mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-11-07T21:00:20.924770+00:00
This commit is contained in:
parent
5d2116837c
commit
2bf1fb93fd
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-11919",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-07T18:15:15.517",
|
||||
"lastModified": "2024-11-07T18:15:15.517",
|
||||
"lastModified": "2024-11-07T19:35:00.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. There is no CSRF protection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Jul/14",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-47129",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-15T21:15:07.523",
|
||||
"lastModified": "2024-03-17T22:38:29.433",
|
||||
"lastModified": "2024-11-07T19:35:01.857",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_ct: omitir expectativas para conntrack confirmado nft_ct_expect_obj_eval() llama a nf_ct_ext_add() para una entrada de conntrack confirmada. Sin embargo, nf_ct_ext_add() solo se puede invocar para !nf_ct_is_confirmed(). [1825.349056] ADVERTENCIA: CPU: 0 PID: 1279 en net/netfilter/nf_conntrack_extend.c:48 nf_ct_xt_add+0x18e/0x1a0 [nf_conntrack] [1825.351391] RIP: 0010:nf_ct_ext_add+0x18e/0x 1a0 [nf_conntrack] [ 1825.351493] C\u00f3digo: 41 5c 41 5d 41 5e 41 5f c3 41 bc 0a 00 00 00 e9 15 ff ff ff ba 09 00 00 00 31 f6 4c 89 ff e8 69 6c 3d e9 eb 96 45 31 ed eb cd <0f> 0b e9 b1 fe ff ff e8 86 79 14 e9 eb bf 0f 1f 40 00 0f 1f 44 00 [ 1825.351721] RSP: 0018:ffffc90002e1f1e8 EFLAGS: 00010202 [ 1825.351790] RAX: 00000000000000 0e RBX: ffff88814f5783c0 RCX: ffffffffc0e4f887 [ 1825.351881] RDX: dffffc0000000000 RSI: 00000000000000008 RDI: ffff88814f578440 [ 1825.351971] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff88814f578447 [ 1825.352060] R10: ffffed1029eaf088 R11: 00000000000000 01 R12: ffff88814f578440 [ 1825.352150] R13: ffff8882053f3a00 R14: 0000000000000000 R15: 0000000000000a20 [ 1825.352240] FS: 00007f99226 1c900(0000) GS:ffff889faec00000(0000 ) knlGS:0000000000000000 [ 1825.352343] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1825.352417] CR2: 000056070a4d1158 CR3: 00000001 5efe0000 CR4: 0000000000350ee0 [1825.352508] Seguimiento de llamadas: [1825.352544] nf_ct_helper_ext_add+0x10/0x60 [nf_conntrack] [1825.352641 ] nft_ct_expect_obj_eval+0x1b8/0x1e0 [nft_ct] [ 1825.352716] nft_do_chain+0x232/0x850 [nf_tables] Agregue la extensi\u00f3n ct helper solo para conntrack no confirmado. Omita la evaluaci\u00f3n de la regla si la extensi\u00f3n ct helper no existe. Por lo tanto, s\u00f3lo puedes crear expectativas desde el primer paquete. Deber\u00eda ser posible eliminar esta limitaci\u00f3n agregando una nueva acci\u00f3n para adjuntar un asistente ct gen\u00e9rico al primer paquete. Luego, use esta extensi\u00f3n de ayuda de ct de los paquetes de seguimiento para crear la expectativa de ct. Mientras lo hace, agregue una marca faltante para omitir tambi\u00e9n la plantilla conntrack y elimine la marca IPCT_UNTRACK que est\u00e1 impl\u00edcita en !ct."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-273"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1710eb913bdcda3917f44d383c32de6bdabfc836",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48985",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:10.463",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:35:06.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,129 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mana: Corregir ejecuci\u00f3n en la variable per-CQ napi work_done Despu\u00e9s de llamar a napi_complete_done(), el bit NAPIF_STATE_SCHED puede borrarse, y otra CPU puede iniciar el hilo napi y acceder a la variable per-CQ, cq->work_done. Si el otro hilo (por ejemplo, desde busy_poll) lo establece en un valor >= budget, este hilo seguir\u00e1 ejecut\u00e1ndose cuando deber\u00eda detenerse, y provocar\u00e1 corrupci\u00f3n de memoria y p\u00e1nico. Para solucionar este problema, guarde la variable per-CQ work_done en una variable local antes de napi_complete_done(), para que no se corrompa por un posible hilo concurrente despu\u00e9s de napi_complete_done(). Adem\u00e1s, agregue un bit de bandera para anunciar al firmware NIC: la ejecuci\u00f3n de la variable NAPI work_done est\u00e1 fija, por lo que el controlador puede soportar de forma fiable funciones como busy_poll."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.83",
|
||||
"matchCriteriaId": "596123A2-9BD2-4865-9AD9-98254B11C8C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.13",
|
||||
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/18010ff776fa42340efc428b3ea6d19b3e7c7b21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6740d8572ccd1bca50d8a1ca2bedc333f50ed5f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe50a9bbeb1f042e756c5cfa7708112c944368de",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48991",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:11.000",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:36:33.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,194 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/khugepaged: invocar notificadores MMU en rutas de colapso de shmem/archivo Cualquier ruta de c\u00f3digo que elimine las entradas de la tabla de p\u00e1ginas debe invocar notificadores MMU para garantizar que las MMU secundarias (como KVM) no sigan accediendo a p\u00e1ginas que ya no est\u00e1n asignadas. Las MMU secundarias no mantienen sus propias referencias a p\u00e1ginas que se reflejan, por lo que no notificarlas puede provocar el use-after-free de la p\u00e1gina. Estoy marcando esto como una soluci\u00f3n a un problema introducido en el commit f3f0e1d2150b (\"khugepaged: agregar compatibilidad con el colapso para p\u00e1ginas tmpfs/shmem\"), pero la mayor parte del impacto de seguridad de esto solo se produjo en el commit 27e1f8273113 (\"khugepaged: habilitar el colapso pmd para THP asignado a pte\"), que en realidad omiti\u00f3 los vaciados para la eliminaci\u00f3n de PTE actuales, no solo para la eliminaci\u00f3n de tablas de p\u00e1ginas vac\u00edas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.8",
|
||||
"versionEndExcluding": "4.9.337",
|
||||
"matchCriteriaId": "3A7C6654-B729-4CE8-922E-B5675245AF0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.303",
|
||||
"matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.270",
|
||||
"matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.227",
|
||||
"matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.159",
|
||||
"matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.83",
|
||||
"matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.13",
|
||||
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1a3f8c6cd29d9078cc81b29d39d0e9ae1d6a03c3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/275c626c131cfe141beeb6c575e31fa53d32da19",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5450535901d89a5dcca5fbbc59a24fe89caeb465",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5ffc2a75534d9d74d49760f983f8eb675fa63d69",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f445ca2e0e59c7971d0b7b853465e50844ab596",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c23105673228c349739e958fa33955ed8faddcaf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f268f6cf875f3220afc77bdd0bf1bb136eb54db9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff2a1a6f869650aec99e9d070b5ab625bfbc5bc3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48996",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:11.423",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:37:27.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,110 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/sysfs: se corrige la suposici\u00f3n incorrecta de esquemas vac\u00edos durante el ajuste en l\u00ednea en damon_sysfs_set_schemes(). el commit da87878010e5 (\"mm/damon/sysfs: soporte para la actualizaci\u00f3n de entradas en l\u00ednea\") hizo que se llamara a 'damon_sysfs_set_schemes()' para ejecutar el contexto DAMON, que podr\u00eda tener esquemas. En este caso, se supone que la interfaz sysfs de DAMON actualiza, elimina o agrega esquemas para reflejar los archivos sysfs. Sin embargo, el c\u00f3digo asume que el contexto DAMON no tendr\u00eda esquemas en absoluto y, por lo tanto, crea y agrega nuevos esquemas. Como resultado, el c\u00f3digo no funciona como se esperaba para el ajuste de esquemas en l\u00ednea y podr\u00eda tener una huella de memoria mayor a la esperada. Todos los esquemas est\u00e1n en el contexto DAMON, por lo que no pierde memoria. Elimine la suposici\u00f3n incorrecta (el contexto DAMON no tendr\u00eda esquemas) en 'damon_sysfs_set_schemes()' para corregir el error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.19",
|
||||
"versionEndExcluding": "6.0.12",
|
||||
"matchCriteriaId": "188DA84C-697A-4F85-A7D6-7318514A07EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95bc35f9bee5220dad4e8567654ab3288a181639",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f98d1f2a36ad7ab48fb4cf73ca14e7b19482fd4d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52920",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-05T10:15:24.580",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:31:31.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: soporte para derrame/relleno de registros que no sean r10 hacia/desde la pila en seguimiento de precisi\u00f3n. Use el historial de instrucciones (saltos) para registrar instrucciones que realizaron derrame/relleno de registros hacia/desde la pila, independientemente de si esto se hizo a trav\u00e9s de un registro r10 de solo lectura, o cualquier otro registro despu\u00e9s de copiar r10 en \u00e9l *y* potencialmente ajustar el desplazamiento. Para que esto funcione de manera confiable, insertamos indicadores adicionales por instrucci\u00f3n en el historial de instrucciones, codificando el \u00edndice de ranura de pila (spi) y el n\u00famero de marco de pila en indicadores adicionales de 10 bits que quitamos de prev_idx en el historial de instrucciones. No tocamos el campo idx para obtener el m\u00e1ximo rendimiento, ya que se verifica con mayor frecuencia durante el seguimiento hacia atr\u00e1s. Este cambio elimina b\u00e1sicamente la \u00faltima limitaci\u00f3n pr\u00e1ctica restante de la l\u00f3gica de seguimiento hacia atr\u00e1s de precisi\u00f3n en el verificador BPF. Corrige deficiencias conocidas, pero tambi\u00e9n abre nuevas oportunidades para reducir la cantidad de estados verificados, exploradas en los parches posteriores. Solo hay tres diferencias en los archivos de objetos BPF de las autopruebas seg\u00fan veristat, todas en la direcci\u00f3n positiva (menos estados). Archivo Programa Insns (A) Insns (B) Insns (DIFF) Estados (A) Estados (B) Estados (DIFF) -------------------------------------- ------------- --------- --------- ------------- ---------- ---------- ------------- test_cls_redirect_dynptr.bpf.linked3.o cls_redirect 2987 2864 -123 (-4,12%) 240 231 -9 (-3,75%) xdp_synproxy_kern.bpf.linked3.o syncookie_tc 82848 82661 -187 (-0,23%) 5107 5073 -34 (-0,67%) xdp_synproxy_kern.bpf.linked3.o syncookie_xdp 85116 84964 -152 (-0,18%) 5162 5130 -32 (-0,62%) Nota: evit\u00e9 cambiar el nombre de jmp_history al m\u00e1s gen\u00e9rico insn_hist para minimizar la cantidad de l\u00edneas cambiadas y los posibles conflictos de fusi\u00f3n entre los \u00e1rboles bpf y bpf-next. Observe tambi\u00e9n que el puntero cur_hist_entry se restablece a NULL al comienzo del bucle de verificaci\u00f3n de instrucciones. Este puntero evita el problema de confiar en el insn_idx de la \u00faltima entrada del historial de saltos para determinar si ya tenemos una entrada para la instrucci\u00f3n actual o no. Puede suceder que agreguemos una entrada del historial de saltos porque la instrucci\u00f3n actual es_jmp_point(), pero tambi\u00e9n necesitamos agregar indicadores de instrucci\u00f3n para el acceso a la pila. En este caso, no queremos entradas, por lo que necesitamos reutilizar la \u00faltima entrada agregada, si est\u00e1 presente. Confiar en la comparaci\u00f3n insn_idx tiene el mismo problema de ambig\u00fcedad que el que se solucion\u00f3 recientemente en [0], por lo que lo evitamos. [0] https://patchwork.kernel.org/project/netdevbpf/patch/20231110002638.4168352-3-andrii@kernel.org/"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.8",
|
||||
"matchCriteriaId": "D0B66B9B-B773-474F-A817-85A8F2B3CF0E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/41f6f64e6999a837048b1bd13a2f8742964eca6b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6935",
|
||||
"sourceIdentifier": "facts@wolfssl.com",
|
||||
"published": "2024-02-09T23:15:08.030",
|
||||
"lastModified": "2024-02-11T22:29:15.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:41:30.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "facts@wolfssl.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "facts@wolfssl.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.12.2",
|
||||
"versionEndIncluding": "5.6.4",
|
||||
"matchCriteriaId": "814E3645-BD7D-48A3-8D8D-4587FBBA2AD3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://people.redhat.com/~hkario/marvin/",
|
||||
"source": "facts@wolfssl.com"
|
||||
"source": "facts@wolfssl.com",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wolfssl.com/docs/security-vulnerabilities/",
|
||||
"source": "facts@wolfssl.com"
|
||||
"source": "facts@wolfssl.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-109xx/CVE-2024-10968.json
Normal file
141
CVE-2024/CVE-2024-109xx/CVE-2024-10968.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-10968",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-07T20:15:15.633",
|
||||
"lastModified": "2024-11-07T20:15:15.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /contact_process.php. The manipulation of the argument fnm leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NG0324/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.283417",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.283417",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.437322",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-109xx/CVE-2024-10969.json
Normal file
141
CVE-2024/CVE-2024-109xx/CVE-2024-10969.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-10969",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-07T20:15:15.930",
|
||||
"lastModified": "2024-11-07T20:15:15.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login_process.php of the component Login. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/CVE/issues/31",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.283418",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.283418",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.437416",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23083",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T14:15:07.430",
|
||||
"lastModified": "2024-08-01T23:15:40.430",
|
||||
"lastModified": "2024-11-07T20:35:06.223",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Se descubri\u00f3 que Time4J Base v5.9.3 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://time4j.com",
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-23386",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-04T10:15:04.760",
|
||||
"lastModified": "2024-11-04T18:50:05.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:54:23.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "memory corruption when WiFi display APIs are invoked with large random inputs."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria cuando se invocan las API de visualizaci\u00f3n WiFi con entradas aleatorias grandes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,286 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
"source": "product-security@qualcomm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25143",
|
||||
"sourceIdentifier": "security@liferay.com",
|
||||
"published": "2024-02-07T15:15:08.907",
|
||||
"lastModified": "2024-10-02T16:15:09.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:55:49.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@liferay.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@liferay.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,127 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.2",
|
||||
"matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.2.0",
|
||||
"matchCriteriaId": "73595C28-A21B-4C48-A326-33B0159B37A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndIncluding": "7.2.1",
|
||||
"matchCriteriaId": "B7CAF8FC-6334-48FD-A3E0-83EE307A5210"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3.0",
|
||||
"versionEndExcluding": "7.3.7",
|
||||
"matchCriteriaId": "50D9A45F-2E4E-4371-9835-014E603F2792"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25143",
|
||||
"source": "security@liferay.com"
|
||||
"source": "security@liferay.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26661",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-02T07:15:43.137",
|
||||
"lastModified": "2024-04-02T12:50:42.233",
|
||||
"lastModified": "2024-11-07T20:35:08.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: agregue prueba NULL para 'generador de sincronizaci\u00f3n' en 'dcn21_set_pipe()' en \"u32 otg_inst = pipe_ctx->stream_res.tg->inst;\" pipe_ctx->stream_res.tg podr\u00eda ser NULL, depende de la persona que llama garantizar que el tg no sea NULL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39f24c08363af1cd945abad84e3c87fd3e3c845a",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26768",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:52.800",
|
||||
"lastModified": "2024-04-03T17:24:18.150",
|
||||
"lastModified": "2024-11-07T20:35:09.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: LoongArch: cambie acpi_core_pic[NR_CPUS] a acpi_core_pic[MAX_CORE_PIC] Con la configuraci\u00f3n predeterminada, el valor de NR_CPUS es 64. Cuando la plataforma HW tiene m\u00e1s de 64 cpus, el SYSTEM fallar\u00e1 en estas plataformas . MAX_CORE_PIC es el n\u00famero m\u00e1ximo de CPU en la tabla MADT (n\u00famero f\u00edsico m\u00e1ximo) que puede exceder el n\u00famero m\u00e1ximo de CPU admitido (NR_CPUS, n\u00famero l\u00f3gico m\u00e1ximo), pero el kernel no deber\u00eda fallar. El kernel debe arrancar los procesadores con NR_CPUS y dejar que los procesadores restantes permanezcan en el BIOS. La posible raz\u00f3n del fallo es que la matriz acpi_core_pic[NR_CPUS] puede desbordarse al analizar la tabla MADT, y es obvio que CORE_PIC debe corresponder al n\u00facleo f\u00edsico en lugar del n\u00facleo l\u00f3gico, por lo que es mejor definir la matriz como acpi_core_pic[MAX_CORE_PIC] . Con el parche, el SYSTEM puede iniciar 64 vcpus con el par\u00e1metro qemu -smp 128; de lo contrario, el SYSTEM fallar\u00e1 con el siguiente mensaje. [ 0.000000] CPU 0 No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 0000420000004259, era == 90000000037a5f0c, ra == 90000000037a46ec [ 0.000000] Ups[#1]: [ 0.000000] CPU: 0 PID: 0 Comm: intercambiador No contaminado 6.8. 0-rc2+ #192 [0.000000] Nombre de hardware: QEMU QEMU M\u00e1quina virtual, BIOS desconocido 2/2/2022 [0.000000] pc 90000000037a5f0c ra 90000000037a46ec tp 9000000003c90000 sp 9000000003c93 d60 [ 0.000000] a0 0000000000000019 a1 9000000003d93bc0 a2 0000000000000000 a3 9000000003c93bd8 [ 0.000000] a4 9000000003c93a74 a5 9000000083c93a67 a6 9000000003c938f0 a7 0000000000000005 [ 0.000000] t0 0000420000004201 t1 00000000000000000 t2 0000000000000000 1 t3 0000000000000001 [ 0,000000] t4 0000000000000003 t5 0000000000000000 t6 0000000000000030 t7 0000000000000063 [ 0,000000] t8 0000 000000000014 u0 ffffffffffffffff s9 0000000000000000 s0 9000000003caee98 [ 0.000000] s1 90000000041b0480 s2 9000000003c93da0 s3 9000000003 c93d98 s4 9000000003c93d90 [ 0.000000] s5 9000000003caa000 s6 000000000a7fd000 s7 000000000f556b60 s8 000000000e0a4330 [ 0.000000] ra: 90000000037a46ec platform_init+ 0x214/0x250 [ 0.000000] ERA: 90000000037a5f0c efi_runtime_init+0x30/0x94 [ 0.000000] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) [ 0.000000] PRMD: 00000000 (PPLV0 -PIE -PWE) [ 0.000000] EUEN: 00000000 (-FPE -SXE -ASXE -BTE) [ 0.000000] ECFG: 00070800 (LIE=11 VS=7) [ 0.000000] ESTAT: 00010000 [PIL] (IS= ECode=1 EssubCode=0) [ 0.000000] BADV: 0000420000004259 [ 0.000000] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000) [ 0.0000 00] M\u00f3dulos vinculados en: [ 0.000000] Proceso swapper (pid: 0, threadinfo=(____ptrval____), tarea=(____ptrval____)) [0.000000] Pila: 9000000003c93a14 9000000003800898 90000000041844f8 90000000037a46ec [0.000000] 000000000a7fd000 0000000008290000 0000000000000000 0000000000000000 [ 0.000000] 00000000000000000 0000000000000000 00000000019d 8000 000000000f556b60 [ 0,000000] 000000000a7fd000 000000000f556b08 9000000003ca7700 9000000003800000 [ 0,000000 ] 9000000003c93e50 9000000003800898 9000000003800108 90000000037a484c [ 0.000000] 000000000e0a4330 000000000f556b60 00000000 0a7fd000 000000000f556b08 [ 0.000000] 9000000003ca7700 9000000004184000 0000000000200000 000000000e02b018 [ 0.000000] 000000000a 7fd000 90000000037a0790 9000000003800108 0000000000000000 [ 0.000000] 00000000000000000 000000000e0a4330 000000000f556b60 00000 0000a7fd000 [ 0.000000] 000000000f556b08 000000000eaae298 000000000eaa5040 0000000000200000 [ 0.000000] ... [ 0.000000] Llamar Seguimiento: [ 0.000000] [<90000000037a5f0c>] efi_runtime_init+0x30/0x94 [ 0.000000] [<90000000037a46ec>] platform_init+0x214/0x250 [ 0.000000] [<90000000037a48 4c>] setup_arch+0x124/0x45c [ 0.000000] [<90000000037a0790>] start_kernel +0x90/0x670 [ 0.000000] [<900000000378b0d8>] entrada_kernel+0xd8/0xdc"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0f6810e39898af2d2cabd9313e4dbc945fb5dfdd",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26785",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.187",
|
||||
"lastModified": "2024-10-10T12:15:03.027",
|
||||
"lastModified": "2024-11-07T19:35:06.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommufd: Se corrigi\u00f3 falla de protecci\u00f3n en iommufd_test_syz_conv_iova Syzkaller inform\u00f3 el siguiente error: falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000038: 0000 [#1] SMP KASAN KASAN: null-ptr- deref en el rango [0x00000000000001c0-0x00000000000001c7] Seguimiento de llamadas: lock_acquire lock_acquire+0x1ce/0x4f0 down_read+0x93/0x4a0 iommufd_test_syz_conv_iova+0x56/0x1f0 iommufd_test_access_rw.isra. 0+0x2ec/0x390 iommufd_test+0x1058/0x1e30 iommufd_fops_ioctl+0x381/0x510 vfs_ioctl __do_sys_ioctl __se_sys_ioctl __x64_sys_ioctl +0x170/0x1e0 do_syscall_x64 do_syscall_64+0x71/0x140 Esto se debe a que el nuevo iommufd_access_change_ioas() establece access->ioas en NULL durante su proceso, por lo que el bloqueo podr\u00eda desaparecer en un contexto de ejecuci\u00f3n concurrente. Solucione este problema haciendo el mismo acceso->ioas cordura que hacen las funciones iommufd_access_rw() y iommufd_access_pin_pages()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf7c2789822db8b5efa34f5ebcf1621bc0008d48",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26794",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.683",
|
||||
"lastModified": "2024-04-04T14:15:09.843",
|
||||
"lastModified": "2024-11-07T20:35:10.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre la finalizaci\u00f3n de extensi\u00f3n ordenada y fiemap Para fiemap recientemente dejamos de bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, para evitar un punto muerto en un escenario donde el b\u00fafer fiemap resulta ser un rango mapeado en memoria del mismo archivo. Es muy poco probable que este caso de uso sea \u00fatil en la pr\u00e1ctica, pero puede activarse mediante pruebas difusas (syzbot, etc.). Sin embargo, al no bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, podemos competir con una extensi\u00f3n ordenada. Esto sucede as\u00ed: 1) La tarea fiemap termina de procesar un elemento de extensi\u00f3n de archivo que cubre el rango de archivos [512K, 1M[, y ese elemento de extensi\u00f3n de archivo es el \u00faltimo elemento de la hoja que se est\u00e1 procesando actualmente; 2) Y la extensi\u00f3n ordenada para el rango de archivos [768K, 2M[, en modo COW, se completa (btrfs_finish_one_ordered()) y el elemento de extensi\u00f3n de archivo que cubre el rango [512K, 1M[ se recorta para cubrir el rango [512K, 768K[ y luego se inserta un nuevo elemento de extensi\u00f3n de archivo para el rango [768K, 2M[ en el \u00e1rbol de subvolumen del inodo; 3) La tarea fiemap llama a fiemap_next_leaf_item(), que luego llama a btrfs_next_leaf() para encontrar la siguiente hoja/elemento. Esto encuentra que la siguiente clave despu\u00e9s de la que procesamos anteriormente (su tipo es BTRFS_EXTENT_DATA_KEY y su desplazamiento es 512K), es la clave correspondiente al nuevo elemento de extensi\u00f3n de archivo insertado por la extensi\u00f3n ordenada, que tiene un tipo de BTRFS_EXTENT_DATA_KEY y un desplazamiento de 768K; 4) M\u00e1s tarde, el c\u00f3digo fiemap termina en emit_fiemap_extent() y activa la advertencia: if (cache->offset + cache->len > offset) { WARN_ON(1); devolver -EINVAL; } Dado que obtenemos 1M > 768K, porque la entrada emitida previamente para la extensi\u00f3n anterior que cubre el rango de archivos [512K, 1M[ termina en un desplazamiento que es mayor que el desplazamiento inicial de la nueva extensi\u00f3n (768K). Esto hace que fiemap falle con -EINVAL adem\u00e1s de activar la advertencia que produce un seguimiento de pila como el siguiente: [1621.677651] ------------[ cortar aqu\u00ed ]----------- - [1621.677656] ADVERTENCIA: CPU: 1 PID: 204366 en fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs] [1621.677899] M\u00f3dulos vinculados en: btrfs blake2b_generic (...) [1621.677951] CPU: 1 PID: 204366 Comm: pool No contaminado 6.8.0-rc5-btrfs-next-151+ #1 [1621.677954] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390- prebuilt.qemu.org 01/04/2014 [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678033] C\u00f3digo: 2b 4c 89 63 (...) [1621.678035] RSP: 0018:ffffab160 89ffd20 EFLAGS: 00010206 [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000 [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI : ffffab16089ffe90 [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 00000000000000000 [1621.678041] R10: 0000000000000000 R11 : 0000000000001000 R12: 0000000041d78000 [1621.678043 ] R13: 0000000000001000 R14: 00000000000000000 R15: ffff9434f0b17850 [1621.678044] FS: 00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) kn lGS:0000000000000000 [1621.678046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [1621.678048] CR2: 00007fa6b0801000 CR3 : 000000012d404002 CR4: 0000000000370ef0 [1621.678053] DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 [1621.678055] DR 3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [1621.678056] Seguimiento de llamadas: [1621.678074] [1621.678076] ? __advertir+0x80/0x130 [1621.678082] ? emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678159] ? report_bug+0x1f4/0x200 [1621.678164] ? ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26901",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-17T11:15:10.960",
|
||||
"lastModified": "2024-11-05T10:16:01.027",
|
||||
"lastModified": "2024-11-07T19:35:09.747",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-33029",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-04T10:15:05.147",
|
||||
"lastModified": "2024-11-04T18:50:05.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:54:49.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while handling the PDR in driver for getting the remote heap maps."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria durante el manejo del PDR en el controlador para obtener los mapas de mont\u00f3n remotos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,97 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
"source": "product-security@qualcomm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-33030",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-04T10:15:05.370",
|
||||
"lastModified": "2024-11-04T18:50:05.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:04:32.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria al analizar los par\u00e1metros de la tabla de frecuencia IPC para LPLH que tiene un tama\u00f1o mayor que el tama\u00f1o esperado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,610 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "205BF723-DBED-4EAE-8B5C-0E01B01E1544"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A36A7B8-CF35-4003-AC3E-C5D25288B1A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
"source": "product-security@qualcomm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-33031",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-04T10:15:05.603",
|
||||
"lastModified": "2024-11-04T18:50:05.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:02:31.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while processing the update SIM PB records request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Corrupci\u00f3n de memoria durante el procesamiento de la solicitud de actualizaci\u00f3n de registros PB de SIM."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,448 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "205BF723-DBED-4EAE-8B5C-0E01B01E1544"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A36A7B8-CF35-4003-AC3E-C5D25288B1A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
"source": "product-security@qualcomm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-33033",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-04T10:15:06.057",
|
||||
"lastModified": "2024-11-04T18:50:05.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:39:24.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while processing IOCTL calls to unmap the buffers."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria cuando la aplicaci\u00f3n del usuario modifica la misma memoria compartida de forma asincr\u00f3nica cuando el kernel accede a ella."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,772 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E826F765-4C2E-4319-BBC4-DEB02AAD783F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "133FFD9F-FA09-4801-939B-AD1D507BE5FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D242084-5844-4E43-8D7F-D2F8E3521F0C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A12D6-CC60-4BE9-ADEE-FAB58B05440F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sm7550_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEA5CE41-0596-4D38-9891-D1DF711EA7E9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sm7550:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1A901C6-FB73-4361-B391-4A4AF8C70029"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sm7525_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2410FF59-E0C0-4920-9656-C398DB06DEAE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sm7525:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D2B800C-4DBC-4028-875D-667C87D75247"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sg8275_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E4ECE56-FD6C-4A0F-A024-8AF7A7450096"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sg8275:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E26A0E2-ABC4-4B97-9DFB-FB27F95E0F07"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
"source": "product-security@qualcomm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35916",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-19T09:15:12.063",
|
||||
"lastModified": "2024-05-20T13:00:04.957",
|
||||
"lastModified": "2024-11-07T20:35:10.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dma-buf: corrige la desreferencia del puntero NULL en sanitycheck(). Si debido a un error en la asignaci\u00f3n de memoria, mock_chain() devuelve NULL, se pasa a dma_fence_enable_sw_signaling(), lo que genera una desreferencia del puntero NULL all\u00ed. . Llame a dma_fence_enable_sw_signaling() solo si mock_chain() tiene \u00e9xito. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0336995512cdab0c65e99e4cdd47c4606debe14e",
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38409",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-04T10:15:07.713",
|
||||
"lastModified": "2024-11-04T18:50:05.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:40:46.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while station LL statistic handling."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Corrupci\u00f3n de memoria durante el manejo de estad\u00edsticas de la estaci\u00f3n LL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,691 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71E06B94-9463-49A6-B816-E8A82BEA8545"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4946C6-778F-4542-AB77-C9B86AF25C05"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F1D604A-4530-42B3-80A0-58A82D658DDD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59A4483F-3A2A-4C31-AB38-A3147CC7D55A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
"source": "product-security@qualcomm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-38410",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-04T10:15:07.933",
|
||||
"lastModified": "2024-11-04T18:50:05.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:41:06.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption while IOCLT is called when device is in invalid state and the WMI command buffer may be freed twice."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Corrupci\u00f3n de memoria mientras se llama a IOCLT cuando el dispositivo est\u00e1 en estado no v\u00e1lido y el b\u00fafer de comando WMI puede liberarse dos veces."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,691 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71E06B94-9463-49A6-B816-E8A82BEA8545"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4946C6-778F-4542-AB77-C9B86AF25C05"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F1D604A-4530-42B3-80A0-58A82D658DDD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59A4483F-3A2A-4C31-AB38-A3147CC7D55A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
"source": "product-security@qualcomm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47855",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-04T06:15:04.093",
|
||||
"lastModified": "2024-10-04T13:50:43.727",
|
||||
"lastModified": "2024-11-07T20:35:11.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "util/JSONTokener.java en JSON-lib anterior a 3.1.0 maneja incorrectamente una cadena de comentarios desequilibrada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kordamp/json-lib/commit/a0c4a0eae277130e22979cf307c95dec4005a78e",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48950",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-07T17:15:08.373",
|
||||
"lastModified": "2024-11-07T17:15:08.373",
|
||||
"lastModified": "2024-11-07T20:35:12.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Logpoint before 7.5.0. An endpoint used by Distributed Logpoint Setup was exposed, allowing unauthenticated attackers to bypass CSRF protections and authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.logpoint.com/docs/whats-new-in-logpoint/en/latest/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-07T17:15:08.443",
|
||||
"lastModified": "2024-11-07T17:15:08.443",
|
||||
"lastModified": "2024-11-07T20:35:13.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Logpoint before 7.5.0. Server-Side Request Forgery (SSRF) on SOAR can be used to leak Logpoint's API Token leading to authentication bypass."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.logpoint.com/docs/whats-new-in-logpoint/en/latest/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48952",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-07T17:15:08.510",
|
||||
"lastModified": "2024-11-07T17:15:08.510",
|
||||
"lastModified": "2024-11-07T20:35:13.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.logpoint.com/docs/whats-new-in-logpoint/en/latest/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49642",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-29T09:15:08.017",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:59:18.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rafasashi:todo_custom_field:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.0.4",
|
||||
"matchCriteriaId": "39568869-E9DD-4B23-81A9-2825CE4CBE4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/todo-custom-field/wordpress-todo-custom-field-plugin-3-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49954",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:16.753",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:16:01.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: static_call: Reemplazar WARN_ON() sin sentido en static_call_module_notify() static_call_module_notify() activa un WARN_ON() cuando la asignaci\u00f3n de memoria fallo en __static_call_add_module(). Esto no est\u00e1 realmente justificado, porque el caso de fallo debe ser manejado correctamente por la cadena de llamadas conocida y el c\u00f3digo de error se pasa a la aplicaci\u00f3n de espacio de usuario que la inicia. Un error en la asignaci\u00f3n de memoria no es un problema fatal, pero WARN_ON() deja fuera de servicio la m\u00e1quina cuando se establece panic_on_warn. Reempl\u00e1zalo con un pr_warn()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "243E517F-E8D1-4CB4-B5E1-099330E2800C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/85a104aaef1f56623acc10ba4c42d5f046ba65b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b83bef74c121a3311240fc4002d23486b85355e4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bc9356513d56b688775497b7ac6f2b967f46a80c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e67534bd31d79952b50e791e92adf0b3e6c13b8c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ea2cdf4da093d0482f0ef36ba971e2e0c7673425",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe513c2ef0a172a58f158e2e70465c4317f0a9a2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49955",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:16.833",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:15:27.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,150 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPI: bater\u00eda: se corrige un posible fallo al anular el registro de un gancho de bater\u00eda Cuando un gancho de bater\u00eda devuelve un error al a\u00f1adir una bater\u00eda nueva, el gancho de bater\u00eda se anula autom\u00e1ticamente el registro. Sin embargo, el proveedor del gancho de bater\u00eda no puede saberlo, por lo que m\u00e1s tarde llamar\u00e1 a battery_hook_unregister() en el gancho de bater\u00eda ya anulado, lo que provocar\u00e1 un fallo. Solucione esto utilizando el encabezado de lista para marcar los ganchos de bater\u00eda ya anulados como ya anulados para que battery_hook_unregister() pueda ignorarlos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-672"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.17",
|
||||
"versionEndExcluding": "5.10.227",
|
||||
"matchCriteriaId": "2E7C7F10-BDE9-4D62-9A04-76C54C5D4EAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/07b98400cb0285a6348188aa8c5ec6a2ae0551f7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/76959aff14a0012ad6b984ec7686d163deccdc16",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9f469ef1c79dac7f9ac1518643a33703918f7e13",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca1fb7942a287b40659cc79551a1de54a2c2e7d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca26e8eed9c1c6651f51f7fa38fe444f8573cd1b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ce31847f109c3a5b2abdd19d7bcaafaacfde53de",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da964de4c18199e14b961b5b2e5e6570552a313c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49959",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:17.123",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:23:06.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,145 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jbd2: dejad de esperar espacio cuando jbd2_cleanup_journal_tail() devuelve un error En __jbd2_log_wait_for_space(), podr\u00edamos llamar a jbd2_cleanup_journal_tail() para recuperar algo de espacio en el diario. Pero si ocurre un error mientras se ejecuta jbd2_cleanup_journal_tail() (por ejemplo, un EIO), no dejamos de esperar espacio libre de inmediato, probamos otras ramas y, si j_committing_transaction es NULL (es decir, el tid es 0), obtendremos la siguiente queja: =============================================== JBD2: Error de E/S al actualizar el superbloque del diario para sdd-8. __jbd2_log_wait_for_space: se necesitaban 256 bloques y solo hab\u00eda 217 de espacio disponible __jbd2_log_wait_for_space: no hay forma de obtener m\u00e1s espacio de diario en sdd-8 ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 2 PID: 139804 en fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0 M\u00f3dulos vinculados: CPU: 2 PID: 139804 Comm: kworker/u8:3 No contaminado 6.6.0+ #1 RIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0 Rastreo de llamadas: add_transaction_credits+0x5d1/0x5e0 start_this_handle+0x1ef/0x6a0 jbd2__journal_start+0x18b/0x340 ext4_dirty_inode+0x5d/0xb0 __mark_inode_dirty+0xe4/0x5d0 generic_update_time+0x60/0x70 [...] == ..."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.28",
|
||||
"versionEndExcluding": "5.10.227",
|
||||
"matchCriteriaId": "1ECF4EB9-CCE6-413E-9A66-D01E03C462EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c62dc0d82c62f0dc8fcdc4843208e522acccaf5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3ced0fe6c0eff032733ea8b38778b34707270138",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/481e8f18a290e39e04ddb7feb2bb2a2cc3b213ed",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/70bae48377a2c4296fd3caf4caf8f11079111019",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c6bf043b210eac67d35a114e345c4e5585672913",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec7f8337c98ad281020ad1f11ba492462d80737a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f5cacdc6f2bb2a9bf214469dd7112b43dd2dd68a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49961",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:17.267",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:22:15.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,117 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: i2c: ar0521: Usar la versi\u00f3n cansleep de gpiod_set_value() Si usamos el restablecimiento de GPIO desde el expansor de puerto I2C, debemos usar la variante *_cansleep() de las funciones GPIO. Esto no se hac\u00eda en las funciones ar0521_power_on()/ar0521_power_off(). Vamos a solucionarlo. ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 11 en drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x74/0x7c M\u00f3dulos vinculados en: CPU: 0 PID: 11 Comm: kworker/u16:0 No contaminado 6.10.0 #53 Nombre del hardware: Diasom DS-RK3568-SOM-EVB (DT) Cola de trabajo: events_unbound deferred_probe_work_func pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : gpiod_set_value+0x74/0x7c lr : ar0521_power_on+0xcc/0x290 sp : ffffff8001d7ab70 x29: ffffff8001d7ab70 x28: ffffff80027dcc90 x27: ffffff8003c82000 x26: ffffff8003ca9250 x25: ffffffc080a39c60 x24: ffffff8003ca9088 x23: ffffff8002402720 x22: ffffff8003ca9080 x21: ffffff8003ca9088 x20: 0000000000000000 x19: ffffff8001eb2a00 x18: ffffff80efeeac80 x17: 756d2d6332692f30 x16: 0000000000000000 x15: 0000000000000000 x14: ffffff8001d91d40 x13: 0000000000000016 x12: ffffffc080e98930 x11: ffffff8001eb2880 x10: 0000000000000890 x9: ffffff8001d7a9f0 x8: ffffff8001d92570 x7: ffffff80efeeac80 x6: 000000003fc6e780 x5: ffffff8001d91c80 x4: 0000000000000002 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000001 Rastreo de llamadas: gpiod_set_value+0x74/0x7c ar0521_power_on+0xcc/0x290 ..."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "E43F7555-891D-4BA1-85D1-7A6816C6083B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2423b60a2d6d27e5f66c5021b494463aef2db212",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3cf00ecfbf11ee8e6afff306a5bdcff4bf95d2cf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/625a77b68c96349c16fcc1faa42784313e0b1a85",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9f08876d766755a92f1b9543ae3ee21bfc596fb8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bee1aed819a8cda47927436685d216906ed17f62",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49963",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:17.447",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:20:58.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,145 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: bcm2835: Fix timeout during suspend mode Durante la fase de suspensi\u00f3n de noirq, el controlador de energ\u00eda de Raspberry Pi sufre tiempos de espera de propiedad de firmware. La raz\u00f3n es que la IRQ del buz\u00f3n BCM2835 subyacente est\u00e1 deshabilitada y rpi_firmware_property_list() siempre se encontrar\u00e1 con un tiempo de espera [1]. Dado que el lado de VideoCore no se considera una fuente de reactivaci\u00f3n, configure el indicador IRQF_NO_SUSPEND para el IRQ del buz\u00f3n para mantenerlo habilitado durante el ciclo de suspensi\u00f3n-reanudaci\u00f3n. [1] PM: suspensi\u00f3n tard\u00eda de dispositivos completada despu\u00e9s de 1,754 msegs ADVERTENCIA: CPU: 0 PID: 438 en drivers/firmware/raspberrypi.c:128 rpi_firmware_property_list+0x204/0x22c Tiempo de espera de transacci\u00f3n de firmware 0x00028001 M\u00f3dulos vinculados: CPU: 0 PID: 438 Comm: bash Tainted: GC 6.9.3-dirty #17 Nombre del hardware: BCM2835 Rastreo de llamadas: unwind_backtrace de show_stack+0x18/0x1c show_stack de dump_stack_lvl+0x34/0x44 dump_stack_lvl de __warn+0x88/0xec __warn de warn_slowpath_fmt+0x7c/0xb0 warn_slowpath_fmt de rpi_firmware_property_list+0x204/0x22c rpi_firmware_property_list de rpi_firmware_property+0x68/0x8c rpi_firmware_property de rpi_firmware_set_power+0x54/0xc0 rpi_firmware_set_power de _genpd_power_off+0xe4/0x148 _genpd_power_off de genpd_sync_power_off+0x7c/0x11c genpd_sync_power_off de genpd_finish_suspend+0xcc/0xe0 genpd_finish_suspend de dpm_run_callback+0x78/0xd0 dpm_run_callback de device_suspend_noirq+0xc0/0x238 device_suspend_noirq de dpm_suspend_noirq+0xb0/0x168 dpm_suspend_noirq desde suspend_devices_and_enter+0x1b8/0x5ac suspend_devices_and_enter desde pm_suspend+0x254/0x2e4 pm_suspend desde state_store+0xa8/0xd4 state_store desde kernfs_fop_write_iter+0x154/0x1a0 kernfs_fop_write_iter desde vfs_write+0x12c/0x184 vfs_write desde ksys_write+0x78/0xc0 ksys_write desde ret_fast_syscall+0x0/0x54 Pila de excepciones (0xcc93dfa8 a 0xcc93dff0) [...] PM: suspensi\u00f3n noirq de dispositivos completada despu\u00e9s de 3095,584 mseg"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "5.10.227",
|
||||
"matchCriteriaId": "8A07E653-16C3-4150-BD19-62B6DF148F6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49964",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:17.510",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:20:04.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/hugetlb: se corrige la fuga de free_huge_pages de memfd_pin_folios memfd_pin_folios seguido de unpin_folios no puede restaurar free_huge_pages si las p\u00e1ginas no ten\u00edan ya un error, porque el recuento de referencias de folio para las p\u00e1ginas creadas por memfd_alloc_folio nunca llega a 0. memfd_pin_folios necesita otro folio_put para deshacer el folio_try_get a continuaci\u00f3n: memfd_alloc_folio() alloc_hugetlb_folio_nodemask() dequeue_hugetlb_folio_nodemask() dequeue_hugetlb_folio_node_exact() folio_ref_unfreeze(folio, 1); ; agrega 1 recuento de referencias folio_try_get() ; agrega 1 recuento de referencias hugetlb_add_to_page_cache() ; agrega 512 refcount (en x86) Con la soluci\u00f3n, despu\u00e9s de memfd_pin_folios + unpin_folios, el refcount para la p\u00e1gina (sin fallos) es 512, lo cual es correcto, ya que el refcount para una p\u00e1gina sin fijar con fallos es 513."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/59e081ff2e91bbf19b8c1ecb75b031f778858383",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c56b6f3d801d7ec8965993342bdd9e2972b6cb8e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49965",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:17.593",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:18:30.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,173 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: eliminar el desbloqueo irrazonable en ocfs2_read_blocks Serie de parches \"Correcciones varias para ocfs2_read_blocks\", v5. Esta serie contiene 2 correcciones para ocfs2_read_blocks(). El primer parche corrige el problema informado por syzbot, que detecta un balance de desbloqueo incorrecto en ocfs2_read_blocks(). El segundo parche corrige un problema informado por Heming Zhao al revisar la correcci\u00f3n anterior. Este parche (de 2): Hubo una liberaci\u00f3n de bloqueo antes de salir, as\u00ed que elimine el desbloqueo irrazonable."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.204",
|
||||
"versionEndExcluding": "4.9",
|
||||
"matchCriteriaId": "24B4F282-4860-4914-A00E-37E79073E119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.9.204",
|
||||
"versionEndExcluding": "4.14",
|
||||
"matchCriteriaId": "CAF7C57C-4624-476E-9DC5-B2376F1E4675"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.14.157",
|
||||
"versionEndExcluding": "4.19",
|
||||
"matchCriteriaId": "9DC95FF1-ED73-4CD5-9F88-C887FD9A5273"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.87",
|
||||
"versionEndExcluding": "4.20",
|
||||
"matchCriteriaId": "B897764C-25B8-458D-864B-0985FF8A323F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.10.227",
|
||||
"matchCriteriaId": "BD12FA67-D2AC-4EB0-BED4-7D4E94D30EF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39a88623af3f1c686bf6db1e677ed865ffe6fccc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3f1ca6ba5452d53c598a45d21267a2c0c221eef3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81aba693b129e82e11bb54f569504d943d018de9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/84543da867c967edffd5065fa910ebf56aaae49d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c03a82b4a0c935774afa01fd6d128b444fd930a1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/df4f20fc3673cee11abf2c571987a95733cb638d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f55a33fe0fb5274ef185fd61947cf142138958af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49966",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:17.683",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:30:24.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,145 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: cancelar dqi_sync_work antes de liberar oinfo ocfs2_global_read_info() inicializar\u00e1 y programar\u00e1 dqi_sync_work al final, si ocurre un error despu\u00e9s de leer exitosamente la cuota global, activar\u00e1 la siguiente advertencia con CONFIG_DEBUG_OBJECTS_* habilitado: ODEBUG: free active (active state 0) object: 00000000d8b0ce28 object type: timer_list hint: qsync_work_fn+0x0/0x16c Esto informa que hay un trabajo retrasado activo al liberar oinfo en el manejo de errores, as\u00ed que cancele dqi_sync_work primero. POR CIERTO, devuelva el estado en lugar de -1 cuando .read_file_info falle."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.29",
|
||||
"versionEndExcluding": "5.10.227",
|
||||
"matchCriteriaId": "17207E3A-A658-4FC6-AFFC-DC9A24067D66"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d707a33c84b371cb66120e198eed3374726ddd8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/14114d8148db07e7946fb06b56a50cfa425e26c7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/35fccce29feb3706f649726d410122dd81b92c18",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4173d1277c00baeedaaca76783e98b8fd0e3c08d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a4346c04d055bf7e184c18a73dbd23b6a9811118",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bbf41277df8b33fbedf4750a9300c147e8f104eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ef768020366f47d23f39c4f57bcb03af6d1e24b3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49968",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:17.833",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:28:02.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: los sistemas de archivos sin la funci\u00f3n casefold no se pueden montar con siphash Al montar el sistema de archivos ext4, si la versi\u00f3n hash predeterminada est\u00e1 configurada en DX_HASH_SIPHASH pero la funci\u00f3n casefold no est\u00e1 configurada, salga del montaje."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "6D5FF9C2-A011-4A64-B614-F9244ED2EA0D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/985b67cd86392310d9e9326de941c22fc9340eec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e1373903db6c4ac994de0d18076280ad88e12dee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50004",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T19:15:04.083",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:27:29.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,93 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: actualizaci\u00f3n de la pol\u00edtica DML2 EnhancedPrefetchScheduleAccelerationFinal DCN35 [POR QU\u00c9 Y C\u00d3MO] La falta de coincidencia en DCN35 DML2 hace que la validaci\u00f3n de bw no pueda adquirir una tuber\u00eda DPP inesperada, lo que provoca una pantalla gris y un bloqueo del sistema. Eliminar la anulaci\u00f3n del valor EnhancedPrefetchScheduleAccelerationFinal para que coincida con la especificaci\u00f3n de hardware. (seleccionado de el commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "652638C5-5F25-4DF3-AD42-DD3252A97152"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d5e5e8a0aa49ea2163abf128da3b509a6c58286",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4010efc8516899981cc3b57be2d4a2d5d9e50228",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/945dc25eda88b5d6e30c9686dc619ab981c22d0e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50005",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T19:15:04.143",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:27:01.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,108 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mac802154: Se soluciona un posible problema de desreferencia de RCU en mac802154_scan_worker En la funci\u00f3n `mac802154_scan_worker`, se accedi\u00f3 al campo `scan_req->type` despu\u00e9s de que se desbloqueara la secci\u00f3n cr\u00edtica del lado de lectura de RCU. Seg\u00fan las reglas de uso de RCU, esto es ilegal y puede provocar un comportamiento impredecible, como acceder a la memoria que se ha actualizado o causar problemas de use after free. Este posible error se identific\u00f3 utilizando una herramienta de an\u00e1lisis est\u00e1tico desarrollada por m\u00ed, dise\u00f1ada espec\u00edficamente para detectar problemas relacionados con RCU. Para solucionar esto, el valor `scan_req->type` ahora se almacena en una variable local `scan_req_type` mientras a\u00fan est\u00e1 dentro de la secci\u00f3n cr\u00edtica del lado de lectura de RCU. Luego, `scan_req_type` se usa despu\u00e9s de que se libera el bloqueo de RCU, lo que garantiza que se acceda al valor de tipo de manera segura sin violar las reglas de RCU."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.5",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "D48A8C35-F8B9-4BFE-AC95-D7F90303D311"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50008",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T19:15:04.367",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:26:22.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,144 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mwifiex: Se corrige la advertencia de escritura que abarca el campo memcpy() en mwifiex_cmd_802_11_scan_ext() Reemplazar la matriz de un elemento con un miembro de matriz flexible en `struct host_cmd_ds_802_11_scan_ext`. Con esto, se soluciona la siguiente advertencia: elo 16 17:51:58 kernel de surfacebook: ------------[ cortar aqu\u00ed ]------------ elo 16 17:51:58 kernel de surfacebook: memcpy: se detect\u00f3 escritura que abarca el campo (tama\u00f1o 243) de un solo campo \"ext_scan->tlv_buffer\" en drivers/net/wireless/marvell/mwifiex/scan.c:2239 (tama\u00f1o 1) elo 16 17:51:58 kernel de surfacebook: ADVERTENCIA: CPU: 0 PID: 498 en drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.10.227",
|
||||
"matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.168",
|
||||
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.55",
|
||||
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.14",
|
||||
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/17199b69a84798efffc475040fbef44374ef1de1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1756918f51e9ab247a0f4782cc28853c2bb457c1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/498365e52bebcbc36a93279fe7e9d6aec8479cee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/71267bd4e8c752d7af6c6b96bb83984a6a95273d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a3a12c30f9510f3753286fadbc6cdb7dad78c1d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e59bdb1ba594104cd0ee0af3ee9e4435d842a8fe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fef7b51f22cf2049b0ca6740adeb0ba6f2e671dc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50010",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T19:15:04.523",
|
||||
"lastModified": "2024-11-04T12:16:09.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:32:35.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,95 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exec: no WARN para comprobaci\u00f3n atrevida de path_noexec Tanto las comprobaciones i_mode como noexec envueltas en WARN_ON provienen de un artefacto de la implementaci\u00f3n anterior. Sol\u00edan comprobar leg\u00edtimamente la condici\u00f3n, pero eso se movi\u00f3 hacia arriba en dos confirmaciones: 633fb6ac3980 (\"exec: mover la comprobaci\u00f3n S_ISREG() antes\") 0fd338b2d2cd (\"exec: mover la comprobaci\u00f3n path_noexec() antes\") En lugar de eliminarse, dichas comprobaciones se WARN_ON, lo que tiene alg\u00fan valor de depuraci\u00f3n. Sin embargo, la comprobaci\u00f3n falsa path_noexec es atrevida, lo que resulta en advertencias injustificadas si alguien se apresura a configurar el indicador noexec. Se puede notar que hay m\u00e1s para comprobar si se permite execve y no se garantiza que ninguna de las condiciones siga siendo v\u00e1lida despu\u00e9s de que se probaron. Adem\u00e1s, esto no valida si la ruta del c\u00f3digo realiz\u00f3 alguna verificaci\u00f3n de permisos para comenzar; pasar\u00e1 si el inodo resulta ser regular. Mantenga la verificaci\u00f3n redundante path_noexec() aunque sea una verificaci\u00f3n sin sentido de garant\u00eda que no se proporciona, as\u00ed que elimine la ADVERTENCIA. Reformule el comentario y haga peque\u00f1as correcciones mientras est\u00e9 aqu\u00ed. [brauner: mantenga la verificaci\u00f3n redundante path_noexec()]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.11.3",
|
||||
"matchCriteriaId": "6D5FF9C2-A011-4A64-B614-F9244ED2EA0D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0bdf77be2330062b3a64f2bec39f62ab874a6796",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d16f53c91111cec914f0811fcc526a2ba77b20d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d196e7589cefe207d5d41f37a0a28a1fdeeb7c6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b723f96407a0a078cf75970e4dbf16b46d286a61",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d62ba2a5536df83473a2ac15ab302258e3845251",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50407",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-29T11:15:05.237",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:28:22.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.3",
|
||||
"matchCriteriaId": "FEB2A533-9EA8-413F-9116-4E13CF868719"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50409",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-29T11:15:05.460",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:28:43.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.3",
|
||||
"matchCriteriaId": "FEB2A533-9EA8-413F-9116-4E13CF868719"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-2-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50410",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-29T11:15:05.657",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:29:13.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.4.1",
|
||||
"matchCriteriaId": "47711FAA-0ADE-47C9-8DBE-AC3254FE3E4C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51358",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-05T23:15:04.707",
|
||||
"lastModified": "2024-11-06T18:17:17.287",
|
||||
"lastModified": "2024-11-07T20:35:14.957",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Un problema en Linux Server Heimdall v.2.6.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para agregar una nueva aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Kov404/CVE-2024-51358",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51513",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T09:15:04.523",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:30:14.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51514",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T09:15:04.723",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:43:51.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51515",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T09:15:04.937",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:42:53.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51516",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T09:15:05.157",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:42:32.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51520",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:11.947",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:55:38.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51521",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:12.490",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:55:21.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51522",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:12.953",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:03:56.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51523",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:13.420",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:03:21.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51524",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:13.890",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:02:59.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51525",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:14.420",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:01:59.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51526",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:14.850",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:00:28.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51527",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:15.183",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:57:57.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51528",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T10:21:15.607",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:57:18.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-51529",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T12:15:15.207",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:56:41.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Data verification vulnerability in the battery module\nImpact: Successful exploitation of this vulnerability may affect function stability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de verificaci\u00f3n de datos en battery module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-51530",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-11-05T12:15:15.440",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T19:56:10.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LaunchAnywhere vulnerability in the account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de LaunchAnywhere en el m\u00f3dulo de cuentas Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51758",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-07T18:15:17.787",
|
||||
"lastModified": "2024-11-07T18:15:17.787",
|
||||
"lastModified": "2024-11-07T20:35:16.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,28 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51993",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-07T18:15:18.203",
|
||||
"lastModified": "2024-11-07T18:15:18.203",
|
||||
"lastModified": "2024-11-07T19:35:10.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51994",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-07T18:15:18.470",
|
||||
"lastModified": "2024-11-07T18:15:18.470",
|
||||
"lastModified": "2024-11-07T19:35:10.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51995",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-07T18:15:18.787",
|
||||
"lastModified": "2024-11-07T18:15:18.787",
|
||||
"lastModified": "2024-11-07T19:35:10.887",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8378",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-11-07T16:15:18.057",
|
||||
"lastModified": "2024-11-07T16:15:18.057",
|
||||
"lastModified": "2024-11-07T20:35:16.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The Safe SVG WordPress plugin before 2.2.6 has its sanitisation code is only running for paths that call wp_handle_upload, but not for example for code that uses wp_handle_sideload which is often used to upload attachments via raw POST data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/17be4bf2-486d-43ab-b87a-2117c8d77ca8/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9443",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-05T09:15:05.383",
|
||||
"lastModified": "2024-11-05T16:04:26.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-07T20:56:58.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,18 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:basticom:framework:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.1",
|
||||
"matchCriteriaId": "7658FAFD-CCBC-4CE7-A119-3F0A92AFBF49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3178823/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/basticom-framework/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3dd3dc4b-e936-46a4-8d65-5f4bf05b2374?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9689",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-11-05T06:15:06.360",
|
||||
"lastModified": "2024-11-06T19:14:53.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-07T20:35:16.807",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9926",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-11-07T15:15:05.860",
|
||||
"lastModified": "2024-11-07T15:15:05.860",
|
||||
"lastModified": "2024-11-07T20:35:17.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The Jetpack WordPress plugin does not have proper authorisation in one of its REST endpoint, allowing any authenticated users, such as subscriber to read arbitrary feedbacks data sent via the Jetpack Contact Form"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/669382af-f836-4896-bdcb-5c6a57c99bd9/",
|
||||
|
87
README.md
87
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-07T19:00:28.970180+00:00
|
||||
2024-11-07T21:00:20.924770+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-07T18:35:10.433000+00:00
|
||||
2024-11-07T20:59:18.593000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
268582
|
||||
268584
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `28`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2020-11916](CVE-2020/CVE-2020-119xx/CVE-2020-11916.json) (`2024-11-07T18:15:15.310`)
|
||||
- [CVE-2020-11917](CVE-2020/CVE-2020-119xx/CVE-2020-11917.json) (`2024-11-07T18:15:15.370`)
|
||||
- [CVE-2020-11918](CVE-2020/CVE-2020-119xx/CVE-2020-11918.json) (`2024-11-07T18:15:15.450`)
|
||||
- [CVE-2020-11919](CVE-2020/CVE-2020-119xx/CVE-2020-11919.json) (`2024-11-07T18:15:15.517`)
|
||||
- [CVE-2020-11921](CVE-2020/CVE-2020-119xx/CVE-2020-11921.json) (`2024-11-07T18:15:15.590`)
|
||||
- [CVE-2020-11926](CVE-2020/CVE-2020-119xx/CVE-2020-11926.json) (`2024-11-07T18:15:15.667`)
|
||||
- [CVE-2024-10964](CVE-2024/CVE-2024-109xx/CVE-2024-10964.json) (`2024-11-07T17:15:06.500`)
|
||||
- [CVE-2024-10965](CVE-2024/CVE-2024-109xx/CVE-2024-10965.json) (`2024-11-07T17:15:06.890`)
|
||||
- [CVE-2024-10966](CVE-2024/CVE-2024-109xx/CVE-2024-10966.json) (`2024-11-07T18:15:16.033`)
|
||||
- [CVE-2024-10967](CVE-2024/CVE-2024-109xx/CVE-2024-10967.json) (`2024-11-07T18:15:16.393`)
|
||||
- [CVE-2024-40715](CVE-2024/CVE-2024-407xx/CVE-2024-40715.json) (`2024-11-07T17:15:08.083`)
|
||||
- [CVE-2024-45794](CVE-2024/CVE-2024-457xx/CVE-2024-45794.json) (`2024-11-07T18:15:17.150`)
|
||||
- [CVE-2024-47073](CVE-2024/CVE-2024-470xx/CVE-2024-47073.json) (`2024-11-07T18:15:17.417`)
|
||||
- [CVE-2024-48290](CVE-2024/CVE-2024-482xx/CVE-2024-48290.json) (`2024-11-07T18:15:17.580`)
|
||||
- [CVE-2024-48950](CVE-2024/CVE-2024-489xx/CVE-2024-48950.json) (`2024-11-07T17:15:08.373`)
|
||||
- [CVE-2024-48951](CVE-2024/CVE-2024-489xx/CVE-2024-48951.json) (`2024-11-07T17:15:08.443`)
|
||||
- [CVE-2024-48952](CVE-2024/CVE-2024-489xx/CVE-2024-48952.json) (`2024-11-07T17:15:08.510`)
|
||||
- [CVE-2024-48953](CVE-2024/CVE-2024-489xx/CVE-2024-48953.json) (`2024-11-07T17:15:08.570`)
|
||||
- [CVE-2024-48954](CVE-2024/CVE-2024-489xx/CVE-2024-48954.json) (`2024-11-07T17:15:08.650`)
|
||||
- [CVE-2024-51428](CVE-2024/CVE-2024-514xx/CVE-2024-51428.json) (`2024-11-07T18:15:17.677`)
|
||||
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-07T18:15:17.787`)
|
||||
- [CVE-2024-51989](CVE-2024/CVE-2024-519xx/CVE-2024-51989.json) (`2024-11-07T18:15:17.953`)
|
||||
- [CVE-2024-51993](CVE-2024/CVE-2024-519xx/CVE-2024-51993.json) (`2024-11-07T18:15:18.203`)
|
||||
- [CVE-2024-51994](CVE-2024/CVE-2024-519xx/CVE-2024-51994.json) (`2024-11-07T18:15:18.470`)
|
||||
- [CVE-2024-51995](CVE-2024/CVE-2024-519xx/CVE-2024-51995.json) (`2024-11-07T18:15:18.787`)
|
||||
- [CVE-2024-10968](CVE-2024/CVE-2024-109xx/CVE-2024-10968.json) (`2024-11-07T20:15:15.633`)
|
||||
- [CVE-2024-10969](CVE-2024/CVE-2024-109xx/CVE-2024-10969.json) (`2024-11-07T20:15:15.930`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `67`
|
||||
Recently modified CVEs: `82`
|
||||
|
||||
- [CVE-2024-3580](CVE-2024/CVE-2024-35xx/CVE-2024-3580.json) (`2024-11-07T17:35:21.603`)
|
||||
- [CVE-2024-36030](CVE-2024/CVE-2024-360xx/CVE-2024-36030.json) (`2024-11-07T18:35:09.050`)
|
||||
- [CVE-2024-36032](CVE-2024/CVE-2024-360xx/CVE-2024-36032.json) (`2024-11-07T18:35:09.363`)
|
||||
- [CVE-2024-36908](CVE-2024/CVE-2024-369xx/CVE-2024-36908.json) (`2024-11-07T17:35:19.317`)
|
||||
- [CVE-2024-36947](CVE-2024/CVE-2024-369xx/CVE-2024-36947.json) (`2024-11-07T18:35:09.793`)
|
||||
- [CVE-2024-38542](CVE-2024/CVE-2024-385xx/CVE-2024-38542.json) (`2024-11-07T17:35:20.127`)
|
||||
- [CVE-2024-38548](CVE-2024/CVE-2024-385xx/CVE-2024-38548.json) (`2024-11-07T17:35:20.360`)
|
||||
- [CVE-2024-38576](CVE-2024/CVE-2024-385xx/CVE-2024-38576.json) (`2024-11-07T18:35:10.433`)
|
||||
- [CVE-2024-43438](CVE-2024/CVE-2024-434xx/CVE-2024-43438.json) (`2024-11-07T17:35:22.537`)
|
||||
- [CVE-2024-48921](CVE-2024/CVE-2024-489xx/CVE-2024-48921.json) (`2024-11-07T17:20:34.160`)
|
||||
- [CVE-2024-49768](CVE-2024/CVE-2024-497xx/CVE-2024-49768.json) (`2024-11-07T17:28:02.853`)
|
||||
- [CVE-2024-49769](CVE-2024/CVE-2024-497xx/CVE-2024-49769.json) (`2024-11-07T17:29:04.053`)
|
||||
- [CVE-2024-49953](CVE-2024/CVE-2024-499xx/CVE-2024-49953.json) (`2024-11-07T17:44:28.297`)
|
||||
- [CVE-2024-49958](CVE-2024/CVE-2024-499xx/CVE-2024-49958.json) (`2024-11-07T17:46:35.687`)
|
||||
- [CVE-2024-50455](CVE-2024/CVE-2024-504xx/CVE-2024-50455.json) (`2024-11-07T17:01:30.937`)
|
||||
- [CVE-2024-50456](CVE-2024/CVE-2024-504xx/CVE-2024-50456.json) (`2024-11-07T17:02:03.653`)
|
||||
- [CVE-2024-51504](CVE-2024/CVE-2024-515xx/CVE-2024-51504.json) (`2024-11-07T17:35:23.373`)
|
||||
- [CVE-2024-51510](CVE-2024/CVE-2024-515xx/CVE-2024-51510.json) (`2024-11-07T17:03:03.297`)
|
||||
- [CVE-2024-51511](CVE-2024/CVE-2024-515xx/CVE-2024-51511.json) (`2024-11-07T17:03:12.743`)
|
||||
- [CVE-2024-51512](CVE-2024/CVE-2024-515xx/CVE-2024-51512.json) (`2024-11-07T17:03:21.927`)
|
||||
- [CVE-2024-8587](CVE-2024/CVE-2024-85xx/CVE-2024-8587.json) (`2024-11-07T17:15:24.903`)
|
||||
- [CVE-2024-8923](CVE-2024/CVE-2024-89xx/CVE-2024-8923.json) (`2024-11-07T17:18:10.993`)
|
||||
- [CVE-2024-8924](CVE-2024/CVE-2024-89xx/CVE-2024-8924.json) (`2024-11-07T17:16:43.393`)
|
||||
- [CVE-2024-9988](CVE-2024/CVE-2024-99xx/CVE-2024-9988.json) (`2024-11-07T17:00:29.560`)
|
||||
- [CVE-2024-9989](CVE-2024/CVE-2024-99xx/CVE-2024-9989.json) (`2024-11-07T17:00:56.337`)
|
||||
- [CVE-2024-50410](CVE-2024/CVE-2024-504xx/CVE-2024-50410.json) (`2024-11-07T20:29:13.937`)
|
||||
- [CVE-2024-51358](CVE-2024/CVE-2024-513xx/CVE-2024-51358.json) (`2024-11-07T20:35:14.957`)
|
||||
- [CVE-2024-51513](CVE-2024/CVE-2024-515xx/CVE-2024-51513.json) (`2024-11-07T20:30:14.910`)
|
||||
- [CVE-2024-51514](CVE-2024/CVE-2024-515xx/CVE-2024-51514.json) (`2024-11-07T19:43:51.717`)
|
||||
- [CVE-2024-51515](CVE-2024/CVE-2024-515xx/CVE-2024-51515.json) (`2024-11-07T19:42:53.157`)
|
||||
- [CVE-2024-51516](CVE-2024/CVE-2024-515xx/CVE-2024-51516.json) (`2024-11-07T19:42:32.537`)
|
||||
- [CVE-2024-51520](CVE-2024/CVE-2024-515xx/CVE-2024-51520.json) (`2024-11-07T19:55:38.370`)
|
||||
- [CVE-2024-51521](CVE-2024/CVE-2024-515xx/CVE-2024-51521.json) (`2024-11-07T19:55:21.083`)
|
||||
- [CVE-2024-51522](CVE-2024/CVE-2024-515xx/CVE-2024-51522.json) (`2024-11-07T20:03:56.137`)
|
||||
- [CVE-2024-51523](CVE-2024/CVE-2024-515xx/CVE-2024-51523.json) (`2024-11-07T20:03:21.307`)
|
||||
- [CVE-2024-51524](CVE-2024/CVE-2024-515xx/CVE-2024-51524.json) (`2024-11-07T20:02:59.010`)
|
||||
- [CVE-2024-51525](CVE-2024/CVE-2024-515xx/CVE-2024-51525.json) (`2024-11-07T20:01:59.063`)
|
||||
- [CVE-2024-51526](CVE-2024/CVE-2024-515xx/CVE-2024-51526.json) (`2024-11-07T20:00:28.717`)
|
||||
- [CVE-2024-51527](CVE-2024/CVE-2024-515xx/CVE-2024-51527.json) (`2024-11-07T19:57:57.577`)
|
||||
- [CVE-2024-51528](CVE-2024/CVE-2024-515xx/CVE-2024-51528.json) (`2024-11-07T19:57:18.577`)
|
||||
- [CVE-2024-51529](CVE-2024/CVE-2024-515xx/CVE-2024-51529.json) (`2024-11-07T19:56:41.723`)
|
||||
- [CVE-2024-51530](CVE-2024/CVE-2024-515xx/CVE-2024-51530.json) (`2024-11-07T19:56:10.187`)
|
||||
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-07T20:35:16.200`)
|
||||
- [CVE-2024-51993](CVE-2024/CVE-2024-519xx/CVE-2024-51993.json) (`2024-11-07T19:35:10.383`)
|
||||
- [CVE-2024-51994](CVE-2024/CVE-2024-519xx/CVE-2024-51994.json) (`2024-11-07T19:35:10.640`)
|
||||
- [CVE-2024-51995](CVE-2024/CVE-2024-519xx/CVE-2024-51995.json) (`2024-11-07T19:35:10.887`)
|
||||
- [CVE-2024-8378](CVE-2024/CVE-2024-83xx/CVE-2024-8378.json) (`2024-11-07T20:35:16.537`)
|
||||
- [CVE-2024-9443](CVE-2024/CVE-2024-94xx/CVE-2024-9443.json) (`2024-11-07T20:56:58.797`)
|
||||
- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-11-07T20:35:16.807`)
|
||||
- [CVE-2024-9926](CVE-2024/CVE-2024-99xx/CVE-2024-9926.json) (`2024-11-07T20:35:17.120`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
340
_state.csv
340
_state.csv
@ -137365,9 +137365,9 @@ CVE-2019-20453,0,0,ec8e3999418c1ef666416d17e524522ace7d8baa1ec904d9c33aa7eb859a0
|
||||
CVE-2019-20454,0,0,49062a80eed619a841ac3351fb2011c193b2ec707ecac6a198cdc12c186489e3,2024-03-27T16:05:17.853000
|
||||
CVE-2019-20455,0,0,daf31bba9026c418b4aea3791f020711fbed6d99c9cd896a0c42be955fa8a697,2024-02-14T01:17:43.863000
|
||||
CVE-2019-20456,0,0,5ffdec9dafee7fd301766358bf501920942dc3a2787a156bca775d7e0de56f68,2020-02-26T15:10:12.293000
|
||||
CVE-2019-20457,1,1,13c5e844f68bbea2569122a056bbff34e886a83d0257113c2ed136a782558630,2024-11-07T18:15:15.083000
|
||||
CVE-2019-20458,1,1,735bc453b2f612d764503bc0afa73204b0a8d3b324796ff10ae6059242d6fae7,2024-11-07T18:15:15.170000
|
||||
CVE-2019-20459,1,1,0811dcd399c52d419cf94380bb88687f219fea5ed836193353de3dc2607ad839,2024-11-07T18:15:15.227000
|
||||
CVE-2019-20457,0,0,13c5e844f68bbea2569122a056bbff34e886a83d0257113c2ed136a782558630,2024-11-07T18:15:15.083000
|
||||
CVE-2019-20458,0,0,735bc453b2f612d764503bc0afa73204b0a8d3b324796ff10ae6059242d6fae7,2024-11-07T18:15:15.170000
|
||||
CVE-2019-20459,0,0,0811dcd399c52d419cf94380bb88687f219fea5ed836193353de3dc2607ad839,2024-11-07T18:15:15.227000
|
||||
CVE-2019-2046,0,0,ad2b3932c8d1e3d30b7050d3687fe386b72bd21c29795965d8e46543b88b60b4,2021-07-21T11:39:23.747000
|
||||
CVE-2019-20463,0,0,4ff5adb0065b0740b37d188956763d99d2a5544f1d74340b30686c0709a88df2,2024-07-30T01:15:10.510000
|
||||
CVE-2019-20464,0,0,cbf249cf6488e4eee761ec744b712531e70e62139008cf34f74f29db6d2926c8,2024-08-01T13:41:54.067000
|
||||
@ -146915,18 +146915,18 @@ CVE-2020-11912,0,0,001e952128c7bcc5ba8822eabe19435f44973ff2e6be3c376a4d89e35db55
|
||||
CVE-2020-11913,0,0,73d1dbbcdd4d68945063c1a13a98c4f4419a183d9171be039ef71d68a5285663,2020-07-22T01:15:19.977000
|
||||
CVE-2020-11914,0,0,933895f61d4cd343cf6df7a50e21b2954b2ca93a6c3c96497c9a184889a05019,2020-07-22T01:15:20.070000
|
||||
CVE-2020-11915,0,0,7d89f75419f7463d1384054a54ad59fa6d293cc882195a4b2b681bf21b80d80a,2024-08-01T13:42:00.520000
|
||||
CVE-2020-11916,1,1,a48bc704413ad6b079d273d972fed3d456ec5ea5853bee003c78e53d44d8f006,2024-11-07T18:15:15.310000
|
||||
CVE-2020-11917,1,1,abaa048224d5125c4eccf32c9334dab8197fccb950f04826607f23914202b9aa,2024-11-07T18:15:15.370000
|
||||
CVE-2020-11918,1,1,8d36c27d54ace25b6d4150d9d5097a21df090d3103ec755380b53a73b28e21da,2024-11-07T18:15:15.450000
|
||||
CVE-2020-11919,1,1,7bd9f721ca286d8f68b12e5174dc3509f99f4cef3212e633f1c54d99ad8386bc,2024-11-07T18:15:15.517000
|
||||
CVE-2020-11916,0,0,a48bc704413ad6b079d273d972fed3d456ec5ea5853bee003c78e53d44d8f006,2024-11-07T18:15:15.310000
|
||||
CVE-2020-11917,0,0,abaa048224d5125c4eccf32c9334dab8197fccb950f04826607f23914202b9aa,2024-11-07T18:15:15.370000
|
||||
CVE-2020-11918,0,0,8d36c27d54ace25b6d4150d9d5097a21df090d3103ec755380b53a73b28e21da,2024-11-07T18:15:15.450000
|
||||
CVE-2020-11919,0,1,db6bd08d819bcc6b622bf15adffaf1e2d7d5e73b0b165df8d964850e9e46ed8e,2024-11-07T19:35:00.740000
|
||||
CVE-2020-1192,0,0,2da57e2a62a232a210f5ef6c2cdc72a098f145c18d45a7b4e5ff9c45ae3505e5,2021-12-01T14:19:18.020000
|
||||
CVE-2020-11920,0,0,63941de7aa14c11714aee7d8036115dfa77ff108df5dc59cf94071d6615c5125,2024-07-30T01:15:11.510000
|
||||
CVE-2020-11921,1,1,46aa3b5c4f9b5f36fb62e8ef393d92bf6f4b3ce2a3b9fdb8eb9f5b041431c917,2024-11-07T18:15:15.590000
|
||||
CVE-2020-11921,0,0,46aa3b5c4f9b5f36fb62e8ef393d92bf6f4b3ce2a3b9fdb8eb9f5b041431c917,2024-11-07T18:15:15.590000
|
||||
CVE-2020-11922,0,0,374a3245dac4cc2e16375466fda67c18e505c6a102baaec58ee711677b960103,2024-07-30T01:15:11.600000
|
||||
CVE-2020-11923,0,0,fb3be716d0f908996ee76f0715683ffb65fd813fd0fec133d8eaadb72ba1c5ae,2024-07-30T01:15:11.690000
|
||||
CVE-2020-11924,0,0,939327d07f44134100d79060d056bb5981da70e775752f8252fc18e6ee82797b,2024-07-30T01:15:11.780000
|
||||
CVE-2020-11925,0,0,f96a2c1cbb5e00ad3d2d97dfbd0b5b50d52d2501ad45fb0d9de2e2d77ad70e95,2024-08-01T13:42:01.480000
|
||||
CVE-2020-11926,1,1,86d6932d8640085e58bbe86ddae912eb3df0f888ebe672466be11288c49dc143,2024-11-07T18:15:15.667000
|
||||
CVE-2020-11926,0,0,86d6932d8640085e58bbe86ddae912eb3df0f888ebe672466be11288c49dc143,2024-11-07T18:15:15.667000
|
||||
CVE-2020-11928,0,0,90cf3cf1b6e5c940d77ccfaf8a7f457eaa98ed971d149e26bd55d0344c85db00,2023-08-07T18:11:24.533000
|
||||
CVE-2020-1193,0,0,21c495b68407af19663b0ccb52795639d4811c35526449d985ec528699966a5d,2023-12-31T22:15:59.130000
|
||||
CVE-2020-11930,0,0,cd761d767cbaaa15ae2c7cec98390a36e7af4474ac6d23c3ad040c28e6c39903,2020-05-19T14:15:10.893000
|
||||
@ -186992,7 +186992,7 @@ CVE-2021-47056,0,0,53a8d2cbb50ac5db0355e680253b631e57465ed746d5d73fab1533b9541e9
|
||||
CVE-2021-47057,0,0,1d3916c52a7749b5b8e55bd16d4876c24340a0feafd41a16ef48cddd81108f94,2024-11-06T15:35:01.363000
|
||||
CVE-2021-47058,0,0,b438168fba91aa01292c697aab3b07888b9ffa4094f5b28ad48fc85c717f7887,2024-03-01T14:04:26.010000
|
||||
CVE-2021-47059,0,0,a6f9203052591d3c066a3d0e65a10b21f093da98369347d14343ba5229adce4d,2024-03-01T14:04:26.010000
|
||||
CVE-2021-47060,0,1,cc6e39e3aee397bc59661bc2f4d3236a233ac0497059c183dee9f49ee4b0c12f,2024-11-07T17:35:01.233000
|
||||
CVE-2021-47060,0,0,cc6e39e3aee397bc59661bc2f4d3236a233ac0497059c183dee9f49ee4b0c12f,2024-11-07T17:35:01.233000
|
||||
CVE-2021-47061,0,0,69d13455d0b4be16496129ac825e7f02db6243ba2030978b747aec71962892fb,2024-03-01T14:04:26.010000
|
||||
CVE-2021-47062,0,0,8c423c1ab1222e251a9b1853baac4526fb8a2177d755c7f1cb3f7e002f49539b,2024-03-01T14:04:26.010000
|
||||
CVE-2021-47063,0,0,6c9762270033311804a0e9183ae9b9a3db00919eb86d9929efd560fe1fb78305,2024-03-01T14:04:26.010000
|
||||
@ -187026,7 +187026,7 @@ CVE-2021-47090,0,0,2c489b1391e1218d2d16941f8633f5d95ddf471b2541e7953e288e3588523
|
||||
CVE-2021-47091,0,0,6f8bf2fa9b9e29ebfde7540e7d404d6090906d8861a09e884d533ea7fe33ccaf,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47092,0,0,cc354a14cc04187592aa1176b9d80e6683dd927a110ff36a87a0a4164e6a3e09,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47093,0,0,6c1a637b04b12faa0485254b63058c012fd7055c98f1106b7f80e117f7b44f61,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47094,0,1,28e9b94b90723e166e2573903f68a9e08a1e1ce68a3339c4a1431e7daec73e39,2024-11-07T18:35:02.233000
|
||||
CVE-2021-47094,0,0,28e9b94b90723e166e2573903f68a9e08a1e1ce68a3339c4a1431e7daec73e39,2024-11-07T18:35:02.233000
|
||||
CVE-2021-47095,0,0,160862750cd10acd7d63895599ff51c9a7437fae93b0217e46e2f341f6091fc7,2024-03-05T13:41:01.900000
|
||||
CVE-2021-47096,0,0,f8ab1dadaf82bd468014cec603590f6eba2fcf2e7c6178e31235e4b22e5ae022,2024-11-05T19:35:00.660000
|
||||
CVE-2021-47097,0,0,58ebb26d1f7850230d5008448bcdebe25d89b78d79664ef55bf62f9a66de63f7,2024-03-05T13:41:01.900000
|
||||
@ -187061,7 +187061,7 @@ CVE-2021-47125,0,0,0756e8b7261e7b1a153ad489bf9ffed4c3c6b590a24bfbf4e2eff1aeaaa58
|
||||
CVE-2021-47126,0,0,04c8e8e108310e1fe214f1adf53742d1f96d605d92b4070dc915f41754d74d3e,2024-11-06T17:35:01.970000
|
||||
CVE-2021-47127,0,0,e4981b245281ea0af5618150d4684033b91a573e39d2b09ae4cf2fd729abd995,2024-03-17T22:38:29.433000
|
||||
CVE-2021-47128,0,0,d4b8a83073f5f99b0dad82cbfd95dacc611cbe63c431e8fa1d88a19ed32ba271,2024-03-17T22:38:29.433000
|
||||
CVE-2021-47129,0,0,0b91474c287c9fac5441e0bfddbeb84807bcf87135fd1024c88789a5dd0ae27e,2024-03-17T22:38:29.433000
|
||||
CVE-2021-47129,0,1,99146c6663fbb2c5ba734a219b5b2b484fa2fae22ea29cb72dbaa069798df0df,2024-11-07T19:35:01.857000
|
||||
CVE-2021-47130,0,0,5b886b2fc7d9d62e8e586a18b61b3d341ddf828bbd4e31d4c16769a790585b87,2024-11-04T17:35:02.347000
|
||||
CVE-2021-47131,0,0,fc14dc8b737479df9209c72577a6a68af3c4912ed49c51710efaa06b7a718277,2024-03-17T22:38:29.433000
|
||||
CVE-2021-47132,0,0,724d4921dcb0e535eb4a7121c97e55ed94336b6cbad0341e8c4b65507e7d629b,2024-03-17T22:38:29.433000
|
||||
@ -187072,7 +187072,7 @@ CVE-2021-47136,0,0,7cd020ac513c079f960e8a43840eb7aac2481499e330aa4b7750b02ff5154
|
||||
CVE-2021-47137,0,0,0086287d28f5c12bc04245cebac398bc4413edd4688dda90f19f757a927f7cb1,2024-11-05T17:35:01.103000
|
||||
CVE-2021-47138,0,0,369ba885249d116944123196cae129411c42f0b22f6f3c3522b8986012220655,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47139,0,0,de83caa653af7178da07f2a3c5173a0bf65613e5c38be7b826b01426fab32857,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47140,0,1,fe57c6c043e7d515b11a5e7453ca26ddde1972c09667ff6e66deb46cbbec98d8,2024-11-07T17:35:01.563000
|
||||
CVE-2021-47140,0,0,fe57c6c043e7d515b11a5e7453ca26ddde1972c09667ff6e66deb46cbbec98d8,2024-11-07T17:35:01.563000
|
||||
CVE-2021-47141,0,0,34b9de1dd52d95084eb006bbeb3b4cdfb559f7af87ba5efbcc7e459ffa3a7170,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47142,0,0,abf2bde1c8fc83b2094a290f31ccfb17ebe7997d07f93c5ea7fdd58fe5153e36,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47143,0,0,37b3b8d3155f64eb272889fbc77228cdffb19e343cd5a977b4d7922edb475b80,2024-03-25T13:47:14.087000
|
||||
@ -187189,7 +187189,7 @@ CVE-2021-47253,0,0,15a20d99b36651a2af39b79e9f678e9bca291038032c585214e6f0cead262
|
||||
CVE-2021-47254,0,0,740436ce4a2ce3c91e7625384c9d6535478fcfd96c6c8aae38ec9c16a52e55d3,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47255,0,0,51a162063608c507c07f097229fd828ef1bb753987033cd717bd7d85a2715fe4,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47256,0,0,7ace10b2135e214da774c1435fb91511c28f0b6aae33b002de7b0149ddd0472a,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47257,0,1,d0555db1b0645b8c18acf95172001c69ce596f3dd1cecb138026417b2d18c751,2024-11-07T17:35:01.883000
|
||||
CVE-2021-47257,0,0,d0555db1b0645b8c18acf95172001c69ce596f3dd1cecb138026417b2d18c751,2024-11-07T17:35:01.883000
|
||||
CVE-2021-47258,0,0,43e5d4398baa884888a6821f1cc44ebd315950a1d75455b3aa6a2b21fe961373,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47259,0,0,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000
|
||||
CVE-2021-47260,0,0,eed23e4375c3c68601f2520e12d8f67acb43a3edb9de2b59bea4672dc4d46a96,2024-05-21T16:54:26.047000
|
||||
@ -187441,7 +187441,7 @@ CVE-2021-47505,0,0,3313f1ee40c74730db32008b5a9068771e07041f279510f78e6111e842697
|
||||
CVE-2021-47506,0,0,fd29a06711845ec649d8ef0a6c8cb0bee0c3c59b4ba7c4db4cafdfe2487f7f10,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47507,0,0,291f76395ae66887aac568d8cc45c564db489d66d6c95dfb28df76651f372c8a,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47508,0,0,d5c4490cf8b2bfd12f3d81fa77c73abd0db20eb41ca5f92ab5aaa6e8c70c725e,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47509,0,1,76ffd0d0931444f7f2f0c04c630f4cdfc2a718f65a3b266b3a053b81dfe3432b,2024-11-07T18:35:02.967000
|
||||
CVE-2021-47509,0,0,76ffd0d0931444f7f2f0c04c630f4cdfc2a718f65a3b266b3a053b81dfe3432b,2024-11-07T18:35:02.967000
|
||||
CVE-2021-47510,0,0,270627eb232d447cc08f70aff04a5d0568e3059f6c21c73ef6a95c2a2ed08a4c,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47511,0,0,e3d90ab6114d070019d1ef5ff8c0b7af502cde3377475c2be408cd65bff17061,2024-11-04T21:35:01.830000
|
||||
CVE-2021-47512,0,0,b14ad06ad68acf2737e5e42986db1751275379351190fd9d4d1bd398eb0cd0c6,2024-05-24T18:09:20.027000
|
||||
@ -187466,7 +187466,7 @@ CVE-2021-47530,0,0,220bb64c42de65e390f2bd2d3e162e4284b9abf659928b078f4985c8dbe7c
|
||||
CVE-2021-47531,0,0,b8bee44a8e49b95add0489fa860584fc7aeb11bd276b6266410444ceab4425e5,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47532,0,0,eb70ddbdee3c495f8346d1dd9825d5167f4b39ea8db8a0be2b547c870331ca54,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47533,0,0,868d1256e6855a7e05acc382a85dae28ab41072d2b101bdb631670fb81ccff88,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47534,0,1,6c52ba917936ff78883cc7ff90a0bd2d7ece1e15ecd530c11da3b1d6b74863f4,2024-11-07T17:35:03.020000
|
||||
CVE-2021-47534,0,0,6c52ba917936ff78883cc7ff90a0bd2d7ece1e15ecd530c11da3b1d6b74863f4,2024-11-07T17:35:03.020000
|
||||
CVE-2021-47535,0,0,f9e30fcf94dad9cfd06140aed5236d65a2a635fba0e895a19cf6130446b80d67,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47536,0,0,a360faee07164645434064e3473571de768bb8e50b01ec848cd6ddc9799fc0ca,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47537,0,0,86966e911d2738f8b2a69e220dbf87c64ebff3f3588243cae82ab8fc561cc878,2024-06-10T18:35:41.393000
|
||||
@ -187515,7 +187515,7 @@ CVE-2021-47579,0,0,214fa59c33ed22b9398868c401e997995a9f0f8c8cbab8497c48f31736b10
|
||||
CVE-2021-47580,0,0,9203b9569f1af3364c196ec8be7ea8cd3d74fe51d6ff896c43aa2e1a1a0d8aa6,2024-11-05T15:35:02.187000
|
||||
CVE-2021-47581,0,0,8787010fa1b837c9433128d0d20bbbc5cc367d055ada39f1bbe864fed14da829,2024-06-20T09:15:11.057000
|
||||
CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af77d,2024-06-20T12:43:25.663000
|
||||
CVE-2021-47583,0,1,c5ad835aee47b95f02903b0b317ea04ceb81d1a4eedf818baa3f67b776d2d943,2024-11-07T17:41:01.250000
|
||||
CVE-2021-47583,0,0,c5ad835aee47b95f02903b0b317ea04ceb81d1a4eedf818baa3f67b776d2d943,2024-11-07T17:41:01.250000
|
||||
CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000
|
||||
CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000
|
||||
CVE-2021-47586,0,0,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000
|
||||
@ -212628,21 +212628,21 @@ CVE-2022-48981,0,0,edbe50226f61eeb3964ee5f01c48ece48013ec7f030ccd46e06c058038ce5
|
||||
CVE-2022-48982,0,0,58fbd0b9b2a1580dc158a88315d6703348749f40d4fc009911acc30aa732771b,2024-10-25T18:12:52.270000
|
||||
CVE-2022-48983,0,0,dfa67a553ef1fa3c57f719e3548ad9b975bf5a0f74df240dd01055c881443dcd,2024-10-25T15:58:02.297000
|
||||
CVE-2022-48984,0,0,e51fd7e8de77f3a8cf163611cb2f09fc6b7014335c2a9168caf96cf9450b0b0f,2024-10-25T15:53:53.890000
|
||||
CVE-2022-48985,0,0,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48985,0,1,f81a51dca08fe852bc14a27c90e44c2549fe2db76bf28aeac738417720fd6282,2024-11-07T19:35:06.407000
|
||||
CVE-2022-48986,0,0,bf309f218709bc1203043fc9bd44982e8a6b8c350decfcafd0244201d031592c,2024-11-01T15:30:13.770000
|
||||
CVE-2022-48987,0,0,dbcc27dc54efd2e0e773447e3199d54fb3f7908b158b00da7f57caf8bbfa103c,2024-11-01T15:27:26.880000
|
||||
CVE-2022-48988,0,0,f27d8912475eb280a5b8231812f3ea2ca682597fc372ffb5583678b978512d79,2024-11-01T15:20:42.073000
|
||||
CVE-2022-48989,0,0,12f08708869bbe9ec063b7392e0e15042d70e2feeae860945b26c11deb45e931,2024-10-25T16:02:05.787000
|
||||
CVE-2022-4899,0,0,64070b82b08d57aace9b84f3711bc30a23fda3b7a68f2b187d0af07aa5382f53,2023-11-07T03:59:16.090000
|
||||
CVE-2022-48990,0,0,f3f5f9ba37039dd5bdebda25bf3b72aaf6156992a282b1be1c6dde6507784974,2024-10-25T16:03:41.527000
|
||||
CVE-2022-48991,0,0,6a7cb21a3ac184136cd0ab4a861f7301f05b1785725a9d2367d58cd519d1b08f,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48991,0,1,ba48b571ef71c44fa65d6e4fadbc5164a3528e63c673999cfb7d0b20587886d3,2024-11-07T19:36:33.167000
|
||||
CVE-2022-48992,0,0,8f56e9ce177d276837e828e603f41b46405afcc8129dce28e104445db61b74c5,2024-10-25T15:51:38.037000
|
||||
CVE-2022-48993,0,0,ef216d3e2a04a71a8d804734065ba340ce4d331bb10df8d692bb266c02e77712,2024-10-23T09:15:02.593000
|
||||
CVE-2022-48994,0,0,7168b3eef8618696017a54b6db12bd665ef2f549638a765dbcd8dc2f1b1f7cdf,2024-11-07T13:52:43.380000
|
||||
CVE-2022-48995,0,0,6d50aef3372db06b6d495aa3016571870681b9327c2409bc5336d097bc2fa483,2024-10-25T15:52:51.117000
|
||||
CVE-2022-48996,0,0,0f669c5d177a55ab1de24ef7aebf7206e81a91803f760e8aa9a6146660e8c4e1,2024-10-23T15:13:25.583000
|
||||
CVE-2022-48997,0,1,bc1d73729c066d8ec26ae3f0abb2ea40c8547098f0626961bdd642a44b638d57,2024-11-07T17:07:08.743000
|
||||
CVE-2022-48998,0,1,3da65aef022ad9ceb620c4628781cb335fc813fa391925ed2a453cab90cfa213,2024-11-07T17:08:38.677000
|
||||
CVE-2022-48996,0,1,105f2eae6637f8b84d22634b975e98742160c1f671ea99e6a4f8ce19463768b9,2024-11-07T19:37:27.663000
|
||||
CVE-2022-48997,0,0,bc1d73729c066d8ec26ae3f0abb2ea40c8547098f0626961bdd642a44b638d57,2024-11-07T17:07:08.743000
|
||||
CVE-2022-48998,0,0,3da65aef022ad9ceb620c4628781cb335fc813fa391925ed2a453cab90cfa213,2024-11-07T17:08:38.677000
|
||||
CVE-2022-48999,0,0,ade5189407bcb1c53b709efa68b58bb4a61ffa43108c0637b7c0e393d125b80c,2024-10-31T14:44:10.857000
|
||||
CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075c4,2023-11-30T22:15:07.600000
|
||||
CVE-2022-49000,0,0,3315f81ffe886dd8a0d6755db95204b8e967d8d84fc20d98b4981297144d3f94,2024-10-31T14:56:17.890000
|
||||
@ -216675,7 +216675,7 @@ CVE-2023-2229,0,0,4acc8758df4767319dc415a0c9c749e0cb0cb7edab230bb785ec4ce4401379
|
||||
CVE-2023-22290,0,0,7008f26d14d391173c321d16193462f5514a00eab13ac6ad5f485769a5a3db26,2023-11-17T04:02:30.557000
|
||||
CVE-2023-22291,0,0,f309f6e17c36aa84390955841dd393c62fca34dee558496c62358f024e68c4d2,2023-04-19T15:17:43.323000
|
||||
CVE-2023-22292,0,0,7f87904f363b8a798ccb431a063e173ac450356aa59ec58e716466c216f457ce,2023-11-17T04:04:36.607000
|
||||
CVE-2023-22293,0,0,4f031c8e5db675d12fbded0dedcf27eacee7edad5d27e9b399124350c459fbc6,2024-02-14T15:02:01.453000
|
||||
CVE-2023-22293,0,1,9481ef7c88a117d0582cafeb12e07610852ab603e66b41f4c5c7af1a5d45e258,2024-11-07T20:27:21.893000
|
||||
CVE-2023-22294,0,0,d7f32d77e7b6c9189a00cd77e38abcc5620031cbf5e645c6446daf48d6616dce,2023-04-27T19:19:30.353000
|
||||
CVE-2023-22295,0,0,c2e06aad2cb7708d06944452addecf331f3b5610b9385c5a2c18b4e953c94d13,2023-05-02T01:16:32.677000
|
||||
CVE-2023-22296,0,0,abe675b1547f9ffce1c7529e112999ba0340267cf9c333011130af4573bdd0a6,2023-01-24T20:15:55.097000
|
||||
@ -221341,7 +221341,7 @@ CVE-2023-28142,0,0,5348d765bbe00552f4b21547eb51331c1961a74e60dddf51d61eea1387e13
|
||||
CVE-2023-28143,0,0,2930f4b3d1bbeb13bc36a13a085a1ddfe693ee73e55c43efb28ccefdb766d85d,2023-04-28T00:42:51.857000
|
||||
CVE-2023-28144,0,0,b49d26291a340c49284192a67f5e0647690fc7789846391ecc87683ebe8ecc82,2023-03-20T19:42:14.197000
|
||||
CVE-2023-28147,0,0,47d7c693d87c0910f05ddbf3504df8d78da2c6e0b3aa172621acd7ad4075afe5,2023-06-09T18:49:06.737000
|
||||
CVE-2023-28149,0,1,2c58375d982f41ab39405f8011406f9bbb71c522b83683f49831193cd0e532c6,2024-11-07T17:35:03.810000
|
||||
CVE-2023-28149,0,0,2c58375d982f41ab39405f8011406f9bbb71c522b83683f49831193cd0e532c6,2024-11-07T17:35:03.810000
|
||||
CVE-2023-2815,0,0,76d4fb095d100c8b17284725ff901d4cf7fcf13b14aca4d157d2670594f54653,2024-05-17T02:23:17.093000
|
||||
CVE-2023-28150,0,0,850fc3edb9208c5c3fc18f5aab1f201ee1dd54ebe2f647d8b39dc9133fad1181,2023-03-30T15:44:05.453000
|
||||
CVE-2023-28151,0,0,f5d1d693289a3ec8b086cdb9c9f5e9b84f5907327ee865cb6dfe9a0e20e0dad9,2023-03-30T16:51:00.080000
|
||||
@ -228384,7 +228384,7 @@ CVE-2023-37450,0,0,55d0dcaf5b1cfef89c9fb177875d7328be1b1ea34879626cb24d837fb34fe
|
||||
CVE-2023-37453,0,0,7b7cfbd45145f4b9800dffb91d55fc21a45e55a7734a8344e32bd591dbbb4d92,2024-03-25T01:15:54.597000
|
||||
CVE-2023-37454,0,0,f514985ae14e2ad15d19fbfcf165d49e6d02220137b9ecab2467d3f2e91b0e6f,2024-03-25T01:15:54.703000
|
||||
CVE-2023-37455,0,0,d8bb4e863d2dac2cd1dc667a32d986f56a7da2538ff1986410afb3c6c7043d52,2023-07-20T19:16:40.667000
|
||||
CVE-2023-37456,0,1,32fc2c4f612d9cabb3f02b370af33ec6b887facc67cb9632bd82d8dbeda1e6c2,2024-11-07T17:35:04.577000
|
||||
CVE-2023-37456,0,0,32fc2c4f612d9cabb3f02b370af33ec6b887facc67cb9632bd82d8dbeda1e6c2,2024-11-07T17:35:04.577000
|
||||
CVE-2023-37457,0,0,26e89b32694eb04fd91e9119e5f9581fb736aeabbaeba42e206071d48a3f899a,2023-12-29T00:15:49.697000
|
||||
CVE-2023-37459,0,0,9fc94c4c14d8f510cad14a402672feb55c4c2606105926cc8c387db7578e1e2d,2023-09-19T15:14:43.653000
|
||||
CVE-2023-3746,0,0,cdf44adc48424d7b6e74c4c232f9332e0c1c5a851f78b5b5b2f5977eadfcfc5b,2023-11-07T04:19:27.737000
|
||||
@ -230335,7 +230335,7 @@ CVE-2023-39929,0,0,9ee055206e5132be81815049aebeff6d468d3e81abaeb697797813c03df4a
|
||||
CVE-2023-3993,0,0,6a4502fc730b10244b2a5f12fef2d075a1d38a2dac53ba48d1dcf3cdcda08ad9,2024-10-03T07:15:17.247000
|
||||
CVE-2023-39930,0,0,d750d5de68ec1cde9c7f725fc00c339d92094ec5ff393b14c4e64987eda9f87a,2023-10-31T18:10:51.270000
|
||||
CVE-2023-39932,0,0,12634c5c9ef0cff268f86e10b0c67410af36a28d1b513a74ce59753107a369e3,2024-10-24T19:04:48.510000
|
||||
CVE-2023-39933,0,1,7ffad2f32f0eb6d37c53bb393c4b3509ea3d8f3819e78801993f0ddc592c930f,2024-11-07T17:35:05.493000
|
||||
CVE-2023-39933,0,0,7ffad2f32f0eb6d37c53bb393c4b3509ea3d8f3819e78801993f0ddc592c930f,2024-11-07T17:35:05.493000
|
||||
CVE-2023-39935,0,0,e7273cf6b42db016c2234872a9e6b2af9325c39c0fbeec800f945c24cae29ab6,2023-09-11T13:41:11.193000
|
||||
CVE-2023-39936,0,0,c91849e55c7a55e36d3d0035f9880ed7b3b78132a705018d93999265c90b8b67,2023-11-06T18:13:06.433000
|
||||
CVE-2023-39938,0,0,b7f60caca70de06cad432a98ecc140601aca695ee4a3c25c4662905e139bf0e3,2023-09-08T18:45:56.717000
|
||||
@ -230740,7 +230740,7 @@ CVE-2023-40384,0,0,6e2bdeabde09abcbae7a411369b78571c28f713b0209b813ab8847535e9de
|
||||
CVE-2023-40385,0,0,71b21b093cd801a5f08ed97055575ce1ddb52323e2ff094483384011f365bfb8,2024-01-18T14:32:30.730000
|
||||
CVE-2023-40386,0,0,d8e7b4e912c0c8aab5a6300eee39ae1aa74a7fad325560fd2a38cafa409d665f,2023-10-12T01:59:56.563000
|
||||
CVE-2023-40388,0,0,edeed7ce7eab447d09d415d2aedd3b6d27b8921e5d3360c3f2bbc1dbd50c3f1c,2023-10-12T01:59:05.793000
|
||||
CVE-2023-40389,0,1,516bf53699db11855d673e6a03c9e5f20604515862ccaa485dd2ec89b7df9697,2024-11-07T17:35:06.653000
|
||||
CVE-2023-40389,0,0,516bf53699db11855d673e6a03c9e5f20604515862ccaa485dd2ec89b7df9697,2024-11-07T17:35:06.653000
|
||||
CVE-2023-4039,0,0,3918b86d67120df6e72f2815bfe54c657854c7400634e5431e5bb075d0ffe234,2024-08-02T08:15:14.993000
|
||||
CVE-2023-40390,0,0,c1b3eb0e01b46bd6926f4c567dc2643d4c9c232d8f9a83ab8373932e194386ed,2024-04-08T22:42:58.650000
|
||||
CVE-2023-40391,0,0,6adc4a6dc803b29c119c5d511b4b9d89961e74825b585c298fbeeddf94e2e77f,2023-11-07T04:20:12.943000
|
||||
@ -233993,7 +233993,7 @@ CVE-2023-4508,0,0,0fe236581f06c738c5efa0544aa88d5a3d169bdd092a576b4e6f40ede95fa9
|
||||
CVE-2023-45083,0,0,d57cb35c2a851ae6493d4ea047a38989b17473d5f242a57232d10f192d93787b,2023-12-12T16:40:40.463000
|
||||
CVE-2023-45084,0,0,6c5c2655e466f41deb2916053b4f12e226b2d64a442bef2f9ce083cd1698207b,2023-12-12T16:41:49.943000
|
||||
CVE-2023-45085,0,0,660e8a54dccc921a3df36b39a4e95cc045b46c3f4f0df1cbce56622b3152f9fa,2023-12-12T16:14:09.460000
|
||||
CVE-2023-4509,0,1,c5167fa67c5aae654af6b2d3a26c14bb5bb509034e04425bd61bddc5359c8a9c,2024-11-07T17:35:07.090000
|
||||
CVE-2023-4509,0,0,c5167fa67c5aae654af6b2d3a26c14bb5bb509034e04425bd61bddc5359c8a9c,2024-11-07T17:35:07.090000
|
||||
CVE-2023-45102,0,0,9ab095356f1278c84ec36424ed84f297e020c620cdb4def562524b4802fcc200,2023-10-16T12:57:20.570000
|
||||
CVE-2023-45103,0,0,8a7e442d2790c242d546278bfd51fdf5a76d9697e197cb3a317a9c4eb5f2c580,2023-10-16T12:57:31.997000
|
||||
CVE-2023-45105,0,0,280d31f1865a33913adbae72bca9da32d247cd929467a46118441ce8ed0e3a7f,2024-02-03T01:40:06.433000
|
||||
@ -239173,7 +239173,7 @@ CVE-2023-52458,0,0,1d62f5151a9e3e1b02f5955d8180968c6111058cfe66f8bfb5e191d59b7fd
|
||||
CVE-2023-52459,0,0,350ab48aa5487f2fa8284fafbf84f571c733c91ca8bbe04060c4bef0fc22caf6,2024-04-19T18:49:47.087000
|
||||
CVE-2023-5246,0,0,892718b6dd4e4e1e580b4dd5fe666c7b8e248e4cb28e3ed3abb5a82ba43a4ac5,2023-10-31T11:58:05.363000
|
||||
CVE-2023-52460,0,0,f0b3aea0787c182a9ee54815bd19382edfcb9e393afa52da74e2cccb3b83505c,2024-04-30T19:16:12.493000
|
||||
CVE-2023-52461,0,1,323a71ed1188d50a5d0d40a3c47aaeeb0042ba5c9393a67eddcb6398f7d2e2ed,2024-11-07T18:35:05.377000
|
||||
CVE-2023-52461,0,0,323a71ed1188d50a5d0d40a3c47aaeeb0042ba5c9393a67eddcb6398f7d2e2ed,2024-11-07T18:35:05.377000
|
||||
CVE-2023-52462,0,0,3393234fe42a5e40ff82930b695cee44a402e194d56b1a14a5639a436fe167df,2024-11-05T16:35:05.700000
|
||||
CVE-2023-52463,0,0,cec5f08f685cd22a0b71d8bfd960de1d18c06434ce6c90320d223eb0193559e9,2024-11-04T13:16:31.973000
|
||||
CVE-2023-52464,0,0,4f70de0b3c01b33846f3994a8b137822a3ac7d6f4d2a034223209b62d308d9d3,2024-11-04T13:16:32.113000
|
||||
@ -239321,7 +239321,7 @@ CVE-2023-52593,0,0,4971af1988857bfb9d720789cae0bbd688972f5c1659e83a3de6e41f82ca3
|
||||
CVE-2023-52594,0,0,cd5fafa3acf5a73bc2c5da67e5f138f33f09847afb1eedcf43714b7feed3d702,2024-11-04T13:16:39.747000
|
||||
CVE-2023-52595,0,0,13e93ed97d3f3b4855bb19db1cc30a20a5e0f190644e0f4268502cd331b7c623,2024-11-04T13:16:39.820000
|
||||
CVE-2023-52596,0,0,5a64d4ada9d0d6224e7ecf43acaef0301552bdb93d2742b159972c15f29214c2,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52597,0,1,f27a53324d79acc94fc97cf5464ac65b7b0b4845d5cc6d0e35458b2035d246ee,2024-11-07T18:35:05.660000
|
||||
CVE-2023-52597,0,0,f27a53324d79acc94fc97cf5464ac65b7b0b4845d5cc6d0e35458b2035d246ee,2024-11-07T18:35:05.660000
|
||||
CVE-2023-52598,0,0,bbff85f6da88960238e28c6f0a121efc0c4a66ccf1ba1c1067a97f6e8d7037fc,2024-11-04T13:16:40.033000
|
||||
CVE-2023-52599,0,0,d55446618a9898e606b15663834a5e93b1f33b0e8f71ed5cccd2ccba73a05358,2024-11-04T13:16:40.127000
|
||||
CVE-2023-5260,0,0,eea990ee194786c0ea758019a51c9ffc454af1aecc04aa0aed3120bf95b39b00,2024-05-17T02:32:55.730000
|
||||
@ -239410,7 +239410,7 @@ CVE-2023-52674,0,0,ce150f13ccfdd2751ba311b6ccc675129b4733aa7c50e21eadaf6d146542d
|
||||
CVE-2023-52675,0,0,c7dcda3181eab7779ae082601fb0dd24e57baf11775d050f6c2f4c314674a571,2024-11-04T13:16:45.927000
|
||||
CVE-2023-52676,0,0,3fd4a26f33611ada4236d58e802d8cafaaab5a7b370555c1d95dc11fafffefaf,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52677,0,0,9064b7ec03e5b5f99707d91bdec6284d399d2a792becfa1593b75a80dfba9fff,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52678,0,1,8fe2c82ee5f304933a99dfa015a9aef0323550678b7ad56b62d7cb58319f4163,2024-11-07T18:35:05.900000
|
||||
CVE-2023-52678,0,0,8fe2c82ee5f304933a99dfa015a9aef0323550678b7ad56b62d7cb58319f4163,2024-11-07T18:35:05.900000
|
||||
CVE-2023-52679,0,0,2e080a8db468a9cd2f28486802ea969364aa0b175264d1785ebc13fbd5564a58,2024-11-04T13:16:46.243000
|
||||
CVE-2023-5268,0,0,cd8049b2c704c7ba114cc98aa8ef2a51e93320fada4a9f70ae44450e575e1d3c,2024-06-04T19:18:09.923000
|
||||
CVE-2023-52680,0,0,e82e4387cefcb72f3626231c08d733fbbeee0a4339500eacb2170dc4151a1299,2024-05-17T18:35:35.070000
|
||||
@ -239438,7 +239438,7 @@ CVE-2023-5270,0,0,59c77e6c24afd41eaace6ecdd84167c5c2319574ba08c67842b725e799e4b2
|
||||
CVE-2023-52700,0,0,8cf5738642ff8e2160a8350f4c43f6b287a2fbef0bb1a641ab748ad2417301f5,2024-11-06T15:35:07.743000
|
||||
CVE-2023-52701,0,0,677100564637bdf0af06f27033c00966698848f746d9ec1a45da915d615f9d0e,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52702,0,0,b2e8f62250efb7d825a81d0942184d9e9d88d741263380f5b5947ac07366415b,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52703,0,1,a847684cd5916c6c7c1816a44cbe83243fb86212ca42b13ac5a1c9ba25677856,2024-11-07T17:35:08.690000
|
||||
CVE-2023-52703,0,0,a847684cd5916c6c7c1816a44cbe83243fb86212ca42b13ac5a1c9ba25677856,2024-11-07T17:35:08.690000
|
||||
CVE-2023-52704,0,0,9a1e560d3f3d9d43bfcff569880a48160a561d854512da83fb51353297122af4,2024-10-31T20:35:02.910000
|
||||
CVE-2023-52705,0,0,e0e7e3d50f6a0ba6a1fa2b6f11b4a84fb685696b90642bf7cc71cd16ca5855b0,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52706,0,0,8b37f3ec912d4dd819fdbc4c9acfa204e7a0af66839e63b9ecf7fb3314fc2625,2024-05-21T16:53:56.550000
|
||||
@ -239675,7 +239675,7 @@ CVE-2023-52917,0,0,e7e17c5c7f3534e727632e5d0f203ae6b740f17b02a99e6ffa625b25ee582
|
||||
CVE-2023-52918,0,0,21564d3b5227bff513646c579d7bdd7f1583e549e4c51e98581a4d9efd156cd6,2024-10-24T03:55:26.737000
|
||||
CVE-2023-52919,0,0,a37d9d88a926a49efde8ee5228e861273658f480dcdcfcb710741f8df16c3c09,2024-10-24T03:53:16.377000
|
||||
CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000
|
||||
CVE-2023-52920,0,0,19c52e500a550fd0a50601f22f5ff0299868a2f6850cb32643ec62c880fc1415,2024-11-05T16:04:26.053000
|
||||
CVE-2023-52920,0,1,9cb91c05199de061b3421002d69a7ce229465da018594255a34833b7b80e22b1,2024-11-07T19:31:31.217000
|
||||
CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000
|
||||
CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000
|
||||
CVE-2023-52946,0,0,43d8c575418a7f78a11e9526af607aac1baa72cf0563b1f4b331156f6ceab810,2024-10-08T15:55:07.543000
|
||||
@ -241164,7 +241164,7 @@ CVE-2023-6931,0,0,11b522d2f1afe0ea009771d7d0e900f4280baf4086f0f93b2775c0f0cfeac8
|
||||
CVE-2023-6932,0,0,9843f566e1c44316ff787a959461ab243ed33ecd086b36b87d3d19a204109ad0,2024-02-08T16:15:47.590000
|
||||
CVE-2023-6933,0,0,a24af010c48c374a02cf4406ffddd60443e941be8e212c484b4abfa50686949a,2024-02-14T21:30:51.970000
|
||||
CVE-2023-6934,0,0,4f37a8285bf8de2518809b1880c503569a73399caaf5045d5339519cc870ea3d,2024-01-18T17:01:12.533000
|
||||
CVE-2023-6935,0,0,cc2d976c8a6d4416b6864dcf6ef0b4bb5fea01851bae8baf305a0a39631e3228,2024-02-11T22:29:15.837000
|
||||
CVE-2023-6935,0,1,71c69fce12d2291c5c2e0d9bd003fb185b16acc0dea948bf1a48c91a13f84e95,2024-11-07T20:41:30.957000
|
||||
CVE-2023-6936,0,0,590fc22ffb9c3602f742d605f761b9ec1260c13092f9625c188e201d3cc6a984,2024-02-22T19:07:37.840000
|
||||
CVE-2023-6937,0,0,22f77ef12276e70cc04f7cbd2ba242ce3bbae056f0467ac3fa7560d46f958490,2024-02-15T19:55:09.230000
|
||||
CVE-2023-6938,0,0,11f80052b936c04b9e187c3b789917daa425ce7825b2d97a007c8789d5c880c3,2024-01-18T15:57:39.827000
|
||||
@ -242400,7 +242400,7 @@ CVE-2024-10022,0,0,92e93478773b21ba9b2d43e5c324e5c622d589913a6faa7f64ee1349beb7c
|
||||
CVE-2024-10023,0,0,fb7a2d87c1d01f1c0f753ee2a4448f391382353000e2526f44469dfe5432a49f,2024-10-21T13:14:37.300000
|
||||
CVE-2024-10024,0,0,341fb3a51358c0d5f83894d8ffa34bc8830630ac4903510ed67f09db34646b2e,2024-10-21T13:15:01.730000
|
||||
CVE-2024-10025,0,0,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10027,0,1,139c643fb4aaade3608d78d7da95cd9c22034efc7a5061ec2fb8c3c17749c900,2024-11-07T17:35:09.033000
|
||||
CVE-2024-10027,0,0,139c643fb4aaade3608d78d7da95cd9c22034efc7a5061ec2fb8c3c17749c900,2024-11-07T17:35:09.033000
|
||||
CVE-2024-10028,0,0,3efb32d0ea3a8f3bb8e9563cfd9c2e219c2c04ec85bc2ed4f5f1bb43fa35dabb,2024-11-06T18:17:17.287000
|
||||
CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000
|
||||
CVE-2024-10033,0,0,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625cc1e,2024-10-30T18:50:04.137000
|
||||
@ -242443,7 +242443,7 @@ CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4
|
||||
CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000
|
||||
CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000
|
||||
CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000
|
||||
CVE-2024-10114,0,1,16b8947ff2e570aff6db4fc1326409cd8691db8a310b773c04315751bc454909,2024-11-07T17:04:09.203000
|
||||
CVE-2024-10114,0,0,16b8947ff2e570aff6db4fc1326409cd8691db8a310b773c04315751bc454909,2024-11-07T17:04:09.203000
|
||||
CVE-2024-10115,0,0,2f48f8fc2fb64e7eea0f8a197e6ea039f4addb791184326175f5bf3196ca43c6,2024-10-18T19:15:13.600000
|
||||
CVE-2024-10117,0,0,7266808fb250241ee6ed4b7bcd7ffe295a81bef2421c05c5f9197e6a33b75e8d,2024-10-28T13:58:09.230000
|
||||
CVE-2024-10118,0,0,20c350d413130c355373caed8d6cb5911ff957b85489cebdf58c361a0299d81f,2024-10-18T12:52:33.507000
|
||||
@ -242524,7 +242524,7 @@ CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4de
|
||||
CVE-2024-10223,0,0,237ebcbe1a44551c4c262c272427d3817a64977114a9e921cdeb1f7ff3ea65fd,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10226,0,0,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000
|
||||
CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10228,0,1,d569133a271818bbabb06a409fc5b29be55f5994c84d2df5dcb22d53edb0464d,2024-11-07T17:12:45.750000
|
||||
CVE-2024-10228,0,0,d569133a271818bbabb06a409fc5b29be55f5994c84d2df5dcb22d53edb0464d,2024-11-07T17:12:45.750000
|
||||
CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000
|
||||
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
|
||||
CVE-2024-10230,0,0,5b2eed7a3522d994daba36d504e121d06d38d6b2f8f6bed6dcdcf2e92eeba1bb,2024-10-31T08:35:03.010000
|
||||
@ -242778,7 +242778,7 @@ CVE-2024-10700,0,0,31233b8d64f3c9c8e4fb3c67b64a1725548271e95821d774cfaec82689cc6
|
||||
CVE-2024-10701,0,0,53baafb789e17d3adca0638e17c429a583b20f9faed929ac230c13977cad3370,2024-11-05T16:52:44.937000
|
||||
CVE-2024-10702,0,0,1494650cf24141bf55e997b208eb307166b880baeab6c7ba81f17c35396d74f0,2024-11-05T16:52:11.193000
|
||||
CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10711,0,1,667b67eedaf55d76b13f0d67159b73016c214e768164f9d0df569a4659871c82,2024-11-07T17:04:37.663000
|
||||
CVE-2024-10711,0,0,667b67eedaf55d76b13f0d67159b73016c214e768164f9d0df569a4659871c82,2024-11-07T17:04:37.663000
|
||||
CVE-2024-10715,0,0,d2c9653d43a32692b03cb0b8a0db12fe1fd5c8614bad27310f2895b65d6f57f6,2024-11-06T18:17:17.287000
|
||||
CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44f6,2024-02-13T19:44:28.620000
|
||||
CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000
|
||||
@ -242804,7 +242804,7 @@ CVE-2024-10747,0,0,bf56d8b7d455f19bb2d2cbf7ba2f56925af5db7d6565b739483e1eb3d1dfa
|
||||
CVE-2024-10748,0,0,1fd02e454095772468edf9e35260c4a72a4ccfbe321c1c6d22cbb6e027ab5125,2024-11-06T15:06:52.077000
|
||||
CVE-2024-10749,0,0,9f9574ebdf519eebbacaa573a7a97dc63bac824fa6612fdf73241d718df9d0ca,2024-11-06T15:04:49.497000
|
||||
CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000
|
||||
CVE-2024-10750,0,1,058aca20b2a7c71039b2138004886690bc8deec820a26951b99fd1d85edbef65,2024-11-07T17:09:50.387000
|
||||
CVE-2024-10750,0,0,058aca20b2a7c71039b2138004886690bc8deec820a26951b99fd1d85edbef65,2024-11-07T17:09:50.387000
|
||||
CVE-2024-10751,0,0,6a49a3c7ad1c6ffcd0b7bcc6cbfa59cfbe62d4c966994df1d83f9666683703f1,2024-11-06T17:34:57.597000
|
||||
CVE-2024-10752,0,0,6cf2a6a9bc6560e825f8711fb6cd1013c57696598fd870914277d12e4f063991,2024-11-05T17:59:10.257000
|
||||
CVE-2024-10753,0,0,e47cd45037a1a13b612a69ab32046368824f10d157868477a01b6618688067f5,2024-11-06T17:42:14.277000
|
||||
@ -242826,7 +242826,7 @@ CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db5656
|
||||
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
|
||||
CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000
|
||||
CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10805,0,1,30683214c49996b99622c593b0d2824b7195979c84652d13638c9eb82a2ea54d,2024-11-07T17:09:07.057000
|
||||
CVE-2024-10805,0,0,30683214c49996b99622c593b0d2824b7195979c84652d13638c9eb82a2ea54d,2024-11-07T17:09:07.057000
|
||||
CVE-2024-10806,0,0,e15ec6423ae1ad698fb4ad5b42c94e3a5d06fef4f5e8a29e70adae83dbef0510,2024-11-06T15:06:48.493000
|
||||
CVE-2024-10807,0,0,783f0ac6c475ea7fcbd6f31f293edee7b9729e4af159ee9eb5bd3f13eec67953,2024-11-06T15:07:09.930000
|
||||
CVE-2024-10808,0,0,dac986d7fa4c7c52dcde054490fe5f45d88b724de3dc68cd9eaa633ce97a4fdc,2024-11-06T15:14:13.607000
|
||||
@ -242868,10 +242868,12 @@ CVE-2024-10947,0,0,9adb5268473ea3fea228f3f531eb38bf7afe18f43d752d8c6e606d0c94e4e
|
||||
CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000
|
||||
CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000
|
||||
CVE-2024-10963,0,0,76d1c2de6ef8866c3cbedffe6e071f17d99fcdf70b71d05a2f4b5560dd9eb997,2024-11-07T16:15:17.150000
|
||||
CVE-2024-10964,1,1,932022df45454192c27b27214f9ebfd2fc448c4c668edc98e31aee9ac4b57de8,2024-11-07T17:15:06.500000
|
||||
CVE-2024-10965,1,1,3da145d300696d81efea92b8ad0251b15a208fff15d9136fbab253d97c46ef92,2024-11-07T17:15:06.890000
|
||||
CVE-2024-10966,1,1,18b31358ef50050611f146262296d675ab5d947a27e7cb13657e86f0a1fce494,2024-11-07T18:15:16.033000
|
||||
CVE-2024-10967,1,1,a21f192cff1f36d5650d6e547699388efb7cc3b31d31bd2d7ba30b250786caa9,2024-11-07T18:15:16.393000
|
||||
CVE-2024-10964,0,0,932022df45454192c27b27214f9ebfd2fc448c4c668edc98e31aee9ac4b57de8,2024-11-07T17:15:06.500000
|
||||
CVE-2024-10965,0,0,3da145d300696d81efea92b8ad0251b15a208fff15d9136fbab253d97c46ef92,2024-11-07T17:15:06.890000
|
||||
CVE-2024-10966,0,0,18b31358ef50050611f146262296d675ab5d947a27e7cb13657e86f0a1fce494,2024-11-07T18:15:16.033000
|
||||
CVE-2024-10967,0,0,a21f192cff1f36d5650d6e547699388efb7cc3b31d31bd2d7ba30b250786caa9,2024-11-07T18:15:16.393000
|
||||
CVE-2024-10968,1,1,4db13284bb2668db27212f9b23fd23c8786091fe6a0c1d8a9d9c495d0c5875c5,2024-11-07T20:15:15.633000
|
||||
CVE-2024-10969,1,1,f64a194bedc79492a1cc5931029c0d0397f9a3186d57d95808f266442abe04ea,2024-11-07T20:15:15.930000
|
||||
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
|
||||
CVE-2024-1099,0,0,60fc16226818d332b7b359f2f2234cb026357af6ad05031d156ab3f490bb4021,2024-05-17T02:35:14.133000
|
||||
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
|
||||
@ -243335,7 +243337,7 @@ CVE-2024-1585,0,0,2718021341e4b7abfb9522fdd2203542a0a24ba595903301224072ffeea08f
|
||||
CVE-2024-1586,0,0,83b1a2525ff5f4122e8733b451cd8e49b02b04022b48f5f4a4413ee496d4410e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1587,0,0,939b698a3215c9eab1d9c6dd29550e57b9a0e117a8128be9f82cfde8616ad7db,2024-04-10T13:24:00.070000
|
||||
CVE-2024-1588,0,0,f194e68927f16a52800b0c29ee1517adc20fbd52d56ede198b55b3b308f5ee33,2024-04-08T18:48:40.217000
|
||||
CVE-2024-1589,0,1,757ac1e8a57ad63a68805e329c5b1255ce70d49e0a3bdab132fd3b876402e987,2024-11-07T17:35:09.653000
|
||||
CVE-2024-1589,0,0,757ac1e8a57ad63a68805e329c5b1255ce70d49e0a3bdab132fd3b876402e987,2024-11-07T17:35:09.653000
|
||||
CVE-2024-1590,0,0,55065336af2b13e316c0eda4259c55fac0a262250fdcc9a72adf3dae3ffa9596,2024-02-23T16:14:43.447000
|
||||
CVE-2024-1591,0,0,efcee58637202c634402b3dc0f73136fd386f9a84f9452ec8452f721c852b97a,2024-02-16T19:26:55.393000
|
||||
CVE-2024-1592,0,0,bf3040aca3b13873ef06934ca7ebafaf738eaa760d501add1d524fe415ce0a24,2024-03-04T13:58:23.447000
|
||||
@ -243764,7 +243766,7 @@ CVE-2024-20043,0,0,9d08b57823a7799fd71aabd74ae5b9e264651170e52f1494fb1aba445a2da
|
||||
CVE-2024-20044,0,0,7b00cd01d330620de78c873c2b5a5d1db703e947cc4fd0c1c90748e651832421,2024-07-03T01:45:52.167000
|
||||
CVE-2024-20045,0,0,474f87795caacdac62e2bb0672a22684b0d2c3ee03c744a052a1b929c228a9a0,2024-04-01T12:49:09.583000
|
||||
CVE-2024-20046,0,0,2b2346806d601871102b47d1857114a53d4c008a1b72821d4c813d568163c45f,2024-07-03T01:45:53.103000
|
||||
CVE-2024-20047,0,1,9e5a74b42096a0429aa2d1b10e40d80c18d61462905da14effc0684ae25994c2,2024-11-07T17:35:10.697000
|
||||
CVE-2024-20047,0,0,9e5a74b42096a0429aa2d1b10e40d80c18d61462905da14effc0684ae25994c2,2024-11-07T17:35:10.697000
|
||||
CVE-2024-20048,0,0,20f0a9f9a5cb818fc2b8e857bf930b064e9ba7c6112710d3c0a129a489a821eb,2024-07-03T01:45:54.020000
|
||||
CVE-2024-20049,0,0,e07d96190b9fb659d93c083b6d4ed267ea2541dbf11f25ef34e322f46f361bc3,2024-04-01T12:49:00.877000
|
||||
CVE-2024-2005,0,0,29cfa78c41bb5efa2e0f2373e627610aea0de98e344329360428bcff0cb9be4c,2024-04-03T17:15:55.773000
|
||||
@ -244568,7 +244570,7 @@ CVE-2024-21032,0,0,0d33c1eff84586817e520c3b9020c61c4ac401149d8fda4b4a5999487687d
|
||||
CVE-2024-21033,0,0,f104faebd2ee9f4c8e33491776e5f427a0dc20a28a4db67dad17225e8748169b,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21034,0,0,81ef3aefed05aeb330191c0efd7439af69b8cd2332a6223f129786b120f83ed4,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21035,0,0,83999dfc3873dc57b14f0f71041b45b6e28668800ae33b0d772aa09f643d5344,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21036,0,1,03772262febbe1802cb4e5be8d6e22eef6f08655ecf5ce6b4ff42f4682cb919e,2024-11-07T17:35:12.117000
|
||||
CVE-2024-21036,0,0,03772262febbe1802cb4e5be8d6e22eef6f08655ecf5ce6b4ff42f4682cb919e,2024-11-07T17:35:12.117000
|
||||
CVE-2024-21037,0,0,33050a6276f922cfcedac97b78c12fdbc7f45b309b0174964155153f73d5219d,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21038,0,0,bfdd0e7e4013735185b099df381c36ba9c4b9fe7698d8ce6190978f3af67da26,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21039,0,0,5533a80506dc2a9584f3f0a1cb6213d349fbac4fc9f3be60fa10f69e60d73724,2024-04-17T12:48:31.863000
|
||||
@ -245209,7 +245211,7 @@ CVE-2024-21735,0,0,64afeafd3ca5ebe95ef19b8cb0b1a221cb3831f7e736f22e7bca2463c0261
|
||||
CVE-2024-21736,0,0,54442fb9b042c5f4e212c801d8862949178fa83601b4c5ba313c1abbb63c3c64,2024-09-28T23:15:12.587000
|
||||
CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000
|
||||
CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000
|
||||
CVE-2024-21739,0,1,bcd84af74cedfe2a05503c2b2710e8639a52c7793d32380a556dd216c0e5f217,2024-11-07T17:35:13.150000
|
||||
CVE-2024-21739,0,0,bcd84af74cedfe2a05503c2b2710e8639a52c7793d32380a556dd216c0e5f217,2024-11-07T17:35:13.150000
|
||||
CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000
|
||||
CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000
|
||||
CVE-2024-21741,0,0,276c90d557a1ddbd7ef0f820219f4441d781301bc74a468f8ee48dc1b2e4d8b9,2024-10-25T18:35:03.493000
|
||||
@ -245918,7 +245920,7 @@ CVE-2024-22714,0,0,a9e8e25ef22da74b6de4ad04262ddb714bc83c7539ac3ba25c2f4f5074b70
|
||||
CVE-2024-22715,0,0,b4a745df0ad0b8ec34d469bcc0776699e2d75171257c5217f0f753481edb107f,2024-01-24T20:13:00.880000
|
||||
CVE-2024-22717,0,0,ca261a195338eae13cf040fced9dcd4c7f6388ad3c49be3f2e5ac8b4d2ac8c4b,2024-04-12T12:43:57.400000
|
||||
CVE-2024-22718,0,0,fdbc5618325a454d8b333a1e48c28cf1aecdc2c23be645f7cd092c43b90b9ed7,2024-04-12T12:43:57.400000
|
||||
CVE-2024-22719,0,1,83a68735925631248610a829cf1fad56584a2b44d3b80b260536c3c972d1bc32,2024-11-07T17:35:13.377000
|
||||
CVE-2024-22719,0,0,83a68735925631248610a829cf1fad56584a2b44d3b80b260536c3c972d1bc32,2024-11-07T17:35:13.377000
|
||||
CVE-2024-2272,0,0,bc7fc0edef953b8e6907a8afb1963293ca16cc15ca659728d50442893cc6726e,2024-05-17T02:38:08.237000
|
||||
CVE-2024-22720,0,0,9b189ed7ed41dddb5c89809962586573f4f56f2a5e75240cf2e0c1b185b206be,2024-01-30T20:51:16.247000
|
||||
CVE-2024-22721,0,0,599536e6bd03ad42ae83138e0bdfa882c8390700e254105fa71cba40ba36ebcd,2024-11-04T15:35:27.650000
|
||||
@ -246062,7 +246064,7 @@ CVE-2024-2308,0,0,5bb2112645629721229497ec215ea65583df40f8b60e0deeb65bb784d4510e
|
||||
CVE-2024-23080,0,0,f45adee4e0e22336e2755adc7f0e4c8ad553b3c9ddbfd250b5b847f6bae20f98,2024-08-27T15:35:06.003000
|
||||
CVE-2024-23081,0,0,870c1c4df2360c6a0bcdcbbc7e7323672b70deea175c507823f8849ab5657624,2024-08-01T23:15:40.290000
|
||||
CVE-2024-23082,0,0,7f8e37bde125a04a1eaaf3decfef35e1714f1ae930ca7f44a95252121f38b18b,2024-08-01T23:15:40.357000
|
||||
CVE-2024-23083,0,0,713a3a31bf1b16621652d130f79628db8361d2685688b49ccf5933491f8dd58c,2024-08-01T23:15:40.430000
|
||||
CVE-2024-23083,0,1,c385591381e0265c87771e5a69f1a29225a8934a8b2931bc5e68330c9fa6e8c7,2024-11-07T20:35:06.223000
|
||||
CVE-2024-23084,0,0,ccaed5be16fc1a52374972400141acaca3aa08f2280ed991e42060e59b806c64,2024-08-20T15:35:02.813000
|
||||
CVE-2024-23085,0,0,c2d4a833e275adaea75d4721a85180117d94ed467e962dd33323527ca073d13c,2024-08-01T23:15:40.570000
|
||||
CVE-2024-23086,0,0,ad7053a9e7227763ba60dedee1159efdd725fc24c063d4d4a5575e493c06184b,2024-10-28T14:35:07.917000
|
||||
@ -246335,7 +246337,7 @@ CVE-2024-23373,0,0,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa
|
||||
CVE-2024-23374,0,0,f4c6d02700b6a8420aafee41d5598362caa782be31e75b6b5a2be4f35376a456,2024-10-16T20:26:47.983000
|
||||
CVE-2024-23375,0,0,6c40f68c93a67061204173a720ea1a7d00eaefa497b28279e14abbb274c64d60,2024-10-16T20:26:01.167000
|
||||
CVE-2024-23376,0,0,53f5fbcb9e7022eaed6b3b110c6c4a497cb456faf848338c012c4a394e4a25a1,2024-10-16T20:07:45.260000
|
||||
CVE-2024-23377,0,0,c3e4833903ad95d45a0469d4c22fd5cc0841672de66b1257aafc9b065e02c3ac,2024-11-04T18:50:05.607000
|
||||
CVE-2024-23377,0,1,400c2daf7cdb3f003ada2544e9e7be539d847558878843d4967c981498b91eb0,2024-11-07T19:59:06.997000
|
||||
CVE-2024-23378,0,0,cb12f7c9d19ce7e2f02f7f248035e9b955e6980ec80efbda1175620e9584e886,2024-10-16T20:00:29.503000
|
||||
CVE-2024-23379,0,0,d83d42193b183369769000f98e3afdec4ada9e1be3c04ea1a4b9166a0e8b650f,2024-10-16T19:58:40.227000
|
||||
CVE-2024-2338,0,0,97ed9304e53653e5f2f6be84ec656ed42a5ae14786266fb81f31dd764d99c05c,2024-03-08T21:19:43.127000
|
||||
@ -246344,8 +246346,8 @@ CVE-2024-23381,0,0,c05f9cee58e223ab89c0d0d7ff884408a74aec6ab8924761148e9dbc59968
|
||||
CVE-2024-23382,0,0,ff24d6020e14bb69f781982e2cd1ca969bdc34877498b5f427eb6708619a0e83,2024-08-06T16:30:24.547000
|
||||
CVE-2024-23383,0,0,a47dc771e576435c08fbf1cb6343f6cdccefbb6dc18c0aec3a268a581496d75f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-23384,0,0,af1a2c186017dbfb51721f232ecb63b5ddf276ff15ce1bbe6f03cf143cb8fb6c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-23385,0,0,1f5bb106cd97ab1ac033c9191c514307f12907c8dfae5ce4b77d7260477f3310,2024-11-04T18:50:05.607000
|
||||
CVE-2024-23386,0,0,926827ad8dc70c1b893f2c93658b56e57a60f148b9a66ffe113f1eea7140ec55,2024-11-04T18:50:05.607000
|
||||
CVE-2024-23385,0,1,68fa7445af97eb09c72e43bbd9ef340d5dca3d94ef0ad4f1c2901f0d7f9f6d88,2024-11-07T20:05:24.023000
|
||||
CVE-2024-23386,0,1,363f2fc05803a9c56cf7ff9095a3caf80adad124433c86abb8e05ee0d9927bb2,2024-11-07T19:54:23.047000
|
||||
CVE-2024-23387,0,0,a7f1916ac284cf0c8474af6b9f638254f5287c7c53a3c81d95bafc7f75d51a82,2024-01-25T02:00:29.210000
|
||||
CVE-2024-23388,0,0,752c714a44aeac9cd8289b285e00a882944a95b977a7bc2b41dab87372ead843,2024-02-05T15:18:21.920000
|
||||
CVE-2024-2339,0,0,f035f933b58c40751abb3c3284c6f139c7da6609ba017eef7b1ce8ff891fae95,2024-03-08T21:19:43.127000
|
||||
@ -246881,7 +246883,7 @@ CVE-2024-24092,0,0,85255eb7350c088041b14db17806ac0275bf0f870c5dc0846dac7ef708da6
|
||||
CVE-2024-24093,0,0,fb5ed7dd5447f2f3646a43ede6e27e58ea7347516d0a38f6974af6473303761c,2024-10-31T20:35:03.523000
|
||||
CVE-2024-24095,0,0,2300da440fe56bc28fa2804706eae59dc7c13f0a8c63fddcdf29667e8551c83e,2024-11-05T18:35:04.977000
|
||||
CVE-2024-24096,0,0,4e9bc66f9f7d1a742616702da02cdfec0f741d469b33ce36a139d26ce7be33a3,2024-11-05T20:35:20.500000
|
||||
CVE-2024-24097,0,1,0f286f93ab4099581c2d7eda1bde779bd95c815a2f5002407ca5d3b3c9a7ea7b,2024-11-07T17:35:14.230000
|
||||
CVE-2024-24097,0,0,0f286f93ab4099581c2d7eda1bde779bd95c815a2f5002407ca5d3b3c9a7ea7b,2024-11-07T17:35:14.230000
|
||||
CVE-2024-24098,0,0,e685e688e8d421091dd6b9de1a2931d14c9c45e1d20db0290f58fd035af8ce09,2024-08-08T21:35:04.617000
|
||||
CVE-2024-24099,0,0,2e6058e206f484b5ee334550654c9eed8abf43909439a7cc59000b45bd0a67a0,2024-11-07T00:35:00.657000
|
||||
CVE-2024-2410,0,0,83127872af9993e0cf76f9668e41f5f9f61d019a9eb5dfde8649175f2ae3af10,2024-05-03T14:17:53.690000
|
||||
@ -247219,7 +247221,7 @@ CVE-2024-24782,0,0,60399add06054ccd1ab208ac080e2f01c807564104bf0e677cb581da58b84
|
||||
CVE-2024-24783,0,0,8d59145357d82e9723af448a8854307e93168cb94ffcd181c4388ef46771b9a6,2024-11-05T17:35:08.987000
|
||||
CVE-2024-24784,0,0,c62f93b4c44015650b5ab232879230f801aee4f052aeb35f61a1e509443e2faa,2024-08-05T21:35:04.457000
|
||||
CVE-2024-24785,0,0,ed4b40570d55c22332f8ae251f400ebe696def65e3ed727a4487c1851f76d8f1,2024-05-01T17:15:29.610000
|
||||
CVE-2024-24786,0,1,a51995a9cb89754df0be431fbd2be12b14c2b2e68b44df7937a1c8ae82e1d044,2024-11-07T17:35:15.080000
|
||||
CVE-2024-24786,0,0,a51995a9cb89754df0be431fbd2be12b14c2b2e68b44df7937a1c8ae82e1d044,2024-11-07T17:35:15.080000
|
||||
CVE-2024-24787,0,0,d01b1be209abf6a135a8c9ff38f241150f7e8624b3b2cb4fb60d5dab3691270a,2024-07-03T01:48:25.213000
|
||||
CVE-2024-24788,0,0,50cca427c738d8b849be7f4d8278b66e2ec62c8bbcec404a7069521daaae7bf3,2024-06-14T13:15:50.670000
|
||||
CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000
|
||||
@ -247391,7 +247393,7 @@ CVE-2024-24959,0,0,2eb5fa195474ca0ac238a9f207ce9a8f05af1f00c7008405b477047c2902a
|
||||
CVE-2024-2496,0,0,bb1cebfba09528215a394bae7bcafe4c925a59faed2039af0c5cbd0a5b3dd7e8,2024-09-14T00:15:17.597000
|
||||
CVE-2024-24962,0,0,5e0d36c7c71f11ca3af9943c62b71ff43252950c3277e6803f25039b7cce73b0,2024-06-10T17:16:21.383000
|
||||
CVE-2024-24963,0,0,5d6e1af856b22054c356418d49796e2363906ed1aaaf2259e78ef057612da72a,2024-06-10T17:16:21.503000
|
||||
CVE-2024-24964,0,1,881bcf075e24af20c4adb29f5bd1a91599b44d68e1c21e601b281196dea9e21c,2024-11-07T17:35:15.343000
|
||||
CVE-2024-24964,0,0,881bcf075e24af20c4adb29f5bd1a91599b44d68e1c21e601b281196dea9e21c,2024-11-07T17:35:15.343000
|
||||
CVE-2024-24966,0,0,596d9f70ed531a9ce913b647600f9cfc649827cf292b66c3b67d74e0809d7525,2024-02-14T18:04:45.380000
|
||||
CVE-2024-24968,0,0,f4e9d15961007f0f7d091231be2ec2d12f69561d90ac37fc804bdf9e090ef9c8,2024-09-16T18:03:16.707000
|
||||
CVE-2024-2497,0,0,0abba4a60a0501980b979aaaf4b97236170cb15ea02aea63aa677f7cf3690b8f,2024-05-17T02:38:15.830000
|
||||
@ -247523,7 +247525,7 @@ CVE-2024-2514,0,0,956e72a82145af5df3731620e2db9c4a0fa06ee5f96614ef673f99b0f16dc3
|
||||
CVE-2024-25140,0,0,02a3bba96efcbad73ad6520b616dcfe50317ca878d5df8798f56ac79d62fc648,2024-08-29T20:36:15.900000
|
||||
CVE-2024-25141,0,0,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
|
||||
CVE-2024-25142,0,0,19d4bb5bd9d9370afd571c0a6d80ffe65e65cfd553d5b4ccef4ef771df0d1e04,2024-06-17T12:42:04.623000
|
||||
CVE-2024-25143,0,0,31d25cf0fb6ca436405cd759cee1d69276c6aefe963bad6366e8c8192c1421e9,2024-10-02T16:15:09.833000
|
||||
CVE-2024-25143,0,1,18572973b7ac399904fd3307708b3d67736a8e18bf5f0168b3e52b3de378ebbe,2024-11-07T20:55:49.697000
|
||||
CVE-2024-25144,0,0,e105222f7a750ee8fa3f0de9d118bf1e3ac02f5c85afcbf968453073cccaf090,2024-10-02T16:15:09.950000
|
||||
CVE-2024-25145,0,0,019019fbbbd35f7bb94f83f848a86247a2567342a1d429cff7e78b25bbb4c980,2024-02-15T15:10:35.503000
|
||||
CVE-2024-25146,0,0,2df270f52850547876c3822e2ea04ebd4280017868acba4a2703de60feb94949,2024-02-15T04:37:12.337000
|
||||
@ -248585,7 +248587,7 @@ CVE-2024-26658,0,0,d0abea21644259a2a84fe5233b7987b3fe23c1ee9064590ae02175ab7850b
|
||||
CVE-2024-26659,0,0,f14d6611e043dbfa82957de0620487d0288f5142381088625a705e2ce96cd2b7,2024-11-05T10:15:38.667000
|
||||
CVE-2024-2666,0,0,e2cf8a19de1b9913333cbdeda1b911f602befa5aacf4a74d8768fe1fef08e825,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26660,0,0,07427c0432049d8ef31d08748ffe4395e92966b708b235d963b72a02c7cc00b1,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26661,0,0,cc86415b98a0b276c5aca876a5fd5f9af927eebf9e9a1a08f3976e2d38c9edb1,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26661,0,1,e7872a2881d5718da7516cbde2a7c1589ac376dea2047951a3dc8386920e4645,2024-11-07T20:35:08.330000
|
||||
CVE-2024-26662,0,0,4690da5f07bb4f5e40786063116ee764b660c850faf8c8d2effbea2f2fef65cd,2024-11-01T20:35:08.353000
|
||||
CVE-2024-26663,0,0,bd833b424aaf0562dc5953d59630450a51a6e89c200d02d72e85966df2a94f8b,2024-11-05T10:15:39.053000
|
||||
CVE-2024-26664,0,0,1d717a40854f08ff433a6d4fbbc6c61ff1ddd16151936e8caf67390b70b29144,2024-11-05T10:15:39.163000
|
||||
@ -248597,7 +248599,7 @@ CVE-2024-26669,0,0,a6fd5b0b0b3d84e69818d552f2361b002d90e9c67b18c3d40b35bce20ef44
|
||||
CVE-2024-2667,0,0,bc9377d5ebeb2326a84627afa21f74869702a4481d5a1bc676e52d0fa1ff73f4,2024-05-02T18:00:37.360000
|
||||
CVE-2024-26670,0,0,fa06230f79e9f7d2f8feee6b34bc199f5df7a1e2fe10f83e9f4071495038e83f,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26671,0,0,3fc5c32a08ccdacdf18317ad47fa0919a89111fb0485f964f6bde9fca71bc601,2024-11-05T10:15:39.883000
|
||||
CVE-2024-26672,0,1,94eba864d22484a6a43eb8aa00aa42456d29cb5f932dc20cca4f7ddf31874bf7,2024-11-07T18:35:07.243000
|
||||
CVE-2024-26672,0,0,94eba864d22484a6a43eb8aa00aa42456d29cb5f932dc20cca4f7ddf31874bf7,2024-11-07T18:35:07.243000
|
||||
CVE-2024-26673,0,0,26775e3a15ac21b250966ab24ef9c9f13769a663dc07160f980a0d8669bcc75e,2024-11-05T10:15:40.050000
|
||||
CVE-2024-26674,0,0,4be158c6e63891d4ad98b4910b1d19e6f80df040d2109d93390daee94f3ba05b,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26675,0,0,91612b5d13d38e48f5fc25e271a7314b32d78aa55e6597a346fc58f42065bdf3,2024-11-05T10:15:40.220000
|
||||
@ -248702,7 +248704,7 @@ CVE-2024-26764,0,0,78430a65a09c7d3ada3f03311cf635dfee8dc446b67f56b341ca087c5093c
|
||||
CVE-2024-26765,0,0,68722d76e57e5cd70f2f2241021d2e214008aad7514467064e690f4d4788fd20,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26766,0,0,f2d986948c3d4976316f6a31aebb294c51eb6c84b4e36042963e5d45fd6d0c3c,2024-11-05T10:15:48.097000
|
||||
CVE-2024-26767,0,0,43a3f59d0eb979f798ca944ad0dd34fbf3fb382da52c269bda0e634877e201dc,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26768,0,0,1c76123f213dbab57a303277c81b5c1bc6882cbd6bf080be2febb3e644922a85,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26768,0,1,e84564546fdaa2a60b50318f0071e20cbe4a4f6d34c7c708818c388e08faa4a5,2024-11-07T20:35:09.233000
|
||||
CVE-2024-26769,0,0,8a47a8112ec6fe0a36fe163c9d84952d4be1f685f8918e32e2eef91de1068d07,2024-11-01T16:35:13.773000
|
||||
CVE-2024-2677,0,0,92fcfadd96aee27e43ae980abbe595be6a5439df4ef33d0997ccbd9ad3da7727,2024-05-17T02:38:24.630000
|
||||
CVE-2024-26770,0,0,08ad6ec3165a725c6fa9a73be3ec6efd68b7706e058189cf1fbbb55cb8bb79a2,2024-04-03T17:24:18.150000
|
||||
@ -248721,7 +248723,7 @@ CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2
|
||||
CVE-2024-26782,0,0,c90a7c58c94a9b45b0f8e04b15d6d2d434e3bf04efa6042ff683848b5963467a,2024-11-05T10:15:49.490000
|
||||
CVE-2024-26783,0,0,2af6ae94e0862d9e4c8fd1dd01e9d9533df487005b3632bcc9e5cde226324207,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26784,0,0,3a3f9b64e77aea2ce61d08fe6ae8aad422b3d40e30ce83138a1e05ab32d7f913,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26785,0,0,492d91066ad796fd42a81d8353bd8f9a1d6609491204ab2e4afcd38caad744f6,2024-10-10T12:15:03.027000
|
||||
CVE-2024-26785,0,1,607e3fb628b0c99c297c4939ac0cb171a41da98b5eeccede77863ac332daf2b9,2024-11-07T19:35:06.440000
|
||||
CVE-2024-26786,0,0,f0d42ff714fdbdea6cad40254a7441c39ad23ba1d0f464ffbc3844c541dc2469,2024-11-04T17:35:11.680000
|
||||
CVE-2024-26787,0,0,196ec7430c411fe5c64462ca4a83845d3042d61336246cceb5f88ee256246d6d,2024-11-05T10:15:49.867000
|
||||
CVE-2024-26788,0,0,9601fe1cbc757f477c86a61d19b404811c1889f8688ebaae435bdfd34f696947,2024-11-05T10:15:49.950000
|
||||
@ -248731,7 +248733,7 @@ CVE-2024-26790,0,0,87440b941220ec3fe4301d6d71b6b3fe43fc63929a2ee44e421aff6dd31c2
|
||||
CVE-2024-26791,0,0,66f7fe8db3d9f4d44c9048310211634f073b10ddb1dc42f0793085bcd8efd63f,2024-11-05T10:15:50.240000
|
||||
CVE-2024-26792,0,0,e502200937968709c0c1c366e33ec6f2b70ec2074228d897f98e6441e19f7ee3,2024-04-04T14:15:09.783000
|
||||
CVE-2024-26793,0,0,33220f188dbb4d619fe89e3a49a62b610ebeb2975ab7d8d8227301aa377a7e4e,2024-11-05T10:15:50.500000
|
||||
CVE-2024-26794,0,0,fcc6dfd7822134b198da3d6ddac7dfc3182f661946c2ecaa378d8c74b430dc8c,2024-04-04T14:15:09.843000
|
||||
CVE-2024-26794,0,1,72a0a2881ef7269e7fcf840870e899a44de7deb0cf4135a98ca119ea76302312,2024-11-07T20:35:10.190000
|
||||
CVE-2024-26795,0,0,7d0a54ff0c5efa2f3d7215e2ddc4f6ecd0e6f69b941ec6879cc5b6af2ff7157a,2024-11-05T10:15:50.683000
|
||||
CVE-2024-26796,0,0,3affdc98728e9ff3dc84c971aaca313eb013d4ca7109a6ece2879e019bf8e643,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26797,0,0,4b45cf99e833a07d36f553262c37b3e65b5a8447b2973f4a7792233c43765b6a,2024-08-01T13:48:13.443000
|
||||
@ -248849,7 +248851,7 @@ CVE-2024-26898,0,0,20c229e8fd5adc607451615a6453a1249fd9f1be9fe07f3bbfdfef94e1f0d
|
||||
CVE-2024-26899,0,0,1f11bdf1b25a0796c85b132e8320f1f7314f487487b47bfe06c522484011aa5d,2024-04-29T19:34:10.080000
|
||||
CVE-2024-2690,0,0,8a0e6598609cfaf718bb2c9d66fffc866911f408139789f9b9a729c1ed28fd12,2024-05-17T02:38:25.710000
|
||||
CVE-2024-26900,0,0,52342ee5f5a4ea1be7899f35ccbb2f2f7bc74b4ca13579edf97517bddfc7a4ee,2024-11-05T10:16:00.753000
|
||||
CVE-2024-26901,0,0,d7bd1bf1e943219678bc1b80bf18dfb7e33ca730fa8e9370f20fb2796ec97bc7,2024-11-05T10:16:01.027000
|
||||
CVE-2024-26901,0,1,8fcc396814ad47d4cd59aa433cb40c7bb818e97dacd0578914d5c0c7a2b7b8b8,2024-11-07T19:35:09.747000
|
||||
CVE-2024-26902,0,0,403873851c7a77c4d64db8c4cfe6f949278cfad5955974b2e8c40aba88e60bd6,2024-04-29T19:40:05.897000
|
||||
CVE-2024-26903,0,0,8d78cb34b6b13848987aaf4779cfd5ef23b795a775305fc4b052a25ad089971f,2024-11-05T10:16:01.510000
|
||||
CVE-2024-26904,0,0,465375d12896d369ba32f0f5a9c1b1a82fd461e229bd66d68713d6d3b21eb08e,2024-05-21T07:15:08.260000
|
||||
@ -248947,7 +248949,7 @@ CVE-2024-26987,0,0,641ff74115948d87ad54c4bf8be7c5c4796ed88aa9f8833f1b6409659dadd
|
||||
CVE-2024-26988,0,0,dd649c49ad83022d07b46397970cb27971111a0497343b1b882fc560af8a53f9,2024-11-05T10:16:14.400000
|
||||
CVE-2024-26989,0,0,dbc179ff0ba7169674e0e088409f526c30b24f4d08de3dda1821049ed54f28f7,2024-05-13T08:15:11.017000
|
||||
CVE-2024-26990,0,0,9b9558e43e20b1e28e693fba8f5f27330fefe2730d26184929c933061c05bf0c,2024-05-13T08:15:11.083000
|
||||
CVE-2024-26991,0,1,81ad54ba966fe764c87fb4f2dcb9dc0359ceec1dc6716e26617fca4c1c17ce67,2024-11-07T18:35:07.613000
|
||||
CVE-2024-26991,0,0,81ad54ba966fe764c87fb4f2dcb9dc0359ceec1dc6716e26617fca4c1c17ce67,2024-11-07T18:35:07.613000
|
||||
CVE-2024-26992,0,0,bc997639d6a66fb5cfcdd14535f30d9f82ab75003f826aec82dcbbc4fae8a036,2024-05-13T08:15:11.193000
|
||||
CVE-2024-26993,0,0,8f1bbd2975c5e0f999efff9ac0b76e3a3d5afeb16067beba70b8ebd45f8c4e01,2024-11-05T10:16:14.807000
|
||||
CVE-2024-26994,0,0,8c1928377ef62ec71fe1ebbf16b684a5684b1e1ca47f3fac289479dc04714fb7,2024-11-05T10:16:14.997000
|
||||
@ -248996,11 +248998,11 @@ CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784e
|
||||
CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000
|
||||
CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000
|
||||
CVE-2024-27036,0,0,ec763184980ab8c8db94616c84ea7671c7f1e662314f390df792c3ccb4fa5ddc,2024-05-01T19:50:25.633000
|
||||
CVE-2024-27037,0,1,3f6971a33dca818139a27aee8495a94559da61eadab1b552d006829faf68ee4a,2024-11-07T18:35:07.887000
|
||||
CVE-2024-27037,0,0,3f6971a33dca818139a27aee8495a94559da61eadab1b552d006829faf68ee4a,2024-11-07T18:35:07.887000
|
||||
CVE-2024-27038,0,0,9878ea09c7d26edaec27ffb36455390953899fceaf1f12bd124bb3565e0a7379,2024-11-05T10:16:22.883000
|
||||
CVE-2024-27039,0,0,473802bd82adeba8f1c0a67644df7d9a045a00c8568f291191028b5f2909fca1,2024-05-01T19:50:25.633000
|
||||
CVE-2024-2704,0,0,7ecfea8520a2d9684b98d947682479275e2134935ad6198e1ad34620d22ef79c,2024-05-17T02:38:25.980000
|
||||
CVE-2024-27040,0,1,b049bfc1fc2f371a7a5422f032035b27c1c4e1fc4bb1ff05cae30b0e1205149f,2024-11-07T17:35:15.913000
|
||||
CVE-2024-27040,0,0,b049bfc1fc2f371a7a5422f032035b27c1c4e1fc4bb1ff05cae30b0e1205149f,2024-11-07T17:35:15.913000
|
||||
CVE-2024-27041,0,0,a1302c65e1bdad41a2efa558a8f48ede79e9fb3a3cd39d52e0e0f70940e157d8,2024-11-01T16:35:14.873000
|
||||
CVE-2024-27042,0,0,4b248649e696522f4b7b7d3ac059cc45f6910cdb9afa4b5eac8f3ab88c6b6f73,2024-05-01T19:50:25.633000
|
||||
CVE-2024-27043,0,0,94927b29276c311fbd0062e2231f6e5772de31e8e075abc3d06089c3f21ebc3f,2024-11-05T10:16:23.613000
|
||||
@ -249362,7 +249364,7 @@ CVE-2024-27399,0,0,99d9510b637361dde4a735c6783496f5b872927f33529f36ec6d87018b5bc
|
||||
CVE-2024-2740,0,0,7545651108e8514acefb2b72311b601ee7dbdf24da5bdaec2774b5ead308107f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27400,0,0,069e4b8cc0d3bf02e960ba37e8375912ae86e06a0fac9563b07518abcdfda328,2024-11-05T10:16:30.580000
|
||||
CVE-2024-27401,0,0,2108c2b3a82de1479b02dc9b17616e30292e65e80cf2f1f1f2b452be65587c17,2024-11-05T10:16:30.683000
|
||||
CVE-2024-27402,0,1,cc257f03a76cd84a1e1a42929225a77ea2f23199b25673d89accfbc7ffaa25c2,2024-11-07T17:35:16.163000
|
||||
CVE-2024-27402,0,0,cc257f03a76cd84a1e1a42929225a77ea2f23199b25673d89accfbc7ffaa25c2,2024-11-07T17:35:16.163000
|
||||
CVE-2024-27403,0,0,77516c98c275da09db72e7dd3607718c599d77c5ae52b899e362d6ef3ef66c25,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27404,0,0,ba04286ff96a9fe413f3bbda5a3172056d212e25a7b2b3000ae5efbb44bffa07,2024-05-17T18:35:35.070000
|
||||
CVE-2024-27405,0,0,ac0279402299f2f71e1977cc36213a1a6da4fd4c8519dcf9db2d4f91548db71f,2024-11-05T10:16:31.310000
|
||||
@ -249914,7 +249916,7 @@ CVE-2024-28157,0,0,e8195ee7f7e668974cf7d8246dbfcc0b5132119f0f5390c3a7b5d268b5722
|
||||
CVE-2024-28158,0,0,e11a9678e4f2f0242962248a4f5f96e3f4098382c9b4895b78df62a6d496f942,2024-05-01T18:15:17.063000
|
||||
CVE-2024-28159,0,0,4a9f4f91b8aea86a42bde029558a44ab2b24f6212168e8c6c34372a6626e7248,2024-08-27T20:35:21.767000
|
||||
CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000
|
||||
CVE-2024-28160,0,1,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000
|
||||
CVE-2024-28160,0,0,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000
|
||||
CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000
|
||||
CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000
|
||||
CVE-2024-28163,0,0,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000
|
||||
@ -250622,7 +250624,7 @@ CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1b
|
||||
CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000
|
||||
CVE-2024-29213,0,0,923c285048ea8e8ada1ec8fc14c3379597d106a93dc5f7c0191835b40c0543ad,2024-10-21T18:35:11.263000
|
||||
CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40afd,2024-05-28T12:39:42.673000
|
||||
CVE-2024-29216,0,1,6a2805ccd7ce1a7fea431294a783ec9a8c9268bdf031499912aff6e671c3b62a,2024-11-07T17:35:17.440000
|
||||
CVE-2024-29216,0,0,6a2805ccd7ce1a7fea431294a783ec9a8c9268bdf031499912aff6e671c3b62a,2024-11-07T17:35:17.440000
|
||||
CVE-2024-29217,0,0,1379e154758970ea220e13f9d29020765e0cdb03091ce67a8deaa8fc55306947,2024-07-03T01:52:20.987000
|
||||
CVE-2024-29218,0,0,fd28018e0a318ff53d2f889814439c11c22ec14421c2666f247a4001d467468b,2024-09-25T04:15:04.083000
|
||||
CVE-2024-29219,0,0,e97981c98215900c3d254f2e28d0930b309637e1c27a9ebc7e3a0c0fc074e98a,2024-09-25T04:15:04.217000
|
||||
@ -250648,7 +250650,7 @@ CVE-2024-2924,0,0,92694fa46a3453529c704b3aac4610c3f64fe56024ea8960edc6b1dbef6415
|
||||
CVE-2024-29240,0,0,621b26d2dda00d1621b3bab3316516bc59177ae5d25559b527a36682d30dbf87,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29241,0,0,f0861a07c44b8912371f272bcf4c1503ed9147d95b095578a5d9b429acc0e691,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29243,0,0,03ec9bb493566015f908bfaebf75ec5d5aedfc39bbc77e2ee770fb19383b2b2e,2024-08-02T20:35:27.473000
|
||||
CVE-2024-29244,0,1,6f9d4ad1dcff98f3f7a7ac895b902de63ddc35cc88e50e21194e2aac23e0c2ef,2024-11-07T18:35:08.167000
|
||||
CVE-2024-29244,0,0,6f9d4ad1dcff98f3f7a7ac895b902de63ddc35cc88e50e21194e2aac23e0c2ef,2024-11-07T18:35:08.167000
|
||||
CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b70,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000
|
||||
CVE-2024-29269,0,0,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000
|
||||
@ -252842,7 +252844,7 @@ CVE-2024-32405,0,0,bc9991f960c5c51d23d0756dabed902418fdca4bc0036a9a8f03079b2256a
|
||||
CVE-2024-32406,0,0,73ac1f19b303163472b3c975415e4f499599d5740977837d587aebd96ab50699,2024-07-03T01:56:32.550000
|
||||
CVE-2024-32407,0,0,1df6d28e3ee9d38677711ef2283005c5e1de5158402682dbc25b6fec25c334a2,2024-10-25T20:35:08.740000
|
||||
CVE-2024-32409,0,0,6ab92e40fc5e6ae8f6002eb3cc0277e6ffae2eb1ca20e07c184697681f83d11f,2024-08-01T13:51:32.040000
|
||||
CVE-2024-3241,0,1,cbf15a0004f7c0d7f837f8fcf20e649601ab56008c09b2db32f3289e2473191e,2024-11-07T17:35:20.647000
|
||||
CVE-2024-3241,0,0,cbf15a0004f7c0d7f837f8fcf20e649601ab56008c09b2db32f3289e2473191e,2024-11-07T17:35:20.647000
|
||||
CVE-2024-32418,0,0,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000
|
||||
CVE-2024-3242,0,0,0753c592a4141511b7b3f4c81254cd267743cc6b5e9ea8c66b642642aec73f3f,2024-07-19T16:24:02.483000
|
||||
CVE-2024-32428,0,0,e92a586d0042e2a50a8472dedb0e8a402fc021118b6e178b0be2f35b18ed1a72,2024-04-15T13:15:31.997000
|
||||
@ -253441,11 +253443,11 @@ CVE-2024-33025,0,0,b2224958808cef69179c29751ac5699dda8398fa1ca6d6be644feb0949d64
|
||||
CVE-2024-33026,0,0,298d33f6a8bfb6f36fcf1be4fa982f6af985ae195af9a3a0c45ae097558f81f9,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33027,0,0,cc2e5aea91d0b51c006f2b36474a376cee8428cecc94d1a162b764842c335f3c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33028,0,0,9632bd9093b259716a8b9578d714120e37db12b0d16b9cf18505d5f86f8aeb5e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33029,0,0,70c2e343ba148f13ed11376116209ab84d1710635b4c1c97363fef474712e62b,2024-11-04T18:50:05.607000
|
||||
CVE-2024-33030,0,0,8b58689698c4a3e507a90b69666f459bcec9ee75e9ccdf551395d704be91e56c,2024-11-04T18:50:05.607000
|
||||
CVE-2024-33031,0,0,5f62d621d51befde20ba7b911726eca7a4eb2a07c2cb8f65c875eb73379fa78d,2024-11-04T18:50:05.607000
|
||||
CVE-2024-33032,0,0,63242e7f018d21d9f71a363b6ade6f06646e4f13dc1093ae9290fad9e15a8f23,2024-11-04T18:50:05.607000
|
||||
CVE-2024-33033,0,0,7df657d4c4289fb6f347187638edbe10a37c5398cf3a670ce1c3ea784cdae4d6,2024-11-04T18:50:05.607000
|
||||
CVE-2024-33029,0,1,62f4abf9d5534812dcbd495946ad70608b570bfbd1504fa70c29b97162ab7cc8,2024-11-07T19:54:49.197000
|
||||
CVE-2024-33030,0,1,6786bcd5f91e0222db6d4fee0ca52594e1eddb6ea4d24b69732bcfb924d01779,2024-11-07T20:04:32.803000
|
||||
CVE-2024-33031,0,1,2c6043e95fe57fcb75fcdc9e0de7b6eea7069d7adcef487c3c372f038ded1501,2024-11-07T20:02:31.203000
|
||||
CVE-2024-33032,0,1,98ee54090123171615e158b27044fae77331db53953631f8b90c74c1f7493104,2024-11-07T19:59:54.363000
|
||||
CVE-2024-33033,0,1,4ecde980d061a097abb6c1ea846d9ab81a0ba801acd0bcdb214e87c679daef4c,2024-11-07T19:39:24.863000
|
||||
CVE-2024-33034,0,0,54ed6e7d2fd983f237005bb3e1f82ed940ac2231de49deea5f0abbc3e6097779,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33035,0,0,a2cbf1ac3ca408060419991a03b24932660c70b02e16b8809b1fde0e9b502e88,2024-09-03T12:59:02.453000
|
||||
CVE-2024-33038,0,0,d174e8cb32f352bb37d4cf42fb06ed39c66af4e6d398e5501824f9508319fcd5,2024-09-04T17:21:28.943000
|
||||
@ -253466,7 +253468,7 @@ CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b7
|
||||
CVE-2024-33064,0,0,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000
|
||||
CVE-2024-33065,0,0,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000
|
||||
CVE-2024-33066,0,0,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000
|
||||
CVE-2024-33068,0,0,b547540c6e6fff4ddb6c4b5ad1b6c00cd676f2da25e54d35e18fa3cb6df96772,2024-11-04T18:50:05.607000
|
||||
CVE-2024-33068,0,1,f2315bb629cab5b7cc0a5f0ce7be555e8d4cd0a4a23bbaaa81acdf11b436ea32,2024-11-07T20:07:29.220000
|
||||
CVE-2024-33069,0,0,43c56f0e9b4f42c73eddbe695dc23769c84225eafe9aba7ea54e0211778b7147,2024-10-16T19:48:32.207000
|
||||
CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33070,0,0,5c227e83ae052fa89b8d8522db931e95887b68320f2416daace5ac118cc217ce,2024-10-16T19:47:04.547000
|
||||
@ -253677,7 +253679,7 @@ CVE-2024-3352,0,0,be8f28061e5ae4d9d9b2e6a11ede257adb292cc79dc8c4235b725fe02c0776
|
||||
CVE-2024-33522,0,0,99fcc369cb1d7d030860e4a6a89738f8fddd8cc3ac74b8b631e1a59fe3215895,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000
|
||||
CVE-2024-33526,0,0,d9fbb2bf90f7562deb9562daceb1447ff20e85e1306478b1fbaa885f49f02b18,2024-08-01T13:52:03.173000
|
||||
CVE-2024-33527,0,1,64802380ba213c8ed8d2b08a106aea9d62bbf83219355dec123798b3d9410a00,2024-11-07T17:35:18.427000
|
||||
CVE-2024-33527,0,0,64802380ba213c8ed8d2b08a106aea9d62bbf83219355dec123798b3d9410a00,2024-11-07T17:35:18.427000
|
||||
CVE-2024-33528,0,0,6d38b7704a361913efde540c7527f28cdaa52176f9b6f83eaffe6b959e019e75,2024-11-04T17:35:17
|
||||
CVE-2024-33529,0,0,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000
|
||||
CVE-2024-3353,0,0,ce0bc328455f80cf14b93a65517c4acf833c7c445bb8d7418f958bb30757f2de,2024-08-01T13:56:31.790000
|
||||
@ -255321,7 +255323,7 @@ CVE-2024-35796,0,0,ae4abcb8ad9f6f490bd16b1eba9dc94eab40136dc368dbb51a897b6a16bd8
|
||||
CVE-2024-35797,0,0,5d191573df70b8ecabb4b3e8db1feb40dcd5737961b1f2da8e55d32c7ff2e1b8,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35798,0,0,c6621222abaf060f395461638bd7c76ec0183db720d30b3003bc12d1b0276d22,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35799,0,0,2dce7d3c01c6b462983682ed86f45e0447833392232f61fcdb54d3cb67bf0d68,2024-07-03T02:02:11.170000
|
||||
CVE-2024-3580,0,1,ac379b7c61198dcc5d9b9e5b61b78e72864de0a9836d2f6b5f591e1184a84d66,2024-11-07T17:35:21.603000
|
||||
CVE-2024-3580,0,0,ac379b7c61198dcc5d9b9e5b61b78e72864de0a9836d2f6b5f591e1184a84d66,2024-11-07T17:35:21.603000
|
||||
CVE-2024-35800,0,0,96f048270ee3bc1b00242a76d9f7a6a7780d1d96a7dabdc5b9d23feb66607ef0,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35801,0,0,7beb0f17bf3151694c1d4b5eedafd44e39c46da43f8694c5ee3a6a093af6baba,2024-07-03T02:02:12.050000
|
||||
CVE-2024-35802,0,0,ea8171637c0586c34eac761166467f3c9d02a08ac1e48583ed6400ff75edaeb8,2024-05-28T19:15:10.597000
|
||||
@ -255447,7 +255449,7 @@ CVE-2024-35912,0,0,92dbc5f452d437b2bb7e0b863d5fe5de44086813cb939b9d0e2bce4f50aa0
|
||||
CVE-2024-35913,0,0,220fe9065c9da79496da8f0f47af2b430c89c4b49f3239195cac9a423cf69e98,2024-10-29T20:35:22.610000
|
||||
CVE-2024-35914,0,0,807d953d8d08f072504c4c6ccc17ec8f3981a1368b6dba79340f71aba1e737b0,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35915,0,0,4fc6900a72bc11698ae47accc75ed7346c4824aacfc7fe42bcc384369a794b5a,2024-11-05T10:16:52.750000
|
||||
CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a1ac,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35916,0,1,9bdfe759261f6f500036f4067d982b16331da29ec66ca5fe4fc12db519206b0a,2024-11-07T20:35:10.687000
|
||||
CVE-2024-35917,0,0,ef28657905524f9b7f229abe3cf11569c21934c08ac9147215aa72d97ba1ce78,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000
|
||||
CVE-2024-35919,0,0,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000
|
||||
@ -255573,9 +255575,9 @@ CVE-2024-36027,0,0,6d132f0070368ebb901ae863618800de97458f62f0891773fe0bfa7baa2b4
|
||||
CVE-2024-36028,0,0,4c0f9c21a4cb39b02c5699fae69e59153086259d5fc7e554a3cb9456166e8dc4,2024-05-30T18:19:11.743000
|
||||
CVE-2024-36029,0,0,d4bc2bfd69f01c287140f455c505f63fec62148b2be37c59c97499e2a9333398,2024-05-30T18:19:11.743000
|
||||
CVE-2024-3603,0,0,a4a5150df5ff77dbc74904e3cf8d623cc8c580399dd7a85bc4a422fc782cc470,2024-08-07T12:51:50.770000
|
||||
CVE-2024-36030,0,1,dfe33eb40ab6d3c86fe8e09f399080e55ff8c143ad17ae9d4367840213606f80,2024-11-07T18:35:09.050000
|
||||
CVE-2024-36030,0,0,dfe33eb40ab6d3c86fe8e09f399080e55ff8c143ad17ae9d4367840213606f80,2024-11-07T18:35:09.050000
|
||||
CVE-2024-36031,0,0,2975546e733dd5cf7c9429c6f90bb5d1e17451572ff45240b1c22396c4a132e4,2024-07-15T07:15:04.830000
|
||||
CVE-2024-36032,0,1,47c1117c7e360bcf7ceed3aebfda780edc98eb4cde1f5e06909a62388503066e,2024-11-07T18:35:09.363000
|
||||
CVE-2024-36032,0,0,47c1117c7e360bcf7ceed3aebfda780edc98eb4cde1f5e06909a62388503066e,2024-11-07T18:35:09.363000
|
||||
CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d43a,2024-07-05T08:15:02.720000
|
||||
CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000
|
||||
CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000
|
||||
@ -256115,7 +256117,7 @@ CVE-2024-36904,0,0,b7874a7b4ea2d9d677f677e7453db90fa0407b7e357176e1e80ffd60a5ed2
|
||||
CVE-2024-36905,0,0,224631446681facae69ca36232411fb99870ee054fa4cd514b06f1774d29efc7,2024-11-05T10:17:11.673000
|
||||
CVE-2024-36906,0,0,78d9234ba47f2ef5f02ca2f8dad06dc21e0279028241d5bb83d4c12efc181e4e,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36907,0,0,657d9b516f26fa4c515b56b9e196e7e20d67f35b65e83377846b140ea2a582f3,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36908,0,1,68be3ecc94e072c5abe97f0cd7cdad6c2d4f75d291d61d10692f74315c4dfb67,2024-11-07T17:35:19.317000
|
||||
CVE-2024-36908,0,0,68be3ecc94e072c5abe97f0cd7cdad6c2d4f75d291d61d10692f74315c4dfb67,2024-11-07T17:35:19.317000
|
||||
CVE-2024-36909,0,0,182762e23d79278cdf995fc9fc087675cc734d4f1b3cefa463efbb76f547cae1,2024-05-30T18:18:58.870000
|
||||
CVE-2024-3691,0,0,f7b904a9d1876d4ae156bb04b35a04c465e35e9fae33b98330150773a9a4dbbc,2024-05-17T02:40:04.407000
|
||||
CVE-2024-36910,0,0,40583cd9f13175a05952799ccb9247ee405dcba2dbb30942f6d83e17bf72952b,2024-07-03T02:03:48.127000
|
||||
@ -256156,7 +256158,7 @@ CVE-2024-36943,0,0,e5c40aba1ed70134ee05bf192a02557b4cdd81058c30e2f573675623409cf
|
||||
CVE-2024-36944,0,0,bd6e47c693844b0e04d972e184d47d9f3fa8cf6e333e8f95e03ac21e835f2086,2024-11-06T17:35:31.387000
|
||||
CVE-2024-36945,0,0,9b5a728f2714238570cb854b4612a6756ba0089725c4553d6c9a0b0041554f67,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36946,0,0,6c4f663040dcdaac170c1bfaf39bd626cc294015218996b58e401d1bb85f9e0c,2024-11-05T10:17:16.490000
|
||||
CVE-2024-36947,0,1,011d82d60ca34e038e0e0e518d23cf0d642615aa3eb6b8c72b76a7ac6b976608,2024-11-07T18:35:09.793000
|
||||
CVE-2024-36947,0,0,011d82d60ca34e038e0e0e518d23cf0d642615aa3eb6b8c72b76a7ac6b976608,2024-11-07T18:35:09.793000
|
||||
CVE-2024-36948,0,0,4620c670216cd562675061b7e7c7fb48f6ce471077a33e0fa196bc6c4e794e8d,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36949,0,0,37777281053a9c9d7bac67bab0a4a6835ac8d0e69bd436ab4ced90c2b58347e1,2024-05-30T18:18:58.870000
|
||||
CVE-2024-3695,0,0,cd8583909d9224874fa5edd0e2b15c723aa0e29947c489c19d9e0c7d6c0bc0f1,2024-05-17T02:40:04.520000
|
||||
@ -257305,20 +257307,20 @@ CVE-2024-38399,0,0,2b771b5ba490c62bc791d46a0084f1ef76097271953e34800c189edde8b5e
|
||||
CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000
|
||||
CVE-2024-38401,0,0,49e5f353e979551d81ba913b1959baf9c9c3b65372fddd5de7583edefa3b0302,2024-09-04T17:05:39.320000
|
||||
CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41c81,2024-09-05T21:43:22.677000
|
||||
CVE-2024-38403,0,0,8958dc3a4f5cdd79df6af4290ff070c00d33a2e9f2ac4533573ff2a008e3ab81,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38405,0,0,a505a4fd4be7afede4c2da1495f4422ab46c3c0d63d8c7bde8b6c1f39542a75a,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38406,0,0,1f1228db5aad2a69e9cb6a79ea695c633e1fff91ade5a48327f7c4a370e83d7b,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38407,0,0,c850df793301d63956ea2de95c1da7612354dfaf09d9aa5d87951a991bddc10b,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38403,0,1,b5c1199ea6a3cd51e1c218546bc236282f60c89253c2c4f0e86cc9406f1f1d46,2024-11-07T20:06:51.473000
|
||||
CVE-2024-38405,0,1,88da8bb3ce2c5c4f9a86768b7df56a11fb2f34259a6f58e464822f6de32240f8,2024-11-07T20:06:14.907000
|
||||
CVE-2024-38406,0,1,a74a4aa8cca4b492e1bcc1a6f8388cb3192e0174693034c1613a25d0789d9ace,2024-11-07T20:01:36.690000
|
||||
CVE-2024-38407,0,1,54a3c11c58de13c443ec5d1b302a2677e20cee25885ee8f405d1d598f3637abc,2024-11-07T19:39:59.737000
|
||||
CVE-2024-38408,0,0,a71bf42758bad0648f05b420ec4b22d43a2840f9e4a82ce92b42e9e5aad98757,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38409,0,0,1c5215f692c2bc0e6ae37b7b32421c66545eacf9ecc84b96bba23930fffdb7b8,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38409,0,1,f47f63bb393897c0dfc97c1d0678a11ae2128c169f46720e16ae4328b8c1f0ea,2024-11-07T19:40:46.783000
|
||||
CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000
|
||||
CVE-2024-38410,0,0,5cea5cfb4bc439ce832f92d9c6fd8fffb08294b97be59c2eeb49f06244a7b422,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38415,0,0,496a43169afbfbd87ce1e50594aead25e503d0a73f46766803db5f72848ec51d,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38419,0,0,f9c0d718f5c27040e1ac989a2728e9885b61af1af81b5baaa6098039685c0f74,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38421,0,0,aad14f85b88e77a4170da6d063782d327d4bbef7c623d2319afa5deee071a16d,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38422,0,0,e92abdff4637938f6aa11bc12bba25c477ccc43ca20d8cc02d2a1ebd434dd66d,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38423,0,0,3bf7fdaa66125afc30eccef1cbb9ef74bd13212938c90821434b074e17838e49,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38424,0,0,06340bbf66d2a6342f7a5ee8dbfa160e63170339b13f4014ebbb43ba3d347571,2024-11-04T18:50:05.607000
|
||||
CVE-2024-38410,0,1,a3a388c8b60fc342c65b846c5841519162623905d30394895f5dd55c5398995d,2024-11-07T19:41:06.217000
|
||||
CVE-2024-38415,0,1,6ea48aa0012fdea9115aff20f4073924fc8e49cf9fe0b3cfcd1ef407ded80608,2024-11-07T19:41:31.973000
|
||||
CVE-2024-38419,0,1,7cce20faba96ec11231af281c754462a9b3890f8c7fc2576be3798fc9a96689d,2024-11-07T19:44:17.137000
|
||||
CVE-2024-38421,0,1,192d03cc3543d349e47d8004acce48d0026efb927c105ffa7731ba1bedf8562d,2024-11-07T19:44:39.647000
|
||||
CVE-2024-38422,0,1,3f4f39aa9a2f5598e6b9b360cf2c17060dce22e13f76913b47a914da876ec70f,2024-11-07T19:45:57.310000
|
||||
CVE-2024-38423,0,1,3724edb064d41370be4416d8aae2ca6a83bfcf55083c40f09c496c0204c5a338,2024-11-07T19:46:41.697000
|
||||
CVE-2024-38424,0,1,4e8d0ad8ea79adb14a923a79818b425f0ff2c084a94cb10a88d09fb0be3591d4,2024-11-07T19:51:32.117000
|
||||
CVE-2024-38425,0,0,d6a49b1b2867bcbd4e1afebc1d8cce3ff52f15da8a3ae6e1386a8acb3cf0ae32,2024-10-16T17:34:41.633000
|
||||
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
|
||||
CVE-2024-38428,0,0,452d54ed820ff08b69aa9d520f4026807b45be623e70313c52b21d33bd87b5b0,2024-10-28T21:35:09.643000
|
||||
@ -257427,13 +257429,13 @@ CVE-2024-38539,0,0,9488b6bbb3940f9ac1de867bde9fbcc881411ecb098ca77e384efe77519a1
|
||||
CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000
|
||||
CVE-2024-38540,0,0,e32a7f449ff8ae3014191cf278de61d18b1d635bb56b0abc92a1fbb7af071b4b,2024-11-01T15:35:15.297000
|
||||
CVE-2024-38541,0,0,023c6a7426f76d21c921b964034a52048d8ae62a75126b3da24f432830a3ec3b,2024-07-03T02:05:10.090000
|
||||
CVE-2024-38542,0,1,5b6315d30c24005411464cd6e47e963e0ace5c08db9b1853647af794a6f5b095,2024-11-07T17:35:20.127000
|
||||
CVE-2024-38542,0,0,5b6315d30c24005411464cd6e47e963e0ace5c08db9b1853647af794a6f5b095,2024-11-07T17:35:20.127000
|
||||
CVE-2024-38543,0,0,9904319b3841ba05d0649764b91a7dcf20e3aad22e44c835db1259658176f833,2024-08-29T02:24:30.617000
|
||||
CVE-2024-38544,0,0,bcedcd71122299f29823b1ebe7d97095ea4974bc03780498d9d07719a691151d,2024-11-06T17:35:32.340000
|
||||
CVE-2024-38545,0,0,261dbfbb482829eb8a10c5dffc48966eeb2cd7f072fdb8cd547b02f5851c26f0,2024-10-17T14:15:06.450000
|
||||
CVE-2024-38546,0,0,eea58266196a873fad4b4b919d579fb6ca82bf25773f04562985e9491c7b0b55,2024-08-27T20:03:18.263000
|
||||
CVE-2024-38547,0,0,0fd46903a324a4303feb1a86ea138cad132aadfdd07434ca776aa7fc69875c87,2024-08-27T19:56:36.727000
|
||||
CVE-2024-38548,0,1,1d4fefaae21b3ed24304889bd09e4edcb3023c2a1ebfd220e7dddd4bd428095e,2024-11-07T17:35:20.360000
|
||||
CVE-2024-38548,0,0,1d4fefaae21b3ed24304889bd09e4edcb3023c2a1ebfd220e7dddd4bd428095e,2024-11-07T17:35:20.360000
|
||||
CVE-2024-38549,0,0,23759d651c75e71c7abf259e3346236d359121811ca890a80b4abdbeb6d53463,2024-08-27T19:57:48.560000
|
||||
CVE-2024-3855,0,0,7262bd57b27d1b3d3103ab661d1f7d85ee277817264f21911d91b4fa573922bc,2024-04-17T12:48:31.863000
|
||||
CVE-2024-38550,0,0,f9339cdf187581dae1984489b06e040b122b4127b3752a57e3768453458373c0,2024-11-01T15:35:15.507000
|
||||
@ -257464,7 +257466,7 @@ CVE-2024-38572,0,0,51daba4ae3afcf7c5fe55b093c1a3f72e1a3bceba37dea337e218e2c66da7
|
||||
CVE-2024-38573,0,0,ca8898dfb11b5dd535a57345209c5053ecbd565ef57ea10dbb17683dd19ec64e,2024-07-03T02:05:13.393000
|
||||
CVE-2024-38574,0,0,6afdc30adbe5999044de1cc76d2cc76289f74910e8879e6f74197c6ff1a2b954,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38575,0,0,2bb1d17f38c40f1a364165b77b7ca5fceadcc7cb4b05f83746adb6eb31d29aa9,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38576,0,1,e2e18d3fd447ccc2d476fa92ca06a9c4a588be1994912cfb2f894f47f143ea14,2024-11-07T18:35:10.433000
|
||||
CVE-2024-38576,0,0,e2e18d3fd447ccc2d476fa92ca06a9c4a588be1994912cfb2f894f47f143ea14,2024-11-07T18:35:10.433000
|
||||
CVE-2024-38577,0,0,1efc1e7397f24359bd6439871f08b63ff432bc413f747234aacf9ee77a51c8fb,2024-09-12T12:15:47.620000
|
||||
CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000
|
||||
CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000
|
||||
@ -258700,7 +258702,7 @@ CVE-2024-40711,0,0,22f2a0ec5d60d30d489a1cbde640082edf370b191c841709c2ac9ec5e8cd3
|
||||
CVE-2024-40712,0,0,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000
|
||||
CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000
|
||||
CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000
|
||||
CVE-2024-40715,1,1,2f0ddf0df7df423cec2e162fcaf01d5d262b6a94dd3990c1ab3599fd5eba08f9,2024-11-07T17:15:08.083000
|
||||
CVE-2024-40715,0,0,2f0ddf0df7df423cec2e162fcaf01d5d262b6a94dd3990c1ab3599fd5eba08f9,2024-11-07T17:15:08.083000
|
||||
CVE-2024-40718,0,0,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000
|
||||
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
|
||||
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
|
||||
@ -260611,7 +260613,7 @@ CVE-2024-43428,0,0,a483e489d4ac4af14144f4326e22f286c1ec6d428ef5b9c8e36e63f2986dd
|
||||
CVE-2024-43431,0,0,0902d7b350b61639924f4c68fe86c20c3f8705618a8d31aef0002ff70e3f99fe,2024-11-07T16:35:19.497000
|
||||
CVE-2024-43434,0,0,0de9fbff6ec47f339081c0859193ec7a340ffb35a0bb04571c99441c8b11a2e7,2024-11-07T16:35:20.220000
|
||||
CVE-2024-43436,0,0,27835f6934093c7263d11d49fae9d36c80f3ec6ab8693a7d5e7456e924ade38a,2024-11-07T16:35:20.957000
|
||||
CVE-2024-43438,0,1,d6cdeff050d2d1ca36643d06cfef06638f7c7d0a39f11f8ca9f88b3cabe569a6,2024-11-07T17:35:22.537000
|
||||
CVE-2024-43438,0,0,d6cdeff050d2d1ca36643d06cfef06638f7c7d0a39f11f8ca9f88b3cabe569a6,2024-11-07T17:35:22.537000
|
||||
CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000
|
||||
CVE-2024-43440,0,0,b5ccac223783b864085deddbcca2f8c0e78903a03e3eed69be59e89d34041813,2024-11-07T15:35:12.597000
|
||||
CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec6a3,2024-08-26T16:35:12.860000
|
||||
@ -262070,7 +262072,7 @@ CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac17822
|
||||
CVE-2024-45790,0,0,339d5c59c4b08184225ef02e77057a5607db1e407fbacc8325ce6de4811d4a59,2024-09-18T18:38:04.393000
|
||||
CVE-2024-45792,0,0,5abb7de999f910eaa61796ecbea33f574a65653e2aa062ee4c5c2e229e356bd5,2024-10-04T13:51:25.567000
|
||||
CVE-2024-45793,0,0,9df195d476b9f18fe89dd15d9de75cbf87671a956c83113b39ce1c0cbc87094f,2024-09-26T13:32:55.343000
|
||||
CVE-2024-45794,1,1,ff55b1422b2d966adaf82d3a0c3ac295a3d99ee9c5de845f619f184e7cb79af5,2024-11-07T18:15:17.150000
|
||||
CVE-2024-45794,0,0,ff55b1422b2d966adaf82d3a0c3ac295a3d99ee9c5de845f619f184e7cb79af5,2024-11-07T18:15:17.150000
|
||||
CVE-2024-45795,0,0,26c97941bb301ee7ea5809137e4aecc858408d3ad95a6809e3378636ffafc462,2024-10-22T13:35:50.963000
|
||||
CVE-2024-45796,0,0,dd2a7d5e6960dfe9d3ad6d62409661ffa12b088f6140bacc226f9bb18438c496,2024-10-22T13:37:57.930000
|
||||
CVE-2024-45797,0,0,049f9559c334598f19954ea514f0547d1d0f8c6b3863a15a6b9d40d7227d9224,2024-10-18T12:53:04.627000
|
||||
@ -262738,7 +262740,7 @@ CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1b
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000
|
||||
CVE-2024-47071,0,0,2a2727cf2aa9f31ddc31166413e132f87e7e569f257fdb08eb6f77a7cd1bf2ac,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47073,1,1,741cf369e25d121386909bbcd5cb5f85f34fe3950a1fedde7e2b4ad8e532a1a0,2024-11-07T18:15:17.417000
|
||||
CVE-2024-47073,0,0,741cf369e25d121386909bbcd5cb5f85f34fe3950a1fedde7e2b4ad8e532a1a0,2024-11-07T18:15:17.417000
|
||||
CVE-2024-47074,0,0,c235393b42c4b6df5eccda6c9c87286d920054a08fd0159e7304cbc69442da06,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
|
||||
@ -263283,7 +263285,7 @@ CVE-2024-47849,0,0,de2bc9d37c4c436919cea14cdc9e234750104bad56196fb793061fe483bbc
|
||||
CVE-2024-4785,0,0,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000
|
||||
CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b89e,2024-10-07T16:15:05.753000
|
||||
CVE-2024-47854,0,0,31b9ee1e6861649c0043a7af7c7a50d8ef5e295b98593959cd182d2901e547c2,2024-10-06T21:15:12.920000
|
||||
CVE-2024-47855,0,0,ff52cc8efd16010ace1ca5c24f7c166f3d1a0b5862371f0cb96dbe810ee6ad58,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47855,0,1,55506bc59fb300d34c632b3a5f880b3df3b3b2206fd15f460c6853ba7eb245ef,2024-11-07T20:35:11.733000
|
||||
CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000
|
||||
CVE-2024-47867,0,0,ab930a5134ec2749c4c7aeddae39ca362d9631d50a282f941fbaca32a5ca7733,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47868,0,0,b1d3ae34e95c1b5cdfd4777e6cf22588fee5fb92f1e32bee19fdee66c93a7d46,2024-10-17T17:04:35.547000
|
||||
@ -263482,7 +263484,7 @@ CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b9
|
||||
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
|
||||
CVE-2024-48290,1,1,4b9b16745d866dad1b17ecdc51f00561a9cc9030412ebdef0024720e20e85781,2024-11-07T18:15:17.580000
|
||||
CVE-2024-48290,0,0,4b9b16745d866dad1b17ecdc51f00561a9cc9030412ebdef0024720e20e85781,2024-11-07T18:15:17.580000
|
||||
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
|
||||
CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000
|
||||
CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000
|
||||
@ -263683,7 +263685,7 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923
|
||||
CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000
|
||||
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
|
||||
CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48921,0,1,e9387d1d6c60f59e6d5a6f7c28c82620f8f1647520cac034f065894573414562,2024-11-07T17:20:34.160000
|
||||
CVE-2024-48921,0,0,e9387d1d6c60f59e6d5a6f7c28c82620f8f1647520cac034f065894573414562,2024-11-07T17:20:34.160000
|
||||
CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000
|
||||
CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000
|
||||
@ -263703,11 +263705,11 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5
|
||||
CVE-2024-48948,0,0,e258a1f975e8d413717e5a74939518d1de0dc99614e31cd1ac6a1814dc44422f,2024-11-05T19:36:14.127000
|
||||
CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000
|
||||
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
|
||||
CVE-2024-48950,1,1,f7c67fb4c90582b9af843061119c435bf1fe7f1faf77459f539f43358e4219b7,2024-11-07T17:15:08.373000
|
||||
CVE-2024-48951,1,1,ce36f89e471f6b0a300d95062b7e705ba93522495acbf9297bd1478b36d476c4,2024-11-07T17:15:08.443000
|
||||
CVE-2024-48952,1,1,4f32bf501eef8591c16517a4013f37a44ea4cae96bd67edbff84314606a95e35,2024-11-07T17:15:08.510000
|
||||
CVE-2024-48953,1,1,3e11b39efd28d36671524d20906242622579b1ecad13ee22a69cca17782f0c7d,2024-11-07T17:15:08.570000
|
||||
CVE-2024-48954,1,1,e95315885deaa22eae3c7806424d65e3b5355b2f9bde52ebf20fe23cbebbd38a,2024-11-07T17:15:08.650000
|
||||
CVE-2024-48950,0,1,30c48acb483e2f4f16c0b38adb455099e742e4191e5d551a647266bca824b741,2024-11-07T20:35:12.187000
|
||||
CVE-2024-48951,0,1,bb3a629223b91890b09e74d7f4add0d9f2e43ad01b8ed2ebf2bc3ccd95205c1a,2024-11-07T20:35:13.070000
|
||||
CVE-2024-48952,0,1,058bf59448a7361301ca4c2401dc532ddd24e7bdaedbcb0e8e3cf6bcc7063240,2024-11-07T20:35:13.947000
|
||||
CVE-2024-48953,0,0,3e11b39efd28d36671524d20906242622579b1ecad13ee22a69cca17782f0c7d,2024-11-07T17:15:08.570000
|
||||
CVE-2024-48954,0,0,e95315885deaa22eae3c7806424d65e3b5355b2f9bde52ebf20fe23cbebbd38a,2024-11-07T17:15:08.650000
|
||||
CVE-2024-48955,0,0,84de7be29efb285e46fc24626f552063b1e23de7f9dbbe9943b534f430e239e9,2024-11-01T12:57:35.843000
|
||||
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
|
||||
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
|
||||
@ -263978,7 +263980,7 @@ CVE-2024-49639,0,0,82ffeb5e3fd995175985b5782e7cbdd12a8ec35a00cfaffe6c965dcdb2a64
|
||||
CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000
|
||||
CVE-2024-49640,0,0,becbe9cd8e4562101ae9f0fd4aeb9f5d80e9d81b9046f0c79b66a78a4ae5a7e8,2024-10-31T16:04:01.113000
|
||||
CVE-2024-49641,0,0,0c76c83cf503f374bc615797049759b6f98944a9c823b145687554c637514560,2024-10-31T16:05:44.353000
|
||||
CVE-2024-49642,0,0,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000
|
||||
CVE-2024-49642,0,1,66a7bd2ec5779bc9317ec59e62fed4a534ea42c063a1c8a996c562b60f66eacd,2024-11-07T20:59:18.593000
|
||||
CVE-2024-49643,0,0,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000
|
||||
CVE-2024-49645,0,0,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000
|
||||
CVE-2024-49646,0,0,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000
|
||||
@ -264048,8 +264050,8 @@ CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a
|
||||
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
|
||||
CVE-2024-49766,0,0,5a8c5c0a2bd94e828f2c3a22888613b17d32cf5a4207ce143b3606496d9774b9,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
|
||||
CVE-2024-49768,0,1,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000
|
||||
CVE-2024-49769,0,1,6340e3adda9a030cec825cc1b119266a40aee36b3725d18d2443db4b549f4b36,2024-11-07T17:29:04.053000
|
||||
CVE-2024-49768,0,0,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000
|
||||
CVE-2024-49769,0,0,6340e3adda9a030cec825cc1b119266a40aee36b3725d18d2443db4b549f4b36,2024-11-07T17:29:04.053000
|
||||
CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000
|
||||
CVE-2024-49770,0,0,e139253d4206279d60332f6c15cf6c38eaa01808a4afba5b24efe9b5918d6e65,2024-11-01T20:24:53.730000
|
||||
CVE-2024-49771,0,0,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000
|
||||
@ -264168,22 +264170,22 @@ CVE-2024-49949,0,0,4b7cc6ad46e6fb02c30d561a1abf4d685b4716c9a9a63cb194665a262ed01
|
||||
CVE-2024-49950,0,0,2ddbedfd38f23d93ceda398a82953a6283207fe13e3d074351d245c80eecd7dd,2024-11-01T15:05:46.640000
|
||||
CVE-2024-49951,0,0,b8f60d5ef8bd84dfe50bdc427eded9132dc5d0565199c187e518a0aa431c0f98,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49952,0,0,eacfa13d5e4b6dd3f3d20e28896adb1fddd3533c2dd67578249a8ef8b4ca45d2,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49953,0,1,a14ff01abf17243413548e3a025639bd82a01ce0626a40567d5dfe8c35143d81,2024-11-07T17:44:28.297000
|
||||
CVE-2024-49954,0,0,2156082b776c1c996298ae4f0db53d4824ef35b37e49b72d874b5564fde8e048,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49955,0,0,e7695a88ff3679ba8db0d0bea7fd9d2715977aa81cbfabae58d29cb095db5eec,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49953,0,0,a14ff01abf17243413548e3a025639bd82a01ce0626a40567d5dfe8c35143d81,2024-11-07T17:44:28.297000
|
||||
CVE-2024-49954,0,1,a9ae3dc7c06c6a4cf8fa3c4ae8c3d36aaa164203073d3e4084338cba03b97554,2024-11-07T19:16:01.590000
|
||||
CVE-2024-49955,0,1,bb210de55a86547bff369dad9219024d2c75a5b5d78be9498f124e3a8da5de1b,2024-11-07T19:15:27.283000
|
||||
CVE-2024-49956,0,0,eb5ec5d86c4fab87b7c7c8ba3649d4320ece06da3af84193cdaac8ea2f042ecd,2024-11-01T15:19:04.487000
|
||||
CVE-2024-49957,0,0,c6103bbbfefba317343e6c2ff8fcc672d81747cd4447b6cf7d531a7731d3740c,2024-10-28T16:12:19.783000
|
||||
CVE-2024-49958,0,1,e76a92083d6f6220b510178433905e3c765ec60d07844dfd509200572e539986,2024-11-07T17:46:35.687000
|
||||
CVE-2024-49959,0,0,fe4ecd654bcbd844d5c5f2f62134e451f680e3336be4294ef8d3e7baf3f259c4,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49958,0,0,e76a92083d6f6220b510178433905e3c765ec60d07844dfd509200572e539986,2024-11-07T17:46:35.687000
|
||||
CVE-2024-49959,0,1,54bcff4434b1b84fc33bf2f389c891dbdef8f65102820f9517bb40b37c1c794e,2024-11-07T19:23:06.047000
|
||||
CVE-2024-49960,0,0,e1ff38617c3cbc50d878d6be17765675dd1e1a9a8532a3e18efd19f290b41f5b,2024-10-28T16:16:35.320000
|
||||
CVE-2024-49961,0,0,3670d75402fdb83bcd4895876fbf8a79a88caabf5691d9ccca791e5627785c19,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49961,0,1,b6b6a573753628094abb36b02b803e0a2060bdd539b0cb60d01cb533399cf8e1,2024-11-07T19:22:15.323000
|
||||
CVE-2024-49962,0,0,17f1508f07e43bdc9169fb45ebbc8c37ff24a80e1095aa512249a38ffaa6ca45,2024-10-28T16:17:33.310000
|
||||
CVE-2024-49963,0,0,2b2f3924927237848da0ce4db39b07cfa23ea57811f60b13338146ece598c290,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49964,0,0,a3daf32d816def969df47ee2e8de5196da8c32fcc51b4fa6e88980ee02b891ef,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49965,0,0,5017e4bbea441f34bb1695a3b7704c83c90f6308e3baa7512dac279c00198861,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49966,0,0,3dd9d402aa195283567134637b94ebf05fd7aa88c1f417600ffa5b4bb2fa6e42,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49963,0,1,199ac441e9a288f95c7202bd5a32c4b08e6579e6364caa2faadb020f48aeff8f,2024-11-07T19:20:58.597000
|
||||
CVE-2024-49964,0,1,b86829b3427167def528c35eb4674d2a5b80d5fadce8a9f88fe46b064ccd8c9d,2024-11-07T19:20:04.357000
|
||||
CVE-2024-49965,0,1,81c8ca70be3733192fae7f9c809cf9cf34131d01d4217c60dd3a8159366fa82d,2024-11-07T19:18:30.800000
|
||||
CVE-2024-49966,0,1,e8ff36453292fe2a13e833fdf19d89435c33f4eeab75577fbfdf3289556506ea,2024-11-07T19:30:24.643000
|
||||
CVE-2024-49967,0,0,3f367178757a2c82a132a94191b9074dd368f730d524bff5a18e30f45adceb4e,2024-11-01T15:09:01.707000
|
||||
CVE-2024-49968,0,0,19a93f4a6384a37e0e479ce1fc4610aee20a39bc275896118b96ca5904112124,2024-10-23T15:13:25.583000
|
||||
CVE-2024-49968,0,1,db34a51ebce9287207cb76852e8d1248d7abd6118712c9e410bc5e807c0c02cc,2024-11-07T19:28:02.937000
|
||||
CVE-2024-49969,0,0,87996c90e1672445fe5815f19cbdae838e57430f8b66f0e3e569e0c7abd0a9cb,2024-10-25T20:15:51.520000
|
||||
CVE-2024-4997,0,0,8869d8cee41a7f38be4f03ad1383841d0fd18dd2f92c0e8b0f0fd7c6f2096580,2024-06-04T16:57:41.053000
|
||||
CVE-2024-49970,0,0,638a6e5f6f7a4a7972cb76754ec52808db9beef3f8062893a90ac926493da3ef,2024-10-29T15:57:41
|
||||
@ -264223,14 +264225,14 @@ CVE-2024-50000,0,0,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182
|
||||
CVE-2024-50001,0,0,195afb719a60bcef7c30d2f2fb3d1f26d0b29c7425542d09029c1e7539c92fcb,2024-10-30T21:59:44.487000
|
||||
CVE-2024-50002,0,0,b6688309bee6edea92d75affed9942b16ad3f6cfc60f9f2e11893c23efc155b7,2024-10-30T21:57:59.923000
|
||||
CVE-2024-50003,0,0,5807e4e014538d704f1f27632e3e18eb3d7e3c790926a19fd58a737e383f428a,2024-11-01T15:16:36.113000
|
||||
CVE-2024-50004,0,0,fe596401aaf26a0bb4fc90f2562faa93ddcac118926c98a71e59d59cbb14fac7,2024-10-23T15:13:25.583000
|
||||
CVE-2024-50005,0,0,71785d188823b2f1a674a1d58fa9bf202e420b9fbc567aaf86f41c900cbed7a5,2024-10-23T15:13:25.583000
|
||||
CVE-2024-50004,0,1,75662d9275fde9ec15d7ed5ff7e2719cd2eec5a0dea5d98af7ef8dad8c5d4469,2024-11-07T19:27:29.863000
|
||||
CVE-2024-50005,0,1,0fcbc98c40ce1e760f8a21d694d53247e6f7626c291e5d43e681e12ffe5c104a,2024-11-07T19:27:01.613000
|
||||
CVE-2024-50006,0,0,d1f7bfa55609adf304959b822bd6e9210f0c111dda6c4d1526f7bc51cc841bcc,2024-11-01T15:37:42.840000
|
||||
CVE-2024-50007,0,0,3bb3ddfaf04b35f9340e692fc6e60153db0d60c226088a76c32b141ba8410ca3,2024-11-01T15:34:11.917000
|
||||
CVE-2024-50008,0,0,cf18884f6df3df5c9ce0073b5f01db383272d1fb920974501c4f54c76c821365,2024-10-23T15:13:25.583000
|
||||
CVE-2024-50008,0,1,b6b5ad2333202908f9d1b150f307770e906e1ea8e04d8a262d29b56851430cef,2024-11-07T19:26:22.627000
|
||||
CVE-2024-50009,0,0,508fd3a1d0553adac6c1304c65a71463225696beb8afe05961de7f3a1742e1d3,2024-11-01T15:32:35.593000
|
||||
CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000
|
||||
CVE-2024-50010,0,0,dd004beb59f4fd550b7db5da7c250b0b2a967f9af1dfd3805874973f61bbfe6e,2024-11-04T12:16:09.760000
|
||||
CVE-2024-50010,0,1,f1b2a6033b3a2c4e3dcd2009d8b8f9f832877ef1c08f2a974e22886366d82c98,2024-11-07T19:32:35.937000
|
||||
CVE-2024-50011,0,0,bba0dff209e225565c8e6c463c706dc41e86bea877759fee9b6a14a8cb31506e,2024-11-01T15:31:48.550000
|
||||
CVE-2024-50012,0,0,0b464fdf78181eaa99a743288b56773d15a2abd5d273a31aea10de63165e8299,2024-10-25T19:55:40.217000
|
||||
CVE-2024-50013,0,0,eefeead007890563f349e532e89dba096326c5095afb27c53d3f32df4440455c,2024-10-25T19:49:36.863000
|
||||
@ -264445,11 +264447,11 @@ CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c
|
||||
CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000
|
||||
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
|
||||
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
|
||||
CVE-2024-50407,0,0,f9688f4b448fa6261be66d0317a572bd7a88062577e578fa12fbb434c00a6869,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50407,0,1,4fb5f00a58beefd4cfac77c8419361c961ad849f2db4f958a95f873505b783a5,2024-11-07T20:28:22.860000
|
||||
CVE-2024-50408,0,0,42895de3e084cedaf6647f131c47bd546b78f0bd37cacbb2a46053fdc5504c96,2024-10-29T16:01:08.447000
|
||||
CVE-2024-50409,0,0,d7ec10c5e1543bca47bfdf414d287c32f5601d40bab44b017b5b1321eddc073f,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50409,0,1,decf8c1f911e116f8cd8eaed54dfebb80d0d98a1eb5c9f1827ad8919ae8e2e9d,2024-11-07T20:28:43.577000
|
||||
CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000
|
||||
CVE-2024-50410,0,0,b0e5f19d3e850e75bae53f582d220aeb13e9ae300eafba739d117cde04cd904e,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50410,0,1,642f8109edbadd8a6989f8cd0522579e64ff28c910222ae4d458849968d71f13,2024-11-07T20:29:13.937000
|
||||
CVE-2024-50411,0,0,2125caa96e2fd794a28994bdb07b4bb7596f8c4a6de822aea393e9e8d4d53bc7,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50412,0,0,631b195ca92c8239dedf128815fcbb14f2f3794e78d494b800069471ed0f1296,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50413,0,0,7bd7e93e9534d8f928af3202deae1fbb2549aee1ab43b478d04f1c666ef4a515,2024-10-29T14:34:04.427000
|
||||
@ -264494,8 +264496,8 @@ CVE-2024-50450,0,0,7fc26bfa183b8562e84f6ef3fdd2ced88c72fd71cbb7684963fe6a0f34f11
|
||||
CVE-2024-50451,0,0,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000
|
||||
CVE-2024-50453,0,0,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000
|
||||
CVE-2024-50454,0,0,9d16a2e4356dbdfef4286c8b0e4629708aeb8f7938cb70a2ff3217cf54b560a8,2024-11-01T12:57:35.843000
|
||||
CVE-2024-50455,0,1,25a99d146bd13580e40d11adab73e854fc31a7bcfbaee49909033fc23a6c8b5e,2024-11-07T17:01:30.937000
|
||||
CVE-2024-50456,0,1,cce324d6198e8843e2938707f71fdd53169cdbd8bc5ec8c5079417c4b3dcdb32,2024-11-07T17:02:03.653000
|
||||
CVE-2024-50455,0,0,25a99d146bd13580e40d11adab73e854fc31a7bcfbaee49909033fc23a6c8b5e,2024-11-07T17:01:30.937000
|
||||
CVE-2024-50456,0,0,cce324d6198e8843e2938707f71fdd53169cdbd8bc5ec8c5079417c4b3dcdb32,2024-11-07T17:02:03.653000
|
||||
CVE-2024-50457,0,0,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000
|
||||
CVE-2024-50458,0,0,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000
|
||||
CVE-2024-50459,0,0,6641e61426a818cff44eec6500fc0b034294e17c7fdf43b3c69786d675e07ca7,2024-11-06T23:11:17.687000
|
||||
@ -264738,7 +264740,7 @@ CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f0
|
||||
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
|
||||
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
|
||||
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
|
||||
CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000
|
||||
CVE-2024-51358,0,1,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000
|
||||
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
|
||||
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
|
||||
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
|
||||
@ -264762,7 +264764,7 @@ CVE-2024-51424,0,0,8074d3681dc009f545c0b5b1ed4c51a9f136d3c18afaa9c4384405256aed3
|
||||
CVE-2024-51425,0,0,53ab0aa708c9b43a2cf1a93dce648aa1bc3d18e6a93bde5d39ed5fb860afb7f0,2024-11-04T06:15:04.053000
|
||||
CVE-2024-51426,0,0,5d33521d8b96e38633b5f868464693826d0cf60bba0992fdeeaa0d9e10eb58ac,2024-11-04T06:15:04.200000
|
||||
CVE-2024-51427,0,0,8620fe2fe9783598011162ebda7f5b78a4941fc646ad43a32bd7b2f439c18153,2024-11-04T06:15:04.340000
|
||||
CVE-2024-51428,1,1,359d3d57ed788558a7c6194cd6dc60f66b4eb14212218f9984e90372cb5b39b4,2024-11-07T18:15:17.677000
|
||||
CVE-2024-51428,0,0,359d3d57ed788558a7c6194cd6dc60f66b4eb14212218f9984e90372cb5b39b4,2024-11-07T18:15:17.677000
|
||||
CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000
|
||||
CVE-2024-51430,0,0,ff23326a74158832e3c36a3da3cf40ac4ba003ba8db91bd39e91a6a5bd9de288,2024-11-01T12:57:03.417000
|
||||
CVE-2024-51431,0,0,8caf7bc329d5a006462692c4b8ce6c1d5bb12741ba8426c8ae4bc6b34727dbe3,2024-11-05T21:37:16.943000
|
||||
@ -264783,35 +264785,35 @@ CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e22364
|
||||
CVE-2024-51500,0,0,42c2a285903076a2664ebb01d93e2fe7be0196e6180cfa0174e85e23f0ae008b,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51501,0,0,4e7a648cb0a13b8579d9339e6f61429384ba9108a787a33330688580d3ffd9b7,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51502,0,0,ddca894e59a4fa6615b655d6e175550efe4eae6f2d9578fd4366f3b25c69f9f6,2024-11-05T17:35:27.493000
|
||||
CVE-2024-51504,0,1,4bafdcd55b47a566ef5680713f0c0a1b985598b2f05cd4b1371a5d9aa49b9aa1,2024-11-07T17:35:23.373000
|
||||
CVE-2024-51504,0,0,4bafdcd55b47a566ef5680713f0c0a1b985598b2f05cd4b1371a5d9aa49b9aa1,2024-11-07T17:35:23.373000
|
||||
CVE-2024-51506,0,0,aeb585d1723ff2c89aafbc7f5be7b06442a99eb384784bc9840750395f547af1,2024-10-29T19:35:28.723000
|
||||
CVE-2024-51507,0,0,4365a7f2aa23ce999509e0b8da9d3ae401991203445005454373679a589ef433,2024-10-29T19:35:29.513000
|
||||
CVE-2024-51508,0,0,84627a5fdd5d7fda34b7d1542f218a3bd3a3d801d78362e1d620b375cd43b4c5,2024-10-29T19:35:30.513000
|
||||
CVE-2024-51509,0,0,993e17af07ecf25dc3d4222a841d363b0f42df6e2488040b502ab5fa96fcdf3d,2024-10-29T19:35:31.290000
|
||||
CVE-2024-5151,0,0,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000
|
||||
CVE-2024-51510,0,1,db31dd12c11f36067154b80c1ae2b840f1ebaa80e3467ce737dcec4672399ae0,2024-11-07T17:03:03.297000
|
||||
CVE-2024-51511,0,1,af1ea81e666608ce065cc738b2859f4e3c5340541f2bc7c9506c51c8d91743e7,2024-11-07T17:03:12.743000
|
||||
CVE-2024-51512,0,1,b131f619a076c4257bb1dca63b24d897f74fa88e7e8bca912e6b5268a39019b4,2024-11-07T17:03:21.927000
|
||||
CVE-2024-51513,0,0,b819600a6a383e4a5393dea2fc7488c03cc44f9ef8b96208284abd9e1394082a,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51514,0,0,241077eb1ef6c6b5cfd93a49ebeb044c03a1aa8e9a47b63659cabf821024b6db,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51515,0,0,d8367fb198a1d54e6f17b985ca4089063fa6dcf1f8589ebdc2dd1a1c4cb40000,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51516,0,0,dca3057adbdcb2dc2edb0a42fac3afd8d23f937e4bcd0ffb1db0a78357f5b6f6,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51510,0,0,db31dd12c11f36067154b80c1ae2b840f1ebaa80e3467ce737dcec4672399ae0,2024-11-07T17:03:03.297000
|
||||
CVE-2024-51511,0,0,af1ea81e666608ce065cc738b2859f4e3c5340541f2bc7c9506c51c8d91743e7,2024-11-07T17:03:12.743000
|
||||
CVE-2024-51512,0,0,b131f619a076c4257bb1dca63b24d897f74fa88e7e8bca912e6b5268a39019b4,2024-11-07T17:03:21.927000
|
||||
CVE-2024-51513,0,1,c127c7a62c290ff55d6168ac09c7569a4fee8ab87db6c5e2880a680f80f26e43,2024-11-07T20:30:14.910000
|
||||
CVE-2024-51514,0,1,20cf6e23745f9fee71abcdaea0e46603dcd3b54644d7292c9e7fde4282ee198d,2024-11-07T19:43:51.717000
|
||||
CVE-2024-51515,0,1,23e0609afe325f023f7851930888e0f4d0213ef093627d51ff208a6a5bb4c8ae,2024-11-07T19:42:53.157000
|
||||
CVE-2024-51516,0,1,01fc1e6d47e76f5866545ba6b7fc2a59e8d008dacb5ce563fc7b6875e7ffc47c,2024-11-07T19:42:32.537000
|
||||
CVE-2024-51517,0,0,b7778ee06f553a53d4a963013c2520388e6719967d46ab3b1bdfee244fff652e,2024-11-06T23:15:53.113000
|
||||
CVE-2024-51518,0,0,f9cdcf3768e4cbb8a9755ea087880188e1a9108228121840f74a1a55c5fdca68,2024-11-06T23:15:48.363000
|
||||
CVE-2024-51519,0,0,30729484b0b0b5da2002666424f330d6c301d8b92f1a5c7dc3ec5575fe93473c,2024-11-06T23:15:25.930000
|
||||
CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000
|
||||
CVE-2024-51520,0,0,31a871f4d970f47472bf4e3cfee6bd94d473bf5419a671e79f8f315fb36c99b5,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51521,0,0,1b75e440fdf15435a830a7216a280dba9ed815c3f323fcbaff36e7b1166c19d9,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51522,0,0,48592c132a33fe87c39d8fa1eb3b3e4ea1f9754b4e1fc65345d3c5a280e35d9d,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51523,0,0,ee15dd54ed1b1452be4ee22b0776303637e3b85b700396714c4b549f6180f3c0,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51524,0,0,86d194b3e3c51d9116a047a2c6e50217aafcc50211a91e76700deda3c78f439a,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51525,0,0,3b27c4cafa0945fa41c1a80755a136eb32b249c4356158b650ec382c9ed05631,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51526,0,0,19c9e321a3982086f472bc6201552e369490e75b4aca7001f84f92c51175ad86,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51527,0,0,349bf5689f85505cce3531839e4e9ab703d93c1f79ed783e9c7f8f97b1c4be6d,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51528,0,0,5eb0535c28e78e7287f103ccffde43953600d175767a4b7584682aa68e2dab4b,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51529,0,0,1cd7969ad365d64b63ce8e6b4c61da311806318ce5ff3e34ada8f81e13ef3c6a,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51520,0,1,6ed2090f69b5e91cc4ce0a23b023bf958dd14762b6369fc2d6c1e4f6523052cc,2024-11-07T19:55:38.370000
|
||||
CVE-2024-51521,0,1,7b0c83ecc1d018e2e611f881b41113f0ccf5759396a112373fc7aa6fa872878b,2024-11-07T19:55:21.083000
|
||||
CVE-2024-51522,0,1,83ac1a058c487079f7980d874177d4128f64f480a1f8142961f8fdce74821612,2024-11-07T20:03:56.137000
|
||||
CVE-2024-51523,0,1,acf0badda140d06b690475eb00911f13c75ca5ae883193b8c964f12c563f5d2e,2024-11-07T20:03:21.307000
|
||||
CVE-2024-51524,0,1,662943212918c552b9c15a5259e8521ca61b694f226afcb9c1cb8a09354fbe80,2024-11-07T20:02:59.010000
|
||||
CVE-2024-51525,0,1,c5268f48cfb12eb43e1569d2b27887336e1a59686c2e69fb25c28aa6c919cff4,2024-11-07T20:01:59.063000
|
||||
CVE-2024-51526,0,1,fd81d59aa21d02b42faabd3458275ac92e62f901e175ce531ab9d3fe03a0813c,2024-11-07T20:00:28.717000
|
||||
CVE-2024-51527,0,1,5b7bbd35d087e3862444e0747d3238e2d3ab4d0e2ac6a55da8b4b7047c90348c,2024-11-07T19:57:57.577000
|
||||
CVE-2024-51528,0,1,7facae14a405d1cb6b0f061ca5849c9312c5771584c4c9518b3caefbdebe223e,2024-11-07T19:57:18.577000
|
||||
CVE-2024-51529,0,1,4cdd480ac021e0810a5ec103f351b7d12468311fbc3059650aaa3d8118f05311,2024-11-07T19:56:41.723000
|
||||
CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000
|
||||
CVE-2024-51530,0,0,2f6a1b02ba34a5b1e24e8e071aa2f2a9ac92d89d1d2954cbb9e2b824ccfc2bd0,2024-11-05T16:04:26.053000
|
||||
CVE-2024-51530,0,1,b223f2f9d54a795ec6226988140b76c544409eb01507942db54f2fb02451e725,2024-11-07T19:56:10.187000
|
||||
CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000
|
||||
CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000
|
||||
CVE-2024-51556,0,0,b55d82bf90fdb78e33d2cf1f00dfc8aa7bcfecbd3a990a1f45f070aee8579330,2024-11-04T18:50:05.607000
|
||||
@ -264866,7 +264868,7 @@ CVE-2024-51754,0,0,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1
|
||||
CVE-2024-51755,0,0,f94462a7b407e6db555bfabd54fbdf4488acc0d3a99f16a2114b58a579ba2cfe,2024-11-07T16:15:17.740000
|
||||
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
|
||||
CVE-2024-51757,0,0,94efafdd8ea10b2a0656841928d239afab2750ddf6f06a644397622ff5d6eb53,2024-11-06T21:15:06.807000
|
||||
CVE-2024-51758,1,1,163a5c3218bd3e818d0469e7d4a133ddd785c72cae006b1bd6d57bff228db04e,2024-11-07T18:15:17.787000
|
||||
CVE-2024-51758,0,1,7c2dd1e416c68cdc9ff1c06122616cf2852d6cce64012ef616547b4ca60feaef,2024-11-07T20:35:16.200000
|
||||
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
||||
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
|
||||
@ -264889,12 +264891,12 @@ CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f9639502
|
||||
CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000
|
||||
CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000
|
||||
CVE-2024-51988,0,0,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000
|
||||
CVE-2024-51989,1,1,779423f2efb5d2ca5c38d59609b97dbafea289ed16b7d25f6595cd5e79c70a20,2024-11-07T18:15:17.953000
|
||||
CVE-2024-51989,0,0,779423f2efb5d2ca5c38d59609b97dbafea289ed16b7d25f6595cd5e79c70a20,2024-11-07T18:15:17.953000
|
||||
CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000
|
||||
CVE-2024-51990,0,0,cff622c09caf6d70cb834efe8a697aa5f08e9f9fb04bfaf25b8c6f7fe35bd855,2024-11-07T01:15:03.497000
|
||||
CVE-2024-51993,1,1,60e8036d67c669df1da499339d698d06a57c4de139720b475dde3670f79ea095,2024-11-07T18:15:18.203000
|
||||
CVE-2024-51994,1,1,c256db7156ba08f59c3387804e14c634d0f842c916fc97bf53536a0a0bcdafb9,2024-11-07T18:15:18.470000
|
||||
CVE-2024-51995,1,1,d42ca5c476949856c4a861354c0ad9e1b7233cd95dae66699a0432dbe4e7df70,2024-11-07T18:15:18.787000
|
||||
CVE-2024-51993,0,1,558e2dbbd7884ebf950b0ed5c581198c2a7129c998df762665cd2d4ed3d6ee38,2024-11-07T19:35:10.383000
|
||||
CVE-2024-51994,0,1,c33fb20483d531a039679ca7e749d7aa2791758712758bb00e7e04c1f8688112,2024-11-07T19:35:10.640000
|
||||
CVE-2024-51995,0,1,bb691f9502a8c4e121a85eb6369fbfc2651e3287a2c40ae080b02e3e722043ab,2024-11-07T19:35:10.887000
|
||||
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000
|
||||
CVE-2024-52014,0,0,bf660c78013825ab133590fbd2d4d926551058021d148525516ea24d33d017c6,2024-11-05T16:35:37.113000
|
||||
@ -267564,7 +267566,7 @@ CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db8
|
||||
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
|
||||
CVE-2024-8375,0,0,58cea17ca7f7a98f8126bafea3caa90f64ce326ce0b828e067a1c86c7d982ac6,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8376,0,0,8755f13d2baf2ea4c1f32851a9e5c748f58fd57e01338c5081bda3b629604419,2024-10-31T10:15:05.930000
|
||||
CVE-2024-8378,0,0,ba4fff7b3c4c22fa1be1788e9390d250516bad1c8df674b631509afd9d10b8c7,2024-11-07T16:15:18.057000
|
||||
CVE-2024-8378,0,1,34f148e00b1a2acc25765076e3b28753775610b8fbd4cd75a4fc2affc244df30,2024-11-07T20:35:16.537000
|
||||
CVE-2024-8379,0,0,085298af9559a314a9f72b50c0919e14d810bca9e3bf6d4dab66f461020341e6,2024-10-07T15:49:54.653000
|
||||
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
|
||||
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
|
||||
@ -267719,7 +267721,7 @@ CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a5706419361
|
||||
CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
|
||||
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
|
||||
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
|
||||
CVE-2024-8587,0,1,a3417745467ad00e944a81be6eef010a359d8b490c2b5274912252536b9bbcf9,2024-11-07T17:15:24.903000
|
||||
CVE-2024-8587,0,0,a3417745467ad00e944a81be6eef010a359d8b490c2b5274912252536b9bbcf9,2024-11-07T17:15:24.903000
|
||||
CVE-2024-8588,0,0,550a16448d9618dcd495c4bcd7e078fbf9d3cfdf14a04621dc40d23be34a7ed4,2024-11-01T16:16:19.727000
|
||||
CVE-2024-8589,0,0,ab7b0246112e4539e208c0490a5db9ddb5f0462fe0599ca161b228aff9f84449,2024-11-01T16:18:36.457000
|
||||
CVE-2024-8590,0,0,922e779a159c62aa820c8b804e3b33ae6849d2e3a7436ad2ef6f864234965456,2024-11-01T16:18:26.187000
|
||||
@ -267940,8 +267942,8 @@ CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc5
|
||||
CVE-2024-8920,0,0,42fc84557f46536ee5298e40d09a285310a4aead85db529ff9c7f89249448d09,2024-10-18T12:52:33.507000
|
||||
CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000
|
||||
CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000
|
||||
CVE-2024-8923,0,1,692afba21893e1db5cd3d6e59bd1f6c3827c82df421461efc94f9ff09fea79be,2024-11-07T17:18:10.993000
|
||||
CVE-2024-8924,0,1,ffd18997b4a1a175cd09c0acb2c855c400aa6ac556f1b8573d10964613722571,2024-11-07T17:16:43.393000
|
||||
CVE-2024-8923,0,0,692afba21893e1db5cd3d6e59bd1f6c3827c82df421461efc94f9ff09fea79be,2024-11-07T17:18:10.993000
|
||||
CVE-2024-8924,0,0,ffd18997b4a1a175cd09c0acb2c855c400aa6ac556f1b8573d10964613722571,2024-11-07T17:16:43.393000
|
||||
CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000
|
||||
CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000
|
||||
CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000
|
||||
@ -268264,7 +268266,7 @@ CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3
|
||||
CVE-2024-9438,0,0,f23988b383ffc7b9a8be3f13a0e81848cd3463f82ea0b782cf2d1c7c8dbf0f4a,2024-10-29T14:34:04.427000
|
||||
CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9443,0,0,62bd8128f2447c9d74d314fc526c8cc14311db39a1c9eb99e7ab44deda041d18,2024-11-05T16:04:26.053000
|
||||
CVE-2024-9443,0,1,79216bcefacd2c253b69bfe25ad6a32e8cbce4e2b4f380af9ed43792d6197551,2024-11-07T20:56:58.797000
|
||||
CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836c0,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000
|
||||
CVE-2024-9446,0,0,ce212af157adf5dba66ecf45f7719333badce295758f6451954bbe4734f3b969,2024-11-01T12:57:03.417000
|
||||
@ -268411,7 +268413,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854
|
||||
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
|
||||
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
|
||||
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
|
||||
CVE-2024-9689,0,0,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000
|
||||
CVE-2024-9689,0,1,8f8c579186810d2b61eae71f3a64a7543fcf1895acd4679afad8157c388bec86,2024-11-07T20:35:16.807000
|
||||
CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000
|
||||
@ -268524,7 +268526,7 @@ CVE-2024-9922,0,0,5b3f4f94b058e10394fda050af76e1c62dd106f0eebadd14ac4c752deaa614
|
||||
CVE-2024-9923,0,0,e0957ae0002d68f1b955241f204c0150727bb34721e8b9ed064776340efa0183,2024-10-24T13:24:23.430000
|
||||
CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000
|
||||
CVE-2024-9926,0,0,ae487ccf1429d8e512b3c373f45e502a3bf1b04dd3005c179106f8b86a99e89c,2024-11-07T15:15:05.860000
|
||||
CVE-2024-9926,0,1,b97027b2d01f92b150b3a0c3126d1a9225c0551084b31e89d062f3cf8ece4e71,2024-11-07T20:35:17.120000
|
||||
CVE-2024-9927,0,0,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000
|
||||
CVE-2024-9930,0,0,2e94c1b1c2d8f47dab5a0085f731b617edc3eb172311f1bc2011ba2b1f6ff871,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9931,0,0,4f99602a22e228cc69b801ddff8bd876efec1042ee86fb7a5c3c9f1dd271a722,2024-10-28T13:58:09.230000
|
||||
@ -268575,8 +268577,8 @@ CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539
|
||||
CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000
|
||||
CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000
|
||||
CVE-2024-9987,0,0,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000
|
||||
CVE-2024-9988,0,1,fe7d37ad8457d452518c7526bd4799a8f7d3fb26918e0dc5adb340f6f79f70a1,2024-11-07T17:00:29.560000
|
||||
CVE-2024-9989,0,1,00b61b6e46400278a8822cdbfa502b4eff996cd08f7ab26e0423278593672997,2024-11-07T17:00:56.337000
|
||||
CVE-2024-9988,0,0,fe7d37ad8457d452518c7526bd4799a8f7d3fb26918e0dc5adb340f6f79f70a1,2024-11-07T17:00:29.560000
|
||||
CVE-2024-9989,0,0,00b61b6e46400278a8822cdbfa502b4eff996cd08f7ab26e0423278593672997,2024-11-07T17:00:56.337000
|
||||
CVE-2024-9990,0,0,6535e43f058bfb50050d26d851e120f9cfe62488cf6b3933d7c62cfdab49fc33,2024-11-06T23:11:42.037000
|
||||
CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820e2,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9996,0,0,d5e7827ad5391d78a31addd2ca4c41dc6e5d45abf975a0bf7cf45c9296bda120,2024-11-01T16:27:30.387000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user