Auto-Update: 2024-10-24T16:01:01.359739+00:00

This commit is contained in:
cad-safe-bot 2024-10-24 16:04:02 +00:00
parent ab8b0c650b
commit 1aa41ff864
52 changed files with 4922 additions and 337 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3446",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-11-09T19:15:10.513",
"lastModified": "2023-05-03T12:16:24.030",
"lastModified": "2024-10-24T15:35:04.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3448",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-11-09T19:15:10.837",
"lastModified": "2023-05-03T12:16:24.683",
"lastModified": "2024-10-24T15:35:05.777",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3449",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-11-09T19:15:11.003",
"lastModified": "2023-05-03T12:16:24.953",
"lastModified": "2024-10-24T15:35:06.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48957",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:07.090",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:41:15.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dpaa2-switch: corrige p\u00e9rdida de memoria en dpaa2_switch_acl_entry_add() y dpaa2_switch_acl_entry_remove(). Es necesario liberar cmd_buff cuando ocurre un error en dpaa2_switch_acl_entry_add() y dpaa2_switch_acl_entry_remove()."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/4fad22a1281c500f15b172c9d261eff347ca634b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/54d830e24247fa8361b016dd2069362866f45cb6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/785ee7a82297e1512d9061aae91699212ed65796",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15.83",
"matchCriteriaId": "795CDE1F-2EDA-49C4-B379-49E4F81417E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.13",
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4fad22a1281c500f15b172c9d261eff347ca634b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/54d830e24247fa8361b016dd2069362866f45cb6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/785ee7a82297e1512d9061aae91699212ed65796",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49028",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:13.627",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:51:45.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,138 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ixgbevf: Se solucion\u00f3 la p\u00e9rdida de recursos en ixgbevf_init_module() ixgbevf_init_module() no destruir\u00e1 la cola de trabajo creada por create_singlethread_workqueue() cuando pci_register_driver() fall\u00f3. Agregue destroy_workqueue() en la ruta de error para evitar la p\u00e9rdida de recursos. Similar al manejo de u132_hcd_init en el commit f276e002793c (\"usb: u132-hcd: fix resource leak\")"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/7109e941099244cc876a4b3cb7a3ec79f104374a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/8cfa238a48f34038464b99d0b4825238c2687181",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/c99671d4699dcf90d6939923c8fe8a8918e140b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/f166c62cad798c53300b4b327e44300c73ec492d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-459"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "5.10.158",
"matchCriteriaId": "EAADDFA5-C471-491B-80AB-03377F1AA6F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.82",
"matchCriteriaId": "0DC20DB6-73C1-4465-B931-117BFB8EBB02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.12",
"matchCriteriaId": "D6D56E90-F3EE-413D-B3E2-B518932F0C7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/7109e941099244cc876a4b3cb7a3ec79f104374a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8cfa238a48f34038464b99d0b4825238c2687181",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c99671d4699dcf90d6939923c8fe8a8918e140b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f166c62cad798c53300b4b327e44300c73ec492d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49029",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:13.690",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:59:48.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,194 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (ibmpex) Se corrige un posible UAF cuando fallo ibmpex_register_bmc() Advertencia de informe de Smatch de la siguiente manera: drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn: '&data->list' no se elimin\u00f3 de la lista Si ibmpex_find_sensors() fallo en ibmpex_register_bmc(), se liberar\u00e1n los datos, pero data->list no se eliminar\u00e1 de driver_data.bmc_data, entonces el recorrido de la lista puede causar UAF. Se soluciona elimin\u00e1ndolo de driver_data.bmc_data antes de free()."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/24b9633f7db7f4809be7053df1d2e117e7c2de10",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/45f6e81863747c0d7bc6a95ec51129900e71467a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/798198273bf86673b970b51acdb35e57f42b3fcb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/7b2b67fe1339389e0bf3c37c7a677a004ac0e4e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/90907cd4d11351ff76c9a447bcb5db0e264c47cd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e2a87785aab0dac190ac89be6a9ba955e2c634f2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e65cfd1f9cd27d9c27ee5cb88128a9f79f25d863",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f2a13196ad41c6c2ab058279dffe6c97292e753a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.24",
"versionEndExcluding": "4.9.335",
"matchCriteriaId": "C69D4C1C-5531-498D-BF16-99EC54FDEB19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.301",
"matchCriteriaId": "0EE18A3A-1E78-44D6-9FDB-B267E4819993"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.268",
"matchCriteriaId": "04705C94-71FA-46AB-AF73-B551892B0EBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.226",
"matchCriteriaId": "274F5087-5805-4D03-8C74-8517300658F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.158",
"matchCriteriaId": "D0FB1AF1-0A0B-4419-B25F-C61F17380E18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.82",
"matchCriteriaId": "0DC20DB6-73C1-4465-B931-117BFB8EBB02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.12",
"matchCriteriaId": "D6D56E90-F3EE-413D-B3E2-B518932F0C7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/24b9633f7db7f4809be7053df1d2e117e7c2de10",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/45f6e81863747c0d7bc6a95ec51129900e71467a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/798198273bf86673b970b51acdb35e57f42b3fcb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7b2b67fe1339389e0bf3c37c7a677a004ac0e4e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/90907cd4d11351ff76c9a447bcb5db0e264c47cd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e2a87785aab0dac190ac89be6a9ba955e2c634f2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e65cfd1f9cd27d9c27ee5cb88128a9f79f25d863",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f2a13196ad41c6c2ab058279dffe6c97292e753a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26077",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-24T18:15:23.377",
"lastModified": "2023-08-01T18:41:29.353",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-24T15:35:08.163",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39425",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:16:02.220",
"lastModified": "2024-02-14T15:01:46.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:44:37.993",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html",
"source": "secure@intel.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.4.33",
"matchCriteriaId": "A293EC22-0192-4D4A-BF13-BCFDA04A3D04"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41231",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:16:05.870",
"lastModified": "2024-02-14T15:01:46.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:19:24.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00913.html",
"source": "secure@intel.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:assistive_context-aware_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.0",
"matchCriteriaId": "70DAF413-C420-4C01-8F6E-9B0757C9B9D4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00913.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41252",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:16:06.097",
"lastModified": "2024-02-14T15:01:46.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:18:36.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01000.html",
"source": "secure@intel.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:quickassist_technology_driver:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.11.0",
"matchCriteriaId": "E31221E1-F286-430F-8C3A-823B5274D0D9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01000.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42776",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:16:06.367",
"lastModified": "2024-02-14T15:01:46.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:00:23.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01014.html",
"source": "secure@intel.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:sgx_dcap:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.19.100.3",
"matchCriteriaId": "C9467F81-346F-4D27-B04C-46DC5EDCA930"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01014.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,44 +2,158 @@
"id": "CVE-2023-52917",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:02.230",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:38:22.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()\n\nThe debugfs_create_dir() function returns error pointers.\nIt never returns NULL. So use IS_ERR() to check it."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ntb: intel: Corrige el error NULL vs IS_ERR() para debugfs_create_dir() La funci\u00f3n debugfs_create_dir() devuelve punteros de error. Nunca devuelve NULL. Por lo tanto, utiliza IS_ERR() para comprobarlo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/16e5bed6c1883b19f9fcbdff996aa3381954d5f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/7cbd6d7fb9ba2be03978809c848e2e50eaeead2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a429158f2e0a7a03eb67fd5e204e1f6735c725aa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/b66bf833e72a1e23d7ccafc0f8f74e80f8c357b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/babba8595d1e5d57313a6187f3e51aceacc6881a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e229897d373a87ee09ec5cc4ecd4bb2f895fc16b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ef7e34237e2612b116a84c9640628a6f7a0d693e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "8A07E653-16C3-4150-BD19-62B6DF148F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.54",
"matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/16e5bed6c1883b19f9fcbdff996aa3381954d5f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7cbd6d7fb9ba2be03978809c848e2e50eaeead2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a429158f2e0a7a03eb67fd5e204e1f6735c725aa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b66bf833e72a1e23d7ccafc0f8f74e80f8c357b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/babba8595d1e5d57313a6187f3e51aceacc6881a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e229897d373a87ee09ec5cc4ecd4bb2f895fc16b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ef7e34237e2612b116a84c9640628a6f7a0d693e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6441",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-02-14T14:16:06.933",
"lastModified": "2024-02-14T15:01:46.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:48:19.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0102",
"source": "iletisim@usom.gov.tr"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unipa:university_information_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-12-12",
"matchCriteriaId": "268167AA-B0EE-4DEB-9CC0-3A3FD8FB0942"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0102",
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10195",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-20T09:15:02.393",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:28:53.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,63 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://asciinema.org/a/2mwkmDqRZfeAYTu5hHre1r4QB",
"source": "cna@vuldb.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tecno-mobile:4g_portable_wifi_tr118_firmware:v008-20220830:*:*:*:*:*:*:*",
"matchCriteriaId": "720E00A3-63B9-4F7E-AD0F-DE862BB9599F"
}
]
},
{
"url": "https://vuldb.com/?ctiid.280969",
"source": "cna@vuldb.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://vuldb.com/?id.280969",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.422994",
"source": "cna@vuldb.com"
"vulnerable": false,
"criteria": "cpe:2.3:h:tecno-mobile:4g_portable_wifi_tr118:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC3CBEF7-F17D-4365-AA92-C2F677B513F3"
}
]
}
]
}
],
"references": [
{
"url": "https://asciinema.org/a/2mwkmDqRZfeAYTu5hHre1r4QB",
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.280969",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.280969",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.422994",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10229",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-10-22T22:15:03.180",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:35:13.163",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Una implementaci\u00f3n inadecuada en extensiones de Google Chrome anterior a la versi\u00f3n 130.0.6723.69 permiti\u00f3 que un atacante remoto evitara el aislamiento del sitio mediante una extensi\u00f3n de Chrome manipulada. (Gravedad de seguridad de Chromium: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-40595",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T06:15:11.703",
"lastModified": "2024-10-24T06:15:11.703",
"lastModified": "2024-10-24T15:35:14.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authentication-bypass issue in the RDP component of One Identity Safeguard for Privileged Sessions (SPS) On Premise before 7.5.1 (and LTS before 7.0.5.1) allows man-in-the-middle attackers to obtain access to privileged sessions on target resources by intercepting cleartext RDP protocol information."
},
{
"lang": "es",
"value": "Un problema de omisi\u00f3n de autenticaci\u00f3n en el componente RDP de One Identity Safeguard for Privileged Sessions (SPS) On Premise anterior a 7.5.1 (y LTS anterior a 7.0.5.1) permite a atacantes intermediarios obtener acceso a sesiones privilegiadas en recursos de destino interceptando informaci\u00f3n de protocolo RDP en texto plano."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.oneidentity.com/kb/4376565/cve-2024-40595-authentication-bypass-vulnerability",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43689",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-10-21T02:15:02.680",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:02:22.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
@ -51,14 +81,79 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://jvn.jp/en/jp/JVN24885537/",
"source": "vultures@jpcert.or.jp"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:elecom:wab-i1750-ps_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.10",
"matchCriteriaId": "FED29C50-A620-4026-9BB7-233EC56A5470"
}
]
},
{
"url": "https://www.elecom.co.jp/news/security/20240827-01/",
"source": "vultures@jpcert.or.jp"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:elecom:wab-i1750-ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "003AB2FC-6B65-46BE-8573-E5B4D1C9E8A0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:elecom:wab-s1167-ps_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.6",
"matchCriteriaId": "7338AD82-5A24-4C16-9454-F11E703C68D2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:elecom:wab-s1167-ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0F8A009-6EDC-4993-B3D5-A0868DC03E83"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN24885537/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.elecom.co.jp/news/security/20240827-01/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Product",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44061",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:02.277",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:40:06.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/eu-vat-for-woocommerce/wordpress-eu-uk-vat-manager-for-woocommerce-plugin-2-12-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpfactory:eu\\/uk_vat_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.0.0",
"matchCriteriaId": "89758386-DB15-4FB6-97C8-AB5F419DA73F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/eu-vat-for-woocommerce/wordpress-eu-uk-vat-manager-for-woocommerce-plugin-2-12-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-45031",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-24T15:15:13.533",
"lastModified": "2024-10-24T15:15:13.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When editing objects in the Syncope Console, incomplete HTML tags could be used to bypass HTML sanitization. This made it possible to inject stored XSS payloads which would trigger for other users during ordinary usage of the application.\nXSS payloads could also be injected in Syncope Enduser when editing \u201cPersonal Information\u201d or \u201cUser Requests\u201d: such payloads would trigger for administrators in Syncope Console, thus enabling session hijacking.\n\nUsers are recommended to upgrade to version 3.0.9, which fixes this issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/fn567pfmo3s55ofkc42drz8b4kgbhp9m",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47325",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:03.180",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:43:29.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/multiple-pages-generator-by-porthas/wordpress-multiple-page-generator-plugin-mpg-plugin-3-4-7-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeisle:multiple_page_generator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.4.8",
"matchCriteriaId": "EB0B75F2-9702-4E5D-AC4E-E4C85C985144"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/multiple-pages-generator-by-porthas/wordpress-multiple-page-generator-plugin-mpg-plugin-3-4-7-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47575",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-10-23T15:15:30.707",
"lastModified": "2024-10-24T01:00:01.510",
"vulnStatus": "Received",
"lastModified": "2024-10-24T14:20:16.333",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"cisaExploitAdd": "2024-10-23",
"cisaActionDue": "2024-11-13",
@ -13,6 +13,10 @@
{
"lang": "en",
"value": "A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests."
},
{
"lang": "es",
"value": "Una autenticaci\u00f3n faltante para una funci\u00f3n cr\u00edtica en FortiManager 7.6.0, FortiManager 7.4.0 a 7.4.4, FortiManager 7.2.0 a 7.2.7, FortiManager 7.0.0 a 7.0.12, FortiManager 6.4.0 a 6.4.14, FortiManager 6.2.0 a 6.2.12, Fortinet FortiManager Cloud 7.4.1 a 7.4.4, FortiManager Cloud 7.2.1 a 7.2.7, FortiManager Cloud 7.0.1 a 7.0.13, FortiManager Cloud 6.4.1 a 6.4.7 permite a un atacante ejecutar c\u00f3digo o comandos arbitrarios a trav\u00e9s de solicitudes especialmente manipuladas."
}
],
"metrics": {

View File

@ -2,24 +2,95 @@
"id": "CVE-2024-47711",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:07.563",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:03:24.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Don't return OOB skb in manage_oob().\n\nsyzbot reported use-after-free in unix_stream_recv_urg(). [0]\n\nThe scenario is\n\n 1. send(MSG_OOB)\n 2. recv(MSG_OOB)\n -> The consumed OOB remains in recv queue\n 3. send(MSG_OOB)\n 4. recv()\n -> manage_oob() returns the next skb of the consumed OOB\n -> This is also OOB, but unix_sk(sk)->oob_skb is not cleared\n 5. recv(MSG_OOB)\n -> unix_sk(sk)->oob_skb is used but already freed\n\nThe recent commit 8594d9b85c07 (\"af_unix: Don't call skb_get() for OOB\nskb.\") uncovered the issue.\n\nIf the OOB skb is consumed and the next skb is peeked in manage_oob(),\nwe still need to check if the skb is OOB.\n\nLet's do so by falling back to the following checks in manage_oob()\nand add the test case in selftest.\n\nNote that we need to add a similar check for SIOCATMARK.\n\n[0]:\nBUG: KASAN: slab-use-after-free in unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959\nRead of size 4 at addr ffff8880326abcc4 by task syz-executor178/5235\n\nCPU: 0 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:93 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959\n unix_stream_recv_urg+0x1df/0x320 net/unix/af_unix.c:2640\n unix_stream_read_generic+0x2456/0x2520 net/unix/af_unix.c:2778\n unix_stream_recvmsg+0x22b/0x2c0 net/unix/af_unix.c:2996\n sock_recvmsg_nosec net/socket.c:1046 [inline]\n sock_recvmsg+0x22f/0x280 net/socket.c:1068\n ____sys_recvmsg+0x1db/0x470 net/socket.c:2816\n ___sys_recvmsg net/socket.c:2858 [inline]\n __sys_recvmsg+0x2f0/0x3e0 net/socket.c:2888\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f5360d6b4e9\nCode: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f\nRAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9\nRDX: 0000000000002001 RSI: 0000000020000640 RDI: 0000000000000003\nRBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001\nR13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001\n </TASK>\n\nAllocated by task 5235:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n unpoison_slab_object mm/kasan/common.c:312 [inline]\n __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3988 [inline]\n slab_alloc_node mm/slub.c:4037 [inline]\n kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4080\n __alloc_skb+0x1c3/0x440 net/core/skbuff.c:667\n alloc_skb include/linux/skbuff.h:1320 [inline]\n alloc_skb_with_frags+0xc3/0x770 net/core/skbuff.c:6528\n sock_alloc_send_pskb+0x91a/0xa60 net/core/sock.c:2815\n sock_alloc_send_skb include/net/sock.h:1778 [inline]\n queue_oob+0x108/0x680 net/unix/af_unix.c:2198\n unix_stream_sendmsg+0xd24/0xf80 net/unix/af_unix.c:2351\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:745\n ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597\n ___sys_sendmsg net/socket.c:2651 [inline]\n __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 5235:\n kasan_save_stack mm/kasan/common.c:47\n---truncated---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4a7f9a2591a923bdde4bd7eac33490b6ae3b257c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5aa57d9f2d5311f19434d95b2a81610aa263e23b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: af_unix: No devuelva skb OOB en manage_oob(). syzbot inform\u00f3 de un error de use after free en unix_stream_recv_urg(). [0] El escenario es 1. send(MSG_OOB) 2. recv(MSG_OOB) -&gt; El OOB consumido permanece en la cola de recepci\u00f3n 3. send(MSG_OOB) 4. recv() -&gt; manage_oob() devuelve el siguiente skb del OOB consumido -&gt; Este tambi\u00e9n es OOB, pero unix_sk(sk)-&gt;oob_skb no se borra 5. recv(MSG_OOB) -&gt; unix_sk(sk)-&gt;oob_skb se usa pero ya se liber\u00f3 La reciente confirmaci\u00f3n 8594d9b85c07 (\"af_unix: No llame a skb_get() para skb OOB\") descubri\u00f3 el problema. Si se consume el skb OOB y se examina el siguiente skb en manage_oob(), a\u00fan necesitamos verificar si el skb es OOB. Hag\u00e1moslo recurriendo a las siguientes verificaciones en manage_oob() y agregando el caso de prueba en selftest. Tenga en cuenta que necesitamos agregar una verificaci\u00f3n similar para SIOCATMARK. [0]: ERROR: KASAN: slab-use-after-free en unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff8880326abcc4 por la tarea syz-executor178/5235 CPU: 0 UID: 0 PID: 5235 Comm: syz-executor178 No contaminado 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:93 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 descripci\u00f3n de la direcci\u00f3n de impresi\u00f3n mm/kasan/report.c:377 [en l\u00ednea] informe de impresi\u00f3n+0x169/0x550 mm/kasan/report.c:488 informe de kasan+0x143/0x180 mm/kasan/report.c:601 unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959 unix_stream_recv_urg+0x1df/0x320 net/unix/af_unix.c:2640 unix_stream_read_generic+0x2456/0x2520 net/unix/af_unix.c:2778 unix_stream_recvmsg+0x22b/0x2c0 net/unix/af_unix.c:2996 sock_recvmsg_nosec red/socket.c:1046 [en l\u00ednea] sock_recvmsg+0x22f/0x280 red/socket.c:1068 ____sys_recvmsg+0x1db/0x470 red/socket.c:2816 ___sys_recvmsg red/socket.c:2858 [en l\u00ednea] __sys_recvmsg+0x2f0/0x3e0 red/socket.c:2888 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f DESCARGA: 0033:0x7f5360d6b4e9 C\u00f3digo: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f RAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9 RDX: 0000000000002001 RSI: 0000000020000640 RDI: 000000000 0000003 RBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000000001 R13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001 Asignado por la tarea 5235: kasan_save_stack mm/kasan/common.c:47 [en l\u00ednea] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:312 [en l\u00ednea] __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338 kasan_slab_alloc include/linux/kasan.h:201 [en l\u00ednea] slab_post_alloc_hook mm/slub.c:3988 [en l\u00ednea] slab_alloc_node mm/slub.c:4037 [en l\u00ednea] kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4080 __alloc_skb+0x1c3/0x440 net/core/skbuff.c:667 alloc_skb include/linux/skbuff.h:1320 [en l\u00ednea] alloc_skb_with_frags+0xc3/0x770 net/core/skbuff.c:6528 sock_alloc_send_pskb+0x91a/0xa60 net/core/sock.c:2815 sock_alloc_send_skb include/net/sock.h:1778 [en l\u00ednea] queue_oob+0x108/0x680 net/unix/af_unix.c:2198 unix_stream_sendmsg+0xd24/0xf80 net/unix/af_unix.c:2351 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597 ___sys_sendmsg net/socket.c:2651 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Liberado por la tarea ---truncado---"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9.8",
"versionEndExcluding": "6.10",
"matchCriteriaId": "7CD11465-AFC4-428F-A933-C8F6486DDC2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "634B10CE-0F2B-4C13-B5F9-5F2559F2369D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4a7f9a2591a923bdde4bd7eac33490b6ae3b257c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5aa57d9f2d5311f19434d95b2a81610aa263e23b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,44 +2,179 @@
"id": "CVE-2024-47712",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:07.640",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:17:11.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param\n\nIn the `wilc_parse_join_bss_param` function, the TSF field of the `ies`\nstructure is accessed after the RCU read-side critical section is\nunlocked. According to RCU usage rules, this is illegal. Reusing this\npointer can lead to unpredictable behavior, including accessing memory\nthat has been updated or causing use-after-free issues.\n\nThis possible bug was identified using a static analysis tool developed\nby myself, specifically designed to detect RCU-related issues.\n\nTo address this, the TSF value is now stored in a local variable\n`ies_tsf` before the RCU lock is released. The `param->tsf_lo` field is\nthen assigned using this local variable, ensuring that the TSF value is\nsafely accessed."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: wilc1000: soluciona un posible problema de desreferencia de RCU en wilc_parse_join_bss_param En la funci\u00f3n `wilc_parse_join_bss_param`, se accede al campo TSF de la estructura `ies` despu\u00e9s de que se desbloquea la secci\u00f3n cr\u00edtica del lado de lectura de RCU. Seg\u00fan las reglas de uso de RCU, esto es ilegal. Reutilizar este puntero puede provocar un comportamiento impredecible, incluido el acceso a la memoria que se ha actualizado o causar problemas de use after free. Este posible error se identific\u00f3 utilizando una herramienta de an\u00e1lisis est\u00e1tico desarrollada por m\u00ed, dise\u00f1ada espec\u00edficamente para detectar problemas relacionados con RCU. Para solucionarlo, el valor TSF ahora se almacena en una variable local `ies_tsf` antes de que se libere el bloqueo de RCU. Luego, el campo `param-&gt;tsf_lo` se asigna utilizando esta variable local, lo que garantiza que se acceda de forma segura al valor TSF."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/2f944e6255c2fc1c9bd9ee32f6b14ee0b2a51eb5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/557418e1704605a81c9e26732449f71b1d40ba1e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/6d7c6ae1efb1ff68bc01d79d94fdf0388f86cdd8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/79510414a7626317f13cc9073244ab7a8deb3192",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/84398204c5df5aaf89453056cf0647cda9664d2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b040b71d99ee5e17bb7a743dc01cbfcae8908ce1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bf090f4fe935294361eabd9dc5a949fdd77d3d1b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.273",
"versionEndExcluding": "5.5",
"matchCriteriaId": "6CE68562-07A0-48CC-86AC-B5990C5D9780"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.214",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "A8846BE7-5AEC-4A74-8E34-0FE8B1205194"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.153",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "41952CCA-3B42-425D-A5FF-DE2474EC8369"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.83",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "161F9759-367F-4944-B666-215896634DCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.23",
"versionEndExcluding": "6.6.54",
"matchCriteriaId": "DCA3014C-FDF3-4561-9BF6-1ED84EA00985"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.11",
"versionEndExcluding": "6.8",
"matchCriteriaId": "CD8383BB-B294-4F4D-996D-A780685E6362"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8.2",
"versionEndExcluding": "6.9",
"matchCriteriaId": "E9076253-5796-4E04-9AB4-42087B5524F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.9",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "EF31DFC4-A7F7-4E9B-A558-635ED9DB48FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2f944e6255c2fc1c9bd9ee32f6b14ee0b2a51eb5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/557418e1704605a81c9e26732449f71b1d40ba1e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6d7c6ae1efb1ff68bc01d79d94fdf0388f86cdd8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/79510414a7626317f13cc9073244ab7a8deb3192",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/84398204c5df5aaf89453056cf0647cda9664d2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b040b71d99ee5e17bb7a743dc01cbfcae8908ce1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bf090f4fe935294361eabd9dc5a949fdd77d3d1b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,44 +2,158 @@
"id": "CVE-2024-47713",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:07.717",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:19:15.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()\n\nSince '__dev_queue_xmit()' should be called with interrupts enabled,\nthe following backtrace:\n\nieee80211_do_stop()\n ...\n spin_lock_irqsave(&local->queue_stop_reason_lock, flags)\n ...\n ieee80211_free_txskb()\n ieee80211_report_used_skb()\n ieee80211_report_ack_skb()\n cfg80211_mgmt_tx_status_ext()\n nl80211_frame_tx_status()\n genlmsg_multicast_netns()\n genlmsg_multicast_netns_filtered()\n nlmsg_multicast_filtered()\n\t netlink_broadcast_filtered()\n\t do_one_broadcast()\n\t netlink_broadcast_deliver()\n\t __netlink_sendskb()\n\t netlink_deliver_tap()\n\t __netlink_deliver_tap_skb()\n\t dev_queue_xmit()\n\t __dev_queue_xmit() ; with IRQS disabled\n ...\n spin_unlock_irqrestore(&local->queue_stop_reason_lock, flags)\n\nissues the warning (as reported by syzbot reproducer):\n\nWARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120\n\nFix this by implementing a two-phase skb reclamation in\n'ieee80211_do_stop()', where actual work is performed\noutside of a section with interrupts disabled."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: usar recuperaci\u00f3n skb de dos fases en ieee80211_do_stop() Dado que '__dev_queue_xmit()' se debe llamar con las interrupciones habilitadas, se realiza el siguiente seguimiento: ieee80211_do_stop() ... spin_lock_irqsave(&amp;local-&gt;queue_stop_reason_lock, flags) ... ieee80211_free_txskb() ieee80211_report_used_skb() ieee80211_report_ack_skb() cfg80211_mgmt_tx_status_ext() nl80211_frame_tx_status() genlmsg_multicast_netns() genlmsg_multicast_netns_filtered() con IRQS deshabilitado ... spin_unlock_irqrestore(&amp;local-&gt;queue_stop_reason_lock, flags) emite la advertencia (seg\u00fan lo informado por el reproductor syzbot): ADVERTENCIA: CPU: 2 PID: 5128 en kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120 Solucione esto implementando una recuperaci\u00f3n de skb de dos fases en 'ieee80211_do_stop()', donde el trabajo real se realiza fuera de una secci\u00f3n con las interrupciones deshabilitadas."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/058c9026ad79dc98572442fd4c7e9a36aba6f596",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/9d301de12da6e1bb069a9835c38359b8e8135121",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/acb53a716e492a02479345157c43f21edc8bc64b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/db5ca4b42ccfa42d2af7b335ff12578e57775c02",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eab272972cffff9cd973b8e4055a8e81c64f7e6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f232916fab67ca1c3425926df4a866e59ff26908",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.32",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "BF903132-A3AF-4A91-AFA9-3C8A9C378FAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.54",
"matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/058c9026ad79dc98572442fd4c7e9a36aba6f596",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d301de12da6e1bb069a9835c38359b8e8135121",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/acb53a716e492a02479345157c43f21edc8bc64b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ad4b7068b101fbbb4a9ca4b99b25eb051a9482ec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/db5ca4b42ccfa42d2af7b335ff12578e57775c02",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eab272972cffff9cd973b8e4055a8e81c64f7e6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f232916fab67ca1c3425926df4a866e59ff26908",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,32 +2,116 @@
"id": "CVE-2024-47714",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:07.797",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:33:17.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: use hweight16 to get correct tx antenna\n\nThe chainmask is u16 so using hweight8 cannot get correct tx_ant.\nWithout this patch, the tx_ant of band 2 would be -1 and lead to the\nfollowing issue:\nBUG: KASAN: stack-out-of-bounds in mt7996_mcu_add_sta+0x12e0/0x16e0 [mt7996e]"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7996: usar hweight16 para obtener la antena tx correcta La m\u00e1scara de cadena es u16, por lo que usar hweight8 no puede obtener la tx_ant correcta. Sin este parche, la tx_ant de la banda 2 ser\u00eda -1 y provocar\u00eda el siguiente problema: ERROR: KASAN: pila fuera de los l\u00edmites en mt7996_mcu_add_sta+0x12e0/0x16e0 [mt7996e]"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/33954930870c18ec549e4bca0eeff43e252cb740",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/50d87e3b70980abc090676b6b4703fcbd96221f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/8f51fc8a9e2fd96363d8ec3f4ee4b78dd64754e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/f98c3de92bb05dac4a4969df8a4595ed380b4604",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.54",
"matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/33954930870c18ec549e4bca0eeff43e252cb740",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/50d87e3b70980abc090676b6b4703fcbd96221f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8f51fc8a9e2fd96363d8ec3f4ee4b78dd64754e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f98c3de92bb05dac4a4969df8a4595ed380b4604",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,32 +2,116 @@
"id": "CVE-2024-47715",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:07.870",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:35:59.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7915: fix oops on non-dbdc mt7986\n\nmt7915_band_config() sets band_idx = 1 on the main phy for mt7986\nwith MT7975_ONE_ADIE or MT7976_ONE_ADIE.\n\nCommit 0335c034e726 (\"wifi: mt76: fix race condition related to\nchecking tx queue fill status\") introduced a dereference of the\nphys array indirectly indexed by band_idx via wcid->phy_idx in\nmt76_wcid_cleanup(). This caused the following Oops on affected\nmt7986 devices:\n\n Unable to handle kernel read from unreadable memory at virtual address 0000000000000024\n Mem abort info:\n ESR = 0x0000000096000005\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x05: level 1 translation fault\n Data abort info:\n ISV = 0, ISS = 0x00000005\n CM = 0, WnR = 0\n user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000\n [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n Internal error: Oops: 0000000096000005 [#1] SMP\n Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...\n CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0\n Hardware name: ZyXEL EX5700 (Telenor) (DT)\n pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : mt76_wcid_cleanup+0x84/0x22c [mt76]\n lr : mt76_wcid_cleanup+0x64/0x22c [mt76]\n sp : ffffffc00a803700\n x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00\n x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001\n x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8\n x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000\n x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0\n x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000\n x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28\n x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000\n x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001\n x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024\n Call trace:\n mt76_wcid_cleanup+0x84/0x22c [mt76]\n __mt76_sta_remove+0x70/0xbc [mt76]\n mt76_sta_state+0x8c/0x1a4 [mt76]\n mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]\n drv_sta_state+0x144/0x274 [mac80211]\n sta_info_move_state+0x1cc/0x2a4 [mac80211]\n sta_set_sinfo+0xaf8/0xc24 [mac80211]\n sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]\n\n ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]\n cfg80211_check_station_change+0x1360/0x4710 [cfg80211]\n genl_family_rcv_msg_doit+0xb4/0x110\n genl_rcv_msg+0xd0/0x1bc\n netlink_rcv_skb+0x58/0x120\n genl_rcv+0x34/0x50\n netlink_unicast+0x1f0/0x2ec\n netlink_sendmsg+0x198/0x3d0\n ____sys_sendmsg+0x1b0/0x210\n ___sys_sendmsg+0x80/0xf0\n __sys_sendmsg+0x44/0xa0\n __arm64_sys_sendmsg+0x20/0x30\n invoke_syscall.constprop.0+0x4c/0xe0\n do_el0_svc+0x40/0xd0\n el0_svc+0x14/0x4c\n el0t_64_sync_handler+0x100/0x110\n el0t_64_sync+0x15c/0x160\n Code: d2800002 910092c0 52800023 f9800011 (885f7c01)\n ---[ end trace 7e42dd9a39ed2281 ]---\n\nFix by using mt76_dev_phy() which will map band_idx to the correct phy\nfor all hardware combinations."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7915: se corrige el error en mt7986 que no es dbdc mt7915_band_config() establece band_idx = 1 en el phy principal para mt7986 con MT7975_ONE_ADIE o MT7976_ONE_ADIE. el commit 0335c034e726 (\"wifi: mt76: se corrige la condici\u00f3n de ejecuci\u00f3n relacionada con la comprobaci\u00f3n del estado de llenado de la cola de transmisi\u00f3n\") introdujo una desreferencia de la matriz phys indexada indirectamente por band_idx a trav\u00e9s de wcid-&gt;phy_idx en mt76_wcid_cleanup(). Esto provoc\u00f3 los siguientes errores en los dispositivos mt7986 afectados: No se puede manejar la lectura del kernel desde la memoria ilegible en la direcci\u00f3n virtual 0000000000000024 Informaci\u00f3n de aborto de memoria: ESR = 0x0000000096000005 EC = 0x25: DABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: error de traducci\u00f3n de nivel 1 Informaci\u00f3n de aborto de datos: ISV = 0, ISS = 0x00000005 CM = 0, WnR = 0 pgtable de usuario: 4k p\u00e1ginas, VA de 39 bits, pgdp=0000000042545000 [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000 Error interno: Oops: 0000000096000005 [#1] M\u00f3dulos SMP vinculados en: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ... CPU: 2 PID: 1631 Comm: hostapd No contaminado 5.15.150 #0 Nombre del hardware: ZyXEL EX5700 (Telenor) (DT) pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : mt76_wcid_cleanup+0x84/0x22c [mt76] lr : mt76_wcid_cleanup+0x64/0x22c [mt76] sp : ffffffc00a803700 x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00 x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001 x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8 x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000 x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 00000000000000be0 x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 000000000000000 x11: 000000000000000 x10: ffffff8004172e30 x9: ffffff8004172e28 x8: 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000 x5 : 00000000000000031 x4 : 0000000000000000 x3 : 0000000000000001 x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024 Rastreo de llamadas: mt76_wcid_cleanup+0x84/0x22c [mt76] __mt76_sta_remove+0x70/0xbc [mt76] mt76_sta_state+0x8c/0x1a4 [mt76] mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e] drv_sta_state+0x144/0x274 [mac80211] sta_info_move_state+0x1cc/0x2a4 [mac80211] sta_set_sinfo+0xaf8/0xc24 [mac80211] sta_info_destroy_addr_bss+0x4c/0x6c [mac80211] ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211] cfg80211_check_station_change+0x1360/0x4710 [cfg80211] genl_family_rcv_msg_doit+0xb4/0x110 genl_rcv_msg+0xd0/0x1bc netlink_rcv_skb+0x58/0x120 genl_rcv+0x34/0x50 netlink_unicast+0x1f0/0x2ec netlink_sendmsg+0x198/0x3d0 ____sys_sendmsg+0x1b0/0x210 ___sys_sendmsg+0x80/0xf0 __sys_sendmsg+0x44/0xa0 __arm64_sys_sendmsg+0x20/0x30 invoke_syscall.constprop.0+0x4c/0xe0 do_el0_svc+0x40/0xd0 el0_svc+0x14/0x4c el0t_64_sync_handler+0x100/0x110 el0t_64_sync+0x15c/0x160 C\u00f3digo: d2800002 910092c0 52800023 f9800011 (885f7c01) ---[ fin del seguimiento 7e42dd9a39ed2281 ]--- Se soluciona mediante mt76_dev_phy() que asignar\u00e1 band_idx al phy correcto para todas las combinaciones de hardware."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/7c128f3ff0be5802aef66f332e4bba6afe98735e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/818dd118f4a997f8b4fe9c010b22402d410a2424",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/862bf7cbd772c2bad570ef0c5b5556a1330656dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/a94d2bd111b39f0c2c7fcbfbf8276ab98c3b8353",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.48",
"versionEndExcluding": "6.6.54",
"matchCriteriaId": "C20918A8-C31C-4310-BE4B-CA85E86AFF85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/7c128f3ff0be5802aef66f332e4bba6afe98735e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/818dd118f4a997f8b4fe9c010b22402d410a2424",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/862bf7cbd772c2bad570ef0c5b5556a1330656dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a94d2bd111b39f0c2c7fcbfbf8276ab98c3b8353",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,32 +2,116 @@
"id": "CVE-2024-47716",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:07.943",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:34:17.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros\n\nFloating point instructions in userspace can crash some arm kernels\nbuilt with clang/LLD 17.0.6:\n\n BUG: unsupported FP instruction in kernel mode\n FPEXC == 0xc0000780\n Internal error: Oops - undefined instruction: 0 [#1] ARM\n CPU: 0 PID: 196 Comm: vfp-reproducer Not tainted 6.10.0 #1\n Hardware name: BCM2835\n PC is at vfp_support_entry+0xc8/0x2cc\n LR is at do_undefinstr+0xa8/0x250\n pc : [<c0101d50>] lr : [<c010a80c>] psr: a0000013\n sp : dc8d1f68 ip : 60000013 fp : bedea19c\n r10: ec532b17 r9 : 00000010 r8 : 0044766c\n r7 : c0000780 r6 : ec532b17 r5 : c1c13800 r4 : dc8d1fb0\n r3 : c10072c4 r2 : c0101c88 r1 : ec532b17 r0 : 0044766c\n Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none\n Control: 00c5387d Table: 0251c008 DAC: 00000051\n Register r0 information: non-paged memory\n Register r1 information: vmalloc memory\n Register r2 information: non-slab/vmalloc memory\n Register r3 information: non-slab/vmalloc memory\n Register r4 information: 2-page vmalloc region\n Register r5 information: slab kmalloc-cg-2k\n Register r6 information: vmalloc memory\n Register r7 information: non-slab/vmalloc memory\n Register r8 information: non-paged memory\n Register r9 information: zero-size pointer\n Register r10 information: vmalloc memory\n Register r11 information: non-paged memory\n Register r12 information: non-paged memory\n Process vfp-reproducer (pid: 196, stack limit = 0x61aaaf8b)\n Stack: (0xdc8d1f68 to 0xdc8d2000)\n 1f60: 0000081f b6f69300 0000000f c10073f4 c10072c4 dc8d1fb0\n 1f80: ec532b17 0c532b17 0044766c b6f9ccd8 00000000 c010a80c 00447670 60000010\n 1fa0: ffffffff c1c13800 00c5387d c0100f10 b6f68af8 00448fc0 00000000 bedea188\n 1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c\n 1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff 00000000 00000000\n Call trace:\n [<c0101d50>] (vfp_support_entry) from [<c010a80c>] (do_undefinstr+0xa8/0x250)\n [<c010a80c>] (do_undefinstr) from [<c0100f10>] (__und_usr+0x70/0x80)\n Exception stack(0xdc8d1fb0 to 0xdc8d1ff8)\n 1fa0: b6f68af8 00448fc0 00000000 bedea188\n 1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c\n 1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff\n Code: 0a000061 e3877202 e594003c e3a09010 (eef16a10)\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Fatal exception in interrupt\n ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---\n\nThis is a minimal userspace reproducer on a Raspberry Pi Zero W:\n\n #include <stdio.h>\n #include <math.h>\n\n int main(void)\n {\n double v = 1.0;\n printf(\"%fn\", NAN + *(volatile double *)&v);\n return 0;\n }\n\nAnother way to consistently trigger the oops is:\n\n calvin@raspberry-pi-zero-w ~$ python -c \"import json\"\n\nThe bug reproduces only when the kernel is built with DYNAMIC_DEBUG=n,\nbecause the pr_debug() calls act as barriers even when not activated.\n\nThis is the output from the same kernel source built with the same\ncompiler and DYNAMIC_DEBUG=y, where the userspace reproducer works as\nexpected:\n\n VFP: bounce: trigger ec532b17 fpexc c0000780\n VFP: emulate: INST=0xee377b06 SCR=0x00000000\n VFP: bounce: trigger eef1fa10 fpexc c0000780\n VFP: emulate: INST=0xeeb40b40 SCR=0x00000000\n VFP: raising exceptions 30000000\n\n calvin@raspberry-pi-zero-w ~$ ./vfp-reproducer\n nan\n\nCrudely grepping for vmsr/vmrs instructions in the otherwise nearly\nidential text for vfp_support_entry() makes the problem obvious:\n\n vmlinux.llvm.good [0xc0101cb8] <+48>: vmrs r7, fpexc\n vmlinux.llvm.good [0xc0101cd8] <+80>: vmsr fpexc, r0\n vmlinux.llvm.good [0xc0101d20\n---truncated---"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: 9410/1: vfp: usar asm vol\u00e1til en macros fmrx/fmxr Las instrucciones de punto flotante en el espacio de usuario pueden bloquear algunos kernels de ARM creados con clang/LLD 17.0.6: ERROR: instrucci\u00f3n FP no compatible en modo kernel FPEXC == 0xc0000780 Error interno: Ups - instrucci\u00f3n no definida: 0 [#1] CPU ARM: 0 PID: 196 Comm: vfp-reproducer No contaminado 6.10.0 #1 Nombre del hardware: BCM2835 La PC est\u00e1 en vfp_support_entry+0xc8/0x2cc LR est\u00e1 en do_undefinstr+0xa8/0x250 pc : [] lr : [] psr: a0000013 sp : dc8d1f68 ip : 60000013 fp : bedea19c r10: ec532b17 r9 : 00000010 r8 : 0044766c r7 : c0000780 r6 : ec532b17 r5 : c1c13800 r4 : dc8d1fb0 r3 : c10072c4 r2 : c0101c88 r1 : ec532b17 r0 : 0044766c Indicadores: NzCv IRQ en FIQ en modo SVC_32 ISA ARM Segmento ninguno Control: 00c5387d Tabla: 0251c008 DAC: 00000051 Informaci\u00f3n del registro r0: Informaci\u00f3n del registro r1: memoria vmalloc Informaci\u00f3n del registro r2: memoria no slab/vmalloc Informaci\u00f3n del registro r3: memoria no slab/vmalloc Informaci\u00f3n del registro r4: regi\u00f3n vmalloc de 2 p\u00e1ginas Informaci\u00f3n del registro r5: slab kmalloc-cg-2k Informaci\u00f3n del registro r6: memoria vmalloc Informaci\u00f3n del registro r7: memoria no slab/vmalloc Informaci\u00f3n del registro r8: memoria no paginada Informaci\u00f3n del registro r9: puntero de tama\u00f1o cero Informaci\u00f3n del registro r10: memoria vmalloc Informaci\u00f3n del registro r11: memoria no paginada Informaci\u00f3n del registro r12: memoria no paginada Proceso vfp-reproducer (pid: 196, l\u00edmite de pila = 0x61aaaf8b) Pila: (0xdc8d1f68 a 0xdc8d2000) 1f60: 0000081f b6f69300 0000000f c10073f4 c10072c4 dc8d1fb0 1f80: ec532b17 0c532b17 0044766c b6f9ccd8 00000000 c010a80c 00447670 60000010 1fa0: ffffffff c1c13800 7d c0100f10 b6f68af8 00448fc0 00000000 bedea188 1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c 1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff 00000000 00000000 Seguimiento de llamadas: [] (vfp_support_entry) desde [] (do_undefinstr+0xa8/0x250) [] (do_undefinstr) desde [] (__und_usr+0x70/0x80) Pila de excepciones (0xdc8d1fb0 a 0xdc8d1ff8) 1fa0: b6f68af8 00448fc0 00000000 bedea188 1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c 1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff C\u00f3digo: 0a000061 e3877202 e594003c e3a09010 (eef16a10) ---[ fin del seguimiento 000000000000000 ]--- P\u00e1nico del kernel: no sincroniza: Excepci\u00f3n fatal en la interrupci\u00f3n ---[ fin del kernel: no sincroniza: Excepci\u00f3n fatal en la interrupci\u00f3n ]--- Este es un reproductor de espacio de usuario m\u00ednimo en una Raspberry Pi Zero W: #include #include int main(void) { double v = 1.0; printf(\"%fn\", NAN + *(volatile double *)&amp;v); return 0; } Otra forma de activar consistentemente el error es: calvin@raspberry-pi-zero-w ~$ python -c \"import json\" El error se reproduce solo cuando el kernel se construye con DYNAMIC_DEBUG=n, porque las llamadas pr_debug() act\u00faan como barreras incluso cuando no est\u00e1n activadas. Esta es la salida de la misma fuente del kernel creada con el mismo compilador y DYNAMIC_DEBUG=y, donde el reproductor de espacio de usuario funciona como se espera: VFP: bounce: trigger ec532b17 fpexc c0000780 VFP: emulate: INST=0xee377b06 SCR=0x00000000 VFP: bounce: trigger eef1fa10 fpexc c0000780 VFP: emulate: INST=0xeeb40b40 SCR=0x00000000 VFP: raising exceptions 30000000 calvin@raspberry-pi-zero-w ~$ ./vfp-reproducer nan Buscar burdamente instrucciones vmsr/vmrs en el texto casi id\u00e9ntico de vfp_support_entry() hace que el problema sea obvio: vmlinux.llvm.good [0xc0101cb8] &lt;+48&gt;: vmrs r7, fpexc vmlinux.llvm.good [0xc0101cd8] &lt;+80&gt;: vmsr fpexc, r0 vmlinux.llvm.good [0xc0101d20 ---truncado---"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/39caf610a63786b3b0ef3348ac015edc19827d6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/89a906dfa8c3b21b3e5360f73c49234ac1eb885b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/9fc60f2bdd43e758bdf0305c0fc83221419ddb3f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/cd595d87e5fdd2fc09ea69359aa85e7f12f4b97b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.54",
"matchCriteriaId": "E729C51E-0317-4ABD-B95D-E6F8D80A17F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/39caf610a63786b3b0ef3348ac015edc19827d6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/89a906dfa8c3b21b3e5360f73c49234ac1eb885b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9fc60f2bdd43e758bdf0305c0fc83221419ddb3f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd595d87e5fdd2fc09ea69359aa85e7f12f4b97b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,28 +2,102 @@
"id": "CVE-2024-47717",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T12:15:08.020",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:32:20.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRISC-V: KVM: Don't zero-out PMU snapshot area before freeing data\n\nWith the latest Linux-6.11-rc3, the below NULL pointer crash is observed\nwhen SBI PMU snapshot is enabled for the guest and the guest is forcefully\npowered-off.\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000508\n Oops [#1]\n Modules linked in: kvm\n CPU: 0 UID: 0 PID: 61 Comm: term-poll Not tainted 6.11.0-rc3-00018-g44d7178dd77a #3\n Hardware name: riscv-virtio,qemu (DT)\n epc : __kvm_write_guest_page+0x94/0xa6 [kvm]\n ra : __kvm_write_guest_page+0x54/0xa6 [kvm]\n epc : ffffffff01590e98 ra : ffffffff01590e58 sp : ffff8f80001f39b0\n gp : ffffffff81512a60 tp : ffffaf80024872c0 t0 : ffffaf800247e000\n t1 : 00000000000007e0 t2 : 0000000000000000 s0 : ffff8f80001f39f0\n s1 : 00007fff89ac4000 a0 : ffffffff015dd7e8 a1 : 0000000000000086\n a2 : 0000000000000000 a3 : ffffaf8000000000 a4 : ffffaf80024882c0\n a5 : 0000000000000000 a6 : ffffaf800328d780 a7 : 00000000000001cc\n s2 : ffffaf800197bd00 s3 : 00000000000828c4 s4 : ffffaf800248c000\n s5 : ffffaf800247d000 s6 : 0000000000001000 s7 : 0000000000001000\n s8 : 0000000000000000 s9 : 00007fff861fd500 s10: 0000000000000001\n s11: 0000000000800000 t3 : 00000000000004d3 t4 : 00000000000004d3\n t5 : ffffffff814126e0 t6 : ffffffff81412700\n status: 0000000200000120 badaddr: 0000000000000508 cause: 000000000000000d\n [<ffffffff01590e98>] __kvm_write_guest_page+0x94/0xa6 [kvm]\n [<ffffffff015943a6>] kvm_vcpu_write_guest+0x56/0x90 [kvm]\n [<ffffffff015a175c>] kvm_pmu_clear_snapshot_area+0x42/0x7e [kvm]\n [<ffffffff015a1972>] kvm_riscv_vcpu_pmu_deinit.part.0+0xe0/0x14e [kvm]\n [<ffffffff015a2ad0>] kvm_riscv_vcpu_pmu_deinit+0x1a/0x24 [kvm]\n [<ffffffff0159b344>] kvm_arch_vcpu_destroy+0x28/0x4c [kvm]\n [<ffffffff0158e420>] kvm_destroy_vcpus+0x5a/0xda [kvm]\n [<ffffffff0159930c>] kvm_arch_destroy_vm+0x14/0x28 [kvm]\n [<ffffffff01593260>] kvm_destroy_vm+0x168/0x2a0 [kvm]\n [<ffffffff015933d4>] kvm_put_kvm+0x3c/0x58 [kvm]\n [<ffffffff01593412>] kvm_vm_release+0x22/0x2e [kvm]\n\nClearly, the kvm_vcpu_write_guest() function is crashing because it is\nbeing called from kvm_pmu_clear_snapshot_area() upon guest tear down.\n\nTo address the above issue, simplify the kvm_pmu_clear_snapshot_area() to\nnot zero-out PMU snapshot area from kvm_pmu_clear_snapshot_area() because\nthe guest is anyway being tore down.\n\nThe kvm_pmu_clear_snapshot_area() is also called when guest changes\nPMU snapshot area of a VCPU but even in this case the previous PMU\nsnaphsot area must not be zeroed-out because the guest might have\nreclaimed the pervious PMU snapshot area for some other purpose."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RISC-V: KVM: No ponga a cero el \u00e1rea de instant\u00e1neas de PMU antes de liberar los datos. Con la \u00faltima versi\u00f3n Linux-6.11-rc3, se observa el siguiente bloqueo del puntero NULL cuando la instant\u00e1nea de SBI PMU est\u00e1 habilitada para el invitado y el invitado se apaga a la fuerza. No se puede manejar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 0000000000000508 Ups [#1] M\u00f3dulos vinculados: kvm CPU: 0 UID: 0 PID: 61 Comm: term-poll No contaminado 6.11.0-rc3-00018-g44d7178dd77a #3 Nombre del hardware: riscv-virtio,qemu (DT) epc : __kvm_write_guest_page+0x94/0xa6 [kvm] ra : __kvm_write_guest_page+0x54/0xa6 [kvm] epc : ffffffff01590e98 ra : ffffffff01590e58 sp : ffff8f80001f39b0 gp : ffffffff81512a60 tp: ffffaf80024872c0 t0: ffffaf800247e000 t1: 00000000000007e0 t2: 00000000000000000 s0: ffff8f80001f39f0 s1: 00007fff89ac40 00 a0: ffffffff015dd7e8 a1: 0000000000000086 a2: 0000000000000000 a3: ffffaf8000000000 a4: ffffaf80024882c0 a5: 0000000000000000 a6: ffffaf800328d780 a7: 00000000000001cc s2: ffffaf800197bd00 s3: 00000000000828c4 s4: ffffaf800248c000 s5: 7d000 s6: 0000000000001000 s7: 0000000000001000 s8: 0000000000000000 s9: 00007fff861fd500 s10: 0000000000000001 s11: 0000000000800000 t3 : 00000000000004d3 t4 : 000000000000004d3 t5 : ffffffff814126e0 t6 : ffffffff81412700 estado: 0000000200000120 direcci\u00f3n incorrecta: 0000000000000508 causa: 000000000000000d [] __kvm_write_guest_page+0x94/0xa6 [kvm] [] kvm_vcpu_write_guest+0x56/0x90 [kvm] [] kvm_pmu_clear_snapshot_area+0x42/0x7e [kvm] [] kvm_riscv_vcpu_pmu_deinit.part.0+0xe0/0x14e [kvm] [] kvm_riscv_vcpu_pmu_deinit+0x1a/0x24 [kvm] [] kvm_arch_vcpu_destroy+0x28/0x4c [kvm] [] kvm_destroy_vcpus+0x5a/0xda [kvm] [] kvm_arch_destroy_vm+0x14/0x28 [kvm] [] kvm_destroy_vm+0x168/0x2a0 [kvm] [] kvm_put_kvm+0x3c/0x58 [kvm] [] kvm_vm_release+0x22/0x2e [kvm] Claramente, la funci\u00f3n kvm_vcpu_write_guest() falla porque se la llama desde kvm_pmu_clear_snapshot_area() al desmantelar el invitado. Para solucionar el problema anterior, simplifique kvm_pmu_clear_snapshot_area() para que no ponga a cero el \u00e1rea de instant\u00e1neas de PMU de kvm_pmu_clear_snapshot_area() porque, de todos modos, el invitado se est\u00e1 desmantelando. Tambi\u00e9n se llama a kvm_pmu_clear_snapshot_area() cuando el invitado cambia el \u00e1rea de instant\u00e1neas de PMU de una VCPU, pero incluso en este caso, el \u00e1rea de instant\u00e1neas de PMU anterior no debe ponerse a cero porque el invitado podr\u00eda haber recuperado el \u00e1rea de instant\u00e1neas de PMU anterior para alg\u00fan otro prop\u00f3sito."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/47d40d93292d9cff8dabb735bed83d930fa03950",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/6d0a5dcfc78bd18f2abb9641f83380135494559b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/81aa95fd5bd14ff49617f07fa79a8d1f1cf2ce9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.13",
"matchCriteriaId": "767D4D2D-C6E7-4B7D-9446-CFC8F8FF2FBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/47d40d93292d9cff8dabb735bed83d930fa03950",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6d0a5dcfc78bd18f2abb9641f83380135494559b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/81aa95fd5bd14ff49617f07fa79a8d1f1cf2ce9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,24 +2,87 @@
"id": "CVE-2024-47726",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T13:15:02.767",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:24:15.993",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to wait dio completion\n\nIt should wait all existing dio write IOs before block removal,\notherwise, previous direct write IO may overwrite data in the\nblock which may be reused by other inode."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e3db757ff9b7101ae68650ac5f6dd5743b68164e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para esperar la finalizaci\u00f3n de dio Se debe esperar todas las E/S de escritura de dio existentes antes de eliminar el bloque; de lo contrario, las E/S de escritura directa anteriores pueden sobrescribir los datos en el bloque que pueden ser reutilizados por otro inodo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.11.2",
"matchCriteriaId": "2235E7DC-717F-4BE0-AC47-34A75D29E6BD"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e3db757ff9b7101ae68650ac5f6dd5743b68164e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48656",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:06.147",
"lastModified": "2024-10-23T16:35:12.613",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-24T14:37:36.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/LeiPudd/Student-Management-System-v1.0-has-Cross-site-Scripting-XSS-",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:student_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7816C1E9-D65F-4652-A2F5-27FDEAA6B33D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/LeiPudd/Student-Management-System-v1.0-has-Cross-site-Scripting-XSS-",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48657",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:06.233",
"lastModified": "2024-10-23T16:35:13.890",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-24T14:38:41.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/LeiPudd/Hospital-Management-System-v1.0-has-SQL-Injection-SQLDET-",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:princelycesar:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F128AC2-5AAB-47AF-B9EE-5C3F33F052E7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/LeiPudd/Hospital-Management-System-v1.0-has-SQL-Injection-SQLDET-",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49215",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T01:15:02.943",
"lastModified": "2024-10-22T20:35:12.140",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-24T14:10:17.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,86 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/hyp164D1/5d68b9b7a504f1416272a825ce65966a",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18.20.0",
"matchCriteriaId": "4BFD0CA0-BFF0-4EF4-88D4-E8FAD0136484"
},
{
"url": "https://github.com/asterisk/asterisk/blob/20.5.0/main/manager.c#L3755",
"source": "cve@mitre.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.0.0",
"versionEndIncluding": "20.5.0",
"matchCriteriaId": "9A39CF22-38A4-4821-B520-EEC0D8B597DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:asterisk:21.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A79517D4-22AC-4C30-9F30-44EF6688817E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.9",
"matchCriteriaId": "B71A493F-F47B-4F19-AD21-3800DE63DF5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:*",
"matchCriteriaId": "79EEB5E5-B79E-454B-8DCD-3272BA337A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:*",
"matchCriteriaId": "AD3BBA39-95EC-462F-8F5A-15E8D07CC804"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:*",
"matchCriteriaId": "892BAE5D-A64E-4FE0-9A99-8C07F342A042"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:*",
"matchCriteriaId": "1A716A45-7075-4CA6-9EF5-2DD088248A5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:*",
"matchCriteriaId": "80EFA05B-E22D-49CE-BDD6-5C7123F1C12B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:*",
"matchCriteriaId": "20FD475F-2B46-47C9-B535-1561E29CB7A1"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/hyp164D1/5d68b9b7a504f1416272a825ce65966a",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/asterisk/asterisk/blob/20.5.0/main/manager.c#L3755",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49331",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:05.377",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:54:07.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/plms/wordpress-property-lot-management-system-plugin-4-2-38-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myriadsolutionz:property_lot_management_system:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.2.38",
"matchCriteriaId": "77CE85EE-AB42-4CE1-93A0-C3E54D893273"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/plms/wordpress-property-lot-management-system-plugin-4-2-38-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49332",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:05.560",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:49:34.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/giveaway-boost/wordpress-giveaway-boost-plugin-2-1-4-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:giveawayboost:giveaway_boost:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4",
"matchCriteriaId": "D6A3BFB5-D8D2-4013-B538-F63708BAD0AA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/giveaway-boost/wordpress-giveaway-boost-plugin-2-1-4-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49335",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:03.430",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:50:16.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/googledrive-folder-list/wordpress-googledrive-folder-list-plugin-2-2-2-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:edush_maxim:googledrive_folder_list:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "63AA0674-4D28-4221-BE70-2AF15E02762B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/googledrive-folder-list/wordpress-googledrive-folder-list-plugin-2-2-2-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49605",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:03.640",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:57:49.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/avchat-3/wordpress-community-lite-video-chat-plugin-2-2-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avchat.net:avchat_video_chat:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2",
"matchCriteriaId": "4218D947-CE66-463F-A731-A752D067FABE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/avchat-3/wordpress-community-lite-video-chat-plugin-2-2-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49607",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:05.763",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:47:05.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/wp-dropbox-dropins/wordpress-wp-dropbox-dropins-plugin-1-0-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redwanhilali:wp_dropbox_dropins:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "1ABCF0D4-7F16-4264-A82D-93E719D6AB8D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-dropbox-dropins/wordpress-wp-dropbox-dropins-plugin-1-0-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49608",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:05.973",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:42:47.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/gerryworks-post-by-mail/wordpress-gerryworks-post-by-mail-plugin-1-0-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gerryntabuhashe:gerryworks_post_by_mail:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "91F2D03B-FD62-4C6E-AC78-2E90716AD00C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gerryworks-post-by-mail/wordpress-gerryworks-post-by-mail-plugin-1-0-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49609",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:03.860",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:25:17.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/author-discussion/wordpress-author-discussion-plugin-0-2-2-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brandonwhite:author_discussion:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.2.2",
"matchCriteriaId": "2C80FEDA-81B8-4152-92BE-0E7451BC3417"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/author-discussion/wordpress-author-discussion-plugin-0-2-2-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49610",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:06.190",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:38:48.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/photokit/wordpress-photokit-plugin-1-0-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jackzhu:photokit:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "709E262E-E318-404E-BC4C-11DADEF0D3E1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/photokit/wordpress-photokit-plugin-1-0-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49612",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T10:15:04.053",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:33:14.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/sw-contact-form/wordpress-sw-contact-form-plugin-1-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infotuts:sw_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "60FDB7A1-49B4-4464-AC68-84B9B74EB6BE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sw-contact-form/wordpress-sw-contact-form-plugin-1-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49621",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:06.390",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T15:35:56.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/apa-register-newsletter-form/wordpress-apa-register-newsletter-form-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apa:apa_register_newsletter_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "39040101-00D9-40FC-9C58-CCCA575EF084"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/apa-register-newsletter-form/wordpress-apa-register-newsletter-form-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49622",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:06.613",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:25:01.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/apa-banner-slider/wordpress-apa-banner-slider-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apa:apa_banner_slider:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "95F8511A-86BC-4F51-AB59-BCC86F50351D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/apa-banner-slider/wordpress-apa-banner-slider-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49623",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:06.810",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:18:11.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/duplicate-title-validate/wordpress-duplicate-title-validate-plugin-1-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hasanmovahed:duplicate_title_validate:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "D5EEB516-660B-43F0-9331-65864437744B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/duplicate-title-validate/wordpress-duplicate-title-validate-plugin-1-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49624",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:07.013",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:34:30.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-advertising-system/wordpress-advanced-advertising-system-plugin-1-3-1-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smartdevth:advanced_advertising_system:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.1",
"matchCriteriaId": "0D861D2D-9D56-4F95-ABC8-146194AC2C2F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-advertising-system/wordpress-advanced-advertising-system-plugin-1-3-1-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49625",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T09:15:07.220",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:37:27.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/sitebuilder-dynamic-components/wordpress-sitebuilder-dynamic-components-plugin-1-0-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brandonclark:sitebuilder_dynamic_components:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "DB378ACA-4DB1-4E60-8F6A-59BC14D381C1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sitebuilder-dynamic-components/wordpress-sitebuilder-dynamic-components-plugin-1-0-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49631",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-20T08:15:05.130",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:12:59.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/easy-addons-for-elementor/wordpress-easy-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mdabdulkader:easy_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "CAFAC5B6-9A0E-4B61-BDBD-ED40B580BAA4"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easy-addons-for-elementor/wordpress-easy-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49913",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:13.657",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T14:39:18.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Agregar comprobaci\u00f3n NULL para top_pipe_to_program en commit_planes_for_stream Esta confirmaci\u00f3n soluciona un problema de desreferencia de puntero nulo en la funci\u00f3n `commit_planes_for_stream` en la l\u00ednea 4140. El problema podr\u00eda ocurrir cuando `top_pipe_to_program` es nulo. La correcci\u00f3n agrega una comprobaci\u00f3n para garantizar que `top_pipe_to_program` no sea nulo antes de acceder a su stream_res. Esto evita una desreferencia de puntero nulo. Reportado por smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/core/dc.c:4140 Error de commit_planes_for_stream(): anteriormente asumimos que 'top_pipe_to_program' podr\u00eda ser nulo (consulte la l\u00ednea 3906)"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/1ebfa6663807c144be8c8b6727375012409d2356",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/3929e382e4758aff42da0102a60d13337c99d3b8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/40193ff73630adf76bc0d82398f7d90fb576dba4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/66d71a72539e173a9b00ca0b1852cbaa5f5bf1ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/73efd2a611b62fee71a7b7f27d9d08bb60da8a72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8ab59527852a6f7780aad6185729550ca0569122",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e47e563c6f0db7d792a559301862c19ead0dfc2f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1ebfa6663807c144be8c8b6727375012409d2356",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3929e382e4758aff42da0102a60d13337c99d3b8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/40193ff73630adf76bc0d82398f7d90fb576dba4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/66d71a72539e173a9b00ca0b1852cbaa5f5bf1ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/73efd2a611b62fee71a7b7f27d9d08bb60da8a72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8ab59527852a6f7780aad6185729550ca0569122",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e47e563c6f0db7d792a559301862c19ead0dfc2f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-6049",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2024-10-24T08:15:02.297",
"lastModified": "2024-10-24T08:15:02.297",
"lastModified": "2024-10-24T15:35:20.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a \"...\" (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt."
},
{
"lang": "es",
"value": "El servidor web de Lawo AG vsm LTC Time Sync (vTimeSync) est\u00e1 afectado por una vulnerabilidad de path traversal \"...\" (tres puntos). Al enviar una solicitud HTTP especialmente manipulada, un atacante remoto no autenticado podr\u00eda descargar archivos arbitrarios del sistema operativo. Como limitaci\u00f3n, la explotaci\u00f3n solo es posible si el archivo solicitado tiene alguna extensi\u00f3n de archivo, por ejemplo, .exe o .txt."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-24T14:00:18.974820+00:00
2024-10-24T16:01:01.359739+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-24T13:58:52.627000+00:00
2024-10-24T15:59:48.417000+00:00
```
### Last Data Feed Release
@ -33,57 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266916
266917
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `1`
- [CVE-2024-10180](CVE-2024/CVE-2024-101xx/CVE-2024-10180.json) (`2024-10-24T13:15:11.537`)
- [CVE-2024-10332](CVE-2024/CVE-2024-103xx/CVE-2024-10332.json) (`2024-10-24T13:15:11.830`)
- [CVE-2024-49681](CVE-2024/CVE-2024-496xx/CVE-2024-49681.json) (`2024-10-24T12:15:02.890`)
- [CVE-2024-49682](CVE-2024/CVE-2024-496xx/CVE-2024-49682.json) (`2024-10-24T12:15:03.137`)
- [CVE-2024-49683](CVE-2024/CVE-2024-496xx/CVE-2024-49683.json) (`2024-10-24T12:15:03.373`)
- [CVE-2024-49691](CVE-2024/CVE-2024-496xx/CVE-2024-49691.json) (`2024-10-24T12:15:03.597`)
- [CVE-2024-49693](CVE-2024/CVE-2024-496xx/CVE-2024-49693.json) (`2024-10-24T13:15:12.090`)
- [CVE-2024-49695](CVE-2024/CVE-2024-496xx/CVE-2024-49695.json) (`2024-10-24T13:15:12.320`)
- [CVE-2024-49696](CVE-2024/CVE-2024-496xx/CVE-2024-49696.json) (`2024-10-24T13:15:12.537`)
- [CVE-2024-49702](CVE-2024/CVE-2024-497xx/CVE-2024-49702.json) (`2024-10-24T13:15:12.763`)
- [CVE-2024-49703](CVE-2024/CVE-2024-497xx/CVE-2024-49703.json) (`2024-10-24T12:15:03.830`)
- [CVE-2024-5608](CVE-2024/CVE-2024-56xx/CVE-2024-5608.json) (`2024-10-24T12:15:04.070`)
- [CVE-2024-8959](CVE-2024/CVE-2024-89xx/CVE-2024-8959.json) (`2024-10-24T12:15:04.317`)
- [CVE-2024-45031](CVE-2024/CVE-2024-450xx/CVE-2024-45031.json) (`2024-10-24T15:15:13.533`)
### CVEs modified in the last Commit
Recently modified CVEs: `25`
Recently modified CVEs: `49`
- [CVE-2018-13374](CVE-2018/CVE-2018-133xx/CVE-2018-13374.json) (`2024-10-24T13:58:37.357`)
- [CVE-2018-13379](CVE-2018/CVE-2018-133xx/CVE-2018-13379.json) (`2024-10-24T13:58:45.053`)
- [CVE-2018-13382](CVE-2018/CVE-2018-133xx/CVE-2018-13382.json) (`2024-10-24T13:58:52.627`)
- [CVE-2018-13383](CVE-2018/CVE-2018-133xx/CVE-2018-13383.json) (`2024-10-24T13:57:48.810`)
- [CVE-2019-5591](CVE-2019/CVE-2019-55xx/CVE-2019-5591.json) (`2024-10-24T13:55:59.167`)
- [CVE-2021-46757](CVE-2021/CVE-2021-467xx/CVE-2021-46757.json) (`2024-10-24T13:44:04.917`)
- [CVE-2024-10200](CVE-2024/CVE-2024-102xx/CVE-2024-10200.json) (`2024-10-24T13:57:28.357`)
- [CVE-2024-10201](CVE-2024/CVE-2024-102xx/CVE-2024-10201.json) (`2024-10-24T13:56:56.503`)
- [CVE-2024-10202](CVE-2024/CVE-2024-102xx/CVE-2024-10202.json) (`2024-10-24T13:55:46.110`)
- [CVE-2024-43945](CVE-2024/CVE-2024-439xx/CVE-2024-43945.json) (`2024-10-24T13:45:42.487`)
- [CVE-2024-47328](CVE-2024/CVE-2024-473xx/CVE-2024-47328.json) (`2024-10-24T13:45:07.193`)
- [CVE-2024-47680](CVE-2024/CVE-2024-476xx/CVE-2024-47680.json) (`2024-10-24T13:28:28.393`)
- [CVE-2024-47702](CVE-2024/CVE-2024-477xx/CVE-2024-47702.json) (`2024-10-24T13:30:59.247`)
- [CVE-2024-47703](CVE-2024/CVE-2024-477xx/CVE-2024-47703.json) (`2024-10-24T13:33:36.957`)
- [CVE-2024-47704](CVE-2024/CVE-2024-477xx/CVE-2024-47704.json) (`2024-10-24T13:34:43.690`)
- [CVE-2024-47705](CVE-2024/CVE-2024-477xx/CVE-2024-47705.json) (`2024-10-24T13:35:51.807`)
- [CVE-2024-47706](CVE-2024/CVE-2024-477xx/CVE-2024-47706.json) (`2024-10-24T13:43:05.547`)
- [CVE-2024-47707](CVE-2024/CVE-2024-477xx/CVE-2024-47707.json) (`2024-10-24T13:44:21.007`)
- [CVE-2024-47708](CVE-2024/CVE-2024-477xx/CVE-2024-47708.json) (`2024-10-24T13:45:19.677`)
- [CVE-2024-47709](CVE-2024/CVE-2024-477xx/CVE-2024-47709.json) (`2024-10-24T13:51:56.023`)
- [CVE-2024-47710](CVE-2024/CVE-2024-477xx/CVE-2024-47710.json) (`2024-10-24T13:57:58.060`)
- [CVE-2024-8625](CVE-2024/CVE-2024-86xx/CVE-2024-8625.json) (`2024-10-24T13:56:29.230`)
- [CVE-2024-9921](CVE-2024/CVE-2024-99xx/CVE-2024-9921.json) (`2024-10-24T13:19:24.920`)
- [CVE-2024-9922](CVE-2024/CVE-2024-99xx/CVE-2024-9922.json) (`2024-10-24T13:21:53.853`)
- [CVE-2024-9923](CVE-2024/CVE-2024-99xx/CVE-2024-9923.json) (`2024-10-24T13:24:23.430`)
- [CVE-2024-47714](CVE-2024/CVE-2024-477xx/CVE-2024-47714.json) (`2024-10-24T14:33:17.720`)
- [CVE-2024-47715](CVE-2024/CVE-2024-477xx/CVE-2024-47715.json) (`2024-10-24T14:35:59.327`)
- [CVE-2024-47716](CVE-2024/CVE-2024-477xx/CVE-2024-47716.json) (`2024-10-24T14:34:17.863`)
- [CVE-2024-47717](CVE-2024/CVE-2024-477xx/CVE-2024-47717.json) (`2024-10-24T14:32:20.817`)
- [CVE-2024-47726](CVE-2024/CVE-2024-477xx/CVE-2024-47726.json) (`2024-10-24T14:24:15.993`)
- [CVE-2024-48656](CVE-2024/CVE-2024-486xx/CVE-2024-48656.json) (`2024-10-24T14:37:36.353`)
- [CVE-2024-48657](CVE-2024/CVE-2024-486xx/CVE-2024-48657.json) (`2024-10-24T14:38:41.620`)
- [CVE-2024-49215](CVE-2024/CVE-2024-492xx/CVE-2024-49215.json) (`2024-10-24T14:10:17.137`)
- [CVE-2024-49331](CVE-2024/CVE-2024-493xx/CVE-2024-49331.json) (`2024-10-24T15:54:07.190`)
- [CVE-2024-49332](CVE-2024/CVE-2024-493xx/CVE-2024-49332.json) (`2024-10-24T15:49:34.827`)
- [CVE-2024-49335](CVE-2024/CVE-2024-493xx/CVE-2024-49335.json) (`2024-10-24T14:50:16.557`)
- [CVE-2024-49605](CVE-2024/CVE-2024-496xx/CVE-2024-49605.json) (`2024-10-24T14:57:49.617`)
- [CVE-2024-49607](CVE-2024/CVE-2024-496xx/CVE-2024-49607.json) (`2024-10-24T15:47:05.920`)
- [CVE-2024-49608](CVE-2024/CVE-2024-496xx/CVE-2024-49608.json) (`2024-10-24T15:42:47.110`)
- [CVE-2024-49609](CVE-2024/CVE-2024-496xx/CVE-2024-49609.json) (`2024-10-24T15:25:17.023`)
- [CVE-2024-49610](CVE-2024/CVE-2024-496xx/CVE-2024-49610.json) (`2024-10-24T15:38:48.493`)
- [CVE-2024-49612](CVE-2024/CVE-2024-496xx/CVE-2024-49612.json) (`2024-10-24T15:33:14.523`)
- [CVE-2024-49621](CVE-2024/CVE-2024-496xx/CVE-2024-49621.json) (`2024-10-24T15:35:56.963`)
- [CVE-2024-49622](CVE-2024/CVE-2024-496xx/CVE-2024-49622.json) (`2024-10-24T14:25:01.183`)
- [CVE-2024-49623](CVE-2024/CVE-2024-496xx/CVE-2024-49623.json) (`2024-10-24T14:18:11.047`)
- [CVE-2024-49624](CVE-2024/CVE-2024-496xx/CVE-2024-49624.json) (`2024-10-24T14:34:30.937`)
- [CVE-2024-49625](CVE-2024/CVE-2024-496xx/CVE-2024-49625.json) (`2024-10-24T14:37:27.207`)
- [CVE-2024-49631](CVE-2024/CVE-2024-496xx/CVE-2024-49631.json) (`2024-10-24T14:12:59.600`)
- [CVE-2024-49913](CVE-2024/CVE-2024-499xx/CVE-2024-49913.json) (`2024-10-24T14:39:18.017`)
- [CVE-2024-6049](CVE-2024/CVE-2024-60xx/CVE-2024-6049.json) (`2024-10-24T15:35:20.887`)
## Download and Usage

View File

@ -114216,16 +114216,16 @@ CVE-2018-13367,0,0,2c0b190f3877d554c7c1793628ac2255a5cca3a093c589c3f0ee70977e780
CVE-2018-13368,0,0,db3621b4229003a92c4734f6155d38c9e0973d22b3108c201c69db75b3f18dae,2020-08-24T17:37:01.140000
CVE-2018-1337,0,0,ac2f74a143a89a31e641617add9054f59782e3dc278d74a4c0107d8a66e7c7ca,2023-11-07T02:55:59.343000
CVE-2018-13371,0,0,6d518c7f248715560f2fdc8eda0d045226e614f54a2220bedf3a83e9d961d6e4,2020-04-03T18:53:23.173000
CVE-2018-13374,0,1,bd914e92350cdfc741071882e3b6864e5a0f2727e764117ae7b6baae19267c04,2024-10-24T13:58:37.357000
CVE-2018-13374,0,0,bd914e92350cdfc741071882e3b6864e5a0f2727e764117ae7b6baae19267c04,2024-10-24T13:58:37.357000
CVE-2018-13375,0,0,d56d6bafd36bf4e0bb208e573685704fee8535e51d0b9a9e0de49024b4474a77,2019-05-30T15:19:19.737000
CVE-2018-13376,0,0,34379bca4498e8ec746f1a8397920cc44e22e9cefdf9bd673e27251e09c3a80a,2019-10-03T00:03:26.223000
CVE-2018-13378,0,0,9f71a7a5685934cdd46869122ec078124ae2ec66bfbc946ccbf9f49813590b58,2019-04-17T18:06:24.997000
CVE-2018-13379,0,1,bdba50d3d1a3a097e9bbd3cd4ba2db37afd0dc73dc457d031e349af96390e007,2024-10-24T13:58:45.053000
CVE-2018-13379,0,0,bdba50d3d1a3a097e9bbd3cd4ba2db37afd0dc73dc457d031e349af96390e007,2024-10-24T13:58:45.053000
CVE-2018-1338,0,0,d64411637977ae42c91121f0409cbf1c71d1031cb46205ab4bc91aedd4d1c053,2023-11-07T02:55:59.417000
CVE-2018-13380,0,0,480272033178ab224e15cb78036830ce2ce28e5ca27484adf0a78212d77e5330,2021-04-06T12:56:42.507000
CVE-2018-13381,0,0,c6d40fea6a34ff14b2a09585a7b5be2b92a5fed103e6436015156bf377343728,2021-03-16T02:41:08.027000
CVE-2018-13382,0,1,27d53a07d912cb7a6b620a9465c0637b7fdeadff1c4a42777ff6542056e5c19b,2024-10-24T13:58:52.627000
CVE-2018-13383,0,1,886c64c812e0c0d15d52d174bfa771c3a58fe9a0d2f41c587bbec505d31dabc1,2024-10-24T13:57:48.810000
CVE-2018-13382,0,0,27d53a07d912cb7a6b620a9465c0637b7fdeadff1c4a42777ff6542056e5c19b,2024-10-24T13:58:52.627000
CVE-2018-13383,0,0,886c64c812e0c0d15d52d174bfa771c3a58fe9a0d2f41c587bbec505d31dabc1,2024-10-24T13:57:48.810000
CVE-2018-13384,0,0,0470da54b93707468acde7194067c44388da84e74ce445a3f6794a553a854a11,2019-06-05T14:26:09.117000
CVE-2018-13385,0,0,4e701bd89560a8ee5e1216c62101d98e943a0ac12ab90ea0f01e645a62b830ae,2020-05-11T16:29:41.080000
CVE-2018-13386,0,0,ac1c92d8c2b1ce7a084b13c83da90e1d9578e1ecdf924c062b623ddcb6c13f83,2020-08-24T17:37:01.140000
@ -140618,7 +140618,7 @@ CVE-2019-5587,0,0,36a21e1962c4b84046c708b9530a7b6739ebf9b478111ca6a2241258e54411
CVE-2019-5588,0,0,3f0b8fba42908ef2af4fee61278f32858eed24baf92642c9d5aebb509ca10bcb,2019-06-06T08:29:01.163000
CVE-2019-5589,0,0,9f67f8b6b5e2fafbf076286d8eaf684f4116be340de16ca47f21da70d196906a,2019-05-29T16:07:09.427000
CVE-2019-5590,0,0,14eacc45b17452900d49eb3790b63c5114826589aeb83b384adfdd687aec81e5,2019-09-03T17:36:09.097000
CVE-2019-5591,0,1,4fdd9bfd3fec8a19dc9a4b7ab1ecb9c2821401f9478891e90cab093e2c1e116f,2024-10-24T13:55:59.167000
CVE-2019-5591,0,0,4fdd9bfd3fec8a19dc9a4b7ab1ecb9c2821401f9478891e90cab093e2c1e116f,2024-10-24T13:55:59.167000
CVE-2019-5592,0,0,c65975805c53507a25362facc127ffc160832023947eeb0b3170a80c5c01a765,2020-08-24T17:37:01.140000
CVE-2019-5593,0,0,dbf1143c17c60df0e3b56b726eab8152cc476ee429e7eb8af2a630e11f7ca3d3,2021-07-21T11:39:23.747000
CVE-2019-5594,0,0,0dae2849bfddd68890ebd30c23f1e3c5e38c982981fb8adf9e75744dd0620f84,2019-08-26T14:12:55.073000
@ -186711,7 +186711,7 @@ CVE-2021-46753,0,0,389185adc5adbd69df72eaf6b406809e56d98b55bc10a477c0fbb10a2e142
CVE-2021-46754,0,0,347d3742155ff893e431cbaaa93ef670c98fdc740698bf1d146cd30bc01fa70d,2024-02-13T20:15:49.790000
CVE-2021-46755,0,0,14ae1c45bb31a22184154204ff29a858abec287be4bec6f75b2ff97b5cb548a1,2023-05-22T15:43:04.903000
CVE-2021-46756,0,0,56194e6572d3aee2628136e76ca9ce4c25efb67cd70d80ef22f05407a46dfb27,2023-05-22T15:42:26.507000
CVE-2021-46757,0,1,cd300e692ddc8f3cca821cca9da1d50f89f492746c55a779be46944d931986ba,2024-10-24T13:44:04.917000
CVE-2021-46757,0,0,cd300e692ddc8f3cca821cca9da1d50f89f492746c55a779be46944d931986ba,2024-10-24T13:44:04.917000
CVE-2021-46758,0,0,7646b62de078dd667078f18100e47b5ee3c3a5a2703d3c31ff23194a73747b99,2023-12-28T17:38:00.967000
CVE-2021-46759,0,0,3cbac9b0769ec12b0b69a756dc800079358bf3be8863d18b9e42a092534a7dfb,2023-05-22T15:42:00.327000
CVE-2021-46760,0,0,01798c0ac17f03ac224a45dfa08d0a7ec83d4905561c6c42fcf69ec08d7b840a,2023-05-22T15:40:00.550000
@ -201663,7 +201663,7 @@ CVE-2022-34456,0,0,f05782c856976a11ce4b66703e2c2b3923fe13ff61e142db639751ca6f7ff
CVE-2022-34457,0,0,0c667a5064adda5ea5094583baca62d9eca4474d62e853cc7744cf5d014b4262,2023-11-07T03:48:42.833000
CVE-2022-34458,0,0,4cc9497e0e21b50ba171a20c2d8441ed86e95b40d5aca899eae89c607b95f9c1,2023-11-07T03:48:42.910000
CVE-2022-34459,0,0,9761025cb767f60f48d55192162687c18913099bf1e99a0e63098f6eec032d32,2023-11-07T03:48:42.983000
CVE-2022-3446,0,0,7b8c23288d6fe732425ffe74e0356342c6e840b951c1e0728decf227c5ff0af2,2023-05-03T12:16:24.030000
CVE-2022-3446,0,1,bab1fdbfc9f6e2a4580106bfe18c4c23616e8dcb82560ff4a03fd5df961423ce,2024-10-24T15:35:04.707000
CVE-2022-34460,0,0,dfd574dd1404a007b4463ed62d473ee182dfcc4f5f7186c2806a901891e8374b,2023-11-07T03:48:43.057000
CVE-2022-34461,0,0,0299d6c0f6e05d6d3be8b92ff451c6934afa2052b0157530298098bfc946e8d2,2023-11-07T03:48:43.157000
CVE-2022-34462,0,0,064b2735aa104f6d5d552e5f64cb930ca7c3ce24fc886ea43f6b5270ebb1a306,2023-11-07T03:48:43.427000
@ -201684,7 +201684,7 @@ CVE-2022-34476,0,0,e70443c67a77453ab571c04072aa1e42630089373dd84acde838775369874
CVE-2022-34477,0,0,4615691c72cac0bc3e411549f066d1b80791f88a8af0c6e9b27bc3855e391f59,2023-01-03T18:36:13.347000
CVE-2022-34478,0,0,832c566750981e96bb1824bb4100ca47836a1e3cd76460cbaa8ec5aeb3dc18ab,2023-01-03T19:07:07.247000
CVE-2022-34479,0,0,c38e9aa3eb81dfcecca504b379530d4c8b302cd25e451ccb2a04d923f1c65edc,2022-12-31T02:30:41.797000
CVE-2022-3448,0,0,522d38a73353b50df35c403e94bd75429afa2fa7cacc0baad752e8cb43156363,2023-05-03T12:16:24.683000
CVE-2022-3448,0,1,d5841e429d2f405a191c5119b1b155b77a965ced9f1b6a4cac4222cf5d04c823,2024-10-24T15:35:05.777000
CVE-2022-34480,0,0,8245ca8846f5c099787b154804bf91969a5110259fa5d05c5d061001a432a612,2022-12-30T18:29:22.230000
CVE-2022-34481,0,0,513cf80765b0e20d9434d68c5af24feb577b8643e48c7d340538869a487a4d70,2022-12-30T18:45:26.437000
CVE-2022-34482,0,0,5612db89f696deca6fa81f539c48516d846396a8aa842fcf99b69bc8481f4ed2,2022-12-30T18:18:07.270000
@ -201694,7 +201694,7 @@ CVE-2022-34485,0,0,e3abac7e34cd75dcf7f45821a839bb5dcc9663385df8b6c3f6968bc782973
CVE-2022-34486,0,0,58c9ed651af880bd21028cea5934395d377015947caf2f6478a81f876dec8446,2022-08-24T19:56:11.500000
CVE-2022-34487,0,0,a56f8df051ed7b8fdb3bc193f225248ac75f8664d3d05a1f61da2e5a0aae741f,2023-07-21T17:47:56.977000
CVE-2022-34488,0,0,9f7468f155d6c9a029d3e53bb8675db4e6a42232517559771e6e01538a4c3812,2022-08-24T17:15:33.933000
CVE-2022-3449,0,0,edb95d092076331354b0876f8929759a4155679c65c9ea0991fde4a9b759dcdb,2023-05-03T12:16:24.953000
CVE-2022-3449,0,1,cd1f8553e2dec5d8a1f9b3e93144e08bf0a5a0000c6eb1509dced556c24ccb3e,2024-10-24T15:35:06.617000
CVE-2022-34491,0,0,6187ed181d7b674a78943e3d774b41de94989ca40b50c2995c2fe8e77a783692,2023-11-07T03:48:43.663000
CVE-2022-34494,0,0,133732b4da186c3b9b06c9705864951ffb0dd7c6955480ef39cf7ac80eb7de48,2022-07-08T03:59:53.243000
CVE-2022-34495,0,0,e45828bc64813c8a245129ecf879ef2df77a442f8b28a7e885cec34aa0fa5a1e,2022-07-08T03:59:38.723000
@ -212568,7 +212568,7 @@ CVE-2022-48953,0,0,037e26b090bc3b5c06ab9dffbf7de850a858e5fc3604925c0be082d71471c
CVE-2022-48954,0,0,d03a871ace91d7fda187606652c7e051870285e499bfc0944e94d8b0548b731c,2024-10-23T15:13:25.583000
CVE-2022-48955,0,0,adfc623e02dfe3e9e8f9ee1f86ccacf1144c3f91e445f7d71c55691d3ddd637d,2024-10-23T15:13:25.583000
CVE-2022-48956,0,0,efc542c10b827503bb60baef12ae6363e9aaed958a02fa0171aa8b339eb477e6,2024-10-23T15:13:25.583000
CVE-2022-48957,0,0,e75f592b46fc02f5c17b54b9d14925ac4ac550c8bec708e43fe7280bb85bded4,2024-10-23T15:13:25.583000
CVE-2022-48957,0,1,b7e09cd0df5d0a3d101f25f751f05c8c173e31e135a7f732ca112404e9035b67,2024-10-24T14:41:15.423000
CVE-2022-48958,0,0,64a1b4825cb7fe46a7f91cfb2ea852904955b0ccb818b0aff987ae8d6445afa5,2024-10-23T15:13:25.583000
CVE-2022-48959,0,0,15542692f4371b13a09c39e6e151849b1884a96a610571abab83498557c99ba6,2024-10-23T15:13:25.583000
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
@ -212646,8 +212646,8 @@ CVE-2022-49024,0,0,c66f01f2c8a41a2a22849da074498e2a47f55851811c1bb200d8ff998c2a4
CVE-2022-49025,0,0,74891ed957efad34f677418cab3fc02558af109bc31094684e4f71f7e513262c,2024-10-24T03:49:31.117000
CVE-2022-49026,0,0,c630624ae5ef0b33737eb7a4e8aca460751443c455cccef89fa99de8555301fe,2024-10-24T03:49:21.780000
CVE-2022-49027,0,0,08617aba8accba8d40c33a2dd9323ed07c4a53388d9fcae1554c4898c81215ae,2024-10-24T03:48:53.720000
CVE-2022-49028,0,0,feac20437bb7da1f124a8fd07fbdf5c8a01c1dfc3a8fe17089fe43ba3203fed8,2024-10-23T15:12:34.673000
CVE-2022-49029,0,0,e9f2fdd5a911ae13fff2c73a1d3fa9d99016d5a0884f3d9f5ef330bccd743b65,2024-10-23T15:12:34.673000
CVE-2022-49028,0,1,151442faeff9b14d8ce2ae4c9a4c94db2834ff9ccfc2de89b8fd58ca69c8cc70,2024-10-24T15:51:45.197000
CVE-2022-49029,0,1,bc3565ae22eee1b819f7f608c3234a9c6a391de68ad397b4af9e7a0668ef7d9d,2024-10-24T15:59:48.417000
CVE-2022-4903,0,0,cf9430f75554b10fc3063c2d4e895e2575b24650a7af1dc91ee51937fe80926d,2024-05-17T02:17:02.397000
CVE-2022-49030,0,0,8b08791e22bd0db2cd2447524ac51c27e6a5d22f5626359a796fc03cac974990,2024-10-23T15:12:34.673000
CVE-2022-49031,0,0,fda1b563d41f60673577f402073e67bd27d4683f91bb9eceb6214101f7e415a1,2024-10-23T15:12:34.673000
@ -219709,7 +219709,7 @@ CVE-2023-26073,0,0,59e2c8b3a6d785e79781106c4e1d079a2047125e5cee40c30bd1572395040
CVE-2023-26074,0,0,50149b67cd5f68573b9c4116e983b7e1b833176da2c6d46556a625ff88f9586a,2023-03-17T16:15:11.780000
CVE-2023-26075,0,0,3d35e06696d96861b79d21bd7bac50e11180e783b053559a12061d222c80ab1f,2023-03-17T16:15:11.950000
CVE-2023-26076,0,0,a7451d5219fa5618a56af84d3954091bb22256c2e763a60824e78afca9c9bbf1,2023-03-20T15:15:11.857000
CVE-2023-26077,0,0,f4460796ae577a5df852818d1a2c0f732caed89d339395a4e6b9b7871cd30850,2023-08-01T18:41:29.353000
CVE-2023-26077,0,1,fa64e1186d0b6124e4d93139b86162fea11d9bca4c05049bbd52b934ae34cf47,2024-10-24T15:35:08.163000
CVE-2023-26078,0,0,99a82d1f2307c0af55ea47901bf890baebf0923c734e106aea05076b418cb7e5,2023-08-01T18:32:47.623000
CVE-2023-2608,0,0,d494f8dfb7fa3b5a48eb4d4ce03feba1c517f6e29072e3592bc8340435ee43b1,2023-11-07T04:12:57.297000
CVE-2023-26081,0,0,5999f9f7e535ff88a731bb1b77f738ab9baff451329f06c21220d078ed6ae0fe,2023-11-07T04:09:18.943000
@ -223829,7 +223829,7 @@ CVE-2023-3133,0,0,003d70726348f1765d3e8bbdc7b1fe8c778d5248156227efcf8dfd6079b65e
CVE-2023-31339,0,0,e4cc23c4700ecf86354703903a778509544da5252a232445d94a47ff3cdd4fd3,2024-08-14T02:07:05.410000
CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f557,2023-11-07T04:17:58.303000
CVE-2023-31341,0,0,dd24cf83580387b35de43a1761935afa05605b69789156e33c8226af92558012,2024-08-14T02:07:05.410000
CVE-2023-31346,0,0,fb91d6feb6afb0cbe0e766ab4beb996d6abc6e4e588496e59a212a252857db33,2024-02-14T13:59:35.580000
CVE-2023-31346,0,1,baf70a7fbcbac8ee2109bb0ede410a1f9d8a0f3d16eca151ea162e0c8735e373,2024-10-24T15:22:58.270000
CVE-2023-31347,0,0,5703df889e7697d9a941bc897ce8eaa50a95592c03760c9ac7c4b13dd799542a,2024-10-22T13:30:27.637000
CVE-2023-31348,0,0,c306f0d237e2d8af9608a978530584d20b1bf70ff2c23a680094507cc83d2886,2024-08-14T15:35:02.560000
CVE-2023-31349,0,0,fec448b23889f050ed9b2294a5aa334ceb009f790e378982e075155aa7b4ad20,2024-08-14T02:07:05.410000
@ -229972,7 +229972,7 @@ CVE-2023-39421,0,0,b429a895afdedc9c36dd5c5425181ab97cb6fdaa39bf732c05a639fbe3014
CVE-2023-39422,0,0,72c36f0786bc85dfa4f87b525f369f4a6cfb420cbd61a65bad0ef138fa65a646,2023-09-12T00:08:38.390000
CVE-2023-39423,0,0,b137ea47a734ad72fd6ed4a11c3761af90c72f537ad591bbbb4cb9a85c680235,2023-09-12T00:08:52.437000
CVE-2023-39424,0,0,f3d62a8e20d353d961c8bfcc8b71261927180f4bf2e1ad6a02639e30443db2b8,2023-09-12T00:09:32.553000
CVE-2023-39425,0,0,876da9d4cf1a98c432fe0fea982dd3ae5909385d2ba772d09077243ea0eca161,2024-02-14T15:01:46.050000
CVE-2023-39425,0,1,21ccf0e32816b2518f69e06d90279a7560d3c011949cad7bdf7ab35594bdc2c1,2024-10-24T14:44:37.993000
CVE-2023-39427,0,0,bc7e52ed8676d0287ba324301b50627a151b43fb5cd244be9fa42525dbdfdcf8,2023-11-06T19:16:07.113000
CVE-2023-39429,0,0,e45d5f249dbba37b2a0f500dde0eaa26a84ef98250d6082bd2805021c83d4156,2023-10-04T17:08:58.890000
CVE-2023-3943,0,0,3bfea338ff2ecfcf77a5fa067300607a2b70e9f53e16468b7b1451e54df83026,2024-05-21T16:54:26.047000
@ -231397,7 +231397,7 @@ CVE-2023-41227,0,0,0ac4de022c89d8e7b4e3eb3cbbded25e702dc7d1368ea360eaa80e82de35b
CVE-2023-41228,0,0,4afe01ea307af7d64041f7a4b6b0259013d7bcab5e22627d4679504e372eba86,2024-05-03T12:49:24.027000
CVE-2023-41229,0,0,8db6ccf0dfdfabbcbeaac3dafa7db55521bdc8edefd9a0f8d8c73d0698901001,2024-05-03T12:49:24.027000
CVE-2023-41230,0,0,d5b58ba7084d3574683a53fa3ed0da9249ae995db0c91d9994da857fc7340f43,2024-05-03T12:49:24.027000
CVE-2023-41231,0,0,ef7ccb3b6704800f0b27591747a55137305ce4f885d188cafe4e43a7a1f68b4d,2024-02-14T15:01:46.050000
CVE-2023-41231,0,1,1670a6fb01410b70e486a46ff93dcedcccd7391f61ccb598bfeb87470e5c1e04,2024-10-24T15:19:24.257000
CVE-2023-41232,0,0,3d116d530b4546e60c0428c33484557fa321710159cbdfa8a5dc7914441b79df,2023-11-07T04:20:56.977000
CVE-2023-41233,0,0,c824b54d81fd4e158188fff3f62ccd88dcda8cd092e16e08150f47d392bd8b03,2023-09-27T20:15:42.197000
CVE-2023-41234,0,0,9795eb85f53d4b6a23a2a5582cd6d407e4f62aeed83d50496f80cc6c043ccbc7,2024-05-17T18:36:05.263000
@ -231417,7 +231417,7 @@ CVE-2023-41249,0,0,79989a11157032eb35ec3ea858bc7513ba5b1bb38768a677a14fa21a5bbfd
CVE-2023-4125,0,0,b86667e6aa1caf5a0eda2b2513a8fb6375be136688d9529cf451335c672a0b57,2023-08-08T16:36:43.700000
CVE-2023-41250,0,0,c4cb81076b638ba4c97f19907f7c5fb1d82e5c38b5d898032931188966c7c2c5,2023-08-28T13:35:55.523000
CVE-2023-41251,0,0,ee35336ee10e9fa71b84802e50c67bca7e9cd2c54eb899ff8514480ab3016dac,2024-07-11T16:02:49.597000
CVE-2023-41252,0,0,c5f73adbb9fec7944165ecbb0c1bd758d0bd9f8f96ac8568b0c6f49b1a7e0c6a,2024-02-14T15:01:46.050000
CVE-2023-41252,0,1,e9756b855a7ff5b81709d97613594fba2d589303b071752adec9be3ae067f852,2024-10-24T15:18:36.377000
CVE-2023-41253,0,0,964f76e5a4acf446546908d5c8e02e815f9b2b9d6ac98bad7305b6d01dc1c1ca,2023-10-17T13:41:05.010000
CVE-2023-41254,0,0,053f3f1fdc74f454b96a90ade74b907f424357619cf33f56eb5487b30b002019,2023-11-02T15:20:39.743000
CVE-2023-41255,0,0,e107ac907b537ef5369f3a814b6b67f3ff048acf89073d6fb94c322aa8a80490,2023-11-06T14:33:10.043000
@ -232501,7 +232501,7 @@ CVE-2023-42772,0,0,cdb27eef54dc104256bfa11941a8b1f64b3fd3c507062968520ef5ff5b87c
CVE-2023-42773,0,0,736d6fa55c636e82886587b5e918da34ad4de8b81b4ecb0ec09664b358c5957d,2024-07-03T01:41:31.007000
CVE-2023-42774,0,0,40bbb04fe664ff16c3f091d8363ad280105e6dbe35f0ab759a1f5560a5828493,2024-09-09T12:21:53.383000
CVE-2023-42775,0,0,40c6bfa8c9f86a45ce52e50235f2570eb4f7b93566f6fd5c62bfbb202924381c,2024-02-14T18:15:46.060000
CVE-2023-42776,0,0,c5b5b0f8ccf685179471cf6ff878b13d3960b1214d23bbbe69ae29edf0ff1f68,2024-02-14T15:01:46.050000
CVE-2023-42776,0,1,4787f5badc72a663583c8f319318cb6746c7b0f415bad24b418c3b6c0ab76542,2024-10-24T15:00:23.237000
CVE-2023-4278,0,0,4099170fe2b08e34c902633d86df3e2c8d741624754fac28dc1e9167eedb9f8a,2023-11-07T04:22:24.307000
CVE-2023-42780,0,0,3790c4ff90dbadf7a89984dd55c07a80c3ca35d9fa8fae9f24cc4cbebcf1b80a,2023-10-18T18:47:43.430000
CVE-2023-42781,0,0,54916ee01046d4c8ab6caec23ec8b6488cc0488c3f570dcd4308a905ccfb4e9a,2023-11-20T19:33:07.527000
@ -239622,7 +239622,7 @@ CVE-2023-52913,0,0,0dff51631ec1ab5b0464af1dd4af3149cc942bacf8d31e47da582f111f384
CVE-2023-52914,0,0,3e2f63e6fcc2429a7a056b2f17033ece733c3917a2a011b1363b92bf8c84ed22,2024-09-12T14:07:17.137000
CVE-2023-52915,0,0,ce3c89a4bf7cab80e859d29c06c18dc19c9bdeb973ab832dffae6eeb3861fdf4,2024-09-10T17:12:41.607000
CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a53b,2024-09-06T12:08:04.550000
CVE-2023-52917,0,0,fadae4ec5e5aee737480721d0991bf811403c3e8c62826f0e019ee2079cb11e4,2024-10-21T17:09:45.417000
CVE-2023-52917,0,1,e7e17c5c7f3534e727632e5d0f203ae6b740f17b02a99e6ffa625b25ee582c40,2024-10-24T14:38:22.610000
CVE-2023-52918,0,0,21564d3b5227bff513646c579d7bdd7f1583e549e4c51e98581a4d9efd156cd6,2024-10-24T03:55:26.737000
CVE-2023-52919,0,0,a37d9d88a926a49efde8ee5228e861273658f480dcdcfcb710741f8df16c3c09,2024-10-24T03:53:16.377000
CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000
@ -240689,7 +240689,7 @@ CVE-2023-6437,0,0,9b3572153b8caad8374ba1100e56569e288c0d00a3202786525a4d03406cd7
CVE-2023-6438,0,0,6daf1d3d2ea9e9b306dc29265dfd789ce3d2cdf19acb74252fa8477124a291e7,2024-05-17T02:33:42.577000
CVE-2023-6439,0,0,2fd51252b7242bc1104207ea725d14594821bf82751b1e0c9199ac3e596d9aeb,2024-05-17T02:33:42.683000
CVE-2023-6440,0,0,44617a6fe44034e68c5ff357c91002e842422737eb396d3b8fd459bcc06b1990,2024-05-17T02:33:42.797000
CVE-2023-6441,0,0,4e3ed762b1b333f0b5899150575335c932d5430d05add4fee5447dc39cbaf911,2024-02-14T15:01:46.050000
CVE-2023-6441,0,1,0323135cd6cddcccf0f00dd496af661d69cb09aabd254ccf39ee3f8ff618c26c,2024-10-24T14:48:19.090000
CVE-2023-6442,0,0,128bac7dd14883eb4c00eceea86f70f4b49ae819c28f26805df5805203f33140,2024-05-17T02:33:43.013000
CVE-2023-6444,0,0,62cdc7f3c72ab10179ef1b3fc097412134719e5dbd8a0fa43cc32bc34dfa49cb,2024-08-05T18:35:04.620000
CVE-2023-6446,0,0,bac85af63fe451a7fb1753c85f4eb5ad583f9e3629cc0a34b2a98e7bc62f9986,2024-01-16T23:56:41.727000
@ -242409,7 +242409,7 @@ CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5ae
CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000
CVE-2024-10176,0,0,a6b783148bd1a1eac67726394a4677b137b6e7dd5e34ca99e4715b9b20292888,2024-10-24T11:15:14.057000
CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000
CVE-2024-10180,1,1,f877ba91618188a9b5f9376746e661d243a52e17cf52fb55e690512c795441bc,2024-10-24T13:15:11.537000
CVE-2024-10180,0,0,f877ba91618188a9b5f9376746e661d243a52e17cf52fb55e690512c795441bc,2024-10-24T13:15:11.537000
CVE-2024-10183,0,0,120f83031d6b056b9464662cc23a397a8370d5b6b85b4ebf16896e12042e7ae6,2024-10-23T15:12:34.673000
CVE-2024-10189,0,0,c7e7e9c9433451acc4ead77e2398a65c092c06680c0a336db7286291fd8ac494,2024-10-23T15:12:34.673000
CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000
@ -242417,18 +242417,18 @@ CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337a
CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000
CVE-2024-10193,0,0,b44a42fd354bbacf77f6767c189a0eddd1a8f11ea5e00dc8bb5624fa68c91f85,2024-10-23T16:16:11.837000
CVE-2024-10194,0,0,beb4695ee0759be44b5390e88d9177fecdddb4f13d71de2f923c2908ef946665,2024-10-23T16:16:49.703000
CVE-2024-10195,0,0,433002dc4be76148bf0f1e8e85e5de7bd9f18de30e21fefcd1f30061067a4930,2024-10-21T17:09:45.417000
CVE-2024-10195,0,1,9c9e1b94dd6ac9bf355803ce978f4981318d699727002f71ae9afd31c3fbd1ed,2024-10-24T14:28:53.007000
CVE-2024-10196,0,0,90b9a4c8c1bbc9cc12d3c54632ebd3a76326bf6f32219a9f3d2039a7242e607d,2024-10-23T14:15:16.843000
CVE-2024-10197,0,0,7718b3c8726b69a6cc1d39e0b2a3a9b59c3c49ee29e6d3bc5c07a1b64761daac,2024-10-23T14:14:52.420000
CVE-2024-10198,0,0,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000
CVE-2024-10199,0,0,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000
CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000
CVE-2024-10200,0,1,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c44307a2,2024-10-24T13:57:28.357000
CVE-2024-10201,0,1,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000
CVE-2024-10202,0,1,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c44307a2,2024-10-24T13:57:28.357000
CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000
CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
CVE-2024-10229,0,0,3c4fb9ca956b215d6891f05cec1bb6664ae35049ccd9a8e1dad507ca063ff01a,2024-10-23T15:12:34.673000
CVE-2024-10229,0,1,a7b204502d5cd273668671912d302bd3d0ee6cf96efb3658f24a856d63251728,2024-10-24T15:35:13.163000
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
CVE-2024-10230,0,0,071efdf8dbe6f43ad8bdfc5cb0324a8f9b14590d6803d3d3f568746922ac2f52,2024-10-23T15:12:34.673000
CVE-2024-10231,0,0,c15e7dbf37700d38c3e757762d5346b89ebfa63b0f9c77dbe606c20e045e3b74,2024-10-23T15:35:19.003000
@ -242466,7 +242466,7 @@ CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
CVE-2024-1033,0,0,6041b3ccd70df4052a8c26438331689f702c93b37a47aeb2d707df9d77ed7f49,2024-05-17T02:35:12.047000
CVE-2024-10331,0,0,0ea4704cb0b6d504547be8cbdae887d3647db162f6beaaee72d4b7584e44cc6c,2024-10-24T11:15:14.327000
CVE-2024-10332,1,1,85cf635cfe3f26ffd48ff5c222b99c1eb587859c46939f8e6364d970eb422157,2024-10-24T13:15:11.830000
CVE-2024-10332,0,0,85cf635cfe3f26ffd48ff5c222b99c1eb587859c46939f8e6364d970eb422157,2024-10-24T13:15:11.830000
CVE-2024-1034,0,0,454f09f0f5fc636699352f4449a6882a204ccb564a121fe5e40109839ef595a1,2024-05-17T02:35:12.150000
CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000
CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000
@ -258062,7 +258062,7 @@ CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6
CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000
CVE-2024-40595,0,0,a181f13e8c06f281b39ef40cbf09da0370cf06e7de45b29ab6f71c694074e46e,2024-10-24T06:15:11.703000
CVE-2024-40595,0,1,5403be664a57fe0bfd6968ff619020be967014ce0691f10a0271d8c2e691a842,2024-10-24T15:35:14.670000
CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000
CVE-2024-40597,0,0,9253bd3e0343b7becb6fbf27eb19f59c2b782f333d3980529c893721abdb7002,2024-07-08T15:49:22.437000
CVE-2024-40598,0,0,de25c69f35558b8aca0a1bbf15e54892da14954831f161b4abaf3c33fd743682,2024-07-09T16:45:38.957000
@ -260138,7 +260138,7 @@ CVE-2024-43685,0,0,a89a9c99e0124da64988793c53f10ebfe259e8367a37913b86ec873ac50d0
CVE-2024-43686,0,0,57da9b9a959d579b6b38566543c182c3ea32961f0f4f75db16d108202427ec80,2024-10-16T19:20:57.230000
CVE-2024-43687,0,0,2d688f9009e177644291437898c6abc2a42e1449965d5242ebc6bc49d96ae3d9,2024-10-16T19:28:09.177000
CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000
CVE-2024-43689,0,0,fe54f922e4493fe8e62745757964a53981d998fc64b2a31c99a382f9d913ebf4,2024-10-21T17:09:45.417000
CVE-2024-43689,0,1,6f23e58b4260cafda21579386b8aee6692125d25e44c62a3506c2f2048e021e4,2024-10-24T14:02:22.077000
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000
CVE-2024-43692,0,0,dd90c0c7ec0961e33104688c3a64f24371b069eba59a503241b07b01ecbb28f7,2024-10-01T16:22:38.197000
@ -260335,7 +260335,7 @@ CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2
CVE-2024-43942,0,0,e66d301ff91d4e3d6c85080e28c55dc563393fe5e437a624aa40d0cb331e6a52,2024-09-05T15:25:59.153000
CVE-2024-43943,0,0,0708a62e7be84f809da9677b73fc0a902b7d605c03fc359ea64fa95773946d2e,2024-09-05T15:10:48.663000
CVE-2024-43944,0,0,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000
CVE-2024-43945,0,1,3eee0127af56741c0043b8ad8f3f2e30d3c3268995805e54c57f753558aaa68d,2024-10-24T13:45:42.487000
CVE-2024-43945,0,0,3eee0127af56741c0043b8ad8f3f2e30d3c3268995805e54c57f753558aaa68d,2024-10-24T13:45:42.487000
CVE-2024-43946,0,0,f240acba317febcf1e96ae7507bd3580d8fecd1103a0412511da00f09d6e888f,2024-09-03T15:21:07.167000
CVE-2024-43947,0,0,00adf93b652a6a1fea9f57602f2aa8edc17efc755f7abf02b222226d3eb2a44e,2024-09-04T14:16:00.423000
CVE-2024-43948,0,0,f60ff73d80da3808d8af4258622a438dd588d368d767678c8fd4008f71ea0306,2024-09-03T15:22:20.567000
@ -260441,7 +260441,7 @@ CVE-2024-44058,0,0,2a31d13e7c34ecf4ce5a2c39e291bd8b424b5c5c23539a4a1d30676f56f1c
CVE-2024-44059,0,0,3f6c3a8dc5dadae72dc0df667c364ac97c0b5812f742d2c5b5a2597b4b344930,2024-09-27T15:33:52.013000
CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000
CVE-2024-44060,0,0,6924c0c83b583f3e58aed5b3f0343601ab88a5f9325e897d35fa92b3431e95c6,2024-09-27T14:04:50.977000
CVE-2024-44061,0,0,bb5a53075c211c5690acb49a7707d112fc365dedf03ff067e457eaeabfeae5ff,2024-10-21T17:09:45.417000
CVE-2024-44061,0,1,903a772f10721462dfee880eb6a7a01ad434f3827ed090860c5e36d1e174cdbe,2024-10-24T14:40:06.110000
CVE-2024-44062,0,0,d6bef9112163640e773e122d40930de4ecec4777328c835263d4052bfb0847a1,2024-09-27T15:49:46.487000
CVE-2024-44063,0,0,8ea7a84a37f53fc26574f2d48b688739bfe3dad8852d642a265a023b1a91cd34,2024-09-27T14:31:05.703000
CVE-2024-44064,0,0,4e74c010eb0f0db49dd4385b0641f0bed56c75cde28c530ba6b3d37d998a5b5d,2024-09-24T18:15:30.537000
@ -260846,6 +260846,7 @@ CVE-2024-45028,0,0,7d5b512323cbd1eada9374cd0af8594b979474aff5440b5d3cab41fc49bfd
CVE-2024-45029,0,0,21260e7ef8d10dc3c2200fe33709508a97de174b7662049f29f251b7e7a6c818,2024-09-13T16:29:29.740000
CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000
CVE-2024-45030,0,0,a5fdbeca43ac64eed9d343d3ecb8fc38b2b39144c16b9671c8c2fb6202b08e32,2024-09-13T16:29:23.557000
CVE-2024-45031,1,1,5f141bd5e9521753185165a28c539919e835f95dbfb8c243eec685e8c159e5dc,2024-10-24T15:15:13.533000
CVE-2024-45032,0,0,9e9832070815f198bd13b47e9ba247da81e362143ea041571debdd67a5f9cbe7,2024-09-10T12:09:50.377000
CVE-2024-45034,0,0,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000
CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000
@ -262054,10 +262055,10 @@ CVE-2024-47320,0,0,34657895a2dc740604de3ed70971ec71840d6f541e4b1dab5738b65bfae57
CVE-2024-47322,0,0,8b232be4cdc689515d55262ec30fa58411c26ba1e6f796e82a1afc447dc811dd,2024-10-07T17:47:48.410000
CVE-2024-47323,0,0,9437c7effa68c712270b139ca11dd61e48e93b311d9f840ede69c45aa4843c11,2024-10-07T17:48:28.117000
CVE-2024-47324,0,0,9d0a8be9058b908dcef652c569e8b2141d19736e2ee3f4e8dc4463e949bd1e2a,2024-10-07T17:48:28.117000
CVE-2024-47325,0,0,b7c67b77836c7ef4d3b0ddbf89fd1446eb242341ba657ab302903e9df4924d62,2024-10-21T17:09:45.417000
CVE-2024-47325,0,1,e0a6e26d95463f332fd04484f8064d604d118227f0a943361e94908fa2c2cc49,2024-10-24T14:43:29.570000
CVE-2024-47326,0,0,becaddd8932d32a061dc10bf0f467953cb83f3406fc8da77294097e28e38b53b,2024-10-07T17:47:48.410000
CVE-2024-47327,0,0,c538510929aaa1efef8590e5c0955bb05270eb6eca4d47152891a99d515cb043,2024-10-07T17:47:48.410000
CVE-2024-47328,0,1,983ca76f75739c6c5a714cbed6751627aac116c793e329729ee2a340616318c0,2024-10-24T13:45:07.193000
CVE-2024-47328,0,0,983ca76f75739c6c5a714cbed6751627aac116c793e329729ee2a340616318c0,2024-10-24T13:45:07.193000
CVE-2024-47329,0,0,8f9cf4ad2ce9c10f9ea9bbbdd9112304e1d41b0ef8826075f80f55633e097d19,2024-10-07T17:47:48.410000
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000
@ -262210,7 +262211,7 @@ CVE-2024-47562,0,0,f948ab473eac72b74771d65275c3bce022b2870f6200aad718c4a235ef7a7
CVE-2024-47563,0,0,8e14a8aeeab89240dc7f71203e62b9d2c2b2c697ebcb095329938e996837371a,2024-10-11T20:05:05.143000
CVE-2024-47565,0,0,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29d8c,2024-10-11T20:05:59.237000
CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000
CVE-2024-47575,0,0,56459c5309a8e724cb74bc996b97fd6918ee3b1384e95d460a22b7d5d319411d,2024-10-24T01:00:01.510000
CVE-2024-47575,0,1,cd9012ad1ccaff741ce1ee8c5f1420acedb8bc0500c1a163dcd321c7638816e8,2024-10-24T14:20:16.333000
CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000
@ -262290,7 +262291,7 @@ CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c514
CVE-2024-47678,0,0,15331914c6780ab092c41bd83df4ddc0c2577572736b4bdeb76d32ddb58569bc,2024-10-23T17:58:08.720000
CVE-2024-47679,0,0,ff4453f27f8106322d7b03df5908d00952b689ca70903c4a49e7a2270442cdd5,2024-10-23T14:49:48.763000
CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000
CVE-2024-47680,0,1,85b7bbd97d74c47a9aa92c2d94a2f61310bff87569833c13313a2d001955242c,2024-10-24T13:28:28.393000
CVE-2024-47680,0,0,85b7bbd97d74c47a9aa92c2d94a2f61310bff87569833c13313a2d001955242c,2024-10-24T13:28:28.393000
CVE-2024-47681,0,0,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000
CVE-2024-47682,0,0,46fa66ba51047277cbea09ed5154dc9b7e2d2f32e222256eb9a1726a2684da5f,2024-10-23T14:57:12.700000
CVE-2024-47683,0,0,7ec7028bb740304f208393a68c6cce367ef86fe45c0c6df398de986d9b0bace8,2024-10-23T15:02:12.800000
@ -262314,23 +262315,23 @@ CVE-2024-47699,0,0,a649321c3c62946c27d09d6c13d5161ed777809ecd0e53e52f303ff6b209e
CVE-2024-4770,0,0,9501f8bb52643b4bcadd7b11da17e463cda395ec382733177c6b60e7ef1c0b7b,2024-08-01T13:59:34.293000
CVE-2024-47700,0,0,2017f4ecdf3ac9fb945c295c530239c6c5325bbead194b7829d425a5314d8537,2024-10-23T21:27:28.460000
CVE-2024-47701,0,0,e7fd8ef13cfb1aa2224c6841a816ccccc9f12292bc7638f5e524d658b41c3f0f,2024-10-23T20:53:13.877000
CVE-2024-47702,0,1,4fa3d967ffbadf12fb6c01c992b56894691b45fcc2d205db476ff79c89a154b2,2024-10-24T13:30:59.247000
CVE-2024-47703,0,1,796b5b6be96a0ced5b6e123cc8578cddfdc8073493c4b1a1791994d2deb26160,2024-10-24T13:33:36.957000
CVE-2024-47704,0,1,7f115fee55f7bf58b7b4bee6b2afd506c3c086f3c29855ce47077a1effa32a50,2024-10-24T13:34:43.690000
CVE-2024-47705,0,1,e7c198f3535c7a72b4bfec9cc6d9ca47aa8f45fbdbec07dd9bedff5a77a2d0c6,2024-10-24T13:35:51.807000
CVE-2024-47706,0,1,cd63c8ed158cfb21c8b8ac392ba7471ceb14a249a20ccc4426d3a58dd84a7436,2024-10-24T13:43:05.547000
CVE-2024-47707,0,1,864a08063baba87a73f9a61049587aef13244a8d9abe6cc9cc16f5b205898a12,2024-10-24T13:44:21.007000
CVE-2024-47708,0,1,84d92a6ebf75a6dcccd4837b264066bdfde47261e39b8bedc2f6fc7fb0d760bb,2024-10-24T13:45:19.677000
CVE-2024-47709,0,1,b8a7a163c2f906b051e948c0df0675acc39021bcab08ade900c91a3febb6550b,2024-10-24T13:51:56.023000
CVE-2024-47702,0,0,4fa3d967ffbadf12fb6c01c992b56894691b45fcc2d205db476ff79c89a154b2,2024-10-24T13:30:59.247000
CVE-2024-47703,0,0,796b5b6be96a0ced5b6e123cc8578cddfdc8073493c4b1a1791994d2deb26160,2024-10-24T13:33:36.957000
CVE-2024-47704,0,0,7f115fee55f7bf58b7b4bee6b2afd506c3c086f3c29855ce47077a1effa32a50,2024-10-24T13:34:43.690000
CVE-2024-47705,0,0,e7c198f3535c7a72b4bfec9cc6d9ca47aa8f45fbdbec07dd9bedff5a77a2d0c6,2024-10-24T13:35:51.807000
CVE-2024-47706,0,0,cd63c8ed158cfb21c8b8ac392ba7471ceb14a249a20ccc4426d3a58dd84a7436,2024-10-24T13:43:05.547000
CVE-2024-47707,0,0,864a08063baba87a73f9a61049587aef13244a8d9abe6cc9cc16f5b205898a12,2024-10-24T13:44:21.007000
CVE-2024-47708,0,0,84d92a6ebf75a6dcccd4837b264066bdfde47261e39b8bedc2f6fc7fb0d760bb,2024-10-24T13:45:19.677000
CVE-2024-47709,0,0,b8a7a163c2f906b051e948c0df0675acc39021bcab08ade900c91a3febb6550b,2024-10-24T13:51:56.023000
CVE-2024-4771,0,0,65ecb44d66f4d1dbe0ceedf41bce3009ee95c66c5cee70725cf485ae8cc22e85,2024-07-03T02:08:06.447000
CVE-2024-47710,0,1,b6f98824faad2f15d4e1e3ab82b6b821ffca4bbabf23f5f9e7a56feb6079f2c8,2024-10-24T13:57:58.060000
CVE-2024-47711,0,0,3365c0a79579c030324969541f10771f2947b1892ee1135c057573f832ccc1dc,2024-10-21T17:09:45.417000
CVE-2024-47712,0,0,1db48c57a3069d6cc743b1aa09117fc7e993e94c4a794f5a3174e28d1a1fed0e,2024-10-21T17:09:45.417000
CVE-2024-47713,0,0,9ddc786aabb691e42a47c8351eaff5a3e819fe6af40b5b7b514a165cdae4c79b,2024-10-21T17:09:45.417000
CVE-2024-47714,0,0,b18d52269000d9f08dabff517a2d03ad40480071911b85fa9f9a279e3e6824bd,2024-10-21T17:09:45.417000
CVE-2024-47715,0,0,43660f0ff4516d5d5f706db1c1f84eec03fbcb32363e32cd44049f60b1046596,2024-10-21T17:09:45.417000
CVE-2024-47716,0,0,5d530e2f159cb87e4276b67fd175dfe0a33dd705332a3351f0800e98844bc395,2024-10-21T17:09:45.417000
CVE-2024-47717,0,0,1f16a2dea7123b560b45f1d5577cea2499c14593f46e8b947c80eaec41cca786,2024-10-21T17:09:45.417000
CVE-2024-47710,0,0,b6f98824faad2f15d4e1e3ab82b6b821ffca4bbabf23f5f9e7a56feb6079f2c8,2024-10-24T13:57:58.060000
CVE-2024-47711,0,1,94c800bef03298e20c0b90214d569baa1c70d7808e21cc08e16823f8cdaf26e1,2024-10-24T14:03:24.700000
CVE-2024-47712,0,1,6aecf7ae7db248f7a6b4dcfe567fb2a9db8198f5cb15d8db752280672103fdb7,2024-10-24T14:17:11.550000
CVE-2024-47713,0,1,bd486cff52abf62763e4b7baaf68ab4bda2602251d9e32825d6555db87d3aa5a,2024-10-24T14:19:15.500000
CVE-2024-47714,0,1,3420d207974f10da573ac2b39c26dfa7eb9eff1332b2c383e906412e3cb2a5dd,2024-10-24T14:33:17.720000
CVE-2024-47715,0,1,64d6ef6c6d0ed5b8db8fbbeaf587a1d40a70cc6f887225075126b7a0251f59f6,2024-10-24T14:35:59.327000
CVE-2024-47716,0,1,7f90c3731e690eada425c700cd2a01b8b54c79669e7a532a03b033a5e0cb5b22,2024-10-24T14:34:17.863000
CVE-2024-47717,0,1,44f02bbd6ee4d2f5802475a5ee7700159b1fba306e7a83d7aea28954ffd54fae,2024-10-24T14:32:20.817000
CVE-2024-47718,0,0,b58fc361c85af159283e0d7c725f5be71f82b030723471120f8cf3a71cb6ecd8,2024-10-21T17:09:45.417000
CVE-2024-47719,0,0,898fea7ef9b2c420d78f61822149f872729ff53db69e2ba127d283cb3de507b3,2024-10-21T17:09:45.417000
CVE-2024-4772,0,0,49f0c7fc95339e6e98a7cbd8d8849904a773b2a05345b7622006e8647831f13b,2024-05-14T19:17:55.627000
@ -262340,7 +262341,7 @@ CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c
CVE-2024-47723,0,0,e78b215d0cbedf337fc4d670e1844dbbd29b556e5053e7d66b95322a621daa0b,2024-10-21T17:09:45.417000
CVE-2024-47724,0,0,b0b6218a8d1556c24347cd250db3aa8881cbc479b3592b0207e222b0cd9706a4,2024-10-23T21:41:13.390000
CVE-2024-47725,0,0,8d79cfc5f420589203ee56c1d45c4e18a5d4c2e87a501b10347996e89a7f75b1,2024-10-23T06:15:05.200000
CVE-2024-47726,0,0,c446e3e2dffbcccbc0186f0322a85b4a05a0668ee60808d5804eca57a29d9a39,2024-10-21T17:09:45.417000
CVE-2024-47726,0,1,6675b046d09b2de4371d637faa06c73c9d391480b9a61eba3311048396603de0,2024-10-24T14:24:15.993000
CVE-2024-47727,0,0,fc32a56adcbbff4e2799b546fb9615ee8b3a5b9f2ec8d528896d932f20815110,2024-10-23T20:32:53.743000
CVE-2024-47728,0,0,078cddb648129de67d827b2e4c30d6b1648a6580771fed27f0882586adfa8cdb,2024-10-23T20:36:52.367000
CVE-2024-47729,0,0,5d214513e4d9a710b6705bcad68845bc2180f0d8127eb64a1f49d79bf4532b79,2024-10-23T20:40:24.640000
@ -262620,8 +262621,8 @@ CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc
CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000
CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
CVE-2024-48652,0,0,49154ba7497ef192453221e4060c2b6cb066a0169e9fec9edb64b7bf9a759b2f,2024-10-23T16:35:10.103000
CVE-2024-48656,0,0,06911636ae175250e7eba9c033b0f62399c743c3b4db83015eb8e3feed388fa8,2024-10-23T16:35:12.613000
CVE-2024-48657,0,0,afc12b03b1c15f2615796b8fbdf85df41d5ecd218f5d5af67be92a52fc07a084,2024-10-23T16:35:13.890000
CVE-2024-48656,0,1,7991ecc43dfce32475e8e1d32ee086228d1cf510284114bf3bd76e22363c0bc1,2024-10-24T14:37:36.353000
CVE-2024-48657,0,1,92137caf7714ad77e1f5fbc8130edf53e1c7b0ac9e690fd892c8d5cb42ccb1b6,2024-10-24T14:38:41.620000
CVE-2024-48659,0,0,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000
CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000
CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000
@ -262757,7 +262758,7 @@ CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9
CVE-2024-49210,0,0,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000
CVE-2024-49211,0,0,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000
CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000
CVE-2024-49215,0,0,76e95c9c81da96c4e5c4682f2ccc1a4d158465abcbc19e7e07b19566ffff8023,2024-10-22T20:35:12.140000
CVE-2024-49215,0,1,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
CVE-2024-49217,0,0,d03ae3ae7bb906a5c0350c53ea3af5b288e7f6463b03cb7a32bb31d9e72767bc,2024-10-18T12:52:33.507000
CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000
@ -262878,10 +262879,10 @@ CVE-2024-49328,0,0,e330b5e89660f19abf213bec586eeaebe3d605cff140381953fa50ab8b0d1
CVE-2024-49329,0,0,f70bf73589c931aa9ccbd5a8a6c329a32fe219888977f917a6e7137433e9c5b9,2024-10-21T17:09:45.417000
CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d17,2024-06-04T19:20:54.643000
CVE-2024-49330,0,0,7accf1e781f0aa61906365473fdf4af87b4754ed339a7ad495b0c4ebeff22d13,2024-10-21T17:09:45.417000
CVE-2024-49331,0,0,9ec402693291c894424e66eebc985f7e7ba3ce5bb7349cf58ad68284e18ecc68,2024-10-21T17:09:45.417000
CVE-2024-49332,0,0,a9ab39a4ab9de09d13501701addd6e3ccdaf63be93c7bf933ca946939905c6cb,2024-10-21T17:09:45.417000
CVE-2024-49331,0,1,58095e3320c8c95b4f4c095403074548cf5fb1f2c5efc6bdcbabc7b9e91f7440,2024-10-24T15:54:07.190000
CVE-2024-49332,0,1,82f744895dec34ed02f49cc264b39d07684020d9a7773c6cc148766eea2c025c,2024-10-24T15:49:34.827000
CVE-2024-49334,0,0,bcc2db18f40dffe6c4f8472b0ef26870ffad9612f58222d9017252998c6947e3,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,e0582084d760a7c1b5edb6582a5c201af75fdc2362c78425525e3f7ed66f6ebc,2024-10-21T17:09:45.417000
CVE-2024-49335,0,1,64cc1bcb12301e7e8f03bc857d01393c7ba079fd3a08962dcf26c673c0054a8c,2024-10-24T14:50:16.557000
CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000
CVE-2024-49340,0,0,37285f025630fd9eb79c4269f84ef859e190bfac2e34728b5f3d3dbad2273eb0,2024-10-16T16:38:14.557000
CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000
@ -262927,15 +262928,15 @@ CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb75
CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000
CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000
CVE-2024-49604,0,0,4130a6c1f975a0d07098374dd7fb4ff2ab97718728858633e395173b92657205,2024-10-23T15:49:25.567000
CVE-2024-49605,0,0,60247b99368f7bfa4039a3fcf801765c9601ec753a06227ddc6351d1c84fa963,2024-10-21T17:09:45.417000
CVE-2024-49605,0,1,21fbfbd0533f40e566065b86694a265ad75f1074bc1863301e12bf2d3d8773cf,2024-10-24T14:57:49.617000
CVE-2024-49606,0,0,482f7b3a4b3cd8858d21ac066cc90df27186c596756677b41d202355300674a8,2024-10-23T15:49:41.503000
CVE-2024-49607,0,0,65d4fe3b1dba2addf1a61a3c95e064bb0d23c04de7591f7f59b2b0d73eaf55e6,2024-10-21T17:09:45.417000
CVE-2024-49608,0,0,5d356ee42b416b0e34ac84baa67290c9c17b7c79aeab97e7f4d0a4ee1a8d45f5,2024-10-21T17:09:45.417000
CVE-2024-49609,0,0,58b5c9be468b513e3488cad4f69b335640bd2a9cfa84d94939a2898ec9a3cd0c,2024-10-21T17:09:45.417000
CVE-2024-49607,0,1,14b0682b5d7850e430a68b176338d6d07d39a095c63cb29f95aeebb0b436f0b3,2024-10-24T15:47:05.920000
CVE-2024-49608,0,1,463c92aeef38cf3a520cbaa939684f6bf6d02a06b191dbfa3d6c5121a96f7fba,2024-10-24T15:42:47.110000
CVE-2024-49609,0,1,2868af8d23be0c78520fa8f0a88d9ace0e3ea3dbcecaa5c55caf59c494bb352e,2024-10-24T15:25:17.023000
CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a111,2024-08-01T21:15:53.893000
CVE-2024-49610,0,0,4f883c779c7b80912a16a7cdc0e52ccc8dd24129efdfa293f6a1ccc1bf1526fe,2024-10-21T17:09:45.417000
CVE-2024-49610,0,1,039338c3ba824a6e0f0a00a02da5b2db5a7101b97c0ccd11f879f3399a82d24e,2024-10-24T15:38:48.493000
CVE-2024-49611,0,0,3c617deda14cf120c8b3fd2e3cd2ebc0e7d04f3285c76c5dbf7a0c701a6f6996,2024-10-23T15:49:58.247000
CVE-2024-49612,0,0,acd6c0707ff81a9cd91d7e43f1e50373957b69b17c638b1ca230b26e66d303b8,2024-10-21T17:09:45.417000
CVE-2024-49612,0,1,af010582fbcd4b53f96236d5713d19e1b4a0b4b157f8b427d5b49a128245379b,2024-10-24T15:33:14.523000
CVE-2024-49613,0,0,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000
CVE-2024-49614,0,0,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000
CVE-2024-49615,0,0,130d0356784581205e5e46cf3362c72fc7aa63cdf23c2209a80a7b2698730ac0,2024-10-22T16:43:14.190000
@ -262945,18 +262946,18 @@ CVE-2024-49618,0,0,4bf989c333be7a79b8e837d5c1bc3d3690e7ab118b29552d86d9a2559ce53
CVE-2024-49619,0,0,90d75624dc123bbb581eee963bcb0039fa8e4e0bbeeeb85a3c584d098f48d4b5,2024-10-22T18:48:11.110000
CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54
CVE-2024-49620,0,0,e4724cc5f89e1a4e44630a92bbe06c123145876533185701acef6e893d5cce35,2024-10-22T18:50:07.957000
CVE-2024-49621,0,0,40c855e29a106464758c24a1bdb5df74f7e1f130c174b2cc39a416ce5bb07c0c,2024-10-21T17:09:45.417000
CVE-2024-49622,0,0,f0d5dfa8c1ebf53d61bf597989f9b1e80a9b4ef9f6fb536f6dfaf31578dfe1b7,2024-10-21T17:09:45.417000
CVE-2024-49623,0,0,92ff26855c35b1121f5df0b6550942b0b302d581178f4d79b65884f9961098bf,2024-10-21T17:09:45.417000
CVE-2024-49624,0,0,94bbce3e9ae8d90bc2dd4db17a45b73dbd3b3950e84c88aa4d648b5929508d4d,2024-10-21T17:09:45.417000
CVE-2024-49625,0,0,5b73196ab0d05a93dafb194b451d298f78f2ee157d4632f83bd5b31758525297,2024-10-21T17:09:45.417000
CVE-2024-49621,0,1,3b518552b21cf1ee7119b2d00705f4af280f721897e79c37b363e60b9b38743c,2024-10-24T15:35:56.963000
CVE-2024-49622,0,1,6252a25039b0db124af526e26c24d6dbd644c3fc1bb25002e461f593a2390a43,2024-10-24T14:25:01.183000
CVE-2024-49623,0,1,3b36370e9c41de47996300a4d2aeb450460c8698aea91f855397ef2ef561320a,2024-10-24T14:18:11.047000
CVE-2024-49624,0,1,2c7201abe5bc43afd794beedd3a5a97993afa6751985365a35130cd3e7adf63a,2024-10-24T14:34:30.937000
CVE-2024-49625,0,1,e9d07b4f83e96e1c6cbaf84a2752fa3828923286dbe9a3ab65376897a78ee2bd,2024-10-24T14:37:27.207000
CVE-2024-49626,0,0,edb127e9ec4bef5bc6c17b0d4b29695a6ff09e6e1d533c0c67079f9736d4e2d7,2024-10-23T20:37:57.080000
CVE-2024-49627,0,0,bcaa0babc7595e20da0ee6aff989d75da8873fe4c4069d8f25a5d1f39da5ea2c,2024-10-22T18:33:16.137000
CVE-2024-49628,0,0,f5e060d92886ef93409b047c07ce6c478a5c53c1f95e20f768b3d9e752147d52,2024-10-22T18:31:22.643000
CVE-2024-49629,0,0,60f0852b23beb1819b5458d406150de82aa310255dbbddedffa202b89c290697,2024-10-22T18:57:42.743000
CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000
CVE-2024-49630,0,0,34d75746c00996da3a49f93eed6bc8a4f3be9da6c45cb9f15692d41526269ce7,2024-10-23T20:44:41.857000
CVE-2024-49631,0,0,90e84d249ffc88bac8ba7984e2725c172d8e09dd6e795888b9ed719f758a8be8,2024-10-21T17:09:45.417000
CVE-2024-49631,0,1,5230732de6a35313190c213cb431a622620f306560265c0ab55df925f02e4a2a,2024-10-24T14:12:59.600000
CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000
CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000
CVE-2024-49652,0,0,63a1a77d9344722b7ce84f9fce0c71bf466cdf71caf35501c4157d9f95e6cfbf,2024-10-23T16:15:06.027000
@ -262971,20 +262972,20 @@ CVE-2024-49671,0,0,30b08b28f4cc7c0157ee303caff1fae3d001b3a4c48216094155b6a394653
CVE-2024-49675,0,0,d445661173420aa7e4b075685c6d095d96fc1d203415958069ae9105144d20f8,2024-10-23T15:15:32.120000
CVE-2024-49676,0,0,adf778c2fd477e7e5057e7ea2756d44a60f9c4d6de9942b4e924dd314069dd4a,2024-10-23T16:15:09.040000
CVE-2024-4968,0,0,e5876599ebc72fb366518fd24786abd136bd58674cfc6b7ffb1fde29b7dfc2f8,2024-06-04T19:20:55.910000
CVE-2024-49681,1,1,16e68e5df594f087bb6fdb92388719ba81064002c8d1f2e7787a33a07b4e5ecb,2024-10-24T12:15:02.890000
CVE-2024-49682,1,1,c47441cb694885965b01282c8400a23aeca908f4b1ab9c1ccb3238dd26608556,2024-10-24T12:15:03.137000
CVE-2024-49683,1,1,fa1f629c77908001522a42ee4178b1f39acf2feefefc2f8cbdb94802672cd14d,2024-10-24T12:15:03.373000
CVE-2024-49681,0,0,16e68e5df594f087bb6fdb92388719ba81064002c8d1f2e7787a33a07b4e5ecb,2024-10-24T12:15:02.890000
CVE-2024-49682,0,0,c47441cb694885965b01282c8400a23aeca908f4b1ab9c1ccb3238dd26608556,2024-10-24T12:15:03.137000
CVE-2024-49683,0,0,fa1f629c77908001522a42ee4178b1f39acf2feefefc2f8cbdb94802672cd14d,2024-10-24T12:15:03.373000
CVE-2024-49684,0,0,0df1aa091650d29739ebe68aedddc0d10b21c75ea4cfcefd1bc46ae636e494bc,2024-10-23T16:15:09.620000
CVE-2024-4969,0,0,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000
CVE-2024-49690,0,0,44993f6e8c674969fbf7136b33117e24dfafbe9c462e5988b6e20da9e8be1fcd,2024-10-23T16:15:09.867000
CVE-2024-49691,1,1,ac52b150bf24b406e46415122565d9e6f0131834acaef6054f92b71a937a5694,2024-10-24T12:15:03.597000
CVE-2024-49693,1,1,6f3cf69ad902f1f999ac1673a08a3f212d3d0f95a31e3ba7ae5369d812ae282b,2024-10-24T13:15:12.090000
CVE-2024-49695,1,1,0cf1d6a69dedced7434c77f75ff21094f53c4c2ab5974be14839e87953dde221,2024-10-24T13:15:12.320000
CVE-2024-49696,1,1,083e41e5b6a2a1f079f94a83f78f06dd23339692e31bed11bb519d5b9f80b486,2024-10-24T13:15:12.537000
CVE-2024-49691,0,0,ac52b150bf24b406e46415122565d9e6f0131834acaef6054f92b71a937a5694,2024-10-24T12:15:03.597000
CVE-2024-49693,0,0,6f3cf69ad902f1f999ac1673a08a3f212d3d0f95a31e3ba7ae5369d812ae282b,2024-10-24T13:15:12.090000
CVE-2024-49695,0,0,0cf1d6a69dedced7434c77f75ff21094f53c4c2ab5974be14839e87953dde221,2024-10-24T13:15:12.320000
CVE-2024-49696,0,0,083e41e5b6a2a1f079f94a83f78f06dd23339692e31bed11bb519d5b9f80b486,2024-10-24T13:15:12.537000
CVE-2024-4970,0,0,57238e39937dd97cbba063724432adc0a3a93bd80ba7688359158539986e4d98,2024-06-24T19:30:39.397000
CVE-2024-49701,0,0,0b801911bc5bb1d26c90e4cce5c7fd481c7a0370220cb9fd23885463c1ee1cf1,2024-10-23T16:15:10.097000
CVE-2024-49702,1,1,c93c0a299edc14c02d29a47da426f7641dc457ff1975082e3a62833e03075fd0,2024-10-24T13:15:12.763000
CVE-2024-49703,1,1,f5054ee35a5536a488a292cdfc61ba346a36b6e3ce2bfe3e037ca78b58aa4992,2024-10-24T12:15:03.830000
CVE-2024-49702,0,0,c93c0a299edc14c02d29a47da426f7641dc457ff1975082e3a62833e03075fd0,2024-10-24T13:15:12.763000
CVE-2024-49703,0,0,f5054ee35a5536a488a292cdfc61ba346a36b6e3ce2bfe3e037ca78b58aa4992,2024-10-24T12:15:03.830000
CVE-2024-4971,0,0,e1212bde7e83cc3c65186cf7cb8fd594e3ac7122768fa3e856e479fe91aac874,2024-05-22T12:46:53.887000
CVE-2024-4972,0,0,aca3b401df5f0f8efa87796dd64789aa2cecbea8af4c356f93adc161f1e5b552,2024-06-04T19:20:56.040000
CVE-2024-4973,0,0,c8cb9b832f42f8b36963a1241c53cb5d648196ebedc5ede632c88d17792d2e61,2024-06-04T19:20:56.140000
@ -263064,7 +263065,7 @@ CVE-2024-4991,0,0,3aef226cc1578adb6c75565d63e7f13bcda4a2e79607b48e5e73e305c3d938
CVE-2024-49910,0,0,257fca6a8b06f3709d90f435be72ed32496f705a42a3c13437dc074f38459780,2024-10-24T02:58:00.223000
CVE-2024-49911,0,0,27c5fefd1538207cacd9a5b1b1cf479c485b86ae10295cced2c8832954720fb6,2024-10-24T03:19:10.477000
CVE-2024-49912,0,0,5da3367789660570545892ef5eb1d06667f7f99b79f4999ae93a29d70eb8a6c3,2024-10-23T15:13:25.583000
CVE-2024-49913,0,0,4a98967135c5998583dcc023672d8cebacab77d81b6764139e1fada1735c9c58,2024-10-23T15:13:25.583000
CVE-2024-49913,0,1,c98ec2386288e0f1e1f9efd048d9e8511ad9ac52e34c829aba546f72d8697aa1,2024-10-24T14:39:18.017000
CVE-2024-49914,0,0,6a6ae0984b6035b98733c78ccfd6d55ea4ecb9a2278e19dfbdc74ea925b0473c,2024-10-23T15:13:25.583000
CVE-2024-49915,0,0,924f95aafb8601287a9689be42f161d3a7a7996d863f6de5cd4d353d0e11181c,2024-10-23T15:13:25.583000
CVE-2024-49916,0,0,9c2aa99f8c03bd69d3fc4d4410e9e5fade85121470316deb114da79bbfa59b69,2024-10-23T15:13:25.583000
@ -263770,7 +263771,7 @@ CVE-2024-5604,0,0,027d101e3d13ee1355c5d00a90e628c742a0d98d010571ef0346cd7c4d8886
CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000
CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000
CVE-2024-5608,1,1,ab50142819a21b9eb319e8bad3b82b31e0eb67fe1fd34d16be61253e62c02182,2024-10-24T12:15:04.070000
CVE-2024-5608,0,0,ab50142819a21b9eb319e8bad3b82b31e0eb67fe1fd34d16be61253e62c02182,2024-10-24T12:15:04.070000
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
CVE-2024-5611,0,0,257f707c49e1adeab5f30937de3668453c65dc87c2e8ac71cda38f1fe1bbc4e5,2024-06-17T12:42:04.623000
CVE-2024-5612,0,0,c48d9d85ab6fb6f375c9bae41bb41f013f62cc7d97e523d92c986f223f9ac364,2024-06-07T14:56:05.647000
@ -264149,7 +264150,7 @@ CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee942
CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000
CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
CVE-2024-6049,0,0,4bc2edad010a7e13f7f5b27cdc70143c49c8438b46c0d3becb0b7d82b235b129,2024-10-24T08:15:02.297000
CVE-2024-6049,0,1,1f37c805f4ef3e334c1c60cdd478e8c4a247b3a239bbe4fe52d08544359e9d92,2024-10-24T15:35:20.887000
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
CVE-2024-6051,0,0,9740107b5da610f5b7276dc508ceaf0014cb04cfa38f8de362bc7a6604390684,2024-10-04T13:51:25.567000
CVE-2024-6052,0,0,32d564c18d4d17b199f574c28ffe31c1fb3d7a1b6f6859f56e252f37a5a22c28,2024-09-16T14:15:13.410000
@ -266174,7 +266175,7 @@ CVE-2024-8621,0,0,da11617ee187bea39361c3e736358efdd8e000970ca04e836eaac8c5eeb75d
CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1e2,2024-09-26T14:59:27.770000
CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000
CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000
CVE-2024-8625,0,1,f79ace646c1451369693b1b55d98f664dd2f063ae53ec6e9cd8ea8f5cea7ce35,2024-10-24T13:56:29.230000
CVE-2024-8625,0,0,f79ace646c1451369693b1b55d98f664dd2f063ae53ec6e9cd8ea8f5cea7ce35,2024-10-24T13:56:29.230000
CVE-2024-8626,0,0,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000
CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000
CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000
@ -266374,7 +266375,7 @@ CVE-2024-8949,0,0,94f40160361f975c890254d75f4744160f14879e40b4ff8ccedc3965bc21b6
CVE-2024-8951,0,0,888c97aa442d5e8c89ae77387b914cd3981839dfe932748e6b429d09cccb70f1,2024-09-23T18:12:37.380000
CVE-2024-8956,0,0,67fe3d1874df790c4fe403e5b4da2c61ceb691a22ee76441757b9e4b9f428f5d,2024-10-01T16:01:30.063000
CVE-2024-8957,0,0,7754fe7edeaccf469b1d2d0d834f9e662d3691f603f526c2d85ee83a7186072b,2024-10-01T17:49:25.573000
CVE-2024-8959,1,1,70e5f62c1f66c199c6be28373d56cc2a39f70c058448504f6817a2e81a7ac26e,2024-10-24T12:15:04.317000
CVE-2024-8959,0,0,70e5f62c1f66c199c6be28373d56cc2a39f70c058448504f6817a2e81a7ac26e,2024-10-24T12:15:04.317000
CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000
CVE-2024-8964,0,0,c8fc4fc0d8f6e4149ea3cd0239ed4708c78c8d6f77eb0df4938d6649d94bf7d7,2024-10-10T12:56:30.817000
CVE-2024-8965,0,0,fcd9a7faf9aba17ebbc93d83d1389f5891b9c0797caaf85615a1a91da1ce5a78,2024-10-04T19:04:03.157000
@ -266867,9 +266868,9 @@ CVE-2024-9915,0,0,0f63deacddf513b9ec3673a01be4a8d87bc611fa458d7de64bd0d6b49e111f
CVE-2024-9916,0,0,5f1c8d9bcc0013cba51f49c68e181e71cba823a77c1b0b00cdfbc2f692ed43b8,2024-10-16T22:11:04.453000
CVE-2024-9917,0,0,ac39bc627f8e987bf8c02cd3d58b25bf3325ea7f348f099cb18f58e12b7568bd,2024-10-19T00:49:07.090000
CVE-2024-9918,0,0,456944011c418c05d10e50a0529bf73b92d684c3831730868cd1503f87c05dba,2024-10-19T00:47:15.957000
CVE-2024-9921,0,1,0828853bbec1b608bad72db90959bc6c205bc4fc3450c66863ee335e5f1ac85e,2024-10-24T13:19:24.920000
CVE-2024-9922,0,1,5b3f4f94b058e10394fda050af76e1c62dd106f0eebadd14ac4c752deaa614fb,2024-10-24T13:21:53.853000
CVE-2024-9923,0,1,e0957ae0002d68f1b955241f204c0150727bb34721e8b9ed064776340efa0183,2024-10-24T13:24:23.430000
CVE-2024-9921,0,0,0828853bbec1b608bad72db90959bc6c205bc4fc3450c66863ee335e5f1ac85e,2024-10-24T13:19:24.920000
CVE-2024-9922,0,0,5b3f4f94b058e10394fda050af76e1c62dd106f0eebadd14ac4c752deaa614fb,2024-10-24T13:21:53.853000
CVE-2024-9923,0,0,e0957ae0002d68f1b955241f204c0150727bb34721e8b9ed064776340efa0183,2024-10-24T13:24:23.430000
CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000
CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000
CVE-2024-9927,0,0,96920f248127734453deaf748492c280118aa5ea5b9c599a9138ad17f83910cb,2024-10-23T15:12:34.673000

Can't render this file because it is too large.