diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4322.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4322.json index d68308547e4..8b153cba147 100644 --- a/CVE-2021/CVE-2021-43xx/CVE-2021-4322.json +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4322.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4322", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:10.610", - "lastModified": "2023-08-12T06:15:12.483", + "lastModified": "2024-10-03T14:35:00.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47220.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47220.json index e4f3efb7d62..dbb6352aef9 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47220.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47220.json @@ -2,48 +2,15 @@ "id": "CVE-2021-47220", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.290", - "lastModified": "2024-10-03T13:15:13.883", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T15:15:13.703", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: core: fix kernel panic when do reboot\n\nWhen do system reboot, it calls dwc3_shutdown and the whole debugfs\nfor dwc3 has removed first, when the gadget tries to do deinit, and\nremove debugfs for its endpoints, it meets NULL pointer dereference\nissue when call debugfs_lookup. Fix it by removing the whole dwc3\ndebugfs later than dwc3_drd_exit.\n\n[ 2924.958838] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000002\n....\n[ 2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)\n[ 2925.037005] pc : inode_permission+0x2c/0x198\n[ 2925.041281] lr : lookup_one_len_common+0xb0/0xf8\n[ 2925.045903] sp : ffff80001276ba70\n[ 2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000000\n[ 2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: dead000000000100\n[ 2925.063510] x23: dead000000000122 x22: 0000000000000000 x21: 0000000000000001\n[ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000\n[ 2925.077797] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000004\n[ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030\n[ 2925.092087] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f x9 : ffff8000102b2420\n[ 2925.099232] x8 : 7f7f7f7f7f7f7f7f x7 : feff73746e2f6f64 x6 : 0000000000008080\n[ 2925.106378] x5 : 61c8864680b583eb x4 : 209e6ec2d263dbb7 x3 : 000074756f307065\n[ 2925.113523] x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff8000122c6188\n[ 2925.120671] Call trace:\n[ 2925.123119] inode_permission+0x2c/0x198\n[ 2925.127042] lookup_one_len_common+0xb0/0xf8\n[ 2925.131315] lookup_one_len_unlocked+0x34/0xb0\n[ 2925.135764] lookup_positive_unlocked+0x14/0x50\n[ 2925.140296] debugfs_lookup+0x68/0xa0\n[ 2925.143964] dwc3_gadget_free_endpoints+0x84/0xb0\n[ 2925.148675] dwc3_gadget_exit+0x28/0x78\n[ 2925.152518] dwc3_drd_exit+0x100/0x1f8\n[ 2925.156267] dwc3_remove+0x11c/0x120\n[ 2925.159851] dwc3_shutdown+0x14/0x20\n[ 2925.163432] platform_shutdown+0x28/0x38\n[ 2925.167360] device_shutdown+0x15c/0x378\n[ 2925.171291] kernel_restart_prepare+0x3c/0x48\n[ 2925.175650] kernel_restart+0x1c/0x68\n[ 2925.179316] __do_sys_reboot+0x218/0x240\n[ 2925.183247] __arm64_sys_reboot+0x28/0x30\n[ 2925.187262] invoke_syscall+0x48/0x100\n[ 2925.191017] el0_svc_common.constprop.0+0x48/0xc8\n[ 2925.195726] do_el0_svc+0x28/0x88\n[ 2925.199045] el0_svc+0x20/0x30\n[ 2925.202104] el0_sync_handler+0xa8/0xb0\n[ 2925.205942] el0_sync+0x148/0x180\n[ 2925.209270] Code: a9025bf5 2a0203f5 121f0056 370802b5 (79400660)\n[ 2925.215372] ---[ end trace 124254d8e485a58b ]---\n[ 2925.220012] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b\n[ 2925.227676] Kernel Offset: disabled\n[ 2925.231164] CPU features: 0x00001001,20000846\n[ 2925.235521] Memory Limit: none\n[ 2925.238580] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b ]---" - }, - { - "lang": "es", - "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: dwc3: core: soluciona el p\u00e1nico del kernel cuando se reinicia. Cuando se reinicia el sistema, llama a dwc3_shutdown y todos los debugfs para dwc3 se eliminan primero, cuando el dispositivo intenta realizar deinit. y elimina debugfs para sus endpoints, se encuentra con el problema de desreferencia del puntero NULL cuando se llama a debugfs_lookup. Solucionelo eliminando todos los debugfs de dwc3 posteriores a dwc3_drd_exit. [2924.958838] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000002 .... [2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--) [2925.037005] pc: inode_permission+0x2c /0x198 [ 2925.041281 ] lr: lookup_one_len_common+0xb0/0xf8 [2925.045903] sp: ffff80001276ba70 [2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000 000 [2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: muerto000000000100 [2925.063510] x23: muerto000000000122 x22: 00000000000000 00x21: 0000000000000001 [ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000 [ 2925.077797] x17: 0000000000000000 x16: 00000000 x15: 0000000000000004 [ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030 [ 2925.092087] x11: 101010101 x10: 7f7f7f7f7f7f7f7f x9: ffff8000102b2420 [2925.099232 ] x8: 7f7f7f7f7f7f7f7f x7: feff73746e2f6f64 x6: 0000000000008080 [2925.106378] x5: 61c8864680b583eb x4: 209e6ec2d263dbb7 x3: 000074756 f307065 [2925.113523] x2: 0000000000000001 x1: 0000000000000000 x0: ffff8000122c6188 [2925.120671] Seguimiento de llamada: [2925.123119] inode_permission+0x2c/0x 198 [ 2925.127042 ] lookup_one_len_common+0xb0/0xf8 [ 2925.131315] lookup_one_len_unlocked+0x34/0xb0 [ 2925.135764] lookup_positive_unlocked+0x14/0x50 [ 2925.140296] debugfs_lookup+0x68/0xa0 [ 292 5.143964] dwc3_gadget_free_endpoints+0x84/0xb0 [ 2925.148675] dwc3_gadget_exit+0x28/0x78 [ 2925.152518] dwc3_drd_exit +0x100/0x1f8 [ 2925.156267] dwc3_remove+0x11c/0x120 [ 2925.159851] dwc3_shutdown+0x14/0x20 [ 2925.163432] platform_shutdown+0x28/0x38 [ 2925.167360] apagado+0x15c/0x378 [ 2925.171291] kernel_restart_prepare+0x3c/0x48 [ 2925.175650] kernel_restart+0x1c /0x68 [ 2925.179316] __do_sys_reboot+0x218/0x240 [ 2925.183247] __arm64_sys_reboot+0x28/0x30 [ 2925.187262] invoke_syscall+0x48/0x100 [ 2925.191017 ] el0_svc_common.constprop.0+0x48/0xc8 [ 2925.195726] do_el0_svc+0x28/0x88 [ 2925.199045] el0_svc +0x20/0x30 [ 2925.202104] el0_sync_handler+0xa8/0xb0 [ 2925.205942] el0_sync+0x148/0x180 [ 2925.209270] C\u00f3digo: a9025bf5 2a0203f5 121f0056 370802b5 9400660) [ 2925.215372] ---[ rastreo final 124254d8e485a58b ]--- [ 2925.220012] N\u00facleo p\u00e1nico - no se sincroniza: \u00a1Intent\u00e9 matar init! ExitCode = 0x0000000b [2925.227676] Offset del n\u00facleo: deshabilitado [2925.231164] Caracter\u00edsticas de la CPU: 0x00001001,20000846 [2925.235521] L\u00edmite de memoria: Ninguno [2925.238580] --- [final de Kernel Panic -No Syncing: Intento de matar init! c\u00f3digo de salida=0x0000000b ]--- (seleccionado del compromiso 2a042767814bd0edf2619f06fecd374e266ea068)" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/174c27583b3807ac96228c442735b02622d8d1c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/2a042767814bd0edf2619f06fecd374e266ea068", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/58b5e02c6ca0e2b7c87cd8023ff786ef3c0eef74", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7f9745ab342bcce5efd5d4d2297d0a3dd9db0eac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/fa8c413e6b74ae5d12daf911c73238c5bdacd8e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/fd7c4bd582494934be15d41aebe0dbe23790605f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/ff4c63f3e8cb7af2ce51cc56b031e08fd23c758b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26133.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26133.json index 66ea7a8f5e8..cd570c71995 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26133.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26133.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26133", "sourceIdentifier": "security@atlassian.com", "published": "2022-04-20T19:15:08.157", - "lastModified": "2022-04-28T17:50:56.293", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-03T15:35:00.870", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47695.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47695.json index 791ac314337..e1ad70dfa30 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47695.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47695.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47695", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:30.743", - "lastModified": "2023-08-26T02:14:58.653", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-03T15:35:03.300", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47696.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47696.json index b97094a5eaf..c8bb42b4a57 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47696.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47696.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47696", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:30.803", - "lastModified": "2023-08-26T02:15:04.807", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-03T15:35:04.010", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4919.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4919.json index d5be7f62671..c18b9a8b726 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4919.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4919.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4919", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:11.517", - "lastModified": "2023-08-19T03:15:20.507", + "lastModified": "2024-10-03T14:35:02.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4920.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4920.json index 3423e51db46..d959752eede 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4920.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4920.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4920", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:11.573", - "lastModified": "2023-08-19T03:15:21.130", + "lastModified": "2024-10-03T14:35:03.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4921.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4921.json index 2ca3ac87420..45e3948058c 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4921.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4921.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4921", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:11.627", - "lastModified": "2023-08-12T06:16:06.143", + "lastModified": "2024-10-03T14:35:04.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23774.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23774.json index 0f8f927458b..1e5addb8f1c 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23774.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23774.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23774", "sourceIdentifier": "cert@ncsc.nl", "published": "2023-08-29T09:15:09.403", - "lastModified": "2023-11-07T04:07:56.483", + "lastModified": "2024-10-03T14:15:04.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-703" + "value": "CWE-248" } ] } diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json index bc60d90d43d..25103ef8ce4 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32559", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-24T02:15:09.210", - "lastModified": "2023-10-24T17:48:55.097", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-03T14:35:05.690", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json index 1f6ead9d68a..219e8af13e8 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36542", "sourceIdentifier": "security@apache.org", "published": "2023-07-29T08:15:48.833", - "lastModified": "2023-08-03T19:09:29.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-03T14:35:06.660", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37427.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37427.json index 2cc77b0f981..4c42ecead9c 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37427.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37427.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37427", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-08-22T19:16:37.310", - "lastModified": "2023-08-29T20:32:01.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-03T15:35:05.163", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38666.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38666.json index d9a8e48a4ae..e2b999782a0 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38666.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38666.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38666", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:39.170", - "lastModified": "2023-08-28T19:46:35.200", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-03T14:35:07.243", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json index a7a94a567db..90272a3268f 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20304", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-11T17:15:11.853", - "lastModified": "2024-09-12T12:35:54.013", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:20:07.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,115 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1807BE16-BAA9-4BC6-B98A-13D584A12821" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "375746CB-695E-4019-89C9-42ED37A5E958" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*", + "matchCriteriaId": "CE7D05C0-4065-448B-AAC6-F29E379F3DA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D8ADA2B1-FD5A-4900-953B-30951C8EF9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9B4C7223-3EFB-48C2-BE22-941F60826D0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.12:*:*:*:*:*:*:*", + "matchCriteriaId": "9A14959D-63E1-4B5A-BB7F-A9A2AF3F1137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*", + "matchCriteriaId": "4EE83701-C0B7-4ED2-866B-44B7F54FCA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "164B241C-397A-4921-BC5B-F928A21E91C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FAD3875D-D283-4961-BE31-750FDF9CDF56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*", + "matchCriteriaId": "87EF9DC5-4BE2-429D-B9BA-EF9F29E7E0F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BAEC28C0-8091-49F9-88D1-CB96234BF52A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E1ED2B72-A65C-47E4-87B3-D83F29428396" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8904CAA5-4E01-462C-AE57-067902CD95FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7750EA99-EC55-4F94-8730-18583647BBBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BCE8E968-111F-4F57-93D3-E509AB540B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B342A550-8600-45CF-8B9A-530770C9A0F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D64E1C4D-46B0-4A18-B8EE-BEA732CBF1F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*", + "matchCriteriaId": "11288A28-F0CF-4FEC-A0B7-3D93866F01FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pak-mem-exhst-3ke9FeFy", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json index 32254f46100..4e64c0e40ac 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20508", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-25T17:15:18.267", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:43:23.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,105 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "245ED9C3-4B16-4CC1-BC78-B4AED938C0B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CC21847D-908F-45C0-9A97-E77DE1C4A8D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "CBCF8B3B-1F42-43CF-A328-9381BA459262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D39700C2-E83C-4ECE-9640-CEFBDD18DC4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EA09D285-3016-4042-9078-F94254C330B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0286B57C-2E00-48F9-B3B4-E2EF3E874218" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.9.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "D247882B-DDA4-47A6-A2B0-2AFFCB94F133" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F45D0BD-724A-4D44-9192-D52FAF2E51FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "8FC4D3D8-4391-4ED6-B27B-EF47C96904CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "60AE1B18-3CEB-45B3-A43D-3C6DCC1F20F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9F4AA555-A8AD-4EF1-BDED-CCB550AA7560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "158ADFDB-D308-40AA-A445-BB9AF2F2414B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "5F44916C-A0B3-40B1-B9E5-ACED3A0ECC80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.13.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "AA3E7D96-E406-4CB5-91FC-A0FD5D94A876" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.14.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "07AAFFE0-B85D-4A62-894B-20A05973CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.15.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "7842C05A-F9DE-49A7-8478-A1EF324C593D" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json index 438a459ecdc..54d58c6de50 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20510", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-25T17:15:18.470", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:52:22.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.8 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,1011 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*", + "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*", + "matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", + "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", + "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", + "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*", + "matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", + "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", + "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*", + "matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*", + "matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*", + "matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*", + "matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*", + "matchCriteriaId": "AF595930-44E0-41FD-A0EF-C8E301E6585B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", + "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", + "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*", + "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*", + "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*", + "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*", + "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*", + "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "4D2264D7-5E89-4F50-B948-FAB41D07C8BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "6BB8368D-B9F9-4679-8154-1174E140CA17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "E0A766E7-CF3C-4529-AFA4-D780059A66BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "46B7F7EA-6512-433F-B1E4-B2F889427464" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "4AF792BC-C270-4294-8E4E-71FAC3ACFCF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0D2D94-6470-4E4B-A1B1-0124F92AA793" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-cwa-acl-nPSbHSnA", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37022.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37022.json index a5435578285..363cb282e9c 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37022.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37022", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-13T18:15:10.547", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T15:55:56.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -95,10 +115,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fujielectric:tellus_lite_v-simulator:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.20.0", + "matchCriteriaId": "061A8685-2CB2-40CA-98CE-BD84FCEF100A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-14", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json index af3ba0c8e3b..dce6ee97a7a 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41121", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-19T20:15:08.180", - "lastModified": "2024-07-22T13:00:53.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-03T15:57:31.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,30 +81,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.0", + "matchCriteriaId": "6FFB6F4F-B936-4455-9130-B6BD0EFD9D46" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/woodpecker-ci/woodpecker-security/issues/8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/woodpecker-ci/woodpecker-security/issues/9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/woodpecker-ci/woodpecker-security/pull/11", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/woodpecker-ci/woodpecker/issues/3924", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/woodpecker-ci/woodpecker/pull/3933", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json index 1399a1069db..1a3d6404e07 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42495", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-05T23:15:12.520", - "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:09:24.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -85,8 +105,18 @@ }, "weaknesses": [ { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -95,10 +125,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hughes:wl300_fusion_software:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.0.10", + "matchCriteriaId": "91DB2ABE-3363-4CEB-AB4A-F32F1029485B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-249-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44970.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44970.json index 4bf868ccc69..4f502d8b1f0 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44970.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44970", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:31.307", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:22:06.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: SHAMPO, soluciona la desvinculaci\u00f3n de la lista enlazada de WQ no v\u00e1lida Cuando se han consumido todos los pasos en un WQE, el WQE se desvincula de la lista enlazada de WQ (mlx5_wq_ll_pop()). Para SHAMPO, es posible recibir CQE con 0 pasos consumidos para el mismo WQE incluso despu\u00e9s de que el WQE se haya consumido por completo y se haya desvinculado. Esto desencadena una desvinculaci\u00f3n adicional para el mismo wqe que corrompe la lista enlazada. Solucione este escenario aceptando pasos consumidos de tama\u00f1o 0 sin desvincular el WQE nuevamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "ECB889E5-9368-4201-9049-7289757A0B8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/50d8009a0ac02c3311b23a0066511f8337bd88d9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/650e24748e1e0a7ff91d5c72b72a2f2a452b5b76", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7b379353e9144e1f7460ff15f39862012c9d0d78", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fba8334721e266f92079632598e46e5f89082f30", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44973.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44973.json index 965bb49b7dd..fee8afae7bd 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44973.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:31.487", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:23:09.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,85 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm, slub: no llamar a do_slab_free para el objeto kfence En 782f8906f805, la liberaci\u00f3n de objetos kfence se traslad\u00f3 desde lo profundo de do_slab_free a las funciones envolventes externas. Este es un cambio agradable, pero desafortunadamente omiti\u00f3 un punto en __kmem_cache_free_bulk. Esto da como resultado un fallo como este: ERROR skbuff_head_cache (Tainted: GSBE ): Relleno sobrescrito. 0xffff88907fea0f00-0xffff88907fea0fff @offset=3840 error_losa (mm/slub.c:1129) lista_libre_a_parcial (mm/slub.c:? mm/slub.c:4036) comprobaci\u00f3n_almohadilla_losa (mm/slub.c:864 mm/slub.c:1290) comprobaci\u00f3n_losa (mm/slub.c:?) lista_libre_a_parcial (mm/slub.c:3171 mm/slub.c:4036) kmem_cache_alloc_bulk (mm/slub.c:? mm/slub.c:4495 mm/slub.c:4586 mm/slub.c:4635) napi_build_skb (net/core/skbuff.c:348 net/core/skbuff.c:527 net/core/skbuff.c:549) Todos los dem\u00e1s llamadores de do_slab_free parecen estar bien. Agregue una comprobaci\u00f3n de kfence_free en __kmem_cache_free_bulk para evitar el bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "48E239A0-A959-4FAB-8475-D045FED3DDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a371d558e6f3aed977a8a7346350557de5d25190", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b35cd7f1e969aaa63e6716d82480f6b8a3230949", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44975.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44975.json index 3854c2c4e8d..30334525838 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44975.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44975", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.160", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:32:31.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: arregla el p\u00e1nico causado por partcmd_update Encontramos un error como el siguiente: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 00000003 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 358 Comm: bash Tainted: GWI 6.6.0-10893-g60d6 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/4 RIP: 0010:partition_sched_domains_locked+0x483/0x600 C\u00f3digo: 01 48 85 d2 74 0d 48 83 05 29 3f f8 03 01 f3 48 0f bc c2 89 c0 48 9 RSP: 0018:ffffc90000fdbc58 EFLAGS: 00000202 RAX: 0000000100000003 RBX: ffff888100b3dfa0 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000002fe80 RBP: ffff888100b3dfb0 R08: 0000000000000001 R09: 0000000000000000 R10: ffffc90000fdbcb0 R11: 0000000000000004 R12: 0000000000000002 R13: ffff888100a92b48 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f44a5425740(0000) GS:ffff888237d80000(0000) knlGS:0000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000100030973 CR3: 000000010722c000 CR4: 00000000000006e0 Seguimiento de llamadas: ? show_regs+0x8c/0xa0 ? __die_body+0x23/0xa0 ? __die+0x3a/0x50 ? page_fault_oops+0x1d2/0x5c0 ? particion_sched_domains_locked+0x483/0x600 ? search_module_extables+0x2a/0xb0 ? search_exception_tables+0x67/0x90 ? kernelmode_fixup_or_oops+0x144/0x1b0 ? __bad_area_nosemaphore+0x211/0x360 ? up_read+0x3b/0x50 ? sem\u00e1foro de nariz de \u00e1rea defectuosa+0x1a/0x30 ? exc_page_fault+0x890/0xd90 ? __lock_acquire.constprop.0+0x24f/0x8d0 ? __lock_acquire.constprop.0+0x24f/0x8d0 ? asm_exc_page_fault+0x26/0x30 ? dominios programados de partici\u00f3n bloqueados+0x483/0x600 ? partici\u00f3n_sched_dominios_bloqueados+0xf0/0x600 reconstruir_sched_dominios_bloqueados+0x806/0xdc0 actualizar_partici\u00f3n_sd_lb+0x118/0x130 resmask_escritura_cpuset+0xffc/0x1420 escritura_archivo_cgroup+0xb2/0x290 iterador_escritura_fop_kernfs+0x194/0x290 nueva_escritura_sincronizada+0xeb/0x160 escritura_vfs+0x16f/0x1d0 escritura_ksys+0x81/0x180 escritura_sys___x64+0x21/0x30 llamada_sys_x64+0x2f25/0x4630 llamada_sys_64+0x44/0xb0 entry_SYSCALL_64_after_hwframe+0x78/0xe2 RIP: 0033:0x7f44a553c887 Se puede reproducir con los siguientes comandos: cd /sys/fs/cgroup/ mkdir test cd test/ echo +cpuset > ../cgroup.subtree_control echo root > cpuset.cpus.partition cat /sys/fs/cgroup/cpuset.cpus.effective 0-3 echo 0-3 > cpuset.cpus // quitar todas las CPU de la ra\u00edz Este problema se debe a la reconstrucci\u00f3n incorrecta de los dominios de programaci\u00f3n. En este escenario, test/cpuset.cpus.partition deber\u00eda ser una ra\u00edz no v\u00e1lida y no deber\u00eda activar la reconstrucci\u00f3n de los dominios de programaci\u00f3n. Al llamar a update_parent_effective_cpumask con partcmd_update, si newmask no es nulo, debe volver a verificar si newmask tiene CPU disponibles para parect/cs que tiene tareas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/73d6c6cf8ef6a3c532aa159f5114077746a372d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/959ab6350add903e352890af53e86663739fcb9a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45519.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45519.json index 736ddc2b46f..80ca9d035f1 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45519.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45519.json @@ -2,17 +2,41 @@ "id": "CVE-2024-45519", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-02T22:15:02.770", - "lastModified": "2024-10-03T10:29:17.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-03T14:07:15.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands." + }, + { + "lang": "es", + "value": "El servicio postjournal en Zimbra Collaboration (ZCS) anterior a la versi\u00f3n 8.8.15 parche 46, 9 anterior a la versi\u00f3n 9.0.0 parche 41, 10 anterior a la versi\u00f3n 10.0.9 y 10.1 anterior a la versi\u00f3n 10.1.1 a veces permite que usuarios no autenticados ejecuten comandos." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -35,14 +59,458 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.8.15", + "matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.9", + "matchCriteriaId": "18D6B3CE-07F4-45F9-A5C8-3CA0B1395039" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*", + "matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*", + "matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*", + "matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*", + "matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*", + "matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*", + "matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*", + "matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*", + "matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*", + "matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*", + "matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*", + "matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*", + "matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*", + "matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*", + "matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*", + "matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*", + "matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*", + "matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*", + "matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*", + "matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*", + "matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*", + "matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*", + "matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*", + "matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*", + "matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*", + "matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*", + "matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*", + "matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*", + "matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*", + "matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*", + "matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*", + "matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*", + "matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*", + "matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*", + "matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*", + "matchCriteriaId": "9605C0CF-E5DF-497A-B298-D64ABCDAF88E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p43:*:*:*:*:*:*", + "matchCriteriaId": "0A77DFFA-CBBF-4F8C-9D8E-68CC115B4D2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p44:*:*:*:*:*:*", + "matchCriteriaId": "4E7EBCB8-3042-4BA9-B34A-E1C95F111B38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p45:*:*:*:*:*:*", + "matchCriteriaId": "5DEF465F-35ED-49ED-A86C-AE1C7FF76AFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*", + "matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*", + "matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*", + "matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*", + "matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*", + "matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*", + "matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*", + "matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "4FA0E9C4-25E4-4CD6-B88A-02B413385866" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:*", + "matchCriteriaId": "5D6F7CA3-C36A-466C-8FAD-D0B3CEF01F0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p37:*:*:*:*:*:*", + "matchCriteriaId": "9684AC81-B557-4292-8402-AE55CB2E613C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p38:*:*:*:*:*:*", + "matchCriteriaId": "32A352C4-0E9C-436F-ADA7-D93492A18037" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p39:*:*:*:*:*:*", + "matchCriteriaId": "ABCA8698-AB88-4A6D-BD2B-DB22AEED6536" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p40:*:*:*:*:*:*", + "matchCriteriaId": "CEE1CBDD-F205-4EA7-9E8B-5527BC134C74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*", + "matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zimbra:collaboration:10.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6198F75A-353D-4079-91DE-A7CC22DFE8B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wiki.zimbra.com/wiki/Security_Center", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json index 6b4cfe05cff..2378cca04f8 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45806.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45806", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-20T00:15:02.293", - "lastModified": "2024-09-25T19:02:57.757", + "lastModified": "2024-10-03T15:36:55.557", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,7 +22,7 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,12 +30,12 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, + "availabilityImpact": "NONE", + "baseScore": 9.1, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 5.2 }, { "source": "security-advisories@github.com", diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json index 67c0d7704b1..99fb26f55c3 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46861", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:17.563", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T15:36:06.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: ipheth: no detiene RX en caso de error en la devoluci\u00f3n de llamada RX Las devoluciones de llamada RX pueden fallar por m\u00faltiples razones: * Payload demasiado corto * Payload formateado incorrectamente (por ejemplo, mala estructura de NCM) * Falta de memoria Ninguna de estas deber\u00eda provocar que el controlador se bloquee. Haga que estas fallas no sean cr\u00edticas y contin\u00fae procesando m\u00e1s URB entrantes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.52", + "matchCriteriaId": "AE9373D7-4CC6-4422-A25F-8FA1533328E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.11", + "matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08ca800b0cd56d5e26722f68b18bbbf6840bf44b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d1cfa3afb8627435744ecdc6d8b58bc72ee0f4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74efed51e0a4d62f998f806c307778b47fc73395", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json index ae6be3d0861..911220cd1d7 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46862", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:17.627", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T15:34:46.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,110 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: soc-acpi-intel-mtl-match: agregar elemento vac\u00edo faltante No hay links_num en struct snd_soc_acpi_mach {}, y probamos !link->num_adr como condici\u00f3n para finalizar el bucle en hda_sdw_machine_select(). Por lo tanto, se requiere un elemento vac\u00edo en la matriz struct snd_soc_acpi_link_adr." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.11", + "matchCriteriaId": "1C00DB61-E108-46C8-817A-E3ED88BEA191" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", + "matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01281a9e8275946aa725db0919769b8d35af3a11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf6d7a44a144aa9c476dee83c23faf3151181bab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json index 54971717857..4133b21d525 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46863", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:17.690", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T15:32:54.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,96 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: soc-acpi-intel-lnl-match: agregar elemento vac\u00edo faltante No hay links_num en struct snd_soc_acpi_mach {}, y probamos !link->num_adr como condici\u00f3n para finalizar el bucle en hda_sdw_machine_select(). Por lo tanto, se requiere un elemento vac\u00edo en la matriz struct snd_soc_acpi_link_adr." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.52", + "matchCriteriaId": "AE9373D7-4CC6-4422-A25F-8FA1533328E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.11", + "matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8eb57389d8ad91c67bf844f5aae4caef74b9091b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c4246f1fe9f24f8dcd97887ed67d8fcfd91f4796", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json index fc8f417f6f5..f2d89964674 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46864", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:17.747", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T15:29:34.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/hyperv: fix kexec crash due to VP assist page corrupt commit 9636be85cc5b (\"x86/hyperv: Fix hyperv_pcpu_input_arg management when CPUs go online/offline\") introduce un nuevo estado de cpuhp para la inicializaci\u00f3n de hyperv. cpuhp_setup_state() devuelve el n\u00famero de estado si el estado es CPUHP_AP_ONLINE_DYN o CPUHP_BP_PREPARE_DYN y 0 para todos los dem\u00e1s estados. Para el caso de hyperv, dado que se introdujo un nuevo estado de cpuhp, devolver\u00eda 0. Sin embargo, en hv_machine_shutdown(), la llamada a cpuhp_remove_state() est\u00e1 condicionada a \"hyperv_init_cpuhp > 0\". Esto nunca ser\u00e1 cierto y, por lo tanto, hv_cpu_die() no se llamar\u00e1 en todas las CPU. Esto significa que la p\u00e1gina de asistencia de VP no se restablecer\u00e1. Cuando el kernel de kexec intenta configurar la p\u00e1gina de asistencia de VP nuevamente, el hipervisor corrompe la regi\u00f3n de memoria de la p\u00e1gina de asistencia de VP anterior, lo que provoca un p\u00e1nico en caso de que el kernel de kexec est\u00e9 usando esa memoria en otro lugar. Esto se solucion\u00f3 originalmente en el commit dfe94d4086e4 (\"x86/hyperv: Fix kexec panic/hang issues\"). Desh\u00e1gase de hyperv_init_cpuhp por completo, ya que ya no estamos usando un estado de cpuhp din\u00e1mico y use CPUHP_AP_HYPERV_ONLINE directamente con cpuhp_remove_state()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.52", + "matchCriteriaId": "4B069D1F-CDB1-421E-A7FE-281C7312550A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndIncluding": "6.10.11", + "matchCriteriaId": "FCF7772B-1996-473C-B3BE-95A8ECD6556C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", + "matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9af6418279c4cf73ca073f8ea024992b38be8ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6f018a3b49d0a94ddbd0e479c2af6b19724e434", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json index 62dffa2cc3a..02cc868400e 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47083", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-25T22:15:03.273", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-03T15:11:29.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -77,18 +109,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_platform_terraform_provider:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.0.0", + "matchCriteriaId": "08FB48A2-70DE-4058-9793-86D032C07381" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/microsoft/terraform-provider-power-platform/releases/tag/v3.0.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/microsoft/terraform-provider-power-platform/security/advisories/GHSA-7w3w-pjm5-m36c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://registry.terraform.io/providers/microsoft/power-platform/latest/docs#authenticating-to-power-platform-using-a-service-principal-with-oidc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47614.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47614.json new file mode 100644 index 00000000000..da27a3dd016 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47614.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47614", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-03T15:15:14.720", + "lastModified": "2024-10-03T15:15:14.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "async-graphql is a GraphQL server library implemented in Rust. async-graphql before 7.0.10 does not limit the number of directives for a field. This can lead to Service Disruption, Resource Exhaustion, and User Experience Degradation. This vulnerability is fixed in 7.0.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/async-graphql/async-graphql/commit/7f1791488463d4e9c5adcd543962173e2f6cbd34", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/async-graphql/async-graphql/security/advisories/GHSA-5gc2-7c65-8fq8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47617.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47617.json new file mode 100644 index 00000000000..11d38328c30 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47617.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-47617", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-03T15:15:14.937", + "lastModified": "2024-10-03T15:15:14.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sulu is a PHP content management system. This vulnerability allows an attacker to inject arbitrary HTML/JavaScript code through the media download URL in Sulu CMS. It affects the SuluMediaBundle component. The vulnerability is a Reflected Cross-Site Scripting (XSS) issue, which could potentially allow attackers to steal sensitive information, manipulate the website's content, or perform actions on behalf of the victim. This vulnerability is fixed in 2.6.5 and 2.5.21." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sulu/sulu/commit/a5a5ae555d282e88ff8559d38cfb46dea7939bda", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/sulu/sulu/commit/eeacd14b6cf55f710084788140d40ebb00314b29", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/sulu/sulu/security/advisories/GHSA-6784-9c82-vr85", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47618.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47618.json new file mode 100644 index 00000000000..94a012eeadb --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47618.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-47618", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-03T15:15:15.147", + "lastModified": "2024-10-03T15:15:15.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sulu is a PHP content management system. Sulu is vulnerable against XSS whereas a low privileged user with access to the \u201cMedia\u201d section can upload an SVG file with a malicious payload. Once uploaded and accessed, the malicious javascript will be executed on the victims\u2019 (other users including admins) browsers. This issue is fixed in 2.6.5." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sulu/sulu/commit/ca72f75eebe41ea7726624d8aea7da6c425f1eb9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/sulu/sulu/security/advisories/GHSA-255w-87rh-rg44", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5803.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5803.json new file mode 100644 index 00000000000..a3519dd2ed5 --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5803.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5803", + "sourceIdentifier": "security@nortonlifelock.com", + "published": "2024-10-03T15:15:15.310", + "lastModified": "2024-10-03T15:15:15.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The AVGUI.exe of AVG/Avast Antivirus before versions before 24.1 can allow a local attacker to escalate privileges via an COM hijack in a time-of-check to time-of-use (TOCTOU) when self protection is disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@nortonlifelock.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@nortonlifelock.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html", + "source": "security@nortonlifelock.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json index a85be18dfa2..4b1d3173955 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8404.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8404", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-09-26T02:15:02.797", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-03T15:19:28.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "type": "Secondary", @@ -51,10 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.0.9", + "matchCriteriaId": "7AE8A9B5-11C6-4FE2-B672-0EC6EF8075CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.0.9", + "matchCriteriaId": "BA96610E-7518-4215-B5FF-1B4444BE2DA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/", - "source": "eb41dac7-0af8-4f84-9f6d-0272772514f4" + "source": "eb41dac7-0af8-4f84-9f6d-0272772514f4", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9100.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9100.json new file mode 100644 index 00000000000..8bd579ce840 --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9100.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9100", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-10-03T15:15:15.553", + "lastModified": "2024-10-03T15:15:15.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zohocorp ManageEngine Analytics Plus versions before 5410 and\u00a0Zoho Analytics On-Premise\u00a0versions before 5410 are vulnerable to Path traversal." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.manageengine.com/analytics-plus/CVE-2024-9100.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + }, + { + "url": "https://www.zoho.com/analytics/onpremise/CVE-2024-9100.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json index b91ed568550..a9c8937e786 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9177", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-26T14:15:09.697", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-03T14:32:46.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themedy:toolbox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.16", + "matchCriteriaId": "48A43E5F-CF2F-4C9F-B516-94CBF4860257" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3157836/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/themedy-toolbox/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/755e0998-0f0d-4259-881d-ed07aecb0b10?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9460.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9460.json new file mode 100644 index 00000000000..44f0ceec7a2 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9460.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-9460", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-03T15:15:15.750", + "lastModified": "2024-10-03T15:15:15.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Online Shopping Portal 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ppp-src/CVE/issues/8", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279132", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279132", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.417052", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 4117330f91d..ae2c261a9ba 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-03T14:00:19.355949+00:00 +2024-10-03T16:00:18.296829+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-03T13:52:23.060000+00:00 +2024-10-03T15:57:31.917000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264387 +264393 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `6` -- [CVE-2024-47554](CVE-2024/CVE-2024-475xx/CVE-2024-47554.json) (`2024-10-03T12:15:02.613`) +- [CVE-2024-47614](CVE-2024/CVE-2024-476xx/CVE-2024-47614.json) (`2024-10-03T15:15:14.720`) +- [CVE-2024-47617](CVE-2024/CVE-2024-476xx/CVE-2024-47617.json) (`2024-10-03T15:15:14.937`) +- [CVE-2024-47618](CVE-2024/CVE-2024-476xx/CVE-2024-47618.json) (`2024-10-03T15:15:15.147`) +- [CVE-2024-5803](CVE-2024/CVE-2024-58xx/CVE-2024-5803.json) (`2024-10-03T15:15:15.310`) +- [CVE-2024-9100](CVE-2024/CVE-2024-91xx/CVE-2024-9100.json) (`2024-10-03T15:15:15.553`) +- [CVE-2024-9460](CVE-2024/CVE-2024-94xx/CVE-2024-9460.json) (`2024-10-03T15:15:15.750`) ### CVEs modified in the last Commit -Recently modified CVEs: `12` +Recently modified CVEs: `31` -- [CVE-2021-47220](CVE-2021/CVE-2021-472xx/CVE-2021-47220.json) (`2024-10-03T13:15:13.883`) -- [CVE-2023-50378](CVE-2023/CVE-2023-503xx/CVE-2023-50378.json) (`2024-10-03T13:15:14.113`) -- [CVE-2024-20433](CVE-2024/CVE-2024-204xx/CVE-2024-20433.json) (`2024-10-03T13:34:37.547`) -- [CVE-2024-24795](CVE-2024/CVE-2024-247xx/CVE-2024-24795.json) (`2024-10-03T13:15:14.233`) -- [CVE-2024-27315](CVE-2024/CVE-2024-273xx/CVE-2024-27315.json) (`2024-10-03T13:15:14.710`) -- [CVE-2024-31868](CVE-2024/CVE-2024-318xx/CVE-2024-31868.json) (`2024-10-03T13:15:14.833`) -- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-10-03T13:15:14.953`) -- [CVE-2024-41651](CVE-2024/CVE-2024-416xx/CVE-2024-41651.json) (`2024-10-03T13:45:15.070`) -- [CVE-2024-7575](CVE-2024/CVE-2024-75xx/CVE-2024-7575.json) (`2024-10-03T13:52:23.060`) -- [CVE-2024-7576](CVE-2024/CVE-2024-75xx/CVE-2024-7576.json) (`2024-10-03T13:51:45.997`) -- [CVE-2024-8692](CVE-2024/CVE-2024-86xx/CVE-2024-8692.json) (`2024-10-03T13:17:07.547`) -- [CVE-2024-9313](CVE-2024/CVE-2024-93xx/CVE-2024-9313.json) (`2024-10-03T11:15:13.940`) +- [CVE-2022-4920](CVE-2022/CVE-2022-49xx/CVE-2022-4920.json) (`2024-10-03T14:35:03.307`) +- [CVE-2022-4921](CVE-2022/CVE-2022-49xx/CVE-2022-4921.json) (`2024-10-03T14:35:04.143`) +- [CVE-2023-23774](CVE-2023/CVE-2023-237xx/CVE-2023-23774.json) (`2024-10-03T14:15:04.650`) +- [CVE-2023-32559](CVE-2023/CVE-2023-325xx/CVE-2023-32559.json) (`2024-10-03T14:35:05.690`) +- [CVE-2023-36542](CVE-2023/CVE-2023-365xx/CVE-2023-36542.json) (`2024-10-03T14:35:06.660`) +- [CVE-2023-37427](CVE-2023/CVE-2023-374xx/CVE-2023-37427.json) (`2024-10-03T15:35:05.163`) +- [CVE-2023-38666](CVE-2023/CVE-2023-386xx/CVE-2023-38666.json) (`2024-10-03T14:35:07.243`) +- [CVE-2024-20304](CVE-2024/CVE-2024-203xx/CVE-2024-20304.json) (`2024-10-03T14:20:07.680`) +- [CVE-2024-20508](CVE-2024/CVE-2024-205xx/CVE-2024-20508.json) (`2024-10-03T14:43:23.810`) +- [CVE-2024-20510](CVE-2024/CVE-2024-205xx/CVE-2024-20510.json) (`2024-10-03T14:52:22.627`) +- [CVE-2024-37022](CVE-2024/CVE-2024-370xx/CVE-2024-37022.json) (`2024-10-03T15:55:56.250`) +- [CVE-2024-41121](CVE-2024/CVE-2024-411xx/CVE-2024-41121.json) (`2024-10-03T15:57:31.917`) +- [CVE-2024-42495](CVE-2024/CVE-2024-424xx/CVE-2024-42495.json) (`2024-10-03T14:09:24.283`) +- [CVE-2024-44970](CVE-2024/CVE-2024-449xx/CVE-2024-44970.json) (`2024-10-03T14:22:06.003`) +- [CVE-2024-44973](CVE-2024/CVE-2024-449xx/CVE-2024-44973.json) (`2024-10-03T14:23:09.147`) +- [CVE-2024-44975](CVE-2024/CVE-2024-449xx/CVE-2024-44975.json) (`2024-10-03T14:32:31.677`) +- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-10-03T14:07:15.123`) +- [CVE-2024-45806](CVE-2024/CVE-2024-458xx/CVE-2024-45806.json) (`2024-10-03T15:36:55.557`) +- [CVE-2024-46861](CVE-2024/CVE-2024-468xx/CVE-2024-46861.json) (`2024-10-03T15:36:06.543`) +- [CVE-2024-46862](CVE-2024/CVE-2024-468xx/CVE-2024-46862.json) (`2024-10-03T15:34:46.227`) +- [CVE-2024-46863](CVE-2024/CVE-2024-468xx/CVE-2024-46863.json) (`2024-10-03T15:32:54.497`) +- [CVE-2024-46864](CVE-2024/CVE-2024-468xx/CVE-2024-46864.json) (`2024-10-03T15:29:34.927`) +- [CVE-2024-47083](CVE-2024/CVE-2024-470xx/CVE-2024-47083.json) (`2024-10-03T15:11:29.913`) +- [CVE-2024-8404](CVE-2024/CVE-2024-84xx/CVE-2024-8404.json) (`2024-10-03T15:19:28.293`) +- [CVE-2024-9177](CVE-2024/CVE-2024-91xx/CVE-2024-9177.json) (`2024-10-03T14:32:46.150`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2956ef8d9ad..0de8431917e 100644 --- a/_state.csv +++ b/_state.csv @@ -184268,7 +184268,7 @@ CVE-2021-43215,0,0,423c7c8173a4d776b804c1cd3af5a77ea172fa5655254209654b72cd8996c CVE-2021-43216,0,0,a42b014a5f0f2b14790fa8a0d81ea09a0f0dc1841c64c3a43fc5ad54c8e94b48,2023-12-28T00:15:10.203000 CVE-2021-43217,0,0,0064dd2e9a7a46bc5925fdace86faa1dd8a3f20d29fbb76e11febd484d1236a7,2022-07-12T17:42:04.277000 CVE-2021-43219,0,0,10ffc3b9deff20d2e728908e283ff4329da813a79b877d2e67c61e8dc93a81bd,2022-07-12T17:42:04.277000 -CVE-2021-4322,0,0,eb453610504158252df1060312fe99a9f0f8143694e86a196bff251b769745ba,2023-08-12T06:15:12.483000 +CVE-2021-4322,0,1,2436a340da997cc7c8a478b19f261c05f982983e8999149f0cfd14047bac5ed9,2024-10-03T14:35:00.750000 CVE-2021-43220,0,0,30d870d298a957df17e449d3b5b547b00b27956ad3347dd8529e5d2fc6486f52,2023-12-28T16:16:01.253000 CVE-2021-43221,0,0,4af4319e5e1945e70568caf7bbea7dcc655c0c610ed5848c58988e5223f2a277,2023-12-28T16:16:01.433000 CVE-2021-43222,0,0,0dfb91c74001e781eaae6ab0626f93586a5f52e2ea625c3e1f06f8f12da784ba,2023-12-28T00:15:10.343000 @@ -187093,7 +187093,7 @@ CVE-2021-47216,0,0,10dc3885d7ef5e71efae3373bef0ea2f284f16713172c07b2e1b33101ffff CVE-2021-47217,0,0,f9117c57c5e1950e2d8542c8254f26cf579d6b03be469d87a167a35a80e0fddd,2024-04-10T19:49:51.183000 CVE-2021-47218,0,0,22075cbb65309b9d698e1a98909423bf898efee62e8dc49312c690d61b734160,2024-04-10T19:49:51.183000 CVE-2021-47219,0,0,19da26c857306867074db0db7c68658d1da8f13810e8ea48aed77d09a9210b4a,2024-04-10T19:49:51.183000 -CVE-2021-47220,0,1,b59dacf12e21084b1235974d757057529b1782cbc8a6db9597ef9c8d75b3ab4d,2024-10-03T13:15:13.883000 +CVE-2021-47220,0,1,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd809,2024-10-03T15:15:13.703000 CVE-2021-47221,0,0,be4fba76a1b024c941c507f7c354bd8197d5a0317f4df6b315ba3d46d2ffbdb5,2024-05-21T16:54:26.047000 CVE-2021-47222,0,0,3f9a21db77caf7d70e1c4613a3e366cdfeb41cdf8308383b2302e318a16fa064,2024-05-21T16:54:26.047000 CVE-2021-47223,0,0,153ed24456f2781c6911d2f948472f17dfbb988764986042d16c2ec594c0d813,2024-05-21T16:54:26.047000 @@ -194971,7 +194971,7 @@ CVE-2022-26129,0,0,be0cc07a4702becddd3794850dbc57a0064de81f4cb4bfe11e1098fab3d87 CVE-2022-2613,0,0,22acf2e1d861d3ef93c1d5014cc835ecadfb25143cb124ffe48125192e8a94e2,2023-11-07T03:46:44.133000 CVE-2022-26130,0,0,f5d00a8d594c3c9a5a76c59a5eae2a9b0265e622b079a3869dfb48c26aa3cd51,2022-05-16T12:34:17.893000 CVE-2022-26131,0,0,ae0b4fb43b33e1484c241aac17637114600c06f8bca32f6fe29efec493803887,2022-03-23T18:37:02.983000 -CVE-2022-26133,0,0,6cde0662d3860e2c9733a7b86d1915191afe2f22433dd4868912b582a62f9bf1,2022-04-28T17:50:56.293000 +CVE-2022-26133,0,1,ffa6882abf1006ca33138be1d3118308796159752fdef8b4640dacb3c5e895ed,2024-10-03T15:35:00.870000 CVE-2022-26134,0,0,d3c92ffe05d5b347d66ad1f6e09fe61e264909d50ad2ff29e6820d2348a3d6ff,2024-06-28T14:22:46.883000 CVE-2022-26135,0,0,5feabacd409141da2b175a7ed015fa6e909537b4a385f3739c4898dc95a861a2,2022-08-04T15:31:35.393000 CVE-2022-26136,0,0,2da3a36c88b9da1331e486d537b599ce4ab13268e4abccb33471b23eb425c59e,2022-08-04T15:50:26.633000 @@ -211597,8 +211597,8 @@ CVE-2022-4767,0,0,acbea5a742784208ebb8a6a3bc0810795b9f718a220753a882f954c6e636d8 CVE-2022-47673,0,0,4b147d8483f79551fea368d9ddc66ade955e52def1825197c53610e7357caacc,2023-08-26T02:14:53.490000 CVE-2022-4768,0,0,e4a08e6c1d1cc0a00429acd1e41edfb91b0a356ee9648dc3d9122698cda86553,2024-05-17T02:16:55.980000 CVE-2022-4769,0,0,3fe1e289528248f09e241e61a77146151f305cb918c67a0fe4e35eb95ed2d89f,2023-11-07T03:58:52.050000 -CVE-2022-47695,0,0,455d6603dc0b4a327719720b593191557b6fd1c3a13fc38fffc12b8396c104a4,2023-08-26T02:14:58.653000 -CVE-2022-47696,0,0,e634285d9de4fbf6f543bd0c1f811f38d113787956231c84fb8ec9c72a5227b9,2023-08-26T02:15:04.807000 +CVE-2022-47695,0,1,976a6ff10f6aa0f57482cbef9add6e11f1c24b7b35e1d20665c573f8d01c7d5c,2024-10-03T15:35:03.300000 +CVE-2022-47696,0,1,b7d2cd42f9d93929647ee660fc00eac649761a5813386d80718f394021c19df2,2024-10-03T15:35:04.010000 CVE-2022-47697,0,0,52f9ee58e24d353bc4acca5eeb0e7b89da974313419dbc8b8836f4d990a32d3f,2023-08-08T14:22:24.967000 CVE-2022-47698,0,0,c328ca29b2158332a1a2b337fb82e99210829ec4388992fb0d0963da86d10adf,2023-02-08T02:20:11.983000 CVE-2022-47699,0,0,6658491100730ebe281498067c5f3338781afd2748039dd83915dafe4c12bcb3,2023-02-08T15:15:13.307000 @@ -212544,9 +212544,9 @@ CVE-2022-4915,0,0,7dce1966502761df69c2dafe86f736ea78df21a82c78242f2c6e6554747bb5 CVE-2022-4916,0,0,11156a0320210ecb533d09665dc4e516646ac7c485716843642ff2a3c6876232,2024-10-02T21:35:09.133000 CVE-2022-4917,0,0,ffd6d161731b5943a4a2cecc0118210e94d8d50890cee00b3e5b54ec63650038,2023-08-19T03:15:19.503000 CVE-2022-4918,0,0,be511b580f573f30861de1822e03bbf3b4f7c7355836b2656f724c73cdba85dc,2024-10-02T21:35:10.087000 -CVE-2022-4919,0,0,467c4cee97fb392b0533c41141ef140ea8f1a554fc7e01d1c68283f566fd25ee,2023-08-19T03:15:20.507000 -CVE-2022-4920,0,0,658843bd4d8645a477b474d673e5b5939fc0724d1065229fb6ba5e8569c8e409,2023-08-19T03:15:21.130000 -CVE-2022-4921,0,0,b49dd8c0d3070cbcf21fdb734c76ab5dc429e89d8dcb725a103e66ff63487445,2023-08-12T06:16:06.143000 +CVE-2022-4919,0,1,0783d84e35c78a79cc39217e58f1f715e26f0dfc0e3c767292c16cfa09c212ab,2024-10-03T14:35:02.513000 +CVE-2022-4920,0,1,3085c252af017c84c8a4a69bcaef3bc97e10878c4297ecbdebc3a38c5d722641,2024-10-03T14:35:03.307000 +CVE-2022-4921,0,1,db75cb26861423334e5899a02fd94e96152740e90b4a05930cf0eaf21860de20,2024-10-03T14:35:04.143000 CVE-2022-4922,0,0,7a2b4634322e96d3c241ed34ac0e68d8e19629d7fd1671456894ec8685668421,2023-08-12T06:16:06.627000 CVE-2022-4923,0,0,761793b67ab54f7909a05bde1bca07eba07ede3d9cf67f8e3148ffe9b421bec4,2023-08-12T06:16:07.170000 CVE-2022-4924,0,0,cdce64e4b7502dd49525556dca8b809e232a384142d6d02d56c2287cddab7d9b,2023-08-12T06:16:27.147000 @@ -217667,7 +217667,7 @@ CVE-2023-23770,0,0,a902c1d9df84cfcec2e11ce438264024449328100715435de2958785b5623 CVE-2023-23771,0,0,607635ee820723edbaab446cc9b87bbb217752aeafc02eb5c5331bbb34246d50,2023-11-07T04:07:55.847000 CVE-2023-23772,0,0,b487df13c4b778931022a7d300baf45678f32d409ba82f89a81e14902d08b9b7,2023-11-07T04:07:56.007000 CVE-2023-23773,0,0,01fa3379aec85ae04cf8a64af8014f9d19a184d27ce361e2400a0cf37d789f4d,2023-11-07T04:07:56.260000 -CVE-2023-23774,0,0,28b560e5ad169a1b8c4c3536d08200feeabf0a7bf1795a35faa6cf4d2349cf9d,2023-11-07T04:07:56.483000 +CVE-2023-23774,0,1,2e1d257372a3d96fff09c175e8dd40314bcbf895bfb2bc39e87334c5259c36cb,2024-10-03T14:15:04.650000 CVE-2023-23775,0,0,100cd54cb9bd33e56092aa83c10e5d745e3a11c915213a7bf9f605592a4df0fb,2024-06-13T18:36:45.417000 CVE-2023-23776,0,0,e4d868e25628a0571e2d4adcd420753823972e9cb6bf507b34ee15a5838fb421,2023-11-07T04:07:56.713000 CVE-2023-23777,0,0,f9219db9ce9cf807369ca7f6c630ff2b1a0f1f8cb918124a9c63d7637b4197eb,2023-11-07T04:07:56.950000 @@ -224605,7 +224605,7 @@ CVE-2023-32555,0,0,c728acf72b7a1d4f7c831a58bcf66f934b1ce492ab6e5c18291e2e693aed0 CVE-2023-32556,0,0,6dec37f849d3e1e1c0b3205050297f254cec1796a2790537c31d6af6a3f11566,2023-06-30T18:00:20.683000 CVE-2023-32557,0,0,b2b8452476edba0c917a1416c0ce59b5740f5a7b6e6977aaf68e606ed6a9199c,2023-06-30T18:00:02.733000 CVE-2023-32558,0,0,1ecbf1be3da70340a43b87e72380d18d7b95285ef71ee4173e2c812171e8b91f,2023-12-04T14:57:36.603000 -CVE-2023-32559,0,0,e0dbb9f7d41574b140e86d1287d44d244aec4bba59d49e3309387905e91ce029,2023-10-24T17:48:55.097000 +CVE-2023-32559,0,1,2321bc288e22033e60c6bdd9b50d1d93922e76e0312022e0af5829c890c4c5ba,2024-10-03T14:35:05.690000 CVE-2023-3256,0,0,43b7430ab15bdc1a7b1f21a50d45b63e77b226e577e7a4f2701e15ab008d375e,2023-06-28T07:23:02.007000 CVE-2023-32560,0,0,aa8d2244c733a6594e92d842f5d7ccd25e05a73baa5d958de92bc8fb36fa645b,2023-09-18T16:15:45.240000 CVE-2023-32561,0,0,8b9cf91de88fec9f841b56e973e1e6c654d3c335789143c3d1df9c5aaae2e35c,2023-08-16T13:04:53.757000 @@ -227462,7 +227462,7 @@ CVE-2023-36539,0,0,4e965c290bb96df6ee863b2be075f02bab55edcaa147fa532567387b1a47d CVE-2023-3654,0,0,6c06260a9bd1d9a2cdc503513447bb73861a43e7934488e4e3446dc4edd9202f,2023-12-28T15:20:38.820000 CVE-2023-36540,0,0,861829e58d088a63800ef680947cf6bf4ffcc9ac0a2838a1ec4824b32dbb6ba3,2023-08-11T14:22:03.803000 CVE-2023-36541,0,0,e55bb5471251c6a0e5cef8bf84e95d30a7b47790bdd7d06319560aaf7fc21fae,2023-08-11T14:09:26.950000 -CVE-2023-36542,0,0,421ae7ff12dca9fe7de595678563fb38d23734e9b3a391184476825be3643e57,2023-08-03T19:09:29.110000 +CVE-2023-36542,0,1,0b6bb065c7943f8b82ff0e2fe36ce2ba66218052ff25e2983664f2e6675cf099,2024-10-03T14:35:06.660000 CVE-2023-36543,0,0,0734dfc9725f8e975a674e13e7927ffdc50a3a2bdec17d608f1fa0549d430099,2023-07-31T17:47:45.703000 CVE-2023-36546,0,0,31857bbd5881d784c730c802a34523a15f5d596592bbe6be1dbb93820394698a,2023-12-31T03:15:45.950000 CVE-2023-36547,0,0,ef06f9fe91c67a48e451bd0da3296a561286392390cb30a64a37736c04e30330,2023-11-07T04:16:36.957000 @@ -228159,7 +228159,7 @@ CVE-2023-37423,0,0,657cc27f26321a426ae194eaed563e39a46183020769ee4b5a28974fac3ea CVE-2023-37424,0,0,7a500a3d341d1376218e7a14cad25739e299cd8bd1d318ce550cca9c2275e8ff,2023-08-29T19:55:51.197000 CVE-2023-37425,0,0,a6d48c9390d08ef562719b4824431b2d166f276060e98dbb0f0febcdcb3a8875,2023-08-29T20:18:00.600000 CVE-2023-37426,0,0,aba2e1383adbc7e95ad8d3563a5f28d8cc63cbec507f1f20067cb7d4f32987ec,2023-08-30T14:21:34.413000 -CVE-2023-37427,0,0,8bf88b04ec527e222ce17d2f0127139444db14987eee8095bf2f43d271762ad4,2023-08-29T20:32:01.987000 +CVE-2023-37427,0,1,44911667ac39632b70396c7d0f395ecf6ba92e38173c7afb6525f77225306738,2024-10-03T15:35:05.163000 CVE-2023-37428,0,0,8555065951b9357c20c97b8665aec685d0ba90aace56586f39fe1eb715a1c820,2023-08-29T20:36:16.033000 CVE-2023-37429,0,0,7fb0ae4092d88671d0eb870f1ee8e7f643cc6870e943f9ac1b71439e9cabf223,2023-08-29T20:23:33.733000 CVE-2023-3743,0,0,7ada63b351a8060672c4de5fb6337b8ae380a47f34900e3c385fa12ec87e6d03,2023-07-27T03:44:01.503000 @@ -229222,7 +229222,7 @@ CVE-2023-38654,0,0,d5da7efee59b143650e5a1a9bfb66e30bd1968b898fbc3f468bbdc7508ffd CVE-2023-38655,0,0,b98c2b1f64a901cfc691edb6115e39af3112522909409c6f7fea71885902e171,2024-08-14T17:49:14.177000 CVE-2023-38657,0,0,a2a4c0ec9cb2b71e3fd8704689117b4215a0faeef705fa5ac4c2a06139df7981,2024-04-09T21:15:14.507000 CVE-2023-38665,0,0,7a043e25fd13aea06df0bacb1ee9f1aba5010928024a974612a1f20bbc87f224,2023-08-26T02:24:51.260000 -CVE-2023-38666,0,0,be7a0a0d7c0dd2ad8a44d351e6c1253bbf469d8bcb2c3a364ea07ec4999ae30b,2023-08-28T19:46:35.200000 +CVE-2023-38666,0,1,eb18370526bb42b4fe0aea67f1269d63f1da7afd6115718f2ec8812155587d28,2024-10-03T14:35:07.243000 CVE-2023-38667,0,0,9516b35ea14322d7fdf9de768b4eb1c0d42996b2dba82068790de63c34a3f991,2023-08-28T19:40:03.987000 CVE-2023-38668,0,0,dcdba94dd0f50886384a8b9051caa3dd7adb54ad20852c06c30a085b6a3b0287,2023-08-28T19:38:54.383000 CVE-2023-38669,0,0,46c6993324eb92338d2416b156cb82df12e12ce5c3a9d4f4ed2901d1dae9d7a8,2023-07-31T18:11:19.087000 @@ -237609,7 +237609,7 @@ CVE-2023-50372,0,0,77d3eda04dcf3ead805f8aaad9b4a65f74ec7b5fa0de5275318bbe6f450e4 CVE-2023-50374,0,0,741e5ecdf2a4f3a8c114688967a787301af8a5744f3810a7580d881e06e3140d,2024-03-28T12:42:56.150000 CVE-2023-50376,0,0,9f4800a713b03acd5dbaaf25515ed7bb15dd6d82eb94edee0da96b4393e83a40,2023-12-22T10:13:15.320000 CVE-2023-50377,0,0,2abdc9355cf0ae124f8a68fc7aa0148bddd355a65140572d92462a10718614ed,2023-12-27T21:34:56.883000 -CVE-2023-50378,0,1,5564fb5e6c180d20fe546f0606ee0df0a4fdd54300b3aeda7a7bff0b23cd8e20,2024-10-03T13:15:14.113000 +CVE-2023-50378,0,0,5564fb5e6c180d20fe546f0606ee0df0a4fdd54300b3aeda7a7bff0b23cd8e20,2024-10-03T13:15:14.113000 CVE-2023-50379,0,0,cdb0ea51be74f72f18a15893bfd649ddedd140ff8b8cba4f5926ec40db2ffa73,2024-08-13T20:35:01.483000 CVE-2023-5038,0,0,9789d7fc270f8e24fcc77f799772d0318c958da77096b1da9df8aa6a81266b91,2024-07-02T18:09:41.080000 CVE-2023-50380,0,0,52c01bcef20d58c11962cce47a3b1b2a4b157ab99e7cafdac7eb04f9cba32099,2024-02-28T14:06:45.783000 @@ -243217,7 +243217,7 @@ CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bb CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000 CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000 CVE-2024-20303,0,0,393665d251452d2f76b8a508b1c314e9e2878d06110c2d34091d44dcf2cc0a6d,2024-03-27T17:48:21.140000 -CVE-2024-20304,0,0,3812936275e0a166362c6d7eaaeefb6bce56f66dc1bd8b9bf9cb5cda78792939,2024-09-12T12:35:54.013000 +CVE-2024-20304,0,1,e34ac641b8092064fa1f126fa5ab59523cef65e740de9c7a6cfc5de4e10cb92f,2024-10-03T14:20:07.680000 CVE-2024-20305,0,0,e4850a7e4dfd71e4153c0c643b6c021aca041e6b1000ad76e287dea34422e456,2024-02-15T19:56:38.910000 CVE-2024-20306,0,0,a55540a2cb6844d768b14dffbabe4bb78cc3a5c4d9558b64001a5a52e8d62bc6,2024-03-27T17:48:21.140000 CVE-2024-20307,0,0,c9b1980d050b3fffe9b920134a5cc15d4bc4342c9015ce0f25b18451c8603eb9,2024-03-28T02:01:21.693000 @@ -243315,7 +243315,7 @@ CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992a CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000 CVE-2024-20432,0,0,9afe8e56de2f474245e53b7438e12b65e4560d02a3f69fb1fa2454f77ac4ba13,2024-10-02T17:15:15.550000 -CVE-2024-20433,0,1,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bce20,2024-10-03T13:34:37.547000 +CVE-2024-20433,0,0,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bce20,2024-10-03T13:34:37.547000 CVE-2024-20434,0,0,880e05acefa3209e23abe1c6ab99bf4f9ab4fd2e1403678e2af13f0c181f3b38,2024-09-26T13:32:02.803000 CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 CVE-2024-20436,0,0,41bc6e4345819d91a4b8a7e2df98b24823b53ecbe6191936af5242501e9ac76c,2024-09-26T13:32:02.803000 @@ -243369,10 +243369,10 @@ CVE-2024-20502,0,0,d74f0b09c5dee90f57b924ab4201829613a75c79e268f8c28a0b20a1368ef CVE-2024-20503,0,0,e85721e4e1cede24d93f2a47467ca55ab63c155dde7e0c41a923091bcc7e874a,2024-09-13T19:24:37.420000 CVE-2024-20505,0,0,3cc28c634084a10df250df318d1f65f6c920a21d5650beb89eb991b35e09151f,2024-09-12T17:28:47.010000 CVE-2024-20506,0,0,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3413,2024-09-12T17:26:37.643000 -CVE-2024-20508,0,0,a4fe0896946d7cf41903535dbf2f0ff3799c2bdde7a0579e98abf95ba0605e78,2024-09-26T13:32:02.803000 +CVE-2024-20508,0,1,0768ac64a8260ad45d8462ad7e41dbfa97c47e8f324d81868ad4103c1f94fdd9,2024-10-03T14:43:23.810000 CVE-2024-20509,0,0,73d5d98bf1f2b5bbc7fe8e16d7899127aeb3768c96ded8809b59effda16efc6c,2024-10-02T19:15:14.997000 CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 -CVE-2024-20510,0,0,77e73cd6363cb5f1f2bcc9093ebb94dae24f275478be794b11c101171344660f,2024-09-26T13:32:02.803000 +CVE-2024-20510,0,1,6fbdd0fde11e7a17f48951ee8a4206d5b5c8d1dcebb95035b098d9f8dc980dca,2024-10-03T14:52:22.627000 CVE-2024-20513,0,0,8d7160be237827756b31b5e1e02cb410eb974b0a6e1ab0ff5d50700db62e50a2,2024-10-02T19:15:15.210000 CVE-2024-20515,0,0,0d1ea5fc0395aeba8d912b33829b73c6e969e0e6b8085212bd58f0a2b6be4bc3,2024-10-02T17:15:17.973000 CVE-2024-20516,0,0,07c81f6263ffabf8b1d2a73001a0fcf7e8a4965f15caa0bb6884fc278b2b4a16,2024-10-02T17:15:18.200000 @@ -246338,7 +246338,7 @@ CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73 CVE-2024-24792,0,0,fc8d65092f6cca5efb8fd01d1ad855c18addacabc045b62e3e589a869025923e,2024-08-01T13:47:30.627000 CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000 -CVE-2024-24795,0,1,9b9dd61f6278a2805f43add70bd5f500b812e3c07bf29007fae7bbb2713c297e,2024-10-03T13:15:14.233000 +CVE-2024-24795,0,0,9b9dd61f6278a2805f43add70bd5f500b812e3c07bf29007fae7bbb2713c297e,2024-10-03T13:15:14.233000 CVE-2024-24796,0,0,292fd4a31399bba86c5730ef4bd877b625e772494a5146bfd46b725d130f455b,2024-02-12T14:19:54.330000 CVE-2024-24797,0,0,40724d1d3e1a03ea7253bf27a8e4cea3180b132258b4b1bc361005ab1c0591b9,2024-02-12T14:19:54.330000 CVE-2024-24798,0,0,cd85ec8a42d6d377caab8567c4fbee58fe370929d305cf392fd538d90722fe41,2024-02-22T19:07:27.197000 @@ -248359,7 +248359,7 @@ CVE-2024-27311,0,0,3441ff0e665052a7fb86a3589fae526973b499df9f488dcbbb9db7b9aaef9 CVE-2024-27312,0,0,5679d7053fa0bd24d93903a7d36eae1bf666d1c510eebbb175d9510db4771ea1,2024-06-07T09:15:11.640000 CVE-2024-27313,0,0,f9f7791913eb1885e62d83245c35ccba6d007456c7c99efcf6385be05af20927,2024-06-07T09:15:11.917000 CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 -CVE-2024-27315,0,1,5ba82d5c4ef5dbb4fc46c5f81fcec5fa18de9367a2c6fed64ba7b45e4eb8a0a0,2024-10-03T13:15:14.710000 +CVE-2024-27315,0,0,5ba82d5c4ef5dbb4fc46c5f81fcec5fa18de9367a2c6fed64ba7b45e4eb8a0a0,2024-10-03T13:15:14.710000 CVE-2024-27316,0,0,102105139fcfc876580c7206fba57ae17631b403098c79f616e87bd492a5d28f,2024-08-01T13:48:22.100000 CVE-2024-27317,0,0,c4936bf6b1ea8eb440227e5af31c10ab09a9d8539bf9187002383935723d45e1,2024-05-01T18:15:16.097000 CVE-2024-27318,0,0,bb1e039cfeff54678be2a3d7675b064a42975817bdfb0398be1540195f1fd295,2024-03-30T02:15:08.007000 @@ -251529,7 +251529,7 @@ CVE-2024-31864,0,0,dd401fd2f9c38e157d115772d6fe233b1887a6b2c7d0eb5183b48c430298b CVE-2024-31865,0,0,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000 CVE-2024-31866,0,0,4d372d14b7807ced8e821f43a5c883c03fa5dbca9edfba0af795f01513fe30b5,2024-08-21T15:35:08.187000 CVE-2024-31867,0,0,7c90191082994197ce09c1b6019992176f2d76072856e8d65beb1a7b6ded7916,2024-05-01T18:15:23.740000 -CVE-2024-31868,0,1,703c16597751f17fba32c3b61a2e58921496411599e95e2472502f1bbb33ada3,2024-10-03T13:15:14.833000 +CVE-2024-31868,0,0,703c16597751f17fba32c3b61a2e58921496411599e95e2472502f1bbb33ada3,2024-10-03T13:15:14.833000 CVE-2024-31869,0,0,683e8c771fda682074fc448ea32be7db8fcec1e782121eb87243bff930796032,2024-05-01T18:15:23.843000 CVE-2024-31870,0,0,089cc53c4c4bda98698ee28fa3173d546c896f43008726ca3e29a627fc47e14b,2024-08-01T20:37:52.127000 CVE-2024-31871,0,0,7b402a738ae8306e1005160b5cd3c0ef58a4e7f0d19a95a39021f1b2af76b2f4,2024-04-10T19:49:51.183000 @@ -255187,7 +255187,7 @@ CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4d CVE-2024-37018,0,0,5c84c294f6633e4746e32fd18cb412c8579660145e88eac3a32eeb7275210f3b,2024-08-05T16:35:12.763000 CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000 CVE-2024-37021,0,0,df42b273589de5447bead7df7667049e2658c880af6df99f8ec35df9bab3713a,2024-06-24T19:26:47.037000 -CVE-2024-37022,0,0,751bf85c3a2469952ed35738f159026027aa22116052dd4c21287b6f73e28344,2024-06-13T18:35:19.777000 +CVE-2024-37022,0,1,c89ab136485bb25fceb1ebadf25398758307a2b39977d566fcb7ed1a8d501728,2024-10-03T15:55:56.250000 CVE-2024-37023,0,0,8524a0bea62903b02ec8e898aba28cae243223cb44baaac206a78705a8ec65f8,2024-08-20T17:12:03.330000 CVE-2024-37026,0,0,72a4b17689cbdac04fb86cce78128e997cb4a2e097881aab9fb79c35d7ec4f49,2024-06-24T19:26:47.037000 CVE-2024-37028,0,0,b7e9c99e1fd0ecec6eefdacd33a3c9c912ef383532f72bb887cdccaeaf455e4d,2024-08-20T19:26:49.730000 @@ -255373,7 +255373,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5 CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000 CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000 CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000 -CVE-2024-3727,0,1,48bca9045cad80f14911a8b8f5c5b80f4598f353999b02f0ba08ae113eb9a6d0,2024-10-03T13:15:14.953000 +CVE-2024-3727,0,0,48bca9045cad80f14911a8b8f5c5b80f4598f353999b02f0ba08ae113eb9a6d0,2024-10-03T13:15:14.953000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 @@ -257846,7 +257846,7 @@ CVE-2024-41118,0,0,e0eee055fbd470e0628dea6d9d48cfe33859b8a44e08917376e3579ed1fec CVE-2024-41119,0,0,2b2d1362b1256f26b7e3456598dbc750a32abaa8055aca23aed136bade558c26,2024-08-26T17:33:31.573000 CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000 CVE-2024-41120,0,0,a70d4faa55c7ddaaf93976569e1c96bdce498cb1f9f22f75468c1ec57f8b4cef,2024-08-26T17:33:33.787000 -CVE-2024-41121,0,0,eee6567dc6068e4098c4ab7d1e6ecee46fc76012014594fbc00d63fe0ec66f03,2024-07-22T13:00:53.287000 +CVE-2024-41121,0,1,bea21b08d051d8c42c463458d320e0eb696c2a382d886d5d5d09d5e1f0c107ea,2024-10-03T15:57:31.917000 CVE-2024-41122,0,0,db4a015145ff1fc63debc38645ec64fd0c8a278e5cdafdcde4b59bfb53ec7f9b,2024-10-03T01:23:07.177000 CVE-2024-41123,0,0,1b9d0ba5e0ca489b31c9b708600ddad032ff5087a77d385d50002a73b3acee12,2024-09-05T16:12:21.557000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 @@ -258059,7 +258059,7 @@ CVE-2024-41637,0,0,55c2ebf6d4e1b5a52e76380fb54fc17a20ca604f4f925dc181c059611f7f9 CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000 CVE-2024-41640,0,0,e47a891501f4a329b23b2dbd7c116fd0a7d1e20a1507ac69c43fc4a30ce697d7,2024-08-01T13:59:01.527000 CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d77,2024-06-04T19:20:31.500000 -CVE-2024-41651,0,1,a38f43b3a3520b7ed798424485f4504fecba42b85436a923398276750efda20d,2024-10-03T13:45:15.070000 +CVE-2024-41651,0,0,a38f43b3a3520b7ed798424485f4504fecba42b85436a923398276750efda20d,2024-10-03T13:45:15.070000 CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000 CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000 CVE-2024-41657,0,0,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000 @@ -258708,7 +258708,7 @@ CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac34 CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000 CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000 CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000 -CVE-2024-42495,0,0,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000 +CVE-2024-42495,0,1,8ebc1a00dc53eedfab68d1d85789107076a6bdc2caafa76b97c0acbaa101b555,2024-10-03T14:09:24.283000 CVE-2024-42496,0,0,82629bcd722b8cb6d341bed3916823c994361fb6b4946b9099c29ac012cbc5a4,2024-09-30T12:45:57.823000 CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 @@ -259878,12 +259878,12 @@ CVE-2024-44967,0,0,89dfada01527c8edfcdf75e8d03ff9e48cea3fb292c10119a2487efa60d42 CVE-2024-44968,0,0,125d9977c95cd27fad067d65cfceb4b033cca732bc912f36769ab80d593425a2,2024-09-05T12:53:21.110000 CVE-2024-44969,0,0,66b82aa80b6cd92846532cef33b442d38baf22d6911e941514910b3c6f435cd4,2024-09-05T12:53:21.110000 CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000 -CVE-2024-44970,0,0,70414797c7f1420a60b48e34277f5530ec1aa67aed6a07d8d2aaeded9223b4e0,2024-09-05T12:53:21.110000 +CVE-2024-44970,0,1,a0c972c9454393f34fe641aa01c10b896e146fef1478fb5744dd0af04f26f88c,2024-10-03T14:22:06.003000 CVE-2024-44971,0,0,44403d9889954211cee528d64ed0dc86351f6fa04277308e5630c2d58c6cab86,2024-09-05T17:54:36.607000 CVE-2024-44972,0,0,0b967112ef26e3fe5b0935b427f88208867173c88daf36aa5bd2c336c4f07e64,2024-09-05T12:53:21.110000 -CVE-2024-44973,0,0,add414a58e878f3aee3366f7678bfde348bdae69c48419c508ba030f370d1ae1,2024-09-05T12:53:21.110000 +CVE-2024-44973,0,1,6da77340a818d4254bbf05ca91b8c65562f8d826d87a4df556d42cceb3d012ba,2024-10-03T14:23:09.147000 CVE-2024-44974,0,0,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000 -CVE-2024-44975,0,0,012dcb6db335aa97afa1ef9268f931ab68a445b973fc3f10a7843af27070943c,2024-09-05T12:53:21.110000 +CVE-2024-44975,0,1,259cddaa128c9efb6ec303816aae245e7b8378b15a62da050b41a2aa6ef90c6f,2024-10-03T14:32:31.677000 CVE-2024-44976,0,0,8c7b930f69a8eac68da6855eedc8b3a97b1051cdf631749b93c2aaf1d2a28ef8,2024-09-05T12:53:21.110000 CVE-2024-44977,0,0,8267c668040f19c89ab2180e788476dee75d30c69bd18b77721b380cd5039fc4,2024-09-05T12:53:21.110000 CVE-2024-44978,0,0,86121d29302acc1da31190cefab002b1ff26f43dfa1aaefb7afb57e51681158d,2024-09-10T16:51:19.813000 @@ -260185,7 +260185,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000 CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000 -CVE-2024-45519,0,0,fa140d1675725778e9e785d428af96f9489ad2c8a138efe13b2b5fa63ae35161,2024-10-03T10:29:17.337000 +CVE-2024-45519,0,1,4cdc6ef5b3f28e4973fc8d20c8d8dfc3492fbd1690c441363b08deedcdc04029,2024-10-03T14:07:15.123000 CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000 CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000 CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000 @@ -260284,7 +260284,7 @@ CVE-2024-45800,0,0,e84cff012b7d4b74db66a83e7b935dc1edfec9ef774b30490760e7407aa53 CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd025,2024-09-20T12:31:20.110000 CVE-2024-45803,0,0,229c857bfa292cdb0ba4078b3fbf512c465922b11345a00889b8daf4243936d0,2024-09-20T12:30:51.220000 CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000 -CVE-2024-45806,0,0,de5a5f2070ab39db91e2e553d78007d5a1a5d7d06834efbe23ad7d761bf487e5,2024-09-25T19:02:57.757000 +CVE-2024-45806,0,1,1c3174f121e417f27357dc7dda16a1e2c4833f0b06507c11184f179d784c0a2b,2024-10-03T15:36:55.557000 CVE-2024-45807,0,0,109f977914214954b1d4c58b77a41ab231481644c3f0d5e0c1a61fe3a8137355,2024-09-25T17:12:38.380000 CVE-2024-45808,0,0,e0b8548e8c97a2dbe35aa53aed4f22546b5e8aaa33f6c0d1789ad77d012310d8,2024-09-25T17:18:38.823000 CVE-2024-45809,0,0,61a35443140d3227d7a81e1d73cdcea190bec5c7e8b6089514de0625aa5d92ef,2024-09-24T20:12:24.597000 @@ -260751,10 +260751,10 @@ CVE-2024-46858,0,0,49cb83621376018f4b52cc3254920fbddd535744ae8d27d488860900395f7 CVE-2024-46859,0,0,219881cf57e0abd9fdd1246bb95fa67acffa1997ce6f943edb640b7145167614,2024-09-30T12:45:57.823000 CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c891096,2024-06-20T20:15:19.483000 CVE-2024-46860,0,0,da16c5af34531df299c8ad7ccf3e24722b563106cc1b923e33d44e44e1ad84df,2024-10-02T14:04:38.863000 -CVE-2024-46861,0,0,c6ebac6253a83dc2f920da893d314648878d5859bee9d7cdfe7dfd4445c9abef,2024-09-30T12:45:57.823000 -CVE-2024-46862,0,0,8ed5b69c03f390ff3625d3e803e9cc39c3a1ad18d3dc6c15990d96abef3f3d32,2024-09-30T12:45:57.823000 -CVE-2024-46863,0,0,d79d5950a88e299aa0f19f6f5fd912414b163ffb8236ed8adb506b0f7f1da245,2024-09-30T12:45:57.823000 -CVE-2024-46864,0,0,7d2f080e7db77c9466322e29001d51d095accf0776afdc67a3f06d6f74dcfb0f,2024-09-30T12:45:57.823000 +CVE-2024-46861,0,1,9e8f7b0f13ff63b9a336836ea09f525fdd1febd70ac4a410d34fd40c40ac2639,2024-10-03T15:36:06.543000 +CVE-2024-46862,0,1,832f890fdcc85de47e1ed2bc52569e350171cbfc6fb1e5a250686e929744d8e2,2024-10-03T15:34:46.227000 +CVE-2024-46863,0,1,8134580c2780c4c1167f949de82c461dc6d85c03d663f93afdbb2baa28cc7309,2024-10-03T15:32:54.497000 +CVE-2024-46864,0,1,a7b0d6c50d6bbe73deb4d9fa832ec942fe84547f89542993a6debfa8de30cffc,2024-10-03T15:29:34.927000 CVE-2024-46865,0,0,70400171a0d2a2312b59685baa09016386611f4b8aeadb49b1f9b8d88baf7690,2024-10-01T15:57:28.990000 CVE-2024-46866,0,0,7cef57a183dfaf103a48ea5a6b9019d1b498c14fc94b38d115a386f51427cfd4,2024-10-01T17:09:30 CVE-2024-46867,0,0,8316d7997f273d3e067642701a8234592f3f2c26a3648af1f12dc5cbdd0c27be,2024-10-01T17:09:58.147000 @@ -260832,7 +260832,7 @@ CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa CVE-2024-47078,0,0,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000 CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000 CVE-2024-47082,0,0,1308a2a31af2cc56619224d4839a59b43bea81793244865a2d1ff9a5500281b8,2024-10-01T20:01:13.367000 -CVE-2024-47083,0,0,5b490c0fd8cdac8afed0a02d02ba8fbf5e1993a5d9b09690e4aa8f97b99a9224,2024-09-26T13:32:02.803000 +CVE-2024-47083,0,1,9f0f8f8e78b5ed1a065825a55f34b3ef3e9db7af7ca41f6fc7c1cda9271f0e45,2024-10-03T15:11:29.913000 CVE-2024-47085,0,0,52609fda0dd3268fb54a4c4835942301029b5f82b7a9256b81c2395928ebbe9b,2024-09-26T15:30:47.787000 CVE-2024-47086,0,0,170e19d2a5f94228d179fe1c43d4342418d894a17ee62d0745e0ba04130a0c3e,2024-09-26T15:29:47.233000 CVE-2024-47087,0,0,00c0418dcbaa10bdb3121773be01ff0430232cec071716dead5062981f005e75,2024-09-26T15:25:51.467000 @@ -260946,7 +260946,7 @@ CVE-2024-47534,0,0,671e6c0c25dde8e26f9c5f40d1c53b3b411fe0b9cd99c946b70166162df34 CVE-2024-47536,0,0,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 -CVE-2024-47554,1,1,a6a08e7ba4c3d06cd09f47147e9e1395bcd7f8c1114bee9a753963aed9ce8ba1,2024-10-03T12:15:02.613000 +CVE-2024-47554,0,0,a6a08e7ba4c3d06cd09f47147e9e1395bcd7f8c1114bee9a753963aed9ce8ba1,2024-10-03T12:15:02.613000 CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000 CVE-2024-47560,0,0,5caab4f334b489685c2797622a0e89a871740bd9a0b0ebcc5ba80ebc1f75f752,2024-10-01T02:15:10.143000 CVE-2024-47561,0,0,f808d062f4ff2c7058b286154335a34d7670db94cf28de23d05dc84209df1a81,2024-10-03T11:15:13.510000 @@ -260960,7 +260960,10 @@ CVE-2024-47609,0,0,555d6b2b05ef097d6f46eab3f45f164bfb9fab39f1ce72e0c1426713e9aa4 CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000 CVE-2024-47611,0,0,b926e9df1217329843befb987d6ebbb03fb5af9de6c2becfc5849934dc4fb029,2024-10-02T16:35:34.060000 CVE-2024-47612,0,0,1981a610491546210a30a6a2dd9f593698e6ec4275e7e7b83130f7f983dd1587,2024-10-02T15:15:15.133000 +CVE-2024-47614,1,1,5adcca0930f8074bc2d09270af94a2090c38bdf85966129177b2aad805b79757,2024-10-03T15:15:14.720000 CVE-2024-47616,0,0,a7d3f503a853c11898853a62534bb4f89f4a718fdcf53427abfb02951598aa75,2024-10-02T22:15:03.010000 +CVE-2024-47617,1,1,5e38829b22784c5c123a9364978681089e70a59d7e2f900ec4a5f2ff0e0d1f18,2024-10-03T15:15:14.937000 +CVE-2024-47618,1,1,a43adc5787285f733831a204181d4bb30a8299d5e1d5e8c35eb826dba7f3f276,2024-10-03T15:15:15.147000 CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 CVE-2024-47641,0,0,d8a923752c07b02ea5386415a7b0ad8cc8f9093d938474666f31f411f6951ce8,2024-09-30T13:15:02.570000 @@ -261880,6 +261883,7 @@ CVE-2024-5799,0,0,7dd7f7ea5b6fee89dd0eb91dacd880561304ae591d99359107b4e3e905c13d CVE-2024-5800,0,0,a1cb578d92a5ce21abf5c6c3a9df30d0f15dec959b83eaaecf5cab603de30571,2024-08-12T13:41:36.517000 CVE-2024-5801,0,0,668584c28d68f34806b15aa23a003fb18ba18cb7fb2d24326345f03f0e3dd0a3,2024-08-12T13:41:36.517000 CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000 +CVE-2024-5803,1,1,f9a58c1ae7f8f547401f8d3f312040c3a2c345231f4deeb852da86c798cfc58c,2024-10-03T15:15:15.310000 CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889be,2024-07-22T13:00:53.287000 CVE-2024-5805,0,0,c6bd0a254f95da4bac1aa9af34b5a1c8bce84a0c9ec724d2acad9f30a83ad74c,2024-08-20T13:37:58.923000 CVE-2024-5806,0,0,91588fb1cdb8115c3da665d3d031e599ad42ef712f85a57d764591dd0370421d,2024-06-26T00:15:11.293000 @@ -263308,8 +263312,8 @@ CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f1 CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000 CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 -CVE-2024-7575,0,1,e8306ce8528f787b0f27b2039d1a16892d7951cab83d446a20e0ed4cab1e1e05,2024-10-03T13:52:23.060000 -CVE-2024-7576,0,1,ad2ce82276f1a964283944ed6b944663079e7c079e234b4885459f999bb6f2b6,2024-10-03T13:51:45.997000 +CVE-2024-7575,0,0,e8306ce8528f787b0f27b2039d1a16892d7951cab83d446a20e0ed4cab1e1e05,2024-10-03T13:52:23.060000 +CVE-2024-7576,0,0,ad2ce82276f1a964283944ed6b944663079e7c079e234b4885459f999bb6f2b6,2024-10-03T13:51:45.997000 CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000 CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000 CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000 @@ -263905,7 +263909,7 @@ CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e00 CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000 CVE-2024-8395,0,0,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000 CVE-2024-8399,0,0,ff5a0b61b9891ed649233268ce0fa37bd0b7c79ba8aa2863ea2ecc61c35c709c,2024-09-12T19:45:07.347000 -CVE-2024-8404,0,0,1a8f7c90ae4839e29c3ee7baac93c7ffbd2488d21ade054856933c21be4bdeda,2024-09-26T13:32:02.803000 +CVE-2024-8404,0,1,945e9eec22e9214ed455520b695d919afbd1adaf6153f6675337e3115aa9e84c,2024-10-03T15:19:28.293000 CVE-2024-8405,0,0,b5a88bc76e184307ddd2beb081f39e50ae83f9779c678cc8991166da3c096aa9,2024-10-03T00:51:18.313000 CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000 CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000 @@ -264079,7 +264083,7 @@ CVE-2024-8688,0,0,029257a651f738e9f27877382144b226fa4512857c7fc61efd2c2ae6b87c68 CVE-2024-8689,0,0,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000 CVE-2024-8690,0,0,67e41d4fc2072d70d0779ce07b487cc96378ea1bcbe929aa92f47f625147a8df,2024-10-03T01:29:08.547000 CVE-2024-8691,0,0,f96faf45862018fb84a309de389ab9aa82dfec00eb8b1dbabab5ce1078a13abe,2024-09-12T12:35:54.013000 -CVE-2024-8692,0,1,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000 +CVE-2024-8692,0,0,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000 CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000 CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000 CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000 @@ -264270,6 +264274,7 @@ CVE-2024-9091,0,0,3bfc998290a11bc8fab6cf9f3d600eed6ee69250246e343c9bb59fcaa6e75f CVE-2024-9092,0,0,1c2c646de9ea2ba79bd5c01f3c6adbd97c309ff9880a784404443eb5dc670a7e,2024-09-27T16:23:56.710000 CVE-2024-9093,0,0,9c381a723dcd5a5c3a6becb1e39558bfddcf6d2d39bab32327672c3bb7182479,2024-09-27T16:26:27.163000 CVE-2024-9094,0,0,0e308d006c94a8d09d0a4caea6001ec02d11744a78c5f3fdfc5f94ed1a0ea22c,2024-09-27T15:54:09.463000 +CVE-2024-9100,1,1,fbe247947d5abdf28dd1c0db917e0aead6ce1b77d0e6c741cc499f25429f5341,2024-10-03T15:15:15.553000 CVE-2024-9106,0,0,b4be78e84ae8affb4a6d454a9d1990e653bbd687f661444a18343032f03a5c6f,2024-10-01T08:15:05.267000 CVE-2024-9108,0,0,b104d3449df77c856d6774bc902449a0006458d06f65471d2757d674caf86c47,2024-10-01T08:15:05.480000 CVE-2024-9115,0,0,1c4e70138ee9590ca65c2e328b29e5a87d064a3f49c7286913d14c3952d00fc4,2024-10-01T13:47:25.403000 @@ -264297,7 +264302,7 @@ CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2a CVE-2024-9172,0,0,199bb1885edbaf3e5cf8cf5bf50588b7a1520bf934b902a33238e0075b79a13b,2024-10-02T08:15:02.960000 CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb506,2024-10-01T14:12:41.293000 CVE-2024-9174,0,0,b84c9c7a9f9cd2234390c1ae1f1de568c65321ae63b8ba2386d7dc05a067988e,2024-10-02T06:15:10.387000 -CVE-2024-9177,0,0,538b136929b66f2da77b71c4f345460987a86315e3e44122bd269ab3a2a9e52e,2024-09-30T12:46:20.237000 +CVE-2024-9177,0,1,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68ef,2024-10-03T14:32:46.150000 CVE-2024-9189,0,0,6fc70667b6c052aedd9065fd849720c6949b418d7c844ad831e0ce3249ae6d1c,2024-09-30T12:45:57.823000 CVE-2024-9194,0,0,24e26748ef3bff41d7a06efd6c027f138154eafd040f89b986b59a112235298b,2024-10-01T15:35:17.550000 CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 @@ -264342,7 +264347,7 @@ CVE-2024-9299,0,0,0e06149ad72b9bceed8023fce5d46e4c2d87e230ca1e26b3a70118742de53d CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961c8,2024-10-01T13:34:58.760000 CVE-2024-9301,0,0,73ba33e42a5a66e63775d86ddfdf57e7a04bcd9ceda925406fc4894f153c084a,2024-09-30T12:45:57.823000 CVE-2024-9304,0,0,77296627b4e73471315e7e445cf2a4183f5c2120111f84509ea16b607bc5907e,2024-10-01T08:15:06.943000 -CVE-2024-9313,0,1,533b0d999ec7273986b8e84d0a0b2d019578bc94f6735184fe1b7224c917a32a,2024-10-03T11:15:13.940000 +CVE-2024-9313,0,0,533b0d999ec7273986b8e84d0a0b2d019578bc94f6735184fe1b7224c917a32a,2024-10-03T11:15:13.940000 CVE-2024-9315,0,0,dcae3590349756096f3149f913fcd278d961f7a38fe3ece525d39bf3aa5da14a,2024-10-01T13:33:59.480000 CVE-2024-9316,0,0,dc1cd9e0c0f14c1ac859a7efc8a45f5e2b48ab85717e9999593b73d7873483e5,2024-10-02T13:29:29.813000 CVE-2024-9317,0,0,f67b854cd75d25217a31bdd6074d6f9f6352c2218386ab264e509a61a09e8c0d,2024-10-01T13:32:39.140000 @@ -264386,3 +264391,4 @@ CVE-2024-9423,0,0,c94940e86c4d0857c214a72b7785993b36e482d8dc6d4d5d12ed70a35b4f0f CVE-2024-9429,0,0,db0d8ee6274f5889e645bc8f06bc2c127c429edd7f6e0ee6aa8f7a2649e83d4c,2024-10-02T13:15:12.617000 CVE-2024-9440,0,0,a014a1e56d1851c7e48b58fd953e33ac08c51de3cb3a714389caa1ff00e4d989,2024-10-02T19:15:15.880000 CVE-2024-9441,0,0,384255352f00f9a9db206fa87755d8414cb6b20054a48cca8134e02f7821516e,2024-10-02T19:15:16.100000 +CVE-2024-9460,1,1,c45527c9aa3bef2caa2988896eb5117783d1d1826b53f204f2918ba4014e6cae,2024-10-03T15:15:15.750000