464b814f417d00bb2c7cfd34768368094,2022-09-08T21:42:09.307000
|
||||
CVE-2021-45043,0,0,156f68cffd982e90fa11b055a5828b782d3080ff62f5aa2850eed885b6365b76,2021-12-17T17:09:41.993000
|
||||
CVE-2021-45046,0,1,f311e349b7cfa3133975246103a9e0f03f07bebf997e7c4186b3e52f7529e20b,2024-10-31T12:17:17.820000
|
||||
CVE-2021-45046,0,0,f311e349b7cfa3133975246103a9e0f03f07bebf997e7c4186b3e52f7529e20b,2024-10-31T12:17:17.820000
|
||||
CVE-2021-45051,0,0,1f4afe7c10bacb42f57bcc1fcc52a6e03e630280034a64827075e9dcef8d9ce8,2022-01-21T15:57:35.010000
|
||||
CVE-2021-45052,0,0,d441c4820f41fd2ab2cb3c1e70d7f473c847f9bb3e2b319f5cb30ebbd5f2df04,2022-01-21T15:57:01.110000
|
||||
CVE-2021-45053,0,0,dd68063fc8b7f907b235ca3131ad4876fc6312d38d2c827e13cb6606af13c6b3,2023-11-07T03:39:45.230000
|
||||
@ -186715,7 +186715,7 @@ CVE-2021-46741,0,0,0b40e8e32d29e0f96f0af2c276768a4ac016129ae4d863795d7a4af2661b4
|
||||
CVE-2021-46742,0,0,13ff92c0902a8e3ccb77fb7b8c8327dfae3feb5c7ee87f870ba029a124b88197,2022-07-12T17:42:04.277000
|
||||
CVE-2021-46743,0,0,7e258fae6545733572be15bf8f00b471c0183fe9feab8e30aa3e99cd00a61619,2022-04-08T15:14:50.130000
|
||||
CVE-2021-46744,0,0,78589c41b7d92db5eaffce6d6a8851bc2287ed56c43eefd5ab65e59e830716c6,2023-08-08T14:22:24.967000
|
||||
CVE-2021-46746,0,0,1d1053a90e75b271469d2dac5aeb327834fc2dd60b0f3fc28b3b6f2804114ffa,2024-08-14T02:07:05.410000
|
||||
CVE-2021-46746,0,1,f69dd045dd81ec8afaac03d1182b070f7b32ac7bec01930b9232502f62e5930b,2024-10-31T14:35:00.797000
|
||||
CVE-2021-46748,0,0,31c9dac1ff239e43a51a8186c85667ae15dfd1b24d0146589cf32b12385adf26,2023-11-27T19:03:01.993000
|
||||
CVE-2021-46749,0,0,32b0321c9cac1f53241df70eefee71a55ba83baf5aabfc47646aa71e6dda16c7,2023-05-22T15:55:47.967000
|
||||
CVE-2021-46753,0,0,389185adc5adbd69df72eaf6b406809e56d98b55bc10a477c0fbb10a2e142a9a,2023-05-22T15:55:38.593000
|
||||
@ -187011,7 +187011,7 @@ CVE-2021-47085,0,0,99425eb67a70567219ce9050998d710c23af03d38c7b64b5ce0c488c80c15
|
||||
CVE-2021-47086,0,0,610eccf541b98554d8678c48c0d5e735bfe4ec661d4b93d980c952036c90cd47,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47087,0,0,d2155a3ca154078a2d21512de18d6b0fe27152c0f765557d870ff728afcedc3c,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47088,0,0,7e8d82dddc0835fbe0dde83c2c98a181b55b82dadacbe821ae98bee937d859f9,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47089,0,0,80699395fa6acd42257691758212902136271470353a13919984b8dde207532d,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47089,0,1,b50edabd3e3e4e21c0ff051820173f8d5db58f5d63479eb150d9868cfc79de6d,2024-10-31T14:35:02.470000
|
||||
CVE-2021-47090,0,0,2c489b1391e1218d2d16941f8633f5d95ddf471b2541e7953e288e3588523c2d,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47091,0,0,6f8bf2fa9b9e29ebfde7540e7d404d6090906d8861a09e884d533ea7fe33ccaf,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47092,0,0,cc354a14cc04187592aa1176b9d80e6683dd927a110ff36a87a0a4164e6a3e09,2024-03-05T13:41:01.900000
|
||||
@ -187516,21 +187516,21 @@ CVE-2021-47590,0,0,f39be5f78d966c2d22d67b4496d2a7538ff62fc77cf57a6c71df81c4fb431
|
||||
CVE-2021-47591,0,0,075ff96a49ab3870794068c07184348561582a3968bb161ed2673754442a5134,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47592,0,0,3e6a900f856612ffa91a686567e21f4c94ed7d6a279efc65d48294ed49768d05,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47593,0,0,d7a43d01ab4a125b4e19b7cc66507d59f9c795640b357b5f69d8e118285d751e,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47594,0,0,39ee68b0bea20520811a251d6cea7a263960b1fe82747511fa8952fffe9e3729,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47595,0,0,a5c7de083f6b9294a72a621ab5d4d3b5d2e23f529c737eb80cb272e2bd0ff631,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47594,0,1,8cdfebe564f634c8797806be731e7843af5aeef7ba442bbd86f3cc5d16520d6b,2024-10-31T13:25:38.567000
|
||||
CVE-2021-47595,0,1,22cbd66b2328e4653957278957d5f13a2f978d0699c1f3217e6008a131202601,2024-10-31T13:27:04.057000
|
||||
CVE-2021-47596,0,0,1907e3f165fb4e5b48753df6fccdd2af7df1251b38a69b71dafcd90b678b1e72,2024-08-19T18:22:13.667000
|
||||
CVE-2021-47597,0,0,17331943a100612a59f274fb29e9b045b8ef7bffba10c35fde978c62c3806ef0,2024-08-19T18:15:30.577000
|
||||
CVE-2021-47598,0,0,f212e8f5248b2a91eca1c18c921ffe8dcf284ef4e373f68a8749d1452432a2be,2024-08-27T16:14:48.593000
|
||||
CVE-2021-47599,0,0,08ed62254e7ecb9b8e7d1adde943234640f9a513c87ff0831ce11a99dd48bc77,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47599,0,1,52223877ee7b056e68bd93101a323f90cf2cf1ed3a12d6f5c9331770b20644b8,2024-10-31T13:36:53.667000
|
||||
CVE-2021-47600,0,0,75cc3b8f9f4b82a2dba36cc9c8cf2cf73a752aa22859fcd049e14203568be90d,2024-08-27T16:14:38.423000
|
||||
CVE-2021-47601,0,0,7e4eec57dea85ff7c42442dd774d3b6a4d991000ef8c50e5b20a9ac0d710c596,2024-08-27T16:14:33.227000
|
||||
CVE-2021-47602,0,0,217373f24d1538113364e9a20807c56c528cffaaabacdafeb2f2e23412f68cc3,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47603,0,0,86761f5d59a68c4485664bbeeb1962970f5d48b4cf7067142a29c796a3fa71e8,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47602,0,1,9331402e967c710d555501b3f107e3b3a3a55f48a21ce0c53f93965980105bd1,2024-10-31T13:41:15.330000
|
||||
CVE-2021-47603,0,1,c39a36175f1ab432390342d3020157e09d5080a6b879b57520af3a302c16ee74,2024-10-31T13:46:39.310000
|
||||
CVE-2021-47604,0,0,ac31811ff3ea9487872dcb752719657552aafd373d8cbc184273811f43ff1778,2024-08-27T16:14:27.793000
|
||||
CVE-2021-47605,0,0,3081571158d2338d282550bef6eda6211517213c80f981c9a10c8de92b5f09f9,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47606,0,0,1b6f001fc78e7d894961d1d6e1b1ad17df9148ecf02509aefb567ce294393bba,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47607,0,0,466cf23ad91b2e040a4c28e81e3756fd6709b746cea60e8522b3eb46b652dfcc,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47608,0,0,d78dccafcd258413b1f868a68330ca12fdd652e4eb37e67094a9c1b95992d5aa,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47605,0,1,51949b2be0cec2875d8874ddbbc898eefe503bd3fe714908a9e66ccba722cd11,2024-10-31T13:50:27.413000
|
||||
CVE-2021-47606,0,1,25c64ffa74b94e08390c0a438ff2a3f798bd8ce001419121add66fd1d7fed33f,2024-10-31T13:58:05.350000
|
||||
CVE-2021-47607,0,1,bd4fb8f531ce169ca1c9d616da1eeae4b2bdc198c406db74dde3c1b695aaa071,2024-10-31T14:07:03.140000
|
||||
CVE-2021-47608,0,1,0886f659afc1fa58b88f26d9849fa4d4aba6e61b8465f4b70c0dcd7ea7d1c486,2024-10-31T14:16:04.227000
|
||||
CVE-2021-47609,0,0,d5d3574371d69948da6acaf830f70f9ea8cb33a942e4472cbc068a76d779c28a,2024-10-30T21:31:54.493000
|
||||
CVE-2021-47610,0,0,37f0f9bf2a6c534057e2bd73a9a69b473a415dbff8fc146dda3211d4f97f8e8d,2024-08-27T16:14:20.873000
|
||||
CVE-2021-47611,0,0,5369632f1f51a18876adc9db044c282fadd9d8f0f62e0e0bcaffc9e232704990,2024-10-30T21:32:55.490000
|
||||
@ -212633,9 +212633,9 @@ CVE-2022-48995,0,0,6d50aef3372db06b6d495aa3016571870681b9327c2409bc5336d097bc2fa
|
||||
CVE-2022-48996,0,0,0f669c5d177a55ab1de24ef7aebf7206e81a91803f760e8aa9a6146660e8c4e1,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48997,0,0,b7b9d54e465f5a467cd4544e1b3ea1f9aa1fa07b25224a4e924ef74e6000999e,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48998,0,0,b57fd57be2b9c4c0639652b977cb6f002cc2a4810b1a8b3ec1079b25ac9d83fc,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48999,0,0,ec5be2b03e3b5b7d38590253ae9fa2814424968d957fec2c8bd6f9455405047f,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48999,0,1,ade5189407bcb1c53b709efa68b58bb4a61ffa43108c0637b7c0e393d125b80c,2024-10-31T14:44:10.857000
|
||||
CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075c4,2023-11-30T22:15:07.600000
|
||||
CVE-2022-49000,0,0,66fc4f4f03879d9d446108a6269b018e290959a61a92a2a2ba3fb133109a0b85,2024-10-23T15:13:25.583000
|
||||
CVE-2022-49000,0,1,3315f81ffe886dd8a0d6755db95204b8e967d8d84fc20d98b4981297144d3f94,2024-10-31T14:56:17.890000
|
||||
CVE-2022-49001,0,0,90c0c95232b0e405569e477719b0ebe94e42951a70f8f80fcb42731ab4608f53,2024-10-30T18:58:53.863000
|
||||
CVE-2022-49002,0,0,fad7889d4553e8099b0d53ab53b5daa8b36d6d338a8c65200d67fb3b44de9d3c,2024-10-25T14:24:12.620000
|
||||
CVE-2022-49003,0,0,f8f764dbf52fdce662c912f1975da1ca6c961f4536dbe6925188461916d8623f,2024-10-25T14:12:59.897000
|
||||
@ -214095,8 +214095,8 @@ CVE-2023-1408,0,0,be1730bf79a848c20a29ecda5f6ee22ead510880d0c75346898b2f444427fc
|
||||
CVE-2023-1409,0,0,d7ae233c3902fda79cb6b7eeab317b7e747ab39f01d77af619852fee2f578630,2023-09-21T17:15:15.390000
|
||||
CVE-2023-1410,0,0,f621dd2b12f3e5cb9d00941d3e2303bf72d7d565fdd3007b5fd50421942cb3bf,2023-04-20T09:15:09.380000
|
||||
CVE-2023-1412,0,0,a34dd92e9f599012b54de54353639ab03121afb93962ad53f3b0f2c817b74e8b,2023-11-07T04:03:32.083000
|
||||
CVE-2023-1413,0,1,d29c6a9d343421f079ee1563c25d03d3b68842bfbd3a0ec0533f4e8c9de5f500,2024-10-31T11:45:26.367000
|
||||
CVE-2023-1414,0,1,ada28061767df4229261ba5b39d030d7580704f8b13593ecb6e2534e518c8381,2024-10-31T11:45:26.367000
|
||||
CVE-2023-1413,0,0,d29c6a9d343421f079ee1563c25d03d3b68842bfbd3a0ec0533f4e8c9de5f500,2024-10-31T11:45:26.367000
|
||||
CVE-2023-1414,0,0,ada28061767df4229261ba5b39d030d7580704f8b13593ecb6e2534e518c8381,2024-10-31T11:45:26.367000
|
||||
CVE-2023-1415,0,0,1e1434a56aaa3bcd701e910a28cc02dada54d35527fe2766ef00ccb840cbb87f,2024-05-17T02:18:04.247000
|
||||
CVE-2023-1416,0,0,1fb3956a7244c92e489ba48a1f07132042e607d4ea6755c5af436120354fa942,2024-05-17T02:18:04.353000
|
||||
CVE-2023-1417,0,0,98da967360b93ba784cb9be10117165bca60dd585d51b5de1ff2354de4a97e32,2023-04-12T19:22:43.647000
|
||||
@ -219382,7 +219382,7 @@ CVE-2023-25704,0,0,f73634d63e4d39958a974094b9630200196f9a7ce70260fb3f1e2a32ddeb1
|
||||
CVE-2023-25705,0,0,d18228a88cdb07d0fad976553df14ba8cf52b6b09336cb1d9f0b81f114c55523,2023-11-07T04:09:08.393000
|
||||
CVE-2023-25706,0,0,d8d3c9ba67d2b7f7dd14b5f812e755b8f5686186206ad4aecd96597d721adc80,2023-07-18T18:22:21.817000
|
||||
CVE-2023-25707,0,0,937a581a8de3a35719ef90364d4b99eab80b6ed0365027001c532c2765144242,2023-05-26T18:36:30.683000
|
||||
CVE-2023-25708,0,1,26cfc542eac72a06efe209fa3aa8597871d23f685718d8cf2be6112f640faca7,2024-10-31T11:45:26.367000
|
||||
CVE-2023-25708,0,0,26cfc542eac72a06efe209fa3aa8597871d23f685718d8cf2be6112f640faca7,2024-10-31T11:45:26.367000
|
||||
CVE-2023-25709,0,0,877041b67ce46b891da24e27ca3ada172461ba2a568d9d010e5be03d2052d4a1,2023-11-07T04:09:08.627000
|
||||
CVE-2023-2571,0,0,85a713e55b6e2339730f156ac4b04b01724ec0613be95b03a1f013d8906fef22,2023-11-07T04:12:54.017000
|
||||
CVE-2023-25710,0,0,2ee5eba8273bf5fda650a32fad8f12e8ed15eb97badd4691f9237c4c2e156345,2023-04-28T02:59:41.903000
|
||||
@ -223928,7 +223928,7 @@ CVE-2023-31466,0,0,da6fc0cb905974fb3c8b32c31c02b9d620fd8ce33bae2a4bf3e707b5b6e59
|
||||
CVE-2023-31468,0,0,700b7fa2bea955781239281828aaef27f7b2f5a35cd66b385a227cf102cd6add,2024-07-12T16:11:12.297000
|
||||
CVE-2023-31469,0,0,d1a426fdd2be7cfe8917a6c2b910aa85ef44c0b7ccdf9ed875c360822d8667f3,2024-10-09T15:35:05.020000
|
||||
CVE-2023-3147,0,0,7e0901b2973cac3f4166291463e7b1601c821bee68bbc4d95420a8d53da593dc,2024-05-17T02:27:18.420000
|
||||
CVE-2023-31470,0,1,05134d7b00e2e89968f184d24914481d18e28388ea2be514b3bc7862e7931c8f,2024-10-31T12:47:57.037000
|
||||
CVE-2023-31470,0,0,05134d7b00e2e89968f184d24914481d18e28388ea2be514b3bc7862e7931c8f,2024-10-31T12:47:57.037000
|
||||
CVE-2023-31471,0,0,c07d8b85821561986a7f8c0f5881926eb1a8ba6584c0f50aedb68800f2ce7361,2023-05-18T21:24:07.747000
|
||||
CVE-2023-31472,0,0,b7a06509d5a9c873552becad1b52b0bbacf3db1d909bdc8e2aabc6c7689ef575,2023-05-17T00:31:11.087000
|
||||
CVE-2023-31473,0,0,a6d8431914b6a64acbad7a55ba4851cf2af42d22e59a23d1e472e7035f4077d1,2023-05-22T18:25:30.213000
|
||||
@ -230482,7 +230482,7 @@ CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef
|
||||
CVE-2023-4011,0,0,ff845b3bec6fa1ec7ec6e3f06d521b3f25d1051621eed84e2a9da8c89b74f8c4,2024-10-03T07:15:18.313000
|
||||
CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
|
||||
CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000
|
||||
CVE-2023-40112,0,0,4ddec6ab2662940b93a3dc42430a4fadcac48159b9ef1e91d81653103c488b43,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40112,0,1,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000
|
||||
CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04
|
||||
CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000
|
||||
@ -240785,7 +240785,7 @@ CVE-2023-6525,0,0,747c87454f70afba3ff97134cd46df13838e4c184e4f5c592d129104faa01d
|
||||
CVE-2023-6526,0,0,d81fbe07fad2846b358a751e54b6269c5d4fe654984d71dbbd204477e93d9724,2024-02-12T16:00:51.520000
|
||||
CVE-2023-6527,0,0,6d45d5d24f8802289ca25bdcdd8ee5749b89ce975b4a1ca2f9bdfb58af022c45,2023-12-11T17:45:06.217000
|
||||
CVE-2023-6528,0,0,803dba240e8be07a0f0f6bfd93a8bff09357f8b471c40efc871c36e0f417b769,2024-01-11T20:03:00.007000
|
||||
CVE-2023-6529,0,1,626d86736ec5e6dac548a492b413393413251e9f2f4f0d64ade7ba7017faf6c3,2024-10-31T11:45:26.367000
|
||||
CVE-2023-6529,0,0,626d86736ec5e6dac548a492b413393413251e9f2f4f0d64ade7ba7017faf6c3,2024-10-31T11:45:26.367000
|
||||
CVE-2023-6530,0,0,e97d02709e493818576d008554317095bd12443aa526c5fc75ad777fe8cdce6a,2024-02-02T23:50:49.170000
|
||||
CVE-2023-6531,0,0,e8e255dd1935dc1ef5c4948fb68c51fef95a88952f5cbe73bcb1a6974886a5db,2024-09-06T18:15:06.233000
|
||||
CVE-2023-6532,0,0,44972a9aaa8b97e5656a7157ac74bde56edc9712f5f8e7cc323b7f605c6b8ba6,2024-01-11T20:04:00.773000
|
||||
@ -242609,15 +242609,16 @@ CVE-2024-10440,0,0,9134bb1aaa59624e138e5f8b3325f09bddc2e56431561ccb4c3e021d68fff
|
||||
CVE-2024-10446,0,0,9a110001279aec61be0a01c28d9ac0a67361a3753f5f02059a709117bcd9c6a3,2024-10-28T13:58:09.230000
|
||||
CVE-2024-10447,0,0,20a77c16977cd86421b31dc7f8e87f37efdc79e51d4f78a901539c52dec6ae6c,2024-10-31T01:23:46.300000
|
||||
CVE-2024-10448,0,0,8592ee07b49e81610af100bc63f005e0b694650efb1b3544bc63d15b3705903e,2024-10-29T14:34:50.257000
|
||||
CVE-2024-10449,0,1,8607f328e6ad15d8ca267c31a328033a0fcda88d731c3cb315537e91214fb44b,2024-10-31T12:47:08.810000
|
||||
CVE-2024-10449,0,0,8607f328e6ad15d8ca267c31a328033a0fcda88d731c3cb315537e91214fb44b,2024-10-31T12:47:08.810000
|
||||
CVE-2024-10450,0,0,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000
|
||||
CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b366238480a,2024-10-29T16:15:04.593000
|
||||
CVE-2024-10454,1,1,00a532df7fc763ef532ba53fc65d3c8c542dd62967499eae25b9ca1ff4ccf09a,2024-10-31T13:15:14.580000
|
||||
CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000
|
||||
CVE-2024-10456,0,0,4e8313f83dd74eaf01a85b0e2c8241c892546e7f6f740c8d60482cb697257f25,2024-10-30T18:15:05.123000
|
||||
CVE-2024-10458,0,0,7226d5d845dae2d50cf0c67a709b76b4ee40123526a8a54fcaba4953dcdb6c62,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10459,0,0,9d75223b7f4d8772f198dec4be94083c31b07915596609c3d6e28cafba36747c,2024-10-29T14:34:04.427000
|
||||
CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000
|
||||
CVE-2024-10460,0,0,b3dcc9daf7d6e1ca6a6660329788291f6c0dafaa9a6365aab9b6d0c1d3013608,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10460,0,1,528e842660e78442d2a60439f5926893dddc35fffc78eaed4be498e8f0df3a7b,2024-10-31T14:32:10.607000
|
||||
CVE-2024-10461,0,0,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000
|
||||
CVE-2024-10462,0,0,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000
|
||||
CVE-2024-10463,0,0,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000
|
||||
@ -242633,8 +242634,8 @@ CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b
|
||||
CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000
|
||||
CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000
|
||||
CVE-2024-10487,0,0,d1b8bc178246d83d33a27144ea8a70d3bcde87b4297a3439f88b09ebd92962ef,2024-10-30T14:35:07.303000
|
||||
CVE-2024-10488,0,0,6de048fb6a1876c0ac1729db68b9fcc079c410d13c9e356399351989c5574a08,2024-10-30T14:35:07.517000
|
||||
CVE-2024-10487,0,1,afd74b0a34323c60dbd4f535b3b82532f3b5a0affd95989cc244517ea9d5ec96,2024-10-31T14:35:04.283000
|
||||
CVE-2024-10488,0,1,69038bbef0b99288e3361fe760223b169ea77142f6a0f65d45c3c8314e4211a0,2024-10-31T14:35:04.517000
|
||||
CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000
|
||||
CVE-2024-10491,0,0,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000
|
||||
CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000
|
||||
@ -243769,7 +243770,7 @@ CVE-2024-20343,0,0,7c9d164f9ec94ab3681a2158dfc37a563399321d4ad394ceb86611456e6f0
|
||||
CVE-2024-20344,0,0,0c95d8c456a266581d87105f2300bfe021552d9f4a6b780624736cdaf9bbf776,2024-02-29T13:49:29.390000
|
||||
CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237eeb39,2024-03-07T13:52:27.110000
|
||||
CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657528,2024-03-06T21:42:54.697000
|
||||
CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5809,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20347,0,1,52aa661546c6b8994a89fed282dca85d8861ae1a559626c851c31cb0236c7b1d,2024-10-31T14:35:05.260000
|
||||
CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2035,0,0,216279b16f620c2ff4b0a8961dd1dd14e0bafebc256a395c018effc533e0c28d,2024-10-11T14:20:05.590000
|
||||
CVE-2024-20350,0,0,a12c7038f7859e98d5699951ee7006a12ff1675d76aabb6f00e8b49b9f735c1a,2024-09-26T13:32:02.803000
|
||||
@ -243844,8 +243845,8 @@ CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750
|
||||
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
|
||||
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
|
||||
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
|
||||
CVE-2024-20420,0,0,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000
|
||||
CVE-2024-20421,0,0,b8d90bf4638dbe0c37023b3ff1bd11c5ac7ded44281786691979af6c9dbb0983,2024-10-22T17:51:08.113000
|
||||
CVE-2024-20420,0,1,bf5b2e28728b393dc4c68ac30d4f5934f5f4c3a252f289a6ace4b087b2c80ce0,2024-10-31T14:35:05.980000
|
||||
CVE-2024-20421,0,1,010353f6315a1178c3a836b86ba880ca671547b6c70a4204900c9847f12b906d,2024-10-31T14:35:06.853000
|
||||
CVE-2024-20424,0,0,ffa62354c649fb92a19c53bb88a63b5a68961428021270eef69bc0cdf2db3939,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20426,0,0,de1754515a9d08a81fb464f1c350f5eea8399c648858dacb1404601225681f6e,2024-10-25T12:56:36.827000
|
||||
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
|
||||
@ -243877,13 +243878,13 @@ CVE-2024-20455,0,0,0eab0e0d21dc4342feafbdcb7840d45bd73b5886ce73a3d40c40f5d3f5d51
|
||||
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-20458,0,0,7fb1e55e612ee6c8cc09ba5c55e99526661fa33e17c363c55add3406c5a053f4,2024-10-22T18:03:09.777000
|
||||
CVE-2024-20459,0,0,5cd54a48218e6b57b046cb69743cb297e897ffabcfc93cde2b5b5db91e60d9df,2024-10-22T18:06:48.333000
|
||||
CVE-2024-20460,0,0,358defc63ad86f792960aac125709e2fb3ed671fce4437f964487072e33fe867,2024-10-22T18:24:59.710000
|
||||
CVE-2024-20460,0,1,1680f4feb024550f85cfbc4af79437ce465cc993fb1f24de2a76ac8f316389ea,2024-10-31T14:35:07.573000
|
||||
CVE-2024-20461,0,0,c15342729fb0990fca2c54c1ab369938cf9683949c2cefcc250f30164551b25e,2024-10-22T18:26:01.890000
|
||||
CVE-2024-20462,0,0,b4e4c93a961318330887a3ec7cd87acb06e21170fac85cb813ac45cad8cb70ab,2024-10-22T18:33:31.410000
|
||||
CVE-2024-20463,0,0,2fbbbaedfda9bb304c7dda8b513af588802004e5e8905e7372610fd9adcd741c,2024-10-22T18:36:35.487000
|
||||
CVE-2024-20462,0,1,99866908b00ddcc852a105c5396f95be60dae111a9a847130bf50c0b1c3eb78a,2024-10-31T14:35:08.380000
|
||||
CVE-2024-20463,0,1,36a216f0f7d6ec15c580a77a917994b81fb0f5b89dfafc02914e763698043264,2024-10-31T13:35:02.373000
|
||||
CVE-2024-20464,0,0,f24579468ebdb84e5fe9b1671318293b6d5b473cae484edf3392abda0d117c91,2024-10-24T19:47:29.740000
|
||||
CVE-2024-20465,0,0,58c61302cfd8374a2de79b49d5aac585902b54820b0fbcf82d9f704341c07483,2024-10-24T19:46:15.007000
|
||||
CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000
|
||||
CVE-2024-20466,0,1,d0329ee630c2b2a6ce426800fea8982bf585a45fc72abad0a547b583e87462bd,2024-10-31T14:35:09.360000
|
||||
CVE-2024-20467,0,0,c1af58980ccad99499fcb95639264b5a0614f69936f5a7ffc5edb35f8fbf6c29,2024-10-03T20:09:50.970000
|
||||
CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000
|
||||
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
|
||||
@ -244442,7 +244443,7 @@ CVE-2024-21117,0,0,c00c4008bc12621d52c01b8472214c0be8ae4e9de0cb223458bb38ef939df
|
||||
CVE-2024-21118,0,0,f114752b89d9b7c0657ca7ba9e9d4a87c147c0dace0ecb0acd8bb329459af8ce,2024-04-17T12:48:07.510000
|
||||
CVE-2024-21119,0,0,9381600d4aa69a4373e482e4320b8fc62fa345594208c335b64ab5a7d172dea7,2024-04-17T12:48:07.510000
|
||||
CVE-2024-2112,0,0,a9796693bf64fe8c1cb1a520a8b14d3b45df38763dca2df6ddc6b2059d00055c,2024-04-10T13:23:38.787000
|
||||
CVE-2024-21120,0,0,98fc2361f67b9484ad5474fcf7dc48ada190d1ccd85c05af939e55dab3a492d4,2024-04-17T12:48:07.510000
|
||||
CVE-2024-21120,0,1,b0038d7950fd54e728ca8204a661eead3f856b119245dfad7d926e5d9d2db135,2024-10-31T13:35:03.740000
|
||||
CVE-2024-21121,0,0,8a0d5fd4a744b9f97fa1125505a479ab3d5433ac8cc3bef173d2253a6f64884a,2024-04-17T12:48:07.510000
|
||||
CVE-2024-21122,0,0,a57d97d459ac8321977230309495b6b2091491e8fde03b0b41f454ed964830a6,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21123,0,0,9641e8c5df4b42df53361943ff91464ab7c43c6dad8de03e9a9bf2477bde0df7,2024-07-17T13:34:20.520000
|
||||
@ -244530,13 +244531,13 @@ CVE-2024-21202,0,0,deaaeb207b76e5d780f9f2aac38c9d614842ab21a66472da77bf28a69d425
|
||||
CVE-2024-21203,0,0,485891ac42bb6471c272b9a68a958e530ac5119e2c4569ec98012fb7f6b3a688,2024-10-16T20:46:35.560000
|
||||
CVE-2024-21204,0,0,ae3974e6e819eb72c15fda38a94ec00e7ce8c7ae66ff8d4329ce8bc23c1a6752,2024-10-18T14:32:36.837000
|
||||
CVE-2024-21205,0,0,06c1ad328c7908bb2d5426b85e1fe09ef6e93b5dc063148369f98528b7c21882,2024-10-18T14:50:37.103000
|
||||
CVE-2024-21206,0,0,12044bca635d46dc06bba67023cc66e6ec5c6a8ca2061f8529322ff296b183ae,2024-10-16T16:38:43.170000
|
||||
CVE-2024-21206,0,1,6271714f1b485eba5c2dca8324c2860a0dcb11d28c7214eacb6dd66f8294a44a,2024-10-31T13:35:04.520000
|
||||
CVE-2024-21207,0,0,441e7ee527d2b149c57c3cf29122fa50593225a02ed0e8e1aa929ce2ccb3cd06,2024-10-16T20:45:17.507000
|
||||
CVE-2024-21208,0,0,f63e348aa9e4b4a01e2378e637d9f3e9df426aed90a375ab27c5e2ac8ade0cbc,2024-10-16T16:38:43.170000
|
||||
CVE-2024-21208,0,1,3ac6907e7d22668c8a6ed9080ba15a9b71b199c754346105e69e540e07c347bd,2024-10-31T13:35:05.287000
|
||||
CVE-2024-21209,0,0,09a10e210e54f395a42456e8f1afac7dc21db5e4c2e5e9d4c0f4a12f07e14076,2024-10-16T20:44:58.323000
|
||||
CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000
|
||||
CVE-2024-21210,0,0,a4cdc2dd66c61fd543ca03dfb8ec0a55173e93be90bac59938a3a7fbec016519,2024-10-16T16:38:43.170000
|
||||
CVE-2024-21211,0,0,f465ab0e42833415909a4c1859e12f1e87e9a700b0019d86a8fe8746801653dd,2024-10-16T16:38:43.170000
|
||||
CVE-2024-21210,0,1,9dad798a1dcc454c85da1b731c21bb29a6be116baa9cd19c5a6bf09bdc5d89b2,2024-10-31T13:35:06.037000
|
||||
CVE-2024-21211,0,1,9b0873836fd6e9f35822ed898c3df9af35cf9b62fb64aaa84ed5cf247492c359,2024-10-31T13:35:06.843000
|
||||
CVE-2024-21212,0,0,19f687ae812c0e698f3f0e8daad4c738a294b64f047163a3f6c2379dc26312f5,2024-10-16T20:44:19.233000
|
||||
CVE-2024-21213,0,0,42d1671ecea98024063bd01928cc7c2037a7c665f9b2aa465a872189431111e7,2024-10-16T20:43:51.853000
|
||||
CVE-2024-21214,0,0,e575dd8aa54a53a935c3658f84cd238ad5d3c176b9a1942a7f0e09138fd872d9,2024-10-18T18:16:16.987000
|
||||
@ -244550,7 +244551,7 @@ CVE-2024-2123,0,0,0719ae4bee332af79c93b8620c3a1fe6da02de27a90f1595704940d001e25d
|
||||
CVE-2024-21230,0,0,c4e17944ebc3bfcbdf78b6336940e6a6054992926ab544142906aebeac23eae0,2024-10-16T20:42:35.450000
|
||||
CVE-2024-21231,0,0,36b78c7f1d40d41b87ee14c511c304eaf9286e1b39ae47f4ae34fcf1169219e8,2024-10-16T20:42:13.877000
|
||||
CVE-2024-21232,0,0,d3c11f941e85cc6d35f85f7ba5765b381a26d5c1e4add84f192886aaa77d4741,2024-10-16T20:41:35.300000
|
||||
CVE-2024-21233,0,0,db916875daedb62629bccfe5fb1ce39819ce2a0da14cc99f4bb5c053119755db,2024-10-21T16:17:34.617000
|
||||
CVE-2024-21233,0,1,03119082f7ea7bc8de7a1055e64dac35ff5ed90f9417af24df297361960a091e,2024-10-31T13:35:07.607000
|
||||
CVE-2024-21234,0,0,b3b8ed4e786067e578b55ed1ad884f7dcaf26511a099c1b0304d1e83b0941272,2024-10-18T19:05:00.380000
|
||||
CVE-2024-21235,0,0,e8b8c6826fe22ed257db7bc493fd1c19c482c81b703061b649ee81dc38c96926,2024-10-18T18:30:26.097000
|
||||
CVE-2024-21236,0,0,f3064ccc3b1d0405a68efbf4a4a2fc151335deb597e7bbeb33d75084dfe01195,2024-10-16T20:41:14.010000
|
||||
@ -244568,7 +244569,7 @@ CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217b
|
||||
CVE-2024-21249,0,0,8c8448494e88fa3a51a4461e9a5ac6bad487d7f244a14567a92f93a8fd3bd8b2,2024-10-16T16:38:43.170000
|
||||
CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000
|
||||
CVE-2024-21250,0,0,c3a216316fd161ecf42e4b85935aab4377046a8c65dc40e8a08a09abcd439125,2024-10-17T14:35:19.303000
|
||||
CVE-2024-21251,0,0,29a498ae81d2116872698430d5045b8b8f1f3be886ca38c9c2eaf04efe0450af,2024-10-21T18:00:45.143000
|
||||
CVE-2024-21251,0,1,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000
|
||||
CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000
|
||||
CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000
|
||||
CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000
|
||||
@ -244867,7 +244868,7 @@ CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c5
|
||||
CVE-2024-21550,0,0,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000
|
||||
CVE-2024-21552,0,0,cca88d3958ef8dbde43c3d8aa2af78ed997fde7ae88029225af47b23b037e5fa,2024-07-24T12:55:13.223000
|
||||
CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000
|
||||
CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000
|
||||
CVE-2024-21583,0,1,5ee759afacfac4eacf9b9c2f67334664ec22ef2b0f47b92ba28f55ea8a67006f,2024-10-31T14:35:10.887000
|
||||
CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000
|
||||
CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740afc,2024-01-31T00:15:45.920000
|
||||
CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000
|
||||
@ -245511,7 +245512,7 @@ CVE-2024-22368,0,0,f9c04f74fdefa82c010dcd368da5580ef7cd5ff30628c11bc03132d8ce708
|
||||
CVE-2024-22369,0,0,30b4ed35002a1c9041765935be8eb0a4b2b4296c6df468fe9e2f5061e6b3b9fc,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2237,0,0,8acc771e5420188b33ab0fa565428c5e7a786ced19cedd2d276b0e24b8b2ca41,2024-03-13T18:15:58.530000
|
||||
CVE-2024-22370,0,0,9faa550aecd655dd0c6044075a993cb7fd6340db4b5ed67443b2de43fe28b521,2024-01-12T19:29:18.790000
|
||||
CVE-2024-22371,0,0,65176fb1371180a9135c4e1994516587ff073e07658aacf0b6c50da88df3e9cd,2024-02-26T16:32:25.577000
|
||||
CVE-2024-22371,0,1,5454e849d39d2498395a42edf5d52445cdc985e5174600a9165a6e2ecf1b03e2,2024-10-31T13:35:09.107000
|
||||
CVE-2024-22372,0,0,41a96df2cec3cd9d4b88fe1ba832af86ed0b835682a086e1a6cff274644119c9,2024-08-01T02:15:01.737000
|
||||
CVE-2024-22373,0,0,ee90570c26c3acb48d9fa787d85b6b327edae750fc1f814f1d147a75d6b2e6d8,2024-05-05T03:15:06.740000
|
||||
CVE-2024-22374,0,0,ada482f55322a26063d3cb90e19620c8207cc9786123643d00e235a12ddea029,2024-08-14T17:49:14.177000
|
||||
@ -245769,7 +245770,7 @@ CVE-2024-22873,0,0,3e804664cc070ce55555c4a054f46b8aa2f31d8d94dcc162e42607997d87b
|
||||
CVE-2024-22876,0,0,2b681eac932c151f8b6d70661e354dac90a6846621aa7fbcc62aabd644cf5d8a,2024-01-25T18:19:25.647000
|
||||
CVE-2024-22877,0,0,240f9475c4adad9f666e1dfbbc8f3731afeed11d7d0ecb60814db8666105f3c3,2024-01-25T17:45:50.770000
|
||||
CVE-2024-2288,0,0,44a5855956b2fb35334f494e61358fff44a28f989d0dcfad2afaa8242c6c8696,2024-10-15T20:31:45.067000
|
||||
CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000
|
||||
CVE-2024-22889,0,1,73eff1b2ef01dcb0e58c8cdd77dd5edc3ee549423578adb4edecf31600fba852,2024-10-31T14:35:11.827000
|
||||
CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000
|
||||
CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000
|
||||
CVE-2024-22892,0,0,1cb70c9bbe2035656f1a61537a281bff8d1269d1ea2645c56c1075af5d2518c3,2024-10-01T19:10:13.467000
|
||||
@ -246899,7 +246900,7 @@ CVE-2024-24622,0,0,8ffdaf8904842470ccf0aae2fb09ea08e7a29fd5e82100db2efa14804572c
|
||||
CVE-2024-24623,0,0,e23522cd90c3f81436f021cc1cee0d90070bf1ffe4505ee298f9391aeae672e0,2024-08-02T00:15:20.637000
|
||||
CVE-2024-2463,0,0,83d524caf02b4808a89c7c61c4da40ddbea3d86f2ddf48f57fe66c47a0e3746d,2024-08-01T22:35:16.773000
|
||||
CVE-2024-2464,0,0,048d096954b98cf766a43ceaec22b42d04ebd096b39362170ba590c40b4c8e8e,2024-10-30T19:35:10.350000
|
||||
CVE-2024-2465,0,0,6230da2d3a7d355f9109bcbe86ce790145cd318aa89b33fca16121fe02380d5a,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2465,0,1,aa987313de51b9d52428b619bf3978552bad48bc9efb928e37f8628f94028d68,2024-10-31T14:35:14.937000
|
||||
CVE-2024-2466,0,0,48c155e64096c9b91823c31630eed3e83a40f2e8d8db10b3ec7c533a068ba102,2024-08-23T19:35:12.650000
|
||||
CVE-2024-2467,0,0,9bcf217419e076743a229c7d9329553030b624f85cef7b05ba0694abd37301e6,2024-04-25T17:24:59.967000
|
||||
CVE-2024-2468,0,0,f5fa0f4e21305851a5ed43e2730a4e0c2e70e0ee8b201aed06c129c3eb28843c,2024-03-25T01:51:01.223000
|
||||
@ -248442,7 +248443,7 @@ CVE-2024-26731,0,0,a0b35e80e7d711c60a97912dc302c5db34b4fd9235fbfe456f2513f7ece65
|
||||
CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26733,0,0,646af548b9533cc8bde386b28e554214eab8f2a020503960c0d1f100df49ab2b,2024-06-25T23:15:25.030000
|
||||
CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26735,0,0,d4fdb80993506f8793d7d45fbcf402a31a5bfb8eaeeab9d78673b76426282335,2024-06-27T12:15:20.317000
|
||||
CVE-2024-26735,0,1,7afe0996673efde5a6585f2186b8a08bb5ef98d3542cccab732c4df20b91e8aa,2024-10-31T14:35:12.657000
|
||||
CVE-2024-26736,0,0,a562229f2b02fc6cec76f3673034e8ce7378dc0d0fc6cbaec0df447d9263eebb,2024-06-25T22:15:21.543000
|
||||
CVE-2024-26737,0,0,0eebf05ac9670a7b6624c0152880292a6d84adf09232bb7ee2becab2991f6bad,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26738,0,0,3ed173e742b2f1ef480700b80fac0353c8315c8c73b558ad6f8306db1c647ea2,2024-04-03T17:24:18.150000
|
||||
@ -249778,7 +249779,7 @@ CVE-2024-28269,0,0,b7dba037dfa057d99dedf14ed710d84a658c9775dd875bb28a1c5e4a54714
|
||||
CVE-2024-2827,0,0,8a3b8a600b66b6a1d493b06795e5ff420fded15847345b5fd4692002caac1e89,2024-05-17T02:38:33.003000
|
||||
CVE-2024-28270,0,0,d31e1c2434769794f7fdbd96bb87b1e9def96007379aac5531dfd1dd843aefb6,2024-08-01T14:35:06.503000
|
||||
CVE-2024-28275,0,0,7f204621f55876799e4a0739675d5f90796a416c553e1fed23a049073a997181,2024-08-01T13:49:02.517000
|
||||
CVE-2024-28276,0,0,896aecad1efc32d8d7d4be681490a5d3b704ace3d21bddf1f6c90eed4ecf91d2,2024-05-14T16:13:02.773000
|
||||
CVE-2024-28276,0,1,cf16374148522979479e183cab9fa2a9dd828629a92012e2621ec5f88dc5a891,2024-10-31T13:35:09.900000
|
||||
CVE-2024-28277,0,0,11d55096db4a6f8daf8d5b5c78d2c8d6c9326505ca094e2c49ca8ad7bf77760d,2024-05-14T16:13:02.773000
|
||||
CVE-2024-28279,0,0,55b3ccd94f211aef8d797e18d612a2f101844bd7f75e59dedcf73508a0cb187d,2024-07-03T01:51:33.390000
|
||||
CVE-2024-2828,0,0,8900d844f8cfc7f7690e29cda848c134f6d2f92cdafcde758804b06ac18f0c75,2024-05-17T02:38:33.097000
|
||||
@ -250573,7 +250574,7 @@ CVE-2024-29730,0,0,b186c5b3880379c585659498d231a4340abc326b0fc3ca68ca70958057195
|
||||
CVE-2024-29731,0,0,68b136b744379f26748e41e0fdbaa75d019b3aa6b49c48f975004138369bd863,2024-08-30T15:49:30.047000
|
||||
CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710f0b,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29734,0,1,10f1f3064be9a005469469edccba59e0f65e741cf2f3f27a194968904d4079ee,2024-10-31T14:35:13.830000
|
||||
CVE-2024-29735,0,0,a76efb6a52b5ea1ac6fea742527db9da26fd73b24e7a91a20242bea9de6c3b0d,2024-08-29T20:36:39.460000
|
||||
CVE-2024-29736,0,0,5b51c834110c4ab0fba6db5636bf570f371288eeb5e87d8fc00ae6c266b9181d,2024-08-22T17:31:48.980000
|
||||
CVE-2024-29737,0,0,773c8720c44afb54cbbd0c12354c2f0a043cfa72e5f75a21b0108ef944307c03,2024-08-01T13:49:34.853000
|
||||
@ -255191,7 +255192,7 @@ CVE-2024-35915,0,0,4b8e80b7e0df701bf5661f81d3a455421f102d76dba1c849ae68cf406ec48
|
||||
CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a1ac,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35917,0,0,ef28657905524f9b7f229abe3cf11569c21934c08ac9147215aa72d97ba1ce78,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000
|
||||
CVE-2024-35919,0,0,66b4b91338f8b7ffda2030b5d3119a1a7da8e23e145544a97e13dd368dd257ef,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35919,0,1,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000
|
||||
CVE-2024-3592,0,0,06f19b0f4030aa5db1e2c8d8139272dad226c0945ae251432ae728d2bb8e4467,2024-06-07T14:56:05.647000
|
||||
CVE-2024-35920,0,0,e038127788e84b65006b7bac3b3d638e07acf776aced57ca59ab8396cc9131a0,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35921,0,0,86f3f43aed64babe95e54be060b922943333fbafaebdf08ad2eaefa3d9aa11af,2024-05-20T13:00:04.957000
|
||||
@ -256016,7 +256017,7 @@ CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7
|
||||
CVE-2024-37084,0,0,e8df0694fdec2710f267b23abcc1607a09f45be7ad027071682046814f69bbe8,2024-08-26T16:11:27.507000
|
||||
CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000
|
||||
CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37087,0,1,43aed8bcf7bf19587f693af8d68aefcbb6d8364f5ad3ee6823f45607d542a0c4,2024-10-31T14:35:15.630000
|
||||
CVE-2024-37089,0,0,4079e469a0b9c8eff7513f19c004b5889c685b5a744b48949620385f99d2cae6,2024-08-20T20:15:43.643000
|
||||
CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000
|
||||
CVE-2024-37091,0,0,b626c72d25f84f9219d28a104cd2d18472b59c6cd0ed8347ffeee08b9e2b4719,2024-10-20T12:15:02.977000
|
||||
@ -256503,7 +256504,7 @@ CVE-2024-37846,0,0,0a771dd4297ecb7d6b521e019dc9e4e37262258e8937f6940b3754658324b
|
||||
CVE-2024-37847,0,0,4a1f07d2568b8def7f98c67a4d243c1afbe30f9de21a43af0fc95c8f1b1da6c5,2024-10-29T18:35:06.983000
|
||||
CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000
|
||||
CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000
|
||||
CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3785,0,1,a59b207d5a568fe95d1650fae2ba42ab1a2108a4cbb162f57fceb4094d5da52c,2024-10-31T14:35:17.530000
|
||||
CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000
|
||||
CVE-2024-37856,0,0,9302de460a4c7027c66921d13cd3a230b84232625cf00fe0e308c5a1ad11468a,2024-10-30T20:35:22.590000
|
||||
CVE-2024-37857,0,0,bbbf66c5ae4e5b03452facf52d12302119ab17f8211a271346d66e2be4704782,2024-08-01T13:54:22.703000
|
||||
@ -257918,7 +257919,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8
|
||||
CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
|
||||
CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000
|
||||
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
||||
CVE-2024-39708,0,1,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000
|
||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||
CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000
|
||||
CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000
|
||||
@ -258741,8 +258742,8 @@ CVE-2024-41143,0,0,e8899d473fa3a8ea11660d6f2ba88aff617e29347ef6b002447e4155241e1
|
||||
CVE-2024-41144,0,0,a99ced5ff39791199789f8b7404cf70d5ada3bff5c6dc65a7803cc1121e905e5,2024-09-04T17:25:48.123000
|
||||
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
|
||||
CVE-2024-41150,0,0,f29e18c57230cbc3b76f00f0b7fe1001f55bb08bda82442884bf5072f9726b00,2024-08-27T14:35:09.013000
|
||||
CVE-2024-41153,0,0,9bc9accd9b726d5fba594979c6c735fc93239f267ae9c2deed394ca446093523,2024-10-29T14:34:04.427000
|
||||
CVE-2024-41156,0,0,ca86062aae39225a6c7806ef2ef661a811a46a081d50c06c4bddce682b10ff55,2024-10-29T14:34:04.427000
|
||||
CVE-2024-41153,0,1,dafb89be97200d81ac5d60fe35f2a445ceac861b85bb58f78c85df804ae27889,2024-10-31T14:37:48.533000
|
||||
CVE-2024-41156,0,1,c0093084afabf89304f87b01eeae3792e9c6bc73b0c168ddc8c792fe08c67a19,2024-10-31T14:49:39.800000
|
||||
CVE-2024-41157,0,0,7a282611d45c2fbb6f2dc936e4617dedd23e7f4d2ca4cbf354d2844aba4fb55d,2024-09-04T16:30:40.737000
|
||||
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
|
||||
CVE-2024-41160,0,0,4405f1fa554ba7d9df44bc4bbb96ea93e068b229b76d85cd7934b300d79543d0,2024-09-09T12:21:53.383000
|
||||
@ -259834,6 +259835,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95
|
||||
CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000
|
||||
CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000
|
||||
CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000
|
||||
CVE-2024-42835,1,1,be8a15032d8b7e2767c06844b2c610cc3d4f02c091e6e878f9c0ddb188a4332c,2024-10-31T14:15:05.610000
|
||||
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
|
||||
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||
@ -260405,7 +260407,7 @@ CVE-2024-43791,0,0,2bd2bc46ca8d9e06de5a015638de614e582ba6d4dc15a542dfa7ce0b054d1
|
||||
CVE-2024-43792,0,0,5dfd532d611c334ef7463fb3ed0a1e3a14dcc1ccfb2dfd854fb0c34158bf7c9e,2024-09-16T16:26:18.063000
|
||||
CVE-2024-43793,0,0,28f7d2c5a02a2888bcaeed49e9492d6763c121916beec115ab73cecaf6424a4a,2024-09-16T16:28:45.233000
|
||||
CVE-2024-43794,0,0,012282e0e09ace65c9817dd3efc52ee0130360e07c8e8e9b08cf3adc91c29f00,2024-08-23T18:46:31.730000
|
||||
CVE-2024-43795,0,0,7be53d0aea9a821ac901ee206df09b530ade8b5a6941bca83727a0eababcf814,2024-10-08T14:01:16.883000
|
||||
CVE-2024-43795,0,1,1eb397f1a4685be765f7216c060bf7d75e320a8df0ab172a3d0c57ebf1869276,2024-10-31T14:15:05.723000
|
||||
CVE-2024-43796,0,0,7eab0f98e9cc4b529e67976e2e3e5108a50bbe0663aaa9206477dd6bf141453b,2024-09-20T16:07:47.997000
|
||||
CVE-2024-43797,0,0,93bf50c44e46a55d09c378845b20b036c0751fae29a6426402d2fc53d3595af8,2024-09-13T19:49:33.803000
|
||||
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
|
||||
@ -260781,7 +260783,7 @@ CVE-2024-44197,0,0,96a67bc53eb67814f0144909bf31b5b2b095c5319ef55687f42e9a0c6356d
|
||||
CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000
|
||||
CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000
|
||||
CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44203,0,0,82e70503928c2f0143832c7001b9a73e2a1722c9e20eee754ed686cb01d257cc,2024-10-30T21:35:06.443000
|
||||
CVE-2024-44203,0,1,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000
|
||||
CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000
|
||||
CVE-2024-44205,0,0,e33dfb139154886257e161081c01cc4f82c900563ff347637d97391b0de316f3,2024-10-29T15:27:08.630000
|
||||
CVE-2024-44206,0,0,cce809798797c4f27f98da648a0cb34cc37e85900206791dd0f0bb97bf5465c4,2024-10-29T21:35:15.080000
|
||||
@ -262193,7 +262195,7 @@ CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816
|
||||
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000
|
||||
CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000
|
||||
CVE-2024-46977,0,0,5fe07ded9851f376d26307ff56bac27430f6dca48e690a88893ad782618f46ca,2024-10-08T14:02:04.173000
|
||||
CVE-2024-46977,0,1,f40fb7d824bf80dc3cd6ed4824964dec6ba1fc6bbe8e124dca22142b9c8356e4,2024-10-31T14:15:05.870000
|
||||
CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3ef1,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
|
||||
@ -262542,7 +262544,7 @@ CVE-2024-47525,0,0,8339d8a4218b69cc82268cff155d0d4fed2713f73ada7785c822ea6568feb
|
||||
CVE-2024-47526,0,0,eb16a10d8f74cde3579603749ff3cfb381488e1ecf42d3c0633b2eaac9e4c5e1,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47527,0,0,6448adfc6fe781d292ba5a9887205495de1e6ae1fd7107635f3ac2f0d1da5da0,2024-10-07T19:08:41.467000
|
||||
CVE-2024-47528,0,0,f8a40bc5f3a1abfe246d4cda70316c63fc753979863ed711468abfa611b23cd8,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47529,0,0,34283f2d46f63958e88a4c9e1bf6051bd39afb28245a7d6e6fcfb00459d368e2,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47529,0,1,31311b0fa29b7b41c64bdb815a27dee29e2a143468e05f041223859f38dd766c,2024-10-31T14:15:05.980000
|
||||
CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000
|
||||
CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0c29,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000
|
||||
@ -262850,13 +262852,13 @@ CVE-2024-47964,0,0,27bec73a2c0b899bfe6fd9ec81da4b9100f04cbc9375a6fcf7ce2251e7877
|
||||
CVE-2024-47965,0,0,f3e570fde495e0ba110bc62b328022dd6ec82c923d79b077bc2509e9e6dad0ab,2024-10-17T14:36:54.353000
|
||||
CVE-2024-47966,0,0,48de3a5cb5e680eb92b755d3c4d9642426c8812a20434d6c33a3c9f7a2c10b93,2024-10-17T14:36:15.057000
|
||||
CVE-2024-47967,0,0,148db097bc94b263302a99970c2cc0afadc291afc172aa4c4074880ce53625ae,2024-10-18T17:15:13.133000
|
||||
CVE-2024-47968,0,0,4fff8938b14b264b8114ea788e4702165e516bca6198626b64c35403b2d1f728,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47968,0,1,7e915c4ce8b4cc184858ffd5de47da321d6409bef5e0e59e44252c5892ef10bd,2024-10-31T13:35:11.047000
|
||||
CVE-2024-47969,0,0,cca9607f354104b423066ece0dc4ef5cb988716d253447be49d5f3344fccc48a,2024-10-10T12:57:21.987000
|
||||
CVE-2024-4797,0,0,0e4696a184ba6dbc49929e4ce9c47a26c4e841b1ccb4a5975e3c36e38faab420,2024-05-17T02:40:37.683000
|
||||
CVE-2024-47971,0,0,534d5d54d79d2918bba754e46b72e551e8a383f4547c31054409d42c679203f5,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47972,0,0,e9b35fd24d99baa059963425b162ad00cc0a462f2ffbc38c3c5c9d106848940f,2024-10-17T22:15:03.113000
|
||||
CVE-2024-47973,0,0,3a0aa017e97ae06d1cf3d1bc086b0dc9ef048219777341e2d17989996ce6923a,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47974,0,0,51455e6b048b0398eafc61f4d504b476c3faa4157c466f95fab734394a6db16e,2024-10-18T17:15:13.283000
|
||||
CVE-2024-47974,0,1,cbdc8a9a2e83552d2f94c63a65f1c8a65099c8459c544321dce3d0dd12f5f7b2,2024-10-31T13:35:11.790000
|
||||
CVE-2024-47975,0,0,f2fcfe13d795ec593199978d9bd2ccef6b74c32b8404475a2a1a928dd974eded,2024-10-11T20:15:05.143000
|
||||
CVE-2024-47976,0,0,a72eec2fad6d99c6f2545eb3ceeea90e4e1aac1ad9db1adc6f42139b98b981fa,2024-10-17T22:15:03.210000
|
||||
CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e0106e,2024-06-04T19:20:49.813000
|
||||
@ -262904,8 +262906,8 @@ CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdad
|
||||
CVE-2024-48093,0,0,3a7987a92b4bbcd1b7c1a073011bdf20dd6c9421d9d62098928a3b1fee1c0fb3,2024-10-30T21:15:14.337000
|
||||
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
|
||||
CVE-2024-48107,0,0,c40d4300b831a33464aba579f0b2928bc6562dbbd091bed8c83ce565b9877e14,2024-10-30T17:35:10.860000
|
||||
CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000
|
||||
CVE-2024-48112,0,0,e391e983f6fc14f90bf41f4aa7f6aa531f6a60b01f0489fc354746385bc0840a,2024-10-30T21:15:14.393000
|
||||
CVE-2024-4811,0,1,edf02d3d2820d3eb4d79512dbe6202ba3ad4c52de06ce4f4dc329075ef4f69f3,2024-10-31T14:35:19.917000
|
||||
CVE-2024-48112,0,1,b99393ccbe63d75e4cc268eae784380b2239c4159470317e34354a4c2c1781ea,2024-10-31T14:35:19.053000
|
||||
CVE-2024-48119,0,0,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000
|
||||
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
|
||||
CVE-2024-48120,0,0,ac048d30db75e88feb91392efffb6e9bab5a19e9dc21f5cdbbca8a6a240da1c5,2024-10-29T20:57:53.360000
|
||||
@ -263437,8 +263439,8 @@ CVE-2024-49631,0,0,5230732de6a35313190c213cb431a622620f306560265c0ab55df925f02e4
|
||||
CVE-2024-49632,0,0,b6aa910a6238793d01d711b67c611605efa05142f4f99d683b1ce55d6a3eae5d,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49634,0,0,de32cef9ec4be91fae2af05a390224a872c2af3d4660f72a891aa49fb4d4c85b,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49635,0,0,956efdcd813edd8b0c50992e432c2791dae865785bdc2e31ed9219302f43b26d,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49636,0,0,3c5cd3322412893431ab599636ad02b1e97a1da1ded89c93d6a7bb6f1d29b087,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49637,0,0,2dc745c056a34cece786d276c398bf69e1907ff02375dd8fb09ffac8208e14dd,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49636,0,1,255fdd04384bf8ca2562d97a4c5e177b4e9b4aac97c2ca451b2afae414b394c3,2024-10-31T14:51:06.170000
|
||||
CVE-2024-49637,0,1,e01c6345fd816ce1767b0513889e9638b57f60a23829522448e5341cbe17e0fa,2024-10-31T14:52:42.927000
|
||||
CVE-2024-49638,0,0,d01827d0ee488b9070f09ced5eb1c69a68c899bea097d695348d27feae15ba2f,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49639,0,0,1eeafd0406a64062b1bfa5d7382f0a0e30de4a38ffa7fec244a4d5f8a12a5359,2024-10-29T14:34:04.427000
|
||||
CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000
|
||||
@ -263659,7 +263661,7 @@ CVE-2024-49977,0,0,1fa968b4b6ffe89f61827f270e7cc697b9e8aa1241eadd73e01f50d4c563e
|
||||
CVE-2024-49978,0,0,f3d61134b9c5d10fd2ab4e39b19ef4b5767227435be40207fd8a06c0cd6a1116,2024-10-29T18:01:43.080000
|
||||
CVE-2024-49979,0,0,f8baa0b1d12557a520a3d58ee95542c5e5816ff4eafb95d3e16fe1836897fae6,2024-10-29T18:02:14.197000
|
||||
CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000
|
||||
CVE-2024-49980,0,0,1b7f876e1e74006c4cbc36f26a364fbc1043d115c2b25809299afdde070e9fbd,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49980,0,1,01da24b6adba0cc33e730063ad71da50f820538725b0e9d8f1aff7847a16b187,2024-10-31T14:58:27.613000
|
||||
CVE-2024-49981,0,0,be8906564b57b0b9a043fe42c3d38b8548c4c2cbb0858120a7fa2fad8e2b8ee7,2024-10-25T14:56:40.073000
|
||||
CVE-2024-49982,0,0,1ae51728dfad6dc77da9a9af15e226c1ee61eeb30c84012b23419f82a91617a3,2024-10-25T15:08:03.790000
|
||||
CVE-2024-49983,0,0,9274e8e7a27d798fd4c38e26ef366e23490e6efa1ece0fb652aec8a9e521a033,2024-10-29T16:23:31.943000
|
||||
@ -263884,17 +263886,17 @@ CVE-2024-50475,0,0,36f0716dcab36685f56e76af410832e5c6a209caa40371aa54bc3fa36e47c
|
||||
CVE-2024-50476,0,0,03d0282cf6fe1ea02e5a0236d992f96a633bb2360c708089005fbef43f31b2f1,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50477,0,0,1eb2d0ec96fdf2e84fa349e4821a23717cbd3586359498a97ff2ce76b3c3b98c,2024-10-31T00:24:28.160000
|
||||
CVE-2024-50478,0,0,5004f952218ac00d59752232714de2cfa65ca0b36f3a44b13e8a91d54761ed2a,2024-10-31T01:44:47.407000
|
||||
CVE-2024-50479,0,0,e9f5da762cccd3d6b96aaa1a931d48759479a75251159238dd8b5a49149bddce,2024-10-28T13:58:09.230000
|
||||
CVE-2024-50479,0,1,7162c3be7774651a0d6aefe442c76146159aeea124befdbc0802a814f3f54e70,2024-10-31T13:02:20.793000
|
||||
CVE-2024-5048,0,0,1988e01de8a973c004f1ed34b391d1facc45cbb912e138052c0f7d6310398087,2024-06-04T19:20:57.353000
|
||||
CVE-2024-50480,0,0,9c6e44b2ad8cf235f8be06fa94bbc4d18226aff4b3790f429ce6a0c7315d34ce,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50481,0,0,5405cf2423a54dd83747cd2bd6fe4fee0c2c27112bd62081838b851d73fdc674,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50482,0,0,4c46db4544a2adb3c3153011ed323f9f2e4e58f44e74fcdad316d5a91a78a6b5,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50483,0,0,dc34782ca3b1404a071528e59ae2af91e68795a468368cf730f902ebe6c7f1c8,2024-10-28T13:58:09.230000
|
||||
CVE-2024-50483,0,1,7937b37074fa5a3b3b31b683f826eca8d5f5f9009eb2515563ff23d6802ab280,2024-10-31T13:12:11.813000
|
||||
CVE-2024-50484,0,0,fb5831468b35cba53c55a495474b64b7a8b6ec35859af8dabef2b71806e20ffa,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50485,0,0,9ed12dd296d38fb6cbdb7c8752c66128ce6bd15ef5deace517d3530a40748c87,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50486,0,0,2469de3018a70da3d3ba9f22de0bba39364400ac5239e2e8af62e693ee3e1607,2024-10-29T16:07:03.833000
|
||||
CVE-2024-50487,0,0,44b8467c1e55727f7935d9f24cdee5667d7a113233aebc17eeecc3d83f2f2ef5,2024-10-31T00:17:48.153000
|
||||
CVE-2024-50488,0,0,40d73b73129fb31724f8cd6a2898439824447d424f82ee41cc22f4a5e1f15204,2024-10-28T13:58:09.230000
|
||||
CVE-2024-50488,0,1,92b5881a6f09aa9100cab7be6bd104b49f594c60708054bde44c913395051e13,2024-10-31T13:19:42.087000
|
||||
CVE-2024-50489,0,0,052390e832091de8b4e86a61a6aab7bbd00e0054fa2778c6e9529e093b8eee4d,2024-10-31T00:16:07.977000
|
||||
CVE-2024-5049,0,0,5a3f3841afc31b2308320d9a79229ff3b2e78886b62ff0b6a021008032b5bd1d,2024-05-17T18:35:35.070000
|
||||
CVE-2024-50490,0,0,df5308d43aea0811e64f7f34c1741602a9a3be24440d41ba19ac9b091f537e4b,2024-10-29T14:34:04.427000
|
||||
@ -263904,11 +263906,11 @@ CVE-2024-50493,0,0,1b86e41beced3d67b90f334d27db11237a706dc3447bbfcf4216e988a60b9
|
||||
CVE-2024-50494,0,0,9569aa1d34f7229fbd2091c58d08802086f733f20697c3538e6874d12444dba9,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50495,0,0,dbb01d9e1ce3a0d2a398c602b6c55fb03dd093568dcc101086f2d71c70104b40,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50496,0,0,8759135a902bd5e1d547f7a30947e1e84eb491a378f48e131323791258ffeb16,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50497,0,0,235457ebd93f01c24a3c8c9023bb2f110341f8129e7743d0ff22d3f8a38b91aa,2024-10-28T13:58:09.230000
|
||||
CVE-2024-50497,0,1,1dbbcb1307a2bd22e56a95aa07cf54debd2e092e146c406bfc7f1289bd2f8b66,2024-10-31T13:55:14.493000
|
||||
CVE-2024-50498,0,0,33bc7bd73e04ec5df59dd34db418e6cd48c39a64b196d0dbfa582dde1e112356,2024-10-31T01:16:41.317000
|
||||
CVE-2024-5050,0,0,619081545361528557d824107c37f32918188d04adf33ba524a4859e2e6341a3,2024-06-04T19:20:57.457000
|
||||
CVE-2024-50501,0,0,3009841a02c80bd32c281df72b6a52b29e26d99d130d3c37662482082652f337,2024-10-28T13:58:09.230000
|
||||
CVE-2024-50502,0,0,b6996108031602b4520dc09d5c4426949241742b74714ef43301340cf3d6368f,2024-10-28T13:58:09.230000
|
||||
CVE-2024-50501,0,1,9730280cc1123cc5def2850ac443e575973aeb1d6cf344927e14d300de189cc9,2024-10-31T13:51:19.780000
|
||||
CVE-2024-50502,0,1,9ddcb622b0ed4b183c8b5d25d4afba00562ea225fa79fd5c791293fd23c03b19,2024-10-31T13:43:03.177000
|
||||
CVE-2024-50503,0,0,13c77bbea684ac03d6c9bb023e29846b9a7ca81d92cfeb2c350eb96545279306,2024-10-30T08:15:02.813000
|
||||
CVE-2024-50504,0,0,64e9ff9f208d92ea57b05e1aa61760bf3f7128f163c70b67451830c2c24c1ee2,2024-10-30T08:15:03.077000
|
||||
CVE-2024-50506,0,0,9ed5dec08bae9cc3d4b760cfa2f2e993be26ea625e5a3d4e0a6ef704f5e10724,2024-10-30T08:15:03.323000
|
||||
@ -264014,8 +264016,10 @@ CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83
|
||||
CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed4992761,2024-10-17T18:32:52.030000
|
||||
CVE-2024-51242,0,0,b4007dc67a4099908026fdd6fb5ef79aa0425c2418a8020d0d34e562fd33b09f,2024-10-30T21:15:14.793000
|
||||
CVE-2024-51243,0,0,e1b6753c3b95e40f2954963da9a99f9796281537891caa48bb3073e17240b4a3,2024-10-30T21:15:14.860000
|
||||
CVE-2024-51254,1,1,44e30a8302347264ab083b91f41f464ee9745a1574099dc7491e6ede61a22b42,2024-10-31T14:15:06.140000
|
||||
CVE-2024-51257,0,0,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000
|
||||
CVE-2024-51258,0,0,8552984991114543bb72db401d789b000ecda7ab1e49c15b21f3ab9c1d4b407b,2024-10-30T18:35:17.040000
|
||||
CVE-2024-51259,1,1,6d702cbaf70c10cfdda0a7abce448d3145a25d2256f8a60137d2335418de4f22,2024-10-31T14:15:06.260000
|
||||
CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000
|
||||
CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000
|
||||
CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000
|
||||
@ -266474,7 +266478,7 @@ CVE-2024-8006,0,0,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db
|
||||
CVE-2024-8007,0,0,31efab1ff2bdd67996604f02ecd2084f262495a161d3f96e0300d65972c02a8d,2024-09-23T17:15:13.813000
|
||||
CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000
|
||||
CVE-2024-8012,0,0,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000
|
||||
CVE-2024-8013,0,0,72ace39afd49731c2207f6529be903f01045222838636ef4d4fd68117b460eff,2024-10-28T13:58:09.230000
|
||||
CVE-2024-8013,0,1,9be8d9fe1b092d48efc45b77584d7cef4ac4b750dd4ded7fd64e3d7634f2a9dd,2024-10-31T13:33:03.953000
|
||||
CVE-2024-8014,0,0,df95f93b033a08a5d0d50b2c821a302b2eb801899f165ddc91a99907822a3901,2024-10-15T14:54:09.580000
|
||||
CVE-2024-8015,0,0,6f5d063f2a73fa89cddbc983a389019b58f4aaccd5653d67706fe48a0cb636ff,2024-10-15T14:55:12.340000
|
||||
CVE-2024-8016,0,0,2657510d64afe84d5852969b1e9344475f01e752907a5430dff930bc1f486129,2024-09-03T14:51:16.470000
|
||||
@ -267109,6 +267113,7 @@ CVE-2024-8924,0,0,329d97b4ddecec7a888f06c50c8c22d832c133b4f48330aff42c5aebe55b04
|
||||
CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000
|
||||
CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000
|
||||
CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000
|
||||
CVE-2024-8934,1,1,4476715996367104e5b45ab5e682dea180869422f2a6c8aa1565264f21f9aec1,2024-10-31T13:15:15.040000
|
||||
CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000
|
||||
CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user