Auto-Update: 2024-10-03T16:00:18.296829+00:00

This commit is contained in:
cad-safe-bot 2024-10-03 16:03:18 +00:00
parent ea13674c4b
commit 25844ac2e6
39 changed files with 3551 additions and 204 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4322",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-07-29T00:15:10.610",
"lastModified": "2023-08-12T06:15:12.483",
"lastModified": "2024-10-03T14:35:00.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,48 +2,15 @@
"id": "CVE-2021-47220",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:11.290",
"lastModified": "2024-10-03T13:15:13.883",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T15:15:13.703",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: core: fix kernel panic when do reboot\n\nWhen do system reboot, it calls dwc3_shutdown and the whole debugfs\nfor dwc3 has removed first, when the gadget tries to do deinit, and\nremove debugfs for its endpoints, it meets NULL pointer dereference\nissue when call debugfs_lookup. Fix it by removing the whole dwc3\ndebugfs later than dwc3_drd_exit.\n\n[ 2924.958838] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000002\n....\n[ 2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)\n[ 2925.037005] pc : inode_permission+0x2c/0x198\n[ 2925.041281] lr : lookup_one_len_common+0xb0/0xf8\n[ 2925.045903] sp : ffff80001276ba70\n[ 2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000000\n[ 2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: dead000000000100\n[ 2925.063510] x23: dead000000000122 x22: 0000000000000000 x21: 0000000000000001\n[ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000\n[ 2925.077797] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000004\n[ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030\n[ 2925.092087] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f x9 : ffff8000102b2420\n[ 2925.099232] x8 : 7f7f7f7f7f7f7f7f x7 : feff73746e2f6f64 x6 : 0000000000008080\n[ 2925.106378] x5 : 61c8864680b583eb x4 : 209e6ec2d263dbb7 x3 : 000074756f307065\n[ 2925.113523] x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff8000122c6188\n[ 2925.120671] Call trace:\n[ 2925.123119] inode_permission+0x2c/0x198\n[ 2925.127042] lookup_one_len_common+0xb0/0xf8\n[ 2925.131315] lookup_one_len_unlocked+0x34/0xb0\n[ 2925.135764] lookup_positive_unlocked+0x14/0x50\n[ 2925.140296] debugfs_lookup+0x68/0xa0\n[ 2925.143964] dwc3_gadget_free_endpoints+0x84/0xb0\n[ 2925.148675] dwc3_gadget_exit+0x28/0x78\n[ 2925.152518] dwc3_drd_exit+0x100/0x1f8\n[ 2925.156267] dwc3_remove+0x11c/0x120\n[ 2925.159851] dwc3_shutdown+0x14/0x20\n[ 2925.163432] platform_shutdown+0x28/0x38\n[ 2925.167360] device_shutdown+0x15c/0x378\n[ 2925.171291] kernel_restart_prepare+0x3c/0x48\n[ 2925.175650] kernel_restart+0x1c/0x68\n[ 2925.179316] __do_sys_reboot+0x218/0x240\n[ 2925.183247] __arm64_sys_reboot+0x28/0x30\n[ 2925.187262] invoke_syscall+0x48/0x100\n[ 2925.191017] el0_svc_common.constprop.0+0x48/0xc8\n[ 2925.195726] do_el0_svc+0x28/0x88\n[ 2925.199045] el0_svc+0x20/0x30\n[ 2925.202104] el0_sync_handler+0xa8/0xb0\n[ 2925.205942] el0_sync+0x148/0x180\n[ 2925.209270] Code: a9025bf5 2a0203f5 121f0056 370802b5 (79400660)\n[ 2925.215372] ---[ end trace 124254d8e485a58b ]---\n[ 2925.220012] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b\n[ 2925.227676] Kernel Offset: disabled\n[ 2925.231164] CPU features: 0x00001001,20000846\n[ 2925.235521] Memory Limit: none\n[ 2925.238580] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b ]---"
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: dwc3: core: soluciona el p\u00e1nico del kernel cuando se reinicia. Cuando se reinicia el sistema, llama a dwc3_shutdown y todos los debugfs para dwc3 se eliminan primero, cuando el dispositivo intenta realizar deinit. y elimina debugfs para sus endpoints, se encuentra con el problema de desreferencia del puntero NULL cuando se llama a debugfs_lookup. Solucionelo eliminando todos los debugfs de dwc3 posteriores a dwc3_drd_exit. [2924.958838] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000002 .... [2925.030994] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--) [2925.037005] pc: inode_permission+0x2c /0x198 [ 2925.041281 ] lr: lookup_one_len_common+0xb0/0xf8 [2925.045903] sp: ffff80001276ba70 [2925.049218] x29: ffff80001276ba70 x28: ffff0000c01f0000 x27: 0000000000000 000 [2925.056364] x26: ffff800011791e70 x25: 0000000000000008 x24: muerto000000000100 [2925.063510] x23: muerto000000000122 x22: 00000000000000 00x21: 0000000000000001 [ 2925.070652] x20: ffff8000122c6188 x19: 0000000000000000 x18: 0000000000000000 [ 2925.077797] x17: 0000000000000000 x16: 00000000 x15: 0000000000000004 [ 2925.084943] x14: ffffffffffffffff x13: 0000000000000000 x12: 0000000000000030 [ 2925.092087] x11: 101010101 x10: 7f7f7f7f7f7f7f7f x9: ffff8000102b2420 [2925.099232 ] x8: 7f7f7f7f7f7f7f7f x7: feff73746e2f6f64 x6: 0000000000008080 [2925.106378] x5: 61c8864680b583eb x4: 209e6ec2d263dbb7 x3: 000074756 f307065 [2925.113523] x2: 0000000000000001 x1: 0000000000000000 x0: ffff8000122c6188 [2925.120671] Seguimiento de llamada: [2925.123119] inode_permission+0x2c/0x 198 [ 2925.127042 ] lookup_one_len_common+0xb0/0xf8 [ 2925.131315] lookup_one_len_unlocked+0x34/0xb0 [ 2925.135764] lookup_positive_unlocked+0x14/0x50 [ 2925.140296] debugfs_lookup+0x68/0xa0 [ 292 5.143964] dwc3_gadget_free_endpoints+0x84/0xb0 [ 2925.148675] dwc3_gadget_exit+0x28/0x78 [ 2925.152518] dwc3_drd_exit +0x100/0x1f8 [ 2925.156267] dwc3_remove+0x11c/0x120 [ 2925.159851] dwc3_shutdown+0x14/0x20 [ 2925.163432] platform_shutdown+0x28/0x38 [ 2925.167360] apagado+0x15c/0x378 [ 2925.171291] kernel_restart_prepare+0x3c/0x48 [ 2925.175650] kernel_restart+0x1c /0x68 [ 2925.179316] __do_sys_reboot+0x218/0x240 [ 2925.183247] __arm64_sys_reboot+0x28/0x30 [ 2925.187262] invoke_syscall+0x48/0x100 [ 2925.191017 ] el0_svc_common.constprop.0+0x48/0xc8 [ 2925.195726] do_el0_svc+0x28/0x88 [ 2925.199045] el0_svc +0x20/0x30 [ 2925.202104] el0_sync_handler+0xa8/0xb0 [ 2925.205942] el0_sync+0x148/0x180 [ 2925.209270] C\u00f3digo: a9025bf5 2a0203f5 121f0056 370802b5 9400660) [ 2925.215372] ---[ rastreo final 124254d8e485a58b ]--- [ 2925.220012] N\u00facleo p\u00e1nico - no se sincroniza: \u00a1Intent\u00e9 matar init! ExitCode = 0x0000000b [2925.227676] Offset del n\u00facleo: deshabilitado [2925.231164] Caracter\u00edsticas de la CPU: 0x00001001,20000846 [2925.235521] L\u00edmite de memoria: Ninguno [2925.238580] --- [final de Kernel Panic -No Syncing: Intento de matar init! c\u00f3digo de salida=0x0000000b ]--- (seleccionado del compromiso 2a042767814bd0edf2619f06fecd374e266ea068)"
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/174c27583b3807ac96228c442735b02622d8d1c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2a042767814bd0edf2619f06fecd374e266ea068",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/58b5e02c6ca0e2b7c87cd8023ff786ef3c0eef74",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7f9745ab342bcce5efd5d4d2297d0a3dd9db0eac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fa8c413e6b74ae5d12daf911c73238c5bdacd8e6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fd7c4bd582494934be15d41aebe0dbe23790605f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ff4c63f3e8cb7af2ce51cc56b031e08fd23c758b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-26133",
"sourceIdentifier": "security@atlassian.com",
"published": "2022-04-20T19:15:08.157",
"lastModified": "2022-04-28T17:50:56.293",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-03T15:35:00.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -74,6 +94,16 @@
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47695",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:30.743",
"lastModified": "2023-08-26T02:14:58.653",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-03T15:35:03.300",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47696",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:30.803",
"lastModified": "2023-08-26T02:15:04.807",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-03T15:35:04.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4919",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-07-29T00:15:11.517",
"lastModified": "2023-08-19T03:15:20.507",
"lastModified": "2024-10-03T14:35:02.513",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4920",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-07-29T00:15:11.573",
"lastModified": "2023-08-19T03:15:21.130",
"lastModified": "2024-10-03T14:35:03.307",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4921",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-07-29T00:15:11.627",
"lastModified": "2023-08-12T06:16:06.143",
"lastModified": "2024-10-03T14:35:04.143",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23774",
"sourceIdentifier": "cert@ncsc.nl",
"published": "2023-08-29T09:15:09.403",
"lastModified": "2023-11-07T04:07:56.483",
"lastModified": "2024-10-03T14:15:04.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-703"
"value": "CWE-248"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32559",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-08-24T02:15:09.210",
"lastModified": "2023-10-24T17:48:55.097",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-03T14:35:05.690",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36542",
"sourceIdentifier": "security@apache.org",
"published": "2023-07-29T08:15:48.833",
"lastModified": "2023-08-03T19:09:29.110",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-03T14:35:06.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37427",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-08-22T19:16:37.310",
"lastModified": "2023-08-29T20:32:01.987",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-03T15:35:05.163",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -65,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38666",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:39.170",
"lastModified": "2023-08-28T19:46:35.200",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-03T14:35:07.243",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20304",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-11T17:15:11.853",
"lastModified": "2024-09-12T12:35:54.013",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T14:20:07.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,115 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pak-mem-exhst-3ke9FeFy",
"source": "ykramarz@cisco.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1807BE16-BAA9-4BC6-B98A-13D584A12821"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "375746CB-695E-4019-89C9-42ED37A5E958"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7D05C0-4065-448B-AAC6-F29E379F3DA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D8ADA2B1-FD5A-4900-953B-30951C8EF9AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B4C7223-3EFB-48C2-BE22-941F60826D0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9A14959D-63E1-4B5A-BB7F-A9A2AF3F1137"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE83701-C0B7-4ED2-866B-44B7F54FCA0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "164B241C-397A-4921-BC5B-F928A21E91C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD3875D-D283-4961-BE31-750FDF9CDF56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*",
"matchCriteriaId": "87EF9DC5-4BE2-429D-B9BA-EF9F29E7E0F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAEC28C0-8091-49F9-88D1-CB96234BF52A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E1ED2B72-A65C-47E4-87B3-D83F29428396"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8904CAA5-4E01-462C-AE57-067902CD95FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7750EA99-EC55-4F94-8730-18583647BBBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE8E968-111F-4F57-93D3-E509AB540B87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B342A550-8600-45CF-8B9A-530770C9A0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D64E1C4D-46B0-4A18-B8EE-BEA732CBF1F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "11288A28-F0CF-4FEC-A0B7-3D93866F01FE"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pak-mem-exhst-3ke9FeFy",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20508",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:18.267",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T14:43:23.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,105 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD",
"source": "ykramarz@cisco.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "245ED9C3-4B16-4CC1-BC78-B4AED938C0B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CC21847D-908F-45C0-9A97-E77DE1C4A8D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CBCF8B3B-1F42-43CF-A328-9381BA459262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.7.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D39700C2-E83C-4ECE-9640-CEFBDD18DC4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EA09D285-3016-4042-9078-F94254C330B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "0286B57C-2E00-48F9-B3B4-E2EF3E874218"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.9.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "D247882B-DDA4-47A6-A2B0-2AFFCB94F133"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F45D0BD-724A-4D44-9192-D52FAF2E51FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC4D3D8-4391-4ED6-B27B-EF47C96904CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "60AE1B18-3CEB-45B3-A43D-3C6DCC1F20F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9F4AA555-A8AD-4EF1-BDED-CCB550AA7560"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "158ADFDB-D308-40AA-A445-BB9AF2F2414B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5F44916C-A0B3-40B1-B9E5-ACED3A0ECC80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.13.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3E7D96-E406-4CB5-91FC-A0FD5D94A876"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.14.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "07AAFFE0-B85D-4A62-894B-20A05973CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:unified_threat_defense_snort_intrusion_prevention_system_engine:17.15.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7842C05A-F9DE-49A7-8478-A1EF324C593D"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37022",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-06-13T18:15:10.547",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T15:55:56.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -95,10 +115,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-14",
"source": "ics-cert@hq.dhs.gov"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fujielectric:tellus_lite_v-simulator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.20.0",
"matchCriteriaId": "061A8685-2CB2-40CA-98CE-BD84FCEF100A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-14",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41121",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-19T20:15:08.180",
"lastModified": "2024-07-22T13:00:53.287",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-03T15:57:31.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,30 +81,66 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/8",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/9",
"source": "security-advisories@github.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/woodpecker-ci/woodpecker-security/pull/11",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/woodpecker-ci/woodpecker/issues/3924",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/woodpecker-ci/woodpecker/pull/3933",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm",
"source": "security-advisories@github.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "6FFB6F4F-B936-4455-9130-B6BD0EFD9D46"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/8",
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/9",
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/woodpecker-ci/woodpecker-security/pull/11",
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/woodpecker-ci/woodpecker/issues/3924",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/woodpecker-ci/woodpecker/pull/3933",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42495",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-05T23:15:12.520",
"lastModified": "2024-09-06T12:08:04.550",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T14:09:24.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -85,8 +105,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -95,10 +125,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-249-01",
"source": "ics-cert@hq.dhs.gov"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hughes:wl300_fusion_software:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0.10",
"matchCriteriaId": "91DB2ABE-3363-4CEB-AB4A-F32F1029485B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-249-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44970",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T19:15:31.307",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T14:22:06.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: SHAMPO, soluciona la desvinculaci\u00f3n de la lista enlazada de WQ no v\u00e1lida Cuando se han consumido todos los pasos en un WQE, el WQE se desvincula de la lista enlazada de WQ (mlx5_wq_ll_pop()). Para SHAMPO, es posible recibir CQE con 0 pasos consumidos para el mismo WQE incluso despu\u00e9s de que el WQE se haya consumido por completo y se haya desvinculado. Esto desencadena una desvinculaci\u00f3n adicional para el mismo wqe que corrompe la lista enlazada. Solucione este escenario aceptando pasos consumidos de tama\u00f1o 0 sin desvincular el WQE nuevamente."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/50d8009a0ac02c3311b23a0066511f8337bd88d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/650e24748e1e0a7ff91d5c72b72a2f2a452b5b76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/7b379353e9144e1f7460ff15f39862012c9d0d78",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/fba8334721e266f92079632598e46e5f89082f30",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.105",
"matchCriteriaId": "ECB889E5-9368-4201-9049-7289757A0B8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.46",
"matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.5",
"matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/50d8009a0ac02c3311b23a0066511f8337bd88d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/650e24748e1e0a7ff91d5c72b72a2f2a452b5b76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7b379353e9144e1f7460ff15f39862012c9d0d78",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fba8334721e266f92079632598e46e5f89082f30",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44973",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T19:15:31.487",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T14:23:09.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,85 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm, slub: no llamar a do_slab_free para el objeto kfence En 782f8906f805, la liberaci\u00f3n de objetos kfence se traslad\u00f3 desde lo profundo de do_slab_free a las funciones envolventes externas. Este es un cambio agradable, pero desafortunadamente omiti\u00f3 un punto en __kmem_cache_free_bulk. Esto da como resultado un fallo como este: ERROR skbuff_head_cache (Tainted: GSBE ): Relleno sobrescrito. 0xffff88907fea0f00-0xffff88907fea0fff @offset=3840 error_losa (mm/slub.c:1129) lista_libre_a_parcial (mm/slub.c:? mm/slub.c:4036) comprobaci\u00f3n_almohadilla_losa (mm/slub.c:864 mm/slub.c:1290) comprobaci\u00f3n_losa (mm/slub.c:?) lista_libre_a_parcial (mm/slub.c:3171 mm/slub.c:4036) kmem_cache_alloc_bulk (mm/slub.c:? mm/slub.c:4495 mm/slub.c:4586 mm/slub.c:4635) napi_build_skb (net/core/skbuff.c:348 net/core/skbuff.c:527 net/core/skbuff.c:549) Todos los dem\u00e1s llamadores de do_slab_free parecen estar bien. Agregue una comprobaci\u00f3n de kfence_free en __kmem_cache_free_bulk para evitar el bloqueo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/a371d558e6f3aed977a8a7346350557de5d25190",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/b35cd7f1e969aaa63e6716d82480f6b8a3230949",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.10.5",
"matchCriteriaId": "48E239A0-A959-4FAB-8475-D045FED3DDA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/a371d558e6f3aed977a8a7346350557de5d25190",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b35cd7f1e969aaa63e6716d82480f6b8a3230949",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44975",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.160",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T14:32:31.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: arregla el p\u00e1nico causado por partcmd_update Encontramos un error como el siguiente: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 00000003 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 358 Comm: bash Tainted: GWI 6.6.0-10893-g60d6 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/4 RIP: 0010:partition_sched_domains_locked+0x483/0x600 C\u00f3digo: 01 48 85 d2 74 0d 48 83 05 29 3f f8 03 01 f3 48 0f bc c2 89 c0 48 9 RSP: 0018:ffffc90000fdbc58 EFLAGS: 00000202 RAX: 0000000100000003 RBX: ffff888100b3dfa0 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000002fe80 RBP: ffff888100b3dfb0 R08: 0000000000000001 R09: 0000000000000000 R10: ffffc90000fdbcb0 R11: 0000000000000004 R12: 0000000000000002 R13: ffff888100a92b48 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f44a5425740(0000) GS:ffff888237d80000(0000) knlGS:0000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000100030973 CR3: 000000010722c000 CR4: 00000000000006e0 Seguimiento de llamadas: ? show_regs+0x8c/0xa0 ? __die_body+0x23/0xa0 ? __die+0x3a/0x50 ? page_fault_oops+0x1d2/0x5c0 ? particion_sched_domains_locked+0x483/0x600 ? search_module_extables+0x2a/0xb0 ? search_exception_tables+0x67/0x90 ? kernelmode_fixup_or_oops+0x144/0x1b0 ? __bad_area_nosemaphore+0x211/0x360 ? up_read+0x3b/0x50 ? sem\u00e1foro de nariz de \u00e1rea defectuosa+0x1a/0x30 ? exc_page_fault+0x890/0xd90 ? __lock_acquire.constprop.0+0x24f/0x8d0 ? __lock_acquire.constprop.0+0x24f/0x8d0 ? asm_exc_page_fault+0x26/0x30 ? dominios programados de partici\u00f3n bloqueados+0x483/0x600 ? partici\u00f3n_sched_dominios_bloqueados+0xf0/0x600 reconstruir_sched_dominios_bloqueados+0x806/0xdc0 actualizar_partici\u00f3n_sd_lb+0x118/0x130 resmask_escritura_cpuset+0xffc/0x1420 escritura_archivo_cgroup+0xb2/0x290 iterador_escritura_fop_kernfs+0x194/0x290 nueva_escritura_sincronizada+0xeb/0x160 escritura_vfs+0x16f/0x1d0 escritura_ksys+0x81/0x180 escritura_sys___x64+0x21/0x30 llamada_sys_x64+0x2f25/0x4630 llamada_sys_64+0x44/0xb0 entry_SYSCALL_64_after_hwframe+0x78/0xe2 RIP: 0033:0x7f44a553c887 Se puede reproducir con los siguientes comandos: cd /sys/fs/cgroup/ mkdir test cd test/ echo +cpuset > ../cgroup.subtree_control echo root > cpuset.cpus.partition cat /sys/fs/cgroup/cpuset.cpus.effective 0-3 echo 0-3 > cpuset.cpus // quitar todas las CPU de la ra\u00edz Este problema se debe a la reconstrucci\u00f3n incorrecta de los dominios de programaci\u00f3n. En este escenario, test/cpuset.cpus.partition deber\u00eda ser una ra\u00edz no v\u00e1lida y no deber\u00eda activar la reconstrucci\u00f3n de los dominios de programaci\u00f3n. Al llamar a update_parent_effective_cpumask con partcmd_update, si newmask no es nulo, debe volver a verificar si newmask tiene CPU disponibles para parect/cs que tiene tareas."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/73d6c6cf8ef6a3c532aa159f5114077746a372d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/959ab6350add903e352890af53e86663739fcb9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/73d6c6cf8ef6a3c532aa159f5114077746a372d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/959ab6350add903e352890af53e86663739fcb9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-45519",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-02T22:15:02.770",
"lastModified": "2024-10-03T10:29:17.337",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-03T14:07:15.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands."
},
{
"lang": "es",
"value": "El servicio postjournal en Zimbra Collaboration (ZCS) anterior a la versi\u00f3n 8.8.15 parche 46, 9 anterior a la versi\u00f3n 9.0.0 parche 41, 10 anterior a la versi\u00f3n 10.0.9 y 10.1 anterior a la versi\u00f3n 10.1.1 a veces permite que usuarios no autenticados ejecuten comandos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -35,14 +59,458 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"source": "cve@mitre.org"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
"source": "cve@mitre.org"
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.8.15",
"matchCriteriaId": "1A604F85-992D-4CCF-8630-0456B92429BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.9",
"matchCriteriaId": "18D6B3CE-07F4-45F9-A5C8-3CA0B1395039"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
"matchCriteriaId": "1B17C1A7-0F0A-4E7C-8C0C-0BBB0BF66C82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
"matchCriteriaId": "BA48C450-201C-4398-AB65-EF6F95FB0380"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
"matchCriteriaId": "5F759114-CF2D-48BF-8D09-EBE8D1ED1949"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
"matchCriteriaId": "AE8BD950-24A2-4AFF-B7EE-6EE115BD75D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
"matchCriteriaId": "C43634F5-2946-44D2-8A50-B717374A8126"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
"matchCriteriaId": "20315895-5410-4B88-B2D9-E9C5D79A64DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
"matchCriteriaId": "BF405091-A832-4945-87EC-AA525F37DF91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
"matchCriteriaId": "C9B6FFA8-CFD2-47C6-9475-79210CB9AA84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
"matchCriteriaId": "964CA714-937C-4FC0-A1E9-07F846C786BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
"matchCriteriaId": "DAF8F155-1406-46ED-A81F-BCC4CE525F43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
"matchCriteriaId": "56A8F56B-3457-4C19-B213-3B04FEE8D7A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
"matchCriteriaId": "B4F8D255-3F91-45FF-9133-4023BA688F9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
"matchCriteriaId": "37BC4DF5-D111-4295-94FC-AA8929CDF2A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
"matchCriteriaId": "A9D50108-0404-4791-8057-DB1786D311C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
"matchCriteriaId": "F2A7E53F-8EAC-4DA9-8EAE-117759EFABEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
"matchCriteriaId": "858727DB-AE6F-435D-B8FD-6C94C3400E40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*",
"matchCriteriaId": "3FA6AC95-288C-4ABA-B2A7-47E4134EDC31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*",
"matchCriteriaId": "4AA82728-5901-482A-83CF-F883D4B6A8E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*",
"matchCriteriaId": "7E762792-542E-43D0-A95A-E7F48F328A28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*",
"matchCriteriaId": "6DD4641A-EC23-4B1A-8729-9AECD70390AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*",
"matchCriteriaId": "E0E3E825-1D1E-4ECD-B306-DD8BDCDD0547"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*",
"matchCriteriaId": "840F98DC-57F1-4054-A6C1-6E7F0340AC2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*",
"matchCriteriaId": "EE2A1305-68B7-4CB7-837F-4EDE2EBED507"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
"matchCriteriaId": "21768A61-7578-4EEC-A23B-FEC10CAA9EDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*",
"matchCriteriaId": "CA758408-4302-43BC-BDC9-1B70EC5D2FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*",
"matchCriteriaId": "822CDEBC-0650-4970-B46F-06F505993086"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*",
"matchCriteriaId": "971B5005-4676-4D93-A7DD-6AFDC8D0BEEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*",
"matchCriteriaId": "81BC6A7F-D014-44B3-9361-20DB256D3C8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*",
"matchCriteriaId": "6A3DC694-4CCC-4E9F-B6E9-891B1DF115C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*",
"matchCriteriaId": "3810385E-95E8-491E-8281-394125DB04F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*",
"matchCriteriaId": "C08B5A0A-2935-4FEB-9133-4B35E1AB0CDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
"matchCriteriaId": "661403E7-1D65-4710-8413-47D74FF65BE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*",
"matchCriteriaId": "4CD3AEF8-0667-40B9-BCAA-6C9CA7D9C495"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*",
"matchCriteriaId": "A0F8BB82-32E4-463D-B719-8E5186CAAECC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*",
"matchCriteriaId": "9605C0CF-E5DF-497A-B298-D64ABCDAF88E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p43:*:*:*:*:*:*",
"matchCriteriaId": "0A77DFFA-CBBF-4F8C-9D8E-68CC115B4D2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p44:*:*:*:*:*:*",
"matchCriteriaId": "4E7EBCB8-3042-4BA9-B34A-E1C95F111B38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p45:*:*:*:*:*:*",
"matchCriteriaId": "5DEF465F-35ED-49ED-A86C-AE1C7FF76AFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
"matchCriteriaId": "0695D2E0-45B3-493C-BA6D-471B90C0ACC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
"matchCriteriaId": "714FAFE6-68AE-4304-B040-48BC46F85A2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
"matchCriteriaId": "73FC2D2D-8BBD-4259-8B35-0D9BFA40567B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
"matchCriteriaId": "AB97E9E6-CC4A-458D-B731-6D51130B942C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
"matchCriteriaId": "BA688C43-846A-4C4A-AEDB-113D967D3D73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "685D9652-2934-4C13-8B36-40582C79BFC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
"matchCriteriaId": "5E4DF01A-1AA9-47E8-82FD-65A02ECA1376"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "BDE59185-B917-4A81-8DE4-C65A079F52FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "BA3ED95F-95F2-4676-8EAF-B4B9EB64B260"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "4BB93336-CC3C-4B7F-B194-7DED036ABBAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "876F1675-F65C-4E86-ADBD-36EB8D8A997D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "2306F526-9C56-4A57-AA9B-02F2D6058C97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "F9EA2A61-67AA-4B7E-BC6E-80EB1363EF85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "C77A35B7-96F6-43A7-A747-C6AEEDE961E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "DC35882B-E709-42D8-8800-F1B734CEAFC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "B7A47276-F241-4A68-9458-E1481EBDC5E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "12D0D469-6C9B-4B66-9581-DC319773238A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "40629BEB-DF4B-4FB8-8D3D-7BAC43C90766"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "9503131F-CC23-4545-AE9C-9714B287CC25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "B4CE2D12-AD31-4FED-AD0F-ADF64E92E1B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "8113A4E3-AA96-4382-815D-6FD88BA42EC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
"matchCriteriaId": "DC8C28E0-6C51-41EE-A7B2-DB185D1D8FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "BC19F11D-23D9-429D-A957-D67F23A40A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "AAFA2EE7-C965-4F27-8CAE-E607A9F202AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "1D09DCF6-1C8F-4CA1-B7D4-AFDD4EB35771"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "C52705E6-2C6B-47BC-A0CD-F6AAE0BFC302"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "D659AE6A-591E-4D5B-9781-9648250F5576"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "E4054E3E-561C-4B1C-A615-3CCE5CB69D77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "4FA0E9C4-25E4-4CD6-B88A-02B413385866"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "5D6F7CA3-C36A-466C-8FAD-D0B3CEF01F0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p37:*:*:*:*:*:*",
"matchCriteriaId": "9684AC81-B557-4292-8402-AE55CB2E613C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p38:*:*:*:*:*:*",
"matchCriteriaId": "32A352C4-0E9C-436F-ADA7-D93492A18037"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p39:*:*:*:*:*:*",
"matchCriteriaId": "ABCA8698-AB88-4A6D-BD2B-DB22AEED6536"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "33F50D8C-7027-4A8D-8E95-98C224283772"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p40:*:*:*:*:*:*",
"matchCriteriaId": "CEE1CBDD-F205-4EA7-9E8B-5527BC134C74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "82000BA4-1781-4312-A7BD-92EC94D137AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "4B52D301-2559-457A-8FFB-F0915299355A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "7215AE2C-8A33-4AB9-88D5-7C8CD11E806C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
"matchCriteriaId": "8D859F77-8E39-4D46-BC90-C5C1D805A666"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "CDC810C7-45DA-4BDF-9138-2D3B2750243E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "E09D95A4-764D-4E0B-8605-1D94FD548AB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6198F75A-353D-4079-91DE-A7CC22DFE8B0"
}
]
}
]
}
],
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45806",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-20T00:15:02.293",
"lastModified": "2024-09-25T19:02:57.757",
"lastModified": "2024-10-03T15:36:55.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,7 +22,7 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,12 +30,12 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46861",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.563",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T15:36:06.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: ipheth: no detiene RX en caso de error en la devoluci\u00f3n de llamada RX Las devoluciones de llamada RX pueden fallar por m\u00faltiples razones: * Payload demasiado corto * Payload formateado incorrectamente (por ejemplo, mala estructura de NCM) * Falta de memoria Ninguna de estas deber\u00eda provocar que el controlador se bloquee. Haga que estas fallas no sean cr\u00edticas y contin\u00fae procesando m\u00e1s URB entrantes."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/08ca800b0cd56d5e26722f68b18bbbf6840bf44b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/4d1cfa3afb8627435744ecdc6d8b58bc72ee0f4c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/74efed51e0a4d62f998f806c307778b47fc73395",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.52",
"matchCriteriaId": "AE9373D7-4CC6-4422-A25F-8FA1533328E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.11",
"matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/08ca800b0cd56d5e26722f68b18bbbf6840bf44b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4d1cfa3afb8627435744ecdc6d8b58bc72ee0f4c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/74efed51e0a4d62f998f806c307778b47fc73395",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46862",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.627",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T15:34:46.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,110 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: soc-acpi-intel-mtl-match: agregar elemento vac\u00edo faltante No hay links_num en struct snd_soc_acpi_mach {}, y probamos !link->num_adr como condici\u00f3n para finalizar el bucle en hda_sdw_machine_select(). Por lo tanto, se requiere un elemento vac\u00edo en la matriz struct snd_soc_acpi_link_adr."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/01281a9e8275946aa725db0919769b8d35af3a11",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/bf6d7a44a144aa9c476dee83c23faf3151181bab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.11",
"matchCriteriaId": "1C00DB61-E108-46C8-817A-E3ED88BEA191"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*",
"matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/01281a9e8275946aa725db0919769b8d35af3a11",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bf6d7a44a144aa9c476dee83c23faf3151181bab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46863",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.690",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T15:32:54.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,96 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: soc-acpi-intel-lnl-match: agregar elemento vac\u00edo faltante No hay links_num en struct snd_soc_acpi_mach {}, y probamos !link->num_adr como condici\u00f3n para finalizar el bucle en hda_sdw_machine_select(). Por lo tanto, se requiere un elemento vac\u00edo en la matriz struct snd_soc_acpi_link_adr."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/8eb57389d8ad91c67bf844f5aae4caef74b9091b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/c4246f1fe9f24f8dcd97887ed67d8fcfd91f4796",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.52",
"matchCriteriaId": "AE9373D7-4CC6-4422-A25F-8FA1533328E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.11",
"matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8eb57389d8ad91c67bf844f5aae4caef74b9091b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c4246f1fe9f24f8dcd97887ed67d8fcfd91f4796",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46864",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.747",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T15:29:34.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,124 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/hyperv: fix kexec crash due to VP assist page corrupt commit 9636be85cc5b (\"x86/hyperv: Fix hyperv_pcpu_input_arg management when CPUs go online/offline\") introduce un nuevo estado de cpuhp para la inicializaci\u00f3n de hyperv. cpuhp_setup_state() devuelve el n\u00famero de estado si el estado es CPUHP_AP_ONLINE_DYN o CPUHP_BP_PREPARE_DYN y 0 para todos los dem\u00e1s estados. Para el caso de hyperv, dado que se introdujo un nuevo estado de cpuhp, devolver\u00eda 0. Sin embargo, en hv_machine_shutdown(), la llamada a cpuhp_remove_state() est\u00e1 condicionada a \"hyperv_init_cpuhp > 0\". Esto nunca ser\u00e1 cierto y, por lo tanto, hv_cpu_die() no se llamar\u00e1 en todas las CPU. Esto significa que la p\u00e1gina de asistencia de VP no se restablecer\u00e1. Cuando el kernel de kexec intenta configurar la p\u00e1gina de asistencia de VP nuevamente, el hipervisor corrompe la regi\u00f3n de memoria de la p\u00e1gina de asistencia de VP anterior, lo que provoca un p\u00e1nico en caso de que el kernel de kexec est\u00e9 usando esa memoria en otro lugar. Esto se solucion\u00f3 originalmente en el commit dfe94d4086e4 (\"x86/hyperv: Fix kexec panic/hang issues\"). Desh\u00e1gase de hyperv_init_cpuhp por completo, ya que ya no estamos usando un estado de cpuhp din\u00e1mico y use CPUHP_AP_HYPERV_ONLINE directamente con cpuhp_remove_state()."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/b9af6418279c4cf73ca073f8ea024992b38be8ab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/d6f018a3b49d0a94ddbd0e479c2af6b19724e434",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6.52",
"matchCriteriaId": "4B069D1F-CDB1-421E-A7FE-281C7312550A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndIncluding": "6.10.11",
"matchCriteriaId": "FCF7772B-1996-473C-B3BE-95A8ECD6556C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*",
"matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b9af6418279c4cf73ca073f8ea024992b38be8ab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d6f018a3b49d0a94ddbd0e479c2af6b19724e434",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47083",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-25T22:15:03.273",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-03T15:11:29.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -77,18 +109,46 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/microsoft/terraform-provider-power-platform/releases/tag/v3.0.0",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/microsoft/terraform-provider-power-platform/security/advisories/GHSA-7w3w-pjm5-m36c",
"source": "security-advisories@github.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://registry.terraform.io/providers/microsoft/power-platform/latest/docs#authenticating-to-power-platform-using-a-service-principal-with-oidc",
"source": "security-advisories@github.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:power_platform_terraform_provider:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.0.0",
"matchCriteriaId": "08FB48A2-70DE-4058-9793-86D032C07381"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/microsoft/terraform-provider-power-platform/releases/tag/v3.0.0",
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/microsoft/terraform-provider-power-platform/security/advisories/GHSA-7w3w-pjm5-m36c",
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://registry.terraform.io/providers/microsoft/power-platform/latest/docs#authenticating-to-power-platform-using-a-service-principal-with-oidc",
"source": "security-advisories@github.com",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-47614",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-03T15:15:14.720",
"lastModified": "2024-10-03T15:15:14.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "async-graphql is a GraphQL server library implemented in Rust. async-graphql before 7.0.10 does not limit the number of directives for a field. This can lead to Service Disruption, Resource Exhaustion, and User Experience Degradation. This vulnerability is fixed in 7.0.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/async-graphql/async-graphql/commit/7f1791488463d4e9c5adcd543962173e2f6cbd34",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/async-graphql/async-graphql/security/advisories/GHSA-5gc2-7c65-8fq8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47617",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-03T15:15:14.937",
"lastModified": "2024-10-03T15:15:14.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sulu is a PHP content management system. This vulnerability allows an attacker to inject arbitrary HTML/JavaScript code through the media download URL in Sulu CMS. It affects the SuluMediaBundle component. The vulnerability is a Reflected Cross-Site Scripting (XSS) issue, which could potentially allow attackers to steal sensitive information, manipulate the website's content, or perform actions on behalf of the victim. This vulnerability is fixed in 2.6.5 and 2.5.21."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/sulu/sulu/commit/a5a5ae555d282e88ff8559d38cfb46dea7939bda",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sulu/sulu/commit/eeacd14b6cf55f710084788140d40ebb00314b29",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sulu/sulu/security/advisories/GHSA-6784-9c82-vr85",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-47618",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-03T15:15:15.147",
"lastModified": "2024-10-03T15:15:15.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sulu is a PHP content management system. Sulu is vulnerable against XSS whereas a low privileged user with access to the \u201cMedia\u201d section can upload an SVG file with a malicious payload. Once uploaded and accessed, the malicious javascript will be executed on the victims\u2019 (other users including admins) browsers. This issue is fixed in 2.6.5."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/sulu/sulu/commit/ca72f75eebe41ea7726624d8aea7da6c425f1eb9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sulu/sulu/security/advisories/GHSA-255w-87rh-rg44",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-5803",
"sourceIdentifier": "security@nortonlifelock.com",
"published": "2024-10-03T15:15:15.310",
"lastModified": "2024-10-03T15:15:15.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AVGUI.exe of AVG/Avast Antivirus before versions before 24.1 can allow a local attacker to escalate privileges via an COM hijack in a time-of-check to time-of-use (TOCTOU) when self protection is disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@nortonlifelock.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@nortonlifelock.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html",
"source": "security@nortonlifelock.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8404",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-09-26T02:15:02.797",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-03T15:19:28.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"type": "Secondary",
@ -51,10 +81,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/",
"source": "eb41dac7-0af8-4f84-9f6d-0272772514f4"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.0.9",
"matchCriteriaId": "7AE8A9B5-11C6-4FE2-B672-0EC6EF8075CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.0.9",
"matchCriteriaId": "BA96610E-7518-4215-B5FF-1B4444BE2DA4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/",
"source": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9100",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-10-03T15:15:15.553",
"lastModified": "2024-10-03T15:15:15.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zohocorp ManageEngine Analytics Plus versions before 5410 and\u00a0Zoho Analytics On-Premise\u00a0versions before 5410 are vulnerable to Path traversal."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/analytics-plus/CVE-2024-9100.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
},
{
"url": "https://www.zoho.com/analytics/onpremise/CVE-2024-9100.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9177",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-26T14:15:09.697",
"lastModified": "2024-09-30T12:46:20.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-03T14:32:46.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,18 +71,45 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3157836/",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://wordpress.org/plugins/themedy-toolbox/#developers",
"source": "security@wordfence.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/755e0998-0f0d-4259-881d-ed07aecb0b10?source=cve",
"source": "security@wordfence.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:themedy:toolbox:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.16",
"matchCriteriaId": "48A43E5F-CF2F-4C9F-B516-94CBF4860257"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3157836/",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/themedy-toolbox/#developers",
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/755e0998-0f0d-4259-881d-ed07aecb0b10?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-9460",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-03T15:15:15.750",
"lastModified": "2024-10-03T15:15:15.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips Online Shopping Portal 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/8",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279132",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279132",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.417052",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-03T14:00:19.355949+00:00
2024-10-03T16:00:18.296829+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-03T13:52:23.060000+00:00
2024-10-03T15:57:31.917000+00:00
```
### Last Data Feed Release
@ -33,32 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
264387
264393
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2024-47554](CVE-2024/CVE-2024-475xx/CVE-2024-47554.json) (`2024-10-03T12:15:02.613`)
- [CVE-2024-47614](CVE-2024/CVE-2024-476xx/CVE-2024-47614.json) (`2024-10-03T15:15:14.720`)
- [CVE-2024-47617](CVE-2024/CVE-2024-476xx/CVE-2024-47617.json) (`2024-10-03T15:15:14.937`)
- [CVE-2024-47618](CVE-2024/CVE-2024-476xx/CVE-2024-47618.json) (`2024-10-03T15:15:15.147`)
- [CVE-2024-5803](CVE-2024/CVE-2024-58xx/CVE-2024-5803.json) (`2024-10-03T15:15:15.310`)
- [CVE-2024-9100](CVE-2024/CVE-2024-91xx/CVE-2024-9100.json) (`2024-10-03T15:15:15.553`)
- [CVE-2024-9460](CVE-2024/CVE-2024-94xx/CVE-2024-9460.json) (`2024-10-03T15:15:15.750`)
### CVEs modified in the last Commit
Recently modified CVEs: `12`
Recently modified CVEs: `31`
- [CVE-2021-47220](CVE-2021/CVE-2021-472xx/CVE-2021-47220.json) (`2024-10-03T13:15:13.883`)
- [CVE-2023-50378](CVE-2023/CVE-2023-503xx/CVE-2023-50378.json) (`2024-10-03T13:15:14.113`)
- [CVE-2024-20433](CVE-2024/CVE-2024-204xx/CVE-2024-20433.json) (`2024-10-03T13:34:37.547`)
- [CVE-2024-24795](CVE-2024/CVE-2024-247xx/CVE-2024-24795.json) (`2024-10-03T13:15:14.233`)
- [CVE-2024-27315](CVE-2024/CVE-2024-273xx/CVE-2024-27315.json) (`2024-10-03T13:15:14.710`)
- [CVE-2024-31868](CVE-2024/CVE-2024-318xx/CVE-2024-31868.json) (`2024-10-03T13:15:14.833`)
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-10-03T13:15:14.953`)
- [CVE-2024-41651](CVE-2024/CVE-2024-416xx/CVE-2024-41651.json) (`2024-10-03T13:45:15.070`)
- [CVE-2024-7575](CVE-2024/CVE-2024-75xx/CVE-2024-7575.json) (`2024-10-03T13:52:23.060`)
- [CVE-2024-7576](CVE-2024/CVE-2024-75xx/CVE-2024-7576.json) (`2024-10-03T13:51:45.997`)
- [CVE-2024-8692](CVE-2024/CVE-2024-86xx/CVE-2024-8692.json) (`2024-10-03T13:17:07.547`)
- [CVE-2024-9313](CVE-2024/CVE-2024-93xx/CVE-2024-9313.json) (`2024-10-03T11:15:13.940`)
- [CVE-2022-4920](CVE-2022/CVE-2022-49xx/CVE-2022-4920.json) (`2024-10-03T14:35:03.307`)
- [CVE-2022-4921](CVE-2022/CVE-2022-49xx/CVE-2022-4921.json) (`2024-10-03T14:35:04.143`)
- [CVE-2023-23774](CVE-2023/CVE-2023-237xx/CVE-2023-23774.json) (`2024-10-03T14:15:04.650`)
- [CVE-2023-32559](CVE-2023/CVE-2023-325xx/CVE-2023-32559.json) (`2024-10-03T14:35:05.690`)
- [CVE-2023-36542](CVE-2023/CVE-2023-365xx/CVE-2023-36542.json) (`2024-10-03T14:35:06.660`)
- [CVE-2023-37427](CVE-2023/CVE-2023-374xx/CVE-2023-37427.json) (`2024-10-03T15:35:05.163`)
- [CVE-2023-38666](CVE-2023/CVE-2023-386xx/CVE-2023-38666.json) (`2024-10-03T14:35:07.243`)
- [CVE-2024-20304](CVE-2024/CVE-2024-203xx/CVE-2024-20304.json) (`2024-10-03T14:20:07.680`)
- [CVE-2024-20508](CVE-2024/CVE-2024-205xx/CVE-2024-20508.json) (`2024-10-03T14:43:23.810`)
- [CVE-2024-20510](CVE-2024/CVE-2024-205xx/CVE-2024-20510.json) (`2024-10-03T14:52:22.627`)
- [CVE-2024-37022](CVE-2024/CVE-2024-370xx/CVE-2024-37022.json) (`2024-10-03T15:55:56.250`)
- [CVE-2024-41121](CVE-2024/CVE-2024-411xx/CVE-2024-41121.json) (`2024-10-03T15:57:31.917`)
- [CVE-2024-42495](CVE-2024/CVE-2024-424xx/CVE-2024-42495.json) (`2024-10-03T14:09:24.283`)
- [CVE-2024-44970](CVE-2024/CVE-2024-449xx/CVE-2024-44970.json) (`2024-10-03T14:22:06.003`)
- [CVE-2024-44973](CVE-2024/CVE-2024-449xx/CVE-2024-44973.json) (`2024-10-03T14:23:09.147`)
- [CVE-2024-44975](CVE-2024/CVE-2024-449xx/CVE-2024-44975.json) (`2024-10-03T14:32:31.677`)
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-10-03T14:07:15.123`)
- [CVE-2024-45806](CVE-2024/CVE-2024-458xx/CVE-2024-45806.json) (`2024-10-03T15:36:55.557`)
- [CVE-2024-46861](CVE-2024/CVE-2024-468xx/CVE-2024-46861.json) (`2024-10-03T15:36:06.543`)
- [CVE-2024-46862](CVE-2024/CVE-2024-468xx/CVE-2024-46862.json) (`2024-10-03T15:34:46.227`)
- [CVE-2024-46863](CVE-2024/CVE-2024-468xx/CVE-2024-46863.json) (`2024-10-03T15:32:54.497`)
- [CVE-2024-46864](CVE-2024/CVE-2024-468xx/CVE-2024-46864.json) (`2024-10-03T15:29:34.927`)
- [CVE-2024-47083](CVE-2024/CVE-2024-470xx/CVE-2024-47083.json) (`2024-10-03T15:11:29.913`)
- [CVE-2024-8404](CVE-2024/CVE-2024-84xx/CVE-2024-8404.json) (`2024-10-03T15:19:28.293`)
- [CVE-2024-9177](CVE-2024/CVE-2024-91xx/CVE-2024-9177.json) (`2024-10-03T14:32:46.150`)
## Download and Usage

View File

@ -184268,7 +184268,7 @@ CVE-2021-43215,0,0,423c7c8173a4d776b804c1cd3af5a77ea172fa5655254209654b72cd8996c
CVE-2021-43216,0,0,a42b014a5f0f2b14790fa8a0d81ea09a0f0dc1841c64c3a43fc5ad54c8e94b48,2023-12-28T00:15:10.203000
CVE-2021-43217,0,0,0064dd2e9a7a46bc5925fdace86faa1dd8a3f20d29fbb76e11febd484d1236a7,2022-07-12T17:42:04.277000
CVE-2021-43219,0,0,10ffc3b9deff20d2e728908e283ff4329da813a79b877d2e67c61e8dc93a81bd,2022-07-12T17:42:04.277000
CVE-2021-4322,0,0,eb453610504158252df1060312fe99a9f0f8143694e86a196bff251b769745ba,2023-08-12T06:15:12.483000
CVE-2021-4322,0,1,2436a340da997cc7c8a478b19f261c05f982983e8999149f0cfd14047bac5ed9,2024-10-03T14:35:00.750000
CVE-2021-43220,0,0,30d870d298a957df17e449d3b5b547b00b27956ad3347dd8529e5d2fc6486f52,2023-12-28T16:16:01.253000
CVE-2021-43221,0,0,4af4319e5e1945e70568caf7bbea7dcc655c0c610ed5848c58988e5223f2a277,2023-12-28T16:16:01.433000
CVE-2021-43222,0,0,0dfb91c74001e781eaae6ab0626f93586a5f52e2ea625c3e1f06f8f12da784ba,2023-12-28T00:15:10.343000
@ -187093,7 +187093,7 @@ CVE-2021-47216,0,0,10dc3885d7ef5e71efae3373bef0ea2f284f16713172c07b2e1b33101ffff
CVE-2021-47217,0,0,f9117c57c5e1950e2d8542c8254f26cf579d6b03be469d87a167a35a80e0fddd,2024-04-10T19:49:51.183000
CVE-2021-47218,0,0,22075cbb65309b9d698e1a98909423bf898efee62e8dc49312c690d61b734160,2024-04-10T19:49:51.183000
CVE-2021-47219,0,0,19da26c857306867074db0db7c68658d1da8f13810e8ea48aed77d09a9210b4a,2024-04-10T19:49:51.183000
CVE-2021-47220,0,1,b59dacf12e21084b1235974d757057529b1782cbc8a6db9597ef9c8d75b3ab4d,2024-10-03T13:15:13.883000
CVE-2021-47220,0,1,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd809,2024-10-03T15:15:13.703000
CVE-2021-47221,0,0,be4fba76a1b024c941c507f7c354bd8197d5a0317f4df6b315ba3d46d2ffbdb5,2024-05-21T16:54:26.047000
CVE-2021-47222,0,0,3f9a21db77caf7d70e1c4613a3e366cdfeb41cdf8308383b2302e318a16fa064,2024-05-21T16:54:26.047000
CVE-2021-47223,0,0,153ed24456f2781c6911d2f948472f17dfbb988764986042d16c2ec594c0d813,2024-05-21T16:54:26.047000
@ -194971,7 +194971,7 @@ CVE-2022-26129,0,0,be0cc07a4702becddd3794850dbc57a0064de81f4cb4bfe11e1098fab3d87
CVE-2022-2613,0,0,22acf2e1d861d3ef93c1d5014cc835ecadfb25143cb124ffe48125192e8a94e2,2023-11-07T03:46:44.133000
CVE-2022-26130,0,0,f5d00a8d594c3c9a5a76c59a5eae2a9b0265e622b079a3869dfb48c26aa3cd51,2022-05-16T12:34:17.893000
CVE-2022-26131,0,0,ae0b4fb43b33e1484c241aac17637114600c06f8bca32f6fe29efec493803887,2022-03-23T18:37:02.983000
CVE-2022-26133,0,0,6cde0662d3860e2c9733a7b86d1915191afe2f22433dd4868912b582a62f9bf1,2022-04-28T17:50:56.293000
CVE-2022-26133,0,1,ffa6882abf1006ca33138be1d3118308796159752fdef8b4640dacb3c5e895ed,2024-10-03T15:35:00.870000
CVE-2022-26134,0,0,d3c92ffe05d5b347d66ad1f6e09fe61e264909d50ad2ff29e6820d2348a3d6ff,2024-06-28T14:22:46.883000
CVE-2022-26135,0,0,5feabacd409141da2b175a7ed015fa6e909537b4a385f3739c4898dc95a861a2,2022-08-04T15:31:35.393000
CVE-2022-26136,0,0,2da3a36c88b9da1331e486d537b599ce4ab13268e4abccb33471b23eb425c59e,2022-08-04T15:50:26.633000
@ -211597,8 +211597,8 @@ CVE-2022-4767,0,0,acbea5a742784208ebb8a6a3bc0810795b9f718a220753a882f954c6e636d8
CVE-2022-47673,0,0,4b147d8483f79551fea368d9ddc66ade955e52def1825197c53610e7357caacc,2023-08-26T02:14:53.490000
CVE-2022-4768,0,0,e4a08e6c1d1cc0a00429acd1e41edfb91b0a356ee9648dc3d9122698cda86553,2024-05-17T02:16:55.980000
CVE-2022-4769,0,0,3fe1e289528248f09e241e61a77146151f305cb918c67a0fe4e35eb95ed2d89f,2023-11-07T03:58:52.050000
CVE-2022-47695,0,0,455d6603dc0b4a327719720b593191557b6fd1c3a13fc38fffc12b8396c104a4,2023-08-26T02:14:58.653000
CVE-2022-47696,0,0,e634285d9de4fbf6f543bd0c1f811f38d113787956231c84fb8ec9c72a5227b9,2023-08-26T02:15:04.807000
CVE-2022-47695,0,1,976a6ff10f6aa0f57482cbef9add6e11f1c24b7b35e1d20665c573f8d01c7d5c,2024-10-03T15:35:03.300000
CVE-2022-47696,0,1,b7d2cd42f9d93929647ee660fc00eac649761a5813386d80718f394021c19df2,2024-10-03T15:35:04.010000
CVE-2022-47697,0,0,52f9ee58e24d353bc4acca5eeb0e7b89da974313419dbc8b8836f4d990a32d3f,2023-08-08T14:22:24.967000
CVE-2022-47698,0,0,c328ca29b2158332a1a2b337fb82e99210829ec4388992fb0d0963da86d10adf,2023-02-08T02:20:11.983000
CVE-2022-47699,0,0,6658491100730ebe281498067c5f3338781afd2748039dd83915dafe4c12bcb3,2023-02-08T15:15:13.307000
@ -212544,9 +212544,9 @@ CVE-2022-4915,0,0,7dce1966502761df69c2dafe86f736ea78df21a82c78242f2c6e6554747bb5
CVE-2022-4916,0,0,11156a0320210ecb533d09665dc4e516646ac7c485716843642ff2a3c6876232,2024-10-02T21:35:09.133000
CVE-2022-4917,0,0,ffd6d161731b5943a4a2cecc0118210e94d8d50890cee00b3e5b54ec63650038,2023-08-19T03:15:19.503000
CVE-2022-4918,0,0,be511b580f573f30861de1822e03bbf3b4f7c7355836b2656f724c73cdba85dc,2024-10-02T21:35:10.087000
CVE-2022-4919,0,0,467c4cee97fb392b0533c41141ef140ea8f1a554fc7e01d1c68283f566fd25ee,2023-08-19T03:15:20.507000
CVE-2022-4920,0,0,658843bd4d8645a477b474d673e5b5939fc0724d1065229fb6ba5e8569c8e409,2023-08-19T03:15:21.130000
CVE-2022-4921,0,0,b49dd8c0d3070cbcf21fdb734c76ab5dc429e89d8dcb725a103e66ff63487445,2023-08-12T06:16:06.143000
CVE-2022-4919,0,1,0783d84e35c78a79cc39217e58f1f715e26f0dfc0e3c767292c16cfa09c212ab,2024-10-03T14:35:02.513000
CVE-2022-4920,0,1,3085c252af017c84c8a4a69bcaef3bc97e10878c4297ecbdebc3a38c5d722641,2024-10-03T14:35:03.307000
CVE-2022-4921,0,1,db75cb26861423334e5899a02fd94e96152740e90b4a05930cf0eaf21860de20,2024-10-03T14:35:04.143000
CVE-2022-4922,0,0,7a2b4634322e96d3c241ed34ac0e68d8e19629d7fd1671456894ec8685668421,2023-08-12T06:16:06.627000
CVE-2022-4923,0,0,761793b67ab54f7909a05bde1bca07eba07ede3d9cf67f8e3148ffe9b421bec4,2023-08-12T06:16:07.170000
CVE-2022-4924,0,0,cdce64e4b7502dd49525556dca8b809e232a384142d6d02d56c2287cddab7d9b,2023-08-12T06:16:27.147000
@ -217667,7 +217667,7 @@ CVE-2023-23770,0,0,a902c1d9df84cfcec2e11ce438264024449328100715435de2958785b5623
CVE-2023-23771,0,0,607635ee820723edbaab446cc9b87bbb217752aeafc02eb5c5331bbb34246d50,2023-11-07T04:07:55.847000
CVE-2023-23772,0,0,b487df13c4b778931022a7d300baf45678f32d409ba82f89a81e14902d08b9b7,2023-11-07T04:07:56.007000
CVE-2023-23773,0,0,01fa3379aec85ae04cf8a64af8014f9d19a184d27ce361e2400a0cf37d789f4d,2023-11-07T04:07:56.260000
CVE-2023-23774,0,0,28b560e5ad169a1b8c4c3536d08200feeabf0a7bf1795a35faa6cf4d2349cf9d,2023-11-07T04:07:56.483000
CVE-2023-23774,0,1,2e1d257372a3d96fff09c175e8dd40314bcbf895bfb2bc39e87334c5259c36cb,2024-10-03T14:15:04.650000
CVE-2023-23775,0,0,100cd54cb9bd33e56092aa83c10e5d745e3a11c915213a7bf9f605592a4df0fb,2024-06-13T18:36:45.417000
CVE-2023-23776,0,0,e4d868e25628a0571e2d4adcd420753823972e9cb6bf507b34ee15a5838fb421,2023-11-07T04:07:56.713000
CVE-2023-23777,0,0,f9219db9ce9cf807369ca7f6c630ff2b1a0f1f8cb918124a9c63d7637b4197eb,2023-11-07T04:07:56.950000
@ -224605,7 +224605,7 @@ CVE-2023-32555,0,0,c728acf72b7a1d4f7c831a58bcf66f934b1ce492ab6e5c18291e2e693aed0
CVE-2023-32556,0,0,6dec37f849d3e1e1c0b3205050297f254cec1796a2790537c31d6af6a3f11566,2023-06-30T18:00:20.683000
CVE-2023-32557,0,0,b2b8452476edba0c917a1416c0ce59b5740f5a7b6e6977aaf68e606ed6a9199c,2023-06-30T18:00:02.733000
CVE-2023-32558,0,0,1ecbf1be3da70340a43b87e72380d18d7b95285ef71ee4173e2c812171e8b91f,2023-12-04T14:57:36.603000
CVE-2023-32559,0,0,e0dbb9f7d41574b140e86d1287d44d244aec4bba59d49e3309387905e91ce029,2023-10-24T17:48:55.097000
CVE-2023-32559,0,1,2321bc288e22033e60c6bdd9b50d1d93922e76e0312022e0af5829c890c4c5ba,2024-10-03T14:35:05.690000
CVE-2023-3256,0,0,43b7430ab15bdc1a7b1f21a50d45b63e77b226e577e7a4f2701e15ab008d375e,2023-06-28T07:23:02.007000
CVE-2023-32560,0,0,aa8d2244c733a6594e92d842f5d7ccd25e05a73baa5d958de92bc8fb36fa645b,2023-09-18T16:15:45.240000
CVE-2023-32561,0,0,8b9cf91de88fec9f841b56e973e1e6c654d3c335789143c3d1df9c5aaae2e35c,2023-08-16T13:04:53.757000
@ -227462,7 +227462,7 @@ CVE-2023-36539,0,0,4e965c290bb96df6ee863b2be075f02bab55edcaa147fa532567387b1a47d
CVE-2023-3654,0,0,6c06260a9bd1d9a2cdc503513447bb73861a43e7934488e4e3446dc4edd9202f,2023-12-28T15:20:38.820000
CVE-2023-36540,0,0,861829e58d088a63800ef680947cf6bf4ffcc9ac0a2838a1ec4824b32dbb6ba3,2023-08-11T14:22:03.803000
CVE-2023-36541,0,0,e55bb5471251c6a0e5cef8bf84e95d30a7b47790bdd7d06319560aaf7fc21fae,2023-08-11T14:09:26.950000
CVE-2023-36542,0,0,421ae7ff12dca9fe7de595678563fb38d23734e9b3a391184476825be3643e57,2023-08-03T19:09:29.110000
CVE-2023-36542,0,1,0b6bb065c7943f8b82ff0e2fe36ce2ba66218052ff25e2983664f2e6675cf099,2024-10-03T14:35:06.660000
CVE-2023-36543,0,0,0734dfc9725f8e975a674e13e7927ffdc50a3a2bdec17d608f1fa0549d430099,2023-07-31T17:47:45.703000
CVE-2023-36546,0,0,31857bbd5881d784c730c802a34523a15f5d596592bbe6be1dbb93820394698a,2023-12-31T03:15:45.950000
CVE-2023-36547,0,0,ef06f9fe91c67a48e451bd0da3296a561286392390cb30a64a37736c04e30330,2023-11-07T04:16:36.957000
@ -228159,7 +228159,7 @@ CVE-2023-37423,0,0,657cc27f26321a426ae194eaed563e39a46183020769ee4b5a28974fac3ea
CVE-2023-37424,0,0,7a500a3d341d1376218e7a14cad25739e299cd8bd1d318ce550cca9c2275e8ff,2023-08-29T19:55:51.197000
CVE-2023-37425,0,0,a6d48c9390d08ef562719b4824431b2d166f276060e98dbb0f0febcdcb3a8875,2023-08-29T20:18:00.600000
CVE-2023-37426,0,0,aba2e1383adbc7e95ad8d3563a5f28d8cc63cbec507f1f20067cb7d4f32987ec,2023-08-30T14:21:34.413000
CVE-2023-37427,0,0,8bf88b04ec527e222ce17d2f0127139444db14987eee8095bf2f43d271762ad4,2023-08-29T20:32:01.987000
CVE-2023-37427,0,1,44911667ac39632b70396c7d0f395ecf6ba92e38173c7afb6525f77225306738,2024-10-03T15:35:05.163000
CVE-2023-37428,0,0,8555065951b9357c20c97b8665aec685d0ba90aace56586f39fe1eb715a1c820,2023-08-29T20:36:16.033000
CVE-2023-37429,0,0,7fb0ae4092d88671d0eb870f1ee8e7f643cc6870e943f9ac1b71439e9cabf223,2023-08-29T20:23:33.733000
CVE-2023-3743,0,0,7ada63b351a8060672c4de5fb6337b8ae380a47f34900e3c385fa12ec87e6d03,2023-07-27T03:44:01.503000
@ -229222,7 +229222,7 @@ CVE-2023-38654,0,0,d5da7efee59b143650e5a1a9bfb66e30bd1968b898fbc3f468bbdc7508ffd
CVE-2023-38655,0,0,b98c2b1f64a901cfc691edb6115e39af3112522909409c6f7fea71885902e171,2024-08-14T17:49:14.177000
CVE-2023-38657,0,0,a2a4c0ec9cb2b71e3fd8704689117b4215a0faeef705fa5ac4c2a06139df7981,2024-04-09T21:15:14.507000
CVE-2023-38665,0,0,7a043e25fd13aea06df0bacb1ee9f1aba5010928024a974612a1f20bbc87f224,2023-08-26T02:24:51.260000
CVE-2023-38666,0,0,be7a0a0d7c0dd2ad8a44d351e6c1253bbf469d8bcb2c3a364ea07ec4999ae30b,2023-08-28T19:46:35.200000
CVE-2023-38666,0,1,eb18370526bb42b4fe0aea67f1269d63f1da7afd6115718f2ec8812155587d28,2024-10-03T14:35:07.243000
CVE-2023-38667,0,0,9516b35ea14322d7fdf9de768b4eb1c0d42996b2dba82068790de63c34a3f991,2023-08-28T19:40:03.987000
CVE-2023-38668,0,0,dcdba94dd0f50886384a8b9051caa3dd7adb54ad20852c06c30a085b6a3b0287,2023-08-28T19:38:54.383000
CVE-2023-38669,0,0,46c6993324eb92338d2416b156cb82df12e12ce5c3a9d4f4ed2901d1dae9d7a8,2023-07-31T18:11:19.087000
@ -237609,7 +237609,7 @@ CVE-2023-50372,0,0,77d3eda04dcf3ead805f8aaad9b4a65f74ec7b5fa0de5275318bbe6f450e4
CVE-2023-50374,0,0,741e5ecdf2a4f3a8c114688967a787301af8a5744f3810a7580d881e06e3140d,2024-03-28T12:42:56.150000
CVE-2023-50376,0,0,9f4800a713b03acd5dbaaf25515ed7bb15dd6d82eb94edee0da96b4393e83a40,2023-12-22T10:13:15.320000
CVE-2023-50377,0,0,2abdc9355cf0ae124f8a68fc7aa0148bddd355a65140572d92462a10718614ed,2023-12-27T21:34:56.883000
CVE-2023-50378,0,1,5564fb5e6c180d20fe546f0606ee0df0a4fdd54300b3aeda7a7bff0b23cd8e20,2024-10-03T13:15:14.113000
CVE-2023-50378,0,0,5564fb5e6c180d20fe546f0606ee0df0a4fdd54300b3aeda7a7bff0b23cd8e20,2024-10-03T13:15:14.113000
CVE-2023-50379,0,0,cdb0ea51be74f72f18a15893bfd649ddedd140ff8b8cba4f5926ec40db2ffa73,2024-08-13T20:35:01.483000
CVE-2023-5038,0,0,9789d7fc270f8e24fcc77f799772d0318c958da77096b1da9df8aa6a81266b91,2024-07-02T18:09:41.080000
CVE-2023-50380,0,0,52c01bcef20d58c11962cce47a3b1b2a4b157ab99e7cafdac7eb04f9cba32099,2024-02-28T14:06:45.783000
@ -243217,7 +243217,7 @@ CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bb
CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000
CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000
CVE-2024-20303,0,0,393665d251452d2f76b8a508b1c314e9e2878d06110c2d34091d44dcf2cc0a6d,2024-03-27T17:48:21.140000
CVE-2024-20304,0,0,3812936275e0a166362c6d7eaaeefb6bce56f66dc1bd8b9bf9cb5cda78792939,2024-09-12T12:35:54.013000
CVE-2024-20304,0,1,e34ac641b8092064fa1f126fa5ab59523cef65e740de9c7a6cfc5de4e10cb92f,2024-10-03T14:20:07.680000
CVE-2024-20305,0,0,e4850a7e4dfd71e4153c0c643b6c021aca041e6b1000ad76e287dea34422e456,2024-02-15T19:56:38.910000
CVE-2024-20306,0,0,a55540a2cb6844d768b14dffbabe4bb78cc3a5c4d9558b64001a5a52e8d62bc6,2024-03-27T17:48:21.140000
CVE-2024-20307,0,0,c9b1980d050b3fffe9b920134a5cc15d4bc4342c9015ce0f25b18451c8603eb9,2024-03-28T02:01:21.693000
@ -243315,7 +243315,7 @@ CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992a
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
CVE-2024-20432,0,0,9afe8e56de2f474245e53b7438e12b65e4560d02a3f69fb1fa2454f77ac4ba13,2024-10-02T17:15:15.550000
CVE-2024-20433,0,1,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bce20,2024-10-03T13:34:37.547000
CVE-2024-20433,0,0,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bce20,2024-10-03T13:34:37.547000
CVE-2024-20434,0,0,880e05acefa3209e23abe1c6ab99bf4f9ab4fd2e1403678e2af13f0c181f3b38,2024-09-26T13:32:02.803000
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
CVE-2024-20436,0,0,41bc6e4345819d91a4b8a7e2df98b24823b53ecbe6191936af5242501e9ac76c,2024-09-26T13:32:02.803000
@ -243369,10 +243369,10 @@ CVE-2024-20502,0,0,d74f0b09c5dee90f57b924ab4201829613a75c79e268f8c28a0b20a1368ef
CVE-2024-20503,0,0,e85721e4e1cede24d93f2a47467ca55ab63c155dde7e0c41a923091bcc7e874a,2024-09-13T19:24:37.420000
CVE-2024-20505,0,0,3cc28c634084a10df250df318d1f65f6c920a21d5650beb89eb991b35e09151f,2024-09-12T17:28:47.010000
CVE-2024-20506,0,0,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3413,2024-09-12T17:26:37.643000
CVE-2024-20508,0,0,a4fe0896946d7cf41903535dbf2f0ff3799c2bdde7a0579e98abf95ba0605e78,2024-09-26T13:32:02.803000
CVE-2024-20508,0,1,0768ac64a8260ad45d8462ad7e41dbfa97c47e8f324d81868ad4103c1f94fdd9,2024-10-03T14:43:23.810000
CVE-2024-20509,0,0,73d5d98bf1f2b5bbc7fe8e16d7899127aeb3768c96ded8809b59effda16efc6c,2024-10-02T19:15:14.997000
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
CVE-2024-20510,0,0,77e73cd6363cb5f1f2bcc9093ebb94dae24f275478be794b11c101171344660f,2024-09-26T13:32:02.803000
CVE-2024-20510,0,1,6fbdd0fde11e7a17f48951ee8a4206d5b5c8d1dcebb95035b098d9f8dc980dca,2024-10-03T14:52:22.627000
CVE-2024-20513,0,0,8d7160be237827756b31b5e1e02cb410eb974b0a6e1ab0ff5d50700db62e50a2,2024-10-02T19:15:15.210000
CVE-2024-20515,0,0,0d1ea5fc0395aeba8d912b33829b73c6e969e0e6b8085212bd58f0a2b6be4bc3,2024-10-02T17:15:17.973000
CVE-2024-20516,0,0,07c81f6263ffabf8b1d2a73001a0fcf7e8a4965f15caa0bb6884fc278b2b4a16,2024-10-02T17:15:18.200000
@ -246338,7 +246338,7 @@ CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73
CVE-2024-24792,0,0,fc8d65092f6cca5efb8fd01d1ad855c18addacabc045b62e3e589a869025923e,2024-08-01T13:47:30.627000
CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000
CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000
CVE-2024-24795,0,1,9b9dd61f6278a2805f43add70bd5f500b812e3c07bf29007fae7bbb2713c297e,2024-10-03T13:15:14.233000
CVE-2024-24795,0,0,9b9dd61f6278a2805f43add70bd5f500b812e3c07bf29007fae7bbb2713c297e,2024-10-03T13:15:14.233000
CVE-2024-24796,0,0,292fd4a31399bba86c5730ef4bd877b625e772494a5146bfd46b725d130f455b,2024-02-12T14:19:54.330000
CVE-2024-24797,0,0,40724d1d3e1a03ea7253bf27a8e4cea3180b132258b4b1bc361005ab1c0591b9,2024-02-12T14:19:54.330000
CVE-2024-24798,0,0,cd85ec8a42d6d377caab8567c4fbee58fe370929d305cf392fd538d90722fe41,2024-02-22T19:07:27.197000
@ -248359,7 +248359,7 @@ CVE-2024-27311,0,0,3441ff0e665052a7fb86a3589fae526973b499df9f488dcbbb9db7b9aaef9
CVE-2024-27312,0,0,5679d7053fa0bd24d93903a7d36eae1bf666d1c510eebbb175d9510db4771ea1,2024-06-07T09:15:11.640000
CVE-2024-27313,0,0,f9f7791913eb1885e62d83245c35ccba6d007456c7c99efcf6385be05af20927,2024-06-07T09:15:11.917000
CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000
CVE-2024-27315,0,1,5ba82d5c4ef5dbb4fc46c5f81fcec5fa18de9367a2c6fed64ba7b45e4eb8a0a0,2024-10-03T13:15:14.710000
CVE-2024-27315,0,0,5ba82d5c4ef5dbb4fc46c5f81fcec5fa18de9367a2c6fed64ba7b45e4eb8a0a0,2024-10-03T13:15:14.710000
CVE-2024-27316,0,0,102105139fcfc876580c7206fba57ae17631b403098c79f616e87bd492a5d28f,2024-08-01T13:48:22.100000
CVE-2024-27317,0,0,c4936bf6b1ea8eb440227e5af31c10ab09a9d8539bf9187002383935723d45e1,2024-05-01T18:15:16.097000
CVE-2024-27318,0,0,bb1e039cfeff54678be2a3d7675b064a42975817bdfb0398be1540195f1fd295,2024-03-30T02:15:08.007000
@ -251529,7 +251529,7 @@ CVE-2024-31864,0,0,dd401fd2f9c38e157d115772d6fe233b1887a6b2c7d0eb5183b48c430298b
CVE-2024-31865,0,0,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000
CVE-2024-31866,0,0,4d372d14b7807ced8e821f43a5c883c03fa5dbca9edfba0af795f01513fe30b5,2024-08-21T15:35:08.187000
CVE-2024-31867,0,0,7c90191082994197ce09c1b6019992176f2d76072856e8d65beb1a7b6ded7916,2024-05-01T18:15:23.740000
CVE-2024-31868,0,1,703c16597751f17fba32c3b61a2e58921496411599e95e2472502f1bbb33ada3,2024-10-03T13:15:14.833000
CVE-2024-31868,0,0,703c16597751f17fba32c3b61a2e58921496411599e95e2472502f1bbb33ada3,2024-10-03T13:15:14.833000
CVE-2024-31869,0,0,683e8c771fda682074fc448ea32be7db8fcec1e782121eb87243bff930796032,2024-05-01T18:15:23.843000
CVE-2024-31870,0,0,089cc53c4c4bda98698ee28fa3173d546c896f43008726ca3e29a627fc47e14b,2024-08-01T20:37:52.127000
CVE-2024-31871,0,0,7b402a738ae8306e1005160b5cd3c0ef58a4e7f0d19a95a39021f1b2af76b2f4,2024-04-10T19:49:51.183000
@ -255187,7 +255187,7 @@ CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4d
CVE-2024-37018,0,0,5c84c294f6633e4746e32fd18cb412c8579660145e88eac3a32eeb7275210f3b,2024-08-05T16:35:12.763000
CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000
CVE-2024-37021,0,0,df42b273589de5447bead7df7667049e2658c880af6df99f8ec35df9bab3713a,2024-06-24T19:26:47.037000
CVE-2024-37022,0,0,751bf85c3a2469952ed35738f159026027aa22116052dd4c21287b6f73e28344,2024-06-13T18:35:19.777000
CVE-2024-37022,0,1,c89ab136485bb25fceb1ebadf25398758307a2b39977d566fcb7ed1a8d501728,2024-10-03T15:55:56.250000
CVE-2024-37023,0,0,8524a0bea62903b02ec8e898aba28cae243223cb44baaac206a78705a8ec65f8,2024-08-20T17:12:03.330000
CVE-2024-37026,0,0,72a4b17689cbdac04fb86cce78128e997cb4a2e097881aab9fb79c35d7ec4f49,2024-06-24T19:26:47.037000
CVE-2024-37028,0,0,b7e9c99e1fd0ecec6eefdacd33a3c9c912ef383532f72bb887cdccaeaf455e4d,2024-08-20T19:26:49.730000
@ -255373,7 +255373,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5
CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000
CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000
CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000
CVE-2024-3727,0,1,48bca9045cad80f14911a8b8f5c5b80f4598f353999b02f0ba08ae113eb9a6d0,2024-10-03T13:15:14.953000
CVE-2024-3727,0,0,48bca9045cad80f14911a8b8f5c5b80f4598f353999b02f0ba08ae113eb9a6d0,2024-10-03T13:15:14.953000
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000
@ -257846,7 +257846,7 @@ CVE-2024-41118,0,0,e0eee055fbd470e0628dea6d9d48cfe33859b8a44e08917376e3579ed1fec
CVE-2024-41119,0,0,2b2d1362b1256f26b7e3456598dbc750a32abaa8055aca23aed136bade558c26,2024-08-26T17:33:31.573000
CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000
CVE-2024-41120,0,0,a70d4faa55c7ddaaf93976569e1c96bdce498cb1f9f22f75468c1ec57f8b4cef,2024-08-26T17:33:33.787000
CVE-2024-41121,0,0,eee6567dc6068e4098c4ab7d1e6ecee46fc76012014594fbc00d63fe0ec66f03,2024-07-22T13:00:53.287000
CVE-2024-41121,0,1,bea21b08d051d8c42c463458d320e0eb696c2a382d886d5d5d09d5e1f0c107ea,2024-10-03T15:57:31.917000
CVE-2024-41122,0,0,db4a015145ff1fc63debc38645ec64fd0c8a278e5cdafdcde4b59bfb53ec7f9b,2024-10-03T01:23:07.177000
CVE-2024-41123,0,0,1b9d0ba5e0ca489b31c9b708600ddad032ff5087a77d385d50002a73b3acee12,2024-09-05T16:12:21.557000
CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000
@ -258059,7 +258059,7 @@ CVE-2024-41637,0,0,55c2ebf6d4e1b5a52e76380fb54fc17a20ca604f4f925dc181c059611f7f9
CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000
CVE-2024-41640,0,0,e47a891501f4a329b23b2dbd7c116fd0a7d1e20a1507ac69c43fc4a30ce697d7,2024-08-01T13:59:01.527000
CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d77,2024-06-04T19:20:31.500000
CVE-2024-41651,0,1,a38f43b3a3520b7ed798424485f4504fecba42b85436a923398276750efda20d,2024-10-03T13:45:15.070000
CVE-2024-41651,0,0,a38f43b3a3520b7ed798424485f4504fecba42b85436a923398276750efda20d,2024-10-03T13:45:15.070000
CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
CVE-2024-41657,0,0,a42a5606a1117689a3813ccf13de868ed46700bc2cc392be931df01456b9a289,2024-08-28T16:13:35.140000
@ -258708,7 +258708,7 @@ CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac34
CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000
CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000
CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000
CVE-2024-42495,0,0,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000
CVE-2024-42495,0,1,8ebc1a00dc53eedfab68d1d85789107076a6bdc2caafa76b97c0acbaa101b555,2024-10-03T14:09:24.283000
CVE-2024-42496,0,0,82629bcd722b8cb6d341bed3916823c994361fb6b4946b9099c29ac012cbc5a4,2024-09-30T12:45:57.823000
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
@ -259878,12 +259878,12 @@ CVE-2024-44967,0,0,89dfada01527c8edfcdf75e8d03ff9e48cea3fb292c10119a2487efa60d42
CVE-2024-44968,0,0,125d9977c95cd27fad067d65cfceb4b033cca732bc912f36769ab80d593425a2,2024-09-05T12:53:21.110000
CVE-2024-44969,0,0,66b82aa80b6cd92846532cef33b442d38baf22d6911e941514910b3c6f435cd4,2024-09-05T12:53:21.110000
CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000
CVE-2024-44970,0,0,70414797c7f1420a60b48e34277f5530ec1aa67aed6a07d8d2aaeded9223b4e0,2024-09-05T12:53:21.110000
CVE-2024-44970,0,1,a0c972c9454393f34fe641aa01c10b896e146fef1478fb5744dd0af04f26f88c,2024-10-03T14:22:06.003000
CVE-2024-44971,0,0,44403d9889954211cee528d64ed0dc86351f6fa04277308e5630c2d58c6cab86,2024-09-05T17:54:36.607000
CVE-2024-44972,0,0,0b967112ef26e3fe5b0935b427f88208867173c88daf36aa5bd2c336c4f07e64,2024-09-05T12:53:21.110000
CVE-2024-44973,0,0,add414a58e878f3aee3366f7678bfde348bdae69c48419c508ba030f370d1ae1,2024-09-05T12:53:21.110000
CVE-2024-44973,0,1,6da77340a818d4254bbf05ca91b8c65562f8d826d87a4df556d42cceb3d012ba,2024-10-03T14:23:09.147000
CVE-2024-44974,0,0,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000
CVE-2024-44975,0,0,012dcb6db335aa97afa1ef9268f931ab68a445b973fc3f10a7843af27070943c,2024-09-05T12:53:21.110000
CVE-2024-44975,0,1,259cddaa128c9efb6ec303816aae245e7b8378b15a62da050b41a2aa6ef90c6f,2024-10-03T14:32:31.677000
CVE-2024-44976,0,0,8c7b930f69a8eac68da6855eedc8b3a97b1051cdf631749b93c2aaf1d2a28ef8,2024-09-05T12:53:21.110000
CVE-2024-44977,0,0,8267c668040f19c89ab2180e788476dee75d30c69bd18b77721b380cd5039fc4,2024-09-05T12:53:21.110000
CVE-2024-44978,0,0,86121d29302acc1da31190cefab002b1ff26f43dfa1aaefb7afb57e51681158d,2024-09-10T16:51:19.813000
@ -260185,7 +260185,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
CVE-2024-45519,0,0,fa140d1675725778e9e785d428af96f9489ad2c8a138efe13b2b5fa63ae35161,2024-10-03T10:29:17.337000
CVE-2024-45519,0,1,4cdc6ef5b3f28e4973fc8d20c8d8dfc3492fbd1690c441363b08deedcdc04029,2024-10-03T14:07:15.123000
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
@ -260284,7 +260284,7 @@ CVE-2024-45800,0,0,e84cff012b7d4b74db66a83e7b935dc1edfec9ef774b30490760e7407aa53
CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd025,2024-09-20T12:31:20.110000
CVE-2024-45803,0,0,229c857bfa292cdb0ba4078b3fbf512c465922b11345a00889b8daf4243936d0,2024-09-20T12:30:51.220000
CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000
CVE-2024-45806,0,0,de5a5f2070ab39db91e2e553d78007d5a1a5d7d06834efbe23ad7d761bf487e5,2024-09-25T19:02:57.757000
CVE-2024-45806,0,1,1c3174f121e417f27357dc7dda16a1e2c4833f0b06507c11184f179d784c0a2b,2024-10-03T15:36:55.557000
CVE-2024-45807,0,0,109f977914214954b1d4c58b77a41ab231481644c3f0d5e0c1a61fe3a8137355,2024-09-25T17:12:38.380000
CVE-2024-45808,0,0,e0b8548e8c97a2dbe35aa53aed4f22546b5e8aaa33f6c0d1789ad77d012310d8,2024-09-25T17:18:38.823000
CVE-2024-45809,0,0,61a35443140d3227d7a81e1d73cdcea190bec5c7e8b6089514de0625aa5d92ef,2024-09-24T20:12:24.597000
@ -260751,10 +260751,10 @@ CVE-2024-46858,0,0,49cb83621376018f4b52cc3254920fbddd535744ae8d27d488860900395f7
CVE-2024-46859,0,0,219881cf57e0abd9fdd1246bb95fa67acffa1997ce6f943edb640b7145167614,2024-09-30T12:45:57.823000
CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c891096,2024-06-20T20:15:19.483000
CVE-2024-46860,0,0,da16c5af34531df299c8ad7ccf3e24722b563106cc1b923e33d44e44e1ad84df,2024-10-02T14:04:38.863000
CVE-2024-46861,0,0,c6ebac6253a83dc2f920da893d314648878d5859bee9d7cdfe7dfd4445c9abef,2024-09-30T12:45:57.823000
CVE-2024-46862,0,0,8ed5b69c03f390ff3625d3e803e9cc39c3a1ad18d3dc6c15990d96abef3f3d32,2024-09-30T12:45:57.823000
CVE-2024-46863,0,0,d79d5950a88e299aa0f19f6f5fd912414b163ffb8236ed8adb506b0f7f1da245,2024-09-30T12:45:57.823000
CVE-2024-46864,0,0,7d2f080e7db77c9466322e29001d51d095accf0776afdc67a3f06d6f74dcfb0f,2024-09-30T12:45:57.823000
CVE-2024-46861,0,1,9e8f7b0f13ff63b9a336836ea09f525fdd1febd70ac4a410d34fd40c40ac2639,2024-10-03T15:36:06.543000
CVE-2024-46862,0,1,832f890fdcc85de47e1ed2bc52569e350171cbfc6fb1e5a250686e929744d8e2,2024-10-03T15:34:46.227000
CVE-2024-46863,0,1,8134580c2780c4c1167f949de82c461dc6d85c03d663f93afdbb2baa28cc7309,2024-10-03T15:32:54.497000
CVE-2024-46864,0,1,a7b0d6c50d6bbe73deb4d9fa832ec942fe84547f89542993a6debfa8de30cffc,2024-10-03T15:29:34.927000
CVE-2024-46865,0,0,70400171a0d2a2312b59685baa09016386611f4b8aeadb49b1f9b8d88baf7690,2024-10-01T15:57:28.990000
CVE-2024-46866,0,0,7cef57a183dfaf103a48ea5a6b9019d1b498c14fc94b38d115a386f51427cfd4,2024-10-01T17:09:30
CVE-2024-46867,0,0,8316d7997f273d3e067642701a8234592f3f2c26a3648af1f12dc5cbdd0c27be,2024-10-01T17:09:58.147000
@ -260832,7 +260832,7 @@ CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa
CVE-2024-47078,0,0,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
CVE-2024-47082,0,0,1308a2a31af2cc56619224d4839a59b43bea81793244865a2d1ff9a5500281b8,2024-10-01T20:01:13.367000
CVE-2024-47083,0,0,5b490c0fd8cdac8afed0a02d02ba8fbf5e1993a5d9b09690e4aa8f97b99a9224,2024-09-26T13:32:02.803000
CVE-2024-47083,0,1,9f0f8f8e78b5ed1a065825a55f34b3ef3e9db7af7ca41f6fc7c1cda9271f0e45,2024-10-03T15:11:29.913000
CVE-2024-47085,0,0,52609fda0dd3268fb54a4c4835942301029b5f82b7a9256b81c2395928ebbe9b,2024-09-26T15:30:47.787000
CVE-2024-47086,0,0,170e19d2a5f94228d179fe1c43d4342418d894a17ee62d0745e0ba04130a0c3e,2024-09-26T15:29:47.233000
CVE-2024-47087,0,0,00c0418dcbaa10bdb3121773be01ff0430232cec071716dead5062981f005e75,2024-09-26T15:25:51.467000
@ -260946,7 +260946,7 @@ CVE-2024-47534,0,0,671e6c0c25dde8e26f9c5f40d1c53b3b411fe0b9cd99c946b70166162df34
CVE-2024-47536,0,0,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
CVE-2024-47554,1,1,a6a08e7ba4c3d06cd09f47147e9e1395bcd7f8c1114bee9a753963aed9ce8ba1,2024-10-03T12:15:02.613000
CVE-2024-47554,0,0,a6a08e7ba4c3d06cd09f47147e9e1395bcd7f8c1114bee9a753963aed9ce8ba1,2024-10-03T12:15:02.613000
CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000
CVE-2024-47560,0,0,5caab4f334b489685c2797622a0e89a871740bd9a0b0ebcc5ba80ebc1f75f752,2024-10-01T02:15:10.143000
CVE-2024-47561,0,0,f808d062f4ff2c7058b286154335a34d7670db94cf28de23d05dc84209df1a81,2024-10-03T11:15:13.510000
@ -260960,7 +260960,10 @@ CVE-2024-47609,0,0,555d6b2b05ef097d6f46eab3f45f164bfb9fab39f1ce72e0c1426713e9aa4
CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000
CVE-2024-47611,0,0,b926e9df1217329843befb987d6ebbb03fb5af9de6c2becfc5849934dc4fb029,2024-10-02T16:35:34.060000
CVE-2024-47612,0,0,1981a610491546210a30a6a2dd9f593698e6ec4275e7e7b83130f7f983dd1587,2024-10-02T15:15:15.133000
CVE-2024-47614,1,1,5adcca0930f8074bc2d09270af94a2090c38bdf85966129177b2aad805b79757,2024-10-03T15:15:14.720000
CVE-2024-47616,0,0,a7d3f503a853c11898853a62534bb4f89f4a718fdcf53427abfb02951598aa75,2024-10-02T22:15:03.010000
CVE-2024-47617,1,1,5e38829b22784c5c123a9364978681089e70a59d7e2f900ec4a5f2ff0e0d1f18,2024-10-03T15:15:14.937000
CVE-2024-47618,1,1,a43adc5787285f733831a204181d4bb30a8299d5e1d5e8c35eb826dba7f3f276,2024-10-03T15:15:15.147000
CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
CVE-2024-47641,0,0,d8a923752c07b02ea5386415a7b0ad8cc8f9093d938474666f31f411f6951ce8,2024-09-30T13:15:02.570000
@ -261880,6 +261883,7 @@ CVE-2024-5799,0,0,7dd7f7ea5b6fee89dd0eb91dacd880561304ae591d99359107b4e3e905c13d
CVE-2024-5800,0,0,a1cb578d92a5ce21abf5c6c3a9df30d0f15dec959b83eaaecf5cab603de30571,2024-08-12T13:41:36.517000
CVE-2024-5801,0,0,668584c28d68f34806b15aa23a003fb18ba18cb7fb2d24326345f03f0e3dd0a3,2024-08-12T13:41:36.517000
CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000
CVE-2024-5803,1,1,f9a58c1ae7f8f547401f8d3f312040c3a2c345231f4deeb852da86c798cfc58c,2024-10-03T15:15:15.310000
CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889be,2024-07-22T13:00:53.287000
CVE-2024-5805,0,0,c6bd0a254f95da4bac1aa9af34b5a1c8bce84a0c9ec724d2acad9f30a83ad74c,2024-08-20T13:37:58.923000
CVE-2024-5806,0,0,91588fb1cdb8115c3da665d3d031e599ad42ef712f85a57d764591dd0370421d,2024-06-26T00:15:11.293000
@ -263308,8 +263312,8 @@ CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f1
CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
CVE-2024-7575,0,1,e8306ce8528f787b0f27b2039d1a16892d7951cab83d446a20e0ed4cab1e1e05,2024-10-03T13:52:23.060000
CVE-2024-7576,0,1,ad2ce82276f1a964283944ed6b944663079e7c079e234b4885459f999bb6f2b6,2024-10-03T13:51:45.997000
CVE-2024-7575,0,0,e8306ce8528f787b0f27b2039d1a16892d7951cab83d446a20e0ed4cab1e1e05,2024-10-03T13:52:23.060000
CVE-2024-7576,0,0,ad2ce82276f1a964283944ed6b944663079e7c079e234b4885459f999bb6f2b6,2024-10-03T13:51:45.997000
CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
@ -263905,7 +263909,7 @@ CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e00
CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000
CVE-2024-8395,0,0,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000
CVE-2024-8399,0,0,ff5a0b61b9891ed649233268ce0fa37bd0b7c79ba8aa2863ea2ecc61c35c709c,2024-09-12T19:45:07.347000
CVE-2024-8404,0,0,1a8f7c90ae4839e29c3ee7baac93c7ffbd2488d21ade054856933c21be4bdeda,2024-09-26T13:32:02.803000
CVE-2024-8404,0,1,945e9eec22e9214ed455520b695d919afbd1adaf6153f6675337e3115aa9e84c,2024-10-03T15:19:28.293000
CVE-2024-8405,0,0,b5a88bc76e184307ddd2beb081f39e50ae83f9779c678cc8991166da3c096aa9,2024-10-03T00:51:18.313000
CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000
CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000
@ -264079,7 +264083,7 @@ CVE-2024-8688,0,0,029257a651f738e9f27877382144b226fa4512857c7fc61efd2c2ae6b87c68
CVE-2024-8689,0,0,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000
CVE-2024-8690,0,0,67e41d4fc2072d70d0779ce07b487cc96378ea1bcbe929aa92f47f625147a8df,2024-10-03T01:29:08.547000
CVE-2024-8691,0,0,f96faf45862018fb84a309de389ab9aa82dfec00eb8b1dbabab5ce1078a13abe,2024-09-12T12:35:54.013000
CVE-2024-8692,0,1,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000
CVE-2024-8692,0,0,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000
CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000
CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000
CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000
@ -264270,6 +264274,7 @@ CVE-2024-9091,0,0,3bfc998290a11bc8fab6cf9f3d600eed6ee69250246e343c9bb59fcaa6e75f
CVE-2024-9092,0,0,1c2c646de9ea2ba79bd5c01f3c6adbd97c309ff9880a784404443eb5dc670a7e,2024-09-27T16:23:56.710000
CVE-2024-9093,0,0,9c381a723dcd5a5c3a6becb1e39558bfddcf6d2d39bab32327672c3bb7182479,2024-09-27T16:26:27.163000
CVE-2024-9094,0,0,0e308d006c94a8d09d0a4caea6001ec02d11744a78c5f3fdfc5f94ed1a0ea22c,2024-09-27T15:54:09.463000
CVE-2024-9100,1,1,fbe247947d5abdf28dd1c0db917e0aead6ce1b77d0e6c741cc499f25429f5341,2024-10-03T15:15:15.553000
CVE-2024-9106,0,0,b4be78e84ae8affb4a6d454a9d1990e653bbd687f661444a18343032f03a5c6f,2024-10-01T08:15:05.267000
CVE-2024-9108,0,0,b104d3449df77c856d6774bc902449a0006458d06f65471d2757d674caf86c47,2024-10-01T08:15:05.480000
CVE-2024-9115,0,0,1c4e70138ee9590ca65c2e328b29e5a87d064a3f49c7286913d14c3952d00fc4,2024-10-01T13:47:25.403000
@ -264297,7 +264302,7 @@ CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2a
CVE-2024-9172,0,0,199bb1885edbaf3e5cf8cf5bf50588b7a1520bf934b902a33238e0075b79a13b,2024-10-02T08:15:02.960000
CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb506,2024-10-01T14:12:41.293000
CVE-2024-9174,0,0,b84c9c7a9f9cd2234390c1ae1f1de568c65321ae63b8ba2386d7dc05a067988e,2024-10-02T06:15:10.387000
CVE-2024-9177,0,0,538b136929b66f2da77b71c4f345460987a86315e3e44122bd269ab3a2a9e52e,2024-09-30T12:46:20.237000
CVE-2024-9177,0,1,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68ef,2024-10-03T14:32:46.150000
CVE-2024-9189,0,0,6fc70667b6c052aedd9065fd849720c6949b418d7c844ad831e0ce3249ae6d1c,2024-09-30T12:45:57.823000
CVE-2024-9194,0,0,24e26748ef3bff41d7a06efd6c027f138154eafd040f89b986b59a112235298b,2024-10-01T15:35:17.550000
CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000
@ -264342,7 +264347,7 @@ CVE-2024-9299,0,0,0e06149ad72b9bceed8023fce5d46e4c2d87e230ca1e26b3a70118742de53d
CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961c8,2024-10-01T13:34:58.760000
CVE-2024-9301,0,0,73ba33e42a5a66e63775d86ddfdf57e7a04bcd9ceda925406fc4894f153c084a,2024-09-30T12:45:57.823000
CVE-2024-9304,0,0,77296627b4e73471315e7e445cf2a4183f5c2120111f84509ea16b607bc5907e,2024-10-01T08:15:06.943000
CVE-2024-9313,0,1,533b0d999ec7273986b8e84d0a0b2d019578bc94f6735184fe1b7224c917a32a,2024-10-03T11:15:13.940000
CVE-2024-9313,0,0,533b0d999ec7273986b8e84d0a0b2d019578bc94f6735184fe1b7224c917a32a,2024-10-03T11:15:13.940000
CVE-2024-9315,0,0,dcae3590349756096f3149f913fcd278d961f7a38fe3ece525d39bf3aa5da14a,2024-10-01T13:33:59.480000
CVE-2024-9316,0,0,dc1cd9e0c0f14c1ac859a7efc8a45f5e2b48ab85717e9999593b73d7873483e5,2024-10-02T13:29:29.813000
CVE-2024-9317,0,0,f67b854cd75d25217a31bdd6074d6f9f6352c2218386ab264e509a61a09e8c0d,2024-10-01T13:32:39.140000
@ -264386,3 +264391,4 @@ CVE-2024-9423,0,0,c94940e86c4d0857c214a72b7785993b36e482d8dc6d4d5d12ed70a35b4f0f
CVE-2024-9429,0,0,db0d8ee6274f5889e645bc8f06bc2c127c429edd7f6e0ee6aa8f7a2649e83d4c,2024-10-02T13:15:12.617000
CVE-2024-9440,0,0,a014a1e56d1851c7e48b58fd953e33ac08c51de3cb3a714389caa1ff00e4d989,2024-10-02T19:15:15.880000
CVE-2024-9441,0,0,384255352f00f9a9db206fa87755d8414cb6b20054a48cca8134e02f7821516e,2024-10-02T19:15:16.100000
CVE-2024-9460,1,1,c45527c9aa3bef2caa2988896eb5117783d1d1826b53f204f2918ba4014e6cae,2024-10-03T15:15:15.750000

Can't render this file because it is too large.