diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10310.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10310.json index 9978ee37e55..f4ca4733355 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10310.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10310.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10310", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-02T02:15:12.070", - "lastModified": "2024-11-02T02:15:12.070", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json index f8f42258be5..dde0b9420c1 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10540", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-02T02:15:12.320", - "lastModified": "2024-11-02T02:15:12.320", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json index 7d249f3055e..6e5babbb221 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10697", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-02T12:15:15.780", - "lastModified": "2024-11-02T12:15:15.780", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json index 2148a9bbc23..c10fdf7557a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10698", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-02T14:15:12.980", - "lastModified": "2024-11-02T14:15:12.980", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10699.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10699.json index 114c085a130..f0a5be1a3e3 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10699.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10699", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-02T15:15:16.313", - "lastModified": "2024-11-02T15:15:16.313", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10700.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10700.json index 2cf9a4a50f0..662b379736f 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10700.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10700", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-02T16:15:03.243", - "lastModified": "2024-11-02T16:15:03.243", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10701.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10701.json index eee4e181871..602674da83b 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10701.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10701", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-02T18:15:03.057", - "lastModified": "2024-11-02T18:15:03.057", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10702.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10702.json index e3f341b29bf..d7a58c49528 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10702.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10702", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-02T18:15:03.363", - "lastModified": "2024-11-02T18:15:03.363", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10730.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10730.json index dfc54efd9a5..0cc9602fcc9 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10730.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10730", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T09:15:02.943", - "lastModified": "2024-11-03T09:15:02.943", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10731.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10731.json index d2c755ed4ce..cec8228199d 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10731.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10731", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T10:15:03.113", - "lastModified": "2024-11-03T10:15:03.113", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10732.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10732.json index 90b82cc1010..c663ef718df 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10732.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10732", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T11:15:03.147", - "lastModified": "2024-11-03T11:15:03.147", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10733.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10733.json index e3438cc7f55..51c775e4b4d 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10733.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10733", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T12:15:12.780", - "lastModified": "2024-11-03T12:15:12.780", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10734.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10734.json index b05c6649fc7..693eceaae2a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10734.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10734", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T13:15:03.197", - "lastModified": "2024-11-03T13:15:03.197", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10735.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10735.json index 22696616269..21e04638813 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10735.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10735", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T14:15:13.127", - "lastModified": "2024-11-03T14:15:13.127", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10736.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10736.json index b6f78f9346b..b6d7aa2eccf 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10736.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10736", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T15:15:03.113", - "lastModified": "2024-11-03T15:15:03.113", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10737.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10737.json index c3afa3b0acb..07670a55e53 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10737.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10737", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T15:15:03.367", - "lastModified": "2024-11-03T15:15:03.367", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10738.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10738.json index 46b37debbdb..a433f5ef5b8 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10738.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10738", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T17:15:12.803", - "lastModified": "2024-11-03T17:15:12.803", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10739.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10739.json index e7aae14b998..5575fd5edeb 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10739.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10739", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T18:15:02.640", - "lastModified": "2024-11-03T18:15:02.640", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10740.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10740.json index 9a3c2c81617..fedd5831a45 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10740.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10740", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T20:15:14.127", - "lastModified": "2024-11-03T20:15:14.127", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10741.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10741.json index b2ae54fbae2..dbb1ddb2ed1 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10741.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10741", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T21:15:03.253", - "lastModified": "2024-11-03T21:15:03.253", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10742.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10742.json index 90d3d77d20c..4cec4983dd8 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10742.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10742", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T21:15:03.533", - "lastModified": "2024-11-03T21:15:03.533", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10743.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10743.json index c90071e24e1..7ce59b5796d 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10743.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10743", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T22:15:03.987", - "lastModified": "2024-11-03T22:15:03.987", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10744.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10744.json index 6187ca612ae..6c66962c3bd 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10744.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10744", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T23:15:03.040", - "lastModified": "2024-11-03T23:15:03.040", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10745.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10745.json index aa390787a67..053f013864a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10745.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10745", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-03T23:15:03.317", - "lastModified": "2024-11-03T23:15:03.317", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10746.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10746.json index fe819877506..955d3cafa69 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10746.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10746", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T00:15:11.437", - "lastModified": "2024-11-04T00:15:11.437", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10747.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10747.json index 6307632758d..21fc4ed8181 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10747.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10747", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T00:15:11.740", - "lastModified": "2024-11-04T00:15:11.740", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10748.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10748.json new file mode 100644 index 00000000000..042f71e01a6 --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10748.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10748", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T01:15:03.167", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Cosmote Greece What's Up App 4.47.3 on Android. This issue affects some unknown processing of the file gr/desquared/kmmsharedmodule/db/RealmDB.java of the component Realm Database Handler. The manipulation of the argument defaultRealmKey leads to use of default cryptographic key. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 2.0, + "baseSeverity": "LOW" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:P/I:N/A:N", + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 1.0 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1394" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20Realm%20Database%20Encryption%20Key%5D%20found%20in%20What's%20UP%20Android%20App%204.47.3%20-%20(RealmDB.java).md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282917", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282917", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.432429", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10749.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10749.json new file mode 100644 index 00000000000..60d0b5bf1f5 --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10749.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10749", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T01:15:03.470", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 2.3, + "baseSeverity": "LOW" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 4.6 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.9, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pwysec/Xmwcq/blob/main/1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282918", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282918", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.432436", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10750.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10750.json new file mode 100644 index 00000000000..5fd944ac18e --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10750.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10750", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T02:15:14.667", + "lastModified": "2024-11-04T02:15:14.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Tenda i22 1.0.0.3(4687) and classified as problematic. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV?fgHPOST/goform/SysToo. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE", + "baseScore": 6.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xiaobor123/tenda-vul-i22", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282919", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282919", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.435407", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10751.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10751.json new file mode 100644 index 00000000000..dc7622c635e --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10751.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10751", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T02:15:14.993", + "lastModified": "2024-11-04T02:15:14.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips ISP Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file pay.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JiangJiangCC/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282920", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282920", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.436296", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10752.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10752.json new file mode 100644 index 00000000000..db5e9f046bb --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10752.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10752", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T02:15:15.310", + "lastModified": "2024-11-04T02:15:15.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /productsadd.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file names to be affected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/primaryboy/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282921", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282921", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.436316", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10753.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10753.json new file mode 100644 index 00000000000..6932165cc65 --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10753.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10753", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T02:15:15.613", + "lastModified": "2024-11-04T02:15:15.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been declared as problematic. This vulnerability affects unknown code of the file admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data_two_headers.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dom_data_two_headers.php).md", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282922", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282922", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.436375", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json new file mode 100644 index 00000000000..877fcc2119a --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20104", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:15.940", + "lastModified": "2024-11-04T02:15:15.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json new file mode 100644 index 00000000000..467b11690f0 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20106", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.070", + "lastModified": "2024-11-04T02:15:16.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In m4u, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08960505; Issue ID: MSV-1590." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json new file mode 100644 index 00000000000..51c457869ae --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20107", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.163", + "lastModified": "2024-11-04T02:15:16.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json new file mode 100644 index 00000000000..d83c99296f0 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20108", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.273", + "lastModified": "2024-11-04T02:15:16.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json new file mode 100644 index 00000000000..cac8e6cd72b --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20109", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.387", + "lastModified": "2024-11-04T02:15:16.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065928; Issue ID: MSV-1763." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json new file mode 100644 index 00000000000..4c23bbd5c68 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20110", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.480", + "lastModified": "2024-11-04T02:15:16.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065887; Issue ID: MSV-1762." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json new file mode 100644 index 00000000000..79ebcd21ea1 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20111", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.567", + "lastModified": "2024-11-04T02:15:16.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065033; Issue ID: MSV-1754." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json new file mode 100644 index 00000000000..11b3416fdaa --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20112", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.653", + "lastModified": "2024-11-04T02:15:16.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json new file mode 100644 index 00000000000..19b16e30f41 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20113", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.743", + "lastModified": "2024-11-04T02:15:16.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036814; Issue ID: MSV-1715." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json new file mode 100644 index 00000000000..e3f071da1c8 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20114", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.830", + "lastModified": "2024-11-04T02:15:16.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09037038; Issue ID: MSV-1714." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json new file mode 100644 index 00000000000..ca9e5482c4f --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20115", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:16.923", + "lastModified": "2024-11-04T02:15:16.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036695; Issue ID: MSV-1713." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json new file mode 100644 index 00000000000..da6c53f6656 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20117", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.017", + "lastModified": "2024-11-04T02:15:17.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1681." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json new file mode 100644 index 00000000000..3aa9c2d795b --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20118", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.097", + "lastModified": "2024-11-04T02:15:17.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062392; Issue ID: MSV-1621." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-123" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json new file mode 100644 index 00000000000..bbefb4c9606 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20119", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.190", + "lastModified": "2024-11-04T02:15:17.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062301; Issue ID: MSV-1620." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-123" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json new file mode 100644 index 00000000000..b6da3986a49 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20120", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.280", + "lastModified": "2024-11-04T02:15:17.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json new file mode 100644 index 00000000000..e509559cc0e --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20121", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.383", + "lastModified": "2024-11-04T02:15:17.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20122.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20122.json new file mode 100644 index 00000000000..e34ef033337 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20122.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20122", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.473", + "lastModified": "2024-11-04T02:15:17.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1572." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json new file mode 100644 index 00000000000..0b8e4967203 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20123", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.567", + "lastModified": "2024-11-04T02:15:17.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1569." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json new file mode 100644 index 00000000000..b1868e0b8f0 --- /dev/null +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20124", + "sourceIdentifier": "security@mediatek.com", + "published": "2024-11-04T02:15:17.647", + "lastModified": "2024-11-04T02:15:17.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1568." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@mediatek.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://corp.mediatek.com/product-security-bulletin/November-2024", + "source": "security@mediatek.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json index 96a1243ad28..93ea2c16a2f 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44232", "sourceIdentifier": "product-security@apple.com", "published": "2024-11-01T21:15:14.730", - "lastModified": "2024-11-01T21:15:14.730", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json index c293d1ed1f4..8558441d30c 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44233", "sourceIdentifier": "product-security@apple.com", "published": "2024-11-01T21:15:14.787", - "lastModified": "2024-11-01T21:15:14.787", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json index 6ff792eb631..12cfa75f1c8 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44234", "sourceIdentifier": "product-security@apple.com", "published": "2024-11-01T21:15:14.847", - "lastModified": "2024-11-01T21:15:14.847", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51774.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51774.json index 37561f572b7..f3c5e2ca740 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51774.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51774.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51774", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-02T06:15:03.007", - "lastModified": "2024-11-02T06:15:03.007", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json index dec48a9864f..8088f92f6b8 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8739", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-02T02:15:12.560", - "lastModified": "2024-11-02T02:15:12.560", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9191.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9191.json index da3669fcdd9..43285358459 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9191.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9191.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9191", "sourceIdentifier": "psirt@okta.com", "published": "2024-11-01T22:15:03.213", - "lastModified": "2024-11-01T22:15:03.213", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json index aaee09e80f2..2602df9d39b 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9868", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-02T02:15:12.803", - "lastModified": "2024-11-02T02:15:12.803", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json index 5f7d4ad822c..4afbd06e818 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9896.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9896", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-02T08:15:03.197", - "lastModified": "2024-11-02T08:15:03.197", - "vulnStatus": "Received", + "lastModified": "2024-11-04T01:35:50.083", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index d61aec8dcf9..846a3b769e9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-04T00:55:37.313798+00:00 +2024-11-04T03:00:23.406842+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-04T00:15:11.740000+00:00 +2024-11-04T02:15:17.647000+00:00 ``` ### Last Data Feed Release @@ -27,29 +27,75 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-11-03T01:00:10.074845+00:00 +2024-11-04T01:00:10.068841+00:00 ``` ### Total Number of included CVEs ```plain -268038 +268063 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `25` -- [CVE-2024-10744](CVE-2024/CVE-2024-107xx/CVE-2024-10744.json) (`2024-11-03T23:15:03.040`) -- [CVE-2024-10745](CVE-2024/CVE-2024-107xx/CVE-2024-10745.json) (`2024-11-03T23:15:03.317`) -- [CVE-2024-10746](CVE-2024/CVE-2024-107xx/CVE-2024-10746.json) (`2024-11-04T00:15:11.437`) -- [CVE-2024-10747](CVE-2024/CVE-2024-107xx/CVE-2024-10747.json) (`2024-11-04T00:15:11.740`) +- [CVE-2024-10748](CVE-2024/CVE-2024-107xx/CVE-2024-10748.json) (`2024-11-04T01:15:03.167`) +- [CVE-2024-10749](CVE-2024/CVE-2024-107xx/CVE-2024-10749.json) (`2024-11-04T01:15:03.470`) +- [CVE-2024-10750](CVE-2024/CVE-2024-107xx/CVE-2024-10750.json) (`2024-11-04T02:15:14.667`) +- [CVE-2024-10751](CVE-2024/CVE-2024-107xx/CVE-2024-10751.json) (`2024-11-04T02:15:14.993`) +- [CVE-2024-10752](CVE-2024/CVE-2024-107xx/CVE-2024-10752.json) (`2024-11-04T02:15:15.310`) +- [CVE-2024-10753](CVE-2024/CVE-2024-107xx/CVE-2024-10753.json) (`2024-11-04T02:15:15.613`) +- [CVE-2024-20104](CVE-2024/CVE-2024-201xx/CVE-2024-20104.json) (`2024-11-04T02:15:15.940`) +- [CVE-2024-20106](CVE-2024/CVE-2024-201xx/CVE-2024-20106.json) (`2024-11-04T02:15:16.070`) +- [CVE-2024-20107](CVE-2024/CVE-2024-201xx/CVE-2024-20107.json) (`2024-11-04T02:15:16.163`) +- [CVE-2024-20108](CVE-2024/CVE-2024-201xx/CVE-2024-20108.json) (`2024-11-04T02:15:16.273`) +- [CVE-2024-20109](CVE-2024/CVE-2024-201xx/CVE-2024-20109.json) (`2024-11-04T02:15:16.387`) +- [CVE-2024-20110](CVE-2024/CVE-2024-201xx/CVE-2024-20110.json) (`2024-11-04T02:15:16.480`) +- [CVE-2024-20111](CVE-2024/CVE-2024-201xx/CVE-2024-20111.json) (`2024-11-04T02:15:16.567`) +- [CVE-2024-20112](CVE-2024/CVE-2024-201xx/CVE-2024-20112.json) (`2024-11-04T02:15:16.653`) +- [CVE-2024-20113](CVE-2024/CVE-2024-201xx/CVE-2024-20113.json) (`2024-11-04T02:15:16.743`) +- [CVE-2024-20114](CVE-2024/CVE-2024-201xx/CVE-2024-20114.json) (`2024-11-04T02:15:16.830`) +- [CVE-2024-20115](CVE-2024/CVE-2024-201xx/CVE-2024-20115.json) (`2024-11-04T02:15:16.923`) +- [CVE-2024-20117](CVE-2024/CVE-2024-201xx/CVE-2024-20117.json) (`2024-11-04T02:15:17.017`) +- [CVE-2024-20118](CVE-2024/CVE-2024-201xx/CVE-2024-20118.json) (`2024-11-04T02:15:17.097`) +- [CVE-2024-20119](CVE-2024/CVE-2024-201xx/CVE-2024-20119.json) (`2024-11-04T02:15:17.190`) +- [CVE-2024-20120](CVE-2024/CVE-2024-201xx/CVE-2024-20120.json) (`2024-11-04T02:15:17.280`) +- [CVE-2024-20121](CVE-2024/CVE-2024-201xx/CVE-2024-20121.json) (`2024-11-04T02:15:17.383`) +- [CVE-2024-20122](CVE-2024/CVE-2024-201xx/CVE-2024-20122.json) (`2024-11-04T02:15:17.473`) +- [CVE-2024-20123](CVE-2024/CVE-2024-201xx/CVE-2024-20123.json) (`2024-11-04T02:15:17.567`) +- [CVE-2024-20124](CVE-2024/CVE-2024-201xx/CVE-2024-20124.json) (`2024-11-04T02:15:17.647`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `34` +- [CVE-2024-10731](CVE-2024/CVE-2024-107xx/CVE-2024-10731.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10732](CVE-2024/CVE-2024-107xx/CVE-2024-10732.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10733](CVE-2024/CVE-2024-107xx/CVE-2024-10733.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10734](CVE-2024/CVE-2024-107xx/CVE-2024-10734.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10735](CVE-2024/CVE-2024-107xx/CVE-2024-10735.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10736](CVE-2024/CVE-2024-107xx/CVE-2024-10736.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10737](CVE-2024/CVE-2024-107xx/CVE-2024-10737.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10738](CVE-2024/CVE-2024-107xx/CVE-2024-10738.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10739](CVE-2024/CVE-2024-107xx/CVE-2024-10739.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10740](CVE-2024/CVE-2024-107xx/CVE-2024-10740.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10741](CVE-2024/CVE-2024-107xx/CVE-2024-10741.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10742](CVE-2024/CVE-2024-107xx/CVE-2024-10742.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10743](CVE-2024/CVE-2024-107xx/CVE-2024-10743.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10744](CVE-2024/CVE-2024-107xx/CVE-2024-10744.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10745](CVE-2024/CVE-2024-107xx/CVE-2024-10745.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10746](CVE-2024/CVE-2024-107xx/CVE-2024-10746.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-10747](CVE-2024/CVE-2024-107xx/CVE-2024-10747.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-44232](CVE-2024/CVE-2024-442xx/CVE-2024-44232.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-44233](CVE-2024/CVE-2024-442xx/CVE-2024-44233.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-44234](CVE-2024/CVE-2024-442xx/CVE-2024-44234.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-51774](CVE-2024/CVE-2024-517xx/CVE-2024-51774.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-8739](CVE-2024/CVE-2024-87xx/CVE-2024-8739.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-9191](CVE-2024/CVE-2024-91xx/CVE-2024-9191.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-9868](CVE-2024/CVE-2024-98xx/CVE-2024-9868.json) (`2024-11-04T01:35:50.083`) +- [CVE-2024-9896](CVE-2024/CVE-2024-98xx/CVE-2024-9896.json) (`2024-11-04T01:35:50.083`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1b48fb3954d..292e43d7923 100644 --- a/_state.csv +++ b/_state.csv @@ -242525,7 +242525,7 @@ CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884f CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000 CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 -CVE-2024-10310,0,0,44e4f212dbd387191ac1c17fafbfea8afd0cd16e10f15c2104cc89bcbf827181,2024-11-02T02:15:12.070000 +CVE-2024-10310,0,1,8627942b9bedc88403b058610e178026fa2c4afa02baf09482128bde758698c0,2024-11-04T01:35:50.083000 CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 @@ -242659,7 +242659,7 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000 CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 -CVE-2024-10540,0,0,fb85c19421ab3f69a93be1f392ed322f4e3a3a646d1bbc79bb70857cca41b582,2024-11-02T02:15:12.320000 +CVE-2024-10540,0,1,71b4d8dd372610eb6aadd9ee2f499b7f6c7c514a0fbc392c946046e7aec32132,2024-11-04T01:35:50.083000 CVE-2024-10544,0,0,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000 CVE-2024-10546,0,0,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000 CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000 @@ -242717,36 +242717,42 @@ CVE-2024-10662,0,0,d4e1d96fd372cbdc5b8334f5c6dd869966981cc60e3dd848ec899c5d2ee68 CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000 CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000 CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000 -CVE-2024-10697,0,0,b6a5fbdd54ff78ca8f29be9d904245700764dda2892e20d8100f91a87604ea47,2024-11-02T12:15:15.780000 -CVE-2024-10698,0,0,8281674c5312d1eac605117cac32e949ec8e479274dd1749bb2715d742010d6d,2024-11-02T14:15:12.980000 -CVE-2024-10699,0,0,ef67a20c3335f29b114cad7b0aedb794f1b00f327f73345873f5e40c4d641fcb,2024-11-02T15:15:16.313000 +CVE-2024-10697,0,1,400b0c691de1d4d04a08ed75b5ff2c1090c210982145630e8b93e65ea795d2a2,2024-11-04T01:35:50.083000 +CVE-2024-10698,0,1,236b38079c641e413bd7bebc1fdfad07acc1d9e6f5d99c4e4596e4bb9429c7df,2024-11-04T01:35:50.083000 +CVE-2024-10699,0,1,fe2c7d137c97c404816ddf9e3bb9e571274df811b1a38d888d420c39b6c31f06,2024-11-04T01:35:50.083000 CVE-2024-1070,0,0,945eeccf4f5ba232f5b58cbe0a0fb277520149997c332f988c0ef3d652aa0c5c,2024-02-29T13:49:29.390000 -CVE-2024-10700,0,0,b17b93e7f82967a1cd70f297abdf013df9d7712afeb0e21e10309930c9dd8b06,2024-11-02T16:15:03.243000 -CVE-2024-10701,0,0,64d00583e128223a818e31012b27c2f4fcc546f61ed52ef284055292721719a1,2024-11-02T18:15:03.057000 -CVE-2024-10702,0,0,b860327a4907fe5152218cc2a7d1bde1b844706b23959e8ecc33094988f3f771,2024-11-02T18:15:03.363000 +CVE-2024-10700,0,1,a26404e46b37e656f5281779e0d9091897613c667bf7801ba7d96eada96120c0,2024-11-04T01:35:50.083000 +CVE-2024-10701,0,1,feef0490b9a5343bbd81c2d74656e28446f2c282178d53c2cfc86555fe72242e,2024-11-04T01:35:50.083000 +CVE-2024-10702,0,1,1325634e3f4fdbfa2e4a1276b2401b086b25bcc969a908cc22819ae619148a71,2024-11-04T01:35:50.083000 CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000 CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44f6,2024-02-13T19:44:28.620000 CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000 -CVE-2024-10730,0,0,0290ba426de3764e77845b12f9be23ede9a2d5cdb0858e6e836b6393eea1c65a,2024-11-03T09:15:02.943000 -CVE-2024-10731,0,0,0edbd27ff87fe7ed63697e42258d1992829a75f85bde44db29e4896a5b1dcdfc,2024-11-03T10:15:03.113000 -CVE-2024-10732,0,0,cc05b547a090986643dc6f60010297a6e164d0fc561f19045f5c23b16d08a8d3,2024-11-03T11:15:03.147000 -CVE-2024-10733,0,0,e31e1515e56cea31e3e6cd23ea983f95655bbeddaaf828558407c18b76e76328,2024-11-03T12:15:12.780000 -CVE-2024-10734,0,0,1ada97ce88c9764cce86d1be06d5a440543b67631c7509fb56b879cad67b8d57,2024-11-03T13:15:03.197000 -CVE-2024-10735,0,0,18e5abeb765f8b4cee532a9ccfe47a41535b695e674660e0401d753889675ed7,2024-11-03T14:15:13.127000 -CVE-2024-10736,0,0,2b3c1ca1fde308db2682ba585d91df4e5fb8e8b2132e6896b341182640475636,2024-11-03T15:15:03.113000 -CVE-2024-10737,0,0,d5f597e3131334cb6398b921e8ae2406a2cedfdef19debcbf36a8289606bdaac,2024-11-03T15:15:03.367000 -CVE-2024-10738,0,0,cf3434bd59b0285df7a84404b7ffeefec9fd9bbab036f7db09502c7b06bbe882,2024-11-03T17:15:12.803000 -CVE-2024-10739,0,0,2d9d0512020c1f842d19eb7873caa87034bcedcbf1098acfc3b06d84312e22d7,2024-11-03T18:15:02.640000 +CVE-2024-10730,0,1,7ce4421b8e6852fd42d52a08ac5d64cca9f961fa36f0f9b178564ab2c7b010fc,2024-11-04T01:35:50.083000 +CVE-2024-10731,0,1,e9573f69cc170cafd345054080776894775b4b6ef21372d23290dedcafe0e5b5,2024-11-04T01:35:50.083000 +CVE-2024-10732,0,1,2794c37d840ac85d80e6c6ee22e0cafa21a8bf385597e614f0966ea692f6b0f3,2024-11-04T01:35:50.083000 +CVE-2024-10733,0,1,ecfa611fffa7dda7b20a60257897e0fb58b1e425e94f2e6ec6ece37368bae70d,2024-11-04T01:35:50.083000 +CVE-2024-10734,0,1,4bdf3d9933efb7c2036a96af2289bb842795f8b5d58b3a97064506aeabfba048,2024-11-04T01:35:50.083000 +CVE-2024-10735,0,1,a16cccc151e9f2bcc15c729d193af752b598e5a499de6cc85f10b7387b0a41fd,2024-11-04T01:35:50.083000 +CVE-2024-10736,0,1,30b87f486dfbd55aa362867c46d8dcc45ec927ce563a6b5741ce601545c2ab1f,2024-11-04T01:35:50.083000 +CVE-2024-10737,0,1,1c0a27b6a0f6352047b4dfdf5563612ad3b9bab250d86c650765dfc629a73416,2024-11-04T01:35:50.083000 +CVE-2024-10738,0,1,8a0072515d947ec408b784d3e6ce1bd5b3e05b55ff660db8ef16ced14bb5241e,2024-11-04T01:35:50.083000 +CVE-2024-10739,0,1,d1743cc8054aad38eef2acd426187b3ee676a28c7bc532fe709feadcb472844e,2024-11-04T01:35:50.083000 CVE-2024-1074,0,0,dead9100582cc2974c0c91196eb84b5d13c4d6e306ff1bc10a509afe7df361d3,2024-03-13T18:16:18.563000 -CVE-2024-10740,0,0,217073bf1930c0f14a0fc226a9bb2d6398d765fa68bd0fff7edbfeb9d520c0f7,2024-11-03T20:15:14.127000 -CVE-2024-10741,0,0,ad19cf95cdeabbcd628e782f1aef9e0a797e7e2a931984e3147cce270645d2c3,2024-11-03T21:15:03.253000 -CVE-2024-10742,0,0,6a62150a0204ffc17beb47d87a5902b3367743d3f1d487bded09a284fcc7f3cb,2024-11-03T21:15:03.533000 -CVE-2024-10743,0,0,7611018f0a9e71fea5a36fac5f4dfeb4f6eff80ab38389ae42f5a10f8b11138a,2024-11-03T22:15:03.987000 -CVE-2024-10744,1,1,b4c4e009e5596df94ce79d62ee56cd3fbc6a900cff97bdb4d1aa0745a35b1462,2024-11-03T23:15:03.040000 -CVE-2024-10745,1,1,51128a835b5b59553a6908c04ad84a8b4da4fc5730f783ce2d78ea058fa94927,2024-11-03T23:15:03.317000 -CVE-2024-10746,1,1,e23188babfde0ffbb47feb6b6c9f36cbc2b7ae157fe8ca236ea137bd1fc23e84,2024-11-04T00:15:11.437000 -CVE-2024-10747,1,1,8e25b9be4440f8a0bdbe2ba2f18fb0464e7bda631f613f54d7a2e0d0a17cf7c2,2024-11-04T00:15:11.740000 +CVE-2024-10740,0,1,96ae1b50031fdef804d7941f636b5cc91402b9e022058e71fa088d447d37e9fd,2024-11-04T01:35:50.083000 +CVE-2024-10741,0,1,d677d081ae90772d9c62e5eea166401d1a36ed1ce290a4c4cf0fca2a8f45e908,2024-11-04T01:35:50.083000 +CVE-2024-10742,0,1,7e43489f32deadc14864d8fabccd1005ed82b082c5d08626921b13cf108b6229,2024-11-04T01:35:50.083000 +CVE-2024-10743,0,1,f4196b5be77693362a82a07a1abbed5d528d0f570809fe8b21b46f419f58a446,2024-11-04T01:35:50.083000 +CVE-2024-10744,0,1,2c6e64fe43853cda822e15d40340f32792083b462e7980325b4be1e7805845b9,2024-11-04T01:35:50.083000 +CVE-2024-10745,0,1,9b882c9f702379042badc860798ab8ac79d88ccc37d410489dcf6335bc9dba88,2024-11-04T01:35:50.083000 +CVE-2024-10746,0,1,5fc5b1f0c7c81c9c17f031df506140838636e81da729c18f4dee42e8bb008e3e,2024-11-04T01:35:50.083000 +CVE-2024-10747,0,1,65defe3ce03d4e7029fc0dc81fec58dc74e785c46c902e5a5dc8cb2b4c82ceb1,2024-11-04T01:35:50.083000 +CVE-2024-10748,1,1,046d3079c4eb2e3a10c0f9284d1ec682329dd55d91d1ebf1b461964671cc9500,2024-11-04T01:35:50.083000 +CVE-2024-10749,1,1,ced9684eb6bbdaaa8891bf4946486b251511fc0da6f635e33f3c9a1ae41d6b8e,2024-11-04T01:35:50.083000 CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000 +CVE-2024-10750,1,1,a5ab38ab4e0a30803b76cb92f36d106e28cb9646c5f450e7b359c617fa79db89,2024-11-04T02:15:14.667000 +CVE-2024-10751,1,1,ece80e95a2cea401caf01f16c80e716d345300d1a9937ae65bf2b9b198d7fbdc,2024-11-04T02:15:14.993000 +CVE-2024-10752,1,1,8a3cbd606c9961479f693d42867703d9117f36820b9a355e369e4c3dc6e7a45d,2024-11-04T02:15:15.310000 +CVE-2024-10753,1,1,bba63f6afd5c7db41ec944ca9e3254b1565ead11d9f0f9c2936fcd3fdd183f4d,2024-11-04T02:15:15.613000 CVE-2024-1076,0,0,1eec5a2aed6def26ca78a00c90cdc2a9e26a823100b6419a30b16c630a915a03,2024-08-30T13:15:12.257000 CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000 @@ -243720,8 +243726,27 @@ CVE-2024-20100,0,0,6232a5e349fb938dfde44a6272036d8fcab6eb82e3b395e905d1ef444c94e CVE-2024-20101,0,0,4ab31b8617124baf5a584f677af857db4f34ad707839e76bd0c5af95515b24c2,2024-10-07T19:36:43.247000 CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000 CVE-2024-20103,0,0,db42d95d798d4c29343c261aa8a039b0877035c0ce319208cb5d6e304467accf,2024-10-07T19:36:43.530000 +CVE-2024-20104,1,1,661fc67dbcdb1ca1b3a9dcb0db0e00d638855bf588515f8fe400ac77c76151ad,2024-11-04T02:15:15.940000 +CVE-2024-20106,1,1,51f90ca794383a5c2bfc20cba0cf660f0a64d83b490b33f63c0d4bc14a368e29,2024-11-04T02:15:16.070000 +CVE-2024-20107,1,1,922cc22eadfefcee8e734664d9fb6565be24bcbf2c94fca880abdb60812ec87e,2024-11-04T02:15:16.163000 +CVE-2024-20108,1,1,cc520a14b3242d8e9165692d2d17f9f18b7ea31e755767123888ee69a34e06a4,2024-11-04T02:15:16.273000 +CVE-2024-20109,1,1,54795d1d7fd515ea820548086475776cda34b0ce69d6720787f4e237144d7231,2024-11-04T02:15:16.387000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 +CVE-2024-20110,1,1,6f5a4c4b9adf7359592c8804c0bd25dcfa7bae0a9b7bd7baedd3251427f4d4a7,2024-11-04T02:15:16.480000 +CVE-2024-20111,1,1,27d22f9b268a8c3b7284649bfde84bce31ffe5554c53de51675e4fad0516fe32,2024-11-04T02:15:16.567000 +CVE-2024-20112,1,1,84c649e4458a5610722ef13eff2e7bccc80211f1069764379375ca5abd753952,2024-11-04T02:15:16.653000 +CVE-2024-20113,1,1,8e7b0c04b4d4ed0b893903cba4c199153ed552db76caf2e34be7db959d9a6d69,2024-11-04T02:15:16.743000 +CVE-2024-20114,1,1,3ab633082fb562a27e5d95e86318ac3b18818e40ff24ad66240303d146fc57ff,2024-11-04T02:15:16.830000 +CVE-2024-20115,1,1,d671ab30f09df16767829e3fea998fb0f41a9daf49276d42345088b6858cfd2e,2024-11-04T02:15:16.923000 +CVE-2024-20117,1,1,d61b2f990b1e15b7058e4556c78df8414fed2e10f805d41207337618f97c757b,2024-11-04T02:15:17.017000 +CVE-2024-20118,1,1,a704fdd2e1dde1a934b585bc78a59bfc44b3b7d71084d3d46b3975c6477a549e,2024-11-04T02:15:17.097000 +CVE-2024-20119,1,1,5e2d11df70ca1ca51a4d20891fb63f7289f15a3ccc06813c8c89fff44967631f,2024-11-04T02:15:17.190000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 +CVE-2024-20120,1,1,ccc8588caef2c754d0f2d3a62096a317fe95226b38302d1661505059372773a5,2024-11-04T02:15:17.280000 +CVE-2024-20121,1,1,323992abdcb80e925340c9d5380591ccb11059d2c67bc6cc09508284dbd715e0,2024-11-04T02:15:17.383000 +CVE-2024-20122,1,1,7f3da73d1063726b36c15c2eead085208e001c249ada6692b5a0ead1ef2dd874,2024-11-04T02:15:17.473000 +CVE-2024-20123,1,1,5b11ca42e589c3e23b63de7d94f1539bff348aa54a5100c00b6c443a91847ca8,2024-11-04T02:15:17.567000 +CVE-2024-20124,1,1,ea196b7f4300fdd6e9f7e59aa6adb0ebab1f3c2a66191c5840c9ed88124506e9,2024-11-04T02:15:17.647000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000 @@ -261034,9 +261059,9 @@ CVE-2024-44222,0,0,2d1c9506aa01928c94a245f74651f0e477458ddd815a4bd143998351ecb56 CVE-2024-44228,0,0,4d366f4ca03e1f210ca17d40371d7f0002d4d2fd25c7288f272f27e0c556885e,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,459366a3ff6ef76a99d08535a28f4f2b6e8f55a20bc19afc8ece1fec95aa44c2,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 -CVE-2024-44232,0,0,191f9bfeeb1d62bdd87334797048d4412244f7ecfe6bbd6480aa91153492f1cd,2024-11-01T21:15:14.730000 -CVE-2024-44233,0,0,2ca2e0a55694b969813c2ea21d075e99121deaa48b4daf8c0e3001c0881abd5f,2024-11-01T21:15:14.787000 -CVE-2024-44234,0,0,24c16a966156c95ed52608f2e801d8dab42879e91efb09e6ab39c80f7fe34435,2024-11-01T21:15:14.847000 +CVE-2024-44232,0,1,4c28f2f4a7eeb218636d2d83bbc63a2a4c4883c4a9d8461e7c674b470a63b1a2,2024-11-04T01:35:50.083000 +CVE-2024-44233,0,1,5fbcd61e78328b0d5b5d8515b5e18152226785bd560b0e3433d5e80f113fbb1c,2024-11-04T01:35:50.083000 +CVE-2024-44234,0,1,6c6aec5b8251f584ee84a7e4fff6c667b44c4d629cbdb2d26c9c95408643ab2f,2024-11-04T01:35:50.083000 CVE-2024-44235,0,0,f6b12e29f9914b58eea41bdafe0e4148ebdbea0c9aa9cac7f81ae35deb7df419,2024-10-30T21:35:06.987000 CVE-2024-44236,0,0,2596c988781ee3ffb6a2ddc6dda4e4baeacf8834e38bce0c324b3d9abc20481c,2024-10-30T17:28:52.077000 CVE-2024-44237,0,0,0ccb96caec122e6d60ce17ba18063b0a9447d8c20c9511ccf57f0112e5d3846b,2024-10-29T21:35:16.563000 @@ -264380,7 +264405,7 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 -CVE-2024-51774,0,0,596774be6de28515ec1b421651436af5f842b86d44b3a546fb99267d554b2c28,2024-11-02T06:15:03.007000 +CVE-2024-51774,0,1,242a44b9a9a0589607c8c1cdba956fe336337ab5aadb3b57a9925f5da73df90f,2024-11-04T01:35:50.083000 CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000 CVE-2024-5179,0,0,ea665152b8c9953ad6e84eb904f7eac78af7e075a45f2a4da51451b13f6b9cb3,2024-10-09T16:57:08.317000 CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000 @@ -267309,7 +267334,7 @@ CVE-2024-8733,0,0,2ad75c4913be224ff75684fa724a275e53b709dc0d7f918cc99544f1d75453 CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000 CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000 CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000 -CVE-2024-8739,0,0,ba103783330da51a68b7977ee0653396c66f5c092a1a8772f841a298e993b44e,2024-11-02T02:15:12.560000 +CVE-2024-8739,0,1,41153810936f3619e5c81e3d953c85176c796fb54603cafdf01bd17244a97cb1,2024-11-04T01:35:50.083000 CVE-2024-8740,0,0,344648ec73420b23dee0eff45da9579413da1d5a4cc904056aa5b9f023dadc49,2024-10-29T14:46:02.103000 CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000 CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000 @@ -267577,7 +267602,7 @@ CVE-2024-9180,0,0,43a25f270cfb7cd861387fae3760598de599a33ae7c6d1aa6e3f1a95d5d03b CVE-2024-9184,0,0,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000 CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 -CVE-2024-9191,0,0,83a992af53a23983e3607616beb0d4f27ad95a615e8bc88c24b927f198a88fc3,2024-11-01T22:15:03.213000 +CVE-2024-9191,0,1,c5c6218bb397957fa2ce005f80352a140b08b33c91a2e82fcc916dff9be5ccd6,2024-11-04T01:35:50.083000 CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000 CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000 @@ -267944,7 +267969,7 @@ CVE-2024-9862,0,0,a125c015e3b00c8735ed8c9687686a16a9d40d9b6f2ce90b19ff292bf536d9 CVE-2024-9863,0,0,5a2779f928f03a35905e31f60158c72d5505c6aaa35173f98063e46d2c1389f4,2024-10-18T12:53:04.627000 CVE-2024-9864,0,0,ecd679b570a8abacc1db8d694db02ae1ea10c97942981b05302fe359da1cbf9c,2024-10-25T12:56:07.750000 CVE-2024-9865,0,0,767ca346f0a1ff11496989a87fd401620d0792dff4b8ce54d6dd2bc8cbb6f984,2024-10-25T12:56:07.750000 -CVE-2024-9868,0,0,cfa3fb7bcdb4df457cfcd8cd91388f3153ab52ef6741ef4dfc11f5fc24b8bf96,2024-11-02T02:15:12.803000 +CVE-2024-9868,0,1,619ab7a97cf5b6852372ad0a01ba35ee632f7798836d1aef77412959238d8fb1,2024-11-04T01:35:50.083000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000 CVE-2024-9884,0,0,757f98f3275a3bf4e9b1e819bb018e139225ae1ebee044e7c027a7c44897e089,2024-11-01T12:57:03.417000 @@ -267958,7 +267983,7 @@ CVE-2024-9892,0,0,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714 CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000 CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000 CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000 -CVE-2024-9896,0,0,50af1852de2ceeb6ef7007469273b0df4a41cf8534b27ab37ac70aa2310c8ecc,2024-11-02T08:15:03.197000 +CVE-2024-9896,0,1,b6422a69408923c8fbfb23c93250f2055895778f177137c25dbacaac56966208,2024-11-04T01:35:50.083000 CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000 CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000