Auto-Update: 2024-11-07T21:00:20.924770+00:00

This commit is contained in:
cad-safe-bot 2024-11-07 21:03:21 +00:00
parent 5d2116837c
commit 2bf1fb93fd
86 changed files with 52371 additions and 544 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-11919",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T18:15:15.517",
"lastModified": "2024-11-07T18:15:15.517",
"lastModified": "2024-11-07T19:35:00.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. There is no CSRF protection."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2024/Jul/14",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47129",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-15T21:15:07.523",
"lastModified": "2024-03-17T22:38:29.433",
"lastModified": "2024-11-07T19:35:01.857",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_ct: omitir expectativas para conntrack confirmado nft_ct_expect_obj_eval() llama a nf_ct_ext_add() para una entrada de conntrack confirmada. Sin embargo, nf_ct_ext_add() solo se puede invocar para !nf_ct_is_confirmed(). [1825.349056] ADVERTENCIA: CPU: 0 PID: 1279 en net/netfilter/nf_conntrack_extend.c:48 nf_ct_xt_add+0x18e/0x1a0 [nf_conntrack] [1825.351391] RIP: 0010:nf_ct_ext_add+0x18e/0x 1a0 [nf_conntrack] [ 1825.351493] C\u00f3digo: 41 5c 41 5d 41 5e 41 5f c3 41 bc 0a 00 00 00 e9 15 ff ff ff ba 09 00 00 00 31 f6 4c 89 ff e8 69 6c 3d e9 eb 96 45 31 ed eb cd <0f> 0b e9 b1 fe ff ff e8 86 79 14 e9 eb bf 0f 1f 40 00 0f 1f 44 00 [ 1825.351721] RSP: 0018:ffffc90002e1f1e8 EFLAGS: 00010202 [ 1825.351790] RAX: 00000000000000 0e RBX: ffff88814f5783c0 RCX: ffffffffc0e4f887 [ 1825.351881] RDX: dffffc0000000000 RSI: 00000000000000008 RDI: ffff88814f578440 [ 1825.351971] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff88814f578447 [ 1825.352060] R10: ffffed1029eaf088 R11: 00000000000000 01 R12: ffff88814f578440 [ 1825.352150] R13: ffff8882053f3a00 R14: 0000000000000000 R15: 0000000000000a20 [ 1825.352240] FS: 00007f99226 1c900(0000) GS:ffff889faec00000(0000 ) knlGS:0000000000000000 [ 1825.352343] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1825.352417] CR2: 000056070a4d1158 CR3: 00000001 5efe0000 CR4: 0000000000350ee0 [1825.352508] Seguimiento de llamadas: [1825.352544] nf_ct_helper_ext_add+0x10/0x60 [nf_conntrack] [1825.352641 ] nft_ct_expect_obj_eval+0x1b8/0x1e0 [nft_ct] [ 1825.352716] nft_do_chain+0x232/0x850 [nf_tables] Agregue la extensi\u00f3n ct helper solo para conntrack no confirmado. Omita la evaluaci\u00f3n de la regla si la extensi\u00f3n ct helper no existe. Por lo tanto, s\u00f3lo puedes crear expectativas desde el primer paquete. Deber\u00eda ser posible eliminar esta limitaci\u00f3n agregando una nueva acci\u00f3n para adjuntar un asistente ct gen\u00e9rico al primer paquete. Luego, use esta extensi\u00f3n de ayuda de ct de los paquetes de seguimiento para crear la expectativa de ct. Mientras lo hace, agregue una marca faltante para omitir tambi\u00e9n la plantilla conntrack y elimine la marca IPCT_UNTRACK que est\u00e1 impl\u00edcita en !ct."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-273"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1710eb913bdcda3917f44d383c32de6bdabfc836",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48985",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:10.463",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:35:06.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,129 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mana: Corregir ejecuci\u00f3n en la variable per-CQ napi work_done Despu\u00e9s de llamar a napi_complete_done(), el bit NAPIF_STATE_SCHED puede borrarse, y otra CPU puede iniciar el hilo napi y acceder a la variable per-CQ, cq->work_done. Si el otro hilo (por ejemplo, desde busy_poll) lo establece en un valor >= budget, este hilo seguir\u00e1 ejecut\u00e1ndose cuando deber\u00eda detenerse, y provocar\u00e1 corrupci\u00f3n de memoria y p\u00e1nico. Para solucionar este problema, guarde la variable per-CQ work_done en una variable local antes de napi_complete_done(), para que no se corrompa por un posible hilo concurrente despu\u00e9s de napi_complete_done(). Adem\u00e1s, agregue un bit de bandera para anunciar al firmware NIC: la ejecuci\u00f3n de la variable NAPI work_done est\u00e1 fija, por lo que el controlador puede soportar de forma fiable funciones como busy_poll."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.83",
"matchCriteriaId": "596123A2-9BD2-4865-9AD9-98254B11C8C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.13",
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/18010ff776fa42340efc428b3ea6d19b3e7c7b21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6740d8572ccd1bca50d8a1ca2bedc333f50ed5f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe50a9bbeb1f042e756c5cfa7708112c944368de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48991",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:11.000",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:36:33.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,194 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/khugepaged: invocar notificadores MMU en rutas de colapso de shmem/archivo Cualquier ruta de c\u00f3digo que elimine las entradas de la tabla de p\u00e1ginas debe invocar notificadores MMU para garantizar que las MMU secundarias (como KVM) no sigan accediendo a p\u00e1ginas que ya no est\u00e1n asignadas. Las MMU secundarias no mantienen sus propias referencias a p\u00e1ginas que se reflejan, por lo que no notificarlas puede provocar el use-after-free de la p\u00e1gina. Estoy marcando esto como una soluci\u00f3n a un problema introducido en el commit f3f0e1d2150b (\"khugepaged: agregar compatibilidad con el colapso para p\u00e1ginas tmpfs/shmem\"), pero la mayor parte del impacto de seguridad de esto solo se produjo en el commit 27e1f8273113 (\"khugepaged: habilitar el colapso pmd para THP asignado a pte\"), que en realidad omiti\u00f3 los vaciados para la eliminaci\u00f3n de PTE actuales, no solo para la eliminaci\u00f3n de tablas de p\u00e1ginas vac\u00edas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.8",
"versionEndExcluding": "4.9.337",
"matchCriteriaId": "3A7C6654-B729-4CE8-922E-B5675245AF0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.303",
"matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.270",
"matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.227",
"matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.159",
"matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.83",
"matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.13",
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1a3f8c6cd29d9078cc81b29d39d0e9ae1d6a03c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/275c626c131cfe141beeb6c575e31fa53d32da19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5450535901d89a5dcca5fbbc59a24fe89caeb465",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5ffc2a75534d9d74d49760f983f8eb675fa63d69",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f445ca2e0e59c7971d0b7b853465e50844ab596",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c23105673228c349739e958fa33955ed8faddcaf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f268f6cf875f3220afc77bdd0bf1bb136eb54db9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff2a1a6f869650aec99e9d070b5ab625bfbc5bc3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48996",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:11.423",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:37:27.663",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,110 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/sysfs: se corrige la suposici\u00f3n incorrecta de esquemas vac\u00edos durante el ajuste en l\u00ednea en damon_sysfs_set_schemes(). el commit da87878010e5 (\"mm/damon/sysfs: soporte para la actualizaci\u00f3n de entradas en l\u00ednea\") hizo que se llamara a 'damon_sysfs_set_schemes()' para ejecutar el contexto DAMON, que podr\u00eda tener esquemas. En este caso, se supone que la interfaz sysfs de DAMON actualiza, elimina o agrega esquemas para reflejar los archivos sysfs. Sin embargo, el c\u00f3digo asume que el contexto DAMON no tendr\u00eda esquemas en absoluto y, por lo tanto, crea y agrega nuevos esquemas. Como resultado, el c\u00f3digo no funciona como se esperaba para el ajuste de esquemas en l\u00ednea y podr\u00eda tener una huella de memoria mayor a la esperada. Todos los esquemas est\u00e1n en el contexto DAMON, por lo que no pierde memoria. Elimine la suposici\u00f3n incorrecta (el contexto DAMON no tendr\u00eda esquemas) en 'damon_sysfs_set_schemes()' para corregir el error."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "6.0.12",
"matchCriteriaId": "188DA84C-697A-4F85-A7D6-7318514A07EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/95bc35f9bee5220dad4e8567654ab3288a181639",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f98d1f2a36ad7ab48fb4cf73ca14e7b19482fd4d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52920",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-05T10:15:24.580",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:31:31.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,68 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: soporte para derrame/relleno de registros que no sean r10 hacia/desde la pila en seguimiento de precisi\u00f3n. Use el historial de instrucciones (saltos) para registrar instrucciones que realizaron derrame/relleno de registros hacia/desde la pila, independientemente de si esto se hizo a trav\u00e9s de un registro r10 de solo lectura, o cualquier otro registro despu\u00e9s de copiar r10 en \u00e9l *y* potencialmente ajustar el desplazamiento. Para que esto funcione de manera confiable, insertamos indicadores adicionales por instrucci\u00f3n en el historial de instrucciones, codificando el \u00edndice de ranura de pila (spi) y el n\u00famero de marco de pila en indicadores adicionales de 10 bits que quitamos de prev_idx en el historial de instrucciones. No tocamos el campo idx para obtener el m\u00e1ximo rendimiento, ya que se verifica con mayor frecuencia durante el seguimiento hacia atr\u00e1s. Este cambio elimina b\u00e1sicamente la \u00faltima limitaci\u00f3n pr\u00e1ctica restante de la l\u00f3gica de seguimiento hacia atr\u00e1s de precisi\u00f3n en el verificador BPF. Corrige deficiencias conocidas, pero tambi\u00e9n abre nuevas oportunidades para reducir la cantidad de estados verificados, exploradas en los parches posteriores. Solo hay tres diferencias en los archivos de objetos BPF de las autopruebas seg\u00fan veristat, todas en la direcci\u00f3n positiva (menos estados). Archivo Programa Insns (A) Insns (B) Insns (DIFF) Estados (A) Estados (B) Estados (DIFF) -------------------------------------- ------------- --------- --------- ------------- ---------- ---------- ------------- test_cls_redirect_dynptr.bpf.linked3.o cls_redirect 2987 2864 -123 (-4,12%) 240 231 -9 (-3,75%) xdp_synproxy_kern.bpf.linked3.o syncookie_tc 82848 82661 -187 (-0,23%) 5107 5073 -34 (-0,67%) xdp_synproxy_kern.bpf.linked3.o syncookie_xdp 85116 84964 -152 (-0,18%) 5162 5130 -32 (-0,62%) Nota: evit\u00e9 cambiar el nombre de jmp_history al m\u00e1s gen\u00e9rico insn_hist para minimizar la cantidad de l\u00edneas cambiadas y los posibles conflictos de fusi\u00f3n entre los \u00e1rboles bpf y bpf-next. Observe tambi\u00e9n que el puntero cur_hist_entry se restablece a NULL al comienzo del bucle de verificaci\u00f3n de instrucciones. Este puntero evita el problema de confiar en el insn_idx de la \u00faltima entrada del historial de saltos para determinar si ya tenemos una entrada para la instrucci\u00f3n actual o no. Puede suceder que agreguemos una entrada del historial de saltos porque la instrucci\u00f3n actual es_jmp_point(), pero tambi\u00e9n necesitamos agregar indicadores de instrucci\u00f3n para el acceso a la pila. En este caso, no queremos entradas, por lo que necesitamos reutilizar la \u00faltima entrada agregada, si est\u00e1 presente. Confiar en la comparaci\u00f3n insn_idx tiene el mismo problema de ambig\u00fcedad que el que se solucion\u00f3 recientemente en [0], por lo que lo evitamos. [0] https://patchwork.kernel.org/project/netdevbpf/patch/20231110002638.4168352-3-andrii@kernel.org/"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.8",
"matchCriteriaId": "D0B66B9B-B773-474F-A817-85A8F2B3CF0E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/41f6f64e6999a837048b1bd13a2f8742964eca6b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6935",
"sourceIdentifier": "facts@wolfssl.com",
"published": "2024-02-09T23:15:08.030",
"lastModified": "2024-02-11T22:29:15.837",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:41:30.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
},
{
"source": "facts@wolfssl.com",
"type": "Secondary",
@ -51,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.12.2",
"versionEndIncluding": "5.6.4",
"matchCriteriaId": "814E3645-BD7D-48A3-8D8D-4587FBBA2AD3"
}
]
}
]
}
],
"references": [
{
"url": "https://people.redhat.com/~hkario/marvin/",
"source": "facts@wolfssl.com"
"source": "facts@wolfssl.com",
"tags": [
"Technical Description"
]
},
{
"url": "https://www.wolfssl.com/docs/security-vulnerabilities/",
"source": "facts@wolfssl.com"
"source": "facts@wolfssl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10968",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-07T20:15:15.633",
"lastModified": "2024-11-07T20:15:15.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /contact_process.php. The manipulation of the argument fnm leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/NG0324/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283417",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283417",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.437322",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10969",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-07T20:15:15.930",
"lastModified": "2024-11-07T20:15:15.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login_process.php of the component Login. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/31",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283418",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283418",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.437416",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23083",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T14:15:07.430",
"lastModified": "2024-08-01T23:15:40.430",
"lastModified": "2024-11-07T20:35:06.223",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,42 @@
"value": "Se descubri\u00f3 que Time4J Base v5.9.3 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "http://time4j.com",

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-23386",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-04T10:15:04.760",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:54:23.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "memory corruption when WiFi display APIs are invoked with large random inputs."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria cuando se invocan las API de visualizaci\u00f3n WiFi con entradas aleatorias grandes."
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +61,286 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25143",
"sourceIdentifier": "security@liferay.com",
"published": "2024-02-07T15:15:08.907",
"lastModified": "2024-10-02T16:15:09.833",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:55:49.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -51,10 +81,127 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2",
"matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
"matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
"matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
"matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
"matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
"matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
"matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
"matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.0",
"matchCriteriaId": "73595C28-A21B-4C48-A326-33B0159B37A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.1",
"matchCriteriaId": "B7CAF8FC-6334-48FD-A3E0-83EE307A5210"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3.0",
"versionEndExcluding": "7.3.7",
"matchCriteriaId": "50D9A45F-2E4E-4371-9835-014E603F2792"
}
]
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25143",
"source": "security@liferay.com"
"source": "security@liferay.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26661",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-02T07:15:43.137",
"lastModified": "2024-04-02T12:50:42.233",
"lastModified": "2024-11-07T20:35:08.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: agregue prueba NULL para 'generador de sincronizaci\u00f3n' en 'dcn21_set_pipe()' en \"u32 otg_inst = pipe_ctx->stream_res.tg->inst;\" pipe_ctx->stream_res.tg podr\u00eda ser NULL, depende de la persona que llama garantizar que el tg no sea NULL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/39f24c08363af1cd945abad84e3c87fd3e3c845a",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26768",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:52.800",
"lastModified": "2024-04-03T17:24:18.150",
"lastModified": "2024-11-07T20:35:09.233",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: LoongArch: cambie acpi_core_pic[NR_CPUS] a acpi_core_pic[MAX_CORE_PIC] Con la configuraci\u00f3n predeterminada, el valor de NR_CPUS es 64. Cuando la plataforma HW tiene m\u00e1s de 64 cpus, el SYSTEM fallar\u00e1 en estas plataformas . MAX_CORE_PIC es el n\u00famero m\u00e1ximo de CPU en la tabla MADT (n\u00famero f\u00edsico m\u00e1ximo) que puede exceder el n\u00famero m\u00e1ximo de CPU admitido (NR_CPUS, n\u00famero l\u00f3gico m\u00e1ximo), pero el kernel no deber\u00eda fallar. El kernel debe arrancar los procesadores con NR_CPUS y dejar que los procesadores restantes permanezcan en el BIOS. La posible raz\u00f3n del fallo es que la matriz acpi_core_pic[NR_CPUS] puede desbordarse al analizar la tabla MADT, y es obvio que CORE_PIC debe corresponder al n\u00facleo f\u00edsico en lugar del n\u00facleo l\u00f3gico, por lo que es mejor definir la matriz como acpi_core_pic[MAX_CORE_PIC] . Con el parche, el SYSTEM puede iniciar 64 vcpus con el par\u00e1metro qemu -smp 128; de lo contrario, el SYSTEM fallar\u00e1 con el siguiente mensaje. [ 0.000000] CPU 0 No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 0000420000004259, era == 90000000037a5f0c, ra == 90000000037a46ec [ 0.000000] Ups[#1]: [ 0.000000] CPU: 0 PID: 0 Comm: intercambiador No contaminado 6.8. 0-rc2+ #192 [0.000000] Nombre de hardware: QEMU QEMU M\u00e1quina virtual, BIOS desconocido 2/2/2022 [0.000000] pc 90000000037a5f0c ra 90000000037a46ec tp 9000000003c90000 sp 9000000003c93 d60 [ 0.000000] a0 0000000000000019 a1 9000000003d93bc0 a2 0000000000000000 a3 9000000003c93bd8 [ 0.000000] a4 9000000003c93a74 a5 9000000083c93a67 a6 9000000003c938f0 a7 0000000000000005 [ 0.000000] t0 0000420000004201 t1 00000000000000000 t2 0000000000000000 1 t3 0000000000000001 [ 0,000000] t4 0000000000000003 t5 0000000000000000 t6 0000000000000030 t7 0000000000000063 [ 0,000000] t8 0000 000000000014 u0 ffffffffffffffff s9 0000000000000000 s0 9000000003caee98 [ 0.000000] s1 90000000041b0480 s2 9000000003c93da0 s3 9000000003 c93d98 s4 9000000003c93d90 [ 0.000000] s5 9000000003caa000 s6 000000000a7fd000 s7 000000000f556b60 s8 000000000e0a4330 [ 0.000000] ra: 90000000037a46ec platform_init+ 0x214/0x250 [ 0.000000] ERA: 90000000037a5f0c efi_runtime_init+0x30/0x94 [ 0.000000] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) [ 0.000000] PRMD: 00000000 (PPLV0 -PIE -PWE) [ 0.000000] EUEN: 00000000 (-FPE -SXE -ASXE -BTE) [ 0.000000] ECFG: 00070800 (LIE=11 VS=7) [ 0.000000] ESTAT: 00010000 [PIL] (IS= ECode=1 EssubCode=0) [ 0.000000] BADV: 0000420000004259 [ 0.000000] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000) [ 0.0000 00] M\u00f3dulos vinculados en: [ 0.000000] Proceso swapper (pid: 0, threadinfo=(____ptrval____), tarea=(____ptrval____)) [0.000000] Pila: 9000000003c93a14 9000000003800898 90000000041844f8 90000000037a46ec [0.000000] 000000000a7fd000 0000000008290000 0000000000000000 0000000000000000 [ 0.000000] 00000000000000000 0000000000000000 00000000019d 8000 000000000f556b60 [ 0,000000] 000000000a7fd000 000000000f556b08 9000000003ca7700 9000000003800000 [ 0,000000 ] 9000000003c93e50 9000000003800898 9000000003800108 90000000037a484c [ 0.000000] 000000000e0a4330 000000000f556b60 00000000 0a7fd000 000000000f556b08 [ 0.000000] 9000000003ca7700 9000000004184000 0000000000200000 000000000e02b018 [ 0.000000] 000000000a 7fd000 90000000037a0790 9000000003800108 0000000000000000 [ 0.000000] 00000000000000000 000000000e0a4330 000000000f556b60 00000 0000a7fd000 [ 0.000000] 000000000f556b08 000000000eaae298 000000000eaa5040 0000000000200000 [ 0.000000] ... [ 0.000000] Llamar Seguimiento: [ 0.000000] [<90000000037a5f0c>] efi_runtime_init+0x30/0x94 [ 0.000000] [<90000000037a46ec>] platform_init+0x214/0x250 [ 0.000000] [<90000000037a48 4c>] setup_arch+0x124/0x45c [ 0.000000] [<90000000037a0790>] start_kernel +0x90/0x670 [ 0.000000] [<900000000378b0d8>] entrada_kernel+0xd8/0xdc"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0f6810e39898af2d2cabd9313e4dbc945fb5dfdd",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26785",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-04T09:15:08.187",
"lastModified": "2024-10-10T12:15:03.027",
"lastModified": "2024-11-07T19:35:06.440",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommufd: Se corrigi\u00f3 falla de protecci\u00f3n en iommufd_test_syz_conv_iova Syzkaller inform\u00f3 el siguiente error: falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0xdffffc0000000038: 0000 [#1] SMP KASAN KASAN: null-ptr- deref en el rango [0x00000000000001c0-0x00000000000001c7] Seguimiento de llamadas: lock_acquire lock_acquire+0x1ce/0x4f0 down_read+0x93/0x4a0 iommufd_test_syz_conv_iova+0x56/0x1f0 iommufd_test_access_rw.isra. 0+0x2ec/0x390 iommufd_test+0x1058/0x1e30 iommufd_fops_ioctl+0x381/0x510 vfs_ioctl __do_sys_ioctl __se_sys_ioctl __x64_sys_ioctl +0x170/0x1e0 do_syscall_x64 do_syscall_64+0x71/0x140 Esto se debe a que el nuevo iommufd_access_change_ioas() establece access->ioas en NULL durante su proceso, por lo que el bloqueo podr\u00eda desaparecer en un contexto de ejecuci\u00f3n concurrente. Solucione este problema haciendo el mismo acceso->ioas cordura que hacen las funciones iommufd_access_rw() y iommufd_access_pin_pages()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/cf7c2789822db8b5efa34f5ebcf1621bc0008d48",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26794",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-04T09:15:08.683",
"lastModified": "2024-04-04T14:15:09.843",
"lastModified": "2024-11-07T20:35:10.190",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre la finalizaci\u00f3n de extensi\u00f3n ordenada y fiemap Para fiemap recientemente dejamos de bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, para evitar un punto muerto en un escenario donde el b\u00fafer fiemap resulta ser un rango mapeado en memoria del mismo archivo. Es muy poco probable que este caso de uso sea \u00fatil en la pr\u00e1ctica, pero puede activarse mediante pruebas difusas (syzbot, etc.). Sin embargo, al no bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, podemos competir con una extensi\u00f3n ordenada. Esto sucede as\u00ed: 1) La tarea fiemap termina de procesar un elemento de extensi\u00f3n de archivo que cubre el rango de archivos [512K, 1M[, y ese elemento de extensi\u00f3n de archivo es el \u00faltimo elemento de la hoja que se est\u00e1 procesando actualmente; 2) Y la extensi\u00f3n ordenada para el rango de archivos [768K, 2M[, en modo COW, se completa (btrfs_finish_one_ordered()) y el elemento de extensi\u00f3n de archivo que cubre el rango [512K, 1M[ se recorta para cubrir el rango [512K, 768K[ y luego se inserta un nuevo elemento de extensi\u00f3n de archivo para el rango [768K, 2M[ en el \u00e1rbol de subvolumen del inodo; 3) La tarea fiemap llama a fiemap_next_leaf_item(), que luego llama a btrfs_next_leaf() para encontrar la siguiente hoja/elemento. Esto encuentra que la siguiente clave despu\u00e9s de la que procesamos anteriormente (su tipo es BTRFS_EXTENT_DATA_KEY y su desplazamiento es 512K), es la clave correspondiente al nuevo elemento de extensi\u00f3n de archivo insertado por la extensi\u00f3n ordenada, que tiene un tipo de BTRFS_EXTENT_DATA_KEY y un desplazamiento de 768K; 4) M\u00e1s tarde, el c\u00f3digo fiemap termina en emit_fiemap_extent() y activa la advertencia: if (cache->offset + cache->len > offset) { WARN_ON(1); devolver -EINVAL; } Dado que obtenemos 1M > 768K, porque la entrada emitida previamente para la extensi\u00f3n anterior que cubre el rango de archivos [512K, 1M[ termina en un desplazamiento que es mayor que el desplazamiento inicial de la nueva extensi\u00f3n (768K). Esto hace que fiemap falle con -EINVAL adem\u00e1s de activar la advertencia que produce un seguimiento de pila como el siguiente: [1621.677651] ------------[ cortar aqu\u00ed ]----------- - [1621.677656] ADVERTENCIA: CPU: 1 PID: 204366 en fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs] [1621.677899] M\u00f3dulos vinculados en: btrfs blake2b_generic (...) [1621.677951] CPU: 1 PID: 204366 Comm: pool No contaminado 6.8.0-rc5-btrfs-next-151+ #1 [1621.677954] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390- prebuilt.qemu.org 01/04/2014 [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678033] C\u00f3digo: 2b 4c 89 63 (...) [1621.678035] RSP: 0018:ffffab160 89ffd20 EFLAGS: 00010206 [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000 [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI : ffffab16089ffe90 [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 00000000000000000 [1621.678041] R10: 0000000000000000 R11 : 0000000000001000 R12: 0000000041d78000 [1621.678043 ] R13: 0000000000001000 R14: 00000000000000000 R15: ffff9434f0b17850 [1621.678044] FS: 00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) kn lGS:0000000000000000 [1621.678046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [1621.678048] CR2: 00007fa6b0801000 CR3 : 000000012d404002 CR4: 0000000000370ef0 [1621.678053] DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 [1621.678055] DR 3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [1621.678056] Seguimiento de llamadas: [1621.678074] [1621.678076] ? __advertir+0x80/0x130 [1621.678082] ? emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678159] ? report_bug+0x1f4/0x200 [1621.678164] ? ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26901",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:10.960",
"lastModified": "2024-11-05T10:16:01.027",
"lastModified": "2024-11-07T19:35:09.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-33029",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-04T10:15:05.147",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:54:49.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while handling the PDR in driver for getting the remote heap maps."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria durante el manejo del PDR en el controlador para obtener los mapas de mont\u00f3n remotos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +81,97 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33030",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-04T10:15:05.370",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:04:32.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al analizar los par\u00e1metros de la tabla de frecuencia IPC para LPLH que tiene un tama\u00f1o mayor que el tama\u00f1o esperado."
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +61,610 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "205BF723-DBED-4EAE-8B5C-0E01B01E1544"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A36A7B8-CF35-4003-AC3E-C5D25288B1A1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-33031",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-04T10:15:05.603",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:02:31.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing the update SIM PB records request."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de memoria durante el procesamiento de la solicitud de actualizaci\u00f3n de registros PB de SIM."
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +61,448 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "205BF723-DBED-4EAE-8B5C-0E01B01E1544"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A36A7B8-CF35-4003-AC3E-C5D25288B1A1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-33033",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-04T10:15:06.057",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:39:24.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing IOCTL calls to unmap the buffers."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria cuando la aplicaci\u00f3n del usuario modifica la misma memoria compartida de forma asincr\u00f3nica cuando el kernel accede a ella."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +81,772 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E826F765-4C2E-4319-BBC4-DEB02AAD783F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*",
"matchCriteriaId": "133FFD9F-FA09-4801-939B-AD1D507BE5FE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D242084-5844-4E43-8D7F-D2F8E3521F0C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A12D6-CC60-4BE9-ADEE-FAB58B05440F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3AD370C-2ED0-43CF-83D9-50DC92A01CA5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sm7550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA5CE41-0596-4D38-9891-D1DF711EA7E9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sm7550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A901C6-FB73-4361-B391-4A4AF8C70029"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sm7525_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2410FF59-E0C0-4920-9656-C398DB06DEAE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sm7525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D2B800C-4DBC-4028-875D-667C87D75247"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sg8275_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E4ECE56-FD6C-4A0F-A024-8AF7A7450096"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sg8275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E26A0E2-ABC4-4B97-9DFB-FB27F95E0F07"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35916",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-19T09:15:12.063",
"lastModified": "2024-05-20T13:00:04.957",
"lastModified": "2024-11-07T20:35:10.687",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dma-buf: corrige la desreferencia del puntero NULL en sanitycheck(). Si debido a un error en la asignaci\u00f3n de memoria, mock_chain() devuelve NULL, se pasa a dma_fence_enable_sw_signaling(), lo que genera una desreferencia del puntero NULL all\u00ed. . Llame a dma_fence_enable_sw_signaling() solo si mock_chain() tiene \u00e9xito. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/0336995512cdab0c65e99e4cdd47c4606debe14e",

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38409",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-04T10:15:07.713",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:40:46.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while station LL statistic handling."
},
{
"lang": "es",
"value": "Corrupci\u00f3n de memoria durante el manejo de estad\u00edsticas de la estaci\u00f3n LL."
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +61,691 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71E06B94-9463-49A6-B816-E8A82BEA8545"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4946C6-778F-4542-AB77-C9B86AF25C05"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1D604A-4530-42B3-80A0-58A82D658DDD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A4483F-3A2A-4C31-AB38-A3147CC7D55A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-38410",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-04T10:15:07.933",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:41:06.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while IOCLT is called when device is in invalid state and the WMI command buffer may be freed twice."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria mientras se llama a IOCLT cuando el dispositivo est\u00e1 en estado no v\u00e1lido y el b\u00fafer de comando WMI puede liberarse dos veces."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +81,691 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71E06B94-9463-49A6-B816-E8A82BEA8545"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4946C6-778F-4542-AB77-C9B86AF25C05"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1D604A-4530-42B3-80A0-58A82D658DDD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3E2A00-5BFA-48A0-8DF1-DC33B2CA3DD7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A4483F-3A2A-4C31-AB38-A3147CC7D55A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47855",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T06:15:04.093",
"lastModified": "2024-10-04T13:50:43.727",
"lastModified": "2024-11-07T20:35:11.733",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "util/JSONTokener.java en JSON-lib anterior a 3.1.0 maneja incorrectamente una cadena de comentarios desequilibrada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://github.com/kordamp/json-lib/commit/a0c4a0eae277130e22979cf307c95dec4005a78e",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48950",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T17:15:08.373",
"lastModified": "2024-11-07T17:15:08.373",
"lastModified": "2024-11-07T20:35:12.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue was discovered in Logpoint before 7.5.0. An endpoint used by Distributed Logpoint Setup was exposed, allowing unauthenticated attackers to bypass CSRF protections and authentication."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://docs.logpoint.com/docs/whats-new-in-logpoint/en/latest/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48951",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T17:15:08.443",
"lastModified": "2024-11-07T17:15:08.443",
"lastModified": "2024-11-07T20:35:13.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue was discovered in Logpoint before 7.5.0. Server-Side Request Forgery (SSRF) on SOAR can be used to leak Logpoint's API Token leading to authentication bypass."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://docs.logpoint.com/docs/whats-new-in-logpoint/en/latest/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48952",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-07T17:15:08.510",
"lastModified": "2024-11-07T17:15:08.510",
"lastModified": "2024-11-07T20:35:13.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://docs.logpoint.com/docs/whats-new-in-logpoint/en/latest/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49642",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T09:15:08.017",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:59:18.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rafasashi:todo_custom_field:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.0.4",
"matchCriteriaId": "39568869-E9DD-4B23-81A9-2825CE4CBE4E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/todo-custom-field/wordpress-todo-custom-field-plugin-3-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49954",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:16.753",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:16:01.590",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: static_call: Reemplazar WARN_ON() sin sentido en static_call_module_notify() static_call_module_notify() activa un WARN_ON() cuando la asignaci\u00f3n de memoria fallo en __static_call_add_module(). Esto no est\u00e1 realmente justificado, porque el caso de fallo debe ser manejado correctamente por la cadena de llamadas conocida y el c\u00f3digo de error se pasa a la aplicaci\u00f3n de espacio de usuario que la inicia. Un error en la asignaci\u00f3n de memoria no es un problema fatal, pero WARN_ON() deja fuera de servicio la m\u00e1quina cuando se establece panic_on_warn. Reempl\u00e1zalo con un pr_warn()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "243E517F-E8D1-4CB4-B5E1-099330E2800C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/85a104aaef1f56623acc10ba4c42d5f046ba65b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b83bef74c121a3311240fc4002d23486b85355e4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bc9356513d56b688775497b7ac6f2b967f46a80c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e67534bd31d79952b50e791e92adf0b3e6c13b8c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ea2cdf4da093d0482f0ef36ba971e2e0c7673425",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe513c2ef0a172a58f158e2e70465c4317f0a9a2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49955",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:16.833",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:15:27.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,150 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPI: bater\u00eda: se corrige un posible fallo al anular el registro de un gancho de bater\u00eda Cuando un gancho de bater\u00eda devuelve un error al a\u00f1adir una bater\u00eda nueva, el gancho de bater\u00eda se anula autom\u00e1ticamente el registro. Sin embargo, el proveedor del gancho de bater\u00eda no puede saberlo, por lo que m\u00e1s tarde llamar\u00e1 a battery_hook_unregister() en el gancho de bater\u00eda ya anulado, lo que provocar\u00e1 un fallo. Solucione esto utilizando el encabezado de lista para marcar los ganchos de bater\u00eda ya anulados como ya anulados para que battery_hook_unregister() pueda ignorarlos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-672"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.17",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "2E7C7F10-BDE9-4D62-9A04-76C54C5D4EAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/07b98400cb0285a6348188aa8c5ec6a2ae0551f7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76959aff14a0012ad6b984ec7686d163deccdc16",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9f469ef1c79dac7f9ac1518643a33703918f7e13",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca1fb7942a287b40659cc79551a1de54a2c2e7d5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca26e8eed9c1c6651f51f7fa38fe444f8573cd1b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce31847f109c3a5b2abdd19d7bcaafaacfde53de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/da964de4c18199e14b961b5b2e5e6570552a313c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49959",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:17.123",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:23:06.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,145 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jbd2: dejad de esperar espacio cuando jbd2_cleanup_journal_tail() devuelve un error En __jbd2_log_wait_for_space(), podr\u00edamos llamar a jbd2_cleanup_journal_tail() para recuperar algo de espacio en el diario. Pero si ocurre un error mientras se ejecuta jbd2_cleanup_journal_tail() (por ejemplo, un EIO), no dejamos de esperar espacio libre de inmediato, probamos otras ramas y, si j_committing_transaction es NULL (es decir, el tid es 0), obtendremos la siguiente queja: =============================================== JBD2: Error de E/S al actualizar el superbloque del diario para sdd-8. __jbd2_log_wait_for_space: se necesitaban 256 bloques y solo hab\u00eda 217 de espacio disponible __jbd2_log_wait_for_space: no hay forma de obtener m\u00e1s espacio de diario en sdd-8 ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 2 PID: 139804 en fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0 M\u00f3dulos vinculados: CPU: 2 PID: 139804 Comm: kworker/u8:3 No contaminado 6.6.0+ #1 RIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0 Rastreo de llamadas: add_transaction_credits+0x5d1/0x5e0 start_this_handle+0x1ef/0x6a0 jbd2__journal_start+0x18b/0x340 ext4_dirty_inode+0x5d/0xb0 __mark_inode_dirty+0xe4/0x5d0 generic_update_time+0x60/0x70 [...] == ..."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.28",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "1ECF4EB9-CCE6-413E-9A66-D01E03C462EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1c62dc0d82c62f0dc8fcdc4843208e522acccaf5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3ced0fe6c0eff032733ea8b38778b34707270138",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/481e8f18a290e39e04ddb7feb2bb2a2cc3b213ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/70bae48377a2c4296fd3caf4caf8f11079111019",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6bf043b210eac67d35a114e345c4e5585672913",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ec7f8337c98ad281020ad1f11ba492462d80737a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f5cacdc6f2bb2a9bf214469dd7112b43dd2dd68a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49961",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:17.267",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:22:15.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: i2c: ar0521: Usar la versi\u00f3n cansleep de gpiod_set_value() Si usamos el restablecimiento de GPIO desde el expansor de puerto I2C, debemos usar la variante *_cansleep() de las funciones GPIO. Esto no se hac\u00eda en las funciones ar0521_power_on()/ar0521_power_off(). Vamos a solucionarlo. ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 11 en drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x74/0x7c M\u00f3dulos vinculados en: CPU: 0 PID: 11 Comm: kworker/u16:0 No contaminado 6.10.0 #53 Nombre del hardware: Diasom DS-RK3568-SOM-EVB (DT) Cola de trabajo: events_unbound deferred_probe_work_func pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : gpiod_set_value+0x74/0x7c lr : ar0521_power_on+0xcc/0x290 sp : ffffff8001d7ab70 x29: ffffff8001d7ab70 x28: ffffff80027dcc90 x27: ffffff8003c82000 x26: ffffff8003ca9250 x25: ffffffc080a39c60 x24: ffffff8003ca9088 x23: ffffff8002402720 x22: ffffff8003ca9080 x21: ffffff8003ca9088 x20: 0000000000000000 x19: ffffff8001eb2a00 x18: ffffff80efeeac80 x17: 756d2d6332692f30 x16: 0000000000000000 x15: 0000000000000000 x14: ffffff8001d91d40 x13: 0000000000000016 x12: ffffffc080e98930 x11: ffffff8001eb2880 x10: 0000000000000890 x9: ffffff8001d7a9f0 x8: ffffff8001d92570 x7: ffffff80efeeac80 x6: 000000003fc6e780 x5: ffffff8001d91c80 x4: 0000000000000002 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000001 Rastreo de llamadas: gpiod_set_value+0x74/0x7c ar0521_power_on+0xcc/0x290 ..."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "E43F7555-891D-4BA1-85D1-7A6816C6083B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2423b60a2d6d27e5f66c5021b494463aef2db212",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3cf00ecfbf11ee8e6afff306a5bdcff4bf95d2cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/625a77b68c96349c16fcc1faa42784313e0b1a85",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9f08876d766755a92f1b9543ae3ee21bfc596fb8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bee1aed819a8cda47927436685d216906ed17f62",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49963",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:17.447",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:20:58.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,145 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: bcm2835: Fix timeout during suspend mode Durante la fase de suspensi\u00f3n de noirq, el controlador de energ\u00eda de Raspberry Pi sufre tiempos de espera de propiedad de firmware. La raz\u00f3n es que la IRQ del buz\u00f3n BCM2835 subyacente est\u00e1 deshabilitada y rpi_firmware_property_list() siempre se encontrar\u00e1 con un tiempo de espera [1]. Dado que el lado de VideoCore no se considera una fuente de reactivaci\u00f3n, configure el indicador IRQF_NO_SUSPEND para el IRQ del buz\u00f3n para mantenerlo habilitado durante el ciclo de suspensi\u00f3n-reanudaci\u00f3n. [1] PM: suspensi\u00f3n tard\u00eda de dispositivos completada despu\u00e9s de 1,754 msegs ADVERTENCIA: CPU: 0 PID: 438 en drivers/firmware/raspberrypi.c:128 rpi_firmware_property_list+0x204/0x22c Tiempo de espera de transacci\u00f3n de firmware 0x00028001 M\u00f3dulos vinculados: CPU: 0 PID: 438 Comm: bash Tainted: GC 6.9.3-dirty #17 Nombre del hardware: BCM2835 Rastreo de llamadas: unwind_backtrace de show_stack+0x18/0x1c show_stack de dump_stack_lvl+0x34/0x44 dump_stack_lvl de __warn+0x88/0xec __warn de warn_slowpath_fmt+0x7c/0xb0 warn_slowpath_fmt de rpi_firmware_property_list+0x204/0x22c rpi_firmware_property_list de rpi_firmware_property+0x68/0x8c rpi_firmware_property de rpi_firmware_set_power+0x54/0xc0 rpi_firmware_set_power de _genpd_power_off+0xe4/0x148 _genpd_power_off de genpd_sync_power_off+0x7c/0x11c genpd_sync_power_off de genpd_finish_suspend+0xcc/0xe0 genpd_finish_suspend de dpm_run_callback+0x78/0xd0 dpm_run_callback de device_suspend_noirq+0xc0/0x238 device_suspend_noirq de dpm_suspend_noirq+0xb0/0x168 dpm_suspend_noirq desde suspend_devices_and_enter+0x1b8/0x5ac suspend_devices_and_enter desde pm_suspend+0x254/0x2e4 pm_suspend desde state_store+0xa8/0xd4 state_store desde kernfs_fop_write_iter+0x154/0x1a0 kernfs_fop_write_iter desde vfs_write+0x12c/0x184 vfs_write desde ksys_write+0x78/0xc0 ksys_write desde ret_fast_syscall+0x0/0x54 Pila de excepciones (0xcc93dfa8 a 0xcc93dff0) [...] PM: suspensi\u00f3n noirq de dispositivos completada despu\u00e9s de 3095,584 mseg"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "8A07E653-16C3-4150-BD19-62B6DF148F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49964",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:17.510",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:20:04.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/hugetlb: se corrige la fuga de free_huge_pages de memfd_pin_folios memfd_pin_folios seguido de unpin_folios no puede restaurar free_huge_pages si las p\u00e1ginas no ten\u00edan ya un error, porque el recuento de referencias de folio para las p\u00e1ginas creadas por memfd_alloc_folio nunca llega a 0. memfd_pin_folios necesita otro folio_put para deshacer el folio_try_get a continuaci\u00f3n: memfd_alloc_folio() alloc_hugetlb_folio_nodemask() dequeue_hugetlb_folio_nodemask() dequeue_hugetlb_folio_node_exact() folio_ref_unfreeze(folio, 1); ; agrega 1 recuento de referencias folio_try_get() ; agrega 1 recuento de referencias hugetlb_add_to_page_cache() ; agrega 512 refcount (en x86) Con la soluci\u00f3n, despu\u00e9s de memfd_pin_folios + unpin_folios, el refcount para la p\u00e1gina (sin fallos) es 512, lo cual es correcto, ya que el refcount para una p\u00e1gina sin fijar con fallos es 513."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/59e081ff2e91bbf19b8c1ecb75b031f778858383",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c56b6f3d801d7ec8965993342bdd9e2972b6cb8e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49965",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:17.593",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:18:30.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,173 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: eliminar el desbloqueo irrazonable en ocfs2_read_blocks Serie de parches \"Correcciones varias para ocfs2_read_blocks\", v5. Esta serie contiene 2 correcciones para ocfs2_read_blocks(). El primer parche corrige el problema informado por syzbot, que detecta un balance de desbloqueo incorrecto en ocfs2_read_blocks(). El segundo parche corrige un problema informado por Heming Zhao al revisar la correcci\u00f3n anterior. Este parche (de 2): Hubo una liberaci\u00f3n de bloqueo antes de salir, as\u00ed que elimine el desbloqueo irrazonable."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.204",
"versionEndExcluding": "4.9",
"matchCriteriaId": "24B4F282-4860-4914-A00E-37E79073E119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.204",
"versionEndExcluding": "4.14",
"matchCriteriaId": "CAF7C57C-4624-476E-9DC5-B2376F1E4675"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.157",
"versionEndExcluding": "4.19",
"matchCriteriaId": "9DC95FF1-ED73-4CD5-9F88-C887FD9A5273"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.87",
"versionEndExcluding": "4.20",
"matchCriteriaId": "B897764C-25B8-458D-864B-0985FF8A323F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "BD12FA67-D2AC-4EB0-BED4-7D4E94D30EF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/39a88623af3f1c686bf6db1e677ed865ffe6fccc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3f1ca6ba5452d53c598a45d21267a2c0c221eef3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/81aba693b129e82e11bb54f569504d943d018de9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/84543da867c967edffd5065fa910ebf56aaae49d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c03a82b4a0c935774afa01fd6d128b444fd930a1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/df4f20fc3673cee11abf2c571987a95733cb638d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f55a33fe0fb5274ef185fd61947cf142138958af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49966",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:17.683",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:30:24.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,145 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: cancelar dqi_sync_work antes de liberar oinfo ocfs2_global_read_info() inicializar\u00e1 y programar\u00e1 dqi_sync_work al final, si ocurre un error despu\u00e9s de leer exitosamente la cuota global, activar\u00e1 la siguiente advertencia con CONFIG_DEBUG_OBJECTS_* habilitado: ODEBUG: free active (active state 0) object: 00000000d8b0ce28 object type: timer_list hint: qsync_work_fn+0x0/0x16c Esto informa que hay un trabajo retrasado activo al liberar oinfo en el manejo de errores, as\u00ed que cancele dqi_sync_work primero. POR CIERTO, devuelva el estado en lugar de -1 cuando .read_file_info falle."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.29",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "17207E3A-A658-4FC6-AFFC-DC9A24067D66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0d707a33c84b371cb66120e198eed3374726ddd8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/14114d8148db07e7946fb06b56a50cfa425e26c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/35fccce29feb3706f649726d410122dd81b92c18",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4173d1277c00baeedaaca76783e98b8fd0e3c08d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a4346c04d055bf7e184c18a73dbd23b6a9811118",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bbf41277df8b33fbedf4750a9300c147e8f104eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ef768020366f47d23f39c4f57bcb03af6d1e24b3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49968",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:17.833",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:28:02.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: los sistemas de archivos sin la funci\u00f3n casefold no se pueden montar con siphash Al montar el sistema de archivos ext4, si la versi\u00f3n hash predeterminada est\u00e1 configurada en DX_HASH_SIPHASH pero la funci\u00f3n casefold no est\u00e1 configurada, salga del montaje."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "6D5FF9C2-A011-4A64-B614-F9244ED2EA0D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/985b67cd86392310d9e9326de941c22fc9340eec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e1373903db6c4ac994de0d18076280ad88e12dee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50004",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T19:15:04.083",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:27:29.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,93 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: actualizaci\u00f3n de la pol\u00edtica DML2 EnhancedPrefetchScheduleAccelerationFinal DCN35 [POR QU\u00c9 Y C\u00d3MO] La falta de coincidencia en DCN35 DML2 hace que la validaci\u00f3n de bw no pueda adquirir una tuber\u00eda DPP inesperada, lo que provoca una pantalla gris y un bloqueo del sistema. Eliminar la anulaci\u00f3n del valor EnhancedPrefetchScheduleAccelerationFinal para que coincida con la especificaci\u00f3n de hardware. (seleccionado de el commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "652638C5-5F25-4DF3-AD42-DD3252A97152"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0d5e5e8a0aa49ea2163abf128da3b509a6c58286",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4010efc8516899981cc3b57be2d4a2d5d9e50228",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/945dc25eda88b5d6e30c9686dc619ab981c22d0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50005",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T19:15:04.143",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:27:01.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,108 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mac802154: Se soluciona un posible problema de desreferencia de RCU en mac802154_scan_worker En la funci\u00f3n `mac802154_scan_worker`, se accedi\u00f3 al campo `scan_req->type` despu\u00e9s de que se desbloqueara la secci\u00f3n cr\u00edtica del lado de lectura de RCU. Seg\u00fan las reglas de uso de RCU, esto es ilegal y puede provocar un comportamiento impredecible, como acceder a la memoria que se ha actualizado o causar problemas de use after free. Este posible error se identific\u00f3 utilizando una herramienta de an\u00e1lisis est\u00e1tico desarrollada por m\u00ed, dise\u00f1ada espec\u00edficamente para detectar problemas relacionados con RCU. Para solucionar esto, el valor `scan_req->type` ahora se almacena en una variable local `scan_req_type` mientras a\u00fan est\u00e1 dentro de la secci\u00f3n cr\u00edtica del lado de lectura de RCU. Luego, `scan_req_type` se usa despu\u00e9s de que se libera el bloqueo de RCU, lo que garantiza que se acceda al valor de tipo de manera segura sin violar las reglas de RCU."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "D48A8C35-F8B9-4BFE-AC95-D7F90303D311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/540138377b22f601f06f55ebfa3ca171dcab471a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bff1709b3980bd7f80be6786f64cc9a9ee9e56da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d18f669461811dfe2915d5554ab2a9834f810013",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e676e4ea76bbe7f1156d8c326b9b6753849481c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50008",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T19:15:04.367",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:26:22.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mwifiex: Se corrige la advertencia de escritura que abarca el campo memcpy() en mwifiex_cmd_802_11_scan_ext() Reemplazar la matriz de un elemento con un miembro de matriz flexible en `struct host_cmd_ds_802_11_scan_ext`. Con esto, se soluciona la siguiente advertencia: elo 16 17:51:58 kernel de surfacebook: ------------[ cortar aqu\u00ed ]------------ elo 16 17:51:58 kernel de surfacebook: memcpy: se detect\u00f3 escritura que abarca el campo (tama\u00f1o 243) de un solo campo \"ext_scan->tlv_buffer\" en drivers/net/wireless/marvell/mwifiex/scan.c:2239 (tama\u00f1o 1) elo 16 17:51:58 kernel de surfacebook: ADVERTENCIA: CPU: 0 PID: 498 en drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/17199b69a84798efffc475040fbef44374ef1de1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1756918f51e9ab247a0f4782cc28853c2bb457c1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/498365e52bebcbc36a93279fe7e9d6aec8479cee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/71267bd4e8c752d7af6c6b96bb83984a6a95273d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a3a12c30f9510f3753286fadbc6cdb7dad78c1d5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e59bdb1ba594104cd0ee0af3ee9e4435d842a8fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fef7b51f22cf2049b0ca6740adeb0ba6f2e671dc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50010",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T19:15:04.523",
"lastModified": "2024-11-04T12:16:09.760",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:32:35.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,95 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exec: no WARN para comprobaci\u00f3n atrevida de path_noexec Tanto las comprobaciones i_mode como noexec envueltas en WARN_ON provienen de un artefacto de la implementaci\u00f3n anterior. Sol\u00edan comprobar leg\u00edtimamente la condici\u00f3n, pero eso se movi\u00f3 hacia arriba en dos confirmaciones: 633fb6ac3980 (\"exec: mover la comprobaci\u00f3n S_ISREG() antes\") 0fd338b2d2cd (\"exec: mover la comprobaci\u00f3n path_noexec() antes\") En lugar de eliminarse, dichas comprobaciones se WARN_ON, lo que tiene alg\u00fan valor de depuraci\u00f3n. Sin embargo, la comprobaci\u00f3n falsa path_noexec es atrevida, lo que resulta en advertencias injustificadas si alguien se apresura a configurar el indicador noexec. Se puede notar que hay m\u00e1s para comprobar si se permite execve y no se garantiza que ninguna de las condiciones siga siendo v\u00e1lida despu\u00e9s de que se probaron. Adem\u00e1s, esto no valida si la ruta del c\u00f3digo realiz\u00f3 alguna verificaci\u00f3n de permisos para comenzar; pasar\u00e1 si el inodo resulta ser regular. Mantenga la verificaci\u00f3n redundante path_noexec() aunque sea una verificaci\u00f3n sin sentido de garant\u00eda que no se proporciona, as\u00ed que elimine la ADVERTENCIA. Reformule el comentario y haga peque\u00f1as correcciones mientras est\u00e9 aqu\u00ed. [brauner: mantenga la verificaci\u00f3n redundante path_noexec()]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "6D5FF9C2-A011-4A64-B614-F9244ED2EA0D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0bdf77be2330062b3a64f2bec39f62ab874a6796",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0d16f53c91111cec914f0811fcc526a2ba77b20d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0d196e7589cefe207d5d41f37a0a28a1fdeeb7c6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b723f96407a0a078cf75970e4dbf16b46d286a61",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d62ba2a5536df83473a2ac15ab302258e3845251",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50407",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T11:15:05.237",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:28:22.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "FEB2A533-9EA8-413F-9116-4E13CF868719"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50409",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T11:15:05.460",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:28:43.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "FEB2A533-9EA8-413F-9116-4E13CF868719"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-2-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50410",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-29T11:15:05.657",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:29:13.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.4.1",
"matchCriteriaId": "47711FAA-0ADE-47C9-8DBE-AC3254FE3E4C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51358",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-05T23:15:04.707",
"lastModified": "2024-11-06T18:17:17.287",
"lastModified": "2024-11-07T20:35:14.957",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " Un problema en Linux Server Heimdall v.2.6.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para agregar una nueva aplicaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/Kov404/CVE-2024-51358",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51513",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T09:15:04.523",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:30:14.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51514",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T09:15:04.723",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:43:51.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51515",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T09:15:04.937",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:42:53.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51516",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T09:15:05.157",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:42:32.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51520",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:11.947",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:55:38.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51521",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:12.490",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:55:21.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51522",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:12.953",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:03:56.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51523",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:13.420",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:03:21.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51524",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:13.890",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:02:59.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51525",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:14.420",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:01:59.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51526",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:14.850",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:00:28.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51527",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:15.183",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:57:57.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51528",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T10:21:15.607",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:57:18.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51529",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T12:15:15.207",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:56:41.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Data verification vulnerability in the battery module\nImpact: Successful exploitation of this vulnerability may affect function stability."
},
{
"lang": "es",
"value": "Vulnerabilidad de verificaci\u00f3n de datos en battery module Impact: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la estabilidad de la funci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -47,10 +81,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51530",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-11-05T12:15:15.440",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T19:56:10.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LaunchAnywhere vulnerability in the account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
},
{
"lang": "es",
"value": "Vulnerabilidad de LaunchAnywhere en el m\u00f3dulo de cuentas Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -47,10 +81,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/11/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51758",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-07T18:15:17.787",
"lastModified": "2024-11-07T18:15:17.787",
"lastModified": "2024-11-07T20:35:16.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
]
},
"weaknesses": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51993",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-07T18:15:18.203",
"lastModified": "2024-11-07T18:15:18.203",
"lastModified": "2024-11-07T19:35:10.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5
}
],
"cvssMetricV30": [
{
"source": "security-advisories@github.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51994",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-07T18:15:18.470",
"lastModified": "2024-11-07T18:15:18.470",
"lastModified": "2024-11-07T19:35:10.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
],
"cvssMetricV30": [
{
"source": "security-advisories@github.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51995",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-07T18:15:18.787",
"lastModified": "2024-11-07T18:15:18.787",
"lastModified": "2024-11-07T19:35:10.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -12,6 +12,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
],
"cvssMetricV30": [
{
"source": "security-advisories@github.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8378",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-07T16:15:18.057",
"lastModified": "2024-11-07T16:15:18.057",
"lastModified": "2024-11-07T20:35:16.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Safe SVG WordPress plugin before 2.2.6 has its sanitisation code is only running for paths that call wp_handle_upload, but not for example for code that uses wp_handle_sideload which is often used to upload attachments via raw POST data."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/17be4bf2-486d-43ab-b87a-2117c8d77ca8/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9443",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-05T09:15:05.383",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-07T20:56:58.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,18 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:basticom:framework:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.1",
"matchCriteriaId": "7658FAFD-CCBC-4CE7-A119-3F0A92AFBF49"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3178823/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/basticom-framework/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3dd3dc4b-e936-46a4-8d65-5f4bf05b2374?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9689",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-05T06:15:06.360",
"lastModified": "2024-11-06T19:14:53.737",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-07T20:35:16.807",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-9926",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-07T15:15:05.860",
"lastModified": "2024-11-07T15:15:05.860",
"lastModified": "2024-11-07T20:35:17.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Jetpack WordPress plugin does not have proper authorisation in one of its REST endpoint, allowing any authenticated users, such as subscriber to read arbitrary feedbacks data sent via the Jetpack Contact Form"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/669382af-f836-4896-bdcb-5c6a57c99bd9/",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-07T19:00:28.970180+00:00
2024-11-07T21:00:20.924770+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-07T18:35:10.433000+00:00
2024-11-07T20:59:18.593000+00:00
```
### Last Data Feed Release
@ -33,69 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
268582
268584
```
### CVEs added in the last Commit
Recently added CVEs: `28`
Recently added CVEs: `2`
- [CVE-2020-11916](CVE-2020/CVE-2020-119xx/CVE-2020-11916.json) (`2024-11-07T18:15:15.310`)
- [CVE-2020-11917](CVE-2020/CVE-2020-119xx/CVE-2020-11917.json) (`2024-11-07T18:15:15.370`)
- [CVE-2020-11918](CVE-2020/CVE-2020-119xx/CVE-2020-11918.json) (`2024-11-07T18:15:15.450`)
- [CVE-2020-11919](CVE-2020/CVE-2020-119xx/CVE-2020-11919.json) (`2024-11-07T18:15:15.517`)
- [CVE-2020-11921](CVE-2020/CVE-2020-119xx/CVE-2020-11921.json) (`2024-11-07T18:15:15.590`)
- [CVE-2020-11926](CVE-2020/CVE-2020-119xx/CVE-2020-11926.json) (`2024-11-07T18:15:15.667`)
- [CVE-2024-10964](CVE-2024/CVE-2024-109xx/CVE-2024-10964.json) (`2024-11-07T17:15:06.500`)
- [CVE-2024-10965](CVE-2024/CVE-2024-109xx/CVE-2024-10965.json) (`2024-11-07T17:15:06.890`)
- [CVE-2024-10966](CVE-2024/CVE-2024-109xx/CVE-2024-10966.json) (`2024-11-07T18:15:16.033`)
- [CVE-2024-10967](CVE-2024/CVE-2024-109xx/CVE-2024-10967.json) (`2024-11-07T18:15:16.393`)
- [CVE-2024-40715](CVE-2024/CVE-2024-407xx/CVE-2024-40715.json) (`2024-11-07T17:15:08.083`)
- [CVE-2024-45794](CVE-2024/CVE-2024-457xx/CVE-2024-45794.json) (`2024-11-07T18:15:17.150`)
- [CVE-2024-47073](CVE-2024/CVE-2024-470xx/CVE-2024-47073.json) (`2024-11-07T18:15:17.417`)
- [CVE-2024-48290](CVE-2024/CVE-2024-482xx/CVE-2024-48290.json) (`2024-11-07T18:15:17.580`)
- [CVE-2024-48950](CVE-2024/CVE-2024-489xx/CVE-2024-48950.json) (`2024-11-07T17:15:08.373`)
- [CVE-2024-48951](CVE-2024/CVE-2024-489xx/CVE-2024-48951.json) (`2024-11-07T17:15:08.443`)
- [CVE-2024-48952](CVE-2024/CVE-2024-489xx/CVE-2024-48952.json) (`2024-11-07T17:15:08.510`)
- [CVE-2024-48953](CVE-2024/CVE-2024-489xx/CVE-2024-48953.json) (`2024-11-07T17:15:08.570`)
- [CVE-2024-48954](CVE-2024/CVE-2024-489xx/CVE-2024-48954.json) (`2024-11-07T17:15:08.650`)
- [CVE-2024-51428](CVE-2024/CVE-2024-514xx/CVE-2024-51428.json) (`2024-11-07T18:15:17.677`)
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-07T18:15:17.787`)
- [CVE-2024-51989](CVE-2024/CVE-2024-519xx/CVE-2024-51989.json) (`2024-11-07T18:15:17.953`)
- [CVE-2024-51993](CVE-2024/CVE-2024-519xx/CVE-2024-51993.json) (`2024-11-07T18:15:18.203`)
- [CVE-2024-51994](CVE-2024/CVE-2024-519xx/CVE-2024-51994.json) (`2024-11-07T18:15:18.470`)
- [CVE-2024-51995](CVE-2024/CVE-2024-519xx/CVE-2024-51995.json) (`2024-11-07T18:15:18.787`)
- [CVE-2024-10968](CVE-2024/CVE-2024-109xx/CVE-2024-10968.json) (`2024-11-07T20:15:15.633`)
- [CVE-2024-10969](CVE-2024/CVE-2024-109xx/CVE-2024-10969.json) (`2024-11-07T20:15:15.930`)
### CVEs modified in the last Commit
Recently modified CVEs: `67`
Recently modified CVEs: `82`
- [CVE-2024-3580](CVE-2024/CVE-2024-35xx/CVE-2024-3580.json) (`2024-11-07T17:35:21.603`)
- [CVE-2024-36030](CVE-2024/CVE-2024-360xx/CVE-2024-36030.json) (`2024-11-07T18:35:09.050`)
- [CVE-2024-36032](CVE-2024/CVE-2024-360xx/CVE-2024-36032.json) (`2024-11-07T18:35:09.363`)
- [CVE-2024-36908](CVE-2024/CVE-2024-369xx/CVE-2024-36908.json) (`2024-11-07T17:35:19.317`)
- [CVE-2024-36947](CVE-2024/CVE-2024-369xx/CVE-2024-36947.json) (`2024-11-07T18:35:09.793`)
- [CVE-2024-38542](CVE-2024/CVE-2024-385xx/CVE-2024-38542.json) (`2024-11-07T17:35:20.127`)
- [CVE-2024-38548](CVE-2024/CVE-2024-385xx/CVE-2024-38548.json) (`2024-11-07T17:35:20.360`)
- [CVE-2024-38576](CVE-2024/CVE-2024-385xx/CVE-2024-38576.json) (`2024-11-07T18:35:10.433`)
- [CVE-2024-43438](CVE-2024/CVE-2024-434xx/CVE-2024-43438.json) (`2024-11-07T17:35:22.537`)
- [CVE-2024-48921](CVE-2024/CVE-2024-489xx/CVE-2024-48921.json) (`2024-11-07T17:20:34.160`)
- [CVE-2024-49768](CVE-2024/CVE-2024-497xx/CVE-2024-49768.json) (`2024-11-07T17:28:02.853`)
- [CVE-2024-49769](CVE-2024/CVE-2024-497xx/CVE-2024-49769.json) (`2024-11-07T17:29:04.053`)
- [CVE-2024-49953](CVE-2024/CVE-2024-499xx/CVE-2024-49953.json) (`2024-11-07T17:44:28.297`)
- [CVE-2024-49958](CVE-2024/CVE-2024-499xx/CVE-2024-49958.json) (`2024-11-07T17:46:35.687`)
- [CVE-2024-50455](CVE-2024/CVE-2024-504xx/CVE-2024-50455.json) (`2024-11-07T17:01:30.937`)
- [CVE-2024-50456](CVE-2024/CVE-2024-504xx/CVE-2024-50456.json) (`2024-11-07T17:02:03.653`)
- [CVE-2024-51504](CVE-2024/CVE-2024-515xx/CVE-2024-51504.json) (`2024-11-07T17:35:23.373`)
- [CVE-2024-51510](CVE-2024/CVE-2024-515xx/CVE-2024-51510.json) (`2024-11-07T17:03:03.297`)
- [CVE-2024-51511](CVE-2024/CVE-2024-515xx/CVE-2024-51511.json) (`2024-11-07T17:03:12.743`)
- [CVE-2024-51512](CVE-2024/CVE-2024-515xx/CVE-2024-51512.json) (`2024-11-07T17:03:21.927`)
- [CVE-2024-8587](CVE-2024/CVE-2024-85xx/CVE-2024-8587.json) (`2024-11-07T17:15:24.903`)
- [CVE-2024-8923](CVE-2024/CVE-2024-89xx/CVE-2024-8923.json) (`2024-11-07T17:18:10.993`)
- [CVE-2024-8924](CVE-2024/CVE-2024-89xx/CVE-2024-8924.json) (`2024-11-07T17:16:43.393`)
- [CVE-2024-9988](CVE-2024/CVE-2024-99xx/CVE-2024-9988.json) (`2024-11-07T17:00:29.560`)
- [CVE-2024-9989](CVE-2024/CVE-2024-99xx/CVE-2024-9989.json) (`2024-11-07T17:00:56.337`)
- [CVE-2024-50410](CVE-2024/CVE-2024-504xx/CVE-2024-50410.json) (`2024-11-07T20:29:13.937`)
- [CVE-2024-51358](CVE-2024/CVE-2024-513xx/CVE-2024-51358.json) (`2024-11-07T20:35:14.957`)
- [CVE-2024-51513](CVE-2024/CVE-2024-515xx/CVE-2024-51513.json) (`2024-11-07T20:30:14.910`)
- [CVE-2024-51514](CVE-2024/CVE-2024-515xx/CVE-2024-51514.json) (`2024-11-07T19:43:51.717`)
- [CVE-2024-51515](CVE-2024/CVE-2024-515xx/CVE-2024-51515.json) (`2024-11-07T19:42:53.157`)
- [CVE-2024-51516](CVE-2024/CVE-2024-515xx/CVE-2024-51516.json) (`2024-11-07T19:42:32.537`)
- [CVE-2024-51520](CVE-2024/CVE-2024-515xx/CVE-2024-51520.json) (`2024-11-07T19:55:38.370`)
- [CVE-2024-51521](CVE-2024/CVE-2024-515xx/CVE-2024-51521.json) (`2024-11-07T19:55:21.083`)
- [CVE-2024-51522](CVE-2024/CVE-2024-515xx/CVE-2024-51522.json) (`2024-11-07T20:03:56.137`)
- [CVE-2024-51523](CVE-2024/CVE-2024-515xx/CVE-2024-51523.json) (`2024-11-07T20:03:21.307`)
- [CVE-2024-51524](CVE-2024/CVE-2024-515xx/CVE-2024-51524.json) (`2024-11-07T20:02:59.010`)
- [CVE-2024-51525](CVE-2024/CVE-2024-515xx/CVE-2024-51525.json) (`2024-11-07T20:01:59.063`)
- [CVE-2024-51526](CVE-2024/CVE-2024-515xx/CVE-2024-51526.json) (`2024-11-07T20:00:28.717`)
- [CVE-2024-51527](CVE-2024/CVE-2024-515xx/CVE-2024-51527.json) (`2024-11-07T19:57:57.577`)
- [CVE-2024-51528](CVE-2024/CVE-2024-515xx/CVE-2024-51528.json) (`2024-11-07T19:57:18.577`)
- [CVE-2024-51529](CVE-2024/CVE-2024-515xx/CVE-2024-51529.json) (`2024-11-07T19:56:41.723`)
- [CVE-2024-51530](CVE-2024/CVE-2024-515xx/CVE-2024-51530.json) (`2024-11-07T19:56:10.187`)
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-07T20:35:16.200`)
- [CVE-2024-51993](CVE-2024/CVE-2024-519xx/CVE-2024-51993.json) (`2024-11-07T19:35:10.383`)
- [CVE-2024-51994](CVE-2024/CVE-2024-519xx/CVE-2024-51994.json) (`2024-11-07T19:35:10.640`)
- [CVE-2024-51995](CVE-2024/CVE-2024-519xx/CVE-2024-51995.json) (`2024-11-07T19:35:10.887`)
- [CVE-2024-8378](CVE-2024/CVE-2024-83xx/CVE-2024-8378.json) (`2024-11-07T20:35:16.537`)
- [CVE-2024-9443](CVE-2024/CVE-2024-94xx/CVE-2024-9443.json) (`2024-11-07T20:56:58.797`)
- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-11-07T20:35:16.807`)
- [CVE-2024-9926](CVE-2024/CVE-2024-99xx/CVE-2024-9926.json) (`2024-11-07T20:35:17.120`)
## Download and Usage

View File

@ -137365,9 +137365,9 @@ CVE-2019-20453,0,0,ec8e3999418c1ef666416d17e524522ace7d8baa1ec904d9c33aa7eb859a0
CVE-2019-20454,0,0,49062a80eed619a841ac3351fb2011c193b2ec707ecac6a198cdc12c186489e3,2024-03-27T16:05:17.853000
CVE-2019-20455,0,0,daf31bba9026c418b4aea3791f020711fbed6d99c9cd896a0c42be955fa8a697,2024-02-14T01:17:43.863000
CVE-2019-20456,0,0,5ffdec9dafee7fd301766358bf501920942dc3a2787a156bca775d7e0de56f68,2020-02-26T15:10:12.293000
CVE-2019-20457,1,1,13c5e844f68bbea2569122a056bbff34e886a83d0257113c2ed136a782558630,2024-11-07T18:15:15.083000
CVE-2019-20458,1,1,735bc453b2f612d764503bc0afa73204b0a8d3b324796ff10ae6059242d6fae7,2024-11-07T18:15:15.170000
CVE-2019-20459,1,1,0811dcd399c52d419cf94380bb88687f219fea5ed836193353de3dc2607ad839,2024-11-07T18:15:15.227000
CVE-2019-20457,0,0,13c5e844f68bbea2569122a056bbff34e886a83d0257113c2ed136a782558630,2024-11-07T18:15:15.083000
CVE-2019-20458,0,0,735bc453b2f612d764503bc0afa73204b0a8d3b324796ff10ae6059242d6fae7,2024-11-07T18:15:15.170000
CVE-2019-20459,0,0,0811dcd399c52d419cf94380bb88687f219fea5ed836193353de3dc2607ad839,2024-11-07T18:15:15.227000
CVE-2019-2046,0,0,ad2b3932c8d1e3d30b7050d3687fe386b72bd21c29795965d8e46543b88b60b4,2021-07-21T11:39:23.747000
CVE-2019-20463,0,0,4ff5adb0065b0740b37d188956763d99d2a5544f1d74340b30686c0709a88df2,2024-07-30T01:15:10.510000
CVE-2019-20464,0,0,cbf249cf6488e4eee761ec744b712531e70e62139008cf34f74f29db6d2926c8,2024-08-01T13:41:54.067000
@ -146915,18 +146915,18 @@ CVE-2020-11912,0,0,001e952128c7bcc5ba8822eabe19435f44973ff2e6be3c376a4d89e35db55
CVE-2020-11913,0,0,73d1dbbcdd4d68945063c1a13a98c4f4419a183d9171be039ef71d68a5285663,2020-07-22T01:15:19.977000
CVE-2020-11914,0,0,933895f61d4cd343cf6df7a50e21b2954b2ca93a6c3c96497c9a184889a05019,2020-07-22T01:15:20.070000
CVE-2020-11915,0,0,7d89f75419f7463d1384054a54ad59fa6d293cc882195a4b2b681bf21b80d80a,2024-08-01T13:42:00.520000
CVE-2020-11916,1,1,a48bc704413ad6b079d273d972fed3d456ec5ea5853bee003c78e53d44d8f006,2024-11-07T18:15:15.310000
CVE-2020-11917,1,1,abaa048224d5125c4eccf32c9334dab8197fccb950f04826607f23914202b9aa,2024-11-07T18:15:15.370000
CVE-2020-11918,1,1,8d36c27d54ace25b6d4150d9d5097a21df090d3103ec755380b53a73b28e21da,2024-11-07T18:15:15.450000
CVE-2020-11919,1,1,7bd9f721ca286d8f68b12e5174dc3509f99f4cef3212e633f1c54d99ad8386bc,2024-11-07T18:15:15.517000
CVE-2020-11916,0,0,a48bc704413ad6b079d273d972fed3d456ec5ea5853bee003c78e53d44d8f006,2024-11-07T18:15:15.310000
CVE-2020-11917,0,0,abaa048224d5125c4eccf32c9334dab8197fccb950f04826607f23914202b9aa,2024-11-07T18:15:15.370000
CVE-2020-11918,0,0,8d36c27d54ace25b6d4150d9d5097a21df090d3103ec755380b53a73b28e21da,2024-11-07T18:15:15.450000
CVE-2020-11919,0,1,db6bd08d819bcc6b622bf15adffaf1e2d7d5e73b0b165df8d964850e9e46ed8e,2024-11-07T19:35:00.740000
CVE-2020-1192,0,0,2da57e2a62a232a210f5ef6c2cdc72a098f145c18d45a7b4e5ff9c45ae3505e5,2021-12-01T14:19:18.020000
CVE-2020-11920,0,0,63941de7aa14c11714aee7d8036115dfa77ff108df5dc59cf94071d6615c5125,2024-07-30T01:15:11.510000
CVE-2020-11921,1,1,46aa3b5c4f9b5f36fb62e8ef393d92bf6f4b3ce2a3b9fdb8eb9f5b041431c917,2024-11-07T18:15:15.590000
CVE-2020-11921,0,0,46aa3b5c4f9b5f36fb62e8ef393d92bf6f4b3ce2a3b9fdb8eb9f5b041431c917,2024-11-07T18:15:15.590000
CVE-2020-11922,0,0,374a3245dac4cc2e16375466fda67c18e505c6a102baaec58ee711677b960103,2024-07-30T01:15:11.600000
CVE-2020-11923,0,0,fb3be716d0f908996ee76f0715683ffb65fd813fd0fec133d8eaadb72ba1c5ae,2024-07-30T01:15:11.690000
CVE-2020-11924,0,0,939327d07f44134100d79060d056bb5981da70e775752f8252fc18e6ee82797b,2024-07-30T01:15:11.780000
CVE-2020-11925,0,0,f96a2c1cbb5e00ad3d2d97dfbd0b5b50d52d2501ad45fb0d9de2e2d77ad70e95,2024-08-01T13:42:01.480000
CVE-2020-11926,1,1,86d6932d8640085e58bbe86ddae912eb3df0f888ebe672466be11288c49dc143,2024-11-07T18:15:15.667000
CVE-2020-11926,0,0,86d6932d8640085e58bbe86ddae912eb3df0f888ebe672466be11288c49dc143,2024-11-07T18:15:15.667000
CVE-2020-11928,0,0,90cf3cf1b6e5c940d77ccfaf8a7f457eaa98ed971d149e26bd55d0344c85db00,2023-08-07T18:11:24.533000
CVE-2020-1193,0,0,21c495b68407af19663b0ccb52795639d4811c35526449d985ec528699966a5d,2023-12-31T22:15:59.130000
CVE-2020-11930,0,0,cd761d767cbaaa15ae2c7cec98390a36e7af4474ac6d23c3ad040c28e6c39903,2020-05-19T14:15:10.893000
@ -186992,7 +186992,7 @@ CVE-2021-47056,0,0,53a8d2cbb50ac5db0355e680253b631e57465ed746d5d73fab1533b9541e9
CVE-2021-47057,0,0,1d3916c52a7749b5b8e55bd16d4876c24340a0feafd41a16ef48cddd81108f94,2024-11-06T15:35:01.363000
CVE-2021-47058,0,0,b438168fba91aa01292c697aab3b07888b9ffa4094f5b28ad48fc85c717f7887,2024-03-01T14:04:26.010000
CVE-2021-47059,0,0,a6f9203052591d3c066a3d0e65a10b21f093da98369347d14343ba5229adce4d,2024-03-01T14:04:26.010000
CVE-2021-47060,0,1,cc6e39e3aee397bc59661bc2f4d3236a233ac0497059c183dee9f49ee4b0c12f,2024-11-07T17:35:01.233000
CVE-2021-47060,0,0,cc6e39e3aee397bc59661bc2f4d3236a233ac0497059c183dee9f49ee4b0c12f,2024-11-07T17:35:01.233000
CVE-2021-47061,0,0,69d13455d0b4be16496129ac825e7f02db6243ba2030978b747aec71962892fb,2024-03-01T14:04:26.010000
CVE-2021-47062,0,0,8c423c1ab1222e251a9b1853baac4526fb8a2177d755c7f1cb3f7e002f49539b,2024-03-01T14:04:26.010000
CVE-2021-47063,0,0,6c9762270033311804a0e9183ae9b9a3db00919eb86d9929efd560fe1fb78305,2024-03-01T14:04:26.010000
@ -187026,7 +187026,7 @@ CVE-2021-47090,0,0,2c489b1391e1218d2d16941f8633f5d95ddf471b2541e7953e288e3588523
CVE-2021-47091,0,0,6f8bf2fa9b9e29ebfde7540e7d404d6090906d8861a09e884d533ea7fe33ccaf,2024-03-05T13:41:01.900000
CVE-2021-47092,0,0,cc354a14cc04187592aa1176b9d80e6683dd927a110ff36a87a0a4164e6a3e09,2024-03-05T13:41:01.900000
CVE-2021-47093,0,0,6c1a637b04b12faa0485254b63058c012fd7055c98f1106b7f80e117f7b44f61,2024-03-05T13:41:01.900000
CVE-2021-47094,0,1,28e9b94b90723e166e2573903f68a9e08a1e1ce68a3339c4a1431e7daec73e39,2024-11-07T18:35:02.233000
CVE-2021-47094,0,0,28e9b94b90723e166e2573903f68a9e08a1e1ce68a3339c4a1431e7daec73e39,2024-11-07T18:35:02.233000
CVE-2021-47095,0,0,160862750cd10acd7d63895599ff51c9a7437fae93b0217e46e2f341f6091fc7,2024-03-05T13:41:01.900000
CVE-2021-47096,0,0,f8ab1dadaf82bd468014cec603590f6eba2fcf2e7c6178e31235e4b22e5ae022,2024-11-05T19:35:00.660000
CVE-2021-47097,0,0,58ebb26d1f7850230d5008448bcdebe25d89b78d79664ef55bf62f9a66de63f7,2024-03-05T13:41:01.900000
@ -187061,7 +187061,7 @@ CVE-2021-47125,0,0,0756e8b7261e7b1a153ad489bf9ffed4c3c6b590a24bfbf4e2eff1aeaaa58
CVE-2021-47126,0,0,04c8e8e108310e1fe214f1adf53742d1f96d605d92b4070dc915f41754d74d3e,2024-11-06T17:35:01.970000
CVE-2021-47127,0,0,e4981b245281ea0af5618150d4684033b91a573e39d2b09ae4cf2fd729abd995,2024-03-17T22:38:29.433000
CVE-2021-47128,0,0,d4b8a83073f5f99b0dad82cbfd95dacc611cbe63c431e8fa1d88a19ed32ba271,2024-03-17T22:38:29.433000
CVE-2021-47129,0,0,0b91474c287c9fac5441e0bfddbeb84807bcf87135fd1024c88789a5dd0ae27e,2024-03-17T22:38:29.433000
CVE-2021-47129,0,1,99146c6663fbb2c5ba734a219b5b2b484fa2fae22ea29cb72dbaa069798df0df,2024-11-07T19:35:01.857000
CVE-2021-47130,0,0,5b886b2fc7d9d62e8e586a18b61b3d341ddf828bbd4e31d4c16769a790585b87,2024-11-04T17:35:02.347000
CVE-2021-47131,0,0,fc14dc8b737479df9209c72577a6a68af3c4912ed49c51710efaa06b7a718277,2024-03-17T22:38:29.433000
CVE-2021-47132,0,0,724d4921dcb0e535eb4a7121c97e55ed94336b6cbad0341e8c4b65507e7d629b,2024-03-17T22:38:29.433000
@ -187072,7 +187072,7 @@ CVE-2021-47136,0,0,7cd020ac513c079f960e8a43840eb7aac2481499e330aa4b7750b02ff5154
CVE-2021-47137,0,0,0086287d28f5c12bc04245cebac398bc4413edd4688dda90f19f757a927f7cb1,2024-11-05T17:35:01.103000
CVE-2021-47138,0,0,369ba885249d116944123196cae129411c42f0b22f6f3c3522b8986012220655,2024-03-25T13:47:14.087000
CVE-2021-47139,0,0,de83caa653af7178da07f2a3c5173a0bf65613e5c38be7b826b01426fab32857,2024-03-25T13:47:14.087000
CVE-2021-47140,0,1,fe57c6c043e7d515b11a5e7453ca26ddde1972c09667ff6e66deb46cbbec98d8,2024-11-07T17:35:01.563000
CVE-2021-47140,0,0,fe57c6c043e7d515b11a5e7453ca26ddde1972c09667ff6e66deb46cbbec98d8,2024-11-07T17:35:01.563000
CVE-2021-47141,0,0,34b9de1dd52d95084eb006bbeb3b4cdfb559f7af87ba5efbcc7e459ffa3a7170,2024-03-25T13:47:14.087000
CVE-2021-47142,0,0,abf2bde1c8fc83b2094a290f31ccfb17ebe7997d07f93c5ea7fdd58fe5153e36,2024-03-25T13:47:14.087000
CVE-2021-47143,0,0,37b3b8d3155f64eb272889fbc77228cdffb19e343cd5a977b4d7922edb475b80,2024-03-25T13:47:14.087000
@ -187189,7 +187189,7 @@ CVE-2021-47253,0,0,15a20d99b36651a2af39b79e9f678e9bca291038032c585214e6f0cead262
CVE-2021-47254,0,0,740436ce4a2ce3c91e7625384c9d6535478fcfd96c6c8aae38ec9c16a52e55d3,2024-05-21T16:54:26.047000
CVE-2021-47255,0,0,51a162063608c507c07f097229fd828ef1bb753987033cd717bd7d85a2715fe4,2024-05-21T16:54:26.047000
CVE-2021-47256,0,0,7ace10b2135e214da774c1435fb91511c28f0b6aae33b002de7b0149ddd0472a,2024-05-21T16:54:26.047000
CVE-2021-47257,0,1,d0555db1b0645b8c18acf95172001c69ce596f3dd1cecb138026417b2d18c751,2024-11-07T17:35:01.883000
CVE-2021-47257,0,0,d0555db1b0645b8c18acf95172001c69ce596f3dd1cecb138026417b2d18c751,2024-11-07T17:35:01.883000
CVE-2021-47258,0,0,43e5d4398baa884888a6821f1cc44ebd315950a1d75455b3aa6a2b21fe961373,2024-05-21T16:54:26.047000
CVE-2021-47259,0,0,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000
CVE-2021-47260,0,0,eed23e4375c3c68601f2520e12d8f67acb43a3edb9de2b59bea4672dc4d46a96,2024-05-21T16:54:26.047000
@ -187441,7 +187441,7 @@ CVE-2021-47505,0,0,3313f1ee40c74730db32008b5a9068771e07041f279510f78e6111e842697
CVE-2021-47506,0,0,fd29a06711845ec649d8ef0a6c8cb0bee0c3c59b4ba7c4db4cafdfe2487f7f10,2024-05-24T18:09:20.027000
CVE-2021-47507,0,0,291f76395ae66887aac568d8cc45c564db489d66d6c95dfb28df76651f372c8a,2024-05-24T18:09:20.027000
CVE-2021-47508,0,0,d5c4490cf8b2bfd12f3d81fa77c73abd0db20eb41ca5f92ab5aaa6e8c70c725e,2024-05-24T18:09:20.027000
CVE-2021-47509,0,1,76ffd0d0931444f7f2f0c04c630f4cdfc2a718f65a3b266b3a053b81dfe3432b,2024-11-07T18:35:02.967000
CVE-2021-47509,0,0,76ffd0d0931444f7f2f0c04c630f4cdfc2a718f65a3b266b3a053b81dfe3432b,2024-11-07T18:35:02.967000
CVE-2021-47510,0,0,270627eb232d447cc08f70aff04a5d0568e3059f6c21c73ef6a95c2a2ed08a4c,2024-05-24T18:09:20.027000
CVE-2021-47511,0,0,e3d90ab6114d070019d1ef5ff8c0b7af502cde3377475c2be408cd65bff17061,2024-11-04T21:35:01.830000
CVE-2021-47512,0,0,b14ad06ad68acf2737e5e42986db1751275379351190fd9d4d1bd398eb0cd0c6,2024-05-24T18:09:20.027000
@ -187466,7 +187466,7 @@ CVE-2021-47530,0,0,220bb64c42de65e390f2bd2d3e162e4284b9abf659928b078f4985c8dbe7c
CVE-2021-47531,0,0,b8bee44a8e49b95add0489fa860584fc7aeb11bd276b6266410444ceab4425e5,2024-05-24T18:09:20.027000
CVE-2021-47532,0,0,eb70ddbdee3c495f8346d1dd9825d5167f4b39ea8db8a0be2b547c870331ca54,2024-05-24T18:09:20.027000
CVE-2021-47533,0,0,868d1256e6855a7e05acc382a85dae28ab41072d2b101bdb631670fb81ccff88,2024-05-24T18:09:20.027000
CVE-2021-47534,0,1,6c52ba917936ff78883cc7ff90a0bd2d7ece1e15ecd530c11da3b1d6b74863f4,2024-11-07T17:35:03.020000
CVE-2021-47534,0,0,6c52ba917936ff78883cc7ff90a0bd2d7ece1e15ecd530c11da3b1d6b74863f4,2024-11-07T17:35:03.020000
CVE-2021-47535,0,0,f9e30fcf94dad9cfd06140aed5236d65a2a635fba0e895a19cf6130446b80d67,2024-05-24T18:09:20.027000
CVE-2021-47536,0,0,a360faee07164645434064e3473571de768bb8e50b01ec848cd6ddc9799fc0ca,2024-05-24T18:09:20.027000
CVE-2021-47537,0,0,86966e911d2738f8b2a69e220dbf87c64ebff3f3588243cae82ab8fc561cc878,2024-06-10T18:35:41.393000
@ -187515,7 +187515,7 @@ CVE-2021-47579,0,0,214fa59c33ed22b9398868c401e997995a9f0f8c8cbab8497c48f31736b10
CVE-2021-47580,0,0,9203b9569f1af3364c196ec8be7ea8cd3d74fe51d6ff896c43aa2e1a1a0d8aa6,2024-11-05T15:35:02.187000
CVE-2021-47581,0,0,8787010fa1b837c9433128d0d20bbbc5cc367d055ada39f1bbe864fed14da829,2024-06-20T09:15:11.057000
CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af77d,2024-06-20T12:43:25.663000
CVE-2021-47583,0,1,c5ad835aee47b95f02903b0b317ea04ceb81d1a4eedf818baa3f67b776d2d943,2024-11-07T17:41:01.250000
CVE-2021-47583,0,0,c5ad835aee47b95f02903b0b317ea04ceb81d1a4eedf818baa3f67b776d2d943,2024-11-07T17:41:01.250000
CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000
CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000
CVE-2021-47586,0,0,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000
@ -212628,21 +212628,21 @@ CVE-2022-48981,0,0,edbe50226f61eeb3964ee5f01c48ece48013ec7f030ccd46e06c058038ce5
CVE-2022-48982,0,0,58fbd0b9b2a1580dc158a88315d6703348749f40d4fc009911acc30aa732771b,2024-10-25T18:12:52.270000
CVE-2022-48983,0,0,dfa67a553ef1fa3c57f719e3548ad9b975bf5a0f74df240dd01055c881443dcd,2024-10-25T15:58:02.297000
CVE-2022-48984,0,0,e51fd7e8de77f3a8cf163611cb2f09fc6b7014335c2a9168caf96cf9450b0b0f,2024-10-25T15:53:53.890000
CVE-2022-48985,0,0,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000
CVE-2022-48985,0,1,f81a51dca08fe852bc14a27c90e44c2549fe2db76bf28aeac738417720fd6282,2024-11-07T19:35:06.407000
CVE-2022-48986,0,0,bf309f218709bc1203043fc9bd44982e8a6b8c350decfcafd0244201d031592c,2024-11-01T15:30:13.770000
CVE-2022-48987,0,0,dbcc27dc54efd2e0e773447e3199d54fb3f7908b158b00da7f57caf8bbfa103c,2024-11-01T15:27:26.880000
CVE-2022-48988,0,0,f27d8912475eb280a5b8231812f3ea2ca682597fc372ffb5583678b978512d79,2024-11-01T15:20:42.073000
CVE-2022-48989,0,0,12f08708869bbe9ec063b7392e0e15042d70e2feeae860945b26c11deb45e931,2024-10-25T16:02:05.787000
CVE-2022-4899,0,0,64070b82b08d57aace9b84f3711bc30a23fda3b7a68f2b187d0af07aa5382f53,2023-11-07T03:59:16.090000
CVE-2022-48990,0,0,f3f5f9ba37039dd5bdebda25bf3b72aaf6156992a282b1be1c6dde6507784974,2024-10-25T16:03:41.527000
CVE-2022-48991,0,0,6a7cb21a3ac184136cd0ab4a861f7301f05b1785725a9d2367d58cd519d1b08f,2024-10-23T15:13:25.583000
CVE-2022-48991,0,1,ba48b571ef71c44fa65d6e4fadbc5164a3528e63c673999cfb7d0b20587886d3,2024-11-07T19:36:33.167000
CVE-2022-48992,0,0,8f56e9ce177d276837e828e603f41b46405afcc8129dce28e104445db61b74c5,2024-10-25T15:51:38.037000
CVE-2022-48993,0,0,ef216d3e2a04a71a8d804734065ba340ce4d331bb10df8d692bb266c02e77712,2024-10-23T09:15:02.593000
CVE-2022-48994,0,0,7168b3eef8618696017a54b6db12bd665ef2f549638a765dbcd8dc2f1b1f7cdf,2024-11-07T13:52:43.380000
CVE-2022-48995,0,0,6d50aef3372db06b6d495aa3016571870681b9327c2409bc5336d097bc2fa483,2024-10-25T15:52:51.117000
CVE-2022-48996,0,0,0f669c5d177a55ab1de24ef7aebf7206e81a91803f760e8aa9a6146660e8c4e1,2024-10-23T15:13:25.583000
CVE-2022-48997,0,1,bc1d73729c066d8ec26ae3f0abb2ea40c8547098f0626961bdd642a44b638d57,2024-11-07T17:07:08.743000
CVE-2022-48998,0,1,3da65aef022ad9ceb620c4628781cb335fc813fa391925ed2a453cab90cfa213,2024-11-07T17:08:38.677000
CVE-2022-48996,0,1,105f2eae6637f8b84d22634b975e98742160c1f671ea99e6a4f8ce19463768b9,2024-11-07T19:37:27.663000
CVE-2022-48997,0,0,bc1d73729c066d8ec26ae3f0abb2ea40c8547098f0626961bdd642a44b638d57,2024-11-07T17:07:08.743000
CVE-2022-48998,0,0,3da65aef022ad9ceb620c4628781cb335fc813fa391925ed2a453cab90cfa213,2024-11-07T17:08:38.677000
CVE-2022-48999,0,0,ade5189407bcb1c53b709efa68b58bb4a61ffa43108c0637b7c0e393d125b80c,2024-10-31T14:44:10.857000
CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075c4,2023-11-30T22:15:07.600000
CVE-2022-49000,0,0,3315f81ffe886dd8a0d6755db95204b8e967d8d84fc20d98b4981297144d3f94,2024-10-31T14:56:17.890000
@ -216675,7 +216675,7 @@ CVE-2023-2229,0,0,4acc8758df4767319dc415a0c9c749e0cb0cb7edab230bb785ec4ce4401379
CVE-2023-22290,0,0,7008f26d14d391173c321d16193462f5514a00eab13ac6ad5f485769a5a3db26,2023-11-17T04:02:30.557000
CVE-2023-22291,0,0,f309f6e17c36aa84390955841dd393c62fca34dee558496c62358f024e68c4d2,2023-04-19T15:17:43.323000
CVE-2023-22292,0,0,7f87904f363b8a798ccb431a063e173ac450356aa59ec58e716466c216f457ce,2023-11-17T04:04:36.607000
CVE-2023-22293,0,0,4f031c8e5db675d12fbded0dedcf27eacee7edad5d27e9b399124350c459fbc6,2024-02-14T15:02:01.453000
CVE-2023-22293,0,1,9481ef7c88a117d0582cafeb12e07610852ab603e66b41f4c5c7af1a5d45e258,2024-11-07T20:27:21.893000
CVE-2023-22294,0,0,d7f32d77e7b6c9189a00cd77e38abcc5620031cbf5e645c6446daf48d6616dce,2023-04-27T19:19:30.353000
CVE-2023-22295,0,0,c2e06aad2cb7708d06944452addecf331f3b5610b9385c5a2c18b4e953c94d13,2023-05-02T01:16:32.677000
CVE-2023-22296,0,0,abe675b1547f9ffce1c7529e112999ba0340267cf9c333011130af4573bdd0a6,2023-01-24T20:15:55.097000
@ -221341,7 +221341,7 @@ CVE-2023-28142,0,0,5348d765bbe00552f4b21547eb51331c1961a74e60dddf51d61eea1387e13
CVE-2023-28143,0,0,2930f4b3d1bbeb13bc36a13a085a1ddfe693ee73e55c43efb28ccefdb766d85d,2023-04-28T00:42:51.857000
CVE-2023-28144,0,0,b49d26291a340c49284192a67f5e0647690fc7789846391ecc87683ebe8ecc82,2023-03-20T19:42:14.197000
CVE-2023-28147,0,0,47d7c693d87c0910f05ddbf3504df8d78da2c6e0b3aa172621acd7ad4075afe5,2023-06-09T18:49:06.737000
CVE-2023-28149,0,1,2c58375d982f41ab39405f8011406f9bbb71c522b83683f49831193cd0e532c6,2024-11-07T17:35:03.810000
CVE-2023-28149,0,0,2c58375d982f41ab39405f8011406f9bbb71c522b83683f49831193cd0e532c6,2024-11-07T17:35:03.810000
CVE-2023-2815,0,0,76d4fb095d100c8b17284725ff901d4cf7fcf13b14aca4d157d2670594f54653,2024-05-17T02:23:17.093000
CVE-2023-28150,0,0,850fc3edb9208c5c3fc18f5aab1f201ee1dd54ebe2f647d8b39dc9133fad1181,2023-03-30T15:44:05.453000
CVE-2023-28151,0,0,f5d1d693289a3ec8b086cdb9c9f5e9b84f5907327ee865cb6dfe9a0e20e0dad9,2023-03-30T16:51:00.080000
@ -228384,7 +228384,7 @@ CVE-2023-37450,0,0,55d0dcaf5b1cfef89c9fb177875d7328be1b1ea34879626cb24d837fb34fe
CVE-2023-37453,0,0,7b7cfbd45145f4b9800dffb91d55fc21a45e55a7734a8344e32bd591dbbb4d92,2024-03-25T01:15:54.597000
CVE-2023-37454,0,0,f514985ae14e2ad15d19fbfcf165d49e6d02220137b9ecab2467d3f2e91b0e6f,2024-03-25T01:15:54.703000
CVE-2023-37455,0,0,d8bb4e863d2dac2cd1dc667a32d986f56a7da2538ff1986410afb3c6c7043d52,2023-07-20T19:16:40.667000
CVE-2023-37456,0,1,32fc2c4f612d9cabb3f02b370af33ec6b887facc67cb9632bd82d8dbeda1e6c2,2024-11-07T17:35:04.577000
CVE-2023-37456,0,0,32fc2c4f612d9cabb3f02b370af33ec6b887facc67cb9632bd82d8dbeda1e6c2,2024-11-07T17:35:04.577000
CVE-2023-37457,0,0,26e89b32694eb04fd91e9119e5f9581fb736aeabbaeba42e206071d48a3f899a,2023-12-29T00:15:49.697000
CVE-2023-37459,0,0,9fc94c4c14d8f510cad14a402672feb55c4c2606105926cc8c387db7578e1e2d,2023-09-19T15:14:43.653000
CVE-2023-3746,0,0,cdf44adc48424d7b6e74c4c232f9332e0c1c5a851f78b5b5b2f5977eadfcfc5b,2023-11-07T04:19:27.737000
@ -230335,7 +230335,7 @@ CVE-2023-39929,0,0,9ee055206e5132be81815049aebeff6d468d3e81abaeb697797813c03df4a
CVE-2023-3993,0,0,6a4502fc730b10244b2a5f12fef2d075a1d38a2dac53ba48d1dcf3cdcda08ad9,2024-10-03T07:15:17.247000
CVE-2023-39930,0,0,d750d5de68ec1cde9c7f725fc00c339d92094ec5ff393b14c4e64987eda9f87a,2023-10-31T18:10:51.270000
CVE-2023-39932,0,0,12634c5c9ef0cff268f86e10b0c67410af36a28d1b513a74ce59753107a369e3,2024-10-24T19:04:48.510000
CVE-2023-39933,0,1,7ffad2f32f0eb6d37c53bb393c4b3509ea3d8f3819e78801993f0ddc592c930f,2024-11-07T17:35:05.493000
CVE-2023-39933,0,0,7ffad2f32f0eb6d37c53bb393c4b3509ea3d8f3819e78801993f0ddc592c930f,2024-11-07T17:35:05.493000
CVE-2023-39935,0,0,e7273cf6b42db016c2234872a9e6b2af9325c39c0fbeec800f945c24cae29ab6,2023-09-11T13:41:11.193000
CVE-2023-39936,0,0,c91849e55c7a55e36d3d0035f9880ed7b3b78132a705018d93999265c90b8b67,2023-11-06T18:13:06.433000
CVE-2023-39938,0,0,b7f60caca70de06cad432a98ecc140601aca695ee4a3c25c4662905e139bf0e3,2023-09-08T18:45:56.717000
@ -230740,7 +230740,7 @@ CVE-2023-40384,0,0,6e2bdeabde09abcbae7a411369b78571c28f713b0209b813ab8847535e9de
CVE-2023-40385,0,0,71b21b093cd801a5f08ed97055575ce1ddb52323e2ff094483384011f365bfb8,2024-01-18T14:32:30.730000
CVE-2023-40386,0,0,d8e7b4e912c0c8aab5a6300eee39ae1aa74a7fad325560fd2a38cafa409d665f,2023-10-12T01:59:56.563000
CVE-2023-40388,0,0,edeed7ce7eab447d09d415d2aedd3b6d27b8921e5d3360c3f2bbc1dbd50c3f1c,2023-10-12T01:59:05.793000
CVE-2023-40389,0,1,516bf53699db11855d673e6a03c9e5f20604515862ccaa485dd2ec89b7df9697,2024-11-07T17:35:06.653000
CVE-2023-40389,0,0,516bf53699db11855d673e6a03c9e5f20604515862ccaa485dd2ec89b7df9697,2024-11-07T17:35:06.653000
CVE-2023-4039,0,0,3918b86d67120df6e72f2815bfe54c657854c7400634e5431e5bb075d0ffe234,2024-08-02T08:15:14.993000
CVE-2023-40390,0,0,c1b3eb0e01b46bd6926f4c567dc2643d4c9c232d8f9a83ab8373932e194386ed,2024-04-08T22:42:58.650000
CVE-2023-40391,0,0,6adc4a6dc803b29c119c5d511b4b9d89961e74825b585c298fbeeddf94e2e77f,2023-11-07T04:20:12.943000
@ -233993,7 +233993,7 @@ CVE-2023-4508,0,0,0fe236581f06c738c5efa0544aa88d5a3d169bdd092a576b4e6f40ede95fa9
CVE-2023-45083,0,0,d57cb35c2a851ae6493d4ea047a38989b17473d5f242a57232d10f192d93787b,2023-12-12T16:40:40.463000
CVE-2023-45084,0,0,6c5c2655e466f41deb2916053b4f12e226b2d64a442bef2f9ce083cd1698207b,2023-12-12T16:41:49.943000
CVE-2023-45085,0,0,660e8a54dccc921a3df36b39a4e95cc045b46c3f4f0df1cbce56622b3152f9fa,2023-12-12T16:14:09.460000
CVE-2023-4509,0,1,c5167fa67c5aae654af6b2d3a26c14bb5bb509034e04425bd61bddc5359c8a9c,2024-11-07T17:35:07.090000
CVE-2023-4509,0,0,c5167fa67c5aae654af6b2d3a26c14bb5bb509034e04425bd61bddc5359c8a9c,2024-11-07T17:35:07.090000
CVE-2023-45102,0,0,9ab095356f1278c84ec36424ed84f297e020c620cdb4def562524b4802fcc200,2023-10-16T12:57:20.570000
CVE-2023-45103,0,0,8a7e442d2790c242d546278bfd51fdf5a76d9697e197cb3a317a9c4eb5f2c580,2023-10-16T12:57:31.997000
CVE-2023-45105,0,0,280d31f1865a33913adbae72bca9da32d247cd929467a46118441ce8ed0e3a7f,2024-02-03T01:40:06.433000
@ -239173,7 +239173,7 @@ CVE-2023-52458,0,0,1d62f5151a9e3e1b02f5955d8180968c6111058cfe66f8bfb5e191d59b7fd
CVE-2023-52459,0,0,350ab48aa5487f2fa8284fafbf84f571c733c91ca8bbe04060c4bef0fc22caf6,2024-04-19T18:49:47.087000
CVE-2023-5246,0,0,892718b6dd4e4e1e580b4dd5fe666c7b8e248e4cb28e3ed3abb5a82ba43a4ac5,2023-10-31T11:58:05.363000
CVE-2023-52460,0,0,f0b3aea0787c182a9ee54815bd19382edfcb9e393afa52da74e2cccb3b83505c,2024-04-30T19:16:12.493000
CVE-2023-52461,0,1,323a71ed1188d50a5d0d40a3c47aaeeb0042ba5c9393a67eddcb6398f7d2e2ed,2024-11-07T18:35:05.377000
CVE-2023-52461,0,0,323a71ed1188d50a5d0d40a3c47aaeeb0042ba5c9393a67eddcb6398f7d2e2ed,2024-11-07T18:35:05.377000
CVE-2023-52462,0,0,3393234fe42a5e40ff82930b695cee44a402e194d56b1a14a5639a436fe167df,2024-11-05T16:35:05.700000
CVE-2023-52463,0,0,cec5f08f685cd22a0b71d8bfd960de1d18c06434ce6c90320d223eb0193559e9,2024-11-04T13:16:31.973000
CVE-2023-52464,0,0,4f70de0b3c01b33846f3994a8b137822a3ac7d6f4d2a034223209b62d308d9d3,2024-11-04T13:16:32.113000
@ -239321,7 +239321,7 @@ CVE-2023-52593,0,0,4971af1988857bfb9d720789cae0bbd688972f5c1659e83a3de6e41f82ca3
CVE-2023-52594,0,0,cd5fafa3acf5a73bc2c5da67e5f138f33f09847afb1eedcf43714b7feed3d702,2024-11-04T13:16:39.747000
CVE-2023-52595,0,0,13e93ed97d3f3b4855bb19db1cc30a20a5e0f190644e0f4268502cd331b7c623,2024-11-04T13:16:39.820000
CVE-2023-52596,0,0,5a64d4ada9d0d6224e7ecf43acaef0301552bdb93d2742b159972c15f29214c2,2024-03-06T15:18:08.093000
CVE-2023-52597,0,1,f27a53324d79acc94fc97cf5464ac65b7b0b4845d5cc6d0e35458b2035d246ee,2024-11-07T18:35:05.660000
CVE-2023-52597,0,0,f27a53324d79acc94fc97cf5464ac65b7b0b4845d5cc6d0e35458b2035d246ee,2024-11-07T18:35:05.660000
CVE-2023-52598,0,0,bbff85f6da88960238e28c6f0a121efc0c4a66ccf1ba1c1067a97f6e8d7037fc,2024-11-04T13:16:40.033000
CVE-2023-52599,0,0,d55446618a9898e606b15663834a5e93b1f33b0e8f71ed5cccd2ccba73a05358,2024-11-04T13:16:40.127000
CVE-2023-5260,0,0,eea990ee194786c0ea758019a51c9ffc454af1aecc04aa0aed3120bf95b39b00,2024-05-17T02:32:55.730000
@ -239410,7 +239410,7 @@ CVE-2023-52674,0,0,ce150f13ccfdd2751ba311b6ccc675129b4733aa7c50e21eadaf6d146542d
CVE-2023-52675,0,0,c7dcda3181eab7779ae082601fb0dd24e57baf11775d050f6c2f4c314674a571,2024-11-04T13:16:45.927000
CVE-2023-52676,0,0,3fd4a26f33611ada4236d58e802d8cafaaab5a7b370555c1d95dc11fafffefaf,2024-05-17T18:35:35.070000
CVE-2023-52677,0,0,9064b7ec03e5b5f99707d91bdec6284d399d2a792becfa1593b75a80dfba9fff,2024-05-17T18:35:35.070000
CVE-2023-52678,0,1,8fe2c82ee5f304933a99dfa015a9aef0323550678b7ad56b62d7cb58319f4163,2024-11-07T18:35:05.900000
CVE-2023-52678,0,0,8fe2c82ee5f304933a99dfa015a9aef0323550678b7ad56b62d7cb58319f4163,2024-11-07T18:35:05.900000
CVE-2023-52679,0,0,2e080a8db468a9cd2f28486802ea969364aa0b175264d1785ebc13fbd5564a58,2024-11-04T13:16:46.243000
CVE-2023-5268,0,0,cd8049b2c704c7ba114cc98aa8ef2a51e93320fada4a9f70ae44450e575e1d3c,2024-06-04T19:18:09.923000
CVE-2023-52680,0,0,e82e4387cefcb72f3626231c08d733fbbeee0a4339500eacb2170dc4151a1299,2024-05-17T18:35:35.070000
@ -239438,7 +239438,7 @@ CVE-2023-5270,0,0,59c77e6c24afd41eaace6ecdd84167c5c2319574ba08c67842b725e799e4b2
CVE-2023-52700,0,0,8cf5738642ff8e2160a8350f4c43f6b287a2fbef0bb1a641ab748ad2417301f5,2024-11-06T15:35:07.743000
CVE-2023-52701,0,0,677100564637bdf0af06f27033c00966698848f746d9ec1a45da915d615f9d0e,2024-05-21T16:53:56.550000
CVE-2023-52702,0,0,b2e8f62250efb7d825a81d0942184d9e9d88d741263380f5b5947ac07366415b,2024-05-21T16:53:56.550000
CVE-2023-52703,0,1,a847684cd5916c6c7c1816a44cbe83243fb86212ca42b13ac5a1c9ba25677856,2024-11-07T17:35:08.690000
CVE-2023-52703,0,0,a847684cd5916c6c7c1816a44cbe83243fb86212ca42b13ac5a1c9ba25677856,2024-11-07T17:35:08.690000
CVE-2023-52704,0,0,9a1e560d3f3d9d43bfcff569880a48160a561d854512da83fb51353297122af4,2024-10-31T20:35:02.910000
CVE-2023-52705,0,0,e0e7e3d50f6a0ba6a1fa2b6f11b4a84fb685696b90642bf7cc71cd16ca5855b0,2024-05-21T16:53:56.550000
CVE-2023-52706,0,0,8b37f3ec912d4dd819fdbc4c9acfa204e7a0af66839e63b9ecf7fb3314fc2625,2024-05-21T16:53:56.550000
@ -239675,7 +239675,7 @@ CVE-2023-52917,0,0,e7e17c5c7f3534e727632e5d0f203ae6b740f17b02a99e6ffa625b25ee582
CVE-2023-52918,0,0,21564d3b5227bff513646c579d7bdd7f1583e549e4c51e98581a4d9efd156cd6,2024-10-24T03:55:26.737000
CVE-2023-52919,0,0,a37d9d88a926a49efde8ee5228e861273658f480dcdcfcb710741f8df16c3c09,2024-10-24T03:53:16.377000
CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000
CVE-2023-52920,0,0,19c52e500a550fd0a50601f22f5ff0299868a2f6850cb32643ec62c880fc1415,2024-11-05T16:04:26.053000
CVE-2023-52920,0,1,9cb91c05199de061b3421002d69a7ce229465da018594255a34833b7b80e22b1,2024-11-07T19:31:31.217000
CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000
CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000
CVE-2023-52946,0,0,43d8c575418a7f78a11e9526af607aac1baa72cf0563b1f4b331156f6ceab810,2024-10-08T15:55:07.543000
@ -241164,7 +241164,7 @@ CVE-2023-6931,0,0,11b522d2f1afe0ea009771d7d0e900f4280baf4086f0f93b2775c0f0cfeac8
CVE-2023-6932,0,0,9843f566e1c44316ff787a959461ab243ed33ecd086b36b87d3d19a204109ad0,2024-02-08T16:15:47.590000
CVE-2023-6933,0,0,a24af010c48c374a02cf4406ffddd60443e941be8e212c484b4abfa50686949a,2024-02-14T21:30:51.970000
CVE-2023-6934,0,0,4f37a8285bf8de2518809b1880c503569a73399caaf5045d5339519cc870ea3d,2024-01-18T17:01:12.533000
CVE-2023-6935,0,0,cc2d976c8a6d4416b6864dcf6ef0b4bb5fea01851bae8baf305a0a39631e3228,2024-02-11T22:29:15.837000
CVE-2023-6935,0,1,71c69fce12d2291c5c2e0d9bd003fb185b16acc0dea948bf1a48c91a13f84e95,2024-11-07T20:41:30.957000
CVE-2023-6936,0,0,590fc22ffb9c3602f742d605f761b9ec1260c13092f9625c188e201d3cc6a984,2024-02-22T19:07:37.840000
CVE-2023-6937,0,0,22f77ef12276e70cc04f7cbd2ba242ce3bbae056f0467ac3fa7560d46f958490,2024-02-15T19:55:09.230000
CVE-2023-6938,0,0,11f80052b936c04b9e187c3b789917daa425ce7825b2d97a007c8789d5c880c3,2024-01-18T15:57:39.827000
@ -242400,7 +242400,7 @@ CVE-2024-10022,0,0,92e93478773b21ba9b2d43e5c324e5c622d589913a6faa7f64ee1349beb7c
CVE-2024-10023,0,0,fb7a2d87c1d01f1c0f753ee2a4448f391382353000e2526f44469dfe5432a49f,2024-10-21T13:14:37.300000
CVE-2024-10024,0,0,341fb3a51358c0d5f83894d8ffa34bc8830630ac4903510ed67f09db34646b2e,2024-10-21T13:15:01.730000
CVE-2024-10025,0,0,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000
CVE-2024-10027,0,1,139c643fb4aaade3608d78d7da95cd9c22034efc7a5061ec2fb8c3c17749c900,2024-11-07T17:35:09.033000
CVE-2024-10027,0,0,139c643fb4aaade3608d78d7da95cd9c22034efc7a5061ec2fb8c3c17749c900,2024-11-07T17:35:09.033000
CVE-2024-10028,0,0,3efb32d0ea3a8f3bb8e9563cfd9c2e219c2c04ec85bc2ed4f5f1bb43fa35dabb,2024-11-06T18:17:17.287000
CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000
CVE-2024-10033,0,0,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625cc1e,2024-10-30T18:50:04.137000
@ -242443,7 +242443,7 @@ CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4
CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000
CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000
CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000
CVE-2024-10114,0,1,16b8947ff2e570aff6db4fc1326409cd8691db8a310b773c04315751bc454909,2024-11-07T17:04:09.203000
CVE-2024-10114,0,0,16b8947ff2e570aff6db4fc1326409cd8691db8a310b773c04315751bc454909,2024-11-07T17:04:09.203000
CVE-2024-10115,0,0,2f48f8fc2fb64e7eea0f8a197e6ea039f4addb791184326175f5bf3196ca43c6,2024-10-18T19:15:13.600000
CVE-2024-10117,0,0,7266808fb250241ee6ed4b7bcd7ffe295a81bef2421c05c5f9197e6a33b75e8d,2024-10-28T13:58:09.230000
CVE-2024-10118,0,0,20c350d413130c355373caed8d6cb5911ff957b85489cebdf58c361a0299d81f,2024-10-18T12:52:33.507000
@ -242524,7 +242524,7 @@ CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4de
CVE-2024-10223,0,0,237ebcbe1a44551c4c262c272427d3817a64977114a9e921cdeb1f7ff3ea65fd,2024-11-01T12:57:03.417000
CVE-2024-10226,0,0,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000
CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000
CVE-2024-10228,0,1,d569133a271818bbabb06a409fc5b29be55f5994c84d2df5dcb22d53edb0464d,2024-11-07T17:12:45.750000
CVE-2024-10228,0,0,d569133a271818bbabb06a409fc5b29be55f5994c84d2df5dcb22d53edb0464d,2024-11-07T17:12:45.750000
CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
CVE-2024-10230,0,0,5b2eed7a3522d994daba36d504e121d06d38d6b2f8f6bed6dcdcf2e92eeba1bb,2024-10-31T08:35:03.010000
@ -242778,7 +242778,7 @@ CVE-2024-10700,0,0,31233b8d64f3c9c8e4fb3c67b64a1725548271e95821d774cfaec82689cc6
CVE-2024-10701,0,0,53baafb789e17d3adca0638e17c429a583b20f9faed929ac230c13977cad3370,2024-11-05T16:52:44.937000
CVE-2024-10702,0,0,1494650cf24141bf55e997b208eb307166b880baeab6c7ba81f17c35396d74f0,2024-11-05T16:52:11.193000
CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000
CVE-2024-10711,0,1,667b67eedaf55d76b13f0d67159b73016c214e768164f9d0df569a4659871c82,2024-11-07T17:04:37.663000
CVE-2024-10711,0,0,667b67eedaf55d76b13f0d67159b73016c214e768164f9d0df569a4659871c82,2024-11-07T17:04:37.663000
CVE-2024-10715,0,0,d2c9653d43a32692b03cb0b8a0db12fe1fd5c8614bad27310f2895b65d6f57f6,2024-11-06T18:17:17.287000
CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44f6,2024-02-13T19:44:28.620000
CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000
@ -242804,7 +242804,7 @@ CVE-2024-10747,0,0,bf56d8b7d455f19bb2d2cbf7ba2f56925af5db7d6565b739483e1eb3d1dfa
CVE-2024-10748,0,0,1fd02e454095772468edf9e35260c4a72a4ccfbe321c1c6d22cbb6e027ab5125,2024-11-06T15:06:52.077000
CVE-2024-10749,0,0,9f9574ebdf519eebbacaa573a7a97dc63bac824fa6612fdf73241d718df9d0ca,2024-11-06T15:04:49.497000
CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000
CVE-2024-10750,0,1,058aca20b2a7c71039b2138004886690bc8deec820a26951b99fd1d85edbef65,2024-11-07T17:09:50.387000
CVE-2024-10750,0,0,058aca20b2a7c71039b2138004886690bc8deec820a26951b99fd1d85edbef65,2024-11-07T17:09:50.387000
CVE-2024-10751,0,0,6a49a3c7ad1c6ffcd0b7bcc6cbfa59cfbe62d4c966994df1d83f9666683703f1,2024-11-06T17:34:57.597000
CVE-2024-10752,0,0,6cf2a6a9bc6560e825f8711fb6cd1013c57696598fd870914277d12e4f063991,2024-11-05T17:59:10.257000
CVE-2024-10753,0,0,e47cd45037a1a13b612a69ab32046368824f10d157868477a01b6618688067f5,2024-11-06T17:42:14.277000
@ -242826,7 +242826,7 @@ CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db5656
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000
CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000
CVE-2024-10805,0,1,30683214c49996b99622c593b0d2824b7195979c84652d13638c9eb82a2ea54d,2024-11-07T17:09:07.057000
CVE-2024-10805,0,0,30683214c49996b99622c593b0d2824b7195979c84652d13638c9eb82a2ea54d,2024-11-07T17:09:07.057000
CVE-2024-10806,0,0,e15ec6423ae1ad698fb4ad5b42c94e3a5d06fef4f5e8a29e70adae83dbef0510,2024-11-06T15:06:48.493000
CVE-2024-10807,0,0,783f0ac6c475ea7fcbd6f31f293edee7b9729e4af159ee9eb5bd3f13eec67953,2024-11-06T15:07:09.930000
CVE-2024-10808,0,0,dac986d7fa4c7c52dcde054490fe5f45d88b724de3dc68cd9eaa633ce97a4fdc,2024-11-06T15:14:13.607000
@ -242868,10 +242868,12 @@ CVE-2024-10947,0,0,9adb5268473ea3fea228f3f531eb38bf7afe18f43d752d8c6e606d0c94e4e
CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000
CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000
CVE-2024-10963,0,0,76d1c2de6ef8866c3cbedffe6e071f17d99fcdf70b71d05a2f4b5560dd9eb997,2024-11-07T16:15:17.150000
CVE-2024-10964,1,1,932022df45454192c27b27214f9ebfd2fc448c4c668edc98e31aee9ac4b57de8,2024-11-07T17:15:06.500000
CVE-2024-10965,1,1,3da145d300696d81efea92b8ad0251b15a208fff15d9136fbab253d97c46ef92,2024-11-07T17:15:06.890000
CVE-2024-10966,1,1,18b31358ef50050611f146262296d675ab5d947a27e7cb13657e86f0a1fce494,2024-11-07T18:15:16.033000
CVE-2024-10967,1,1,a21f192cff1f36d5650d6e547699388efb7cc3b31d31bd2d7ba30b250786caa9,2024-11-07T18:15:16.393000
CVE-2024-10964,0,0,932022df45454192c27b27214f9ebfd2fc448c4c668edc98e31aee9ac4b57de8,2024-11-07T17:15:06.500000
CVE-2024-10965,0,0,3da145d300696d81efea92b8ad0251b15a208fff15d9136fbab253d97c46ef92,2024-11-07T17:15:06.890000
CVE-2024-10966,0,0,18b31358ef50050611f146262296d675ab5d947a27e7cb13657e86f0a1fce494,2024-11-07T18:15:16.033000
CVE-2024-10967,0,0,a21f192cff1f36d5650d6e547699388efb7cc3b31d31bd2d7ba30b250786caa9,2024-11-07T18:15:16.393000
CVE-2024-10968,1,1,4db13284bb2668db27212f9b23fd23c8786091fe6a0c1d8a9d9c495d0c5875c5,2024-11-07T20:15:15.633000
CVE-2024-10969,1,1,f64a194bedc79492a1cc5931029c0d0397f9a3186d57d95808f266442abe04ea,2024-11-07T20:15:15.930000
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
CVE-2024-1099,0,0,60fc16226818d332b7b359f2f2234cb026357af6ad05031d156ab3f490bb4021,2024-05-17T02:35:14.133000
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
@ -243335,7 +243337,7 @@ CVE-2024-1585,0,0,2718021341e4b7abfb9522fdd2203542a0a24ba595903301224072ffeea08f
CVE-2024-1586,0,0,83b1a2525ff5f4122e8733b451cd8e49b02b04022b48f5f4a4413ee496d4410e,2024-02-29T13:49:29.390000
CVE-2024-1587,0,0,939b698a3215c9eab1d9c6dd29550e57b9a0e117a8128be9f82cfde8616ad7db,2024-04-10T13:24:00.070000
CVE-2024-1588,0,0,f194e68927f16a52800b0c29ee1517adc20fbd52d56ede198b55b3b308f5ee33,2024-04-08T18:48:40.217000
CVE-2024-1589,0,1,757ac1e8a57ad63a68805e329c5b1255ce70d49e0a3bdab132fd3b876402e987,2024-11-07T17:35:09.653000
CVE-2024-1589,0,0,757ac1e8a57ad63a68805e329c5b1255ce70d49e0a3bdab132fd3b876402e987,2024-11-07T17:35:09.653000
CVE-2024-1590,0,0,55065336af2b13e316c0eda4259c55fac0a262250fdcc9a72adf3dae3ffa9596,2024-02-23T16:14:43.447000
CVE-2024-1591,0,0,efcee58637202c634402b3dc0f73136fd386f9a84f9452ec8452f721c852b97a,2024-02-16T19:26:55.393000
CVE-2024-1592,0,0,bf3040aca3b13873ef06934ca7ebafaf738eaa760d501add1d524fe415ce0a24,2024-03-04T13:58:23.447000
@ -243764,7 +243766,7 @@ CVE-2024-20043,0,0,9d08b57823a7799fd71aabd74ae5b9e264651170e52f1494fb1aba445a2da
CVE-2024-20044,0,0,7b00cd01d330620de78c873c2b5a5d1db703e947cc4fd0c1c90748e651832421,2024-07-03T01:45:52.167000
CVE-2024-20045,0,0,474f87795caacdac62e2bb0672a22684b0d2c3ee03c744a052a1b929c228a9a0,2024-04-01T12:49:09.583000
CVE-2024-20046,0,0,2b2346806d601871102b47d1857114a53d4c008a1b72821d4c813d568163c45f,2024-07-03T01:45:53.103000
CVE-2024-20047,0,1,9e5a74b42096a0429aa2d1b10e40d80c18d61462905da14effc0684ae25994c2,2024-11-07T17:35:10.697000
CVE-2024-20047,0,0,9e5a74b42096a0429aa2d1b10e40d80c18d61462905da14effc0684ae25994c2,2024-11-07T17:35:10.697000
CVE-2024-20048,0,0,20f0a9f9a5cb818fc2b8e857bf930b064e9ba7c6112710d3c0a129a489a821eb,2024-07-03T01:45:54.020000
CVE-2024-20049,0,0,e07d96190b9fb659d93c083b6d4ed267ea2541dbf11f25ef34e322f46f361bc3,2024-04-01T12:49:00.877000
CVE-2024-2005,0,0,29cfa78c41bb5efa2e0f2373e627610aea0de98e344329360428bcff0cb9be4c,2024-04-03T17:15:55.773000
@ -244568,7 +244570,7 @@ CVE-2024-21032,0,0,0d33c1eff84586817e520c3b9020c61c4ac401149d8fda4b4a5999487687d
CVE-2024-21033,0,0,f104faebd2ee9f4c8e33491776e5f427a0dc20a28a4db67dad17225e8748169b,2024-04-17T12:48:31.863000
CVE-2024-21034,0,0,81ef3aefed05aeb330191c0efd7439af69b8cd2332a6223f129786b120f83ed4,2024-04-17T12:48:31.863000
CVE-2024-21035,0,0,83999dfc3873dc57b14f0f71041b45b6e28668800ae33b0d772aa09f643d5344,2024-04-17T12:48:31.863000
CVE-2024-21036,0,1,03772262febbe1802cb4e5be8d6e22eef6f08655ecf5ce6b4ff42f4682cb919e,2024-11-07T17:35:12.117000
CVE-2024-21036,0,0,03772262febbe1802cb4e5be8d6e22eef6f08655ecf5ce6b4ff42f4682cb919e,2024-11-07T17:35:12.117000
CVE-2024-21037,0,0,33050a6276f922cfcedac97b78c12fdbc7f45b309b0174964155153f73d5219d,2024-04-17T12:48:31.863000
CVE-2024-21038,0,0,bfdd0e7e4013735185b099df381c36ba9c4b9fe7698d8ce6190978f3af67da26,2024-04-17T12:48:31.863000
CVE-2024-21039,0,0,5533a80506dc2a9584f3f0a1cb6213d349fbac4fc9f3be60fa10f69e60d73724,2024-04-17T12:48:31.863000
@ -245209,7 +245211,7 @@ CVE-2024-21735,0,0,64afeafd3ca5ebe95ef19b8cb0b1a221cb3831f7e736f22e7bca2463c0261
CVE-2024-21736,0,0,54442fb9b042c5f4e212c801d8862949178fa83601b4c5ba313c1abbb63c3c64,2024-09-28T23:15:12.587000
CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000
CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000
CVE-2024-21739,0,1,bcd84af74cedfe2a05503c2b2710e8639a52c7793d32380a556dd216c0e5f217,2024-11-07T17:35:13.150000
CVE-2024-21739,0,0,bcd84af74cedfe2a05503c2b2710e8639a52c7793d32380a556dd216c0e5f217,2024-11-07T17:35:13.150000
CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000
CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000
CVE-2024-21741,0,0,276c90d557a1ddbd7ef0f820219f4441d781301bc74a468f8ee48dc1b2e4d8b9,2024-10-25T18:35:03.493000
@ -245918,7 +245920,7 @@ CVE-2024-22714,0,0,a9e8e25ef22da74b6de4ad04262ddb714bc83c7539ac3ba25c2f4f5074b70
CVE-2024-22715,0,0,b4a745df0ad0b8ec34d469bcc0776699e2d75171257c5217f0f753481edb107f,2024-01-24T20:13:00.880000
CVE-2024-22717,0,0,ca261a195338eae13cf040fced9dcd4c7f6388ad3c49be3f2e5ac8b4d2ac8c4b,2024-04-12T12:43:57.400000
CVE-2024-22718,0,0,fdbc5618325a454d8b333a1e48c28cf1aecdc2c23be645f7cd092c43b90b9ed7,2024-04-12T12:43:57.400000
CVE-2024-22719,0,1,83a68735925631248610a829cf1fad56584a2b44d3b80b260536c3c972d1bc32,2024-11-07T17:35:13.377000
CVE-2024-22719,0,0,83a68735925631248610a829cf1fad56584a2b44d3b80b260536c3c972d1bc32,2024-11-07T17:35:13.377000
CVE-2024-2272,0,0,bc7fc0edef953b8e6907a8afb1963293ca16cc15ca659728d50442893cc6726e,2024-05-17T02:38:08.237000
CVE-2024-22720,0,0,9b189ed7ed41dddb5c89809962586573f4f56f2a5e75240cf2e0c1b185b206be,2024-01-30T20:51:16.247000
CVE-2024-22721,0,0,599536e6bd03ad42ae83138e0bdfa882c8390700e254105fa71cba40ba36ebcd,2024-11-04T15:35:27.650000
@ -246062,7 +246064,7 @@ CVE-2024-2308,0,0,5bb2112645629721229497ec215ea65583df40f8b60e0deeb65bb784d4510e
CVE-2024-23080,0,0,f45adee4e0e22336e2755adc7f0e4c8ad553b3c9ddbfd250b5b847f6bae20f98,2024-08-27T15:35:06.003000
CVE-2024-23081,0,0,870c1c4df2360c6a0bcdcbbc7e7323672b70deea175c507823f8849ab5657624,2024-08-01T23:15:40.290000
CVE-2024-23082,0,0,7f8e37bde125a04a1eaaf3decfef35e1714f1ae930ca7f44a95252121f38b18b,2024-08-01T23:15:40.357000
CVE-2024-23083,0,0,713a3a31bf1b16621652d130f79628db8361d2685688b49ccf5933491f8dd58c,2024-08-01T23:15:40.430000
CVE-2024-23083,0,1,c385591381e0265c87771e5a69f1a29225a8934a8b2931bc5e68330c9fa6e8c7,2024-11-07T20:35:06.223000
CVE-2024-23084,0,0,ccaed5be16fc1a52374972400141acaca3aa08f2280ed991e42060e59b806c64,2024-08-20T15:35:02.813000
CVE-2024-23085,0,0,c2d4a833e275adaea75d4721a85180117d94ed467e962dd33323527ca073d13c,2024-08-01T23:15:40.570000
CVE-2024-23086,0,0,ad7053a9e7227763ba60dedee1159efdd725fc24c063d4d4a5575e493c06184b,2024-10-28T14:35:07.917000
@ -246335,7 +246337,7 @@ CVE-2024-23373,0,0,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa
CVE-2024-23374,0,0,f4c6d02700b6a8420aafee41d5598362caa782be31e75b6b5a2be4f35376a456,2024-10-16T20:26:47.983000
CVE-2024-23375,0,0,6c40f68c93a67061204173a720ea1a7d00eaefa497b28279e14abbb274c64d60,2024-10-16T20:26:01.167000
CVE-2024-23376,0,0,53f5fbcb9e7022eaed6b3b110c6c4a497cb456faf848338c012c4a394e4a25a1,2024-10-16T20:07:45.260000
CVE-2024-23377,0,0,c3e4833903ad95d45a0469d4c22fd5cc0841672de66b1257aafc9b065e02c3ac,2024-11-04T18:50:05.607000
CVE-2024-23377,0,1,400c2daf7cdb3f003ada2544e9e7be539d847558878843d4967c981498b91eb0,2024-11-07T19:59:06.997000
CVE-2024-23378,0,0,cb12f7c9d19ce7e2f02f7f248035e9b955e6980ec80efbda1175620e9584e886,2024-10-16T20:00:29.503000
CVE-2024-23379,0,0,d83d42193b183369769000f98e3afdec4ada9e1be3c04ea1a4b9166a0e8b650f,2024-10-16T19:58:40.227000
CVE-2024-2338,0,0,97ed9304e53653e5f2f6be84ec656ed42a5ae14786266fb81f31dd764d99c05c,2024-03-08T21:19:43.127000
@ -246344,8 +246346,8 @@ CVE-2024-23381,0,0,c05f9cee58e223ab89c0d0d7ff884408a74aec6ab8924761148e9dbc59968
CVE-2024-23382,0,0,ff24d6020e14bb69f781982e2cd1ca969bdc34877498b5f427eb6708619a0e83,2024-08-06T16:30:24.547000
CVE-2024-23383,0,0,a47dc771e576435c08fbf1cb6343f6cdccefbb6dc18c0aec3a268a581496d75f,2024-08-06T16:30:24.547000
CVE-2024-23384,0,0,af1a2c186017dbfb51721f232ecb63b5ddf276ff15ce1bbe6f03cf143cb8fb6c,2024-08-06T16:30:24.547000
CVE-2024-23385,0,0,1f5bb106cd97ab1ac033c9191c514307f12907c8dfae5ce4b77d7260477f3310,2024-11-04T18:50:05.607000
CVE-2024-23386,0,0,926827ad8dc70c1b893f2c93658b56e57a60f148b9a66ffe113f1eea7140ec55,2024-11-04T18:50:05.607000
CVE-2024-23385,0,1,68fa7445af97eb09c72e43bbd9ef340d5dca3d94ef0ad4f1c2901f0d7f9f6d88,2024-11-07T20:05:24.023000
CVE-2024-23386,0,1,363f2fc05803a9c56cf7ff9095a3caf80adad124433c86abb8e05ee0d9927bb2,2024-11-07T19:54:23.047000
CVE-2024-23387,0,0,a7f1916ac284cf0c8474af6b9f638254f5287c7c53a3c81d95bafc7f75d51a82,2024-01-25T02:00:29.210000
CVE-2024-23388,0,0,752c714a44aeac9cd8289b285e00a882944a95b977a7bc2b41dab87372ead843,2024-02-05T15:18:21.920000
CVE-2024-2339,0,0,f035f933b58c40751abb3c3284c6f139c7da6609ba017eef7b1ce8ff891fae95,2024-03-08T21:19:43.127000
@ -246881,7 +246883,7 @@ CVE-2024-24092,0,0,85255eb7350c088041b14db17806ac0275bf0f870c5dc0846dac7ef708da6
CVE-2024-24093,0,0,fb5ed7dd5447f2f3646a43ede6e27e58ea7347516d0a38f6974af6473303761c,2024-10-31T20:35:03.523000
CVE-2024-24095,0,0,2300da440fe56bc28fa2804706eae59dc7c13f0a8c63fddcdf29667e8551c83e,2024-11-05T18:35:04.977000
CVE-2024-24096,0,0,4e9bc66f9f7d1a742616702da02cdfec0f741d469b33ce36a139d26ce7be33a3,2024-11-05T20:35:20.500000
CVE-2024-24097,0,1,0f286f93ab4099581c2d7eda1bde779bd95c815a2f5002407ca5d3b3c9a7ea7b,2024-11-07T17:35:14.230000
CVE-2024-24097,0,0,0f286f93ab4099581c2d7eda1bde779bd95c815a2f5002407ca5d3b3c9a7ea7b,2024-11-07T17:35:14.230000
CVE-2024-24098,0,0,e685e688e8d421091dd6b9de1a2931d14c9c45e1d20db0290f58fd035af8ce09,2024-08-08T21:35:04.617000
CVE-2024-24099,0,0,2e6058e206f484b5ee334550654c9eed8abf43909439a7cc59000b45bd0a67a0,2024-11-07T00:35:00.657000
CVE-2024-2410,0,0,83127872af9993e0cf76f9668e41f5f9f61d019a9eb5dfde8649175f2ae3af10,2024-05-03T14:17:53.690000
@ -247219,7 +247221,7 @@ CVE-2024-24782,0,0,60399add06054ccd1ab208ac080e2f01c807564104bf0e677cb581da58b84
CVE-2024-24783,0,0,8d59145357d82e9723af448a8854307e93168cb94ffcd181c4388ef46771b9a6,2024-11-05T17:35:08.987000
CVE-2024-24784,0,0,c62f93b4c44015650b5ab232879230f801aee4f052aeb35f61a1e509443e2faa,2024-08-05T21:35:04.457000
CVE-2024-24785,0,0,ed4b40570d55c22332f8ae251f400ebe696def65e3ed727a4487c1851f76d8f1,2024-05-01T17:15:29.610000
CVE-2024-24786,0,1,a51995a9cb89754df0be431fbd2be12b14c2b2e68b44df7937a1c8ae82e1d044,2024-11-07T17:35:15.080000
CVE-2024-24786,0,0,a51995a9cb89754df0be431fbd2be12b14c2b2e68b44df7937a1c8ae82e1d044,2024-11-07T17:35:15.080000
CVE-2024-24787,0,0,d01b1be209abf6a135a8c9ff38f241150f7e8624b3b2cb4fb60d5dab3691270a,2024-07-03T01:48:25.213000
CVE-2024-24788,0,0,50cca427c738d8b849be7f4d8278b66e2ec62c8bbcec404a7069521daaae7bf3,2024-06-14T13:15:50.670000
CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000
@ -247391,7 +247393,7 @@ CVE-2024-24959,0,0,2eb5fa195474ca0ac238a9f207ce9a8f05af1f00c7008405b477047c2902a
CVE-2024-2496,0,0,bb1cebfba09528215a394bae7bcafe4c925a59faed2039af0c5cbd0a5b3dd7e8,2024-09-14T00:15:17.597000
CVE-2024-24962,0,0,5e0d36c7c71f11ca3af9943c62b71ff43252950c3277e6803f25039b7cce73b0,2024-06-10T17:16:21.383000
CVE-2024-24963,0,0,5d6e1af856b22054c356418d49796e2363906ed1aaaf2259e78ef057612da72a,2024-06-10T17:16:21.503000
CVE-2024-24964,0,1,881bcf075e24af20c4adb29f5bd1a91599b44d68e1c21e601b281196dea9e21c,2024-11-07T17:35:15.343000
CVE-2024-24964,0,0,881bcf075e24af20c4adb29f5bd1a91599b44d68e1c21e601b281196dea9e21c,2024-11-07T17:35:15.343000
CVE-2024-24966,0,0,596d9f70ed531a9ce913b647600f9cfc649827cf292b66c3b67d74e0809d7525,2024-02-14T18:04:45.380000
CVE-2024-24968,0,0,f4e9d15961007f0f7d091231be2ec2d12f69561d90ac37fc804bdf9e090ef9c8,2024-09-16T18:03:16.707000
CVE-2024-2497,0,0,0abba4a60a0501980b979aaaf4b97236170cb15ea02aea63aa677f7cf3690b8f,2024-05-17T02:38:15.830000
@ -247523,7 +247525,7 @@ CVE-2024-2514,0,0,956e72a82145af5df3731620e2db9c4a0fa06ee5f96614ef673f99b0f16dc3
CVE-2024-25140,0,0,02a3bba96efcbad73ad6520b616dcfe50317ca878d5df8798f56ac79d62fc648,2024-08-29T20:36:15.900000
CVE-2024-25141,0,0,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
CVE-2024-25142,0,0,19d4bb5bd9d9370afd571c0a6d80ffe65e65cfd553d5b4ccef4ef771df0d1e04,2024-06-17T12:42:04.623000
CVE-2024-25143,0,0,31d25cf0fb6ca436405cd759cee1d69276c6aefe963bad6366e8c8192c1421e9,2024-10-02T16:15:09.833000
CVE-2024-25143,0,1,18572973b7ac399904fd3307708b3d67736a8e18bf5f0168b3e52b3de378ebbe,2024-11-07T20:55:49.697000
CVE-2024-25144,0,0,e105222f7a750ee8fa3f0de9d118bf1e3ac02f5c85afcbf968453073cccaf090,2024-10-02T16:15:09.950000
CVE-2024-25145,0,0,019019fbbbd35f7bb94f83f848a86247a2567342a1d429cff7e78b25bbb4c980,2024-02-15T15:10:35.503000
CVE-2024-25146,0,0,2df270f52850547876c3822e2ea04ebd4280017868acba4a2703de60feb94949,2024-02-15T04:37:12.337000
@ -248585,7 +248587,7 @@ CVE-2024-26658,0,0,d0abea21644259a2a84fe5233b7987b3fe23c1ee9064590ae02175ab7850b
CVE-2024-26659,0,0,f14d6611e043dbfa82957de0620487d0288f5142381088625a705e2ce96cd2b7,2024-11-05T10:15:38.667000
CVE-2024-2666,0,0,e2cf8a19de1b9913333cbdeda1b911f602befa5aacf4a74d8768fe1fef08e825,2024-04-10T13:23:38.787000
CVE-2024-26660,0,0,07427c0432049d8ef31d08748ffe4395e92966b708b235d963b72a02c7cc00b1,2024-04-02T12:50:42.233000
CVE-2024-26661,0,0,cc86415b98a0b276c5aca876a5fd5f9af927eebf9e9a1a08f3976e2d38c9edb1,2024-04-02T12:50:42.233000
CVE-2024-26661,0,1,e7872a2881d5718da7516cbde2a7c1589ac376dea2047951a3dc8386920e4645,2024-11-07T20:35:08.330000
CVE-2024-26662,0,0,4690da5f07bb4f5e40786063116ee764b660c850faf8c8d2effbea2f2fef65cd,2024-11-01T20:35:08.353000
CVE-2024-26663,0,0,bd833b424aaf0562dc5953d59630450a51a6e89c200d02d72e85966df2a94f8b,2024-11-05T10:15:39.053000
CVE-2024-26664,0,0,1d717a40854f08ff433a6d4fbbc6c61ff1ddd16151936e8caf67390b70b29144,2024-11-05T10:15:39.163000
@ -248597,7 +248599,7 @@ CVE-2024-26669,0,0,a6fd5b0b0b3d84e69818d552f2361b002d90e9c67b18c3d40b35bce20ef44
CVE-2024-2667,0,0,bc9377d5ebeb2326a84627afa21f74869702a4481d5a1bc676e52d0fa1ff73f4,2024-05-02T18:00:37.360000
CVE-2024-26670,0,0,fa06230f79e9f7d2f8feee6b34bc199f5df7a1e2fe10f83e9f4071495038e83f,2024-04-02T12:50:42.233000
CVE-2024-26671,0,0,3fc5c32a08ccdacdf18317ad47fa0919a89111fb0485f964f6bde9fca71bc601,2024-11-05T10:15:39.883000
CVE-2024-26672,0,1,94eba864d22484a6a43eb8aa00aa42456d29cb5f932dc20cca4f7ddf31874bf7,2024-11-07T18:35:07.243000
CVE-2024-26672,0,0,94eba864d22484a6a43eb8aa00aa42456d29cb5f932dc20cca4f7ddf31874bf7,2024-11-07T18:35:07.243000
CVE-2024-26673,0,0,26775e3a15ac21b250966ab24ef9c9f13769a663dc07160f980a0d8669bcc75e,2024-11-05T10:15:40.050000
CVE-2024-26674,0,0,4be158c6e63891d4ad98b4910b1d19e6f80df040d2109d93390daee94f3ba05b,2024-04-02T12:50:42.233000
CVE-2024-26675,0,0,91612b5d13d38e48f5fc25e271a7314b32d78aa55e6597a346fc58f42065bdf3,2024-11-05T10:15:40.220000
@ -248702,7 +248704,7 @@ CVE-2024-26764,0,0,78430a65a09c7d3ada3f03311cf635dfee8dc446b67f56b341ca087c5093c
CVE-2024-26765,0,0,68722d76e57e5cd70f2f2241021d2e214008aad7514467064e690f4d4788fd20,2024-04-03T17:24:18.150000
CVE-2024-26766,0,0,f2d986948c3d4976316f6a31aebb294c51eb6c84b4e36042963e5d45fd6d0c3c,2024-11-05T10:15:48.097000
CVE-2024-26767,0,0,43a3f59d0eb979f798ca944ad0dd34fbf3fb382da52c269bda0e634877e201dc,2024-04-03T17:24:18.150000
CVE-2024-26768,0,0,1c76123f213dbab57a303277c81b5c1bc6882cbd6bf080be2febb3e644922a85,2024-04-03T17:24:18.150000
CVE-2024-26768,0,1,e84564546fdaa2a60b50318f0071e20cbe4a4f6d34c7c708818c388e08faa4a5,2024-11-07T20:35:09.233000
CVE-2024-26769,0,0,8a47a8112ec6fe0a36fe163c9d84952d4be1f685f8918e32e2eef91de1068d07,2024-11-01T16:35:13.773000
CVE-2024-2677,0,0,92fcfadd96aee27e43ae980abbe595be6a5439df4ef33d0997ccbd9ad3da7727,2024-05-17T02:38:24.630000
CVE-2024-26770,0,0,08ad6ec3165a725c6fa9a73be3ec6efd68b7706e058189cf1fbbb55cb8bb79a2,2024-04-03T17:24:18.150000
@ -248721,7 +248723,7 @@ CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2
CVE-2024-26782,0,0,c90a7c58c94a9b45b0f8e04b15d6d2d434e3bf04efa6042ff683848b5963467a,2024-11-05T10:15:49.490000
CVE-2024-26783,0,0,2af6ae94e0862d9e4c8fd1dd01e9d9533df487005b3632bcc9e5cde226324207,2024-04-04T12:48:41.700000
CVE-2024-26784,0,0,3a3f9b64e77aea2ce61d08fe6ae8aad422b3d40e30ce83138a1e05ab32d7f913,2024-04-04T12:48:41.700000
CVE-2024-26785,0,0,492d91066ad796fd42a81d8353bd8f9a1d6609491204ab2e4afcd38caad744f6,2024-10-10T12:15:03.027000
CVE-2024-26785,0,1,607e3fb628b0c99c297c4939ac0cb171a41da98b5eeccede77863ac332daf2b9,2024-11-07T19:35:06.440000
CVE-2024-26786,0,0,f0d42ff714fdbdea6cad40254a7441c39ad23ba1d0f464ffbc3844c541dc2469,2024-11-04T17:35:11.680000
CVE-2024-26787,0,0,196ec7430c411fe5c64462ca4a83845d3042d61336246cceb5f88ee256246d6d,2024-11-05T10:15:49.867000
CVE-2024-26788,0,0,9601fe1cbc757f477c86a61d19b404811c1889f8688ebaae435bdfd34f696947,2024-11-05T10:15:49.950000
@ -248731,7 +248733,7 @@ CVE-2024-26790,0,0,87440b941220ec3fe4301d6d71b6b3fe43fc63929a2ee44e421aff6dd31c2
CVE-2024-26791,0,0,66f7fe8db3d9f4d44c9048310211634f073b10ddb1dc42f0793085bcd8efd63f,2024-11-05T10:15:50.240000
CVE-2024-26792,0,0,e502200937968709c0c1c366e33ec6f2b70ec2074228d897f98e6441e19f7ee3,2024-04-04T14:15:09.783000
CVE-2024-26793,0,0,33220f188dbb4d619fe89e3a49a62b610ebeb2975ab7d8d8227301aa377a7e4e,2024-11-05T10:15:50.500000
CVE-2024-26794,0,0,fcc6dfd7822134b198da3d6ddac7dfc3182f661946c2ecaa378d8c74b430dc8c,2024-04-04T14:15:09.843000
CVE-2024-26794,0,1,72a0a2881ef7269e7fcf840870e899a44de7deb0cf4135a98ca119ea76302312,2024-11-07T20:35:10.190000
CVE-2024-26795,0,0,7d0a54ff0c5efa2f3d7215e2ddc4f6ecd0e6f69b941ec6879cc5b6af2ff7157a,2024-11-05T10:15:50.683000
CVE-2024-26796,0,0,3affdc98728e9ff3dc84c971aaca313eb013d4ca7109a6ece2879e019bf8e643,2024-04-04T12:48:22.650000
CVE-2024-26797,0,0,4b45cf99e833a07d36f553262c37b3e65b5a8447b2973f4a7792233c43765b6a,2024-08-01T13:48:13.443000
@ -248849,7 +248851,7 @@ CVE-2024-26898,0,0,20c229e8fd5adc607451615a6453a1249fd9f1be9fe07f3bbfdfef94e1f0d
CVE-2024-26899,0,0,1f11bdf1b25a0796c85b132e8320f1f7314f487487b47bfe06c522484011aa5d,2024-04-29T19:34:10.080000
CVE-2024-2690,0,0,8a0e6598609cfaf718bb2c9d66fffc866911f408139789f9b9a729c1ed28fd12,2024-05-17T02:38:25.710000
CVE-2024-26900,0,0,52342ee5f5a4ea1be7899f35ccbb2f2f7bc74b4ca13579edf97517bddfc7a4ee,2024-11-05T10:16:00.753000
CVE-2024-26901,0,0,d7bd1bf1e943219678bc1b80bf18dfb7e33ca730fa8e9370f20fb2796ec97bc7,2024-11-05T10:16:01.027000
CVE-2024-26901,0,1,8fcc396814ad47d4cd59aa433cb40c7bb818e97dacd0578914d5c0c7a2b7b8b8,2024-11-07T19:35:09.747000
CVE-2024-26902,0,0,403873851c7a77c4d64db8c4cfe6f949278cfad5955974b2e8c40aba88e60bd6,2024-04-29T19:40:05.897000
CVE-2024-26903,0,0,8d78cb34b6b13848987aaf4779cfd5ef23b795a775305fc4b052a25ad089971f,2024-11-05T10:16:01.510000
CVE-2024-26904,0,0,465375d12896d369ba32f0f5a9c1b1a82fd461e229bd66d68713d6d3b21eb08e,2024-05-21T07:15:08.260000
@ -248947,7 +248949,7 @@ CVE-2024-26987,0,0,641ff74115948d87ad54c4bf8be7c5c4796ed88aa9f8833f1b6409659dadd
CVE-2024-26988,0,0,dd649c49ad83022d07b46397970cb27971111a0497343b1b882fc560af8a53f9,2024-11-05T10:16:14.400000
CVE-2024-26989,0,0,dbc179ff0ba7169674e0e088409f526c30b24f4d08de3dda1821049ed54f28f7,2024-05-13T08:15:11.017000
CVE-2024-26990,0,0,9b9558e43e20b1e28e693fba8f5f27330fefe2730d26184929c933061c05bf0c,2024-05-13T08:15:11.083000
CVE-2024-26991,0,1,81ad54ba966fe764c87fb4f2dcb9dc0359ceec1dc6716e26617fca4c1c17ce67,2024-11-07T18:35:07.613000
CVE-2024-26991,0,0,81ad54ba966fe764c87fb4f2dcb9dc0359ceec1dc6716e26617fca4c1c17ce67,2024-11-07T18:35:07.613000
CVE-2024-26992,0,0,bc997639d6a66fb5cfcdd14535f30d9f82ab75003f826aec82dcbbc4fae8a036,2024-05-13T08:15:11.193000
CVE-2024-26993,0,0,8f1bbd2975c5e0f999efff9ac0b76e3a3d5afeb16067beba70b8ebd45f8c4e01,2024-11-05T10:16:14.807000
CVE-2024-26994,0,0,8c1928377ef62ec71fe1ebbf16b684a5684b1e1ca47f3fac289479dc04714fb7,2024-11-05T10:16:14.997000
@ -248996,11 +248998,11 @@ CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784e
CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000
CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000
CVE-2024-27036,0,0,ec763184980ab8c8db94616c84ea7671c7f1e662314f390df792c3ccb4fa5ddc,2024-05-01T19:50:25.633000
CVE-2024-27037,0,1,3f6971a33dca818139a27aee8495a94559da61eadab1b552d006829faf68ee4a,2024-11-07T18:35:07.887000
CVE-2024-27037,0,0,3f6971a33dca818139a27aee8495a94559da61eadab1b552d006829faf68ee4a,2024-11-07T18:35:07.887000
CVE-2024-27038,0,0,9878ea09c7d26edaec27ffb36455390953899fceaf1f12bd124bb3565e0a7379,2024-11-05T10:16:22.883000
CVE-2024-27039,0,0,473802bd82adeba8f1c0a67644df7d9a045a00c8568f291191028b5f2909fca1,2024-05-01T19:50:25.633000
CVE-2024-2704,0,0,7ecfea8520a2d9684b98d947682479275e2134935ad6198e1ad34620d22ef79c,2024-05-17T02:38:25.980000
CVE-2024-27040,0,1,b049bfc1fc2f371a7a5422f032035b27c1c4e1fc4bb1ff05cae30b0e1205149f,2024-11-07T17:35:15.913000
CVE-2024-27040,0,0,b049bfc1fc2f371a7a5422f032035b27c1c4e1fc4bb1ff05cae30b0e1205149f,2024-11-07T17:35:15.913000
CVE-2024-27041,0,0,a1302c65e1bdad41a2efa558a8f48ede79e9fb3a3cd39d52e0e0f70940e157d8,2024-11-01T16:35:14.873000
CVE-2024-27042,0,0,4b248649e696522f4b7b7d3ac059cc45f6910cdb9afa4b5eac8f3ab88c6b6f73,2024-05-01T19:50:25.633000
CVE-2024-27043,0,0,94927b29276c311fbd0062e2231f6e5772de31e8e075abc3d06089c3f21ebc3f,2024-11-05T10:16:23.613000
@ -249362,7 +249364,7 @@ CVE-2024-27399,0,0,99d9510b637361dde4a735c6783496f5b872927f33529f36ec6d87018b5bc
CVE-2024-2740,0,0,7545651108e8514acefb2b72311b601ee7dbdf24da5bdaec2774b5ead308107f,2024-04-11T12:47:44.137000
CVE-2024-27400,0,0,069e4b8cc0d3bf02e960ba37e8375912ae86e06a0fac9563b07518abcdfda328,2024-11-05T10:16:30.580000
CVE-2024-27401,0,0,2108c2b3a82de1479b02dc9b17616e30292e65e80cf2f1f1f2b452be65587c17,2024-11-05T10:16:30.683000
CVE-2024-27402,0,1,cc257f03a76cd84a1e1a42929225a77ea2f23199b25673d89accfbc7ffaa25c2,2024-11-07T17:35:16.163000
CVE-2024-27402,0,0,cc257f03a76cd84a1e1a42929225a77ea2f23199b25673d89accfbc7ffaa25c2,2024-11-07T17:35:16.163000
CVE-2024-27403,0,0,77516c98c275da09db72e7dd3607718c599d77c5ae52b899e362d6ef3ef66c25,2024-05-17T18:35:35.070000
CVE-2024-27404,0,0,ba04286ff96a9fe413f3bbda5a3172056d212e25a7b2b3000ae5efbb44bffa07,2024-05-17T18:35:35.070000
CVE-2024-27405,0,0,ac0279402299f2f71e1977cc36213a1a6da4fd4c8519dcf9db2d4f91548db71f,2024-11-05T10:16:31.310000
@ -249914,7 +249916,7 @@ CVE-2024-28157,0,0,e8195ee7f7e668974cf7d8246dbfcc0b5132119f0f5390c3a7b5d268b5722
CVE-2024-28158,0,0,e11a9678e4f2f0242962248a4f5f96e3f4098382c9b4895b78df62a6d496f942,2024-05-01T18:15:17.063000
CVE-2024-28159,0,0,4a9f4f91b8aea86a42bde029558a44ab2b24f6212168e8c6c34372a6626e7248,2024-08-27T20:35:21.767000
CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000
CVE-2024-28160,0,1,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000
CVE-2024-28160,0,0,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000
CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000
CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000
CVE-2024-28163,0,0,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000
@ -250622,7 +250624,7 @@ CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1b
CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000
CVE-2024-29213,0,0,923c285048ea8e8ada1ec8fc14c3379597d106a93dc5f7c0191835b40c0543ad,2024-10-21T18:35:11.263000
CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40afd,2024-05-28T12:39:42.673000
CVE-2024-29216,0,1,6a2805ccd7ce1a7fea431294a783ec9a8c9268bdf031499912aff6e671c3b62a,2024-11-07T17:35:17.440000
CVE-2024-29216,0,0,6a2805ccd7ce1a7fea431294a783ec9a8c9268bdf031499912aff6e671c3b62a,2024-11-07T17:35:17.440000
CVE-2024-29217,0,0,1379e154758970ea220e13f9d29020765e0cdb03091ce67a8deaa8fc55306947,2024-07-03T01:52:20.987000
CVE-2024-29218,0,0,fd28018e0a318ff53d2f889814439c11c22ec14421c2666f247a4001d467468b,2024-09-25T04:15:04.083000
CVE-2024-29219,0,0,e97981c98215900c3d254f2e28d0930b309637e1c27a9ebc7e3a0c0fc074e98a,2024-09-25T04:15:04.217000
@ -250648,7 +250650,7 @@ CVE-2024-2924,0,0,92694fa46a3453529c704b3aac4610c3f64fe56024ea8960edc6b1dbef6415
CVE-2024-29240,0,0,621b26d2dda00d1621b3bab3316516bc59177ae5d25559b527a36682d30dbf87,2024-03-28T12:42:56.150000
CVE-2024-29241,0,0,f0861a07c44b8912371f272bcf4c1503ed9147d95b095578a5d9b429acc0e691,2024-03-28T12:42:56.150000
CVE-2024-29243,0,0,03ec9bb493566015f908bfaebf75ec5d5aedfc39bbc77e2ee770fb19383b2b2e,2024-08-02T20:35:27.473000
CVE-2024-29244,0,1,6f9d4ad1dcff98f3f7a7ac895b902de63ddc35cc88e50e21194e2aac23e0c2ef,2024-11-07T18:35:08.167000
CVE-2024-29244,0,0,6f9d4ad1dcff98f3f7a7ac895b902de63ddc35cc88e50e21194e2aac23e0c2ef,2024-11-07T18:35:08.167000
CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b70,2024-04-02T12:50:42.233000
CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000
CVE-2024-29269,0,0,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000
@ -252842,7 +252844,7 @@ CVE-2024-32405,0,0,bc9991f960c5c51d23d0756dabed902418fdca4bc0036a9a8f03079b2256a
CVE-2024-32406,0,0,73ac1f19b303163472b3c975415e4f499599d5740977837d587aebd96ab50699,2024-07-03T01:56:32.550000
CVE-2024-32407,0,0,1df6d28e3ee9d38677711ef2283005c5e1de5158402682dbc25b6fec25c334a2,2024-10-25T20:35:08.740000
CVE-2024-32409,0,0,6ab92e40fc5e6ae8f6002eb3cc0277e6ffae2eb1ca20e07c184697681f83d11f,2024-08-01T13:51:32.040000
CVE-2024-3241,0,1,cbf15a0004f7c0d7f837f8fcf20e649601ab56008c09b2db32f3289e2473191e,2024-11-07T17:35:20.647000
CVE-2024-3241,0,0,cbf15a0004f7c0d7f837f8fcf20e649601ab56008c09b2db32f3289e2473191e,2024-11-07T17:35:20.647000
CVE-2024-32418,0,0,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000
CVE-2024-3242,0,0,0753c592a4141511b7b3f4c81254cd267743cc6b5e9ea8c66b642642aec73f3f,2024-07-19T16:24:02.483000
CVE-2024-32428,0,0,e92a586d0042e2a50a8472dedb0e8a402fc021118b6e178b0be2f35b18ed1a72,2024-04-15T13:15:31.997000
@ -253441,11 +253443,11 @@ CVE-2024-33025,0,0,b2224958808cef69179c29751ac5699dda8398fa1ca6d6be644feb0949d64
CVE-2024-33026,0,0,298d33f6a8bfb6f36fcf1be4fa982f6af985ae195af9a3a0c45ae097558f81f9,2024-08-06T16:30:24.547000
CVE-2024-33027,0,0,cc2e5aea91d0b51c006f2b36474a376cee8428cecc94d1a162b764842c335f3c,2024-08-06T16:30:24.547000
CVE-2024-33028,0,0,9632bd9093b259716a8b9578d714120e37db12b0d16b9cf18505d5f86f8aeb5e,2024-08-06T16:30:24.547000
CVE-2024-33029,0,0,70c2e343ba148f13ed11376116209ab84d1710635b4c1c97363fef474712e62b,2024-11-04T18:50:05.607000
CVE-2024-33030,0,0,8b58689698c4a3e507a90b69666f459bcec9ee75e9ccdf551395d704be91e56c,2024-11-04T18:50:05.607000
CVE-2024-33031,0,0,5f62d621d51befde20ba7b911726eca7a4eb2a07c2cb8f65c875eb73379fa78d,2024-11-04T18:50:05.607000
CVE-2024-33032,0,0,63242e7f018d21d9f71a363b6ade6f06646e4f13dc1093ae9290fad9e15a8f23,2024-11-04T18:50:05.607000
CVE-2024-33033,0,0,7df657d4c4289fb6f347187638edbe10a37c5398cf3a670ce1c3ea784cdae4d6,2024-11-04T18:50:05.607000
CVE-2024-33029,0,1,62f4abf9d5534812dcbd495946ad70608b570bfbd1504fa70c29b97162ab7cc8,2024-11-07T19:54:49.197000
CVE-2024-33030,0,1,6786bcd5f91e0222db6d4fee0ca52594e1eddb6ea4d24b69732bcfb924d01779,2024-11-07T20:04:32.803000
CVE-2024-33031,0,1,2c6043e95fe57fcb75fcdc9e0de7b6eea7069d7adcef487c3c372f038ded1501,2024-11-07T20:02:31.203000
CVE-2024-33032,0,1,98ee54090123171615e158b27044fae77331db53953631f8b90c74c1f7493104,2024-11-07T19:59:54.363000
CVE-2024-33033,0,1,4ecde980d061a097abb6c1ea846d9ab81a0ba801acd0bcdb214e87c679daef4c,2024-11-07T19:39:24.863000
CVE-2024-33034,0,0,54ed6e7d2fd983f237005bb3e1f82ed940ac2231de49deea5f0abbc3e6097779,2024-08-06T16:30:24.547000
CVE-2024-33035,0,0,a2cbf1ac3ca408060419991a03b24932660c70b02e16b8809b1fde0e9b502e88,2024-09-03T12:59:02.453000
CVE-2024-33038,0,0,d174e8cb32f352bb37d4cf42fb06ed39c66af4e6d398e5501824f9508319fcd5,2024-09-04T17:21:28.943000
@ -253466,7 +253468,7 @@ CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b7
CVE-2024-33064,0,0,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000
CVE-2024-33065,0,0,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000
CVE-2024-33066,0,0,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000
CVE-2024-33068,0,0,b547540c6e6fff4ddb6c4b5ad1b6c00cd676f2da25e54d35e18fa3cb6df96772,2024-11-04T18:50:05.607000
CVE-2024-33068,0,1,f2315bb629cab5b7cc0a5f0ce7be555e8d4cd0a4a23bbaaa81acdf11b436ea32,2024-11-07T20:07:29.220000
CVE-2024-33069,0,0,43c56f0e9b4f42c73eddbe695dc23769c84225eafe9aba7ea54e0211778b7147,2024-10-16T19:48:32.207000
CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000
CVE-2024-33070,0,0,5c227e83ae052fa89b8d8522db931e95887b68320f2416daace5ac118cc217ce,2024-10-16T19:47:04.547000
@ -253677,7 +253679,7 @@ CVE-2024-3352,0,0,be8f28061e5ae4d9d9b2e6a11ede257adb292cc79dc8c4235b725fe02c0776
CVE-2024-33522,0,0,99fcc369cb1d7d030860e4a6a89738f8fddd8cc3ac74b8b631e1a59fe3215895,2024-04-30T13:11:16.690000
CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000
CVE-2024-33526,0,0,d9fbb2bf90f7562deb9562daceb1447ff20e85e1306478b1fbaa885f49f02b18,2024-08-01T13:52:03.173000
CVE-2024-33527,0,1,64802380ba213c8ed8d2b08a106aea9d62bbf83219355dec123798b3d9410a00,2024-11-07T17:35:18.427000
CVE-2024-33527,0,0,64802380ba213c8ed8d2b08a106aea9d62bbf83219355dec123798b3d9410a00,2024-11-07T17:35:18.427000
CVE-2024-33528,0,0,6d38b7704a361913efde540c7527f28cdaa52176f9b6f83eaffe6b959e019e75,2024-11-04T17:35:17
CVE-2024-33529,0,0,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000
CVE-2024-3353,0,0,ce0bc328455f80cf14b93a65517c4acf833c7c445bb8d7418f958bb30757f2de,2024-08-01T13:56:31.790000
@ -255321,7 +255323,7 @@ CVE-2024-35796,0,0,ae4abcb8ad9f6f490bd16b1eba9dc94eab40136dc368dbb51a897b6a16bd8
CVE-2024-35797,0,0,5d191573df70b8ecabb4b3e8db1feb40dcd5737961b1f2da8e55d32c7ff2e1b8,2024-05-17T18:35:35.070000
CVE-2024-35798,0,0,c6621222abaf060f395461638bd7c76ec0183db720d30b3003bc12d1b0276d22,2024-05-17T18:35:35.070000
CVE-2024-35799,0,0,2dce7d3c01c6b462983682ed86f45e0447833392232f61fcdb54d3cb67bf0d68,2024-07-03T02:02:11.170000
CVE-2024-3580,0,1,ac379b7c61198dcc5d9b9e5b61b78e72864de0a9836d2f6b5f591e1184a84d66,2024-11-07T17:35:21.603000
CVE-2024-3580,0,0,ac379b7c61198dcc5d9b9e5b61b78e72864de0a9836d2f6b5f591e1184a84d66,2024-11-07T17:35:21.603000
CVE-2024-35800,0,0,96f048270ee3bc1b00242a76d9f7a6a7780d1d96a7dabdc5b9d23feb66607ef0,2024-05-17T18:35:35.070000
CVE-2024-35801,0,0,7beb0f17bf3151694c1d4b5eedafd44e39c46da43f8694c5ee3a6a093af6baba,2024-07-03T02:02:12.050000
CVE-2024-35802,0,0,ea8171637c0586c34eac761166467f3c9d02a08ac1e48583ed6400ff75edaeb8,2024-05-28T19:15:10.597000
@ -255447,7 +255449,7 @@ CVE-2024-35912,0,0,92dbc5f452d437b2bb7e0b863d5fe5de44086813cb939b9d0e2bce4f50aa0
CVE-2024-35913,0,0,220fe9065c9da79496da8f0f47af2b430c89c4b49f3239195cac9a423cf69e98,2024-10-29T20:35:22.610000
CVE-2024-35914,0,0,807d953d8d08f072504c4c6ccc17ec8f3981a1368b6dba79340f71aba1e737b0,2024-05-20T13:00:04.957000
CVE-2024-35915,0,0,4fc6900a72bc11698ae47accc75ed7346c4824aacfc7fe42bcc384369a794b5a,2024-11-05T10:16:52.750000
CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a1ac,2024-05-20T13:00:04.957000
CVE-2024-35916,0,1,9bdfe759261f6f500036f4067d982b16331da29ec66ca5fe4fc12db519206b0a,2024-11-07T20:35:10.687000
CVE-2024-35917,0,0,ef28657905524f9b7f229abe3cf11569c21934c08ac9147215aa72d97ba1ce78,2024-05-20T13:00:04.957000
CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000
CVE-2024-35919,0,0,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000
@ -255573,9 +255575,9 @@ CVE-2024-36027,0,0,6d132f0070368ebb901ae863618800de97458f62f0891773fe0bfa7baa2b4
CVE-2024-36028,0,0,4c0f9c21a4cb39b02c5699fae69e59153086259d5fc7e554a3cb9456166e8dc4,2024-05-30T18:19:11.743000
CVE-2024-36029,0,0,d4bc2bfd69f01c287140f455c505f63fec62148b2be37c59c97499e2a9333398,2024-05-30T18:19:11.743000
CVE-2024-3603,0,0,a4a5150df5ff77dbc74904e3cf8d623cc8c580399dd7a85bc4a422fc782cc470,2024-08-07T12:51:50.770000
CVE-2024-36030,0,1,dfe33eb40ab6d3c86fe8e09f399080e55ff8c143ad17ae9d4367840213606f80,2024-11-07T18:35:09.050000
CVE-2024-36030,0,0,dfe33eb40ab6d3c86fe8e09f399080e55ff8c143ad17ae9d4367840213606f80,2024-11-07T18:35:09.050000
CVE-2024-36031,0,0,2975546e733dd5cf7c9429c6f90bb5d1e17451572ff45240b1c22396c4a132e4,2024-07-15T07:15:04.830000
CVE-2024-36032,0,1,47c1117c7e360bcf7ceed3aebfda780edc98eb4cde1f5e06909a62388503066e,2024-11-07T18:35:09.363000
CVE-2024-36032,0,0,47c1117c7e360bcf7ceed3aebfda780edc98eb4cde1f5e06909a62388503066e,2024-11-07T18:35:09.363000
CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d43a,2024-07-05T08:15:02.720000
CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000
CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000
@ -256115,7 +256117,7 @@ CVE-2024-36904,0,0,b7874a7b4ea2d9d677f677e7453db90fa0407b7e357176e1e80ffd60a5ed2
CVE-2024-36905,0,0,224631446681facae69ca36232411fb99870ee054fa4cd514b06f1774d29efc7,2024-11-05T10:17:11.673000
CVE-2024-36906,0,0,78d9234ba47f2ef5f02ca2f8dad06dc21e0279028241d5bb83d4c12efc181e4e,2024-05-30T18:18:58.870000
CVE-2024-36907,0,0,657d9b516f26fa4c515b56b9e196e7e20d67f35b65e83377846b140ea2a582f3,2024-05-30T18:18:58.870000
CVE-2024-36908,0,1,68be3ecc94e072c5abe97f0cd7cdad6c2d4f75d291d61d10692f74315c4dfb67,2024-11-07T17:35:19.317000
CVE-2024-36908,0,0,68be3ecc94e072c5abe97f0cd7cdad6c2d4f75d291d61d10692f74315c4dfb67,2024-11-07T17:35:19.317000
CVE-2024-36909,0,0,182762e23d79278cdf995fc9fc087675cc734d4f1b3cefa463efbb76f547cae1,2024-05-30T18:18:58.870000
CVE-2024-3691,0,0,f7b904a9d1876d4ae156bb04b35a04c465e35e9fae33b98330150773a9a4dbbc,2024-05-17T02:40:04.407000
CVE-2024-36910,0,0,40583cd9f13175a05952799ccb9247ee405dcba2dbb30942f6d83e17bf72952b,2024-07-03T02:03:48.127000
@ -256156,7 +256158,7 @@ CVE-2024-36943,0,0,e5c40aba1ed70134ee05bf192a02557b4cdd81058c30e2f573675623409cf
CVE-2024-36944,0,0,bd6e47c693844b0e04d972e184d47d9f3fa8cf6e333e8f95e03ac21e835f2086,2024-11-06T17:35:31.387000
CVE-2024-36945,0,0,9b5a728f2714238570cb854b4612a6756ba0089725c4553d6c9a0b0041554f67,2024-05-30T18:18:58.870000
CVE-2024-36946,0,0,6c4f663040dcdaac170c1bfaf39bd626cc294015218996b58e401d1bb85f9e0c,2024-11-05T10:17:16.490000
CVE-2024-36947,0,1,011d82d60ca34e038e0e0e518d23cf0d642615aa3eb6b8c72b76a7ac6b976608,2024-11-07T18:35:09.793000
CVE-2024-36947,0,0,011d82d60ca34e038e0e0e518d23cf0d642615aa3eb6b8c72b76a7ac6b976608,2024-11-07T18:35:09.793000
CVE-2024-36948,0,0,4620c670216cd562675061b7e7c7fb48f6ce471077a33e0fa196bc6c4e794e8d,2024-05-30T18:18:58.870000
CVE-2024-36949,0,0,37777281053a9c9d7bac67bab0a4a6835ac8d0e69bd436ab4ced90c2b58347e1,2024-05-30T18:18:58.870000
CVE-2024-3695,0,0,cd8583909d9224874fa5edd0e2b15c723aa0e29947c489c19d9e0c7d6c0bc0f1,2024-05-17T02:40:04.520000
@ -257305,20 +257307,20 @@ CVE-2024-38399,0,0,2b771b5ba490c62bc791d46a0084f1ef76097271953e34800c189edde8b5e
CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000
CVE-2024-38401,0,0,49e5f353e979551d81ba913b1959baf9c9c3b65372fddd5de7583edefa3b0302,2024-09-04T17:05:39.320000
CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41c81,2024-09-05T21:43:22.677000
CVE-2024-38403,0,0,8958dc3a4f5cdd79df6af4290ff070c00d33a2e9f2ac4533573ff2a008e3ab81,2024-11-04T18:50:05.607000
CVE-2024-38405,0,0,a505a4fd4be7afede4c2da1495f4422ab46c3c0d63d8c7bde8b6c1f39542a75a,2024-11-04T18:50:05.607000
CVE-2024-38406,0,0,1f1228db5aad2a69e9cb6a79ea695c633e1fff91ade5a48327f7c4a370e83d7b,2024-11-04T18:50:05.607000
CVE-2024-38407,0,0,c850df793301d63956ea2de95c1da7612354dfaf09d9aa5d87951a991bddc10b,2024-11-04T18:50:05.607000
CVE-2024-38403,0,1,b5c1199ea6a3cd51e1c218546bc236282f60c89253c2c4f0e86cc9406f1f1d46,2024-11-07T20:06:51.473000
CVE-2024-38405,0,1,88da8bb3ce2c5c4f9a86768b7df56a11fb2f34259a6f58e464822f6de32240f8,2024-11-07T20:06:14.907000
CVE-2024-38406,0,1,a74a4aa8cca4b492e1bcc1a6f8388cb3192e0174693034c1613a25d0789d9ace,2024-11-07T20:01:36.690000
CVE-2024-38407,0,1,54a3c11c58de13c443ec5d1b302a2677e20cee25885ee8f405d1d598f3637abc,2024-11-07T19:39:59.737000
CVE-2024-38408,0,0,a71bf42758bad0648f05b420ec4b22d43a2840f9e4a82ce92b42e9e5aad98757,2024-11-04T18:50:05.607000
CVE-2024-38409,0,0,1c5215f692c2bc0e6ae37b7b32421c66545eacf9ecc84b96bba23930fffdb7b8,2024-11-04T18:50:05.607000
CVE-2024-38409,0,1,f47f63bb393897c0dfc97c1d0678a11ae2128c169f46720e16ae4328b8c1f0ea,2024-11-07T19:40:46.783000
CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000
CVE-2024-38410,0,0,5cea5cfb4bc439ce832f92d9c6fd8fffb08294b97be59c2eeb49f06244a7b422,2024-11-04T18:50:05.607000
CVE-2024-38415,0,0,496a43169afbfbd87ce1e50594aead25e503d0a73f46766803db5f72848ec51d,2024-11-04T18:50:05.607000
CVE-2024-38419,0,0,f9c0d718f5c27040e1ac989a2728e9885b61af1af81b5baaa6098039685c0f74,2024-11-04T18:50:05.607000
CVE-2024-38421,0,0,aad14f85b88e77a4170da6d063782d327d4bbef7c623d2319afa5deee071a16d,2024-11-04T18:50:05.607000
CVE-2024-38422,0,0,e92abdff4637938f6aa11bc12bba25c477ccc43ca20d8cc02d2a1ebd434dd66d,2024-11-04T18:50:05.607000
CVE-2024-38423,0,0,3bf7fdaa66125afc30eccef1cbb9ef74bd13212938c90821434b074e17838e49,2024-11-04T18:50:05.607000
CVE-2024-38424,0,0,06340bbf66d2a6342f7a5ee8dbfa160e63170339b13f4014ebbb43ba3d347571,2024-11-04T18:50:05.607000
CVE-2024-38410,0,1,a3a388c8b60fc342c65b846c5841519162623905d30394895f5dd55c5398995d,2024-11-07T19:41:06.217000
CVE-2024-38415,0,1,6ea48aa0012fdea9115aff20f4073924fc8e49cf9fe0b3cfcd1ef407ded80608,2024-11-07T19:41:31.973000
CVE-2024-38419,0,1,7cce20faba96ec11231af281c754462a9b3890f8c7fc2576be3798fc9a96689d,2024-11-07T19:44:17.137000
CVE-2024-38421,0,1,192d03cc3543d349e47d8004acce48d0026efb927c105ffa7731ba1bedf8562d,2024-11-07T19:44:39.647000
CVE-2024-38422,0,1,3f4f39aa9a2f5598e6b9b360cf2c17060dce22e13f76913b47a914da876ec70f,2024-11-07T19:45:57.310000
CVE-2024-38423,0,1,3724edb064d41370be4416d8aae2ca6a83bfcf55083c40f09c496c0204c5a338,2024-11-07T19:46:41.697000
CVE-2024-38424,0,1,4e8d0ad8ea79adb14a923a79818b425f0ff2c084a94cb10a88d09fb0be3591d4,2024-11-07T19:51:32.117000
CVE-2024-38425,0,0,d6a49b1b2867bcbd4e1afebc1d8cce3ff52f15da8a3ae6e1386a8acb3cf0ae32,2024-10-16T17:34:41.633000
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
CVE-2024-38428,0,0,452d54ed820ff08b69aa9d520f4026807b45be623e70313c52b21d33bd87b5b0,2024-10-28T21:35:09.643000
@ -257427,13 +257429,13 @@ CVE-2024-38539,0,0,9488b6bbb3940f9ac1de867bde9fbcc881411ecb098ca77e384efe77519a1
CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000
CVE-2024-38540,0,0,e32a7f449ff8ae3014191cf278de61d18b1d635bb56b0abc92a1fbb7af071b4b,2024-11-01T15:35:15.297000
CVE-2024-38541,0,0,023c6a7426f76d21c921b964034a52048d8ae62a75126b3da24f432830a3ec3b,2024-07-03T02:05:10.090000
CVE-2024-38542,0,1,5b6315d30c24005411464cd6e47e963e0ace5c08db9b1853647af794a6f5b095,2024-11-07T17:35:20.127000
CVE-2024-38542,0,0,5b6315d30c24005411464cd6e47e963e0ace5c08db9b1853647af794a6f5b095,2024-11-07T17:35:20.127000
CVE-2024-38543,0,0,9904319b3841ba05d0649764b91a7dcf20e3aad22e44c835db1259658176f833,2024-08-29T02:24:30.617000
CVE-2024-38544,0,0,bcedcd71122299f29823b1ebe7d97095ea4974bc03780498d9d07719a691151d,2024-11-06T17:35:32.340000
CVE-2024-38545,0,0,261dbfbb482829eb8a10c5dffc48966eeb2cd7f072fdb8cd547b02f5851c26f0,2024-10-17T14:15:06.450000
CVE-2024-38546,0,0,eea58266196a873fad4b4b919d579fb6ca82bf25773f04562985e9491c7b0b55,2024-08-27T20:03:18.263000
CVE-2024-38547,0,0,0fd46903a324a4303feb1a86ea138cad132aadfdd07434ca776aa7fc69875c87,2024-08-27T19:56:36.727000
CVE-2024-38548,0,1,1d4fefaae21b3ed24304889bd09e4edcb3023c2a1ebfd220e7dddd4bd428095e,2024-11-07T17:35:20.360000
CVE-2024-38548,0,0,1d4fefaae21b3ed24304889bd09e4edcb3023c2a1ebfd220e7dddd4bd428095e,2024-11-07T17:35:20.360000
CVE-2024-38549,0,0,23759d651c75e71c7abf259e3346236d359121811ca890a80b4abdbeb6d53463,2024-08-27T19:57:48.560000
CVE-2024-3855,0,0,7262bd57b27d1b3d3103ab661d1f7d85ee277817264f21911d91b4fa573922bc,2024-04-17T12:48:31.863000
CVE-2024-38550,0,0,f9339cdf187581dae1984489b06e040b122b4127b3752a57e3768453458373c0,2024-11-01T15:35:15.507000
@ -257464,7 +257466,7 @@ CVE-2024-38572,0,0,51daba4ae3afcf7c5fe55b093c1a3f72e1a3bceba37dea337e218e2c66da7
CVE-2024-38573,0,0,ca8898dfb11b5dd535a57345209c5053ecbd565ef57ea10dbb17683dd19ec64e,2024-07-03T02:05:13.393000
CVE-2024-38574,0,0,6afdc30adbe5999044de1cc76d2cc76289f74910e8879e6f74197c6ff1a2b954,2024-06-20T12:44:01.637000
CVE-2024-38575,0,0,2bb1d17f38c40f1a364165b77b7ca5fceadcc7cb4b05f83746adb6eb31d29aa9,2024-06-20T12:44:01.637000
CVE-2024-38576,0,1,e2e18d3fd447ccc2d476fa92ca06a9c4a588be1994912cfb2f894f47f143ea14,2024-11-07T18:35:10.433000
CVE-2024-38576,0,0,e2e18d3fd447ccc2d476fa92ca06a9c4a588be1994912cfb2f894f47f143ea14,2024-11-07T18:35:10.433000
CVE-2024-38577,0,0,1efc1e7397f24359bd6439871f08b63ff432bc413f747234aacf9ee77a51c8fb,2024-09-12T12:15:47.620000
CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000
CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000
@ -258700,7 +258702,7 @@ CVE-2024-40711,0,0,22f2a0ec5d60d30d489a1cbde640082edf370b191c841709c2ac9ec5e8cd3
CVE-2024-40712,0,0,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000
CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000
CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000
CVE-2024-40715,1,1,2f0ddf0df7df423cec2e162fcaf01d5d262b6a94dd3990c1ab3599fd5eba08f9,2024-11-07T17:15:08.083000
CVE-2024-40715,0,0,2f0ddf0df7df423cec2e162fcaf01d5d262b6a94dd3990c1ab3599fd5eba08f9,2024-11-07T17:15:08.083000
CVE-2024-40718,0,0,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
@ -260611,7 +260613,7 @@ CVE-2024-43428,0,0,a483e489d4ac4af14144f4326e22f286c1ec6d428ef5b9c8e36e63f2986dd
CVE-2024-43431,0,0,0902d7b350b61639924f4c68fe86c20c3f8705618a8d31aef0002ff70e3f99fe,2024-11-07T16:35:19.497000
CVE-2024-43434,0,0,0de9fbff6ec47f339081c0859193ec7a340ffb35a0bb04571c99441c8b11a2e7,2024-11-07T16:35:20.220000
CVE-2024-43436,0,0,27835f6934093c7263d11d49fae9d36c80f3ec6ab8693a7d5e7456e924ade38a,2024-11-07T16:35:20.957000
CVE-2024-43438,0,1,d6cdeff050d2d1ca36643d06cfef06638f7c7d0a39f11f8ca9f88b3cabe569a6,2024-11-07T17:35:22.537000
CVE-2024-43438,0,0,d6cdeff050d2d1ca36643d06cfef06638f7c7d0a39f11f8ca9f88b3cabe569a6,2024-11-07T17:35:22.537000
CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000
CVE-2024-43440,0,0,b5ccac223783b864085deddbcca2f8c0e78903a03e3eed69be59e89d34041813,2024-11-07T15:35:12.597000
CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec6a3,2024-08-26T16:35:12.860000
@ -262070,7 +262072,7 @@ CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac17822
CVE-2024-45790,0,0,339d5c59c4b08184225ef02e77057a5607db1e407fbacc8325ce6de4811d4a59,2024-09-18T18:38:04.393000
CVE-2024-45792,0,0,5abb7de999f910eaa61796ecbea33f574a65653e2aa062ee4c5c2e229e356bd5,2024-10-04T13:51:25.567000
CVE-2024-45793,0,0,9df195d476b9f18fe89dd15d9de75cbf87671a956c83113b39ce1c0cbc87094f,2024-09-26T13:32:55.343000
CVE-2024-45794,1,1,ff55b1422b2d966adaf82d3a0c3ac295a3d99ee9c5de845f619f184e7cb79af5,2024-11-07T18:15:17.150000
CVE-2024-45794,0,0,ff55b1422b2d966adaf82d3a0c3ac295a3d99ee9c5de845f619f184e7cb79af5,2024-11-07T18:15:17.150000
CVE-2024-45795,0,0,26c97941bb301ee7ea5809137e4aecc858408d3ad95a6809e3378636ffafc462,2024-10-22T13:35:50.963000
CVE-2024-45796,0,0,dd2a7d5e6960dfe9d3ad6d62409661ffa12b088f6140bacc226f9bb18438c496,2024-10-22T13:37:57.930000
CVE-2024-45797,0,0,049f9559c334598f19954ea514f0547d1d0f8c6b3863a15a6b9d40d7227d9224,2024-10-18T12:53:04.627000
@ -262738,7 +262740,7 @@ CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1b
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000
CVE-2024-47071,0,0,2a2727cf2aa9f31ddc31166413e132f87e7e569f257fdb08eb6f77a7cd1bf2ac,2024-10-04T13:51:25.567000
CVE-2024-47073,1,1,741cf369e25d121386909bbcd5cb5f85f34fe3950a1fedde7e2b4ad8e532a1a0,2024-11-07T18:15:17.417000
CVE-2024-47073,0,0,741cf369e25d121386909bbcd5cb5f85f34fe3950a1fedde7e2b4ad8e532a1a0,2024-11-07T18:15:17.417000
CVE-2024-47074,0,0,c235393b42c4b6df5eccda6c9c87286d920054a08fd0159e7304cbc69442da06,2024-10-15T12:58:51.050000
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
@ -263283,7 +263285,7 @@ CVE-2024-47849,0,0,de2bc9d37c4c436919cea14cdc9e234750104bad56196fb793061fe483bbc
CVE-2024-4785,0,0,86459565331431d4effe5c5baf904159b952a2a7d490db9da0fcd3795764e799,2024-08-20T15:44:20.567000
CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b89e,2024-10-07T16:15:05.753000
CVE-2024-47854,0,0,31b9ee1e6861649c0043a7af7c7a50d8ef5e295b98593959cd182d2901e547c2,2024-10-06T21:15:12.920000
CVE-2024-47855,0,0,ff52cc8efd16010ace1ca5c24f7c166f3d1a0b5862371f0cb96dbe810ee6ad58,2024-10-04T13:50:43.727000
CVE-2024-47855,0,1,55506bc59fb300d34c632b3a5f880b3df3b3b2206fd15f460c6853ba7eb245ef,2024-11-07T20:35:11.733000
CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000
CVE-2024-47867,0,0,ab930a5134ec2749c4c7aeddae39ca362d9631d50a282f941fbaca32a5ca7733,2024-10-15T12:58:51.050000
CVE-2024-47868,0,0,b1d3ae34e95c1b5cdfd4777e6cf22588fee5fb92f1e32bee19fdee66c93a7d46,2024-10-17T17:04:35.547000
@ -263482,7 +263484,7 @@ CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b9
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
CVE-2024-48290,1,1,4b9b16745d866dad1b17ecdc51f00561a9cc9030412ebdef0024720e20e85781,2024-11-07T18:15:17.580000
CVE-2024-48290,0,0,4b9b16745d866dad1b17ecdc51f00561a9cc9030412ebdef0024720e20e85781,2024-11-07T18:15:17.580000
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000
CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000
@ -263683,7 +263685,7 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923
CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000
CVE-2024-48921,0,1,e9387d1d6c60f59e6d5a6f7c28c82620f8f1647520cac034f065894573414562,2024-11-07T17:20:34.160000
CVE-2024-48921,0,0,e9387d1d6c60f59e6d5a6f7c28c82620f8f1647520cac034f065894573414562,2024-11-07T17:20:34.160000
CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000
CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000
CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000
@ -263703,11 +263705,11 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5
CVE-2024-48948,0,0,e258a1f975e8d413717e5a74939518d1de0dc99614e31cd1ac6a1814dc44422f,2024-11-05T19:36:14.127000
CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
CVE-2024-48950,1,1,f7c67fb4c90582b9af843061119c435bf1fe7f1faf77459f539f43358e4219b7,2024-11-07T17:15:08.373000
CVE-2024-48951,1,1,ce36f89e471f6b0a300d95062b7e705ba93522495acbf9297bd1478b36d476c4,2024-11-07T17:15:08.443000
CVE-2024-48952,1,1,4f32bf501eef8591c16517a4013f37a44ea4cae96bd67edbff84314606a95e35,2024-11-07T17:15:08.510000
CVE-2024-48953,1,1,3e11b39efd28d36671524d20906242622579b1ecad13ee22a69cca17782f0c7d,2024-11-07T17:15:08.570000
CVE-2024-48954,1,1,e95315885deaa22eae3c7806424d65e3b5355b2f9bde52ebf20fe23cbebbd38a,2024-11-07T17:15:08.650000
CVE-2024-48950,0,1,30c48acb483e2f4f16c0b38adb455099e742e4191e5d551a647266bca824b741,2024-11-07T20:35:12.187000
CVE-2024-48951,0,1,bb3a629223b91890b09e74d7f4add0d9f2e43ad01b8ed2ebf2bc3ccd95205c1a,2024-11-07T20:35:13.070000
CVE-2024-48952,0,1,058bf59448a7361301ca4c2401dc532ddd24e7bdaedbcb0e8e3cf6bcc7063240,2024-11-07T20:35:13.947000
CVE-2024-48953,0,0,3e11b39efd28d36671524d20906242622579b1ecad13ee22a69cca17782f0c7d,2024-11-07T17:15:08.570000
CVE-2024-48954,0,0,e95315885deaa22eae3c7806424d65e3b5355b2f9bde52ebf20fe23cbebbd38a,2024-11-07T17:15:08.650000
CVE-2024-48955,0,0,84de7be29efb285e46fc24626f552063b1e23de7f9dbbe9943b534f430e239e9,2024-11-01T12:57:35.843000
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
@ -263978,7 +263980,7 @@ CVE-2024-49639,0,0,82ffeb5e3fd995175985b5782e7cbdd12a8ec35a00cfaffe6c965dcdb2a64
CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000
CVE-2024-49640,0,0,becbe9cd8e4562101ae9f0fd4aeb9f5d80e9d81b9046f0c79b66a78a4ae5a7e8,2024-10-31T16:04:01.113000
CVE-2024-49641,0,0,0c76c83cf503f374bc615797049759b6f98944a9c823b145687554c637514560,2024-10-31T16:05:44.353000
CVE-2024-49642,0,0,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000
CVE-2024-49642,0,1,66a7bd2ec5779bc9317ec59e62fed4a534ea42c063a1c8a996c562b60f66eacd,2024-11-07T20:59:18.593000
CVE-2024-49643,0,0,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000
CVE-2024-49645,0,0,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000
CVE-2024-49646,0,0,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000
@ -264048,8 +264050,8 @@ CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
CVE-2024-49766,0,0,5a8c5c0a2bd94e828f2c3a22888613b17d32cf5a4207ce143b3606496d9774b9,2024-10-28T13:58:09.230000
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
CVE-2024-49768,0,1,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000
CVE-2024-49769,0,1,6340e3adda9a030cec825cc1b119266a40aee36b3725d18d2443db4b549f4b36,2024-11-07T17:29:04.053000
CVE-2024-49768,0,0,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000
CVE-2024-49769,0,0,6340e3adda9a030cec825cc1b119266a40aee36b3725d18d2443db4b549f4b36,2024-11-07T17:29:04.053000
CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000
CVE-2024-49770,0,0,e139253d4206279d60332f6c15cf6c38eaa01808a4afba5b24efe9b5918d6e65,2024-11-01T20:24:53.730000
CVE-2024-49771,0,0,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000
@ -264168,22 +264170,22 @@ CVE-2024-49949,0,0,4b7cc6ad46e6fb02c30d561a1abf4d685b4716c9a9a63cb194665a262ed01
CVE-2024-49950,0,0,2ddbedfd38f23d93ceda398a82953a6283207fe13e3d074351d245c80eecd7dd,2024-11-01T15:05:46.640000
CVE-2024-49951,0,0,b8f60d5ef8bd84dfe50bdc427eded9132dc5d0565199c187e518a0aa431c0f98,2024-10-23T15:13:25.583000
CVE-2024-49952,0,0,eacfa13d5e4b6dd3f3d20e28896adb1fddd3533c2dd67578249a8ef8b4ca45d2,2024-10-23T15:13:25.583000
CVE-2024-49953,0,1,a14ff01abf17243413548e3a025639bd82a01ce0626a40567d5dfe8c35143d81,2024-11-07T17:44:28.297000
CVE-2024-49954,0,0,2156082b776c1c996298ae4f0db53d4824ef35b37e49b72d874b5564fde8e048,2024-10-23T15:13:25.583000
CVE-2024-49955,0,0,e7695a88ff3679ba8db0d0bea7fd9d2715977aa81cbfabae58d29cb095db5eec,2024-10-23T15:13:25.583000
CVE-2024-49953,0,0,a14ff01abf17243413548e3a025639bd82a01ce0626a40567d5dfe8c35143d81,2024-11-07T17:44:28.297000
CVE-2024-49954,0,1,a9ae3dc7c06c6a4cf8fa3c4ae8c3d36aaa164203073d3e4084338cba03b97554,2024-11-07T19:16:01.590000
CVE-2024-49955,0,1,bb210de55a86547bff369dad9219024d2c75a5b5d78be9498f124e3a8da5de1b,2024-11-07T19:15:27.283000
CVE-2024-49956,0,0,eb5ec5d86c4fab87b7c7c8ba3649d4320ece06da3af84193cdaac8ea2f042ecd,2024-11-01T15:19:04.487000
CVE-2024-49957,0,0,c6103bbbfefba317343e6c2ff8fcc672d81747cd4447b6cf7d531a7731d3740c,2024-10-28T16:12:19.783000
CVE-2024-49958,0,1,e76a92083d6f6220b510178433905e3c765ec60d07844dfd509200572e539986,2024-11-07T17:46:35.687000
CVE-2024-49959,0,0,fe4ecd654bcbd844d5c5f2f62134e451f680e3336be4294ef8d3e7baf3f259c4,2024-10-23T15:13:25.583000
CVE-2024-49958,0,0,e76a92083d6f6220b510178433905e3c765ec60d07844dfd509200572e539986,2024-11-07T17:46:35.687000
CVE-2024-49959,0,1,54bcff4434b1b84fc33bf2f389c891dbdef8f65102820f9517bb40b37c1c794e,2024-11-07T19:23:06.047000
CVE-2024-49960,0,0,e1ff38617c3cbc50d878d6be17765675dd1e1a9a8532a3e18efd19f290b41f5b,2024-10-28T16:16:35.320000
CVE-2024-49961,0,0,3670d75402fdb83bcd4895876fbf8a79a88caabf5691d9ccca791e5627785c19,2024-10-23T15:13:25.583000
CVE-2024-49961,0,1,b6b6a573753628094abb36b02b803e0a2060bdd539b0cb60d01cb533399cf8e1,2024-11-07T19:22:15.323000
CVE-2024-49962,0,0,17f1508f07e43bdc9169fb45ebbc8c37ff24a80e1095aa512249a38ffaa6ca45,2024-10-28T16:17:33.310000
CVE-2024-49963,0,0,2b2f3924927237848da0ce4db39b07cfa23ea57811f60b13338146ece598c290,2024-10-23T15:13:25.583000
CVE-2024-49964,0,0,a3daf32d816def969df47ee2e8de5196da8c32fcc51b4fa6e88980ee02b891ef,2024-10-23T15:13:25.583000
CVE-2024-49965,0,0,5017e4bbea441f34bb1695a3b7704c83c90f6308e3baa7512dac279c00198861,2024-10-23T15:13:25.583000
CVE-2024-49966,0,0,3dd9d402aa195283567134637b94ebf05fd7aa88c1f417600ffa5b4bb2fa6e42,2024-10-23T15:13:25.583000
CVE-2024-49963,0,1,199ac441e9a288f95c7202bd5a32c4b08e6579e6364caa2faadb020f48aeff8f,2024-11-07T19:20:58.597000
CVE-2024-49964,0,1,b86829b3427167def528c35eb4674d2a5b80d5fadce8a9f88fe46b064ccd8c9d,2024-11-07T19:20:04.357000
CVE-2024-49965,0,1,81c8ca70be3733192fae7f9c809cf9cf34131d01d4217c60dd3a8159366fa82d,2024-11-07T19:18:30.800000
CVE-2024-49966,0,1,e8ff36453292fe2a13e833fdf19d89435c33f4eeab75577fbfdf3289556506ea,2024-11-07T19:30:24.643000
CVE-2024-49967,0,0,3f367178757a2c82a132a94191b9074dd368f730d524bff5a18e30f45adceb4e,2024-11-01T15:09:01.707000
CVE-2024-49968,0,0,19a93f4a6384a37e0e479ce1fc4610aee20a39bc275896118b96ca5904112124,2024-10-23T15:13:25.583000
CVE-2024-49968,0,1,db34a51ebce9287207cb76852e8d1248d7abd6118712c9e410bc5e807c0c02cc,2024-11-07T19:28:02.937000
CVE-2024-49969,0,0,87996c90e1672445fe5815f19cbdae838e57430f8b66f0e3e569e0c7abd0a9cb,2024-10-25T20:15:51.520000
CVE-2024-4997,0,0,8869d8cee41a7f38be4f03ad1383841d0fd18dd2f92c0e8b0f0fd7c6f2096580,2024-06-04T16:57:41.053000
CVE-2024-49970,0,0,638a6e5f6f7a4a7972cb76754ec52808db9beef3f8062893a90ac926493da3ef,2024-10-29T15:57:41
@ -264223,14 +264225,14 @@ CVE-2024-50000,0,0,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182
CVE-2024-50001,0,0,195afb719a60bcef7c30d2f2fb3d1f26d0b29c7425542d09029c1e7539c92fcb,2024-10-30T21:59:44.487000
CVE-2024-50002,0,0,b6688309bee6edea92d75affed9942b16ad3f6cfc60f9f2e11893c23efc155b7,2024-10-30T21:57:59.923000
CVE-2024-50003,0,0,5807e4e014538d704f1f27632e3e18eb3d7e3c790926a19fd58a737e383f428a,2024-11-01T15:16:36.113000
CVE-2024-50004,0,0,fe596401aaf26a0bb4fc90f2562faa93ddcac118926c98a71e59d59cbb14fac7,2024-10-23T15:13:25.583000
CVE-2024-50005,0,0,71785d188823b2f1a674a1d58fa9bf202e420b9fbc567aaf86f41c900cbed7a5,2024-10-23T15:13:25.583000
CVE-2024-50004,0,1,75662d9275fde9ec15d7ed5ff7e2719cd2eec5a0dea5d98af7ef8dad8c5d4469,2024-11-07T19:27:29.863000
CVE-2024-50005,0,1,0fcbc98c40ce1e760f8a21d694d53247e6f7626c291e5d43e681e12ffe5c104a,2024-11-07T19:27:01.613000
CVE-2024-50006,0,0,d1f7bfa55609adf304959b822bd6e9210f0c111dda6c4d1526f7bc51cc841bcc,2024-11-01T15:37:42.840000
CVE-2024-50007,0,0,3bb3ddfaf04b35f9340e692fc6e60153db0d60c226088a76c32b141ba8410ca3,2024-11-01T15:34:11.917000
CVE-2024-50008,0,0,cf18884f6df3df5c9ce0073b5f01db383272d1fb920974501c4f54c76c821365,2024-10-23T15:13:25.583000
CVE-2024-50008,0,1,b6b5ad2333202908f9d1b150f307770e906e1ea8e04d8a262d29b56851430cef,2024-11-07T19:26:22.627000
CVE-2024-50009,0,0,508fd3a1d0553adac6c1304c65a71463225696beb8afe05961de7f3a1742e1d3,2024-11-01T15:32:35.593000
CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000
CVE-2024-50010,0,0,dd004beb59f4fd550b7db5da7c250b0b2a967f9af1dfd3805874973f61bbfe6e,2024-11-04T12:16:09.760000
CVE-2024-50010,0,1,f1b2a6033b3a2c4e3dcd2009d8b8f9f832877ef1c08f2a974e22886366d82c98,2024-11-07T19:32:35.937000
CVE-2024-50011,0,0,bba0dff209e225565c8e6c463c706dc41e86bea877759fee9b6a14a8cb31506e,2024-11-01T15:31:48.550000
CVE-2024-50012,0,0,0b464fdf78181eaa99a743288b56773d15a2abd5d273a31aea10de63165e8299,2024-10-25T19:55:40.217000
CVE-2024-50013,0,0,eefeead007890563f349e532e89dba096326c5095afb27c53d3f32df4440455c,2024-10-25T19:49:36.863000
@ -264445,11 +264447,11 @@ CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c
CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
CVE-2024-50407,0,0,f9688f4b448fa6261be66d0317a572bd7a88062577e578fa12fbb434c00a6869,2024-10-29T14:34:04.427000
CVE-2024-50407,0,1,4fb5f00a58beefd4cfac77c8419361c961ad849f2db4f958a95f873505b783a5,2024-11-07T20:28:22.860000
CVE-2024-50408,0,0,42895de3e084cedaf6647f131c47bd546b78f0bd37cacbb2a46053fdc5504c96,2024-10-29T16:01:08.447000
CVE-2024-50409,0,0,d7ec10c5e1543bca47bfdf414d287c32f5601d40bab44b017b5b1321eddc073f,2024-10-29T14:34:04.427000
CVE-2024-50409,0,1,decf8c1f911e116f8cd8eaed54dfebb80d0d98a1eb5c9f1827ad8919ae8e2e9d,2024-11-07T20:28:43.577000
CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000
CVE-2024-50410,0,0,b0e5f19d3e850e75bae53f582d220aeb13e9ae300eafba739d117cde04cd904e,2024-10-29T14:34:04.427000
CVE-2024-50410,0,1,642f8109edbadd8a6989f8cd0522579e64ff28c910222ae4d458849968d71f13,2024-11-07T20:29:13.937000
CVE-2024-50411,0,0,2125caa96e2fd794a28994bdb07b4bb7596f8c4a6de822aea393e9e8d4d53bc7,2024-10-29T14:34:04.427000
CVE-2024-50412,0,0,631b195ca92c8239dedf128815fcbb14f2f3794e78d494b800069471ed0f1296,2024-10-29T14:34:04.427000
CVE-2024-50413,0,0,7bd7e93e9534d8f928af3202deae1fbb2549aee1ab43b478d04f1c666ef4a515,2024-10-29T14:34:04.427000
@ -264494,8 +264496,8 @@ CVE-2024-50450,0,0,7fc26bfa183b8562e84f6ef3fdd2ced88c72fd71cbb7684963fe6a0f34f11
CVE-2024-50451,0,0,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000
CVE-2024-50453,0,0,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000
CVE-2024-50454,0,0,9d16a2e4356dbdfef4286c8b0e4629708aeb8f7938cb70a2ff3217cf54b560a8,2024-11-01T12:57:35.843000
CVE-2024-50455,0,1,25a99d146bd13580e40d11adab73e854fc31a7bcfbaee49909033fc23a6c8b5e,2024-11-07T17:01:30.937000
CVE-2024-50456,0,1,cce324d6198e8843e2938707f71fdd53169cdbd8bc5ec8c5079417c4b3dcdb32,2024-11-07T17:02:03.653000
CVE-2024-50455,0,0,25a99d146bd13580e40d11adab73e854fc31a7bcfbaee49909033fc23a6c8b5e,2024-11-07T17:01:30.937000
CVE-2024-50456,0,0,cce324d6198e8843e2938707f71fdd53169cdbd8bc5ec8c5079417c4b3dcdb32,2024-11-07T17:02:03.653000
CVE-2024-50457,0,0,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000
CVE-2024-50458,0,0,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000
CVE-2024-50459,0,0,6641e61426a818cff44eec6500fc0b034294e17c7fdf43b3c69786d675e07ca7,2024-11-06T23:11:17.687000
@ -264738,7 +264740,7 @@ CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f0
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000
CVE-2024-51358,0,1,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
@ -264762,7 +264764,7 @@ CVE-2024-51424,0,0,8074d3681dc009f545c0b5b1ed4c51a9f136d3c18afaa9c4384405256aed3
CVE-2024-51425,0,0,53ab0aa708c9b43a2cf1a93dce648aa1bc3d18e6a93bde5d39ed5fb860afb7f0,2024-11-04T06:15:04.053000
CVE-2024-51426,0,0,5d33521d8b96e38633b5f868464693826d0cf60bba0992fdeeaa0d9e10eb58ac,2024-11-04T06:15:04.200000
CVE-2024-51427,0,0,8620fe2fe9783598011162ebda7f5b78a4941fc646ad43a32bd7b2f439c18153,2024-11-04T06:15:04.340000
CVE-2024-51428,1,1,359d3d57ed788558a7c6194cd6dc60f66b4eb14212218f9984e90372cb5b39b4,2024-11-07T18:15:17.677000
CVE-2024-51428,0,0,359d3d57ed788558a7c6194cd6dc60f66b4eb14212218f9984e90372cb5b39b4,2024-11-07T18:15:17.677000
CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000
CVE-2024-51430,0,0,ff23326a74158832e3c36a3da3cf40ac4ba003ba8db91bd39e91a6a5bd9de288,2024-11-01T12:57:03.417000
CVE-2024-51431,0,0,8caf7bc329d5a006462692c4b8ce6c1d5bb12741ba8426c8ae4bc6b34727dbe3,2024-11-05T21:37:16.943000
@ -264783,35 +264785,35 @@ CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e22364
CVE-2024-51500,0,0,42c2a285903076a2664ebb01d93e2fe7be0196e6180cfa0174e85e23f0ae008b,2024-11-05T16:04:26.053000
CVE-2024-51501,0,0,4e7a648cb0a13b8579d9339e6f61429384ba9108a787a33330688580d3ffd9b7,2024-11-05T16:04:26.053000
CVE-2024-51502,0,0,ddca894e59a4fa6615b655d6e175550efe4eae6f2d9578fd4366f3b25c69f9f6,2024-11-05T17:35:27.493000
CVE-2024-51504,0,1,4bafdcd55b47a566ef5680713f0c0a1b985598b2f05cd4b1371a5d9aa49b9aa1,2024-11-07T17:35:23.373000
CVE-2024-51504,0,0,4bafdcd55b47a566ef5680713f0c0a1b985598b2f05cd4b1371a5d9aa49b9aa1,2024-11-07T17:35:23.373000
CVE-2024-51506,0,0,aeb585d1723ff2c89aafbc7f5be7b06442a99eb384784bc9840750395f547af1,2024-10-29T19:35:28.723000
CVE-2024-51507,0,0,4365a7f2aa23ce999509e0b8da9d3ae401991203445005454373679a589ef433,2024-10-29T19:35:29.513000
CVE-2024-51508,0,0,84627a5fdd5d7fda34b7d1542f218a3bd3a3d801d78362e1d620b375cd43b4c5,2024-10-29T19:35:30.513000
CVE-2024-51509,0,0,993e17af07ecf25dc3d4222a841d363b0f42df6e2488040b502ab5fa96fcdf3d,2024-10-29T19:35:31.290000
CVE-2024-5151,0,0,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000
CVE-2024-51510,0,1,db31dd12c11f36067154b80c1ae2b840f1ebaa80e3467ce737dcec4672399ae0,2024-11-07T17:03:03.297000
CVE-2024-51511,0,1,af1ea81e666608ce065cc738b2859f4e3c5340541f2bc7c9506c51c8d91743e7,2024-11-07T17:03:12.743000
CVE-2024-51512,0,1,b131f619a076c4257bb1dca63b24d897f74fa88e7e8bca912e6b5268a39019b4,2024-11-07T17:03:21.927000
CVE-2024-51513,0,0,b819600a6a383e4a5393dea2fc7488c03cc44f9ef8b96208284abd9e1394082a,2024-11-05T16:04:26.053000
CVE-2024-51514,0,0,241077eb1ef6c6b5cfd93a49ebeb044c03a1aa8e9a47b63659cabf821024b6db,2024-11-05T16:04:26.053000
CVE-2024-51515,0,0,d8367fb198a1d54e6f17b985ca4089063fa6dcf1f8589ebdc2dd1a1c4cb40000,2024-11-05T16:04:26.053000
CVE-2024-51516,0,0,dca3057adbdcb2dc2edb0a42fac3afd8d23f937e4bcd0ffb1db0a78357f5b6f6,2024-11-05T16:04:26.053000
CVE-2024-51510,0,0,db31dd12c11f36067154b80c1ae2b840f1ebaa80e3467ce737dcec4672399ae0,2024-11-07T17:03:03.297000
CVE-2024-51511,0,0,af1ea81e666608ce065cc738b2859f4e3c5340541f2bc7c9506c51c8d91743e7,2024-11-07T17:03:12.743000
CVE-2024-51512,0,0,b131f619a076c4257bb1dca63b24d897f74fa88e7e8bca912e6b5268a39019b4,2024-11-07T17:03:21.927000
CVE-2024-51513,0,1,c127c7a62c290ff55d6168ac09c7569a4fee8ab87db6c5e2880a680f80f26e43,2024-11-07T20:30:14.910000
CVE-2024-51514,0,1,20cf6e23745f9fee71abcdaea0e46603dcd3b54644d7292c9e7fde4282ee198d,2024-11-07T19:43:51.717000
CVE-2024-51515,0,1,23e0609afe325f023f7851930888e0f4d0213ef093627d51ff208a6a5bb4c8ae,2024-11-07T19:42:53.157000
CVE-2024-51516,0,1,01fc1e6d47e76f5866545ba6b7fc2a59e8d008dacb5ce563fc7b6875e7ffc47c,2024-11-07T19:42:32.537000
CVE-2024-51517,0,0,b7778ee06f553a53d4a963013c2520388e6719967d46ab3b1bdfee244fff652e,2024-11-06T23:15:53.113000
CVE-2024-51518,0,0,f9cdcf3768e4cbb8a9755ea087880188e1a9108228121840f74a1a55c5fdca68,2024-11-06T23:15:48.363000
CVE-2024-51519,0,0,30729484b0b0b5da2002666424f330d6c301d8b92f1a5c7dc3ec5575fe93473c,2024-11-06T23:15:25.930000
CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000
CVE-2024-51520,0,0,31a871f4d970f47472bf4e3cfee6bd94d473bf5419a671e79f8f315fb36c99b5,2024-11-05T16:04:26.053000
CVE-2024-51521,0,0,1b75e440fdf15435a830a7216a280dba9ed815c3f323fcbaff36e7b1166c19d9,2024-11-05T16:04:26.053000
CVE-2024-51522,0,0,48592c132a33fe87c39d8fa1eb3b3e4ea1f9754b4e1fc65345d3c5a280e35d9d,2024-11-05T16:04:26.053000
CVE-2024-51523,0,0,ee15dd54ed1b1452be4ee22b0776303637e3b85b700396714c4b549f6180f3c0,2024-11-05T16:04:26.053000
CVE-2024-51524,0,0,86d194b3e3c51d9116a047a2c6e50217aafcc50211a91e76700deda3c78f439a,2024-11-05T16:04:26.053000
CVE-2024-51525,0,0,3b27c4cafa0945fa41c1a80755a136eb32b249c4356158b650ec382c9ed05631,2024-11-05T16:04:26.053000
CVE-2024-51526,0,0,19c9e321a3982086f472bc6201552e369490e75b4aca7001f84f92c51175ad86,2024-11-05T16:04:26.053000
CVE-2024-51527,0,0,349bf5689f85505cce3531839e4e9ab703d93c1f79ed783e9c7f8f97b1c4be6d,2024-11-05T16:04:26.053000
CVE-2024-51528,0,0,5eb0535c28e78e7287f103ccffde43953600d175767a4b7584682aa68e2dab4b,2024-11-05T16:04:26.053000
CVE-2024-51529,0,0,1cd7969ad365d64b63ce8e6b4c61da311806318ce5ff3e34ada8f81e13ef3c6a,2024-11-05T16:04:26.053000
CVE-2024-51520,0,1,6ed2090f69b5e91cc4ce0a23b023bf958dd14762b6369fc2d6c1e4f6523052cc,2024-11-07T19:55:38.370000
CVE-2024-51521,0,1,7b0c83ecc1d018e2e611f881b41113f0ccf5759396a112373fc7aa6fa872878b,2024-11-07T19:55:21.083000
CVE-2024-51522,0,1,83ac1a058c487079f7980d874177d4128f64f480a1f8142961f8fdce74821612,2024-11-07T20:03:56.137000
CVE-2024-51523,0,1,acf0badda140d06b690475eb00911f13c75ca5ae883193b8c964f12c563f5d2e,2024-11-07T20:03:21.307000
CVE-2024-51524,0,1,662943212918c552b9c15a5259e8521ca61b694f226afcb9c1cb8a09354fbe80,2024-11-07T20:02:59.010000
CVE-2024-51525,0,1,c5268f48cfb12eb43e1569d2b27887336e1a59686c2e69fb25c28aa6c919cff4,2024-11-07T20:01:59.063000
CVE-2024-51526,0,1,fd81d59aa21d02b42faabd3458275ac92e62f901e175ce531ab9d3fe03a0813c,2024-11-07T20:00:28.717000
CVE-2024-51527,0,1,5b7bbd35d087e3862444e0747d3238e2d3ab4d0e2ac6a55da8b4b7047c90348c,2024-11-07T19:57:57.577000
CVE-2024-51528,0,1,7facae14a405d1cb6b0f061ca5849c9312c5771584c4c9518b3caefbdebe223e,2024-11-07T19:57:18.577000
CVE-2024-51529,0,1,4cdd480ac021e0810a5ec103f351b7d12468311fbc3059650aaa3d8118f05311,2024-11-07T19:56:41.723000
CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000
CVE-2024-51530,0,0,2f6a1b02ba34a5b1e24e8e071aa2f2a9ac92d89d1d2954cbb9e2b824ccfc2bd0,2024-11-05T16:04:26.053000
CVE-2024-51530,0,1,b223f2f9d54a795ec6226988140b76c544409eb01507942db54f2fb02451e725,2024-11-07T19:56:10.187000
CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000
CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000
CVE-2024-51556,0,0,b55d82bf90fdb78e33d2cf1f00dfc8aa7bcfecbd3a990a1f45f070aee8579330,2024-11-04T18:50:05.607000
@ -264866,7 +264868,7 @@ CVE-2024-51754,0,0,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1
CVE-2024-51755,0,0,f94462a7b407e6db555bfabd54fbdf4488acc0d3a99f16a2114b58a579ba2cfe,2024-11-07T16:15:17.740000
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
CVE-2024-51757,0,0,94efafdd8ea10b2a0656841928d239afab2750ddf6f06a644397622ff5d6eb53,2024-11-06T21:15:06.807000
CVE-2024-51758,1,1,163a5c3218bd3e818d0469e7d4a133ddd785c72cae006b1bd6d57bff228db04e,2024-11-07T18:15:17.787000
CVE-2024-51758,0,1,7c2dd1e416c68cdc9ff1c06122616cf2852d6cce64012ef616547b4ca60feaef,2024-11-07T20:35:16.200000
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
@ -264889,12 +264891,12 @@ CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f9639502
CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000
CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000
CVE-2024-51988,0,0,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000
CVE-2024-51989,1,1,779423f2efb5d2ca5c38d59609b97dbafea289ed16b7d25f6595cd5e79c70a20,2024-11-07T18:15:17.953000
CVE-2024-51989,0,0,779423f2efb5d2ca5c38d59609b97dbafea289ed16b7d25f6595cd5e79c70a20,2024-11-07T18:15:17.953000
CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000
CVE-2024-51990,0,0,cff622c09caf6d70cb834efe8a697aa5f08e9f9fb04bfaf25b8c6f7fe35bd855,2024-11-07T01:15:03.497000
CVE-2024-51993,1,1,60e8036d67c669df1da499339d698d06a57c4de139720b475dde3670f79ea095,2024-11-07T18:15:18.203000
CVE-2024-51994,1,1,c256db7156ba08f59c3387804e14c634d0f842c916fc97bf53536a0a0bcdafb9,2024-11-07T18:15:18.470000
CVE-2024-51995,1,1,d42ca5c476949856c4a861354c0ad9e1b7233cd95dae66699a0432dbe4e7df70,2024-11-07T18:15:18.787000
CVE-2024-51993,0,1,558e2dbbd7884ebf950b0ed5c581198c2a7129c998df762665cd2d4ed3d6ee38,2024-11-07T19:35:10.383000
CVE-2024-51994,0,1,c33fb20483d531a039679ca7e749d7aa2791758712758bb00e7e04c1f8688112,2024-11-07T19:35:10.640000
CVE-2024-51995,0,1,bb691f9502a8c4e121a85eb6369fbfc2651e3287a2c40ae080b02e3e722043ab,2024-11-07T19:35:10.887000
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000
CVE-2024-52014,0,0,bf660c78013825ab133590fbd2d4d926551058021d148525516ea24d33d017c6,2024-11-05T16:35:37.113000
@ -267564,7 +267566,7 @@ CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db8
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
CVE-2024-8375,0,0,58cea17ca7f7a98f8126bafea3caa90f64ce326ce0b828e067a1c86c7d982ac6,2024-09-20T12:30:17.483000
CVE-2024-8376,0,0,8755f13d2baf2ea4c1f32851a9e5c748f58fd57e01338c5081bda3b629604419,2024-10-31T10:15:05.930000
CVE-2024-8378,0,0,ba4fff7b3c4c22fa1be1788e9390d250516bad1c8df674b631509afd9d10b8c7,2024-11-07T16:15:18.057000
CVE-2024-8378,0,1,34f148e00b1a2acc25765076e3b28753775610b8fbd4cd75a4fc2affc244df30,2024-11-07T20:35:16.537000
CVE-2024-8379,0,0,085298af9559a314a9f72b50c0919e14d810bca9e3bf6d4dab66f461020341e6,2024-10-07T15:49:54.653000
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
@ -267719,7 +267721,7 @@ CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a5706419361
CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
CVE-2024-8587,0,1,a3417745467ad00e944a81be6eef010a359d8b490c2b5274912252536b9bbcf9,2024-11-07T17:15:24.903000
CVE-2024-8587,0,0,a3417745467ad00e944a81be6eef010a359d8b490c2b5274912252536b9bbcf9,2024-11-07T17:15:24.903000
CVE-2024-8588,0,0,550a16448d9618dcd495c4bcd7e078fbf9d3cfdf14a04621dc40d23be34a7ed4,2024-11-01T16:16:19.727000
CVE-2024-8589,0,0,ab7b0246112e4539e208c0490a5db9ddb5f0462fe0599ca161b228aff9f84449,2024-11-01T16:18:36.457000
CVE-2024-8590,0,0,922e779a159c62aa820c8b804e3b33ae6849d2e3a7436ad2ef6f864234965456,2024-11-01T16:18:26.187000
@ -267940,8 +267942,8 @@ CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc5
CVE-2024-8920,0,0,42fc84557f46536ee5298e40d09a285310a4aead85db529ff9c7f89249448d09,2024-10-18T12:52:33.507000
CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000
CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000
CVE-2024-8923,0,1,692afba21893e1db5cd3d6e59bd1f6c3827c82df421461efc94f9ff09fea79be,2024-11-07T17:18:10.993000
CVE-2024-8924,0,1,ffd18997b4a1a175cd09c0acb2c855c400aa6ac556f1b8573d10964613722571,2024-11-07T17:16:43.393000
CVE-2024-8923,0,0,692afba21893e1db5cd3d6e59bd1f6c3827c82df421461efc94f9ff09fea79be,2024-11-07T17:18:10.993000
CVE-2024-8924,0,0,ffd18997b4a1a175cd09c0acb2c855c400aa6ac556f1b8573d10964613722571,2024-11-07T17:16:43.393000
CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000
CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000
CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000
@ -268264,7 +268266,7 @@ CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3
CVE-2024-9438,0,0,f23988b383ffc7b9a8be3f13a0e81848cd3463f82ea0b782cf2d1c7c8dbf0f4a,2024-10-29T14:34:04.427000
CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000
CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000
CVE-2024-9443,0,0,62bd8128f2447c9d74d314fc526c8cc14311db39a1c9eb99e7ab44deda041d18,2024-11-05T16:04:26.053000
CVE-2024-9443,0,1,79216bcefacd2c253b69bfe25ad6a32e8cbce4e2b4f380af9ed43792d6197551,2024-11-07T20:56:58.797000
CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836c0,2024-10-16T16:38:14.557000
CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000
CVE-2024-9446,0,0,ce212af157adf5dba66ecf45f7719333badce295758f6451954bbe4734f3b969,2024-11-01T12:57:03.417000
@ -268411,7 +268413,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
CVE-2024-9689,0,0,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000
CVE-2024-9689,0,1,8f8c579186810d2b61eae71f3a64a7543fcf1895acd4679afad8157c388bec86,2024-11-07T20:35:16.807000
CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000
@ -268524,7 +268526,7 @@ CVE-2024-9922,0,0,5b3f4f94b058e10394fda050af76e1c62dd106f0eebadd14ac4c752deaa614
CVE-2024-9923,0,0,e0957ae0002d68f1b955241f204c0150727bb34721e8b9ed064776340efa0183,2024-10-24T13:24:23.430000
CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000
CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000
CVE-2024-9926,0,0,ae487ccf1429d8e512b3c373f45e502a3bf1b04dd3005c179106f8b86a99e89c,2024-11-07T15:15:05.860000
CVE-2024-9926,0,1,b97027b2d01f92b150b3a0c3126d1a9225c0551084b31e89d062f3cf8ece4e71,2024-11-07T20:35:17.120000
CVE-2024-9927,0,0,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000
CVE-2024-9930,0,0,2e94c1b1c2d8f47dab5a0085f731b617edc3eb172311f1bc2011ba2b1f6ff871,2024-10-28T13:58:09.230000
CVE-2024-9931,0,0,4f99602a22e228cc69b801ddff8bd876efec1042ee86fb7a5c3c9f1dd271a722,2024-10-28T13:58:09.230000
@ -268575,8 +268577,8 @@ CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539
CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000
CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000
CVE-2024-9987,0,0,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000
CVE-2024-9988,0,1,fe7d37ad8457d452518c7526bd4799a8f7d3fb26918e0dc5adb340f6f79f70a1,2024-11-07T17:00:29.560000
CVE-2024-9989,0,1,00b61b6e46400278a8822cdbfa502b4eff996cd08f7ab26e0423278593672997,2024-11-07T17:00:56.337000
CVE-2024-9988,0,0,fe7d37ad8457d452518c7526bd4799a8f7d3fb26918e0dc5adb340f6f79f70a1,2024-11-07T17:00:29.560000
CVE-2024-9989,0,0,00b61b6e46400278a8822cdbfa502b4eff996cd08f7ab26e0423278593672997,2024-11-07T17:00:56.337000
CVE-2024-9990,0,0,6535e43f058bfb50050d26d851e120f9cfe62488cf6b3933d7c62cfdab49fc33,2024-11-06T23:11:42.037000
CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820e2,2024-10-28T13:58:09.230000
CVE-2024-9996,0,0,d5e7827ad5391d78a31addd2ca4c41dc6e5d45abf975a0bf7cf45c9296bda120,2024-11-01T16:27:30.387000

Can't render this file because it is too large.