diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json
index 8e9ed30e761..4e47288e7f0 100644
--- a/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46175.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46175",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-09-26T14:15:07.247",
- "lastModified": "2024-09-26T14:15:07.247",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22170.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22170.json
index b4676818d2f..1d95a342d6d 100644
--- a/CVE-2024/CVE-2024-221xx/CVE-2024-22170.json
+++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22170.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-22170",
"sourceIdentifier": "psirt@wdc.com",
"published": "2024-09-27T17:15:12.143",
- "lastModified": "2024-09-27T17:15:12.143",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Western Digital My Cloud ddns-start on Linux allows Overflow Buffers.This issue affects My Cloud: before 5.29.102."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en Western Digital My Cloud ddns-start en Linux permite b\u00faferes de desbordamiento. Este problema afecta a My Cloud: antes de 5.29.102."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23586.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23586.json
index af2fa26ab87..12ba3b0c3d2 100644
--- a/CVE-2024/CVE-2024-235xx/CVE-2024-23586.json
+++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23586.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23586",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-09-27T22:15:12.930",
- "lastModified": "2024-09-27T22:15:12.930",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HCL Nomad is susceptible to an insufficient session expiration vulnerability. \u00a0 Under certain circumstances, an unauthenticated attacker could obtain old session information."
+ },
+ {
+ "lang": "es",
+ "value": "HCL Nomad es susceptible a una vulnerabilidad de expiraci\u00f3n de sesi\u00f3n insuficiente. En determinadas circunstancias, un atacante no autenticado podr\u00eda obtener informaci\u00f3n de sesiones antiguas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23923.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23923.json
index b2557002ea4..59a0b7f513c 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23923.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23923.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23923",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:02.440",
- "lastModified": "2024-09-28T07:15:02.440",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root.\n\nWas ZDI-CAN-22945"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo Use-After-Free en prh_l2_sar_data_ind de Alpine Halo9. Esta vulnerabilidad permite a los atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de los dispositivos Alpine Halo9. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la funci\u00f3n prh_l2_sar_data_ind. El problema es el resultado de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones en el objeto. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-22945"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23924.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23924.json
index a9f4ededd02..3e2876d2483 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23924.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23924.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23924",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:02.790",
- "lastModified": "2024-09-28T07:15:02.790",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Alpine Halo9 UPDM_wemCmdCreatSHA256Hash Command Injection Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the UPDM_wemCmdCreatSHA256Hash function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.\n\nWas ZDI-CAN-23105"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo mediante inyecci\u00f3n de comando UPDM_wemCmdCreatSHA256Hash en Alpine Halo9. Esta vulnerabilidad permite a atacantes f\u00edsicamente presentes ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de dispositivos Alpine Halo9. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la funci\u00f3n UPDM_wemCmdCreatSHA256Hash. El problema es el resultado de la falta de validaci\u00f3n adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada del sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-23105"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23935.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23935.json
index 26cea07f1e1..55eda12f444 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23935.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23935.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23935",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:02.997",
- "lastModified": "2024-09-28T07:15:02.997",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Alpine Halo9 DecodeUTF7 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DecodeUTF7 function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.\n\nWas ZDI-CAN-23249"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila en Alpine Halo9 DecodeUTF7. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en instalaciones afectadas de dispositivos Alpine Halo9. Un atacante primero debe obtener la capacidad de emparejar un dispositivo Bluetooth malicioso con el sistema de destino para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la funci\u00f3n DecodeUTF7. El problema es el resultado de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-23249"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23938.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23938.json
index 7c3ec3e77a5..d03c6ce3400 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23938.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23938.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23938",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T06:15:02.200",
- "lastModified": "2024-09-28T06:15:02.200",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the debug interface. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.\n\nWas ZDI-CAN-23184"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila en la interfaz de depuraci\u00f3n del sistema operativo Gecko de Silicon Labs. Esta vulnerabilidad permite a los atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas del sistema operativo Gecko de Silicon Labs. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la interfaz de depuraci\u00f3n. El problema es el resultado de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-23184"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23957.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23957.json
index df821f6bb3c..057216e9c1c 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23957.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23957.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23957",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T06:15:02.787",
- "lastModified": "2024-09-28T06:15:02.787",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Autel MaxiCharger AC Elite Business C50 DLB_HostHeartBeat Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the DLB_HostHeartBeat handler of the DLB protocol implementation. When parsing an AES key, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.\n\nWas ZDI-CAN-23241"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila DLB_HostHeartBeat en Autel MaxiCharger AC Elite Business C50. Esta vulnerabilidad permite a los atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de las estaciones de carga Autel MaxiCharger AC Elite Business C50. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del controlador DLB_HostHeartBeat de la implementaci\u00f3n del protocolo DLB. Al analizar una clave AES, el proceso no valida correctamente la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-23241"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23958.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23958.json
index 77c597bc626..b8d06499073 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23958.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23958.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23958",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:03.183",
- "lastModified": "2024-09-28T07:15:03.183",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Autel MaxiCharger AC Elite Business C50 BLE Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the BLE AppAuthenRequest command handler. The handler uses hardcoded credentials as a fallback in case of an authentication request failure. An attacker can leverage this vulnerability to bypass authentication on the system.\n\nWas ZDI-CAN-23196"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de credenciales codificadas de Autel MaxiCharger AC Elite Business C50 BLE. Esta vulnerabilidad permite a los atacantes adyacentes a la red omitir la autenticaci\u00f3n en las instalaciones afectadas de las estaciones de carga Autel MaxiCharger AC Elite Business C50. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del controlador de comandos AppAuthenRequest de BLE. El controlador usa credenciales codificadas de forma r\u00edgida como respaldo en caso de que falle una solicitud de autenticaci\u00f3n. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticaci\u00f3n en el sistema. Era ZDI-CAN-23196"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23959.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23959.json
index 38f66faf6fd..af4c9a79f04 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23959.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23959.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23959",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:03.367",
- "lastModified": "2024-09-28T07:15:03.367",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Autel MaxiCharger AC Elite Business C50 BLE AppChargingControl Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the handling of the AppChargingControl BLE command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.\n\nWas ZDI-CAN-23194"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila en el BLE AppChargingControl de Autel MaxiCharger AC Elite Business C50. Esta vulnerabilidad permite a los atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de las estaciones de carga Autel MaxiCharger AC Elite Business C50. Aunque se requiere autenticaci\u00f3n para explotar esta vulnerabilidad, se puede omitir el mecanismo de autenticaci\u00f3n existente. La falla espec\u00edfica existe en el manejo del comando AppChargingControl BLE. El problema es el resultado de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-23194"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23960.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23960.json
index 4b843947401..b37fd63b8ea 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23960.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23960.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23960",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:03.550",
- "lastModified": "2024-09-28T07:15:03.550",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Alpine Halo9 Improper Verification of Cryptographic Signature Vulnerability. This vulnerability allows physically present attackers to bypass signature validation mechanism on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the firmware metadata signature validation mechanism. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.\n\nWas ZDI-CAN-23102"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de verificaci\u00f3n incorrecta de firma criptogr\u00e1fica en Alpine Halo9. Esta vulnerabilidad permite a los atacantes f\u00edsicamente presentes eludir el mecanismo de validaci\u00f3n de firma en las instalaciones afectadas de los dispositivos Alpine Halo9. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del mecanismo de validaci\u00f3n de firma de metadatos del firmware. El problema es el resultado de la falta de verificaci\u00f3n adecuada de una firma criptogr\u00e1fica. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto de la ra\u00edz. Era ZDI-CAN-23102"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23961.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23961.json
index 3b977aec5bc..f087a08374e 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23961.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23961.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23961",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:03.740",
- "lastModified": "2024-09-28T07:15:03.740",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Alpine Halo9 UPDM_wemCmdUpdFSpeDecomp Command Injection Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the UPDM_wemCmdUpdFSpeDecomp function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.\n\nWas ZDI-CAN-23306"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo mediante inyecci\u00f3n de comando UPDM_wemCmdUpdFSpeDecomp en Alpine Halo9. Esta vulnerabilidad permite a atacantes f\u00edsicamente presentes ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de dispositivos Alpine Halo9. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la funci\u00f3n UPDM_wemCmdUpdFSpeDecomp. El problema es el resultado de la falta de validaci\u00f3n adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada del sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de la ra\u00edz. Era ZDI-CAN-23306"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23967.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23967.json
index 84877caec7e..f79ef488920 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23967.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23967.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-23967",
"sourceIdentifier": "cve@asrg.io",
"published": "2024-09-28T07:15:03.937",
- "lastModified": "2024-09-28T07:15:03.937",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Autel MaxiCharger AC Elite Business C50 WebSocket Base64 Decoding Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 chargers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the handling of base64-encoded data within WebSocket messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.\n\nWas ZDI-CAN-23230"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento de b\u00fafer basado en pila de Autel MaxiCharger AC Elite Business C50 WebSocket Base64 Decoding. Esta vulnerabilidad permite a los atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de los cargadores Autel MaxiCharger AC Elite Business C50. Aunque se requiere autenticaci\u00f3n para explotar esta vulnerabilidad, se puede eludir el mecanismo de autenticaci\u00f3n existente. La falla espec\u00edfica existe en el manejo de datos codificados en base64 dentro de los mensajes WebSocket. El problema es el resultado de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos a un b\u00fafer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del dispositivo. Era ZDI-CAN-23230"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json
index 98a69f7f3f9..e3734942994 100644
--- a/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json
+++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25411.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-25411",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T18:15:04.000",
- "lastModified": "2024-09-27T20:35:09.620",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cross site scripting (XSS) en Flatpress v1.3 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload manipulado e inyectado en el par\u00e1metro de nombre de usuario en setup.php."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25412.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25412.json
index d334261f0db..34c801e5b8b 100644
--- a/CVE-2024/CVE-2024-254xx/CVE-2024-25412.json
+++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25412.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-25412",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T18:15:04.100",
- "lastModified": "2024-09-27T18:15:04.100",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email field."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cross site scripting (XSS) en Flatpress v1.3 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado inyectado en el campo de correo electr\u00f3nico."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28948.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28948.json
index 67e856a6e66..3864b7a796b 100644
--- a/CVE-2024/CVE-2024-289xx/CVE-2024-28948.json
+++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28948.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-28948",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T18:15:04.197",
- "lastModified": "2024-09-27T18:15:04.197",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacker to partly circumvent the same \norigin policy, which is designed to prevent different websites from \ninterfering with each other."
+ },
+ {
+ "lang": "es",
+ "value": "ADAM-5630 de Advantech contiene una vulnerabilidad de cross-site request forgery (CSRF). Permite a un atacante eludir parcialmente la misma pol\u00edtica de origen, que est\u00e1 dise\u00f1ada para evitar que distintos sitios web interfieran entre s\u00ed."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json
index e7d0456ebbe..de2846bb00e 100644
--- a/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json
+++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30134.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-30134",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-09-26T15:15:17.427",
- "lastModified": "2024-09-26T16:35:22.707",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json
index 8b03cf64f94..a6fc58df387 100644
--- a/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json
+++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31899.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-31899",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-09-26T14:15:08.433",
- "lastModified": "2024-09-26T14:15:08.433",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33368.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33368.json
index e8f008f684c..bbf767f4822 100644
--- a/CVE-2024/CVE-2024-333xx/CVE-2024-33368.json
+++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33368.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-33368",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T19:15:09.830",
- "lastModified": "2024-09-27T19:35:38.347",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Plasmoapp RPShare Fabric mod v.1.0.0 allows a remote attacker to execute arbitrary code via the build method in DonwloadPromptScreen"
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Plasmoapp RPShare Fabric mod v.1.0.0 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo de compilaci\u00f3n en DonwloadPromptScreen"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33369.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33369.json
index dff3c09674c..765be433f1c 100644
--- a/CVE-2024/CVE-2024-333xx/CVE-2024-33369.json
+++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33369.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-33369",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T19:15:10.040",
- "lastModified": "2024-09-27T19:35:39.847",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in Plasmoapp RPShare Fabric mod v.1.0.0 allows a remote attacker to execute arbitrary code via the getFileNameFromConnection method in DownloadTask"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de Directory Traversal en Plasmoapp RPShare Fabric mod v.1.0.0 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo getFileNameFromConnection en DownloadTask"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3373.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3373.json
index 5e58c63d891..aadff161edd 100644
--- a/CVE-2024/CVE-2024-33xx/CVE-2024-3373.json
+++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3373.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-3373",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-27T15:15:14.577",
- "lastModified": "2024-09-27T15:15:14.577",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RSM Design Website Template allows SQL Injection.This issue affects Website Template: before 1.2."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en RSM Design Website Template permite la inyecci\u00f3n SQL. Este problema afecta a Website Template: anterior a 1.2."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34542.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34542.json
index f0091130267..bc81c3c46f3 100644
--- a/CVE-2024/CVE-2024-345xx/CVE-2024-34542.json
+++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34542.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-34542",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T18:15:04.453",
- "lastModified": "2024-09-27T18:15:04.453",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process."
+ },
+ {
+ "lang": "es",
+ "value": "Advantech ADAM-5630 comparte credenciales de usuario en texto plano entre el dispositivo y el dispositivo de origen del usuario durante el proceso de inicio de sesi\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3635.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3635.json
index dfe08861f5d..891ba1343be 100644
--- a/CVE-2024/CVE-2024-36xx/CVE-2024-3635.json
+++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3635.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-3635",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-30T06:15:13.623",
- "lastModified": "2024-09-30T06:15:13.623",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Post Grid WordPress plugin before 7.5.0 does not sanitise and escape some of its Grid settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Post Grid de WordPress anterior a la versi\u00f3n 7.5.0 no desinfecta ni escapa de algunas de las configuraciones de su cuadr\u00edcula, lo que podr\u00eda permitir que usuarios con privilegios elevados como Editor y superiores realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json
index ff50e50b881..b3a47e9f07f 100644
--- a/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json
+++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37125.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-37125",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-09-26T17:15:03.400",
- "lastModified": "2024-09-26T17:15:03.400",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37187.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37187.json
index ad7d06d7892..3624c364f96 100644
--- a/CVE-2024/CVE-2024-371xx/CVE-2024-37187.json
+++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37187.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-37187",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T18:15:04.690",
- "lastModified": "2024-09-27T18:15:04.690",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "ics-cert@hq.dhs.gov",
@@ -16,6 +16,10 @@
{
"lang": "en",
"value": "Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding."
+ },
+ {
+ "lang": "es",
+ "value": "Advantech ADAM-5550 comparte credenciales de usuario con un bajo nivel de cifrado, que consiste en codificaci\u00f3n base 64."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38308.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38308.json
index ca711dcee47..f894dc8a063 100644
--- a/CVE-2024/CVE-2024-383xx/CVE-2024-38308.json
+++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38308.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-38308",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T18:15:04.933",
- "lastModified": "2024-09-27T18:15:04.933",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "ics-cert@hq.dhs.gov",
@@ -16,6 +16,10 @@
{
"lang": "en",
"value": "Advantech ADAM 5550's web application includes a \"logs\" page where all \nthe HTTP requests received are displayed to the user. The device doesn't\n correctly neutralize malicious code when parsing HTTP requests to \ngenerate page output."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n web de Advantech ADAM 5550 incluye una p\u00e1gina de \"registros\" en la que se muestran al usuario todas las solicitudes HTTP recibidas. El dispositivo no neutraliza correctamente el c\u00f3digo malicioso al analizar las solicitudes HTTP para generar la salida de la p\u00e1gina."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38796.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38796.json
index 2b11e7a866e..080880b316b 100644
--- a/CVE-2024/CVE-2024-387xx/CVE-2024-38796.json
+++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38796.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-38796",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2024-09-27T22:15:13.153",
- "lastModified": "2024-09-27T22:15:13.153",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EDK2 contains a vulnerability in the PeCoffLoaderRelocateImage(). An Attacker may cause memory corruption due to an overflow via an adjacent network. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability."
+ },
+ {
+ "lang": "es",
+ "value": "EDK2 contiene una vulnerabilidad en PeCoffLoaderRelocateImage(). Un atacante puede provocar una corrupci\u00f3n de la memoria debido a un desbordamiento a trav\u00e9s de una red adyacente. Una explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una p\u00e9rdida de confidencialidad, integridad y/o disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json
index c85761aed04..a671da1b3f8 100644
--- a/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json
+++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38809.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-38809",
"sourceIdentifier": "security@vmware.com",
"published": "2024-09-27T17:15:12.393",
- "lastModified": "2024-09-27T20:35:10.383",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Applications that parse ETags from \"If-Match\" or \"If-None-Match\" request headers are vulnerable to DoS attack.\n\nUsers of affected versions should upgrade to the corresponding fixed version.\n\nUsers of older, unsupported versions could enforce a size limit on \"If-Match\" and \"If-None-Match\" headers, e.g. through a Filter."
+ },
+ {
+ "lang": "es",
+ "value": "Las aplicaciones que analizan ETags de los encabezados de solicitud \"If-Match\" o \"If-None-Match\" son vulnerables a ataques DoS. Los usuarios de las versiones afectadas deben actualizar a la versi\u00f3n corregida correspondiente. Los usuarios de versiones anteriores no compatibles podr\u00edan imponer un l\u00edmite de tama\u00f1o en los encabezados \"If-Match\" y \"If-None-Match\", por ejemplo, a trav\u00e9s de un filtro."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json
index 2bff8f95bc9..662fdbbc9b6 100644
--- a/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json
+++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38861.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-38861",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-09-27T09:15:02.873",
- "lastModified": "2024-09-27T09:15:02.873",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39275.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39275.json
index 72e96aa82b5..f7aa60de1b8 100644
--- a/CVE-2024/CVE-2024-392xx/CVE-2024-39275.json
+++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39275.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-39275",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T18:15:05.173",
- "lastModified": "2024-09-27T18:15:05.173",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a \nsession is closed. Forging requests with a legitimate cookie, even if \nthe session was terminated, allows an unauthorized attacker to act with \nthe same level of privileges of the legitimate user."
+ },
+ {
+ "lang": "es",
+ "value": "Las cookies de los usuarios autenticados de Advantech ADAM-5630 permanecen como cookies v\u00e1lidas activas cuando se cierra una sesi\u00f3n. Falsificar solicitudes con una cookie leg\u00edtima, incluso si se termin\u00f3 la sesi\u00f3n, permite que un atacante no autorizado act\u00fae con el mismo nivel de privilegios del usuario leg\u00edtimo."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json
index 2582ce8256a..d9eaddc8c93 100644
--- a/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json
+++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39319.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-39319",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T16:15:07.947",
- "lastModified": "2024-09-26T16:15:07.947",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39364.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39364.json
index a948158587b..3f80cf4db6b 100644
--- a/CVE-2024/CVE-2024-393xx/CVE-2024-39364.json
+++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39364.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-39364",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T18:15:05.417",
- "lastModified": "2024-09-27T18:15:05.417",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Advantech ADAM-5630 \nhas built-in commands that can be executed without authenticating the \nuser. These commands allow for restarting the operating system, \nrebooting the hardware, and stopping the execution. The commands can be \nsent to a simple HTTP request and are executed by the device \nautomatically, without discrimination of origin or level of privileges \nof the user sending the commands."
+ },
+ {
+ "lang": "es",
+ "value": "El ADAM-5630 de Advantech tiene comandos integrados que se pueden ejecutar sin necesidad de autenticar al usuario. Estos comandos permiten reiniciar el sistema operativo, reiniciar el hardware y detener la ejecuci\u00f3n. Los comandos se pueden enviar mediante una simple solicitud HTTP y el dispositivo los ejecuta autom\u00e1ticamente, sin discriminaci\u00f3n de origen o nivel de privilegios del usuario que env\u00eda los comandos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json
index 748dbf728c5..0c10a30078c 100644
--- a/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json
+++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-39431",
"sourceIdentifier": "security@unisoc.com",
"published": "2024-09-27T08:15:02.513",
- "lastModified": "2024-09-27T08:15:02.513",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json
index 4fe04cfffbd..a52a7a6f156 100644
--- a/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json
+++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-39432",
"sourceIdentifier": "security@unisoc.com",
"published": "2024-09-27T08:15:03.530",
- "lastModified": "2024-09-27T08:15:03.530",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json
index 1a20922d969..3add57b210c 100644
--- a/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json
+++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-39433",
"sourceIdentifier": "security@unisoc.com",
"published": "2024-09-27T08:15:03.710",
- "lastModified": "2024-09-27T08:15:03.710",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json
index 2677d5ff512..8c39d9d4b28 100644
--- a/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json
+++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-39434",
"sourceIdentifier": "security@unisoc.com",
"published": "2024-09-27T08:15:03.873",
- "lastModified": "2024-09-27T08:15:03.873",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json
index 2a9e5730f6b..3072bf56de6 100644
--- a/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json
+++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-39435",
"sourceIdentifier": "security@unisoc.com",
"published": "2024-09-27T08:15:04.030",
- "lastModified": "2024-09-27T08:15:04.030",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json
index 6af6d5676f9..471467d5cd6 100644
--- a/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json
+++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39577.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-39577",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-09-26T18:15:05.717",
- "lastModified": "2024-09-26T18:15:05.717",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40506.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40506.json
index 9d8f3bbc47a..28b5c534fad 100644
--- a/CVE-2024/CVE-2024-405xx/CVE-2024-40506.json
+++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40506.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-40506",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T22:15:03.770",
- "lastModified": "2024-09-27T19:35:41.900",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40507.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40507.json
index 5e7eb7857f1..301c8afb961 100644
--- a/CVE-2024/CVE-2024-405xx/CVE-2024-40507.json
+++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40507.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-40507",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T22:15:03.880",
- "lastModified": "2024-09-27T19:35:42.957",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json
index 960c1e8fede..1b239e8bb90 100644
--- a/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json
+++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40508.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-40508",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T22:15:03.963",
- "lastModified": "2024-09-27T20:35:11.070",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40509.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40509.json
index 6d69473ab5e..05b945eea14 100644
--- a/CVE-2024/CVE-2024-405xx/CVE-2024-40509.json
+++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40509.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-40509",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:14.740",
- "lastModified": "2024-09-27T17:35:02.243",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMFinDev.asmx function."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de cross site scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMFinDev.asmx."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40510.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40510.json
index cff79d79ae1..6f20b2063cb 100644
--- a/CVE-2024/CVE-2024-405xx/CVE-2024-40510.json
+++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40510.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-40510",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:14.820",
- "lastModified": "2024-09-27T15:15:14.820",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMCommon.asmx function."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de cross site scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMCommon.asmx."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40511.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40511.json
index 2622cc4d2f8..5e95789a00d 100644
--- a/CVE-2024/CVE-2024-405xx/CVE-2024-40511.json
+++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40511.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-40511",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T14:15:04.343",
- "lastModified": "2024-09-27T17:35:05.557",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMServerAdmin.asmx function."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de cross site scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMServerAdmin.asmx."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40512.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40512.json
index 3db07420587..12b14b8f51f 100644
--- a/CVE-2024/CVE-2024-405xx/CVE-2024-40512.json
+++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40512.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-40512",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T14:15:04.423",
- "lastModified": "2024-09-27T17:35:06.970",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMReporting.asmx function."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de cross site scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMReporting.asmx."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json
index 9c75439f287..5c7449f782d 100644
--- a/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json
+++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4099.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-4099",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-09-26T23:15:02.873",
- "lastModified": "2024-09-26T23:15:02.873",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41605.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41605.json
index 68fa46e2e53..ad4013b6cba 100644
--- a/CVE-2024/CVE-2024-416xx/CVE-2024-41605.json
+++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41605.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-41605",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T16:15:08.240",
- "lastModified": "2024-09-27T13:15:13.227",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json
index 346ecdf3900..1d1511d93c7 100644
--- a/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json
+++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41715.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-41715",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:05.950",
- "lastModified": "2024-09-26T18:15:05.950",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json
index d4c7c5a4009..f7ffd4a6702 100644
--- a/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json
+++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41722.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-41722",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:06.193",
- "lastModified": "2024-09-26T18:15:06.193",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json
index 16e797a2d87..d0b973ae7a7 100644
--- a/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json
+++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-41930",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-27T09:15:03.550",
- "lastModified": "2024-09-27T09:15:03.550",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json
index 9310b51e348..b8e0c89cd6c 100644
--- a/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json
+++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41931.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-41931",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:06.453",
- "lastModified": "2024-09-26T18:15:06.453",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41999.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41999.json
index 2202941407f..13ec412de5a 100644
--- a/CVE-2024/CVE-2024-419xx/CVE-2024-41999.json
+++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41999.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-41999",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-30T08:15:03.210",
- "lastModified": "2024-09-30T08:15:03.210",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Smart-tab Android app installed April 2023 or earlier contains an active debug code vulnerability. If this vulnerability is exploited, an attacker with physical access to the device may exploit the debug function to gain access to the OS functions, escalate the privilege, change the device's settings, or spoof devices in other rooms."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n Smart-tab para Android instalada en abril de 2023 o antes contiene una vulnerabilidad de c\u00f3digo de depuraci\u00f3n activa. Si se aprovecha esta vulnerabilidad, un atacante con acceso f\u00edsico al dispositivo puede aprovechar la funci\u00f3n de depuraci\u00f3n para obtener acceso a las funciones del sistema operativo, aumentar los privilegios, cambiar la configuraci\u00f3n del dispositivo o falsificar dispositivos en otras habitaciones."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json
index 3fd9e0edfdc..874d1e6ba8f 100644
--- a/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json
+++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42272.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-42272",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:08.370",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:40:21.843",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,31 +15,143 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: sched: act_ct: cuida el relleno en struct zonas_ht_key El commit culpada aument\u00f3 el tama\u00f1o de la clave de b\u00fasqueda de 2 bytes a 16 bytes, porque zonas_ht_key obtuvo un puntero de red de estructura. Aseg\u00farese de que rhashtable_lookup() no est\u00e9 utilizando los bytes de relleno que no est\u00e1n inicializados. ERROR: KMSAN: valor uninit en rht_ptr_rcu include/linux/rhashtable.h:376 [en l\u00ednea] ERROR: KMSAN: valor uninit en __rhashtable_lookup include/linux/rhashtable.h:607 [en l\u00ednea] ERROR: KMSAN: valor uninit en rhashtable_lookup include/linux/rhashtable.h:646 [en l\u00ednea] ERROR: KMSAN: valor uninit en rhashtable_lookup_fast include/linux/rhashtable.h:672 [en l\u00ednea] ERROR: KMSAN: valor uninit en tcf_ct_flow_table_get+0x611/0x2260 net/sched /act_ct.c:329 rht_ptr_rcu include/linux/rhashtable.h:376 [en l\u00ednea] __rhashtable_lookup include/linux/rhashtable.h:607 [en l\u00ednea] rhashtable_lookup include/linux/rhashtable.h:646 [en l\u00ednea] rhashtable_lookup_fast include/linux/ rhashtable.h:672 [en l\u00ednea] tcf_ct_flow_table_get+0x611/0x2260 net/sched/act_ct.c:329 tcf_ct_init+0xa67/0x2890 net/sched/act_ct.c:1408 tcf_action_init_1+0x6cc/0xb30 net/sched/act_api.c:1425 tcf_action_init+0x458/0xf00 net/sched/act_api.c:1488 tcf_action_add net/sched/act_api.c:2061 [en l\u00ednea] tc_ctl_action+0x4be/0x19d0 net/sched/act_api.c:2118 rtnetlink_rcv_msg+0x12fc/0x1410 net /n\u00facleo/ rtnetlink.c:6647 netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2550 rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6665 netlink_unicast_kernel net/netlink/af_netlink.c:1331 [en l\u00ednea] netlink_unicast+0xf52/ 0x1260 net/netlink/af_netlink.c:1357 netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x30f/0x380 net/socket.c:745 ____sys_s mensaje final+0x877 /0xb60 net/socket.c:2597 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2651 __sys_sendmsg net/socket.c:2680 [en l\u00ednea] __do_sys_sendmsg net/socket.c:2689 [en l\u00ednea] __se_sys_sendmsg net/socket. c: 2687 [en l\u00ednea] __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2687 x64_sys_call+0x2dd6/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea ] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x77/0x7f Clave de variable local creada en: tcf_ct_flow_table_get+0x4a/0x2260 net/sched/act_ct.c:324 tcf_ct_init+0xa67/0x2890 net /programado /act_ct.c:1408"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-908"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.10.221",
+ "versionEndExcluding": "5.10.224",
+ "matchCriteriaId": "301A0246-1161-4A6B-908F-525515AD5B20"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.15.162",
+ "versionEndExcluding": "5.15.165",
+ "matchCriteriaId": "11D5C434-764B-4DCC-80A5-5AFDA2AEB21B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.1.96",
+ "versionEndExcluding": "6.1.104",
+ "matchCriteriaId": "8D4BD3E8-CDA7-40DB-8B42-051B214E2DE3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.6.36",
+ "versionEndExcluding": "6.6.45",
+ "matchCriteriaId": "E7A8DCF2-5022-498A-896B-D47AD8E08E9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.9.7",
+ "versionEndExcluding": "6.10",
+ "matchCriteriaId": "FA5E7970-A460-40EE-9BDE-6FFF21149DDA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.10",
+ "versionEndExcluding": "6.10.4",
+ "matchCriteriaId": "58294AC2-8D9E-4C90-B6EC-7C210C28ECB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/2191a54f63225b548fd8346be3611c3219a24738",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/3a5b68869dbe14f1157c6a24ac71923db060eeab",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/3ddefcb8f75e312535e2e7d5fef9932019ba60f2",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/7c03ab555eb1ba26c77fd7c25bdf44a0ac23edee",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/d06daf0ad645d9225a3ff6958dd82e1f3988fa64",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/d7cc186d0973afce0e1237c37f7512c01981fb79",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json
index fbcd21a3797..7ea452f2d16 100644
--- a/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json
+++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42278.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-42278",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:08.813",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:53:36.420",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,19 +15,96 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: TAS2781: Fix tasdev_load_calibrated_data() Esta funci\u00f3n tiene una declaraci\u00f3n if invertida, por lo que no funciona o conduce a una desreferencia NULL."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.6.33",
+ "versionEndExcluding": "6.6.44",
+ "matchCriteriaId": "720C4410-E38F-4060-A8CD-338FBB4CF4B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.9.4",
+ "versionEndExcluding": "6.10",
+ "matchCriteriaId": "1AD9A837-E824-444A-8442-914E09BE6199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.10",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "21DC7A88-E88C-4C44-9AFB-CBB30134097C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/51be301d29d674ff328dfcf23705851f326f35b3",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/6d98741dbd1309a6f2d7cffbb10a8f036ec3ca06",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/92c78222168e9035a9bfb8841c2e56ce23e51f73",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json
index 6ccfa6016df..8ecfcf831a1 100644
--- a/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json
+++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42297.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-42297",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:10.147",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:41:26.463",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,39 +15,130 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: f2fs: soluci\u00f3n para no ensuciar el inodo para el sistema de archivos de solo lectura syzbot informa el error de f2fs como se muestra a continuaci\u00f3n: \u00a1ERROR del kernel en fs/f2fs/inode.c:933! RIP: 0010:f2fs_evict_inode+0x1576/0x1590 fs/f2fs/inode.c:933 Seguimiento de llamadas: desalojar+0x2a4/0x620 fs/inode.c:664 dispose_list fs/inode.c:697 [en l\u00ednea] evict_inodes+0x5f8/0x690 fs /inode.c:747 generic_shutdown_super+0x9d/0x2c0 fs/super.c:675 kill_block_super+0x44/0x90 fs/super.c:1667 kill_f2fs_super+0x303/0x3b0 fs/f2fs/super.c:4894 desactivar_locked_super+0xc1/0x130 fs /super.c:484 cleanup_mnt+0x426/0x4c0 fs/namespace.c:1256 task_work_run+0x24a/0x300 kernel/task_work.c:180 ptrace_notify+0x2cd/0x380 kernel/signal.c:2399 ptrace_report_syscall include/linux/ptrace.h :411 [en l\u00ednea] ptrace_report_syscall_exit include/linux/ptrace.h:473 [en l\u00ednea] syscall_exit_work kernel/entry/common.c:251 [en l\u00ednea] syscall_exit_to_user_mode_prepare kernel/entry/common.c:278 [en l\u00ednea] __syscall_exit_to_user_mode_work kernel/entry/common .c:283 [inline] syscall_exit_to_user_mode+0x15c/0x280 kernel/entry/common.c:296 do_syscall_64+0x50/0x110 arch/x86/entry/common.c:88 entry_SYSCALL_64_after_hwframe+0x63/0x6b The root cause is: - do_sys_open - f2fs_lookup - __f2fs_find_entry - f2fs_i_ Depth_write - f2fs_mark_inode_dirty_sync - f2fs_dirty_inode - set_inode_flag(inode, FI_DIRTY_INODE) - umount - kill_f2fs_super - kill_block_super - generic_shutdown_super - sync_filesystem: sb es de solo lectura, omitir sync_file sistema() - evict_inodes - iput - f2fs_evict_inode - f2fs_bug_on(sbi, is_inode_flag_set(inodo, FI_DIRTY_INODE)): desencadena el p\u00e1nico en el kernel Cuando intentamos reparar i_current_ Depth en un sistema de archivos de solo lectura, omitamos el inodo sucio para evitar el p\u00e1nico en f2fs_evict_inode()."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.1.103",
+ "matchCriteriaId": "5C41F9D9-FD77-4351-9E80-31CDB3FB794F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.2",
+ "versionEndExcluding": "6.6.44",
+ "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/192b8fb8d1c8ca3c87366ebbef599fa80bb626b8",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/2434344559f6743efb3ac15d11af9a0db9543bd3",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/2d2916516577f2239b3377d9e8d12da5e6ccdfcf",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/54162974aea37a8cae00742470a78c7f6bd6f915",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/54bc4e88447e385c4d4ffa85d93e0dce628fcfa6",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/9ce8135accf103f7333af472709125878704fdd4",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/e62ff092a42f4a1bae3b310cf46673b4f3aac3b5",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/ec56571b4b146a1cfbedab49d5fcaf19fe8bf4f1",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json
index 6b7c301183e..be945dd2ccb 100644
--- a/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json
+++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42320.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-42320",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T09:15:11.833",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:54:12.897",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/dasd: corrige comprobaciones de errores en dasd_copy_pair_store() dasd_add_busid() puede devolver un error a trav\u00e9s de ERR_PTR() si falla una asignaci\u00f3n. Sin embargo, dos sitios de llamada en dasd_copy_pair_store() no verifican el resultado, lo que podr\u00eda provocar una desreferencia del puntero NULL. Solucione este problema verificando el resultado con IS_ERR() y devolviendo el error en la pila."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.1",
+ "versionEndExcluding": "6.1.103",
+ "matchCriteriaId": "81F7EA03-5805-43D2-9A78-820250B70B32"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.2",
+ "versionEndExcluding": "6.6.44",
+ "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/68d4c3722290ad300c295fb3435e835d200d5cb2",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/8e64d2356cbc800b4cd0e3e614797f76bcf0cdb8",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/cc8b7284d5076722e0b8062373b68d8e47c3bace",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/e511167e65d332d07b3c7a3d5a741ee9c19a8c27",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42496.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42496.json
index 82ba5e90eb2..da239a9a327 100644
--- a/CVE-2024/CVE-2024-424xx/CVE-2024-42496.json
+++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42496.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-42496",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-30T08:15:03.553",
- "lastModified": "2024-09-30T08:15:03.553",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Smart-tab Android app installed April 2023 or earlier contains an issue with plaintext storage of a password. If this vulnerability is exploited, an attacker with physical access to the device may retrieve the credential information and spoof the device to access the related external service."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n Smart-tab para Android instalada en abril de 2023 o antes contiene un problema con el almacenamiento de texto plano de una contrase\u00f1a. Si se aprovecha esta vulnerabilidad, un atacante con acceso f\u00edsico al dispositivo puede recuperar la informaci\u00f3n de credenciales y falsificar el dispositivo para acceder al servicio externo relacionado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json
index fb7c41747a2..e70284d8b75 100644
--- a/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json
+++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43108.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43108",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:06.713",
- "lastModified": "2024-09-26T18:15:06.713",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json
index 38f0a16d448..d710a024378 100644
--- a/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json
+++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43191.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43191",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-09-26T16:15:08.347",
- "lastModified": "2024-09-26T16:15:08.347",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json
index 2a0fb84d150..5017388840d 100644
--- a/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json
+++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43201.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43201",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-09-23T20:15:04.973",
- "lastModified": "2024-09-26T13:32:55.343",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:55:38.390",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ },
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
@@ -84,6 +104,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ },
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
@@ -95,14 +125,56 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:planetfitness:planet_fitness_workouts:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "9.8.12",
+ "matchCriteriaId": "F93B99AE-0F4C-4F84-BA83-050AB739D639"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://apps.apple.com/us/app/planet-fitness-workouts/id399857015",
- "source": "9119a7d8-5eab-497f-8521-727c672e3725"
+ "source": "9119a7d8-5eab-497f-8521-727c672e3725",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://dontvacuum.me/bugs/pf/",
- "source": "9119a7d8-5eab-497f-8521-727c672e3725"
+ "source": "9119a7d8-5eab-497f-8521-727c672e3725",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json
index 22a65e7a254..e5b1eb52555 100644
--- a/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json
+++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43694.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43694",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:06.960",
- "lastModified": "2024-09-26T18:15:06.960",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json
index 5605c277eb0..4852385d017 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43814.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43814",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:07.207",
- "lastModified": "2024-09-26T18:15:07.207",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json
index 83a332bb340..2cce55162e9 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43825.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43825",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:08.533",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:53:21.440",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iio: corrigi\u00f3 la funcionalidad de clasificaci\u00f3n en iio_gts_build_avail_time_table La clasificaci\u00f3n en iio_gts_build_avail_time_table no funciona seg\u00fan lo previsto. Podr\u00eda resultar en un acceso fuera de los l\u00edmites cuando el tiempo sea cero. Aqu\u00ed hay m\u00e1s detalles: 1. Cuando gts->itime_table[i].time_us es cero, por ejemplo, la secuencia de tiempo es `3, 0, 1`, el bucle for interno no terminar\u00e1 y funcionar\u00e1 fuera de l\u00edmite. Esto se debe a que una vez `times[j] > new`, el valor `new` se agregar\u00e1 en la posici\u00f3n actual y `times[j]` se mover\u00e1 a la posici\u00f3n `j+1`, lo que hace que la condici\u00f3n if aguanta siempre. Mientras tanto, se agregar\u00e1 uno a idx, lo que har\u00e1 que el bucle siga ejecut\u00e1ndose sin terminaci\u00f3n ni escritura fuera de los l\u00edmites. 2. Si ninguno de los gts->itime_table[i].time_us es cero, los elementos simplemente se copiar\u00e1n sin ordenarse como se describe en el comentario \"Ordenar tiempos de todas las tablas a una y eliminar duplicados\". Para obtener m\u00e1s detalles, consulte https://lore.kernel.org/all/6dd0d822-046c-4dd2-9532-79d7ab96ec05@gmail.com."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.4",
+ "versionEndExcluding": "6.6.44",
+ "matchCriteriaId": "CD8C07C9-5A22-4C32-908B-211B58A46875"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/31ff8464ef540785344994986a010031410f9ff3",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/5acc3f971a01be48d5ff4252d8f9cdb87998cdfb",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/b5046de32fd1532c3f67065197fc1da82f0b5193",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json
index 25e88a17c0d..b20b2bb7687 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43827.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43827",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:08.653",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:51:34.970",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: agregar verificaci\u00f3n nula antes de acceder a las estructuras. En enable_phantom_plane, ser\u00eda mejor verificar el puntero nulo antes de acceder a varias estructuras."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.8",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "38E515B9-DAD5-4A5A-9C4C-1B6873D3185A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/081ff4c0ef1884ae55f7adb8944efd22e22d8724",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/c96140000915b610d86f941450e15ca552de154a",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json
index 7c1b488b227..024f5ca123b 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43829.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43829",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:08.787",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:51:56.770",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,35 +15,124 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/qxl: Agregar verificaci\u00f3n para drm_cvt_mode Agregar verificaci\u00f3n para el valor de retorno de drm_cvt_mode() y devolver el error si falla para evitar la desreferencia del puntero NULL."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.1",
+ "versionEndExcluding": "6.1.103",
+ "matchCriteriaId": "FB327727-E3BB-4E46-A8EC-12AD13E62544"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.2",
+ "versionEndExcluding": "6.6.44",
+ "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/3efe34f95b1ac8c138a46b14ce75956db0d6ee7c",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/4b1f303bdeceac049e56e4b20eb5280bd9e02f4f",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/4e87f592a46bb804d8f833da6ce702ae4b55053f",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/62ef8d7816c8e4a6088275553818b9afc0ffaa03",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/7bd09a2db0f617377027a2bb0b9179e6959edff3",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/d4c57354a06cb4a77998ff8aa40af89eee30e07b",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/f28b353c0c6c7831a70ccca881bf2db5e6785cdd",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json
index 5e870a3a59c..3b23f38949e 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43842.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43842",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:09.647",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:55:17.007",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw89: corrige el error de \u00edndice de matriz en rtw89_sta_info_get_iter() En rtw89_sta_info_get_iter() 'status->he_gi' se compara con el tama\u00f1o de la matriz. Pero luego se usa 'rate->he_gi' como \u00edndice de matriz en lugar de 'status->he_gi'. Esto puede llevar a ir m\u00e1s all\u00e1 de los l\u00edmites de la matriz en caso de que 'rate->he_gi' no sea igual a 'status->he_gi' y sea mayor que el tama\u00f1o de la matriz. Parece un error de \"copiar y pegar\". Corrija este error reemplazando 'rate->he_gi' con 'status->he_gi'. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-129"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.16",
+ "versionEndExcluding": "6.1.103",
+ "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.2",
+ "versionEndExcluding": "6.6.44",
+ "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json
index b544687c1cf..b7596e405c2 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43850.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-43850",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-17T10:15:10.157",
- "lastModified": "2024-08-19T12:59:59.177",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:57:33.400",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: soc: qcom: icc-bwmon: corrige el desequilibrio de recuento visto durante bwmon_remove La siguiente advertencia se ve durante bwmon_remove debido a un desequilibrio de recuento; solucione esto liberando los OPP despu\u00e9s de su uso. Registros: ADVERTENCIA: en drivers/opp/core.c:1640 _opp_table_kref_release+0x150/0x158 Nombre del hardware: Qualcomm Technologies, Inc. X1E80100 CRD (DT) ... Seguimiento de llamadas: _opp_table_kref_release+0x150/0x158 dev_pm_opp_remove_table+0x100/0x1b4 devm_pm_ opp_of_table_release+ 0x10/0x1c devm_action_release+0x14/0x20 devres_release_all+0xa4/0x104 dispositivo_unbind_cleanup+0x18/0x60 dispositivo_release_driver_internal+0x1ec/0x228 driver_detach+0x50/0x98 bus_remove_driver+0x6c/0xbc driver_unregister+0x30 /0x60 plataforma_driver_unregister+0x14/0x20 bwmon_driver_exit+0x18/0x524 [icc_bwmon ] __arm64_sys_delete_module+0x184/0x264 invoke_syscall+0x48/0x118 el0_svc_common.constprop.0+0xc8/0xe8 do_el0_svc+0x20/0x2c el0_svc+0x34/0xdc el0t_64_sync_handler+0x13 c/0x158 el0t_64_sync+0x190/0x194 --[ final de seguimiento 0000000000000000 ]---"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0",
+ "versionEndExcluding": "6.6.44",
+ "matchCriteriaId": "CE117457-3A46-40BF-AE08-482CBF310F21"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.3",
+ "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/24086640ab39396eb1a92d1cb1cd2f31b2677c52",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/4100d4d019f8e140be1d4d3a9d8d93c1285f5d1c",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/aad41f4c169bcb800ae88123799bdf8cdec3d366",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json
index b531602f28b..6c89d66b416 100644
--- a/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json
+++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44860.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-44860",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T17:15:03.713",
- "lastModified": "2024-09-26T18:35:09.097",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44910.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44910.json
index dafecfa8469..9bfbc66ffe0 100644
--- a/CVE-2024/CVE-2024-449xx/CVE-2024-44910.json
+++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44910.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-44910",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:14.907",
- "lastModified": "2024-09-27T15:15:14.907",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the AOS subsystem (crypto_aos.c)."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que NASA CryptoLib v1.3.0 contiene una lectura fuera de los l\u00edmites a trav\u00e9s del subsistema AOS (crypto_aos.c)."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44911.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44911.json
index 00736db65dc..bbc45a3a65f 100644
--- a/CVE-2024/CVE-2024-449xx/CVE-2024-44911.json
+++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44911.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-44911",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:14.990",
- "lastModified": "2024-09-27T15:15:14.990",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the TC subsystem (crypto_aos.c)."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que NASA CryptoLib v1.3.0 contiene una lectura fuera de los l\u00edmites a trav\u00e9s del subsistema TC (crypto_aos.c)."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44912.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44912.json
index 4a3871ce255..e2afced352a 100644
--- a/CVE-2024/CVE-2024-449xx/CVE-2024-44912.json
+++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44912.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-44912",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:15.063",
- "lastModified": "2024-09-27T15:15:15.063",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the TM subsystem (crypto_tm.c)."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que NASA CryptoLib v1.3.0 contiene una lectura fuera de los l\u00edmites a trav\u00e9s del subsistema TM (crypto_tm.c)."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json
index d54bc083c2c..7159b62a513 100644
--- a/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json
+++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45042.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45042",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T18:15:07.463",
- "lastModified": "2024-09-26T18:15:07.463",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json
index 7c2cb49e63b..745da23d217 100644
--- a/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json
+++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-45200",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-30T08:15:03.760",
- "lastModified": "2024-09-30T08:15:03.760",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Nintendo Mario Kart 8 Deluxe before 3.0.3, the LAN/LDN local multiplayer implementation allows a remote attacker to exploit a stack-based buffer overflow upon deserialization of session information via a malformed browse-reply packet, aka KartLANPwn. The victim is not required to join a game session with an attacker. The victim must open the \"Wireless Play\" (or \"LAN Play\") menu from the game's title screen, and an attacker nearby (LDN) or on the same LAN network as the victim can send a crafted reply packet to the victim's console. This enables a remote attacker to obtain complete denial-of-service on the game's process, or potentially, remote code execution on the victim's console. The issue is caused by incorrect use of the Nintendo Pia library,"
+ },
+ {
+ "lang": "es",
+ "value": "En Nintendo Mario Kart 8 Deluxe anterior a la versi\u00f3n 3.0.3, la implementaci\u00f3n del modo multijugador local LAN/LDN permite a un atacante remoto explotar un desbordamiento de b\u00fafer basado en pila tras la deserializaci\u00f3n de la informaci\u00f3n de la sesi\u00f3n a trav\u00e9s de un paquete de respuesta de exploraci\u00f3n mal formado, tambi\u00e9n conocido como KartLANPwn. No es necesario que la v\u00edctima se una a una sesi\u00f3n de juego con un atacante. La v\u00edctima debe abrir el men\u00fa \"Juego inal\u00e1mbrico\" (o \"Juego LAN\") desde la pantalla de t\u00edtulo del juego, y un atacante cercano (LDN) o en la misma red LAN que la v\u00edctima puede enviar un paquete de respuesta manipulado a la consola de la v\u00edctima. Esto permite a un atacante remoto obtener una denegaci\u00f3n de servicio completa en el proceso del juego o, potencialmente, la ejecuci\u00f3n remota de c\u00f3digo en la consola de la v\u00edctima. El problema se debe al uso incorrecto de la biblioteca Nintendo Pia,"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json
index 75b0475441c..5a1250f6ae1 100644
--- a/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json
+++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45299.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45299",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-06T13:15:05.253",
- "lastModified": "2024-09-06T16:46:26.830",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:48:22.930",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.2
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,6 +60,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-116"
+ }
+ ]
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -51,14 +81,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0-m5",
+ "matchCriteriaId": "4A86C937-5E17-42BE-AB2C-8D47FD56CAED"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/alfio-event/alf.io/commit/e7131c588f4ac31067a41d0e31e6a6a721b2ff4b",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/alfio-event/alf.io/security/advisories/GHSA-mcx6-25f8-8rqw",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json
index a78e75bd555..36f191b7538 100644
--- a/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json
+++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45374.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45374",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:07.687",
- "lastModified": "2024-09-26T18:15:07.687",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json
index d06d94f4fd8..02762625957 100644
--- a/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json
+++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45723.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45723",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:07.927",
- "lastModified": "2024-09-26T18:15:07.927",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45744.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45744.json
index c5dd015789d..604514d8171 100644
--- a/CVE-2024/CVE-2024-457xx/CVE-2024-45744.json
+++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45744.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-45744",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-09-27T16:15:04.940",
- "lastModified": "2024-09-27T17:15:12.993",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker could gain file system access using a separate vulnerability such as CVE-2024-45745.\u00a0At least version 7.1.3 is affected. Version 7.3 adds HashiCorp Vault integration that does not store external passwords locally."
+ },
+ {
+ "lang": "es",
+ "value": "TopQuadrant TopBraid EDG almacena credenciales externas de forma insegura. Un atacante autenticado con acceso al sistema de archivos puede leer edg-setup.properites y obtener el secreto para descifrar las contrase\u00f1as externas almacenadas en edg-vault.properties. Un atacante autenticado podr\u00eda obtener acceso al sistema de archivos utilizando una vulnerabilidad independiente como CVE-2024-45745. Al menos la versi\u00f3n 7.1.3 est\u00e1 afectada. La versi\u00f3n 7.3 agrega la integraci\u00f3n de HashiCorp Vault que no almacena las contrase\u00f1as externas de forma local."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45745.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45745.json
index 0607f047feb..d8c726ff473 100644
--- a/CVE-2024/CVE-2024-457xx/CVE-2024-45745.json
+++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45745.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-45745",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-09-27T16:15:05.037",
- "lastModified": "2024-09-27T17:15:13.167",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TopQuadrant TopBraid EDG before version 8.0.1 allows an authenticated attacker to upload an XML DTD file and execute JavaScript to read local files or access URLs (XXE). Fixed in 8.0.1 (bug fix: TBS-6721)."
+ },
+ {
+ "lang": "es",
+ "value": "TopQuadrant TopBraid EDG anterior a la versi\u00f3n 8.0.1 permite que un atacante autenticado cargue un archivo DTD XML y ejecute JavaScript para leer archivos locales o acceder a URL (XXE). Corregido en la versi\u00f3n 8.0.1 (correcci\u00f3n de error: TBS-6721)."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45772.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45772.json
index 64a3b82bbb6..d86de0e0a27 100644
--- a/CVE-2024/CVE-2024-457xx/CVE-2024-45772.json
+++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45772.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-45772",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-30T09:15:02.670",
- "lastModified": "2024-09-30T09:15:02.670",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Apache Lucene Replicator.\n\nThis issue affects Apache Lucene's replicator module: from 4.4.0 before 9.12.0.\nThe deprecated org.apache.lucene.replicator.http package is affected.\nThe org.apache.lucene.replicator.nrt package is not affected.\n\nUsers are recommended to upgrade to version 9.12.0, which fixes the issue.\n\nJava serialization filters (such as\u00a0-Djdk.serialFilter='!*' on the commandline) can mitigate the issue on vulnerable versions without impacting functionality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Lucene Replicator. Este problema afecta al m\u00f3dulo replicador de Apache Lucene: desde la versi\u00f3n 4.4.0 hasta la 9.12.0. El paquete obsoleto org.apache.lucene.replicator.http est\u00e1 afectado. El paquete org.apache.lucene.replicator.nrt no est\u00e1 afectado. Se recomienda a los usuarios que actualicen a la versi\u00f3n 9.12.0, que soluciona el problema. Los filtros de serializaci\u00f3n de Java (como -Djdk.serialFilter='!*' en la l\u00ednea de comandos) pueden mitigar el problema en las versiones vulnerables sin afectar la funcionalidad."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45773.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45773.json
index 006776aaa7b..437c824829e 100644
--- a/CVE-2024/CVE-2024-457xx/CVE-2024-45773.json
+++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45773.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-45773",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2024-09-27T14:15:04.503",
- "lastModified": "2024-09-27T15:35:02.620",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability involving upgradeToRocket requests can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2024.09.09.00."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de use-after-free que involucra solicitudes upgradeToRocket puede provocar que la aplicaci\u00f3n se bloquee o que se ejecute c\u00f3digo u otros efectos no deseados. Este problema afecta a Facebook Thrift antes de la versi\u00f3n v2024.09.09.00."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json
index 01030344216..364a60666a7 100644
--- a/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json
+++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45838.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45838",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:08.170",
- "lastModified": "2024-09-26T18:15:08.170",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45863.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45863.json
index 87b91dfbfa9..580bde75882 100644
--- a/CVE-2024/CVE-2024-458xx/CVE-2024-45863.json
+++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45863.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-45863",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2024-09-27T14:15:04.567",
- "lastModified": "2024-09-27T15:35:02.800",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A null-dereference vulnerability involving parsing requests specifying invalid protocols can cause the application to crash or potentially result in other undesirable effects. This issue affects Facebook Thrift from v2024.09.09.00 until v2024.09.23.00."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de desreferencia nula que implica el an\u00e1lisis de solicitudes que especifican protocolos no v\u00e1lidos puede provocar que la aplicaci\u00f3n se bloquee o potencialmente tener otros efectos no deseados. Este problema afecta a Facebook Thrift desde la versi\u00f3n v2024.09.09.00 hasta la v2024.09.23.00."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45920.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45920.json
new file mode 100644
index 00000000000..cf6d3b00ebd
--- /dev/null
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45920.json
@@ -0,0 +1,21 @@
+{
+ "id": "CVE-2024-45920",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-09-30T13:15:02.450",
+ "lastModified": "2024-09-30T13:15:02.450",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A Stored Cross-Site Scripting (XSS) vulnerability in Solvait 24.4.2 allows remote attackers to inject malicious scripts into the application. This issue arises due to insufficient input validation and sanitization in \"Intrest\" feature."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/ipxsec/10526db2cbfcb899a70dcb8f0ee53a99",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json
index 94a0d3940ee..2a19b1b74e5 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45979.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45979",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T17:15:03.813",
- "lastModified": "2024-09-26T19:35:18.603",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json
index f202ab057eb..44d1a188325 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45980.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45980",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T17:15:03.917",
- "lastModified": "2024-09-26T19:35:19.337",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json
index b02d5e33ce3..824049858dd 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45981.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45981",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T17:15:04.003",
- "lastModified": "2024-09-26T19:35:20.077",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json
index b916e372716..bf30b0e46f8 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45982.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45982",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T17:15:04.100",
- "lastModified": "2024-09-26T21:35:21.020",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json
index 4b7faa514be..f52621cabd0 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45983.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45983",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T16:15:08.653",
- "lastModified": "2024-09-26T19:35:20.827",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json
index 17d9680a44a..3657bf463a0 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45984.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45984",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T18:15:08.420",
- "lastModified": "2024-09-26T19:35:21.550",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json
index 0f4bdf96768..69f5513b9bd 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45985.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45985",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T18:15:08.497",
- "lastModified": "2024-09-26T18:35:10.080",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json
index aaccaab73c5..47f96107378 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45986.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45986",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T21:15:07.663",
- "lastModified": "2024-09-26T21:35:21.760",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json
index de5056ff1cd..1c8f5096a79 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45987.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T18:15:08.583",
- "lastModified": "2024-09-26T18:15:08.583",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json
index e5be4d39d7a..b8be70cec9c 100644
--- a/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json
+++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-45989",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T18:15:08.667",
- "lastModified": "2024-09-27T15:35:02.983",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json
index 4ca916b87f7..9fa9a174539 100644
--- a/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json
+++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46097.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46097",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T18:15:05.687",
- "lastModified": "2024-09-27T20:35:12.027",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges."
+ },
+ {
+ "lang": "es",
+ "value": "TestLink 1.9.20 es vulnerable a un Control de Acceso Incorrecto en la secci\u00f3n de edici\u00f3n de TestPlan. Cuando se crea un nuevo TestPlan, se genera autom\u00e1ticamente un ID con un valor incremental. Mediante la funci\u00f3n de edici\u00f3n se puede cambiar el par\u00e1metro tplan_id por otro ID. La aplicaci\u00f3n no realiza una comprobaci\u00f3n de los permisos del usuario, por lo que es posible recuperar los ID de todos los TestPlans (incluso los administrativos) y modificarlos incluso con privilegios m\u00ednimos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json
index 29a73733fdc..f0ef7dafc24 100644
--- a/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json
+++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46256.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46256",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T18:15:05.787",
- "lastModified": "2024-09-27T18:15:05.787",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Command injection vulnerability in requestLetsEncryptSsl in NginxProxyManager 2.11.3 allows an attacker to RCE via Add Let's Encrypt Certificate."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de inyecci\u00f3n de comando en requestLetsEncryptSsl en NginxProxyManager 2.11.3 permite a un atacante realizar una RCE a trav\u00e9s de Agregar certificado Let's Encrypt."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json
index 7b8167521aa..63d75ee410d 100644
--- a/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json
+++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46257.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46257",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T18:15:05.870",
- "lastModified": "2024-09-27T18:15:05.870",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Command injection vulnerability in requestLetsEncryptSslWithDnsChallenge in NginxProxyManager 2.11.3 allows an attacker to achieve remote code execution via Add Let's Encrypt Certificate. NOTE: this is not part of any NGINX software shipped by F5."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de inyecci\u00f3n de comandos en requestLetsEncryptSslWithDnsChallenge en NginxProxyManager 2.11.3 permite que un atacante logre la ejecuci\u00f3n remota de c\u00f3digo mediante la adici\u00f3n de un certificado Let's Encrypt. NOTA: esto no forma parte de ning\u00fan software NGINX distribuido por F5."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json
index e73c83ca311..f93ac4480a2 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46327.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46327",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.173",
- "lastModified": "2024-09-26T15:35:24.607",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json
index 2f683ba7c9b..8c50fef9378 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46328.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46328",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.273",
- "lastModified": "2024-09-26T15:35:25.783",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json
index 33c31eac308..7afc82a58b6 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46329.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46329",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.360",
- "lastModified": "2024-09-26T15:35:27.397",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json
index 7107ec26229..ff49e97c785 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46330.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46330",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.433",
- "lastModified": "2024-09-26T15:35:28.713",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46331.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46331.json
index e78cb962c69..a9ddb92f4ac 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46331.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46331.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46331",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:15.200",
- "lastModified": "2024-09-27T17:35:09.747",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ModStartCMS v8.8.0 was discovered to contain an open redirect vulnerability in the redirect parameter at /admin/login. This vulnerability allows attackers to redirect users to an arbitrary website via a crafted URL."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que ModStartCMS v8.8.0 contiene una vulnerabilidad de redirecci\u00f3n abierta en el par\u00e1metro redirect en /admin/login. Esta vulnerabilidad permite a los atacantes redirigir a los usuarios a un sitio web arbitrario a trav\u00e9s de una URL manipulada por un usuario."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46333.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46333.json
index 88ee90227ee..71fbe9449b7 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46333.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46333.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46333",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:15.283",
- "lastModified": "2024-09-27T17:35:11.090",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated cross-site scripting (XSS) vulnerability in Piwigo v14.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Album Name parameter under the Add Album function."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cross site scripting (XSS) autenticada en Piwigo v14.5.0 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload manipulado e inyectado en el par\u00e1metro Nombre del \u00e1lbum bajo la funci\u00f3n Agregar \u00e1lbum."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json
index 685de69e0f5..88dd7409642 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46366.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46366",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T17:15:13.400",
- "lastModified": "2024-09-27T20:35:12.770",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de inyecci\u00f3n de plantilla del lado del cliente (CSTI) en Webkul Krayin CRM 1.3.0 permite a atacantes remotos ejecutar c\u00f3digo de plantilla arbitrario del lado del cliente mediante la inyecci\u00f3n de un payload malicioso durante el proceso de creaci\u00f3n de clientes potenciales. Esto puede provocar una escalada de privilegios cuando se ejecuta payload, lo que otorga al atacante permisos elevados dentro del sistema CRM."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json
index 740e6b45c21..5c676c29967 100644
--- a/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json
+++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46367.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46367",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T17:15:13.487",
- "lastModified": "2024-09-27T20:35:13.517",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to inject arbitrary JavaScript code by submitting a malicious payload within the username field. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en Webkul Krayin CRM 1.3.0 permite a atacantes remotos inyectar c\u00f3digo JavaScript arbitrario mediante el env\u00edo de un payload malicioso dentro del campo de nombre de usuario. Esto puede provocar una escalada de privilegios cuando se ejecuta la carga, lo que otorga al atacante permisos elevados dentro del sistema CRM."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json
index 0181517e23e..ce7abf495a8 100644
--- a/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json
+++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46441",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T13:15:13.397",
- "lastModified": "2024-09-27T15:35:03.803",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in YPay 1.2.0 allows attackers to execute arbitrary code via a ZIP archive to themePutFile in app/common/util/Upload.php (called from app/admin/controller/ypay/Home.php). The file extension of an uncompressed file is not checked."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de carga de archivos arbitrarios en YPay 1.2.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo ZIP en themePutFile en app/common/util/Upload.php (llamado desde app/admin/controller/ypay/Home.php). No se verifica la extensi\u00f3n de archivo de un archivo sin comprimir."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json
index e93e6d3ee6b..c810fb6f2af 100644
--- a/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json
+++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46453",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T21:15:03.350",
- "lastModified": "2024-09-27T21:15:03.350",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the component /test/ of iq3xcite v2.31 to v3.05 allows attackers to execute arbitrary web scripts or HTML via a crafted payload."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cross site scripting (XSS) en el componente /test/ de iq3xcite v2.31 a v3.05 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46470.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46470.json
index f60d97ef8c9..865d4bdaed6 100644
--- a/CVE-2024/CVE-2024-464xx/CVE-2024-46470.json
+++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46470.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46470",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:15.393",
- "lastModified": "2024-09-27T17:35:12.203",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in CodeAstro Membership Management System 1.0 allows attackers to run malicious JavaScript via the membership_type field in the edit-type.php component."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de cross site scripting en CodeAstro Membership Management System 1.0 permite a los atacantes ejecutar JavaScript malicioso a trav\u00e9s del campo membership_type en el componente edit-type.php."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46471.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46471.json
index 6b552005f42..a68702b022f 100644
--- a/CVE-2024/CVE-2024-464xx/CVE-2024-46471.json
+++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46471.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46471",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:15.483",
- "lastModified": "2024-09-27T17:35:13.333",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Directory Listing in /uploads/ Folder in CodeAstro Membership Management System 1.0 exposes the structure and contents of directories, potentially revealing sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "El listado de directorios en la carpeta /uploads/ en CodeAstro Membership Management System 1.0 expone la estructura y el contenido de los directorios, revelando potencialmente informaci\u00f3n confidencial."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46472.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46472.json
index aaea28adb4c..8cb1ac9bf45 100644
--- a/CVE-2024/CVE-2024-464xx/CVE-2024-46472.json
+++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46472.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46472",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T15:15:15.567",
- "lastModified": "2024-09-27T16:35:02.850",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection via the parameter 'email' in the Login Page."
+ },
+ {
+ "lang": "es",
+ "value": "CodeAstro Membership Management System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'email' en la p\u00e1gina de inicio de sesi\u00f3n."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json
index f62d9dd7939..9703e69b216 100644
--- a/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json
+++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46627",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T17:15:04.190",
- "lastModified": "2024-09-27T15:35:04.583",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json
index 1e69f79cb87..ec5832ed548 100644
--- a/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json
+++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46628.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46628",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T20:15:06.857",
- "lastModified": "2024-09-26T21:35:22.537",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json
index df3fae829f8..aca84f3cac3 100644
--- a/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json
+++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46632.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46632",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T16:15:08.783",
- "lastModified": "2024-09-26T19:35:22.293",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json
index 8774044e61a..33403254a1d 100644
--- a/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json
+++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46714.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46714",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T07:15:03.060",
- "lastModified": "2024-09-20T12:30:51.220",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:50:27.723",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: omitir wbscl_set_scaler_filter si el filtro es nulo. Los llamadores pueden pasar un valor nulo en el filtro (es decir, del valor devuelto por la funci\u00f3n wbscl_get_filter_coeffs_16p) y se agrega una comprobaci\u00f3n de valores nulos para garantizar que ese no sea el caso. Esto soluciona 4 problemas de NULL_RETURNS informados por Coverity."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.4.284",
+ "matchCriteriaId": "B1C17E9C-479F-4AE4-8344-B7A213DE3E83"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.5",
+ "versionEndExcluding": "5.10.226",
+ "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.11",
+ "versionEndExcluding": "5.15.167",
+ "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.16",
+ "versionEndExcluding": "6.1.109",
+ "matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.2",
+ "versionEndExcluding": "6.6.50",
+ "matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.9",
+ "matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/0364f1f17a86d89dc39040beea4f099e60189f1b",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/1726914cb17cedab233820d26b86764dc08857b4",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/54834585e91cab13e9f82d3a811deb212a4df786",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/6d94c05a13fadd80c3e732f14c83b2632ebfaa50",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/c083c8be6bdd046049884bec076660d4ec9a19ca",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/c4d31653c03b90e51515b1380115d1aedad925dd",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/e3a95f29647ae45d1ec9541cd7df64f40bf2120a",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json
index a69682af8ed..4ea0509612f 100644
--- a/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json
+++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46727.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46727",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T07:15:03.840",
- "lastModified": "2024-09-20T12:30:51.220",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:49:43.097",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Agregar comprobaci\u00f3n NULL otg_master dentro de resource_log_pipe_topology_update [Por qu\u00e9] Coverity informa una advertencia NULL_RETURN. [C\u00f3mo] Agregar comprobaci\u00f3n NULL otg_master."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.10.9",
+ "matchCriteriaId": "24175937-56EC-4F8D-B998-C00E8F09D4A8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/871cd9d881fa791d3f82885000713de07041c0ae",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/aad4d3d3d3b6a362bf5db11e1f28c4a60620900d",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json
index df5dc5e743d..063040a19e7 100644
--- a/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json
+++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46730.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46730",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T07:15:04.003",
- "lastModified": "2024-09-20T12:30:51.220",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:49:00.333",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: garantizar que el \u00edndice de matriz tg_inst no sea -1 [POR QU\u00c9 Y C\u00d3MO] tg_inst ser\u00e1 negativo si timing_generator_count es igual a 0, lo que se debe comprobar antes de su uso. Esto soluciona 2 problemas de OVERRUN informados por Coverity."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-191"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.10.9",
+ "matchCriteriaId": "24175937-56EC-4F8D-B998-C00E8F09D4A8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/687fe329f18ab0ab0496b20ed2cb003d4879d931",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/a64284b9e1999ad5580debced4bc6d6adb28aad4",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json
index 3156fb3ed5e..29d93beb5d6 100644
--- a/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json
+++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46744.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46744",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:03.603",
- "lastModified": "2024-09-20T12:30:51.220",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:36:19.557",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,39 +15,173 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Squashfs: comprobaci\u00f3n de la integridad del tama\u00f1o del enlace simb\u00f3lico Syzkiller informa de un error \"KMSAN: uninit-value in pick_link\". Esto se debe a una p\u00e1gina no inicializada, que en \u00faltima instancia se debe a un tama\u00f1o de enlace simb\u00f3lico da\u00f1ado le\u00eddo desde el disco. La raz\u00f3n por la que el tama\u00f1o de enlace simb\u00f3lico da\u00f1ado provoca una p\u00e1gina no inicializada se debe a la siguiente secuencia de eventos: 1. Se llama a squashfs_read_inode() para leer el enlace simb\u00f3lico desde el disco. Esto asigna el valor da\u00f1ado 3875536935 a inode->i_size. 2. M\u00e1s tarde se llama a squashfs_symlink_read_folio(), que asigna este valor da\u00f1ado a la variable length, que, al ser un int con signo, se desborda produciendo un n\u00famero negativo. 3. El siguiente bucle que rellena el contenido de la p\u00e1gina comprueba que los bytes copiados sean menores que length, que, al ser negativo, significa que se omite el bucle, lo que produce una p\u00e1gina no inicializada. Este parche agrega una verificaci\u00f3n de cordura que verifica que el tama\u00f1o del enlace simb\u00f3lico no sea mayor al esperado. -- V2: corrige error ortogr\u00e1fico."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.19.322",
+ "matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.20",
+ "versionEndExcluding": "5.4.284",
+ "matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.5",
+ "versionEndExcluding": "5.10.226",
+ "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.11",
+ "versionEndExcluding": "5.15.167",
+ "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.16",
+ "versionEndExcluding": "6.1.110",
+ "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.2",
+ "versionEndExcluding": "6.6.51",
+ "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.10",
+ "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
+ "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/087f25b2d36adae19951114ffcbb7106ed405ebb",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/1b9451ba6f21478a75288ea3e3fca4be35e2a438",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/5c8906de98d0d7ad42ff3edf2cb6cd7e0ea658c4",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/810ee43d9cd245d138a2733d87a24858a23f577d",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/c3af7e460a526007e4bed1ce3623274a1a6afe5e",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/ef4e249971eb77ec33d74c5c3de1e2576faf6c90",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/f82cb7f24032ed023fc67d26ea9bf322d8431a90",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/fac5e82ab1334fc8ed6ff7183702df634bd1d93d",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json
index 38c377306f2..0f3c92a23d1 100644
--- a/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json
+++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46750.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46750",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:03.947",
- "lastModified": "2024-09-20T12:30:51.220",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:27:45.787",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,39 +15,158 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: Agregar bloqueo de puente faltante a pci_bus_lock() Uno de los verdaderos positivos que identific\u00f3 el esfuerzo de cfg_access_lock lockdep es esta secuencia: ADVERTENCIA: CPU: 14 PID: 1 en drivers/pci/pci.c:4886 pci_bridge_secondary_bus_reset+0x5d/0x70 RIP: 0010:pci_bridge_secondary_bus_reset+0x5d/0x70 Rastreo de llamada: ? __warn+0x8c/0x190 ? pci_bridge_secondary_bus_reset+0x5d/0x70 ? report_bug+0x1f8/0x200 ? handle_bug+0x3c/0x70 ? exc_invalid_op+0x18/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? pci_bridge_secondary_bus_reset+0x5d/0x70 pci_reset_bus+0x1d8/0x270 vmd_probe+0x778/0xa10 pci_device_probe+0x95/0x120 Donde los usuarios de pci_reset_bus() est\u00e1n activando reinicios de bus secundario desbloqueados. Ir\u00f3nicamente, pci_bus_reset(), varias llamadas despu\u00e9s de pci_reset_bus(), usa pci_bus_lock() antes de emitir el reinicio que bloquea todo *excepto* el puente mismo. Por la misma motivaci\u00f3n que agregar: bridge = pci_upstream_bridge(dev); if (bridge) pci_dev_lock(bridge); Para pci_reset_function() en los casos de reinicio de \"bus\" y \"cxl_bus\", agregue pci_dev_lock() para @bus->self a pci_bus_lock(). [bhelgaas: soluci\u00f3n de bloqueo recursivo de squash de Keith Busch: https://lore.kernel.org/r/20240711193650.701834-1-kbusch@meta.com]"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-667"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.19.322",
+ "matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.20",
+ "versionEndExcluding": "5.4.284",
+ "matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.5",
+ "versionEndExcluding": "5.10.226",
+ "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.11",
+ "versionEndExcluding": "5.15.167",
+ "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.16",
+ "versionEndExcluding": "6.1.110",
+ "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.2",
+ "versionEndExcluding": "6.6.51",
+ "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.7",
+ "versionEndExcluding": "6.10.10",
+ "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/04e85a3285b0e5c5af6fd2c0fd6e95ffecc01945",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/0790b89c7e911003b8c50ae50e3ac7645de1fae9",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/7253b4fed46471cc247c6cacefac890a8472c083",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/78c6e39fef5c428960aff742149bba302dd46f5a",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/81c68e218ab883dfa368460a59b674084c0240da",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/a4e772898f8bf2e7e1cf661a12c60a5612c4afab",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/df77a678c33871a6e4ac5b54a71662f1d702335b",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/e2355d513b89a2cb511b4ded0deb426cdb01acd0",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json
index 93f60e16c22..f4177a3b77c 100644
--- a/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json
+++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46751.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46751",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:04.010",
- "lastModified": "2024-09-20T12:30:51.220",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:45:56.957",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: no realizar BUG_ON() cuando hay 0 referencias en btrfs_lookup_extent_info() En lugar de realizar un BUG_ON(), maneje el error devolviendo -EUCLEAN, cancelando la transacci\u00f3n y registrando un mensaje de error."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.10.10",
+ "matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/28cb13f29faf6290597b24b728dc3100c019356f",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/ef9a8b73c8b60b27d9db4787e624a3438ffe8428",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json
index 7767d61c781..f687e2fd18f 100644
--- a/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json
+++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46769.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-46769",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:04.903",
- "lastModified": "2024-09-20T12:30:51.220",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T12:44:27.907",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -15,15 +15,105 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: intel: Agregar comprobaci\u00f3n del valor devuelto por devm_kasprintf() intel_spi_populate_chip() usa devm_kasprintf() para establecer pdata->name. Esto puede devolver un puntero NULL en caso de error, pero este valor devuelto no se comprueba."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.9",
+ "versionEndExcluding": "6.10.10",
+ "matchCriteriaId": "2CB7114B-59C6-4708-AE2C-B7C2D0BA0FA2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
+ "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
+ "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
+ "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
+ "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://git.kernel.org/stable/c/2920294686ec23211637998f3ec386dfd3d784a6",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/stable/c/6e68abdc5d674f9f4185bf1e1956368d05df4838",
- "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+ "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+ "tags": [
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46802.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46802.json
index 199f2003c85..dd6987d864c 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46802.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46802.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46802",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.483",
- "lastModified": "2024-09-27T13:15:13.483",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: added NULL check at start of dc_validate_stream\n\n[Why]\nprevent invalid memory access\n\n[How]\ncheck if dc and stream are NULL"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se agreg\u00f3 una comprobaci\u00f3n NULL al inicio de dc_validate_stream [Por qu\u00e9] evitar el acceso no v\u00e1lido a la memoria [C\u00f3mo] comprobar si dc y stream son NULL"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46803.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46803.json
index 458e60904be..850db7d678d 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46803.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46803.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46803",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.570",
- "lastModified": "2024-09-27T13:15:13.570",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Check debug trap enable before write dbg_ev_file\n\nIn interrupt context, write dbg_ev_file will be run by work queue. It\nwill cause write dbg_ev_file execution after debug_trap_disable, which\nwill cause NULL pointer access.\nv2: cancel work \"debug_event_workarea\" before set dbg_ev_file as NULL."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: comprobar la habilitaci\u00f3n de la trampa de depuraci\u00f3n antes de escribir dbg_ev_file En el contexto de interrupci\u00f3n, la cola de trabajo ejecutar\u00e1 la escritura dbg_ev_file. Esto provocar\u00e1 la ejecuci\u00f3n de la escritura dbg_ev_file despu\u00e9s de debug_trap_disable, lo que provocar\u00e1 el acceso al puntero NULL. v2: cancelar el trabajo \"debug_event_workarea\" antes de establecer dbg_ev_file como NULL."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46804.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46804.json
index 666d9c67f0e..de4b8b97dfb 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46804.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46804.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46804",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.637",
- "lastModified": "2024-09-27T13:15:13.637",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add array index check for hdcp ddc access\n\n[Why]\nCoverity reports OVERRUN warning. Do not check if array\nindex valid.\n\n[How]\nCheck msg_id valid and valid array index."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Agregar comprobaci\u00f3n de \u00edndice de matriz para acceso a ddc de hdcp [Por qu\u00e9] Coverity informa una advertencia de OVERRUN. No comprueba si el \u00edndice de matriz es v\u00e1lido. [C\u00f3mo] Comprueba que msg_id sea v\u00e1lido y que el \u00edndice de matriz sea v\u00e1lido."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json
index b26d74dfa92..0d901652e29 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46805",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.707",
- "lastModified": "2024-09-27T13:15:13.707",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix the waring dereferencing hive\n\nCheck the amdgpu_hive_info *hive that maybe is NULL."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: corrige la sub\u00e1rbol de desreferenciaci\u00f3n waring. Comprueba el sub\u00e1rbol *amdgpu_hive_info que puede ser NULL."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json
index 804a2ee66de..08ca98253b5 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46806",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.773",
- "lastModified": "2024-09-27T13:15:13.773",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix the warning division or modulo by zero\n\nChecks the partition mode and returns an error for an invalid mode."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Corrige la advertencia de divisi\u00f3n o m\u00f3dulo por cero. Comprueba el modo de partici\u00f3n y devuelve un error si el modo es inv\u00e1lido."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46807.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46807.json
index 2e09b4fac73..ffb3a8bd515 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46807.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46807.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46807",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.840",
- "lastModified": "2024-09-27T13:15:13.840",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/amdgpu: Check tbo resource pointer\n\nValidate tbo resource pointer, skip if NULL"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/amdgpu: Verificar el puntero de recurso tbo Validar el puntero de recurso tbo, omitir si es NULL"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46808.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46808.json
index c35767e71ae..9ac945f3055 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46808.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46808.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46808",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.907",
- "lastModified": "2024-09-27T13:15:13.907",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range\n\n[Why & How]\nASSERT if return NULL from kcalloc."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Agregar verificaci\u00f3n de puntero NULL faltante dentro de dpcd_extend_address_range [Por qu\u00e9 y c\u00f3mo] ASSERT si devuelve NULL desde kcalloc."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46809.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46809.json
index ed5a3d78f24..9466e8dbbf6 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46809.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46809.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46809",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:13.973",
- "lastModified": "2024-09-27T13:15:13.973",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check BIOS images before it is used\n\nBIOS images may fail to load and null checks are added before they are\nused.\n\nThis fixes 6 NULL_RETURNS issues reported by Coverity."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Verificar im\u00e1genes de BIOS antes de usarlas. Es posible que las im\u00e1genes de BIOS no se carguen y se agreguen verificaciones nulas antes de usarlas. Esto soluciona 6 problemas de NULL_RETURNS informados por Coverity."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46810.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46810.json
index bdaa5444eca..682fbf23f1a 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46810.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46810.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46810",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.037",
- "lastModified": "2024-09-27T13:15:14.037",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ\n\nMake sure the connector is fully initialized before signalling any\nHPD events via drm_kms_helper_hotplug_event(), otherwise this may\nlead to NULL pointer dereference."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/bridge: tc358767: Verifique si est\u00e1 completamente inicializado antes de se\u00f1alar el evento HPD a trav\u00e9s de IRQ Aseg\u00farese de que el conector est\u00e9 completamente inicializado antes de se\u00f1alar cualquier evento HPD a trav\u00e9s de drm_kms_helper_hotplug_event(), de lo contrario, esto puede provocar una desreferencia de puntero NULL."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46811.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46811.json
index 9bff3e627c8..a4dad7b977e 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46811.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46811.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46811",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.107",
- "lastModified": "2024-09-27T13:15:14.107",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box\n\n[Why]\nCoverity reports OVERRUN warning. soc.num_states could\nbe 40. But array range of bw_params->clk_table.entries is 8.\n\n[How]\nAssert if soc.num_states greater than 8."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: el \u00edndice de correcci\u00f3n puede exceder el rango de la matriz dentro de fpu_update_bw_bounding_box [Por qu\u00e9] Coverity informa una advertencia de OVERRUN. soc.num_states podr\u00eda ser 40. Pero el rango de la matriz de bw_params->clk_table.entries es 8. [C\u00f3mo] Confirmar si soc.num_states es mayor que 8."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46812.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46812.json
index 282f15f282a..24fbd74e101 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46812.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46812.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46812",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.163",
- "lastModified": "2024-09-27T13:15:14.163",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration\n\n[Why]\nCoverity reports Memory - illegal accesses.\n\n[How]\nSkip inactive planes."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Omitir planos inactivos dentro de ModeSupportAndSystemConfiguration [Por qu\u00e9] Coverity informa sobre accesos ilegales a la memoria. [C\u00f3mo] Omitir planos inactivos."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46813.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46813.json
index 3faff99e5c9..a28cd2e142f 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46813.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46813.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46813",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.230",
- "lastModified": "2024-09-27T13:15:14.230",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check link_index before accessing dc->links[]\n\n[WHY & HOW]\ndc->links[] has max size of MAX_LINKS and NULL is return when trying to\naccess with out-of-bound index.\n\nThis fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar link_index antes de acceder a dc->links[] [POR QU\u00c9 Y C\u00d3MO] dc->links[] tiene un tama\u00f1o m\u00e1ximo de MAX_LINKS y se devuelve NULL cuando se intenta acceder con un \u00edndice fuera de los l\u00edmites. Esto soluciona 3 problemas de OVERRUN y 1 RESOURCE_LEAK informados por Coverity."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46814.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46814.json
index 863f4af408d..4244ab175ad 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46814.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46814.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46814",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.297",
- "lastModified": "2024-09-27T13:15:14.297",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check msg_id before processing transcation\n\n[WHY & HOW]\nHDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid\narray index, and it needs checking before used.\n\nThis fixes 4 OVERRUN issues reported by Coverity."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Verificar msg_id antes de procesar la transacci\u00f3n [POR QU\u00c9 Y C\u00d3MO] HDCP_MESSAGE_ID_INVALID (-1) no es un msg_id v\u00e1lido ni tampoco es un \u00edndice de matriz v\u00e1lido, y es necesario verificarlo antes de usarlo. Esto soluciona 4 problemas de OVERRUN informados por Coverity."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46815.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46815.json
index eb6d621c894..5ea1cd18568 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46815.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46815.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46815",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.370",
- "lastModified": "2024-09-27T13:15:14.370",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]\n\n[WHY & HOW]\nnum_valid_sets needs to be checked to avoid a negative index when\naccessing reader_wm_sets[num_valid_sets - 1].\n\nThis fixes an OVERRUN issue reported by Coverity."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar num_valid_sets antes de acceder a reader_wm_sets[] [POR QU\u00c9 Y C\u00d3MO] Es necesario comprobar num_valid_sets para evitar un \u00edndice negativo al acceder a reader_wm_sets[num_valid_sets - 1]. Esto soluciona un problema de OVERRUN informado por Coverity."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46816.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46816.json
index cf17d678244..4b52860d75c 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46816.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46816.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46816",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.433",
- "lastModified": "2024-09-27T13:15:14.433",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links\n\n[Why]\nCoverity report OVERRUN warning. There are\nonly max_links elements within dc->links. link\ncount could up to AMDGPU_DM_MAX_DISPLAY_INDEX 31.\n\n[How]\nMake sure link count less than max_links."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de enlaces es mayor que max_links [Por qu\u00e9] Advertencia de OVERRUN en el informe de Coverity. Solo hay elementos max_links dentro de dc->links. El recuento de enlaces puede llegar a AMDGPU_DM_MAX_DISPLAY_INDEX 31. [C\u00f3mo] Aseg\u00farese de que el recuento de enlaces sea menor que max_links."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46817.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46817.json
index 3b23aa17ad8..959299847a2 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46817.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46817.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46817",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.493",
- "lastModified": "2024-09-27T13:15:14.493",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6\n\n[Why]\nCoverity reports OVERRUN warning. Should abort amdgpu_dm\ninitialize.\n\n[How]\nReturn failure to amdgpu_dm_init."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de secuencias es mayor que 6 [Por qu\u00e9] Coverity informa una advertencia de OVERRUN. Deber\u00eda abortar la inicializaci\u00f3n de amdgpu_dm. [C\u00f3mo] Devolver el error a amdgpu_dm_init."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46818.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46818.json
index 051dc3fc35a..47dfa09ae3b 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46818.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46818.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46818",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.563",
- "lastModified": "2024-09-27T13:15:14.563",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check gpio_id before used as array index\n\n[WHY & HOW]\nGPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore\nshould be checked in advance.\n\nThis fixes 5 OVERRUN issues reported by Coverity."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar gpio_id antes de usarlo como \u00edndice de matriz [POR QU\u00c9 Y C\u00d3MO] GPIO_ID_UNKNOWN (-1) no es un valor v\u00e1lido para el \u00edndice de matriz y, por lo tanto, se debe comprobar con antelaci\u00f3n. Esto soluciona 5 problemas de OVERRUN informados por Coverity."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46819.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46819.json
index d7acdc8a258..f8ab20a63f3 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46819.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46819.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46819",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.640",
- "lastModified": "2024-09-27T13:15:14.640",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: the warning dereferencing obj for nbio_v7_4\n\nif ras_manager obj null, don't print NBIO err data"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: la advertencia de desreferenciaci\u00f3n de obj para nbio_v7_4 si ras_manager obj es nulo, no imprime datos de error de NBIO"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46820.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46820.json
index 28b3f032120..5231b29898e 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46820.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46820.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46820",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.707",
- "lastModified": "2024-09-27T13:15:14.707",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/vcn: remove irq disabling in vcn 5 suspend\n\nWe do not directly enable/disable VCN IRQ in vcn 5.0.0.\nAnd we do not handle the IRQ state as well. So the calls to\ndisable IRQ and set state are removed. This effectively gets\nrid of the warining of\n \"WARN_ON(!amdgpu_irq_enabled(adev, src, type))\"\nin amdgpu_irq_put()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/vcn: eliminar la desactivaci\u00f3n de IRQ en la suspensi\u00f3n de VCN 5 No habilitamos/deshabilitamos directamente la IRQ de VCN en VCN 5.0.0. Y tampoco manejamos el estado de la IRQ. Por lo tanto, se eliminan las llamadas para deshabilitar la IRQ y establecer el estado. Esto elimina de manera efectiva la advertencia de \"WARN_ON(!amdgpu_irq_enabled(adev, src, type))\" en amdgpu_irq_put()."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46821.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46821.json
index 7a913bf989c..a1f9832cf7f 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46821.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46821.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46821",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.767",
- "lastModified": "2024-09-27T13:15:14.767",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Fix negative array index read\n\nAvoid using the negative values\nfor clk_idex as an index into an array pptable->DpmDescriptor.\n\nV2: fix clk_index return check (Tim Huang)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/pm: Corregir lectura de \u00edndice de matriz negativa Evitar el uso de valores negativos para clk_idex como \u00edndice en una matriz pptable->DpmDescriptor. V2: Corregir comprobaci\u00f3n de retorno de clk_index (Tim Huang)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46822.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46822.json
index 9a4c9348bd4..a5501915d27 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46822.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46822.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46822",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.830",
- "lastModified": "2024-09-27T13:15:14.830",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry\n\nIn a review discussion of the changes to support vCPU hotplug where\na check was added on the GICC being enabled if was online, it was\nnoted that there is need to map back to the cpu and use that to index\ninto a cpumask. As such, a valid ID is needed.\n\nIf an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible\nfor the entry in cpu_madt_gicc[cpu] == NULL. This function would\nthen cause a NULL pointer dereference. Whilst a path to trigger\nthis has not been established, harden this caller against the\npossibility."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: acpi: endurecer get_cpu_for_acpi_id() contra la entrada de CPU faltante En una discusi\u00f3n de revisi\u00f3n de los cambios para soportar vCPU hotplug donde se agreg\u00f3 una verificaci\u00f3n en el GICC que se habilita si est\u00e1 en l\u00ednea, se observ\u00f3 que es necesario volver a mapear a la CPU y usar eso para indexar en una cpumask. Como tal, se necesita una ID v\u00e1lida. Si una verificaci\u00f3n MPIDR falla en acpi_map_gic_cpu_interface() es posible que la entrada en cpu_madt_gicc[cpu] == NULL. Esta funci\u00f3n causar\u00eda una desreferencia de puntero NULL. Si bien no se ha establecido una ruta para activar esto, endurezca este llamador contra la posibilidad."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46823.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46823.json
index 6e9b34c2c15..f3337468cf7 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46823.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46823.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46823",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.897",
- "lastModified": "2024-09-27T13:15:14.897",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkunit/overflow: Fix UB in overflow_allocation_test\n\nThe 'device_name' array doesn't exist out of the\n'overflow_allocation_test' function scope. However, it is being used as\na driver name when calling 'kunit_driver_create' from\n'kunit_device_register'. It produces the kernel panic with KASAN\nenabled.\n\nSince this variable is used in one place only, remove it and pass the\ndevice name into kunit_device_register directly as an ascii string."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kunit/overflow: Arreglar UB en overflow_allocation_test La matriz 'device_name' no existe fuera del \u00e1mbito de la funci\u00f3n 'overflow_allocation_test'. Sin embargo, se est\u00e1 utilizando como nombre de controlador al llamar a 'kunit_driver_create' desde 'kunit_device_register'. Produce el p\u00e1nico del kernel con KASAN habilitado. Dado que esta variable se utiliza en un solo lugar, elim\u00ednela y pase el nombre del dispositivo a kunit_device_register directamente como una cadena ascii."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46824.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46824.json
index aab5f2c50e0..50fd61b0630 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46824.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46824.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46824",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.960",
- "lastModified": "2024-09-27T13:15:14.960",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommufd: Require drivers to supply the cache_invalidate_user ops\n\nIf drivers don't do this then iommufd will oops invalidation ioctls with\nsomething like:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n Mem abort info:\n ESR = 0x0000000086000004\n EC = 0x21: IABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\n user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101059000\n [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n Modules linked in:\n CPU: 2 PID: 371 Comm: qemu-system-aar Not tainted 6.8.0-rc7-gde77230ac23a #9\n Hardware name: linux,dummy-virt (DT)\n pstate: 81400809 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=-c)\n pc : 0x0\n lr : iommufd_hwpt_invalidate+0xa4/0x204\n sp : ffff800080f3bcc0\n x29: ffff800080f3bcf0 x28: ffff0000c369b300 x27: 0000000000000000\n x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000\n x23: 0000000000000000 x22: 00000000c1e334a0 x21: ffff0000c1e334a0\n x20: ffff800080f3bd38 x19: ffff800080f3bd58 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff8240d6d8\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : 0000001000000002 x7 : 0000fffeac1ec950 x6 : 0000000000000000\n x5 : ffff800080f3bd78 x4 : 0000000000000003 x3 : 0000000000000002\n x2 : 0000000000000000 x1 : ffff800080f3bcc8 x0 : ffff0000c6034d80\n Call trace:\n 0x0\n iommufd_fops_ioctl+0x154/0x274\n __arm64_sys_ioctl+0xac/0xf0\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xb4\n el0t_64_sync_handler+0x120/0x12c\n el0t_64_sync+0x190/0x194\n\nAll existing drivers implement this op for nesting, this is mostly a\nbisection aid."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommufd: Requiere que los controladores proporcionen las operaciones cache_invalidate_user Si los controladores no hacen esto, iommufd oops invalidar\u00e1 los ioctls con algo como: No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 Informaci\u00f3n de aborto de memoria: ESR = 0x0000000086000004 EC = 0x21: IABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: error de traducci\u00f3n de nivel 0 pgtable de usuario: 4k p\u00e1ginas, VA de 48 bits, pgdp=0000000101059000 [000000000000000] pgd=0000000000000000, p4d=0000000000000000 Error interno: Oops: 0000000086000004 [#1] PREEMPT M\u00f3dulos SMP vinculados: CPU: 2 PID: 371 Comm: qemu-system-aar No contaminado 6.8.0-rc7-gde77230ac23a #9 Nombre del hardware: linux,dummy-virt (DT) pstate: 81400809 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=-c) pc : 0x0 lr : iommufd_hwpt_invalidate+0xa4/0x204 sp : ffff800080f3bcc0 x29: ffff800080f3bcf0 x28: ffff0000c369b300 x27: 0000000000000000 x26: 0000000000000000 x25: 00000000000000000 x24: 0000000000000000 x23: 000000000000000 x22: 00000000c1e334a0 x21: ffff0000c1e334a0 x20: ffff800080f3bd38 x19: ffff800080f3bd58 x18: 0000000000000000 x17: 00000000000000000 x16: 0000000000000000 x15: 0000ffff8240d6d8 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: 000000000000000 x9: 000000000000000 x8: 0000001000000002 x7: 0000fffeac1ec950 x6: 0000000000000000 x5: ffff800080f3bd78 x4: 0000000000000003 x3: 0000000000000002 x2: 0000000000000000 x1: ffff800080f3bcc8 x0: ffff0000c6034d80 Rastreo de llamadas: 0x0 iommufd_fops_ioctl+0x154/0x274 __arm64_sys_ioctl+0xac/0xf0 anybody_syscall+0x48/0x110 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x34/0xb4 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x190/0x194 Todos los controladores existentes implementan esta operaci\u00f3n para anidamiento, esto es principalmente una ayuda de bisecci\u00f3n."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46825.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46825.json
index f85de547bf3..63434eb6500 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46825.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46825.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46825",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.027",
- "lastModified": "2024-09-27T13:15:15.027",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check\n\nThe lookup function iwl_mvm_rcu_fw_link_id_to_link_conf() is\nnormally called with input from the firmware, so it should use\nIWL_FW_CHECK() instead of WARN_ON()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: usar IWL_FW_CHECK para verificar el ID del enlace La funci\u00f3n de b\u00fasqueda iwl_mvm_rcu_fw_link_id_to_link_conf() normalmente se llama con la entrada del firmware, por lo que deber\u00eda usar IWL_FW_CHECK() en lugar de WARN_ON()."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46826.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46826.json
index e5c37448c36..bc3965ff56b 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46826.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46826.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46826",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.087",
- "lastModified": "2024-09-27T13:15:15.087",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nELF: fix kernel.randomize_va_space double read\n\nELF loader uses \"randomize_va_space\" twice. It is sysctl and can change\nat any moment, so 2 loads could see 2 different values in theory with\nunpredictable consequences.\n\nIssue exactly one load for consistent value across one exec."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ELF: se corrige la lectura doble de kernel.randomize_va_space. El cargador ELF utiliza \"randomize_va_space\" dos veces. Es sysctl y puede cambiar en cualquier momento, por lo que, en teor\u00eda, 2 cargas podr\u00edan ver 2 valores diferentes con consecuencias impredecibles. Se debe emitir exactamente una carga para obtener un valor consistente en una ejecuci\u00f3n."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46827.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46827.json
index 7588930eda2..4561875985f 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46827.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46827.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46827",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.153",
- "lastModified": "2024-09-27T13:15:15.153",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix firmware crash due to invalid peer nss\n\nCurrently, if the access point receives an association\nrequest containing an Extended HE Capabilities Information\nElement with an invalid MCS-NSS, it triggers a firmware\ncrash.\n\nThis issue arises when EHT-PHY capabilities shows support\nfor a bandwidth and MCS-NSS set for that particular\nbandwidth is filled by zeros and due to this, driver obtains\npeer_nss as 0 and sending this value to firmware causes\ncrash.\n\nAddress this issue by implementing a validation step for\nthe peer_nss value before passing it to the firmware. If\nthe value is greater than zero, proceed with forwarding\nit to the firmware. However, if the value is invalid,\nreject the association request to prevent potential\nfirmware crashes.\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: se corrige el fallo del firmware debido a un peer nss no v\u00e1lido Actualmente, si el punto de acceso recibe una solicitud de asociaci\u00f3n que contiene un elemento de informaci\u00f3n de capacidades HE extendidas con un MCS-NSS no v\u00e1lido, se produce un fallo del firmware. Este problema surge cuando las capacidades EHT-PHY muestran compatibilidad con un ancho de banda y el MCS-NSS configurado para ese ancho de banda en particular se completa con ceros y, debido a esto, el controlador obtiene peer_nss como 0 y el env\u00edo de este valor al firmware provoca un fallo. Aborde este problema implementando un paso de validaci\u00f3n para el valor peer_nss antes de pasarlo al firmware. Si el valor es mayor que cero, proceda a reenviarlo al firmware. Sin embargo, si el valor no es v\u00e1lido, rechace la solicitud de asociaci\u00f3n para evitar posibles fallos del firmware. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46828.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46828.json
index be4ab7c951c..afc56b2f328 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46828.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46828.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46828",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.220",
- "lastModified": "2024-09-27T13:15:15.220",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: sch_cake: fix bulk flow accounting logic for host fairness\n\nIn sch_cake, we keep track of the count of active bulk flows per host,\nwhen running in dst/src host fairness mode, which is used as the\nround-robin weight when iterating through flows. The count of active\nbulk flows is updated whenever a flow changes state.\n\nThis has a peculiar interaction with the hash collision handling: when a\nhash collision occurs (after the set-associative hashing), the state of\nthe hash bucket is simply updated to match the new packet that collided,\nand if host fairness is enabled, that also means assigning new per-host\nstate to the flow. For this reason, the bulk flow counters of the\nhost(s) assigned to the flow are decremented, before new state is\nassigned (and the counters, which may not belong to the same host\nanymore, are incremented again).\n\nBack when this code was introduced, the host fairness mode was always\nenabled, so the decrement was unconditional. When the configuration\nflags were introduced the *increment* was made conditional, but\nthe *decrement* was not. Which of course can lead to a spurious\ndecrement (and associated wrap-around to U16_MAX).\n\nAFAICT, when host fairness is disabled, the decrement and wrap-around\nhappens as soon as a hash collision occurs (which is not that common in\nitself, due to the set-associative hashing). However, in most cases this\nis harmless, as the value is only used when host fairness mode is\nenabled. So in order to trigger an array overflow, sch_cake has to first\nbe configured with host fairness disabled, and while running in this\nmode, a hash collision has to occur to cause the overflow. Then, the\nqdisc has to be reconfigured to enable host fairness, which leads to the\narray out-of-bounds because the wrapped-around value is retained and\nused as an array index. It seems that syzbot managed to trigger this,\nwhich is quite impressive in its own right.\n\nThis patch fixes the issue by introducing the same conditional check on\ndecrement as is used on increment.\n\nThe original bug predates the upstreaming of cake, but the commit listed\nin the Fixes tag touched that code, meaning that this patch won't apply\nbefore that."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched: sch_cake: arregla la l\u00f3gica de contabilidad de flujo masivo para la equidad del host En sch_cake, hacemos un seguimiento del recuento de flujos masivos activos por host, cuando se ejecuta en modo de equidad de host dst/src, que se utiliza como el peso round-robin cuando se itera a trav\u00e9s de flujos. El recuento de flujos masivos activos se actualiza siempre que un flujo cambia de estado. Esto tiene una interacci\u00f3n peculiar con el manejo de colisiones de hash: cuando ocurre una colisi\u00f3n de hash (despu\u00e9s del hash asociativo de conjuntos), el estado del dep\u00f3sito de hash simplemente se actualiza para que coincida con el nuevo paquete que colision\u00f3, y si la equidad del host est\u00e1 habilitada, eso tambi\u00e9n significa asignar un nuevo estado por host al flujo. Por este motivo, los contadores de flujo masivo de los host asignados al flujo se decrementan, antes de que se asigne un nuevo estado (y los contadores, que pueden no pertenecer m\u00e1s al mismo host, se incrementan nuevamente). Cuando se introdujo este c\u00f3digo, el modo de equidad del host siempre estaba habilitado, por lo que la disminuci\u00f3n era incondicional. Cuando se introdujeron los indicadores de configuraci\u00f3n, el *incremento* se hizo condicional, pero el *decremento* no. Lo que, por supuesto, puede conducir a un decremento espurio (y un retorno asociado a U16_MAX). AFAICT, cuando la equidad del host est\u00e1 deshabilitada, la disminuci\u00f3n y el retorno ocurren tan pronto como ocurre una colisi\u00f3n de hash (lo que no es tan com\u00fan en s\u00ed mismo, debido al hash asociativo de conjuntos). Sin embargo, en la mayor\u00eda de los casos esto es inofensivo, ya que el valor solo se usa cuando el modo de equidad del host est\u00e1 habilitado. Entonces, para activar un desbordamiento de matriz, sch_cake primero debe configurarse con la equidad del host deshabilitada y, mientras se ejecuta en este modo, debe ocurrir una colisi\u00f3n de hash para causar el desbordamiento. Luego, la qdisc debe reconfigurarse para habilitar la equidad del host, lo que lleva a que la matriz est\u00e9 fuera de los l\u00edmites porque el valor de retorno se conserva y se usa como un \u00edndice de matriz. Parece que syzbot logr\u00f3 activar esto, lo que es bastante impresionante en s\u00ed mismo. Este parche corrige el problema introduciendo la misma verificaci\u00f3n condicional en la disminuci\u00f3n que se usa en el incremento. El error original es anterior a la actualizaci\u00f3n de Cake, pero el commit que aparece en la etiqueta de correcciones abord\u00f3 ese c\u00f3digo, lo que significa que este parche no se aplicar\u00e1 antes de esa fecha."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46829.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46829.json
index e7dbdde5d09..03fa8e4a20a 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46829.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46829.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46829",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.300",
- "lastModified": "2024-09-27T13:15:15.300",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtmutex: Drop rt_mutex::wait_lock before scheduling\n\nrt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the\ngood case it returns with the lock held and in the deadlock case it emits a\nwarning and goes into an endless scheduling loop with the lock held, which\ntriggers the 'scheduling in atomic' warning.\n\nUnlock rt_mutex::wait_lock in the dead lock case before issuing the warning\nand dropping into the schedule for ever loop.\n\n[ tglx: Moved unlock before the WARN(), removed the pointless comment,\n \tmassaged changelog, added Fixes tag ]"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtmutex: Se elimina rt_mutex::wait_lock antes de programar rt_mutex_handle_deadlock() se llama con rt_mutex::wait_lock retenido. En el caso bueno, regresa con el bloqueo retenido y en el caso de bloqueo, emite una advertencia y entra en un bucle de programaci\u00f3n sin fin con el bloqueo retenido, lo que activa la advertencia 'programaci\u00f3n en at\u00f3mico'. Desbloquee rt_mutex::wait_lock en el caso de bloqueo antes de emitir la advertencia y entre en el bucle de programaci\u00f3n para siempre. [ tglx: Se movi\u00f3 el desbloqueo antes de WARN(), se elimin\u00f3 el comentario sin sentido, se modific\u00f3 el registro de cambios, se agreg\u00f3 la etiqueta Fixes ] "
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46830.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46830.json
index c4e9fba4c63..bca92a0a17c 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46830.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46830.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46830",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.380",
- "lastModified": "2024-09-27T13:15:15.380",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS\n\nGrab kvm->srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly\nleave nested VMX/SVM if SMM mode is being toggled, and leaving nested VMX\nreads guest memory.\n\nNote, kvm_vcpu_ioctl_x86_set_vcpu_events() can also be called from KVM_RUN\nvia sync_regs(), which already holds SRCU. I.e. trying to precisely use\nkvm_vcpu_srcu_read_lock() around the problematic SMM code would cause\nproblems. Acquiring SRCU isn't all that expensive, so for simplicity,\ngrab it unconditionally for KVM_SET_VCPU_EVENTS.\n\n =============================\n WARNING: suspicious RCU usage\n 6.10.0-rc7-332d2c1d713e-next-vm #552 Not tainted\n -----------------------------\n include/linux/kvm_host.h:1027 suspicious rcu_dereference_check() usage!\n\n other info that might help us debug this:\n\n rcu_scheduler_active = 2, debug_locks = 1\n 1 lock held by repro/1071:\n #0: ffff88811e424430 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x7d/0x970 [kvm]\n\n stack backtrace:\n CPU: 15 PID: 1071 Comm: repro Not tainted 6.10.0-rc7-332d2c1d713e-next-vm #552\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Call Trace:\n \n dump_stack_lvl+0x7f/0x90\n lockdep_rcu_suspicious+0x13f/0x1a0\n kvm_vcpu_gfn_to_memslot+0x168/0x190 [kvm]\n kvm_vcpu_read_guest+0x3e/0x90 [kvm]\n nested_vmx_load_msr+0x6b/0x1d0 [kvm_intel]\n load_vmcs12_host_state+0x432/0xb40 [kvm_intel]\n vmx_leave_nested+0x30/0x40 [kvm_intel]\n kvm_vcpu_ioctl_x86_set_vcpu_events+0x15d/0x2b0 [kvm]\n kvm_arch_vcpu_ioctl+0x1107/0x1750 [kvm]\n ? mark_held_locks+0x49/0x70\n ? kvm_vcpu_ioctl+0x7d/0x970 [kvm]\n ? kvm_vcpu_ioctl+0x497/0x970 [kvm]\n kvm_vcpu_ioctl+0x497/0x970 [kvm]\n ? lock_acquire+0xba/0x2d0\n ? find_held_lock+0x2b/0x80\n ? do_user_addr_fault+0x40c/0x6f0\n ? lock_release+0xb7/0x270\n __x64_sys_ioctl+0x82/0xb0\n do_syscall_64+0x6c/0x170\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7ff11eb1b539\n "
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Adquirir kvm->srcu al manejar KVM_SET_VCPU_EVENTS Adquiera kvm->srcu al procesar KVM_SET_VCPU_EVENTS, ya que KVM abandonar\u00e1 a la fuerza el VMX/SVM anidado si se alterna el modo SMM, y al abandonar el VMX anidado se lee la memoria del invitado. Tenga en cuenta que kvm_vcpu_ioctl_x86_set_vcpu_events() tambi\u00e9n se puede llamar desde KVM_RUN a trav\u00e9s de sync_regs(), que ya contiene SRCU. Es decir, intentar usar con precisi\u00f3n kvm_vcpu_srcu_read_lock() alrededor del c\u00f3digo SMM problem\u00e1tico causar\u00eda problemas. Adquirir SRCU no es tan caro, as\u00ed que para simplificar, t\u00f3melo incondicionalmente para KVM_SET_VCPU_EVENTS. ============================= ADVERTENCIA: uso sospechoso de RCU 6.10.0-rc7-332d2c1d713e-next-vm #552 No contaminado ----------------------------- include/linux/kvm_host.h:1027 \u00a1Uso sospechoso de rcu_dereference_check()! Otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: rcu_scheduler_active = 2, debug_locks = 1 1 bloqueo retenido por repro/1071: #0: ffff88811e424430 (&vcpu->mutex){+.+.}-{3:3}, en: kvm_vcpu_ioctl+0x7d/0x970 [kvm] seguimiento de pila: CPU: 15 PID: 1071 Comm: repro No contaminado 6.10.0-rc7-332d2c1d713e-next-vm #552 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Seguimiento de llamadas: dump_stack_lvl+0x7f/0x90 kvm_vcpu_ioctl_x86_set_vcpu_events+0x15d/0x2b0 [kvm] kvm_arch_vcpu_ioctl+0x1107/0x1750 [kvm] ? kvm_vcpu_ioctl+0x497/0x970 [kvm] kvm_vcpu_ioctl+0x497/0x970 [kvm] ? bloqueo_adquirir+0xba/0x2d0 ? encontrar_bloqueo_retenido+0x2b/0x80 ? hacer_error_direcci\u00f3n_usuario+0x40c/0x6f0 ? liberaci\u00f3n_de_bloqueo+0xb7/0x270 __x64_sys_ioctl+0x82/0xb0 hacer_llamada_al_sistema_64+0x6c/0x170 entrada_SYSCALL_64_despu\u00e9s_de_hwframe+0x4b/0x53 RIP: 0033:0x7ff11eb1b539 "
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46831.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46831.json
index 0d70183cc16..31f329c195f 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46831.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46831.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46831",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.457",
- "lastModified": "2024-09-27T13:15:15.457",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: microchip: vcap: Fix use-after-free error in kunit test\n\nThis is a clear use-after-free error. We remove it, and rely on checking\nthe return code of vcap_del_rule."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: microchip: vcap: Se corrige el error de use-after-free en la prueba kunit. Se trata de un claro error de use-after-free. Lo eliminamos y nos basamos en comprobar el c\u00f3digo de retorno de vcap_del_rule."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46832.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46832.json
index fc4938de7ea..3a5dfc6ccc6 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46832.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46832.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46832",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.517",
- "lastModified": "2024-09-27T13:15:15.517",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nMIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed\n\nThis avoids warning:\n\n[ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283\n\nCaused by get_c0_compare_int on secondary CPU.\n\nWe also skipped saving IRQ number to struct clock_event_device *cd as\nit's never used by clockevent core, as per comments it's only meant\nfor \"non CPU local devices\"."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: MIPS: cevt-r4k: No llame a get_c0_compare_int si el irq del temporizador est\u00e1 instalado Esto evita la advertencia: [ 0.118053] ERROR: funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en kernel/locking/mutex.c:283 Causado por get_c0_compare_int en la CPU secundaria. Tambi\u00e9n omitimos guardar el n\u00famero de IRQ en struct clock_event_device *cd ya que nunca lo usa el n\u00facleo clockevent, seg\u00fan los comentarios, solo est\u00e1 destinado a \"dispositivos locales que no sean de CPU\"."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46833.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46833.json
index 5bfeec344a8..6453edd54b5 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46833.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46833.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46833",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.593",
- "lastModified": "2024-09-27T13:15:15.593",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: void array out of bound when loop tnl_num\n\nWhen query reg inf of SSU, it loops tnl_num times. However, tnl_num comes\nfrom hardware and the length of array is a fixed value. To void array out\nof bound, make sure the loop time is not greater than the length of array"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: hns3: void array out of bound when loop tnl_num Cuando se consulta reg inf de SSU, se repite tnl_num veces. Sin embargo, tnl_num proviene del hardware y la longitud de la matriz es un valor fijo. Para anular la matriz fuera de los l\u00edmites, aseg\u00farese de que el tiempo de repetici\u00f3n no sea mayor que la longitud de la matriz"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46834.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46834.json
index 23ad62e1fd8..01b0128e6ac 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46834.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46834.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46834",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.660",
- "lastModified": "2024-09-27T13:15:15.660",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: fail closed if we can't get max channel used in indirection tables\n\nCommit 0d1b7d6c9274 (\"bnxt: fix crashes when reducing ring count with\nactive RSS contexts\") proves that allowing indirection table to contain\nchannels with out of bounds IDs may lead to crashes. Currently the\nmax channel check in the core gets skipped if driver can't fetch\nthe indirection table or when we can't allocate memory.\n\nBoth of those conditions should be extremely rare but if they do\nhappen we should try to be safe and fail the channel change."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ethtool: error cerrado si no podemos obtener el canal m\u00e1ximo usado en las tablas de indirecci\u00f3n. El commit 0d1b7d6c9274 (\"bnxt: corregir fallos al reducir el recuento de anillos con contextos RSS activos\") demuestra que permitir que la tabla de indirecci\u00f3n contenga canales con identificadores fuera de los l\u00edmites puede provocar fallos. Actualmente, la comprobaci\u00f3n del canal m\u00e1ximo en el n\u00facleo se omite si el controlador no puede obtener la tabla de indirecci\u00f3n o cuando no podemos asignar memoria. Ambas condiciones deber\u00edan ser extremadamente raras, pero si ocurren, debemos intentar ser seguros y fallar el cambio de canal."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46835.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46835.json
index 12ed1d32ff2..d18707d817f 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46835.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46835.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46835",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.720",
- "lastModified": "2024-09-27T13:15:15.720",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix smatch static checker warning\n\nadev->gfx.imu.funcs could be NULL"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Se corrige la advertencia del verificador est\u00e1tico smatch adev->gfx.imu.funcs podr\u00eda ser NULL"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46836.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46836.json
index 5652e4ed06f..2cba9bce176 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46836.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46836.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46836",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.780",
- "lastModified": "2024-09-27T13:15:15.780",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: aspeed_udc: validate endpoint index for ast udc\n\nWe should verify the bound of the array to assure that host\nmay not manipulate the index to point past endpoint array.\n\nFound by static analysis."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: aspeed_udc: validar \u00edndice de endpoint para ast udc Debemos verificar el l\u00edmite de la matriz para asegurarnos de que el host no pueda manipular el \u00edndice para que apunte m\u00e1s all\u00e1 de la matriz de endpoints. Se encontr\u00f3 mediante an\u00e1lisis est\u00e1tico."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46837.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46837.json
index eb4f9b1ec99..e746df42761 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46837.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46837.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46837",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.850",
- "lastModified": "2024-09-27T13:15:15.850",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Restrict high priorities on group_create\n\nWe were allowing any users to create a high priority group without any\npermission checks. As a result, this was allowing possible denial of\nservice.\n\nWe now only allow the DRM master or users with the CAP_SYS_NICE\ncapability to set higher priorities than PANTHOR_GROUP_PRIORITY_MEDIUM.\n\nAs the sole user of that uAPI lives in Mesa and hardcode a value of\nMEDIUM [1], this should be safe to do.\n\nAdditionally, as those checks are performed at the ioctl level,\npanthor_group_create now only check for priority level validity.\n\n[1]https://gitlab.freedesktop.org/mesa/mesa/-/blob/f390835074bdf162a63deb0311d1a6de527f9f89/src/gallium/drivers/panfrost/pan_csf.c#L1038"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/panthor: Restringir altas prioridades en group_create Permit\u00edamos que cualquier usuario creara un grupo de alta prioridad sin ninguna verificaci\u00f3n de permisos. Como resultado, esto permit\u00eda una posible denegaci\u00f3n de servicio. Ahora solo permitimos que el maestro DRM o los usuarios con la capacidad CAP_SYS_NICE establezcan prioridades m\u00e1s altas que PANTHOR_GROUP_PRIORITY_MEDIUM. Como el \u00fanico usuario de esa uAPI vive en Mesa y codifica un valor de MEDIUM [1], esto deber\u00eda ser seguro de hacer. Adem\u00e1s, como esas verificaciones se realizan en el nivel ioctl, panthor_group_create ahora solo verifica la validez del nivel de prioridad. [1]https://gitlab.freedesktop.org/mesa/mesa/-/blob/f390835074bdf162a63deb0311d1a6de527f9f89/src/gallium/drivers/panfrost/pan_csf.c#L1038"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46838.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46838.json
index d1d6a5677c1..e809ade662a 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46838.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46838.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46838",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.920",
- "lastModified": "2024-09-27T13:15:15.920",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nuserfaultfd: don't BUG_ON() if khugepaged yanks our page table\n\nSince khugepaged was changed to allow retracting page tables in file\nmappings without holding the mmap lock, these BUG_ON()s are wrong - get\nrid of them.\n\nWe could also remove the preceding \"if (unlikely(...))\" block, but then we\ncould reach pte_offset_map_lock() with transhuge pages not just for file\nmappings but also for anonymous mappings - which would probably be fine\nbut I think is not necessarily expected."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: userfaultfd: no ejecutar BUG_ON() si khugepaged extrae nuestra tabla de p\u00e1ginas Dado que khugepaged se modific\u00f3 para permitir la extracci\u00f3n de tablas de p\u00e1ginas en asignaciones de archivos sin mantener el bloqueo mmap, estos BUG_ON() son incorrectos: desh\u00e1gase de ellos. Tambi\u00e9n podr\u00edamos eliminar el bloque \"if (unlikely(...))\" anterior, pero entonces podr\u00edamos llegar a pte_offset_map_lock() con p\u00e1ginas transhuge no solo para asignaciones de archivos sino tambi\u00e9n para asignaciones an\u00f3nimas, lo que probablemente estar\u00eda bien, pero creo que no es necesariamente lo esperado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46839.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46839.json
index 34759230d26..3a694b417db 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46839.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46839.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46839",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.980",
- "lastModified": "2024-09-27T13:15:15.980",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nworkqueue: Improve scalability of workqueue watchdog touch\n\nOn a ~2000 CPU powerpc system, hard lockups have been observed in the\nworkqueue code when stop_machine runs (in this case due to CPU hotplug).\nThis is due to lots of CPUs spinning in multi_cpu_stop, calling\ntouch_nmi_watchdog() which ends up calling wq_watchdog_touch().\nwq_watchdog_touch() writes to the global variable wq_watchdog_touched,\nand that can find itself in the same cacheline as other important\nworkqueue data, which slows down operations to the point of lockups.\n\nIn the case of the following abridged trace, worker_pool_idr was in\nthe hot line, causing the lockups to always appear at idr_find.\n\n watchdog: CPU 1125 self-detected hard LOCKUP @ idr_find\n Call Trace:\n get_work_pool\n __queue_work\n call_timer_fn\n run_timer_softirq\n __do_softirq\n do_softirq_own_stack\n irq_exit\n timer_interrupt\n decrementer_common_virt\n * interrupt: 900 (timer) at multi_cpu_stop\n multi_cpu_stop\n cpu_stopper_thread\n smpboot_thread_fn\n kthread\n\nFix this by having wq_watchdog_touch() only write to the line if the\nlast time a touch was recorded exceeds 1/4 of the watchdog threshold."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: workqueue: Mejorar la escalabilidad del watchdog de workqueue touch En un sistema powerpc de ~2000 CPU, se han observado bloqueos duros en el c\u00f3digo de workqueue cuando se ejecuta stop_machine (en este caso debido a la conexi\u00f3n en caliente de la CPU). Esto se debe a que muchas CPU giran en multi_cpu_stop, llamando a touch_nmi_watchdog() que termina llamando a wq_watchdog_touch(). wq_watchdog_touch() escribe en la variable global wq_watchdog_touched, y esta puede encontrarse en la misma l\u00ednea de cach\u00e9 que otros datos importantes de workqueue, lo que ralentiza las operaciones hasta el punto de bloquearse. En el caso del siguiente seguimiento abreviado, worker_pool_idr estaba en la l\u00ednea directa, lo que hac\u00eda que los bloqueos siempre aparecieran en idr_find. watchdog: CPU 1125 autodetect\u00f3 BLOQUEO duro @ idr_find Seguimiento de llamadas: get_work_pool __queue_work call_timer_fn run_timer_softirq __do_softirq do_softirq_own_stack irq_exit timer_interrupt decrementer_common_virt * interrupci\u00f3n: 900 (temporizador) en multi_cpu_stop multi_cpu_stop cpu_stopper_thread smpboot_thread_fn kthread Solucione esto haciendo que wq_watchdog_touch() solo escriba en la l\u00ednea si la \u00faltima vez que se registr\u00f3 un toque excede 1/4 del umbral del watchdog."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46840.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46840.json
index c0012e1b75c..5fd833c69cf 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46840.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46840.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46840",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.057",
- "lastModified": "2024-09-27T13:15:16.057",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: clean up our handling of refs == 0 in snapshot delete\n\nIn reada we BUG_ON(refs == 0), which could be unkind since we aren't\nholding a lock on the extent leaf and thus could get a transient\nincorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which\ncould happen if we have extent tree corruption. Change that to return\n-EUCLEAN. In do_walk_down() we catch this case and handle it correctly,\nhowever we return -EIO, which -EUCLEAN is a more appropriate error code.\nFinally in walk_up_proc we have the same BUG_ON(refs == 0), so convert\nthat to proper error handling. Also adjust the error message so we can\nactually do something with the information."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: limpia nuestro manejo de refs == 0 en la eliminaci\u00f3n de instant\u00e1neas En reada tenemos BUG_ON(refs == 0), lo que podr\u00eda ser desagradable ya que no estamos manteniendo un bloqueo en la hoja de extensi\u00f3n y, por lo tanto, podr\u00edamos obtener una respuesta incorrecta transitoria. En walk_down_proc tambi\u00e9n tenemos BUG_ON(refs == 0), lo que podr\u00eda suceder si tenemos corrupci\u00f3n del \u00e1rbol de extensi\u00f3n. Cambia eso para que devuelva -EUCLEAN. En do_walk_down() capturamos este caso y lo manejamos correctamente, sin embargo, devolvemos -EIO, que -EUCLEAN es un c\u00f3digo de error m\u00e1s apropiado. Finalmente, en walk_up_proc tenemos el mismo BUG_ON(refs == 0), as\u00ed que convi\u00e9rtelo en un manejo de errores adecuado. Tambi\u00e9n ajusta el mensaje de error para que podamos hacer algo con la informaci\u00f3n."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json
index 63aaebcde23..5f5a273b66a 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46841.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46841",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.130",
- "lastModified": "2024-09-27T13:15:16.130",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()\n\nWe handle errors here properly, ENOMEM isn't fatal, return the error."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: no BUG_ON en ENOMEM desde btrfs_lookup_extent_info() en walk_down_proc(). Aqu\u00ed manejamos los errores correctamente, ENOMEM no es fatal, devuelve el error."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46842.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46842.json
index 95274269576..034e2aeab69 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46842.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46842.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46842",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.190",
- "lastModified": "2024-09-27T13:15:16.190",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info\n\nThe MBX_TIMEOUT return code is not handled in lpfc_get_sfp_info and the\nroutine unconditionally frees submitted mailbox commands regardless of\nreturn status. The issue is that for MBX_TIMEOUT cases, when firmware\nreturns SFP information at a later time, that same mailbox memory region\nreferences previously freed memory in its cmpl routine.\n\nFix by adding checks for the MBX_TIMEOUT return code. During mailbox\nresource cleanup, check the mbox flag to make sure that the wait did not\ntimeout. If the MBOX_WAKE flag is not set, then do not free the resources\nbecause it will be freed when firmware completes the mailbox at a later\ntime in its cmpl routine.\n\nAlso, increase the timeout from 30 to 60 seconds to accommodate boot\nscripts requiring longer timeouts."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Controlar los tiempos de espera del buz\u00f3n en lpfc_get_sfp_info El c\u00f3digo de retorno MBX_TIMEOUT no se maneja en lpfc_get_sfp_info y la rutina libera incondicionalmente los comandos de buz\u00f3n enviados independientemente del estado de retorno. El problema es que para los casos de MBX_TIMEOUT, cuando el firmware devuelve informaci\u00f3n SFP en un momento posterior, esa misma regi\u00f3n de memoria del buz\u00f3n hace referencia a la memoria liberada previamente en su rutina cmpl. Se soluciona agregando comprobaciones para el c\u00f3digo de retorno MBX_TIMEOUT. Durante la limpieza de recursos del buz\u00f3n, verifique el indicador mbox para asegurarse de que la espera no haya expirado. Si el indicador MBOX_WAKE no est\u00e1 configurado, no libere los recursos porque se liberar\u00e1n cuando el firmware complete el buz\u00f3n en un momento posterior en su rutina cmpl. Adem\u00e1s, aumente el tiempo de espera de 30 a 60 segundos para dar cabida a los scripts de arranque que requieren tiempos de espera m\u00e1s largos."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46843.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46843.json
index adab9eb1134..52cda969145 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46843.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46843.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46843",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.250",
- "lastModified": "2024-09-27T13:15:16.250",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Remove SCSI host only if added\n\nIf host tries to remove ufshcd driver from a UFS device it would cause a\nkernel panic if ufshcd_async_scan fails during ufshcd_probe_hba before\nadding a SCSI host with scsi_add_host and MCQ is enabled since SCSI host\nhas been defered after MCQ configuration introduced by commit 0cab4023ec7b\n(\"scsi: ufs: core: Defer adding host to SCSI if MCQ is supported\").\n\nTo guarantee that SCSI host is removed only if it has been added, set the\nscsi_host_added flag to true after adding a SCSI host and check whether it\nis set or not before removing it."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: ufs: core: Eliminar host SCSI solo si se agreg\u00f3 Si el host intenta eliminar el controlador ufshcd de un dispositivo UFS, provocar\u00eda un p\u00e1nico de kernel si ufshcd_async_scan falla durante ufshcd_probe_hba antes de agregar un host SCSI con scsi_add_host y MCQ est\u00e1 habilitado ya que el host SCSI se ha diferido despu\u00e9s de la configuraci\u00f3n de MCQ introducida por el commit 0cab4023ec7b (\"scsi: ufs: core: Aplazar la adici\u00f3n de host a SCSI si se admite MCQ\"). Para garantizar que el host SCSI se elimine solo si se ha agregado, configure el indicador scsi_host_added en verdadero despu\u00e9s de agregar un host SCSI y verifique si est\u00e1 configurado o no antes de eliminarlo."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46844.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46844.json
index 6e03fbf9c71..6e705d3b3ec 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46844.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46844.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46844",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.313",
- "lastModified": "2024-09-27T13:15:16.313",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\num: line: always fill *error_out in setup_one_line()\n\nThe pointer isn't initialized by callers, but I have\nencountered cases where it's still printed; initialize\nit in all possible cases in setup_one_line()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: um: line: always fill *error_out in setup_one_line() El puntero no es inicializado por los llamadores, pero he encontrado casos en los que a\u00fan se imprime; inicial\u00edcelo en todos los casos posibles en setup_one_line()."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46845.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46845.json
index 4d3d89630ef..08e01df9a60 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46845.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46845.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46845",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.397",
- "lastModified": "2024-09-27T13:15:16.397",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/timerlat: Only clear timer if a kthread exists\n\nThe timerlat tracer can use user space threads to check for osnoise and\ntimer latency. If the program using this is killed via a SIGTERM, the\nthreads are shutdown one at a time and another tracing instance can start\nup resetting the threads before they are fully closed. That causes the\nhrtimer assigned to the kthread to be shutdown and freed twice when the\ndying thread finally closes the file descriptors, causing a use-after-free\nbug.\n\nOnly cancel the hrtimer if the associated thread is still around. Also add\nthe interface_lock around the resetting of the tlat_var->kthread.\n\nNote, this is just a quick fix that can be backported to stable. A real\nfix is to have a better synchronization between the shutdown of old\nthreads and the starting of new ones."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracing/timerlat: Solo borra el temporizador si existe un kthread El tracer timerlat puede usar subprocesos del espacio de usuario para verificar el ruido de os y la latencia del temporizador. Si el programa que lo usa se elimina mediante un SIGTERM, los subprocesos se cierran uno a la vez y otra instancia de tracer puede comenzar a reiniciar los subprocesos antes de que se cierren por completo. Eso hace que el hrtimer asignado al kthread se cierre y se libere dos veces cuando el subproceso que muere finalmente cierra los descriptores de archivo, lo que causa un error de uso despu\u00e9s de liberaci\u00f3n. Solo cancele el hrtimer si el subproceso asociado a\u00fan est\u00e1 presente. Tambi\u00e9n agregue el interface_lock alrededor del reinicio de tlat_var->kthread. Tenga en cuenta que esto es solo una soluci\u00f3n r\u00e1pida que se puede trasladar a estable. Una soluci\u00f3n real es tener una mejor sincronizaci\u00f3n entre el apagado de subprocesos antiguos y el inicio de nuevos."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46846.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46846.json
index 0b625a91ad9..a6d09c98afa 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46846.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46846.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46846",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.480",
- "lastModified": "2024-09-27T13:15:16.480",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: rockchip: Resolve unbalanced runtime PM / system PM handling\n\nCommit e882575efc77 (\"spi: rockchip: Suspend and resume the bus during\nNOIRQ_SYSTEM_SLEEP_PM ops\") stopped respecting runtime PM status and\nsimply disabled clocks unconditionally when suspending the system. This\ncauses problems when the device is already runtime suspended when we go\nto sleep -- in which case we double-disable clocks and produce a\nWARNing.\n\nSwitch back to pm_runtime_force_{suspend,resume}(), because that still\nseems like the right thing to do, and the aforementioned commit makes no\nexplanation why it stopped using it.\n\nAlso, refactor some of the resume() error handling, because it's not\nactually a good idea to re-disable clocks on failure."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: rockchip: Resolver el manejo desequilibrado de PM en tiempo de ejecuci\u00f3n / PM del sistema el commit e882575efc77 (\"spi: rockchip: Suspender y reanudar el bus durante las operaciones NOIRQ_SYSTEM_SLEEP_PM\") dej\u00f3 de respetar el estado de PM en tiempo de ejecuci\u00f3n y simplemente deshabilit\u00f3 los relojes incondicionalmente al suspender el sistema. Esto causa problemas cuando el dispositivo ya est\u00e1 suspendido en tiempo de ejecuci\u00f3n cuando nos vamos a dormir, en cuyo caso deshabilitamos dos veces los relojes y generamos una ADVERTENCIA. Vuelva a pm_runtime_force_{suspend,resume}(), porque eso todav\u00eda parece lo correcto y el commit mencionado anteriormente no explica por qu\u00e9 dej\u00f3 de usarlo. Adem\u00e1s, refactorice parte del manejo de errores de resume(), porque en realidad no es una buena idea volver a deshabilitar los relojes en caso de falla."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46847.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46847.json
index c257fc54618..eccea36d0db 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46847.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46847.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46847",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.570",
- "lastModified": "2024-09-27T13:15:16.570",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: vmalloc: ensure vmap_block is initialised before adding to queue\n\nCommit 8c61291fd850 (\"mm: fix incorrect vbq reference in\npurge_fragmented_block\") extended the 'vmap_block' structure to contain a\n'cpu' field which is set at allocation time to the id of the initialising\nCPU.\n\nWhen a new 'vmap_block' is being instantiated by new_vmap_block(), the\npartially initialised structure is added to the local 'vmap_block_queue'\nxarray before the 'cpu' field has been initialised. If another CPU is\nconcurrently walking the xarray (e.g. via vm_unmap_aliases()), then it\nmay perform an out-of-bounds access to the remote queue thanks to an\nuninitialised index.\n\nThis has been observed as UBSAN errors in Android:\n\n | Internal error: UBSAN: array index out of bounds: 00000000f2005512 [#1] PREEMPT SMP\n |\n | Call trace:\n | purge_fragmented_block+0x204/0x21c\n | _vm_unmap_aliases+0x170/0x378\n | vm_unmap_aliases+0x1c/0x28\n | change_memory_common+0x1dc/0x26c\n | set_memory_ro+0x18/0x24\n | module_enable_ro+0x98/0x238\n | do_init_module+0x1b0/0x310\n\nMove the initialisation of 'vb->cpu' in new_vmap_block() ahead of the\naddition to the xarray."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: vmalloc: garantizar que vmap_block se inicialice antes de agregarlo a la cola. El commit 8c61291fd850 (\"mm: corregir referencia vbq incorrecta en purge_fragmented_block\") extendi\u00f3 la estructura 'vmap_block' para que contenga un campo 'cpu' que se establece en el momento de la asignaci\u00f3n en el id de la CPU que se inicializa. Cuando se crea una instancia de 'vmap_block' mediante new_vmap_block(), la estructura parcialmente inicializada se agrega a la matriz x local 'vmap_block_queue' antes de que se haya inicializado el campo 'cpu'. Si otra CPU est\u00e1 recorriendo simult\u00e1neamente la matriz x (por ejemplo, a trav\u00e9s de vm_unmap_aliases()), puede realizar un acceso fuera de los l\u00edmites a la cola remota gracias a un \u00edndice no inicializado. Esto se ha observado como errores UBSAN en Android: | Error interno: UBSAN: \u00edndice de matriz fuera de los l\u00edmites: 00000000f2005512 [#1] PREEMPT SMP | | Rastreo de llamadas: | purge_fragmented_block+0x204/0x21c | _vm_unmap_aliases+0x170/0x378 | vm_unmap_aliases+0x1c/0x28 | change_memory_common+0x1dc/0x26c | set_memory_ro+0x18/0x24 | module_enable_ro+0x98/0x238 | do_init_module+0x1b0/0x310 Mueva la inicializaci\u00f3n de 'vb->cpu' en new_vmap_block() antes de la adici\u00f3n a la matriz x."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46848.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46848.json
index f539f6710b6..efd1f241ea8 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46848.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46848.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46848",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.657",
- "lastModified": "2024-09-27T13:15:16.657",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel: Limit the period on Haswell\n\nRunning the ltp test cve-2015-3290 concurrently reports the following\nwarnings.\n\nperfevents: irq loop stuck!\n WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/core.c:3174\n intel_pmu_handle_irq+0x285/0x370\n Call Trace:\n \n ? __warn+0xa4/0x220\n ? intel_pmu_handle_irq+0x285/0x370\n ? __report_bug+0x123/0x130\n ? intel_pmu_handle_irq+0x285/0x370\n ? __report_bug+0x123/0x130\n ? intel_pmu_handle_irq+0x285/0x370\n ? report_bug+0x3e/0xa0\n ? handle_bug+0x3c/0x70\n ? exc_invalid_op+0x18/0x50\n ? asm_exc_invalid_op+0x1a/0x20\n ? irq_work_claim+0x1e/0x40\n ? intel_pmu_handle_irq+0x285/0x370\n perf_event_nmi_handler+0x3d/0x60\n nmi_handle+0x104/0x330\n\nThanks to Thomas Gleixner's analysis, the issue is caused by the low\ninitial period (1) of the frequency estimation algorithm, which triggers\nthe defects of the HW, specifically erratum HSW11 and HSW143. (For the\ndetails, please refer https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/)\n\nThe HSW11 requires a period larger than 100 for the INST_RETIRED.ALL\nevent, but the initial period in the freq mode is 1. The erratum is the\nsame as the BDM11, which has been supported in the kernel. A minimum\nperiod of 128 is enforced as well on HSW.\n\nHSW143 is regarding that the fixed counter 1 may overcount 32 with the\nHyper-Threading is enabled. However, based on the test, the hardware\nhas more issues than it tells. Besides the fixed counter 1, the message\n'interrupt took too long' can be observed on any counter which was armed\nwith a period < 32 and two events expired in the same NMI. A minimum\nperiod of 32 is enforced for the rest of the events.\nThe recommended workaround code of the HSW143 is not implemented.\nBecause it only addresses the issue for the fixed counter. It brings\nextra overhead through extra MSR writing. No related overcounting issue\nhas been reported so far."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/x86/intel: Limitar el per\u00edodo en Haswell La ejecuci\u00f3n de la prueba ltp cve-2015-3290 al mismo tiempo informa las siguientes advertencias. perfevents: \u00a1bucle irq atascado! ADVERTENCIA: CPU: 31 PID: 32438 en arch/x86/events/intel/core.c:3174 intel_pmu_handle_irq+0x285/0x370 Rastreo de llamadas: ? __warn+0xa4/0x220 ? intel_pmu_handle_irq+0x285/0x370 ? __report_bug+0x123/0x130 ? intel_pmu_handle_irq+0x285/0x370 ? __report_bug+0x123/0x130 ? intel_pmu_handle_irq+0x285/0x370 ? report_bug+0x3e/0xa0 ? handle_bug+0x3c/0x70 ? exc_invalid_op+0x18/0x50 ? asm_exc_invalid_op+0x1a/0x20 ? irq_work_claim+0x1e/0x40 ? intel_pmu_handle_irq+0x285/0x370 perf_event_nmi_handler+0x3d/0x60 nmi_handle+0x104/0x330 Gracias al an\u00e1lisis de Thomas Gleixner, el problema es causado por el bajo per\u00edodo inicial (1) del algoritmo de estimaci\u00f3n de frecuencia, que desencadena los defectos del HW, espec\u00edficamente las erratas HSW11 y HSW143. (Para conocer los detalles, consulte https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/) El HSW11 requiere un per\u00edodo mayor a 100 para el evento INST_RETIRED.ALL, pero el per\u00edodo inicial en el modo freq es 1. La errata es la misma que la del BDM11, que ha sido compatible con el kernel. Tambi\u00e9n se aplica un per\u00edodo m\u00ednimo de 128 en HSW. HSW143 se refiere a que el contador fijo 1 puede sobrecontar 32 con Hyper-Threading habilitado. Sin embargo, seg\u00fan la prueba, el hardware tiene m\u00e1s problemas de los que indica. Adem\u00e1s del contador fijo 1, se puede observar el mensaje \"la interrupci\u00f3n tard\u00f3 demasiado\" en cualquier contador que se haya armado con un per\u00edodo <32 y dos eventos hayan expirado en el mismo NMI. Se aplica un per\u00edodo m\u00ednimo de 32 para el resto de los eventos. El c\u00f3digo de workaround recomendado del HSW143 no est\u00e1 implementado. Porque solo soluciona el problema del contador fijo. Implica una sobrecarga adicional a trav\u00e9s de la escritura adicional del MSR. Hasta el momento, no se ha informado de ning\u00fan problema de conteo excesivo relacionado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json
index bd7aa26d9a8..8910541b3f0 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46849",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.723",
- "lastModified": "2024-09-27T13:15:16.723",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: meson: axg-card: fix 'use-after-free'\n\nBuffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()',\nso move 'pad' pointer initialization after this function when memory is\nalready reallocated.\n\nKasan bug report:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in axg_card_add_link+0x76c/0x9bc\nRead of size 8 at addr ffff000000e8b260 by task modprobe/356\n\nCPU: 0 PID: 356 Comm: modprobe Tainted: G O 6.9.12-sdkernel #1\nCall trace:\n dump_backtrace+0x94/0xec\n show_stack+0x18/0x24\n dump_stack_lvl+0x78/0x90\n print_report+0xfc/0x5c0\n kasan_report+0xb8/0xfc\n __asan_load8+0x9c/0xb8\n axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card]\n meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils]\n platform_probe+0x8c/0xf4\n really_probe+0x110/0x39c\n __driver_probe_device+0xb8/0x18c\n driver_probe_device+0x108/0x1d8\n __driver_attach+0xd0/0x25c\n bus_for_each_dev+0xe0/0x154\n driver_attach+0x34/0x44\n bus_add_driver+0x134/0x294\n driver_register+0xa8/0x1e8\n __platform_driver_register+0x44/0x54\n axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card]\n do_one_initcall+0xdc/0x25c\n do_init_module+0x10c/0x334\n load_module+0x24c4/0x26cc\n init_module_from_file+0xd4/0x128\n __arm64_sys_finit_module+0x1f4/0x41c\n invoke_syscall+0x60/0x188\n el0_svc_common.constprop.0+0x78/0x13c\n do_el0_svc+0x30/0x40\n el0_svc+0x38/0x78\n el0t_64_sync_handler+0x100/0x12c\n el0t_64_sync+0x190/0x194"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: meson: axg-card: se corrige el problema 'use-after-free'. El b\u00fafer 'card->dai_link' se reasigna en 'meson_card_reallocate_links()', por lo que se mueve la inicializaci\u00f3n del puntero 'pad' despu\u00e9s de esta funci\u00f3n cuando la memoria ya est\u00e1 reasignada. Informe de error de Kasan: ===================================================================== ERROR: KASAN: slab-use-after-free en axg_card_add_link+0x76c/0x9bc Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff000000e8b260 por la tarea modprobe/356 CPU: 0 PID: 356 Comm: modprobe Contaminado: GO 6.9.12-sdkernel #1 Rastreo de llamadas: dump_backtrace+0x94/0xec show_stack+0x18/0x24 dump_stack_lvl+0x78/0x90 print_report+0xfc/0x5c0 kasan_report+0xb8/0xfc __asan_load8+0x9c/0xb8 axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card] meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils] platform_probe+0x8c/0xf4 really_probe+0x110/0x39c __driver_probe_device+0xb8/0x18c driver_probe_device+0x108/0x1d8 __driver_attach+0xd0/0x25c bus_for_each_dev+0xe0/0x154 driver_attach+0x34/0x44 bus_add_driver+0x134/0x294 registro_controlador+0xa8/0x1e8 __registro_controlador_plataforma+0x44/0x54 axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card] hacer_una_llamada_inicio+0xdc/0x25c hacer_m\u00f3dulo_inicio+0x10c/0x334 cargar_m\u00f3dulo+0x24c4/0x26cc m\u00f3dulo_inicio_desde_archivo+0xd4/0x128 __arm64_sys_finit_module+0x1f4/0x41c invocar_llamada_al_sistema+0x60/0x188 el0_svc_common.constprop.0+0x78/0x13c hacer_el0_svc+0x30/0x40 el0_svc+0x38/0x78 el0t_64_sync_handler+0x100/0x12c el0t_64_sync+0x190/0x194"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46850.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46850.json
index 56025afe2ce..66116081dea 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46850.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46850.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46850",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.787",
- "lastModified": "2024-09-27T13:15:16.787",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid race between dcn35_set_drr() and dc_state_destruct()\n\ndc_state_destruct() nulls the resource context of the DC state. The pipe\ncontext passed to dcn35_set_drr() is a member of this resource context.\n\nIf dc_state_destruct() is called parallel to the IRQ processing (which\ncalls dcn35_set_drr() at some point), we can end up using already nulled\nfunction callback fields of struct stream_resource.\n\nThe logic in dcn35_set_drr() already tries to avoid this, by checking tg\nagainst NULL. But if the nulling happens exactly after the NULL check and\nbefore the next access, then we get a race.\n\nAvoid this by copying tg first to a local variable, and then use this\nvariable for all the operations. This should work, as long as nobody\nfrees the resource pool where the timing generators live.\n\n(cherry picked from commit 0607a50c004798a96e62c089a4c34c220179dcb5)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Evitar la ejecuci\u00f3n entre dcn35_set_drr() y dc_state_destruct() dc_state_destruct() anula el contexto de recurso del estado del DC. El contexto de tuber\u00eda pasado a dcn35_set_drr() es un miembro de este contexto de recurso. Si se llama a dc_state_destruct() en paralelo al procesamiento de IRQ (que llama a dcn35_set_drr() en alg\u00fan momento), podemos terminar usando campos de devoluci\u00f3n de llamada de funci\u00f3n ya anulados de struct stream_resource. La l\u00f3gica en dcn35_set_drr() ya intenta evitar esto, al comprobar tg contra NULL. Pero si la anulaci\u00f3n ocurre exactamente despu\u00e9s de la comprobaci\u00f3n de NULL y antes del siguiente acceso, entonces obtenemos una ejecuci\u00f3n. Evite esto copiando tg primero a una variable local y luego use esta variable para todas las operaciones. Esto deber\u00eda funcionar, siempre y cuando nadie libere el grupo de recursos donde se encuentran los generadores de tiempo. (seleccionado de el commit 0607a50c004798a96e62c089a4c34c220179dcb5)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46851.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46851.json
index b866f4da631..01c2bf222ab 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46851.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46851.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46851",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.850",
- "lastModified": "2024-09-27T13:15:16.850",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct()\n\ndc_state_destruct() nulls the resource context of the DC state. The pipe\ncontext passed to dcn10_set_drr() is a member of this resource context.\n\nIf dc_state_destruct() is called parallel to the IRQ processing (which\ncalls dcn10_set_drr() at some point), we can end up using already nulled\nfunction callback fields of struct stream_resource.\n\nThe logic in dcn10_set_drr() already tries to avoid this, by checking tg\nagainst NULL. But if the nulling happens exactly after the NULL check and\nbefore the next access, then we get a race.\n\nAvoid this by copying tg first to a local variable, and then use this\nvariable for all the operations. This should work, as long as nobody\nfrees the resource pool where the timing generators live.\n\n(cherry picked from commit a3cc326a43bdc48fbdf53443e1027a03e309b643)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Evitar la ejecuci\u00f3n entre dcn10_set_drr() y dc_state_destruct() dc_state_destruct() anula el contexto de recurso del estado del DC. El contexto de tuber\u00eda pasado a dcn10_set_drr() es un miembro de este contexto de recurso. Si se llama a dc_state_destruct() en paralelo al procesamiento de IRQ (que llama a dcn10_set_drr() en alg\u00fan momento), podemos terminar usando campos de devoluci\u00f3n de llamada de funci\u00f3n ya anulados de struct stream_resource. La l\u00f3gica en dcn10_set_drr() ya intenta evitar esto, al comprobar tg contra NULL. Pero si la anulaci\u00f3n ocurre exactamente despu\u00e9s de la comprobaci\u00f3n de NULL y antes del siguiente acceso, entonces obtenemos una ejecuci\u00f3n. Evite esto copiando tg primero a una variable local y luego use esta variable para todas las operaciones. Esto deber\u00eda funcionar, siempre y cuando nadie libere el grupo de recursos donde se encuentran los generadores de tiempo. (seleccionado de el commit a3cc326a43bdc48fbdf53443e1027a03e309b643)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json
index 9323eb39bb3..a2f6c8c0f25 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46852",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.917",
- "lastModified": "2024-09-27T13:15:16.917",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf: heaps: Fix off-by-one in CMA heap fault handler\n\nUntil VM_DONTEXPAND was added in commit 1c1914d6e8c6 (\"dma-buf: heaps:\nDon't track CMA dma-buf pages under RssFile\") it was possible to obtain\na mapping larger than the buffer size via mremap and bypass the overflow\ncheck in dma_buf_mmap_internal. When using such a mapping to attempt to\nfault past the end of the buffer, the CMA heap fault handler also checks\nthe fault offset against the buffer size, but gets the boundary wrong by\n1. Fix the boundary check so that we don't read off the end of the pages\narray and insert an arbitrary page in the mapping."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dma-buf: heaps: Fix off-by-one in CMA heap fault handler Hasta que se agreg\u00f3 VM_DONTEXPAND en el commit 1c1914d6e8c6 (\"dma-buf: heaps: Don't track CMA dma-buf pages under RssFile\") era posible obtener un mapeo m\u00e1s grande que el tama\u00f1o del buffer a trav\u00e9s de mremap y omitir la verificaci\u00f3n de desbordamiento en dma_buf_mmap_internal. Al usar dicho mapeo para intentar fallar m\u00e1s all\u00e1 del final del b\u00fafer, el manejador de fallas del mont\u00f3n de CMA tambi\u00e9n verifica el desplazamiento de la falla contra el tama\u00f1o del b\u00fafer, pero obtiene el l\u00edmite incorrecto por 1. Corrija la verificaci\u00f3n del l\u00edmite para que no leamos el final de la matriz de p\u00e1ginas e insertemos una p\u00e1gina arbitraria en el mapeo."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46853.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46853.json
index 152cdc775ed..d2ca6fd216b 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46853.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46853.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46853",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:16.997",
- "lastModified": "2024-09-27T13:15:16.997",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: nxp-fspi: fix the KASAN report out-of-bounds bug\n\nChange the memcpy length to fix the out-of-bounds issue when writing the\ndata that is not 4 byte aligned to TX FIFO.\n\nTo reproduce the issue, write 3 bytes data to NOR chip.\n\ndd if=3b of=/dev/mtd0\n[ 36.926103] ==================================================================\n[ 36.933409] BUG: KASAN: slab-out-of-bounds in nxp_fspi_exec_op+0x26ec/0x2838\n[ 36.940514] Read of size 4 at addr ffff00081037c2a0 by task dd/455\n[ 36.946721]\n[ 36.948235] CPU: 3 UID: 0 PID: 455 Comm: dd Not tainted 6.11.0-rc5-gc7b0e37c8434 #1070\n[ 36.956185] Hardware name: Freescale i.MX8QM MEK (DT)\n[ 36.961260] Call trace:\n[ 36.963723] dump_backtrace+0x90/0xe8\n[ 36.967414] show_stack+0x18/0x24\n[ 36.970749] dump_stack_lvl+0x78/0x90\n[ 36.974451] print_report+0x114/0x5cc\n[ 36.978151] kasan_report+0xa4/0xf0\n[ 36.981670] __asan_report_load_n_noabort+0x1c/0x28\n[ 36.986587] nxp_fspi_exec_op+0x26ec/0x2838\n[ 36.990800] spi_mem_exec_op+0x8ec/0xd30\n[ 36.994762] spi_mem_no_dirmap_read+0x190/0x1e0\n[ 36.999323] spi_mem_dirmap_write+0x238/0x32c\n[ 37.003710] spi_nor_write_data+0x220/0x374\n[ 37.007932] spi_nor_write+0x110/0x2e8\n[ 37.011711] mtd_write_oob_std+0x154/0x1f0\n[ 37.015838] mtd_write_oob+0x104/0x1d0\n[ 37.019617] mtd_write+0xb8/0x12c\n[ 37.022953] mtdchar_write+0x224/0x47c\n[ 37.026732] vfs_write+0x1e4/0x8c8\n[ 37.030163] ksys_write+0xec/0x1d0\n[ 37.033586] __arm64_sys_write+0x6c/0x9c\n[ 37.037539] invoke_syscall+0x6c/0x258\n[ 37.041327] el0_svc_common.constprop.0+0x160/0x22c\n[ 37.046244] do_el0_svc+0x44/0x5c\n[ 37.049589] el0_svc+0x38/0x78\n[ 37.052681] el0t_64_sync_handler+0x13c/0x158\n[ 37.057077] el0t_64_sync+0x190/0x194\n[ 37.060775]\n[ 37.062274] Allocated by task 455:\n[ 37.065701] kasan_save_stack+0x2c/0x54\n[ 37.069570] kasan_save_track+0x20/0x3c\n[ 37.073438] kasan_save_alloc_info+0x40/0x54\n[ 37.077736] __kasan_kmalloc+0xa0/0xb8\n[ 37.081515] __kmalloc_noprof+0x158/0x2f8\n[ 37.085563] mtd_kmalloc_up_to+0x120/0x154\n[ 37.089690] mtdchar_write+0x130/0x47c\n[ 37.093469] vfs_write+0x1e4/0x8c8\n[ 37.096901] ksys_write+0xec/0x1d0\n[ 37.100332] __arm64_sys_write+0x6c/0x9c\n[ 37.104287] invoke_syscall+0x6c/0x258\n[ 37.108064] el0_svc_common.constprop.0+0x160/0x22c\n[ 37.112972] do_el0_svc+0x44/0x5c\n[ 37.116319] el0_svc+0x38/0x78\n[ 37.119401] el0t_64_sync_handler+0x13c/0x158\n[ 37.123788] el0t_64_sync+0x190/0x194\n[ 37.127474]\n[ 37.128977] The buggy address belongs to the object at ffff00081037c2a0\n[ 37.128977] which belongs to the cache kmalloc-8 of size 8\n[ 37.141177] The buggy address is located 0 bytes inside of\n[ 37.141177] allocated 3-byte region [ffff00081037c2a0, ffff00081037c2a3)\n[ 37.153465]\n[ 37.154971] The buggy address belongs to the physical page:\n[ 37.160559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89037c\n[ 37.168596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)\n[ 37.175149] page_type: 0xfdffffff(slab)\n[ 37.179021] raw: 0bfffe0000000000 ffff000800002500 dead000000000122 0000000000000000\n[ 37.186788] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000\n[ 37.194553] page dumped because: kasan: bad access detected\n[ 37.200144]\n[ 37.201647] Memory state around the buggy address:\n[ 37.206460] ffff00081037c180: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc\n[ 37.213701] ffff00081037c200: fa fc fc fc 05 fc fc fc 03 fc fc fc 02 fc fc fc\n[ 37.220946] >ffff00081037c280: 06 fc fc fc 03 fc fc fc fc fc fc fc fc fc fc fc\n[ 37.228186] ^\n[ 37.232473] ffff00081037c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 37.239718] ffff00081037c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n[ 37.246962] ==============================================================\n---truncated---"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: nxp-fspi: solucione el error de informe fuera de los l\u00edmites de KASAN Cambie la longitud de memcpy para solucionar el problema de fuera de los l\u00edmites al escribir datos que no est\u00e1n alineados con 4 bytes en TX FIFO. Para reproducir el problema, escriba datos de 3 bytes en el chip NOR. dd if=3b of=/dev/mtd0 [ 36.926103] ====================================================================== [ 36.933409] ERROR: KASAN: slab fuera de l\u00edmites en nxp_fspi_exec_op+0x26ec/0x2838 [ 36.940514] Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff00081037c2a0 por la tarea dd/455 [ 36.946721] [ 36.948235] CPU: 3 UID: 0 PID: 455 Comm: dd No contaminado 6.11.0-rc5-gc7b0e37c8434 #1070 [ 36.956185] Nombre del hardware: Freescale i.MX8QM MEK (DT) [ 36.961260] Rastreo de llamadas: [ 36.963723] dump_backtrace+0x90/0xe8 [ 36.967414] show_stack+0x18/0x24 [ 36.970749] dump_stack_lvl+0x78/0x90 [ 36.974451] print_report+0x114/0x5cc [ 36.978151] kasan_report+0xa4/0xf0 [ 36.981670] __asan_report_load_n_noabort+0x1c/0x28 [ 36.986587] nxp_fspi_exec_op+0x26ec/0x2838 [ 36.990800] spi_mem_exec_op+0x8ec/0xd30 [ 36.994762] spi_mem_no_dirmap_read+0x190/0x1e0 [ 36.999323] spi_mem_dirmap_write+0x238/0x32c [ 37.003710] spi_nor_write_data+0x220/0x374 [ 37.007932] spi_nor_write+0x110/0x2e8 [ 37.011711] mtd_write_oob_std+0x154/0x1f0 [ 37.015838] mtd_write_oob+0x104/0x1d0 [ 37.019617] mtd_write+0xb8/0x12c [ 37.022953] mtdchar_write+0x224/0x47c [ 37.026732] vfs_write+0x1e4/0x8c8 [ 37.030163] ksys_write+0xec/0x1d0 [ 37.033586] __arm64_sys_write+0x6c/0x9c [ 37.037539] invocar_syscall+0x6c/0x258 [ 37.041327] el0_svc_common.constprop.0+0x160/0x22c [ 37.046244] do_el0_svc+0x44/0x5c [ 37.049589] el0_svc+0x38/0x78 [ 37.052681] el0t_64_sync_handler+0x13c/0x158 [ 37.057077] el0t_64_sync+0x190/0x194 [ 37.060775] [ 37.062274] Asignado por la tarea 455: [ 37.065701] kasan_save_stack+0x2c/0x54 [ 37.069570] kasan_save_track+0x20/0x3c [ 37.073438] kasan_save_alloc_info+0x40/0x54 [ 37.077736] __kasan_kmalloc+0xa0/0xb8 [ 37.081515] __kmalloc_noprof+0x158/0x2f8 [ 37.085563] mtd_kmalloc_up_to+0x120/0x154 [ 37.089690] mtdchar_write+0x130/0x47c [ 37.093469] vfs_write+0x1e4/0x8c8 [ 37.096901] ksys_write+0xec/0x1d0 [ 37.100332] __arm64_sys_write+0x6c/0x9c [ 37.104287] invoque_syscall+0x6c/0x258 [ 37.108064] el0_svc_common.constprop.0+0x160/0x22c [ 37.112972] do_el0_svc+0x44/0x5c [ 37.116319] el0_svc+0x38/0x78 [ 37.119401] el0t_64_sync_handler+0x13c/0x158 [ 37.123788] el0t_64_sync+0x190/0x194 [ 37.127474] [ 37.128977] La direcci\u00f3n con errores pertenece al objeto en ffff00081037c2a0 [ 37.128977] que pertenece al cach\u00e9 kmalloc-8 de tama\u00f1o 8 [ 37.141177] La direcci\u00f3n con errores se encuentra a 0 bytes dentro de la [ 37.141177] regi\u00f3n asignada de 3 bytes [ffff00081037c2a0, ffff00081037c2a3) [ 37.153465] [ 37.154971] La direcci\u00f3n con errores pertenece a la p\u00e1gina f\u00edsica: [ 37.160559] p\u00e1gina: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89037c [ 37.168596] indicadores: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.175149] page_type: 0xfdffffff(slab) [ 37.179021] raw: 0bfffe0000000000 ffff000800002500 dead000000000122 0000000000000000 [ 37.186788] raw: 000000000000000 0000000080800080 00000001fdffffff 0000000000000000 [ 37.194553] p\u00e1gina volcada porque: kasan: se detect\u00f3 un acceso incorrecto [ 37.200144] [ 37.201647] Estado de la memoria alrededor de la direcci\u00f3n con errores: [ 37.206460] ffff00081037c180: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc [ 37.213701] ffff00081037c200: fa fc fc fc 05 fc fc fc 03 fc fc fc 02 fc fc fc [ 37.220946] 081037c280: 06 fc fc fc 03 fc fc fc fc fc fc fc fc [ 37.228186] ^ [ 37.232473] ffff00081037c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.239718] ffff00081037c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.246962] ===================================================== ========== ---truncado---"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46854.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46854.json
index 888c9918e59..ebfb9598511 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46854.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46854.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46854",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.063",
- "lastModified": "2024-09-27T13:15:17.063",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dpaa: Pad packets to ETH_ZLEN\n\nWhen sending packets under 60 bytes, up to three bytes of the buffer\nfollowing the data may be leaked. Avoid this by extending all packets to\nETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be\nreproduced by running\n\n\t$ ping -s 11 destination"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dpaa: Paquetes de relleno a ETH_ZLEN Al enviar paquetes de menos de 60 bytes, se pueden filtrar hasta tres bytes del b\u00fafer que sigue a los datos. Evite esto extendiendo todos los paquetes a ETH_ZLEN, asegur\u00e1ndose de que no se filtre nada en el relleno. Este error se puede reproducir ejecutando $ ping -s 11 destination"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json
index a20a5e51e1b..ae470e05bfc 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46855",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.133",
- "lastModified": "2024-09-27T13:15:17.133",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_socket: fix sk refcount leaks\n\nWe must put 'sk' reference before returning."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_socket: corrige fugas de referencias de sk Debemos poner la referencia 'sk' antes de regresar."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46856.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46856.json
index b97cfd9293f..16ebd5cf0e3 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46856.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46856.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46856",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.210",
- "lastModified": "2024-09-27T13:15:17.210",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: dp83822: Fix NULL pointer dereference on DP83825 devices\n\nThe probe() function is only used for DP83822 and DP83826 PHY,\nleaving the private data pointer uninitialized for the DP83825 models\nwhich causes a NULL pointer dereference in the recently introduced/changed\nfunctions dp8382x_config_init() and dp83822_set_wol().\n\nAdd the dp8382x_probe() function, so all PHY models will have a valid\nprivate data pointer to fix this issue and also prevent similar issues\nin the future."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: phy: dp83822: Se corrige la desreferencia del puntero NULL en los dispositivos DP83825 La funci\u00f3n probe() solo se usa para DP83822 y DP83826 PHY, lo que deja el puntero de datos privados sin inicializar para los modelos DP83825, lo que provoca una desreferencia del puntero NULL en las funciones recientemente introducidas/cambiadas dp8382x_config_init() y dp83822_set_wol(). Agregue la funci\u00f3n dp8382x_probe(), para que todos los modelos PHY tengan un puntero de datos privados v\u00e1lido para solucionar este problema y tambi\u00e9n evitar problemas similares en el futuro."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46857.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46857.json
index 0ae63eae09a..2d9460b3bf8 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46857.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46857.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46857",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.277",
- "lastModified": "2024-09-27T13:15:17.277",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix bridge mode operations when there are no VFs\n\nCurrently, trying to set the bridge mode attribute when numvfs=0 leads to a\ncrash:\n\nbridge link set dev eth2 hwmode vepa\n\n[ 168.967392] BUG: kernel NULL pointer dereference, address: 0000000000000030\n[...]\n[ 168.969989] RIP: 0010:mlx5_add_flow_rules+0x1f/0x300 [mlx5_core]\n[...]\n[ 168.976037] Call Trace:\n[ 168.976188] \n[ 168.978620] _mlx5_eswitch_set_vepa_locked+0x113/0x230 [mlx5_core]\n[ 168.979074] mlx5_eswitch_set_vepa+0x7f/0xa0 [mlx5_core]\n[ 168.979471] rtnl_bridge_setlink+0xe9/0x1f0\n[ 168.979714] rtnetlink_rcv_msg+0x159/0x400\n[ 168.980451] netlink_rcv_skb+0x54/0x100\n[ 168.980675] netlink_unicast+0x241/0x360\n[ 168.980918] netlink_sendmsg+0x1f6/0x430\n[ 168.981162] ____sys_sendmsg+0x3bb/0x3f0\n[ 168.982155] ___sys_sendmsg+0x88/0xd0\n[ 168.985036] __sys_sendmsg+0x59/0xa0\n[ 168.985477] do_syscall_64+0x79/0x150\n[ 168.987273] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 168.987773] RIP: 0033:0x7f8f7950f917\n\n(esw->fdb_table.legacy.vepa_fdb is null)\n\nThe bridge mode is only relevant when there are multiple functions per\nport. Therefore, prevent setting and getting this setting when there are no\nVFs.\n\nNote that after this change, there are no settings to change on the PF\ninterface using `bridge link` when there are no VFs, so the interface no\nlonger appears in the `bridge link` output."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Corregir operaciones en modo puente cuando no hay VF Actualmente, intentar establecer el atributo de modo puente cuando numvfs=0 provoca un bloqueo: bridge link set dev eth2 hwmode vepa [ 168.967392] ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000030 [...] [ 168.969989] RIP: 0010:mlx5_add_flow_rules+0x1f/0x300 [mlx5_core] [...] [ 168.976037] Seguimiento de llamadas: [ 168.976188] [ 168.978620] _mlx5_eswitch_set_vepa_locked+0x113/0x230 [mlx5_core] [ 168.979074] mlx5_eswitch_set_vepa+0x7f/0xa0 [mlx5_core] [ 168.979471] rtnl_bridge_setlink+0xe9/0x1f0 [ 168.979714] rtnetlink_rcv_msg+0x159/0x400 [ 168.980451] netlink_rcv_skb+0x54/0x100 [ 168.980675] netlink_unicast+0x241/0x360 [ 168.980918] netlink_sendmsg+0x1f6/0x430 [ 168.981162] ____sys_sendmsg+0x3bb/0x3f0 [ 168.982155] ___sys_sendmsg+0x88/0xd0 [ 168.985036] __sys_sendmsg+0x59/0xa0 [ 168.985477] do_syscall_64+0x79/0x150 [ 168.987273] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 168.987773] RIP: 0033:0x7f8f7950f917 (esw->fdb_table.legacy.vepa_fdb es nulo) El modo puente solo es relevante cuando hay varias funciones por puerto. Por lo tanto, evite configurar y obtener esta configuraci\u00f3n cuando no haya VF. Tenga en cuenta que despu\u00e9s de este cambio, no hay configuraciones para cambiar en la interfaz PF usando \"enlace de puente\" cuando no hay VF, por lo que la interfaz ya no aparece en la salida del \"enlace de puente\"."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46858.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46858.json
index 465fd2ef534..951fa6561df 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46858.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46858.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46858",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.353",
- "lastModified": "2024-09-27T13:15:17.353",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: pm: Fix uaf in __timer_delete_sync\n\nThere are two paths to access mptcp_pm_del_add_timer, result in a race\ncondition:\n\n CPU1\t\t\t\tCPU2\n ==== ====\n net_rx_action\n napi_poll netlink_sendmsg\n __napi_poll netlink_unicast\n process_backlog netlink_unicast_kernel\n __netif_receive_skb genl_rcv\n __netif_receive_skb_one_core netlink_rcv_skb\n NF_HOOK genl_rcv_msg\n ip_local_deliver_finish genl_family_rcv_msg\n ip_protocol_deliver_rcu genl_family_rcv_msg_doit\n tcp_v4_rcv mptcp_pm_nl_flush_addrs_doit\n tcp_v4_do_rcv mptcp_nl_remove_addrs_list\n tcp_rcv_established mptcp_pm_remove_addrs_and_subflows\n tcp_data_queue remove_anno_list_by_saddr\n mptcp_incoming_options mptcp_pm_del_add_timer\n mptcp_pm_del_add_timer kfree(entry)\n\nIn remove_anno_list_by_saddr(running on CPU2), after leaving the critical\nzone protected by \"pm.lock\", the entry will be released, which leads to the\noccurrence of uaf in the mptcp_pm_del_add_timer(running on CPU1).\n\nKeeping a reference to add_timer inside the lock, and calling\nsk_stop_timer_sync() with this reference, instead of \"entry->add_timer\".\n\nMove list_del(&entry->list) to mptcp_pm_del_add_timer and inside the pm lock,\ndo not directly access any members of the entry outside the pm lock, which\ncan avoid similar \"entry->x\" uaf."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp:pm: Se corrige uaf en __timer_delete_sync Hay dos rutas para acceder a mptcp_pm_del_add_timer, lo que genera una condici\u00f3n de carrera: CPU1 CPU2 ==== ==== net_rx_action napi_poll netlink_sendmsg __napi_poll netlink_unicast process_backlog netlink_unicast_kernel __netif_receive_skb genl_rcv __netif_receive_skb_one_core netlink_rcv_skb NF_HOOK genl_rcv_msg ip_local_deliver_finish genl_family_rcv_msg ip_protocol_deliver_rcu genl_family_rcv_msg_doit tcp_v4_rcv mptcp_pm_nl_flush_addrs_doit tcp_v4_do_rcv mptcp_nl_remove_addrs_list tcp_rcv_established mptcp_pm_remove_addrs_and_subflows tcp_data_queue remove_anno_list_by_saddr mptcp_incoming_options mptcp_pm_del_add_timer mptcp_pm_del_add_timer kfree(entrada) En remove_anno_list_by_saddr(que se ejecuta en la CPU2), despu\u00e9s de salir de la zona cr\u00edtica protegida por \"pm.lock\", se liberar\u00e1 la entrada, lo que lleva a la aparici\u00f3n de uaf en mptcp_pm_del_add_timer(que se ejecuta en la CPU1). Mantener una referencia a add_timer dentro del bloqueo y llamar a sk_stop_timer_sync() con esta referencia, en lugar de \"entrada->add_timer\". Mueva list_del(&entry->list) a mptcp_pm_del_add_timer y dentro del bloqueo pm, no acceda directamente a ning\u00fan miembro de la entrada fuera del bloqueo pm, lo que puede evitar un uaf \"entry->x\" similar."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46859.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46859.json
index cf9db0c0720..adc0ff81b47 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46859.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46859.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46859",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.430",
- "lastModified": "2024-09-27T13:15:17.430",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: panasonic-laptop: Fix SINF array out of bounds accesses\n\nThe panasonic laptop code in various places uses the SINF array with index\nvalues of 0 - SINF_CUR_BRIGHT(0x0d) without checking that the SINF array\nis big enough.\n\nNot all panasonic laptops have this many SINF array entries, for example\nthe Toughbook CF-18 model only has 10 SINF array entries. So it only\nsupports the AC+DC brightness entries and mute.\n\nCheck that the SINF array has a minimum size which covers all AC+DC\nbrightness entries and refuse to load if the SINF array is smaller.\n\nFor higher SINF indexes hide the sysfs attributes when the SINF array\ndoes not contain an entry for that attribute, avoiding show()/store()\naccessing the array out of bounds and add bounds checking to the probe()\nand resume() code accessing these."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: plataforma/x86: panasonic-laptop: Arreglar accesos fuera de los l\u00edmites a la matriz SINF El c\u00f3digo de la computadora port\u00e1til Panasonic en varios lugares usa la matriz SINF con valores de \u00edndice de 0 - SINF_CUR_BRIGHT(0x0d) sin verificar que la matriz SINF sea lo suficientemente grande. No todas las computadoras port\u00e1tiles Panasonic tienen esta cantidad de entradas de matriz SINF, por ejemplo, el modelo Toughbook CF-18 solo tiene 10 entradas de matriz SINF. Por lo tanto, solo admite las entradas de brillo AC+DC y silencio. Verifique que la matriz SINF tenga un tama\u00f1o m\u00ednimo que cubra todas las entradas de brillo AC+DC y reh\u00fase a cargar si la matriz SINF es m\u00e1s peque\u00f1a. Para \u00edndices SINF m\u00e1s altos, oculte los atributos sysfs cuando la matriz SINF no contenga una entrada para ese atributo, evitando que show()/store() acceda a la matriz fuera de los l\u00edmites y agregue verificaci\u00f3n de los l\u00edmites al c\u00f3digo probe() y resume() que accede a estos."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46860.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46860.json
index 377fbb59289..9343361ad85 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46860.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46860.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46860",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.493",
- "lastModified": "2024-09-27T13:15:17.493",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change\n\nWhen disabling wifi mt7921_ipv6_addr_change() is called as a notifier.\nAt this point mvif->phy is already NULL so we cannot use it here."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7921: se corrige el acceso al puntero NULL en mt7921_ipv6_addr_change. Al deshabilitar wifi, se llama a mt7921_ipv6_addr_change() como notificador. En este punto, mvif->phy ya es NULL, por lo que no podemos usarlo aqu\u00ed."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json
index b26290c8d18..67c0d7704b1 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46861.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46861",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.563",
- "lastModified": "2024-09-27T13:15:17.563",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: ipheth: do not stop RX on failing RX callback\n\nRX callbacks can fail for multiple reasons:\n\n* Payload too short\n* Payload formatted incorrecly (e.g. bad NCM framing)\n* Lack of memory\n\nNone of these should cause the driver to seize up.\n\nMake such failures non-critical and continue processing further\nincoming URBs."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: ipheth: no detiene RX en caso de error en la devoluci\u00f3n de llamada RX Las devoluciones de llamada RX pueden fallar por m\u00faltiples razones: * Payload demasiado corto * Payload formateado incorrectamente (por ejemplo, mala estructura de NCM) * Falta de memoria Ninguna de estas deber\u00eda provocar que el controlador se bloquee. Haga que estas fallas no sean cr\u00edticas y contin\u00fae procesando m\u00e1s URB entrantes."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json
index b771b9d1194..ae6be3d0861 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46862.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46862",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.627",
- "lastModified": "2024-09-27T13:15:17.627",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: soc-acpi-intel-mtl-match: add missing empty item\n\nThere is no links_num in struct snd_soc_acpi_mach {}, and we test\n!link->num_adr as a condition to end the loop in hda_sdw_machine_select().\nSo an empty item in struct snd_soc_acpi_link_adr array is required."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: soc-acpi-intel-mtl-match: agregar elemento vac\u00edo faltante No hay links_num en struct snd_soc_acpi_mach {}, y probamos !link->num_adr como condici\u00f3n para finalizar el bucle en hda_sdw_machine_select(). Por lo tanto, se requiere un elemento vac\u00edo en la matriz struct snd_soc_acpi_link_adr."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json
index cc8bafc2480..54971717857 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46863.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46863",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.690",
- "lastModified": "2024-09-27T13:15:17.690",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item\n\nThere is no links_num in struct snd_soc_acpi_mach {}, and we test\n!link->num_adr as a condition to end the loop in hda_sdw_machine_select().\nSo an empty item in struct snd_soc_acpi_link_adr array is required."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: Intel: soc-acpi-intel-lnl-match: agregar elemento vac\u00edo faltante No hay links_num en struct snd_soc_acpi_mach {}, y probamos !link->num_adr como condici\u00f3n para finalizar el bucle en hda_sdw_machine_select(). Por lo tanto, se requiere un elemento vac\u00edo en la matriz struct snd_soc_acpi_link_adr."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json
index e0fb497fcbf..fc8f417f6f5 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46864.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46864",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.747",
- "lastModified": "2024-09-27T13:15:17.747",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: fix kexec crash due to VP assist page corruption\n\ncommit 9636be85cc5b (\"x86/hyperv: Fix hyperv_pcpu_input_arg handling when\nCPUs go online/offline\") introduces a new cpuhp state for hyperv\ninitialization.\n\ncpuhp_setup_state() returns the state number if state is\nCPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.\nFor the hyperv case, since a new cpuhp state was introduced it would\nreturn 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call\nis conditioned upon \"hyperv_init_cpuhp > 0\". This will never be true and\nso hv_cpu_die() won't be called on all CPUs. This means the VP assist page\nwon't be reset. When the kexec kernel tries to setup the VP assist page\nagain, the hypervisor corrupts the memory region of the old VP assist page\ncausing a panic in case the kexec kernel is using that memory elsewhere.\nThis was originally fixed in commit dfe94d4086e4 (\"x86/hyperv: Fix kexec\npanic/hang issues\").\n\nGet rid of hyperv_init_cpuhp entirely since we are no longer using a\ndynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with\ncpuhp_remove_state()."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/hyperv: fix kexec crash due to VP assist page corrupt commit 9636be85cc5b (\"x86/hyperv: Fix hyperv_pcpu_input_arg management when CPUs go online/offline\") introduce un nuevo estado de cpuhp para la inicializaci\u00f3n de hyperv. cpuhp_setup_state() devuelve el n\u00famero de estado si el estado es CPUHP_AP_ONLINE_DYN o CPUHP_BP_PREPARE_DYN y 0 para todos los dem\u00e1s estados. Para el caso de hyperv, dado que se introdujo un nuevo estado de cpuhp, devolver\u00eda 0. Sin embargo, en hv_machine_shutdown(), la llamada a cpuhp_remove_state() est\u00e1 condicionada a \"hyperv_init_cpuhp > 0\". Esto nunca ser\u00e1 cierto y, por lo tanto, hv_cpu_die() no se llamar\u00e1 en todas las CPU. Esto significa que la p\u00e1gina de asistencia de VP no se restablecer\u00e1. Cuando el kernel de kexec intenta configurar la p\u00e1gina de asistencia de VP nuevamente, el hipervisor corrompe la regi\u00f3n de memoria de la p\u00e1gina de asistencia de VP anterior, lo que provoca un p\u00e1nico en caso de que el kernel de kexec est\u00e9 usando esa memoria en otro lugar. Esto se solucion\u00f3 originalmente en el commit dfe94d4086e4 (\"x86/hyperv: Fix kexec panic/hang issues\"). Desh\u00e1gase de hyperv_init_cpuhp por completo, ya que ya no estamos usando un estado de cpuhp din\u00e1mico y use CPUHP_AP_HYPERV_ONLINE directamente con cpuhp_remove_state()."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46865.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46865.json
index 9d28ff5f001..44b84accb49 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46865.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46865.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46865",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.820",
- "lastModified": "2024-09-27T13:15:17.820",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: fix initialization of grc\n\nThe grc must be initialize first. There can be a condition where if\nfou is NULL, goto out will be executed and grc would be used\nuninitialized."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fou: se corrige la inicializaci\u00f3n de grc. Primero se debe inicializar grc. Puede haber una condici\u00f3n en la que si fou es NULL, se ejecutar\u00e1 goto out y se utilizar\u00e1 grc sin inicializar."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46866.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46866.json
index 22cc29d4bb1..7833a1753d1 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46866.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46866.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46866",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.887",
- "lastModified": "2024-09-27T13:15:17.887",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/client: add missing bo locking in show_meminfo()\n\nbo_meminfo() wants to inspect bo state like tt and the ttm resource,\nhowever this state can change at any point leading to stuff like NPD and\nUAF, if the bo lock is not held. Grab the bo lock when calling\nbo_meminfo(), ensuring we drop any spinlocks first. In the case of\nobject_idr we now also need to hold a ref.\n\nv2 (MattB)\n - Also add xe_bo_assert_held()\n\n(cherry picked from commit 4f63d712fa104c3ebefcb289d1e733e86d8698c7)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe/client: a\u00f1adir bloqueo de bo faltante en show_meminfo() bo_meminfo() quiere inspeccionar el estado de bo como tt y el recurso ttm, sin embargo, este estado puede cambiar en cualquier momento y provocar problemas como NPD y UAF, si no se mantiene el bloqueo de bo. Toma el bloqueo de bo al llamar a bo_meminfo(), asegur\u00e1ndote de que eliminamos primero cualquier spinlock. En el caso de object_idr, ahora tambi\u00e9n necesitamos mantener una referencia. v2 (MattB) - Tambi\u00e9n a\u00f1ade xe_bo_assert_held() (seleccionado de el commit 4f63d712fa104c3ebefcb289d1e733e86d8698c7)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46867.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46867.json
index 41c1ebe7927..2f4551d6f46 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46867.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46867.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46867",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.937",
- "lastModified": "2024-09-27T13:15:17.937",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/client: fix deadlock in show_meminfo()\n\nThere is a real deadlock as well as sleeping in atomic() bug in here, if\nthe bo put happens to be the last ref, since bo destruction wants to\ngrab the same spinlock and sleeping locks. Fix that by dropping the ref\nusing xe_bo_put_deferred(), and moving the final commit outside of the\nlock. Dropping the lock around the put is tricky since the bo can go\nout of scope and delete itself from the list, making it difficult to\nnavigate to the next list entry.\n\n(cherry picked from commit 0083b8e6f11d7662283a267d4ce7c966812ffd8a)"
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe/client: se corrige el bloqueo en show_meminfo(). Hay un bloqueo real, as\u00ed como un error de suspensi\u00f3n en atomic(), si resulta que la put de bo es la \u00faltima referencia, ya que la destrucci\u00f3n de bo quiere tomar el mismo spinlock y los bloqueos inactivos. Arregle eso eliminando la referencia usando xe_bo_put_deferred() y moviendo el commit final fuera del bloqueo. Eliminar el bloqueo alrededor de la put es complicado, ya que el bo puede salir del \u00e1mbito y eliminarse a s\u00ed mismo de la lista, lo que dificulta la navegaci\u00f3n a la siguiente entrada de la lista. (seleccionado de el commit 0083b8e6f11d7662283a267d4ce7c966812ffd8a)"
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46868.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46868.json
index 13cbdef1e4b..5b4724df73c 100644
--- a/CVE-2024/CVE-2024-468xx/CVE-2024-46868.json
+++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46868.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-46868",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:18.007",
- "lastModified": "2024-09-27T13:15:18.007",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: qcom: uefisecapp: Fix deadlock in qcuefi_acquire()\n\nIf the __qcuefi pointer is not set, then in the original code, we would\nhold onto the lock. That means that if we tried to set it later, then\nit would cause a deadlock. Drop the lock on the error path. That's\nwhat all the callers are expecting."
+ },
+ {
+ "lang": "es",
+ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: uefisecapp: Se corrige el bloqueo en qcuefi_acquire() Si el puntero __qcuefi no est\u00e1 configurado, entonces en el c\u00f3digo original, mantendr\u00edamos el bloqueo. Eso significa que si intent\u00e1ramos configurarlo m\u00e1s tarde, causar\u00eda un bloqueo. Eliminar el bloqueo en la ruta de error. Eso es lo que todos los que llaman esperan."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json
index d74409aeff6..b79fe4e9c35 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47069.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47069",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-23T16:15:07.160",
- "lastModified": "2024-09-26T13:32:55.343",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:40:36.460",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -51,22 +71,60 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oveleon:cookiebar:*:*:*:*:*:cantao:*:*",
+ "versionEndExcluding": "1.16.3",
+ "matchCriteriaId": "FFD4696B-4747-49FA-BA81-DA7C1EA0AF56"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oveleon:cookiebar:*:*:*:*:*:cantao:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.1.3",
+ "matchCriteriaId": "96D39411-CBD8-4C7C-B87C-0B737CF8522E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Technical Description"
+ ]
},
{
"url": "https://github.com/oveleon/contao-cookiebar/blob/2.x/src/Controller/CookiebarController.php",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/oveleon/contao-cookiebar/commit/1d57470be5878f66d5e1e23f624dd387564b9b8d",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/oveleon/contao-cookiebar/security/advisories/GHSA-296q-rj83-g9rq",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47070.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47070.json
index 04fe3d358fd..4a4d6629dcb 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47070.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47070.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47070",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-27T16:15:05.413",
- "lastModified": "2024-09-27T16:15:05.413",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "authentik is an open-source identity provider. A vulnerability that exists in versions prior to 2024.8.3 and 2024.6.5 allows bypassing password login by adding X-Forwarded-For header with an unparsable IP address, e.g. `a`. This results in a possibility of logging into any account with a known login or email address. The vulnerability requires the authentik instance to trust X-Forwarded-For header provided by the attacker, thus it is not reproducible from external hosts on a properly configured environment. The issue occurs due to the password stage having a policy bound to it, which skips the password stage if the Identification stage is setup to also contain a password stage. Due to the invalid X-Forwarded-For header, which does not get validated to be an IP Address early enough, the exception happens later and the policy fails. The default blueprint doesn't correctly set `failure_result` to `True` on the policy binding meaning that due to this exception the policy returns false and the password stage is skipped. Versions 2024.8.3 and 2024.6.5 fix this issue."
+ },
+ {
+ "lang": "es",
+ "value": "authentik es un proveedor de identidad de c\u00f3digo abierto. Una vulnerabilidad que existe en versiones anteriores a 2024.8.3 y 2024.6.5 permite omitir el inicio de sesi\u00f3n con contrase\u00f1a agregando el encabezado X-Forwarded-For con una direcci\u00f3n IP que no se puede analizar, por ejemplo, `a`. Esto genera la posibilidad de iniciar sesi\u00f3n en cualquier cuenta con un nombre de usuario o una direcci\u00f3n de correo electr\u00f3nico conocidos. La vulnerabilidad requiere que la instancia de authentik conf\u00ede en el encabezado X-Forwarded-For proporcionado por el atacante, por lo que no es reproducible desde hosts externos en un entorno configurado correctamente. El problema ocurre debido a que la etapa de contrase\u00f1a tiene una pol\u00edtica vinculada a ella, que omite la etapa de contrase\u00f1a si la etapa de identificaci\u00f3n est\u00e1 configurada para contener tambi\u00e9n una etapa de contrase\u00f1a. Debido al encabezado X-Forwarded-For no v\u00e1lido, que no se valida como una direcci\u00f3n IP con la suficiente anticipaci\u00f3n, la excepci\u00f3n ocurre m\u00e1s tarde y la pol\u00edtica falla. El modelo predeterminado no establece correctamente `failure_result` en `True` en el enlace de pol\u00edtica, lo que significa que debido a esta excepci\u00f3n, la pol\u00edtica devuelve falso y se omite la etapa de contrase\u00f1a. Las versiones 2024.8.3 y 2024.6.5 solucionan este problema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json
index 05ac3ba17e7..6baee8304b8 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47075.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47075",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T18:15:08.757",
- "lastModified": "2024-09-26T18:15:08.757",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json
index e1d4e3c83e6..b7216bb030e 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47076.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47076",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T22:15:04.063",
- "lastModified": "2024-09-26T22:15:04.063",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47077.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47077.json
index e46e1240eb1..747c66d1b43 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47077.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47077.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47077",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-27T16:15:06.043",
- "lastModified": "2024-09-27T16:15:06.043",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "authentik is an open-source identity provider. Prior to versions 2024.8.3 and 2024.6.5, access tokens issued to one application can be stolen by that application and used to impersonate the user against any other proxy provider. Also, a user can steal an access token they were legitimately issued for one application and use it to access another application that they aren't allowed to access. Anyone who has more than one proxy provider application with different trust domains or different access control is affected. Versions 2024.8.3 and 2024.6.5 fix the issue."
+ },
+ {
+ "lang": "es",
+ "value": "authentik es un proveedor de identidad de c\u00f3digo abierto. Antes de las versiones 2024.8.3 y 2024.6.5, los tokens de acceso emitidos para una aplicaci\u00f3n pueden ser robados por esa aplicaci\u00f3n y utilizados para hacerse pasar por el usuario frente a cualquier otro proveedor de proxy. Adem\u00e1s, un usuario puede robar un token de acceso que se le emiti\u00f3 leg\u00edtimamente para una aplicaci\u00f3n y utilizarlo para acceder a otra aplicaci\u00f3n a la que no tiene permitido acceder. Cualquier persona que tenga m\u00e1s de una aplicaci\u00f3n de proveedor de proxy con diferentes dominios de confianza o diferentes controles de acceso se ve afectada. Las versiones 2024.8.3 y 2024.6.5 solucionan el problema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json
index 9fb2a84df1e..c0d53d495cc 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47121.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47121",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:08.967",
- "lastModified": "2024-09-26T18:15:08.967",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json
index 5f7bff49c13..61ce21203e4 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47122.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47122",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.077",
- "lastModified": "2024-09-26T18:15:09.077",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json
index 53ddad49493..6f28c595153 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47123.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47123",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.193",
- "lastModified": "2024-09-26T19:35:23.310",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json
index de72885b616..e17a47406fe 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47124.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47124",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.310",
- "lastModified": "2024-09-26T18:15:09.310",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json
index c48721f7c66..fe1607c0b67 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47125.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47125",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.430",
- "lastModified": "2024-09-26T18:15:09.430",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json
index 72f5cd0ab80..7bf400d16e2 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47126.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47126",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.553",
- "lastModified": "2024-09-26T18:15:09.553",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json
index 9584a4f7f1f..34f3d5f7a47 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47127.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47127",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.667",
- "lastModified": "2024-09-26T18:15:09.667",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json
index 89c9f08f3d4..8f55f17a14e 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47128.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47128",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.783",
- "lastModified": "2024-09-26T18:15:09.783",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json
index fd875600a42..cd557e1a02a 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47129.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47129",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:09.913",
- "lastModified": "2024-09-26T18:15:09.913",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json
index 7a7852f5e8c..d3b73164b51 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47130.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47130",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T18:15:10.040",
- "lastModified": "2024-09-26T18:15:10.040",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json
index 113e63bb825..302d369c80b 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47169",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T18:15:10.157",
- "lastModified": "2024-09-26T18:15:10.157",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json
index c1da85b32d3..7653cde424b 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47170",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T18:15:10.370",
- "lastModified": "2024-09-26T18:15:10.370",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json
index 5f18376b4ca..7f398714408 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47171.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47171",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T18:15:10.590",
- "lastModified": "2024-09-26T18:15:10.590",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json
index afddfce0a49..1fb397e6c18 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47174.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47174",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T18:15:10.840",
- "lastModified": "2024-09-26T18:15:10.840",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json
index cc13e59accf..22da0e5410a 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47175.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47175",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T22:15:04.283",
- "lastModified": "2024-09-26T22:15:04.283",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json
index 32ec46762d0..796657c3a3a 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47176.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47176",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T22:15:04.497",
- "lastModified": "2024-09-26T22:15:04.497",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json
index 8fb4894b79e..e92a6233bd8 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47177.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47177",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T22:15:04.740",
- "lastModified": "2024-09-26T22:15:04.740",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json
index 82d8885e7dd..cb950b06707 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47179.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47179",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T20:15:06.950",
- "lastModified": "2024-09-26T20:15:06.950",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json
index c1aeb8ab867..167086483e2 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47180.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-47180",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-26T20:15:07.310",
- "lastModified": "2024-09-26T20:15:07.310",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47182.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47182.json
index c08be3c520d..4992e2f96e8 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47182.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47182.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47182",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-27T14:15:04.620",
- "lastModified": "2024-09-27T14:15:04.620",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3."
+ },
+ {
+ "lang": "es",
+ "value": "Dozzle es un visualizador de registros en tiempo real para contenedores Docker. Antes de la versi\u00f3n 8.5.3, la aplicaci\u00f3n utilizaba sha-256 como hash para las contrase\u00f1as, lo que dejaba a los usuarios expuestos a ataques de tablas arco\u00edris. La aplicaci\u00f3n cambia a bcrypt, un hash m\u00e1s apropiado para las contrase\u00f1as, en la versi\u00f3n 8.5.3."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47184.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47184.json
index b96d18eb43c..85646410e2e 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47184.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47184.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47184",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-27T14:15:04.833",
- "lastModified": "2024-09-27T14:15:04.833",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ampache is a web based audio/video streaming application and file manager. Prior to version 6.6.0, the Democratic Playlist Name is vulnerable to a stored cross-site scripting. Version 6.6.0 fixes this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Ampache es una aplicaci\u00f3n de transmisi\u00f3n de audio y video basada en la Web y un administrador de archivos. Antes de la versi\u00f3n 6.6.0, el nombre de la lista de reproducci\u00f3n democr\u00e1tica era vulnerable a un ataque de cross site scripting. La versi\u00f3n 6.6.0 soluciona este problema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json
index f86cee8569e..01167329868 100644
--- a/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json
+++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47186",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-27T21:15:03.443",
- "lastModified": "2024-09-27T21:15:03.443",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Filament is a collection of full-stack components for Laravel development. Versions of Filament from v3.0.0 through v3.2.114 are affected by a cross-site scripting (XSS) vulnerability. If values passed to a `ColorColumn` or `ColumnEntry` are not valid and contain a specific set of characters, applications are vulnerable to XSS attack against a user who opens a page on which a color column or entry is rendered. Filament v3.2.115 fixes this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Filament es una colecci\u00f3n de componentes full-stack para el desarrollo de Laravel. Las versiones de Filament desde la v3.0.0 hasta la v3.2.114 se ven afectadas por una vulnerabilidad de cross site scripting (XSS). Si los valores que se pasan a `ColorColumn` o `ColumnEntry` no son v\u00e1lidos y contienen un conjunto espec\u00edfico de caracteres, las aplicaciones son vulnerables a ataques XSS contra un usuario que abre una p\u00e1gina en la que se representa una columna o entrada de color. Filament v3.2.115 corrige este problema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47290.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47290.json
index cf749692c6d..f73d692788c 100644
--- a/CVE-2024/CVE-2024-472xx/CVE-2024-47290.json
+++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47290.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47290",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-27T11:15:11.203",
- "lastModified": "2024-09-27T11:15:11.203",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Input validation vulnerability in the USB service module\nImpact: Successful exploitation of this vulnerability may affect availability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de validaci\u00f3n de entrada en el m\u00f3dulo de servicio USB Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47291.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47291.json
index 6392931410c..eeef4c14c19 100644
--- a/CVE-2024/CVE-2024-472xx/CVE-2024-47291.json
+++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47291.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47291",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-27T11:15:11.800",
- "lastModified": "2024-09-27T11:15:11.800",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Permission vulnerability in the ActivityManagerService (AMS) module\nImpact: Successful exploitation of this vulnerability may affect availability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de permisos en el m\u00f3dulo ActivityManagerService (AMS) Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47292.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47292.json
index 00766e6ce00..38038ab5120 100644
--- a/CVE-2024/CVE-2024-472xx/CVE-2024-47292.json
+++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47292.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47292",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-27T11:15:12.210",
- "lastModified": "2024-09-27T11:15:12.210",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability in the Bluetooth module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Path Traversal en el m\u00f3dulo Bluetooth Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47293.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47293.json
index 5e8032a7924..e0bd92b1566 100644
--- a/CVE-2024/CVE-2024-472xx/CVE-2024-47293.json
+++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47293.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47293",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-27T11:15:12.527",
- "lastModified": "2024-09-27T11:15:12.527",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write vulnerability in the HAL-WIFI module\nImpact: Successful exploitation of this vulnerability may affect availability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de escritura fuera de los l\u00edmites en el m\u00f3dulo HAL-WIFI Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47294.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47294.json
index 740415502bd..98a5e964102 100644
--- a/CVE-2024/CVE-2024-472xx/CVE-2024-47294.json
+++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47294.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-47294",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-27T11:15:12.840",
- "lastModified": "2024-09-27T11:15:12.840",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access permission verification vulnerability in the input method framework module\nImpact: Successful exploitation of this vulnerability may affect availability."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo de framework del m\u00e9todo de entrada Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47641.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47641.json
new file mode 100644
index 00000000000..b38ccc59f46
--- /dev/null
+++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47641.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2024-47641",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2024-09-30T13:15:02.570",
+ "lastModified": "2024-09-30T13:15:02.570",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloperr Confetti Fall Animation allows Stored XSS.This issue affects Confetti Fall Animation: from n/a through 1.3.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/confetti-fall-animation/wordpress-confetti-fall-animation-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6051.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6051.json
new file mode 100644
index 00000000000..b39d4f22bf8
--- /dev/null
+++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6051.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2024-6051",
+ "sourceIdentifier": "cvd@cert.pl",
+ "published": "2024-09-30T13:15:02.800",
+ "lastModified": "2024-09-30T13:15:02.800",
+ "vulnStatus": "Received",
+ "cveTags": [],
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Application Scripting vulnerability in Vercom S.A. Redlink SDK\u00a0in specific situations allows local code injection and to manipulate the view of a vulnerable application.This issue affects Redlink SDK versions through 1.13."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV40": [
+ {
+ "source": "cvd@cert.pl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "4.0",
+ "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:L/U:Clear",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "attackRequirements": "PRESENT",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "ACTIVE",
+ "vulnerableSystemConfidentiality": "NONE",
+ "vulnerableSystemIntegrity": "HIGH",
+ "vulnerableSystemAvailability": "LOW",
+ "subsequentSystemConfidentiality": "NONE",
+ "subsequentSystemIntegrity": "NONE",
+ "subsequentSystemAvailability": "NONE",
+ "exploitMaturity": "NOT_DEFINED",
+ "confidentialityRequirements": "NOT_DEFINED",
+ "integrityRequirements": "NOT_DEFINED",
+ "availabilityRequirements": "NOT_DEFINED",
+ "modifiedAttackVector": "NOT_DEFINED",
+ "modifiedAttackComplexity": "NOT_DEFINED",
+ "modifiedAttackRequirements": "NOT_DEFINED",
+ "modifiedPrivilegesRequired": "NOT_DEFINED",
+ "modifiedUserInteraction": "NOT_DEFINED",
+ "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
+ "modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
+ "modifiedVulnerableSystemAvailability": "NOT_DEFINED",
+ "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
+ "modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
+ "modifiedSubsequentSystemAvailability": "NOT_DEFINED",
+ "safety": "NOT_DEFINED",
+ "automatable": "NO",
+ "recovery": "USER",
+ "valueDensity": "DIFFUSE",
+ "vulnerabilityResponseEffort": "LOW",
+ "providerUrgency": "CLEAR",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ }
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cvd@cert.pl",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-99"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://cert.pl/en/posts/2024/09/CVE-2024-6051/",
+ "source": "cvd@cert.pl"
+ },
+ {
+ "url": "https://cert.pl/posts/2024/09/CVE-2024-6051/",
+ "source": "cvd@cert.pl"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json
index 5ff1344e6b7..58d41dc5b95 100644
--- a/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json
+++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6394.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-6394",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-09-30T08:15:03.850",
- "lastModified": "2024-09-30T08:15:03.850",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v9.8. The vulnerability is due to unverified path concatenation in the `serve_js` function in `app.py`, which allows attackers to perform path traversal attacks. This can lead to unauthorized access to arbitrary files on the server, potentially exposing sensitive information such as private SSH keys, configuration files, and source code."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inclusi\u00f3n de archivos locales en las versiones de parisneo/lollms-webui anteriores a la v9.8. La vulnerabilidad se debe a una concatenaci\u00f3n de rutas no verificada en la funci\u00f3n `serve_js` en `app.py`, que permite a los atacantes realizar ataques de path traversal. Esto puede provocar un acceso no autorizado a archivos arbitrarios en el servidor, lo que podr\u00eda exponer informaci\u00f3n confidencial, como claves SSH privadas, archivos de configuraci\u00f3n y c\u00f3digo fuente."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6436.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6436.json
index ebe6ef2bb2a..ce8a60d332d 100644
--- a/CVE-2024/CVE-2024-64xx/CVE-2024-6436.json
+++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6436.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-6436",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-09-27T20:15:06.043",
- "lastModified": "2024-09-27T20:15:06.043",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An input validation vulnerability exists in the Rockwell Automation Sequence Manager\u2122 which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de validaci\u00f3n de entrada en Rockwell Automation Sequence Manager\u2122 que podr\u00eda permitir que un usuario malintencionado env\u00ede paquetes malformados al servidor y provoque una condici\u00f3n de denegaci\u00f3n de servicio. Si se explota, el dispositivo dejar\u00eda de responder y ser\u00eda necesario reiniciarlo manualmente para recuperarlo. Adem\u00e1s, si se explota, podr\u00eda perderse la vista de las secuencias de equipos posteriores en el controlador. Los usuarios no podr\u00edan ver el estado ni ordenar las secuencias de equipos, pero la secuencia de equipos seguir\u00eda ejecut\u00e1ndose sin interrupciones."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json
index ad3aac0c68a..e4504ac7639 100644
--- a/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json
+++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6654",
"sourceIdentifier": "security@eset.com",
"published": "2024-09-27T09:15:03.937",
- "lastModified": "2024-09-27T09:15:03.937",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json
index 2e1456a3872..68639946dfc 100644
--- a/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json
+++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6769.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6769",
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"published": "2024-09-26T21:15:07.787",
- "lastModified": "2024-09-26T21:15:07.787",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6931.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6931.json
index 4f3d29501a8..d7ee1bc1a7d 100644
--- a/CVE-2024/CVE-2024-69xx/CVE-2024-6931.json
+++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6931.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-6931",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T09:15:04.130",
- "lastModified": "2024-09-27T09:15:04.130",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6981.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6981.json
index 811ca1132e7..c2b45403fd3 100644
--- a/CVE-2024/CVE-2024-69xx/CVE-2024-6981.json
+++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6981.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-6981",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T17:15:13.653",
- "lastModified": "2024-09-27T17:15:13.653",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OMNTEC Proteus Tank Monitoring OEL8000III Series\n\n\ncould allow an attacker to perform administrative actions without proper authentication."
+ },
+ {
+ "lang": "es",
+ "value": "OMNTEC Proteus Tank Monitoring OEL8000III Series podr\u00eda permitir que un atacante realice acciones administrativas sin la autenticaci\u00f3n adecuada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6983.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6983.json
index f593306ee99..60e798eaf1c 100644
--- a/CVE-2024/CVE-2024-69xx/CVE-2024-6983.json
+++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6983.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-6983",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-09-27T16:15:06.533",
- "lastModified": "2024-09-27T16:15:06.533",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system."
+ },
+ {
+ "lang": "es",
+ "value": "La versi\u00f3n 2.17.1 de mudler/localai es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo. La vulnerabilidad surge porque el backend localai recibe entradas no solo del archivo de configuraci\u00f3n sino tambi\u00e9n de otras entradas, lo que permite a un atacante cargar un archivo binario y ejecutar c\u00f3digo malicioso. Esto puede llevar al atacante a obtener el control total del sistema."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json
index b81410941fe..1a7cff5a03e 100644
--- a/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json
+++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7011.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7011",
"sourceIdentifier": "psirt-info@cyber.jp.nec.com",
"published": "2024-09-27T03:15:02.307",
- "lastModified": "2024-09-27T03:15:02.307",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7149.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7149.json
index 072af46ad32..0d4c3fac41d 100644
--- a/CVE-2024/CVE-2024-71xx/CVE-2024-7149.json
+++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7149.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-7149",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T14:15:05.043",
- "lastModified": "2024-09-27T14:15:05.043",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Event Manager, Events Calendar, Tickets, Registrations \u2013 Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.8 via multiple style parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Event Manager, Events Calendar, Tickets, Registrations \u2013 Eventin para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 4.0.8 incluida a trav\u00e9s de m\u00faltiples par\u00e1metros de estilo. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \u201cseguros\u201d."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json
index 36079dbcb18..e4eb74585a5 100644
--- a/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json
+++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7259.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7259",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-26T16:15:08.997",
- "lastModified": "2024-09-26T16:15:08.997",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json
index b860fd45d9d..d7a708734b5 100644
--- a/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json
+++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7400.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7400",
"sourceIdentifier": "security@eset.com",
"published": "2024-09-27T07:15:03.387",
- "lastModified": "2024-09-27T07:15:03.387",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json
index 89478e526c5..e3ef790aded 100644
--- a/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json
+++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7594.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7594",
"sourceIdentifier": "security@hashicorp.com",
"published": "2024-09-26T20:15:07.687",
- "lastModified": "2024-09-26T20:15:07.687",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json
index 59de7739438..27298d5670f 100644
--- a/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json
+++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7713",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-27T06:15:11.327",
- "lastModified": "2024-09-27T06:15:11.327",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7714.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7714.json
index 8131ba2b0a3..2a66e053da3 100644
--- a/CVE-2024/CVE-2024-77xx/CVE-2024-7714.json
+++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7714.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-7714",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-27T06:15:12.750",
- "lastModified": "2024-09-27T17:35:15.420",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json
index 6aa4ee2ed52..7bc7b6c7f6b 100644
--- a/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json
+++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8118.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8118",
"sourceIdentifier": "security@grafana.com",
"published": "2024-09-26T19:15:07.663",
- "lastModified": "2024-09-26T19:15:07.663",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8189.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8189.json
index 47d64b28fe8..0d425092990 100644
--- a/CVE-2024/CVE-2024-81xx/CVE-2024-8189.json
+++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8189.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8189",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T13:15:12.190",
- "lastModified": "2024-09-28T13:15:12.190",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP MultiTasking \u2013 WP Utilities plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018wpmt_menu_name\u2019 parameter in all versions up to, and including, 0.1.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP MultiTasking \u2013 WP Utilities para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del par\u00e1metro 'wpmt_menu_name' en todas las versiones hasta la 0.1.17 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de administrador, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8239.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8239.json
index 3930c2b83f5..de0c6661d6f 100644
--- a/CVE-2024/CVE-2024-82xx/CVE-2024-8239.json
+++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8239.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8239",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-30T06:15:14.520",
- "lastModified": "2024-09-30T06:15:14.520",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Starbox WordPress plugin before 3.5.3 does not properly render social media profiles URLs in certain contexts, like the malicious user's profile or pages where the starbox shortcode is used, which may be abused by users with at least the contributor role to conduct Stored XSS attacks."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Starbox para WordPress anterior a la versi\u00f3n 3.5.3 no representa correctamente las URL de los perfiles de redes sociales en ciertos contextos, como el perfil del usuario malintencionado o las p\u00e1ginas donde se usa el c\u00f3digo corto de Starbox, que pueden ser abusados por usuarios con al menos el rol de colaborador para realizar ataques XSS almacenado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8283.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8283.json
index 72d5ef54da8..cdd78796b6e 100644
--- a/CVE-2024/CVE-2024-82xx/CVE-2024-8283.json
+++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8283.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8283",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-30T06:15:14.603",
- "lastModified": "2024-09-30T06:15:14.603",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Slider by 10Web WordPress plugin before 1.2.59 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Slider de 10Web para WordPress anterior a la versi\u00f3n 1.2.59 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados como el administrador realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8310.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8310.json
index f41a3b8a982..0fbaa62589b 100644
--- a/CVE-2024/CVE-2024-83xx/CVE-2024-8310.json
+++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8310.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8310",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T17:15:13.970",
- "lastModified": "2024-09-27T17:15:13.970",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OPW Fuel Management Systems SiteSentinel \ncould allow an attacker to bypass authentication to the server and obtain full admin privileges."
+ },
+ {
+ "lang": "es",
+ "value": "OPW Fuel Management Systems SiteSentinel podr\u00edan permitir que un atacante eluda la autenticaci\u00f3n en el servidor y obtenga privilegios de administrador completos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8353.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8353.json
index ff22fe03104..b173376e191 100644
--- a/CVE-2024/CVE-2024-83xx/CVE-2024-8353.json
+++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8353.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8353",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:09.880",
- "lastModified": "2024-09-28T02:15:09.880",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento GiveWP \u2013 Donation Plugin and Fundraising Platform para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 3.16.1 incluida, a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables mediante varios par\u00e1metros como 'give_title' y 'card_address'. Esto hace posible que atacantes no autenticados inyecten un objeto PHP. La presencia adicional de una cadena POP permite a los atacantes eliminar archivos arbitrarios y lograr la ejecuci\u00f3n remota de c\u00f3digo. Esta es esencialmente la misma vulnerabilidad que CVE-2024-5932, sin embargo, se descubri\u00f3 que la presencia de stripslashes_deep en user_info permite omitir la verificaci\u00f3n is_serialized. Este problema se solucion\u00f3 en su mayor parte en la versi\u00f3n 3.16.1, pero se agreg\u00f3 un refuerzo adicional en la versi\u00f3n 3.16.2."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8379.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8379.json
index ede28ca4f68..a94313d90c0 100644
--- a/CVE-2024/CVE-2024-83xx/CVE-2024-8379.json
+++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8379.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8379",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-30T06:15:14.697",
- "lastModified": "2024-09-30T06:15:14.697",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Cost Calculator Builder WordPress plugin before 3.2.29 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Cost Calculator Builder de WordPress anterior a la versi\u00f3n 3.2.29 no desinfecta ni escapa correctamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n SQL explotable por usuarios con un rol tan bajo como Administrador."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8448.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8448.json
index e41e44b1a60..b7bfa900ee8 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8448.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8448.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8448",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T07:15:03.507",
- "lastModified": "2024-09-30T07:15:03.507",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology have a hard-coded credential in the specific command-line interface, allowing remote attackers with regular privilege to log in with this credential and obtain a Linux root shell."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology tienen una credencial codificada en la interfaz de l\u00ednea de comandos espec\u00edfica, lo que permite a atacantes remotos con privilegios regulares iniciar sesi\u00f3n con esta credencial y obtener un shell ra\u00edz de Linux."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8449.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8449.json
index baeb6bf2059..05047e89fa6 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8449.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8449.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8449",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T07:15:03.937",
- "lastModified": "2024-09-30T07:15:03.937",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology have a Hard-coded Credential in the password recovering functionality, allowing an unauthenticated attacker to connect to the device via the serial console and use this credential to reset any user's password."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology tienen una credencial codificada en la funcionalidad de recuperaci\u00f3n de contrase\u00f1a, lo que permite que un atacante no autenticado se conecte al dispositivo a trav\u00e9s de la consola serial y use esta credencial para restablecer la contrase\u00f1a de cualquier usuario."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8450.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8450.json
index 094444161f3..a64df4498d3 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8450.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8450.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8450",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T07:15:04.170",
- "lastModified": "2024-09-30T07:15:04.170",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology have a Hard-coded community string in the SNMPv1 service, allowing unauthorized remote attackers to use this community string to access the SNMPv1 service with read-write privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology tienen una cadena de comunidad codificada en el servicio SNMPv1, lo que permite que atacantes remotos no autorizados utilicen esta cadena de comunidad para acceder al servicio SNMPv1 con privilegios de lectura y escritura."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8451.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8451.json
index 919cfb885e8..e1d62e80da7 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8451.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8451.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8451",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T07:15:04.417",
- "lastModified": "2024-09-30T07:15:04.417",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology have an SSH service that improperly handles insufficiently authenticated connection requests, allowing unauthorized remote attackers to exploit this weakness to occupy connection slots and prevent legitimate users from accessing the SSH service."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology tienen un servicio SSH que maneja incorrectamente solicitudes de conexi\u00f3n insuficientemente autenticadas, lo que permite que atacantes remotos no autorizados exploten esta debilidad para ocupar ranuras de conexi\u00f3n y evitar que usuarios leg\u00edtimos accedan al servicio SSH."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8452.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8452.json
index 05414206ca5..7e4e5d258b1 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8452.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8452.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8452",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T07:15:04.647",
- "lastModified": "2024-09-30T07:15:04.647",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology only support obsolete algorithms for authentication protocol and encryption protocol in the SNMPv3 service, allowing attackers to obtain plaintext SNMPv3 credentials potentially."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology solo admiten algoritmos obsoletos para el protocolo de autenticaci\u00f3n y el protocolo de cifrado en el servicio SNMPv3, lo que permite a los atacantes obtener potencialmente credenciales SNMPv3 en texto plano."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8453.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8453.json
index 52277829e96..34adab19231 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8453.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8453.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8453",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T08:15:04.093",
- "lastModified": "2024-09-30T08:15:04.093",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords."
+ },
+ {
+ "lang": "es",
+ "value": "Algunos modelos de conmutadores de PLANET Technology utilizan una funci\u00f3n de hash insegura para codificar las contrase\u00f1as de los usuarios sin que se les aplique sal. Los atacantes remotos con privilegios de administrador pueden leer los archivos de configuraci\u00f3n para obtener los valores de hash y, potencialmente, descifrarlos para recuperar las contrase\u00f1as en texto plano."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8454.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8454.json
index d522b7aa506..cf79ac41cf8 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8454.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8454.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8454",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T08:15:04.340",
- "lastModified": "2024-09-30T08:15:04.340",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The swctrl service is used to detect and remotely manage PLANET Technology devices. Certain switch models have a Denial-of-Service vulnerability in the swctrl service, allowing unauthenticated remote attackers to send crafted packets that can crash the service."
+ },
+ {
+ "lang": "es",
+ "value": "El servicio swctrl se utiliza para detectar y administrar de forma remota los dispositivos de PLANET Technology. Algunos modelos de conmutadores tienen una vulnerabilidad de denegaci\u00f3n de servicio en el servicio swctrl, lo que permite que atacantes remotos no autenticados env\u00eden paquetes manipulados que pueden hacer que el servicio se bloquee."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8455.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8455.json
index b04f61165fd..bff7a6ac548 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8455.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8455.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8455",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T08:15:04.570",
- "lastModified": "2024-09-30T08:15:04.570",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The swctrl service is used to detect and remotely manage PLANET Technology devices. For certain switch models, the authentication tokens used during communication with this service are encoded user passwords. Due to insufficient strength, unauthorized remote attackers who intercept the packets can directly crack them to obtain plaintext passwords."
+ },
+ {
+ "lang": "es",
+ "value": "El servicio swctrl se utiliza para detectar y gestionar de forma remota los dispositivos de PLANET Technology. En el caso de determinados modelos de conmutadores, los tokens de autenticaci\u00f3n utilizados durante la comunicaci\u00f3n con este servicio son contrase\u00f1as de usuario codificadas. Debido a que no son lo suficientemente resistentes, los atacantes remotos no autorizados que intercepten los paquetes pueden descifrarlos directamente para obtener contrase\u00f1as en texto simple."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8456.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8456.json
index e153ada103d..ccb8e1d0c0c 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8456.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8456.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8456",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T08:15:04.797",
- "lastModified": "2024-09-30T08:15:04.797",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology lack proper access control in firmware upload and download functionality, allowing unauthenticated remote attackers to download and upload firmware and system configurations, ultimately gaining full control of the devices."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology carecen de un control de acceso adecuado en la funcionalidad de carga y descarga de firmware, lo que permite que atacantes remotos no autenticados descarguen y carguen firmware y configuraciones del sistema, obteniendo en \u00faltima instancia el control total de los dispositivos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8457.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8457.json
index bf22a2c2b8e..68a0f7a45b3 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8457.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8457.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8457",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T08:15:05.020",
- "lastModified": "2024-09-30T08:15:05.020",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology have a web application that does not properly validate specific parameters, allowing remote authenticated users with administrator privileges to inject arbitrary JavaScript, leading to Stored XSS attack."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology tienen una aplicaci\u00f3n web que no valida correctamente par\u00e1metros espec\u00edficos, lo que permite que usuarios autenticados remotos con privilegios de administrador inyecten JavaScript arbitrario, lo que genera un ataque XSS almacenado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8458.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8458.json
index 34941512179..153ec1ddb24 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8458.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8458.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8458",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T08:15:05.223",
- "lastModified": "2024-09-30T08:15:05.223",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology have a web application that is vulnerable to Cross-Site Request Forgery (CSRF). An unauthenticated remote attacker can trick a user into visiting a malicious website, allowing the attacker to impersonate the user and perform actions on their behalf, such as creating accounts."
+ },
+ {
+ "lang": "es",
+ "value": "Algunos modelos de conmutadores de PLANET Technology tienen una aplicaci\u00f3n web que es vulnerable a Cross-Site Request Forgery (CSRF). Un atacante remoto no autenticado puede enga\u00f1ar a un usuario para que visite un sitio web malicioso, lo que le permite hacerse pasar por el usuario y realizar acciones en su nombre, como crear cuentas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8459.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8459.json
index f3dc9461257..88346d55ede 100644
--- a/CVE-2024/CVE-2024-84xx/CVE-2024-8459.json
+++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8459.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8459",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-30T08:15:05.460",
- "lastModified": "2024-09-30T08:15:05.460",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain switch models from PLANET Technology store SNMPv3 users' passwords in plaintext within the configuration files, allowing remote attackers with administrator privileges to read the file and obtain the credentials."
+ },
+ {
+ "lang": "es",
+ "value": "Ciertos modelos de conmutadores de PLANET Technology almacenan las contrase\u00f1as de los usuarios de SNMPv3 en texto plano dentro de los archivos de configuraci\u00f3n, lo que permite a atacantes remotos con privilegios de administrador leer el archivo y obtener las credenciales."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8536.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8536.json
index 08cc48c6aee..073c5afdf39 100644
--- a/CVE-2024/CVE-2024-85xx/CVE-2024-8536.json
+++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8536.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8536",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-09-30T06:15:14.823",
- "lastModified": "2024-09-30T06:15:14.823",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ultimate Blocks WordPress plugin before 3.2.2 does not validate and escape some of its block attributes before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Ultimate Blocks para WordPress anterior a la versi\u00f3n 3.2.2 no valida ni escapa algunos de los atributos de sus bloques antes de mostrarlos nuevamente en una p\u00e1gina o publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de cross site scripting almacenado."
}
],
"metrics": {},
diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8547.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8547.json
index cb7405ac819..9919909fec9 100644
--- a/CVE-2024/CVE-2024-85xx/CVE-2024-8547.json
+++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8547.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8547",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.150",
- "lastModified": "2024-09-28T02:15:10.150",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple Popup Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [popup] shortcode in all versions up to, and including, 4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Simple Popup Plugin para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado [popup] del complemento en todas las versiones hasta la 4.5 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8607.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8607.json
index 0811e8fcdf1..f0e15e48388 100644
--- a/CVE-2024/CVE-2024-86xx/CVE-2024-8607.json
+++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8607.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8607",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-27T12:15:03.617",
- "lastModified": "2024-09-27T12:15:03.617",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oceanic Software ValeApp allows SQL Injection.This issue affects ValeApp: before v2.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Oceanic Software ValeApp permite la inyecci\u00f3n SQL. Este problema afecta a ValeApp: antes de v2.0.0."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8608.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8608.json
index 09aca4346a1..9fcfd80e794 100644
--- a/CVE-2024/CVE-2024-86xx/CVE-2024-8608.json
+++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8608.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8608",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-27T12:15:03.823",
- "lastModified": "2024-09-27T12:15:03.823",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Oceanic Software ValeApp allows Stored XSS.This issue affects ValeApp: before v2.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Oceanic Software ValeApp permite XSS almacenado. Este problema afecta a ValeApp: antes de v2.0.0."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8609.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8609.json
index 990ef591768..657ad20ca13 100644
--- a/CVE-2024/CVE-2024-86xx/CVE-2024-8609.json
+++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8609.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8609",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-27T12:15:03.997",
- "lastModified": "2024-09-27T12:15:03.997",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File vulnerability in Oceanic Software ValeApp allows Query System for Information.This issue affects ValeApp: before v2.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro en Oceanic Software ValeApp permite consultar el sistema para obtener informaci\u00f3n. Este problema afecta a ValeApp: antes de v2.0.0."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json
index 90ef0c517cf..f30173dc954 100644
--- a/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json
+++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8630",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T17:15:14.180",
- "lastModified": "2024-09-27T17:15:14.180",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Alisonic Sibylla devices are vulnerable to SQL injection attacks, which could allow complete access to the database."
+ },
+ {
+ "lang": "es",
+ "value": "Los dispositivos Alisonic Sibylla son vulnerables a ataques de inyecci\u00f3n SQL, que podr\u00edan permitir el acceso completo a la base de datos."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8643.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8643.json
index e52ef01d99f..477663359db 100644
--- a/CVE-2024/CVE-2024-86xx/CVE-2024-8643.json
+++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8643.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8643",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-27T12:15:04.210",
- "lastModified": "2024-09-27T12:15:04.210",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Session Fixation vulnerability in Oceanic Software ValeApp allows Brute Force, Session Hijacking.This issue affects ValeApp: before v2.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en Oceanic Software ValeApp permite fuerza bruta y secuestro de sesi\u00f3n. Este problema afecta a ValeApp: antes de v2.0.0."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8644.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8644.json
index 0c77431523f..5fbc29aa76c 100644
--- a/CVE-2024/CVE-2024-86xx/CVE-2024-8644.json
+++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8644.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8644",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-27T12:15:04.390",
- "lastModified": "2024-09-27T12:15:04.390",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cleartext Storage of Sensitive Information in a Cookie vulnerability in Oceanic Software ValeApp allows Protocol Manipulation, : JSON Hijacking (aka JavaScript Hijacking).This issue affects ValeApp: before v2.0.0."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de almacenamiento de informaci\u00f3n confidencial en texto plano en una cookie en Oceanic Software ValeApp permite la manipulaci\u00f3n de protocolos: secuestro de JSON (tambi\u00e9n conocido como secuestro de JavaScript). Este problema afecta a ValeApp: antes de v2.0.0."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json
index 30743b4d420..2c973924106 100644
--- a/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json
+++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8681.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8681",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T07:15:05.123",
- "lastModified": "2024-09-27T07:15:05.123",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8712.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8712.json
index 49d3e62d88c..86da5188d04 100644
--- a/CVE-2024/CVE-2024-87xx/CVE-2024-8712.json
+++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8712.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8712",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T09:15:02.167",
- "lastModified": "2024-09-28T09:15:02.167",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GTM Server Side plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.19. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento GTM Server Side para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.1.19 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8715.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8715.json
index 1ddeb9048f5..c10907a044b 100644
--- a/CVE-2024/CVE-2024-87xx/CVE-2024-8715.json
+++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8715.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8715",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T03:15:02.330",
- "lastModified": "2024-09-28T03:15:02.330",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple LDAP Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Simple LDAP Login para WordPress es vulnerable a ataques Cross-Site Scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 1.6.0 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json
index 53d3fb57637..b131f28b41d 100644
--- a/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json
+++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8771.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8771",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-26T16:15:09.293",
- "lastModified": "2024-09-26T16:15:09.293",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8788.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8788.json
index 0f7c4ee0d0b..96317e4c829 100644
--- a/CVE-2024/CVE-2024-87xx/CVE-2024-8788.json
+++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8788.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-8788",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.380",
- "lastModified": "2024-09-28T02:15:10.380",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The EU/UK VAT Manager for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.12.11. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento EU/UK VAT Manager for WooCommerce para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 2.12.11 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json
index ed4ed6bbab2..010a19091e6 100644
--- a/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json
+++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8922.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8922",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T06:15:12.817",
- "lastModified": "2024-09-27T06:15:12.817",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json
index ed67701eb6c..98018461678 100644
--- a/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json
+++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8965.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8965",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T06:15:13.223",
- "lastModified": "2024-09-27T06:15:13.223",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json
index dd5594ed244..2d604854bfa 100644
--- a/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json
+++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8974.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8974",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-09-26T23:15:03.083",
- "lastModified": "2024-09-26T23:15:03.083",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json
index 6c6c31e841c..4ea4bda0d20 100644
--- a/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json
+++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8991.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-8991",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T07:15:05.493",
- "lastModified": "2024-09-27T07:15:05.493",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9023.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9023.json
index bfc44be59e2..129ef4d323b 100644
--- a/CVE-2024/CVE-2024-90xx/CVE-2024-9023.json
+++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9023.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9023",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.630",
- "lastModified": "2024-09-28T02:15:10.630",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP-WebAuthn plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wwa_login_form shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP-WebAuthn para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado wwa_login_form del complemento en todas las versiones hasta la 1.3.1 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9029.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9029.json
index bd05816d339..7ccd0ece781 100644
--- a/CVE-2024/CVE-2024-90xx/CVE-2024-9029.json
+++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9029.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9029",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-09-27T07:15:05.800",
- "lastModified": "2024-09-27T13:15:18.060",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json
index 38e187fc08d..cfdc8e27dfb 100644
--- a/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json
+++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9048.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-21T09:15:04.660",
- "lastModified": "2024-09-26T13:32:55.343",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2024-09-30T13:00:48.613",
+ "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "cna@vuldb.com",
"type": "Secondary",
@@ -120,26 +140,63 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "4.7.9",
+ "matchCriteriaId": "23C8B479-ECDA-4F19-8547-4129C63F3E0E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://gitee.com/y_project/RuoYi/commit/9b68013b2af87b9c809c4637299abd929bc73510",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch",
+ "Permissions Required"
+ ]
},
{
"url": "https://gitee.com/y_project/RuoYi/issues/IAR6Q3",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://gitee.com/y_project/RuoYi/issues/IAR6Q3#note_31993641_link",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.278215",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?id.278215",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json
index 2ff183d6b04..95461341f90 100644
--- a/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json
+++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9049.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9049",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T07:15:06.120",
- "lastModified": "2024-09-27T07:15:06.120",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json
index 59dde271bac..8ee3d3af39f 100644
--- a/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json
+++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9130.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9130",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-27T06:15:13.570",
- "lastModified": "2024-09-27T06:15:13.570",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9136.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9136.json
index 256f55440ea..b9907eaa753 100644
--- a/CVE-2024/CVE-2024-91xx/CVE-2024-9136.json
+++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9136.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9136",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-27T11:15:13.150",
- "lastModified": "2024-09-27T11:15:13.150",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Access permission verification vulnerability in the App Multiplier module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de verificaci\u00f3n de permisos de acceso en el m\u00f3dulo App Multiplier Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json
index 42dd09e486a..17ef846ddef 100644
--- a/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json
+++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9155.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9155",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-09-26T15:15:18.060",
- "lastModified": "2024-09-26T15:15:18.060",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9160.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9160.json
index 540a1e86617..08bfa8994ea 100644
--- a/CVE-2024/CVE-2024-91xx/CVE-2024-9160.json
+++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9160.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9160",
"sourceIdentifier": "security@puppet.com",
"published": "2024-09-27T19:15:10.733",
- "lastModified": "2024-09-27T19:15:10.733",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In versions of the PEADM Forge Module prior to 3.24.0 a security misconfiguration was discovered."
+ },
+ {
+ "lang": "es",
+ "value": "En versiones del m\u00f3dulo PEADM Forge anteriores a 3.24.0 se descubri\u00f3 una configuraci\u00f3n de seguridad incorrecta."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json
index 6252ff7b3ba..666d5ca2898 100644
--- a/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json
+++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9166.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9166",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-26T17:15:04.460",
- "lastModified": "2024-09-26T17:15:04.460",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json
index 75c63b8393c..b91ed568550 100644
--- a/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json
+++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9177.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9177",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-26T14:15:09.697",
- "lastModified": "2024-09-26T14:15:09.697",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9189.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9189.json
index dfe8fa6d499..f1f3bf4610a 100644
--- a/CVE-2024/CVE-2024-91xx/CVE-2024-9189.json
+++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9189.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9189",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.860",
- "lastModified": "2024-09-28T02:15:10.860",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The EU/UK VAT Manager for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the alg_wc_eu_vat_exempt_vat_from_admin() function in all versions up to, and including, 2.12.12. This makes it possible for unauthenticated attackers to update the VAT status for any order."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento EU/UK VAT Manager for WooCommerce para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de comprobaci\u00f3n de capacidad en la funci\u00f3n alg_wc_eu_vat_exempt_vat_from_admin() en todas las versiones hasta la 2.12.12 incluida. Esto permite que atacantes no autenticados actualicen el estado del IVA de cualquier pedido."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json
index f87f47ed77c..430f1bcc6f0 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9202",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-09-27T10:15:02.827",
- "lastModified": "2024-09-27T10:15:02.827",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json
index 8f1b17268cf..cd229c5b453 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9203.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-9203",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-26T17:15:04.593",
- "lastModified": "2024-09-26T17:15:04.593",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:46:20.237",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9275.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9275.json
index 2e2c9273571..797e939fe38 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9275.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9275.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T11:15:13.477",
- "lastModified": "2024-09-27T11:15:13.477",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in jeanmarc77 123solar up to 1.8.4.5. It has been rated as critical. This issue affects some unknown processing of the file /admin/admin_invt2.php. The manipulation of the argument PROTOCOLx leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en jeanmarc77 123solar hasta la versi\u00f3n 1.8.4.5. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/admin_invt2.php. La manipulaci\u00f3n del argumento PROTOCOLx conduce a la inclusi\u00f3n del archivo. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9276.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9276.json
index 6957f342071..2f1a4ff15e9 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9276.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9276.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T11:15:13.963",
- "lastModified": "2024-09-27T12:15:04.590",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in TMsoft MyAuth Gateway 3. Affected is an unknown function of the file /index.php. The manipulation of the argument console/nocache/cmd leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en TMsoft MyAuth Gateway 3. Se ve afectada una funci\u00f3n desconocida del archivo /index.php. La manipulaci\u00f3n del argumento console/nocache/cmd provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9277.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9277.json
index e29440df896..958fc42d0c4 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9277.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9277.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T11:15:14.400",
- "lastModified": "2024-09-27T12:15:04.733",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Langflow up to 1.0.18. Affected by this vulnerability is an unknown functionality of the file \\src\\backend\\base\\langflow\\interface\\utils.py of the component HTTP POST Request Handler. The manipulation of the argument remaining_text leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Langflow hasta la versi\u00f3n 1.0.18. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo \\src\\backend\\base\\langflow\\interface\\utils.py del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento remain_text genera una complejidad ineficiente en las expresiones regulares. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9278.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9278.json
index 07c5041c19e..a6b378f146c 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9278.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9278.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T11:15:14.877",
- "lastModified": "2024-09-27T11:15:14.877",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in HuankeMao SCRM up to 0.0.3. Affected by this issue is the function upload_domain_verification_file of the file WxkConfig.php of the component Administrator Backend. The manipulation of the argument domain_verification_file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en HuankeMao SCRM hasta la versi\u00f3n 0.0.3. La funci\u00f3n upload_domain_verification_file del archivo WxkConfig.php del componente Administrator Backend se ve afectada por este problema. La manipulaci\u00f3n del argumento domain_verification_file permite cargar archivos sin restricciones. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9279.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9279.json
index bd9230306ba..7aa0902a0f3 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9279.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9279.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T12:15:04.857",
- "lastModified": "2024-09-27T12:15:04.857",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in funnyzpc Mee-Admin up to 1.6. This affects an unknown part of the file /mee/index of the component User Center. The manipulation of the argument User Nickname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en funnyzpc Mee-Admin hasta la versi\u00f3n 1.6. Afecta a una parte desconocida del archivo /mee/index del componente User Center. La manipulaci\u00f3n del argumento User Nickname provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9280.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9280.json
index 05831f19e5b..5e4020b761c 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9280.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9280.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9280",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T12:15:05.227",
- "lastModified": "2024-09-27T12:15:05.227",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff and classified as critical. This vulnerability affects the function fileUpload of the file FileUploadKit.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en kalvinGit kvf-admin hasta f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n fileUpload del archivo FileUploadKit.java. La manipulaci\u00f3n del argumento file da lugar a una carga sin restricciones. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Este producto utiliza la entrega continua con versiones sucesivas. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de las versiones actualizadas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9281.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9281.json
index e2b877c06be..909e286e2f5 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9281.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9281.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9281",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T13:15:18.153",
- "lastModified": "2024-09-27T13:15:18.153",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions confusing version and file name information. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en bg5sbk MiniCMS hasta la versi\u00f3n 1.11 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo post-edit.php. La manipulaci\u00f3n conduce a una cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. El aviso inicial para investigadores menciona informaci\u00f3n confusa sobre la versi\u00f3n y el nombre del archivo. Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9282.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9282.json
index 7b3869c93a9..28817142228 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9282.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9282.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9282",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T13:15:18.443",
- "lastModified": "2024-09-27T13:15:18.443",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in bg5sbk MiniCMS 1.11. It has been classified as problematic. Affected is an unknown function of the file page-edit.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions confusing version and file name information. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en bg5sbk MiniCMS 1.11. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del archivo page-edit.php. La manipulaci\u00f3n conduce a una cross-site request forgery. Es posible lanzar el ataque de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse. El aviso inicial para investigadores menciona informaci\u00f3n confusa sobre la versi\u00f3n y el nombre del archivo. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9283.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9283.json
index 2e773078da3..cbbfac396d3 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9283.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9283.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9283",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T14:15:05.330",
- "lastModified": "2024-09-27T14:15:05.330",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in RelaxedJS ReLaXed up to 0.2.2. Affected is an unknown function of the component Pug to PDF Converter. The manipulation leads to cross site scripting. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en RelaxedJS ReLaXed hasta la versi\u00f3n 0.2.2. Se trata de una funci\u00f3n desconocida del componente Pug to PDF Converter. La manipulaci\u00f3n provoca cross site scripting. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9284.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9284.json
index b44ed832378..b2f9199d05e 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9284.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9284.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9284",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T17:15:14.600",
- "lastModified": "2024-09-27T17:15:14.600",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TP-LINK TL-WR841ND up to 20240920. It has been rated as critical. Affected by this issue is some unknown functionality of the file /userRpm/popupSiteSurveyRpm.htm. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en TP-LINK TL-WR841ND hasta 20240920. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /userRpm/popupSiteSurveyRpm.htm. La manipulaci\u00f3n del argumento ssid provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9291.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9291.json
index 7d1ed7a95ad..cec64fde3f7 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9291.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9291.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9291",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T21:15:03.667",
- "lastModified": "2024-09-27T21:15:03.667",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff. Affected is an unknown function of the file /ueditor/upload?configPath=ueditor/config.json&action=uploadfile of the component XML File Handler. The manipulation of the argument upfile leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The GitHub repository of the project did not receive an update for more than two years."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en kalvinGit kvf-admin hasta f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff. Se ve afectada una funci\u00f3n desconocida del archivo /ueditor/upload?configPath=ueditor/config.json&action=uploadfile del componente XML File Handler. La manipulaci\u00f3n del argumento upfile provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Este producto utiliza una versi\u00f3n continua para proporcionar una distribuci\u00f3n continua. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de las versiones actualizadas. El repositorio de GitHub del proyecto no recibi\u00f3 una actualizaci\u00f3n durante m\u00e1s de dos a\u00f1os."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9293.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9293.json
index b74ce5dc54a..e19cd961af1 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9293.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9293.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9293",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T21:15:03.937",
- "lastModified": "2024-09-27T21:15:03.937",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in skyselang yylAdmin up to 3.0. Affected by this vulnerability is the function list of the file /app/admin/controller/file/File.php of the component Backend. The manipulation of the argument is_disable leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en skyselang yylAdmin hasta la versi\u00f3n 3.0. Esta vulnerabilidad afecta la lista de funciones del archivo /app/admin/controller/file/File.php del componente Backend. La manipulaci\u00f3n del argumento is_disable provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9294.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9294.json
index 01fc7b8c239..f29b312c413 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9294.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9294.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9294",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-27T22:15:13.363",
- "lastModified": "2024-09-27T22:15:13.363",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. Affected by this issue is some unknown functionality of the file saveNewPwd.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en dingfanzu CMS hasta 29d67d9044f6f93378e6eb6ff92272217ff7225c. Este problema afecta a una funcionalidad desconocida del archivo saveNewPwd.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Este producto utiliza la entrega continua con versiones sucesivas. Por lo tanto, no hay disponibles detalles de las versiones afectadas ni de las versiones actualizadas."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9295.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9295.json
index 0cf66c96995..3fe326116b4 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9295.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9295.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9295",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T07:15:04.123",
- "lastModified": "2024-09-28T07:15:04.123",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Advocate Office Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /control/login.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Advocate Office Management System 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /control/login.php. La manipulaci\u00f3n del argumento username conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9296.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9296.json
index 5b2d5f25919..0942c2a3f0d 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9296.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9296.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9296",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T09:15:02.600",
- "lastModified": "2024-09-28T09:15:02.600",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Advocate Office Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /control/forgot_pass.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Advocate Office Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /control/forgot_pass.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9297.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9297.json
index b7f143452f3..5660620f304 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9297.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9297.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T12:15:10.780",
- "lastModified": "2024-09-28T12:15:10.780",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Railway Reservation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/. The manipulation of the argument page with the input trains/schedules/system_info leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Online Railway Reservation System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/. La manipulaci\u00f3n de la p\u00e1gina de argumentos con la entrada trains/schedules/system_info conduce a una autorizaci\u00f3n incorrecta. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9298.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9298.json
index cd4429f4d5f..94ebd545d9f 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9298.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9298.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T14:15:02.020",
- "lastModified": "2024-09-28T14:15:02.020",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Railway Reservation System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /?page=tickets of the component Ticket Handler. The manipulation of the argument id leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Online Railway Reservation System 1.0. Se ha calificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /?page=tickets del componente Ticket Handler. La manipulaci\u00f3n del argumento id conduce a controles de acceso inadecuados. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9299.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9299.json
index 14d3a51e319..ebafe77a38e 100644
--- a/CVE-2024/CVE-2024-92xx/CVE-2024-9299.json
+++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9299.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9299",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T14:15:02.540",
- "lastModified": "2024-09-28T14:15:02.540",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester Online Railway Reservation System 1.0. This affects an unknown part of the file /?page=reserve. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Online Railway Reservation System 1.0. Afecta a una parte desconocida del archivo /?page=reserve. La manipulaci\u00f3n del argumento Nombre/Segundo nombre/Apellido provoca cross site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9300.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9300.json
index c2d5fed4dc4..e52cc12b28d 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9300.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9300.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T15:15:14.263",
- "lastModified": "2024-09-28T15:15:14.263",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in SourceCodester Online Railway Reservation System 1.0. This vulnerability affects unknown code of the file contact_us.php of the component Message Us Form. The manipulation of the argument fullname/email/message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Online Railway Reservation System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo contact_us.php del componente Message Us Form. La manipulaci\u00f3n del argumento fullname/email/message conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json
index 2f6dc787324..e4cde3b6c5b 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9301",
"sourceIdentifier": "security-report@netflix.com",
"published": "2024-09-27T18:15:06.163",
- "lastModified": "2024-09-27T18:15:06.163",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal issue in E2Nest prior to commit 8a41948e553c89c56b14410c6ed395e9cfb9250a"
+ },
+ {
+ "lang": "es",
+ "value": "Un problema de Path Traversal en E2Nest antes de el commit 8a41948e553c89c56b14410c6ed395e9cfb9250a"
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9315.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9315.json
index 455a6ed8827..5a26d04778b 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9315.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9315.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9315",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T19:15:12.353",
- "lastModified": "2024-09-28T19:15:12.353",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_department.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Se la ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/maintenance/manage_department.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json
index a6a4653e055..95d63b833dc 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9316",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T20:15:02.280",
- "lastModified": "2024-09-28T20:15:02.280",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/blood/update/B+.php. The manipulation of the argument Bloodname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects Blood Bank Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/blood/update/B+.php. La manipulaci\u00f3n del argumento Bloodname provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9317.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9317.json
index 45561dd2419..692d5c55e00 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9317.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9317.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9317",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T21:15:10.783",
- "lastModified": "2024-09-28T21:15:10.783",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is the function delete_category of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Online Eyewear Shop 1.0. Esta vulnerabilidad afecta a la funci\u00f3n delete_category del archivo /classes/Master.php?f=delete_category. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9318.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9318.json
index f2d8a976834..643d92c8d19 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9318.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9318.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9318",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T23:15:13.530",
- "lastModified": "2024-09-28T23:15:13.530",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Advocate Office Management System 1.0. Affected by this issue is some unknown functionality of the file /control/activate.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Advocate Office Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /control/activate.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9319.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9319.json
index 45dc6039ca4..2adabd9cbbb 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9319.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9319.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9319",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T00:15:02.490",
- "lastModified": "2024-09-29T00:15:02.490",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Online Timesheet App 1.0. This affects an unknown part of the file /endpoint/delete-timesheet.php. The manipulation of the argument timesheet leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Online Timesheet App 1.0. Afecta a una parte desconocida del archivo /endpoint/delete-timesheet.php. La manipulaci\u00f3n del argumento timesheet provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9320.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9320.json
index 3ab03c08f51..e4a584d3319 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9320.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9320.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9320",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T00:15:03.093",
- "lastModified": "2024-09-29T00:15:03.093",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Online Timesheet App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /endpoint/add-timesheet.php of the component Add Timesheet Form. The manipulation of the argument day/task leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Online Timesheet App 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /endpoint/add-timesheet.php del componente Add Timesheet Form. La manipulaci\u00f3n del argumento day/task provoca cross site scripting. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9321.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9321.json
index 8d5515a9aac..f3a6973ef48 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9321.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9321.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9321",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T01:15:10.380",
- "lastModified": "2024-09-29T01:15:10.380",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Railway Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_details.php. The manipulation of the argument id leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Online Railway Reservation System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/inquiries/view_details.php. La manipulaci\u00f3n del argumento id conduce a controles de acceso inadecuados. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json
index 9fb2f4afcc7..2e1b19d3825 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9322",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T03:15:02.357",
- "lastModified": "2024-09-29T03:15:02.357",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Supply Chain Management 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit_manufacturer.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en code-projects Supply Chain Management 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/edit_manufacturer.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9323.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9323.json
index 39778a164a7..9adaef5db1f 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9323.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9323.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9323",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T07:15:02.260",
- "lastModified": "2024-09-29T07:15:02.260",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Inventory Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /app/action/add_staff.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Inventory Management System 1.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /app/action/add_staff.php. La manipulaci\u00f3n conduce a cross site scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json
index 6ea78d5a87a..872b832e9b4 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9324",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T07:15:02.740",
- "lastModified": "2024-09-29T07:15:02.740",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Intelbras InControl up to 2.21.57. It has been rated as critical. Affected by this issue is some unknown functionality of the file /v1/operador/ of the component Relat\u00f3rio de Operadores Page. The manipulation of the argument fields leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was informed early on 2024-07-19 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad en Intelbras InControl hasta la versi\u00f3n 2.21.57. Se ha calificado como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /v1/operador/ del componente Relat\u00f3rio de Operadores Page. La manipulaci\u00f3n de los campos de argumentos conduce a la inyecci\u00f3n de c\u00f3digo. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. El proveedor fue informado de este problema el 19 de julio de 2024. El lanzamiento de una versi\u00f3n corregida 2.21.58 se anunci\u00f3 para fines de agosto de 2024, pero luego se pospuso hasta el 20 de septiembre de 2024."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json
index 58cb7909c76..a87cca38cf8 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9325",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T08:15:02.243",
- "lastModified": "2024-09-29T08:15:02.243",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\\Program Files (x86)\\Intelbras\\Incontrol Cliente\\incontrol_webcam\\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Intelbras InControl hasta la versi\u00f3n 2.21.56. Afecta a una parte desconocida del archivo C:\\Program Files (x86)\\Intelbras\\Incontrol Cliente\\incontrol_webcam\\incontrol-service-watchdog.exe. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda sin comillas. Es posible lanzar el ataque en el host local. El proveedor fue informado de este problema el 5 de agosto de 2024. El lanzamiento de una versi\u00f3n corregida 2.21.58 se anunci\u00f3 para fines de agosto de 2024, pero luego se pospuso hasta el 20 de septiembre de 2024."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json
index e9d40497f7d..6c9b9ee1f8c 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9326",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T08:15:02.547",
- "lastModified": "2024-09-29T08:15:02.547",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /shopping/admin/index.php of the component Admin Panel. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Online Shopping Portal 2.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /shopping/admin/index.php del componente Admin Panel. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json
index 838e54dc2b8..1f3460ea6cd 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9327",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T11:15:11.083",
- "lastModified": "2024-09-29T11:15:11.083",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forgot.php. The manipulation of the argument useremail leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en code-projects Blood Bank System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /forgot.php. La manipulaci\u00f3n del argumento useremail conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9328.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9328.json
index e5d23309572..04582f01236 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9328.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9328.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9328",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-29T23:15:13.067",
- "lastModified": "2024-09-29T23:15:13.067",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Advocate Office Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /control/edit_client.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Advocate Office Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /control/edit_client.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse."
}
],
"metrics": {
diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9329.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9329.json
index d1170426b0d..9d408beaa6f 100644
--- a/CVE-2024/CVE-2024-93xx/CVE-2024-9329.json
+++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9329.json
@@ -2,13 +2,17 @@
"id": "CVE-2024-9329",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-09-30T08:15:05.690",
- "lastModified": "2024-09-30T08:15:05.690",
- "vulnStatus": "Received",
+ "lastModified": "2024-09-30T12:45:57.823",
+ "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Eclipse Glassfish versions before 7.0.17, The Host HTTP parameter could cause the web application to redirect to the specified URL, when the requested endpoint is '/management/domain'. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials."
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones de Eclipse Glassfish anteriores a la 7.0.17, el par\u00e1metro HTTP Host pod\u00eda hacer que la aplicaci\u00f3n web redirigiera a la URL especificada, cuando el punto final solicitado es '/management/domain'. Al modificar el valor de la URL a un sitio malicioso, un atacante puede lanzar con \u00e9xito una estafa de phishing y robar las credenciales del usuario."
}
],
"metrics": {
diff --git a/README.md b/README.md
index d9f109ee78e..449375977f1 100644
--- a/README.md
+++ b/README.md
@@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
-2024-09-30T12:00:17.617936+00:00
+2024-09-30T14:00:19.465883+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
-2024-09-30T11:28:40.360000+00:00
+2024-09-30T13:57:33.400000+00:00
```
### Last Data Feed Release
@@ -33,31 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
-264132
+264135
```
### CVEs added in the last Commit
-Recently added CVEs: `0`
+Recently added CVEs: `3`
+- [CVE-2024-45920](CVE-2024/CVE-2024-459xx/CVE-2024-45920.json) (`2024-09-30T13:15:02.450`)
+- [CVE-2024-47641](CVE-2024/CVE-2024-476xx/CVE-2024-47641.json) (`2024-09-30T13:15:02.570`)
+- [CVE-2024-6051](CVE-2024/CVE-2024-60xx/CVE-2024-6051.json) (`2024-09-30T13:15:02.800`)
### CVEs modified in the last Commit
-Recently modified CVEs: `12`
+Recently modified CVEs: `315`
-- [CVE-2017-18015](CVE-2017/CVE-2017-180xx/CVE-2017-18015.json) (`2024-09-30T11:28:40.360`)
-- [CVE-2023-29156](CVE-2023/CVE-2023-291xx/CVE-2023-29156.json) (`2024-09-30T10:15:02.400`)
-- [CVE-2023-31190](CVE-2023/CVE-2023-311xx/CVE-2023-31190.json) (`2024-09-30T10:15:03.527`)
-- [CVE-2023-31191](CVE-2023/CVE-2023-311xx/CVE-2023-31191.json) (`2024-09-30T10:15:03.670`)
-- [CVE-2023-45593](CVE-2023/CVE-2023-455xx/CVE-2023-45593.json) (`2024-09-30T10:15:03.793`)
-- [CVE-2023-45596](CVE-2023/CVE-2023-455xx/CVE-2023-45596.json) (`2024-09-30T10:15:03.923`)
-- [CVE-2023-45598](CVE-2023/CVE-2023-455xx/CVE-2023-45598.json) (`2024-09-30T10:15:04.030`)
-- [CVE-2023-51452](CVE-2023/CVE-2023-514xx/CVE-2023-51452.json) (`2024-09-30T10:15:04.120`)
-- [CVE-2023-51453](CVE-2023/CVE-2023-514xx/CVE-2023-51453.json) (`2024-09-30T10:15:04.253`)
-- [CVE-2023-51456](CVE-2023/CVE-2023-514xx/CVE-2023-51456.json) (`2024-09-30T10:15:04.343`)
-- [CVE-2023-6950](CVE-2023/CVE-2023-69xx/CVE-2023-6950.json) (`2024-09-30T10:15:04.457`)
-- [CVE-2023-6951](CVE-2023/CVE-2023-69xx/CVE-2023-6951.json) (`2024-09-30T10:15:04.580`)
+- [CVE-2024-9291](CVE-2024/CVE-2024-92xx/CVE-2024-9291.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9293](CVE-2024/CVE-2024-92xx/CVE-2024-9293.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9294](CVE-2024/CVE-2024-92xx/CVE-2024-9294.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9295](CVE-2024/CVE-2024-92xx/CVE-2024-9295.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9296](CVE-2024/CVE-2024-92xx/CVE-2024-9296.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9297](CVE-2024/CVE-2024-92xx/CVE-2024-9297.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9298](CVE-2024/CVE-2024-92xx/CVE-2024-9298.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9299](CVE-2024/CVE-2024-92xx/CVE-2024-9299.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9300](CVE-2024/CVE-2024-93xx/CVE-2024-9300.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9301](CVE-2024/CVE-2024-93xx/CVE-2024-9301.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9315](CVE-2024/CVE-2024-93xx/CVE-2024-9315.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9316](CVE-2024/CVE-2024-93xx/CVE-2024-9316.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9317](CVE-2024/CVE-2024-93xx/CVE-2024-9317.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9318](CVE-2024/CVE-2024-93xx/CVE-2024-9318.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9319](CVE-2024/CVE-2024-93xx/CVE-2024-9319.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9320](CVE-2024/CVE-2024-93xx/CVE-2024-9320.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9321](CVE-2024/CVE-2024-93xx/CVE-2024-9321.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9322](CVE-2024/CVE-2024-93xx/CVE-2024-9322.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9323](CVE-2024/CVE-2024-93xx/CVE-2024-9323.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9324](CVE-2024/CVE-2024-93xx/CVE-2024-9324.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9325](CVE-2024/CVE-2024-93xx/CVE-2024-9325.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9326](CVE-2024/CVE-2024-93xx/CVE-2024-9326.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9327](CVE-2024/CVE-2024-93xx/CVE-2024-9327.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9328](CVE-2024/CVE-2024-93xx/CVE-2024-9328.json) (`2024-09-30T12:45:57.823`)
+- [CVE-2024-9329](CVE-2024/CVE-2024-93xx/CVE-2024-9329.json) (`2024-09-30T12:45:57.823`)
## Download and Usage
diff --git a/_state.csv b/_state.csv
index c3a03d79551..eaf2f915534 100644
--- a/_state.csv
+++ b/_state.csv
@@ -101264,7 +101264,7 @@ CVE-2017-18011,0,0,441b2995596d486f98bff1622c12d01b8096b31aa14c3a58be243dbcc2f1c
CVE-2017-18012,0,0,bd02dcd9bb115300156116c9b49157047b841188b8a20a5194b7c7ab4a9abf0a,2018-01-11T20:10:06.497000
CVE-2017-18013,0,0,ef4c9d8ec4aeb3d7b717cc7787834be8f49d6321e60e5ec697afafbd349b92c9,2018-03-28T01:29:08.340000
CVE-2017-18014,0,0,bd99fc808dd0bef043129cab6c64c929b4f9b559ca6094673ea94a2240b2de35,2018-02-06T14:56:31.047000
-CVE-2017-18015,0,1,4a274661baea27353e63f4ad94e152aacf81b3b442010449c17c3f31b4bdfcf0,2024-09-30T11:28:40.360000
+CVE-2017-18015,0,0,4a274661baea27353e63f4ad94e152aacf81b3b442010449c17c3f31b4bdfcf0,2024-09-30T11:28:40.360000
CVE-2017-18016,0,0,3dc5d70e27c1d63340fbfa198b2c533272e6b62dc290b2307971352391aeafb2,2019-10-03T00:03:26.223000
CVE-2017-18017,0,0,a39c57ed4f546af72acb1be141a80b80a43ec980ef19a38a455b308548644e7f,2024-04-24T13:40:09.260000
CVE-2017-18018,0,0,6d61deb1fe9ee9791bf6ef62afea19c1fd1846c276d8e7bbaf098fc9c0208be0,2018-01-19T15:46:46.050000
@@ -222103,7 +222103,7 @@ CVE-2023-29152,0,0,3e64eecc21db386c7f119b01e40814fc30c8f66fa79cb5214de6e4d76672f
CVE-2023-29153,0,0,20e2306cd83c9e65fd335c9262fba0a4a015d470c261c83aa6e9a4bba9f99467,2024-03-22T19:15:07.753000
CVE-2023-29154,0,0,2ce80fdc92b06662b921d35598a798f56357e85c01079f69c07b54be329481ae,2023-06-08T01:53:05.697000
CVE-2023-29155,0,0,b234761400ee91a528d85b930bfafb3cdadffaba65f35d28e9f6eae28e23e9c5,2023-11-29T20:52:57.780000
-CVE-2023-29156,0,1,d8b2a9f0b1b6e72fbdce429dcdda19c1090c99aff95fc2649c75d85d281296ae,2024-09-30T10:15:02.400000
+CVE-2023-29156,0,0,d8b2a9f0b1b6e72fbdce429dcdda19c1090c99aff95fc2649c75d85d281296ae,2024-09-30T10:15:02.400000
CVE-2023-29157,0,0,3d4c1b7d84ad7a94de33d0293a38b4b0adb40af5df3591417d029d597a7d484f,2023-11-21T02:09:32.690000
CVE-2023-29158,0,0,db76dabc3df93f55e4d7122ce7eb8886cfd8d274f9430c0253da65b710d59f0c,2023-06-29T20:14:11.297000
CVE-2023-29159,0,0,68a3e9b0f59cfd37d0c83edcfe40de1e5e70be77f419f7d490735f62823663d3,2023-06-08T01:59:38.140000
@@ -223588,8 +223588,8 @@ CVE-2023-31187,0,0,9120964a617800df40a561d28aef4421ea58f12b7831765de520291a75848
CVE-2023-31188,0,0,ab08094190ebd5e06eae2728b47847bbf9237182044faa7cd3983124759b56a3,2024-09-27T21:35:01.930000
CVE-2023-31189,0,0,1dea22b62ceaee823e009b380c145b1c71852130112dc3e45787ad81bcc99fd7,2024-02-14T15:01:51.137000
CVE-2023-3119,0,0,4d4d466efa1cc13b8b7f79afe2286017dd41d562bed4f2f063b6d1fcb19e87e7,2024-05-17T02:27:17.113000
-CVE-2023-31190,0,1,b0097b6e20ab59773597bb7402a6494130cac9beadc717077bcbde3866eeebaa,2024-09-30T10:15:03.527000
-CVE-2023-31191,0,1,9daa2bb2d273583979ba8d9c40cbde03c37c9f91112e45bbdc5ed7afc4ef4777,2024-09-30T10:15:03.670000
+CVE-2023-31190,0,0,b0097b6e20ab59773597bb7402a6494130cac9beadc717077bcbde3866eeebaa,2024-09-30T10:15:03.527000
+CVE-2023-31191,0,0,9daa2bb2d273583979ba8d9c40cbde03c37c9f91112e45bbdc5ed7afc4ef4777,2024-09-30T10:15:03.670000
CVE-2023-31192,0,0,70bed544d8b5143485429f1f769e05e2f4819562d148ed04a9a7321fa238627c,2023-10-18T18:59:18.633000
CVE-2023-31193,0,0,57908ce7b44089269d2c4128d8260f1509f3efa65504120507d8b35620dfe69e,2023-05-30T16:28:57.433000
CVE-2023-31194,0,0,36665e16e46515708824cafdf2e2626796f37ce5c7d3546e5a193e081a37b6cb,2023-08-02T15:38:15.457000
@@ -234114,12 +234114,12 @@ CVE-2023-4559,0,0,72279ca2cfab6cd57c9fd704465552b3f96b18e016e80ed280e6b57992704f
CVE-2023-45590,0,0,395cef5e7face59cb12e60aa86968e30b836e974c0902f8b616a140e25f389c2,2024-04-10T13:24:22.187000
CVE-2023-45591,0,0,cf9e6a9dffe366c3a101b8946fe672bc4bfd64f91dde328a27c0abc9ecef2a60,2024-03-05T13:41:01.900000
CVE-2023-45592,0,0,d0d9e890692c9d2f672638432172eb4b39935c3ec25ecd02679746861a491ed7,2024-03-05T13:41:01.900000
-CVE-2023-45593,0,1,9b3e59ac8fb9b9515ab4b530a69031ffe74aed1a142eccdbc0f09f9eb0dd95b9,2024-09-30T10:15:03.793000
+CVE-2023-45593,0,0,9b3e59ac8fb9b9515ab4b530a69031ffe74aed1a142eccdbc0f09f9eb0dd95b9,2024-09-30T10:15:03.793000
CVE-2023-45594,0,0,b0393b56950f0e428e7f32464ae14b00c9d8d573fb1c945ee040adcbe0cae423,2024-03-05T13:41:01.900000
CVE-2023-45595,0,0,97fdab9361adba6ff516a722307aaf80ac25532bbb8a65ce7e8016865b5b4335,2024-03-05T13:41:01.900000
-CVE-2023-45596,0,1,e469222c135c33756911c57612712f77eded7e56fab79dfb44e37b40da9f4170,2024-09-30T10:15:03.923000
+CVE-2023-45596,0,0,e469222c135c33756911c57612712f77eded7e56fab79dfb44e37b40da9f4170,2024-09-30T10:15:03.923000
CVE-2023-45597,0,0,6eda7e849c9a4bdd69829985d8c92fa15c239c694799c3f0f4136c981201e30d,2024-03-05T13:41:01.900000
-CVE-2023-45598,0,1,faaa3ca0d423a0062557b3f3c3cd9eff1a811c4f45ca838ddb9c58dd5acf6198,2024-09-30T10:15:04.030000
+CVE-2023-45598,0,0,faaa3ca0d423a0062557b3f3c3cd9eff1a811c4f45ca838ddb9c58dd5acf6198,2024-09-30T10:15:04.030000
CVE-2023-45599,0,0,a63a7d7517b98ea5bbcba86a530677f32fda9d14b1e6ff868e28e88d7ec0b249,2024-03-05T13:41:01.900000
CVE-2023-4560,0,0,c374d73c6512c9198ae07844b4a0a2f3fca9714a1a09bfcdc42777875b8a378f,2023-08-29T16:26:23.543000
CVE-2023-45600,0,0,fd93772078d54879fff3d7d0b2d712b79d029619c10d19ec9c5685e5f21f76db,2024-03-05T13:41:01.900000
@@ -234574,7 +234574,7 @@ CVE-2023-46170,0,0,b897e9040bc030afe42cc5ad50415f5b2a52be10b387946ecb760ebb83cc9
CVE-2023-46171,0,0,067eb3c906679b90befba2ebbb666473745b4c0ddb0eb72710945cfefe553217,2024-03-08T14:02:57.420000
CVE-2023-46172,0,0,092a5bc4707e81a78df1953ec9ce275dfb73bf37fd52d1a82132649756bfbb84,2024-03-08T14:02:57.420000
CVE-2023-46174,0,0,e8a730db2f9b95cd824eb3fd6260ec3880f9f6206b85cad568934b876c5895fa,2023-12-04T18:31:04.347000
-CVE-2023-46175,0,0,9c4556cc95984a76748cdfc45b19904c4348b65a2382aaecb1dff352fb7833e6,2024-09-26T14:15:07.247000
+CVE-2023-46175,0,1,f9181391a2c29c739e048547eba6ba2f2cd7a59e46321eb84b4de043a4d88f38,2024-09-30T12:46:20.237000
CVE-2023-46176,0,0,d96b210af3c575f1f7efaf22b5814a185a031da74e98ee061bf7a6a9ce416250,2023-11-09T16:55:00.637000
CVE-2023-46177,0,0,ef12581f32d09a7580bd99c5d47910cc8a5ca1b2278b3178114242471a29e5c8,2023-12-22T18:46:12.510000
CVE-2023-46179,0,0,7df6f632e5ebdfe2ac0791e3008fa37e3348cf878b1be369c5905228f1b85279,2024-03-19T17:06:48.300000
@@ -238181,11 +238181,11 @@ CVE-2023-51449,0,0,b96f8a7766dd879fa822ee692f7394fb90ffe42ebf88c60b0f0ff0b0499cb
CVE-2023-5145,0,0,4cd6157022dfa5668e867c90ba5fdf25fedfecf71d2cb0959e392040d4d1bbe8,2024-08-02T08:15:31.917000
CVE-2023-51450,0,0,db9ce98d1c70fa2f14f88985307dc37f91f21cf140638f0dc306637e5aa9ba52,2024-02-22T19:07:27.197000
CVE-2023-51451,0,0,3c8812cb571865aeccc8fbcebe1aa715c37c87767cabd52837a0a178df362563,2024-01-03T20:52:26.203000
-CVE-2023-51452,0,1,cf717b5f8a3f168ed376b1b9d822d209f87c729deab4f60a5e5fa41acd3502f7,2024-09-30T10:15:04.120000
-CVE-2023-51453,0,1,80a4ba153f1631d0cc22fbc76a9ff4b491fb72b135661fd855ef3cb2476c8b8a,2024-09-30T10:15:04.253000
+CVE-2023-51452,0,0,cf717b5f8a3f168ed376b1b9d822d209f87c729deab4f60a5e5fa41acd3502f7,2024-09-30T10:15:04.120000
+CVE-2023-51453,0,0,80a4ba153f1631d0cc22fbc76a9ff4b491fb72b135661fd855ef3cb2476c8b8a,2024-09-30T10:15:04.253000
CVE-2023-51454,0,0,2b3a558d78be434cb066dd0a6698341a19e71fd08020ecb5f476578c917e097b,2024-04-02T12:50:42.233000
CVE-2023-51455,0,0,93c6a165d82ab51fc317def298bef4054d43483bdb3df8fa380ede962c92eeba,2024-04-02T12:50:42.233000
-CVE-2023-51456,0,1,adf92c508cf77a87024ec2f0869e2109fdd2a89951d704496ee69b4106c1cbe9,2024-09-30T10:15:04.343000
+CVE-2023-51456,0,0,adf92c508cf77a87024ec2f0869e2109fdd2a89951d704496ee69b4106c1cbe9,2024-09-30T10:15:04.343000
CVE-2023-51457,0,0,05bc1b188f3c384318e936822fe1d13bfac7e5ad363c159eeb7e50321b96fae1,2023-12-28T20:14:43.737000
CVE-2023-51458,0,0,bb1a259334c872f36f9cd6991ada7296c01808eb265a8ffc70e05109afe0e72a,2023-12-28T20:14:49.643000
CVE-2023-51459,0,0,32c99fea38a0a41da52d3882699676499be43a9ef36118de69d80e154032eb07,2023-12-27T18:43:46.757000
@@ -240946,8 +240946,8 @@ CVE-2023-6945,0,0,4d4e197e57ce0c0a12a32b3d201450bb49cb1ee7fc52a5178125c8abda73fd
CVE-2023-6946,0,0,0fb93ff65377878fd63e0701dc37881508b51e13c75cd51aae76c0d1bace0216,2024-02-03T00:24:34.007000
CVE-2023-6948,0,0,be91183fbdb39a50b74ce7d3ff5b6c3aab11486e45a2cf29f485aac62fe5e604,2024-04-02T12:50:42.233000
CVE-2023-6949,0,0,7aff3f0507c17d20c0264f82da2d820e606774abf7ad503f7ff74f3e88995711,2024-08-02T09:15:48.733000
-CVE-2023-6950,0,1,f6a3639db9c98eef0a2e5c317aba1c77b502903f7a542e8844615268300f0039,2024-09-30T10:15:04.457000
-CVE-2023-6951,0,1,024827813bdafbc2aa52ba77b4053e8ba3019dfef452a796562e9bfcdbfe8bd3,2024-09-30T10:15:04.580000
+CVE-2023-6950,0,0,f6a3639db9c98eef0a2e5c317aba1c77b502903f7a542e8844615268300f0039,2024-09-30T10:15:04.457000
+CVE-2023-6951,0,0,024827813bdafbc2aa52ba77b4053e8ba3019dfef452a796562e9bfcdbfe8bd3,2024-09-30T10:15:04.580000
CVE-2023-6953,0,0,049acf0127c7ad8d23801ce9be6768c1adc281ba394b914bdc6c40e63b989b4b,2024-02-22T03:39:59.017000
CVE-2023-6954,0,0,38083f7de1fe9a5b161f9cbaae0c7bbc9ee6d77a4ee5f94afc743432cd2c4b87,2024-03-13T18:16:18.563000
CVE-2023-6955,0,0,f07930d72215dd47b2562b244dca586d4bff972348a319e8508326b1d31762e7,2024-08-30T14:15:14.797000
@@ -244629,7 +244629,7 @@ CVE-2024-22167,0,0,367edc9595b541e4583166fe3269c3fdadf1e07d471b986f4ba4d420acaf6
CVE-2024-22168,0,0,ab8c917977cb7b1cade1e73907721ac451b3aa4a33c57dc23ff6bbd6f3f3086f,2024-06-25T12:24:17.873000
CVE-2024-22169,0,0,df69a5503ace20ebb25a47d219de9dc0cec7f2ae535ba8ef865dbc8e1b1de7a7,2024-08-05T12:41:45.957000
CVE-2024-2217,0,0,daa69536e84eb4d43fbe3db8c0399425dbbf0cb0bbf2749fa7af96ac22f4de99,2024-04-10T19:49:51.183000
-CVE-2024-22170,0,0,8e3f6f25685a59a117e38321d789a9d91520edbca4f2236217e515624bbe910f,2024-09-27T17:15:12.143000
+CVE-2024-22170,0,1,504fac1aab70e561d8ec9c807312cca41cfa1c3475c8514f34e109887c75e8c3,2024-09-30T12:45:57.823000
CVE-2024-22177,0,0,ca235268cabc0c584ac292f2ee16730b9c91a0111cc9efc05a4e3318a8d8189e,2024-04-02T12:50:42.233000
CVE-2024-22178,0,0,87d543ccce174b767e9afe9e4bdb9faba8753c7ebe4e7d346f4e431254aec6b3,2024-04-03T17:24:18.150000
CVE-2024-22179,0,0,4d9fb82bea52992d0d70df248ed55546a9ddf3350aae061363433dabea01060d,2024-05-28T17:15:09.547000
@@ -245550,7 +245550,7 @@ CVE-2024-2358,0,0,0ca353146b040adce527451621b2de0180b82568eb0731d510f8a061107831
CVE-2024-23580,0,0,5718ea9f66086a41a59f079246d02ed41858f86711210914df45620e8d73526f,2024-07-03T01:47:56.403000
CVE-2024-23583,0,0,f98c04f8a3f19a919e4cfb4d28d06a64ab798bebf069087ad8f6f94890d95eb5,2024-05-20T13:00:34.807000
CVE-2024-23584,0,0,25f43dde9216afa9143a8cf07755b8e095a8ff52fd4b037e0c34ead99c4a7c82,2024-04-11T01:24:48.327000
-CVE-2024-23586,0,0,6ee72891a4683cc42660aaf3bba524a29cd501473051e34da54738b14189bde2,2024-09-27T22:15:12.930000
+CVE-2024-23586,0,1,852e7047f3db6f88ba283fb207d8596d0abfc9d4ddc8fa490252a46297b7dc87,2024-09-30T12:45:57.823000
CVE-2024-23588,0,0,616193c58804c0df33f02bbe918628fdff6c0cb92f6852ea08810ac3765e566c,2024-07-08T15:28:10.993000
CVE-2024-2359,0,0,bea5a27f1890e6b98f8fc3b4cbe7c984687ed5b340caf950afed71935b795710,2024-06-07T14:56:05.647000
CVE-2024-23591,0,0,65ea9c151d9d7befc9470a956acb00d512d494f9281b48487341988483da52d2,2024-02-20T22:15:08.353000
@@ -245866,13 +245866,13 @@ CVE-2024-23916,0,0,5077cd24018e805b075cf41f1ccac823739f63acd7350dd61dccd4ccae773
CVE-2024-23917,0,0,f3236f3886ac3a298029762564187aed866f84d01e9365abb654a21b0d966829,2024-02-09T01:05:22.180000
CVE-2024-2392,0,0,a1f238224b889878ea8101bb03eb85f7363cbe3f032b78dbb59584257d093c6d,2024-03-22T12:45:36.130000
CVE-2024-23922,0,0,37a02ab971cb50385b7fc0a0489eb30f0ce2ddc6b2cc2fd3f3b240e3e9e970d7,2024-09-26T13:32:55.343000
-CVE-2024-23923,0,0,018ef5fcdc300723cc2e14dae15017b4a930053d99c9fd577ac55b06f0be1909,2024-09-28T07:15:02.440000
-CVE-2024-23924,0,0,fb697cc01f0647d1e21deb85e2308042905d41cb886de08cb4a4c797a6686033,2024-09-28T07:15:02.790000
+CVE-2024-23923,0,1,6d21548328f232ee4a0ae5595c5ba14231480b68e06c1ed628e955f819140082,2024-09-30T12:45:57.823000
+CVE-2024-23924,0,1,a976739f66326f9faea03975196e389daccf47bf602ace95e6f1710df613276f,2024-09-30T12:45:57.823000
CVE-2024-2393,0,0,df74eedb2cf97a7cc02bf0873514b7acec290c6b3a77795cc7def5200bf6c3d3,2024-05-17T02:38:12.530000
CVE-2024-23933,0,0,01d625badee588d8b28d0d0fbf55d2f47d0b150143df0e8338ce37487a8f0580,2024-09-26T13:32:55.343000
CVE-2024-23934,0,0,61cba64dd7d447d31e2c1c1cee321294df02a41fb555e62b1a346e8bb423690c,2024-09-26T13:32:55.343000
-CVE-2024-23935,0,0,9cfbd19dce3c7f3d17422ef8161abd59a134553512dbcc0c875da949d881f04b,2024-09-28T07:15:02.997000
-CVE-2024-23938,0,0,d8c7a959dc5a0629d9048ef2f2c4ba4766c3b1bb0c0a6e0dacc9099fa012bc21,2024-09-28T06:15:02.200000
+CVE-2024-23935,0,1,9506636d2bf28aa80b4bb48271bdfd3331dda5517f0636523e7f8be565679a5a,2024-09-30T12:45:57.823000
+CVE-2024-23938,0,1,fd53c5c63aa96a80e51337aaf03e3c4d851b1b1e15dfbf961c1087664221dcdc,2024-09-30T12:45:57.823000
CVE-2024-2394,0,0,601af7bb68f57fdb63dc28b1a3be4e92facb0bb452d0b42ad5d6937b933c3deb,2024-05-17T02:38:12.620000
CVE-2024-23940,0,0,1c0bdede0fd3b02e7f9ad21f2aa27ec6ae45825d094730a07bddf507f926c4e8,2024-02-06T19:19:33.920000
CVE-2024-23941,0,0,9709bab66e0af4d3dc69e9a86a5316f0273a5a15f2aac5ab4098dcbc1f12f8f7,2024-02-06T21:37:12.433000
@@ -245885,12 +245885,12 @@ CVE-2024-2395,0,0,37ecce73517ecefe68574d74e2265f3d2a49c15c536980e217743e28f1db87
CVE-2024-23950,0,0,25847234553a7a7aa3af838a477d7b6f4a5c35ccd2e774f811d68e8ce720445a,2024-06-10T17:16:19.833000
CVE-2024-23951,0,0,14a64f857e19fa20b9d905d154185c191d80e1c0b6ed53dd9050b70f076dc813,2024-06-10T17:16:19.930000
CVE-2024-23952,0,0,34c7e2d5919ffb2785317596bbeb44591446a81e60ca69df2cdc3c3c37179a86,2024-02-14T14:16:07.460000
-CVE-2024-23957,0,0,37a91ce79040106532d239390ae444b6332819b7e9f72cf65c63091df80b24de,2024-09-28T06:15:02.787000
-CVE-2024-23958,0,0,cae83859b27785e2bbae1d2b2ec6953f20791a55cf2974554a466cdfbb519ee7,2024-09-28T07:15:03.183000
-CVE-2024-23959,0,0,c8308e13450d2238caf0d7b06734770079188f9a2ef38eb64ae23ee6e678a522,2024-09-28T07:15:03.367000
-CVE-2024-23960,0,0,fda5fbb384c44cfd892f3a255575c7cf6ce4c2641fb844129ac1686dd7735a55,2024-09-28T07:15:03.550000
-CVE-2024-23961,0,0,774760d9234af4b9b92feb77a30beda5760511ad18696f76b2ebaa44aee95b0e,2024-09-28T07:15:03.740000
-CVE-2024-23967,0,0,2bcd51c846821f9a9259d670019f976da6ff4d771498869c33d238e656bb6765,2024-09-28T07:15:03.937000
+CVE-2024-23957,0,1,ed87de9bdea097b0ca2e53cca4bc810814f00133edfa10f8cebfc154edb35fd3,2024-09-30T12:45:57.823000
+CVE-2024-23958,0,1,ff06628e1afe59f31bff34dff521f2e598205306da2392a3adc5d4793fb5f528,2024-09-30T12:45:57.823000
+CVE-2024-23959,0,1,80146b68e14cfac4747cd49a5e3cc84725ecda549d9ea29271a012ce6a4e04d3,2024-09-30T12:45:57.823000
+CVE-2024-23960,0,1,a2f0b3fe0c3f9ea19e717f288561d0303ac7cc55e48780be3e44903a4bf931af,2024-09-30T12:45:57.823000
+CVE-2024-23961,0,1,9f0ba6c5305eb7e149c6c370f7d588f0596c7d356f3fdefcfcc8d1e6ffa9c31c,2024-09-30T12:45:57.823000
+CVE-2024-23967,0,1,2e6844cb660bfea956a5456e6175fc7c279c944d3a9d483ec6e29e37c10cc3e2,2024-09-30T12:45:57.823000
CVE-2024-2397,0,0,00747e677ac07569e47a4b44c68849d40056dfcd1ae374307286b3eb2379c47d,2024-06-10T17:16:25.180000
CVE-2024-23972,0,0,6c5c594b7898f5e185c6869f05332bf9954a24724f07056c10cd99db6873a41c,2024-09-26T13:32:55.343000
CVE-2024-23974,0,0,c245074da43acd228fb7b61c7f93435155d38dc53924647c7bf42e3ed476242f,2024-08-14T17:49:14.177000
@@ -246739,8 +246739,8 @@ CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234
CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000
CVE-2024-2541,0,0,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000
CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
-CVE-2024-25411,0,0,fb79fd0dc75adec0fdf905cbdc51a15c574fac13456bf915fe30bbf9a6ce6707,2024-09-27T20:35:09.620000
-CVE-2024-25412,0,0,874abf180c098ce0160e736f3fd25db3ae69414d9e1283db4e9277a2dad487d5,2024-09-27T18:15:04.100000
+CVE-2024-25411,0,1,f9808b9c08c02274fff68dd7e5217db1355a6b403a57d6ed0599eb26f30420e4,2024-09-30T12:45:57.823000
+CVE-2024-25412,0,1,25225a12686307e3696c22e4eb784c560e2074c3bc37f527bf95738655fbd8fc,2024-09-30T12:45:57.823000
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
CVE-2024-25414,0,0,adf1d11bdd5b149561578133c2144fc86b074e6ead373a55ead3bdaa0f1ac127,2024-08-29T20:36:20.677000
CVE-2024-25415,0,0,43d479f30c3959db40e37d85a2a1b1d045a277956526655bc82aa0e8d248892a,2024-08-28T20:35:08.127000
@@ -249394,7 +249394,7 @@ CVE-2024-28943,0,0,0d7428b497ed4dc685ee859cada5a22616e64d89dbcd3a147111832c09c51
CVE-2024-28944,0,0,f3888aca11035410ad0fed8d85bb5091b862626240ff24765e70f6000a58dc46,2024-04-10T13:24:00.070000
CVE-2024-28945,0,0,04d2a9af526ca30e4ffc0ffa8edb0df1250eaa963fca5ac37255b03b4c8723e7,2024-04-10T13:24:00.070000
CVE-2024-28947,0,0,9d3506b7ac0d8414d56f005d3db3860beb6359f3ca23ee696b9b26b32dc4d488,2024-09-12T18:52:38.433000
-CVE-2024-28948,0,0,3c3e854e1a117f04755f1fc2737376d472ac7ee2a45da7e9cc509c72ae582dda,2024-09-27T18:15:04.197000
+CVE-2024-28948,0,1,830e2801aa59b71f4168cd6282faa374e27b3d9f6a1e3782930d03983c4c3719,2024-09-30T12:45:57.823000
CVE-2024-28949,0,0,d5e48bc4aa20c39f513a0582c3f637deca3b5b6936a689a13ce9af3ad1e7d8d0,2024-04-05T12:40:52.763000
CVE-2024-2895,0,0,b446221d46d418d396cd9d883702efdf5b2797ce3a0ab257ce4f7a9b35ffa891,2024-06-05T20:15:13.023000
CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000
@@ -250221,7 +250221,7 @@ CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1
CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e7b5,2024-09-26T13:32:02.803000
CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000
CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000
-CVE-2024-30134,0,0,72156b2301a058f685d41be339215a4dca7c28cf56516526dfa6a5957d42c05e,2024-09-26T16:35:22.707000
+CVE-2024-30134,0,1,b5401f953dda8a57b606a9ace80dca0a0a00325ba4573c5e6f1c325a9f248829,2024-09-30T12:46:20.237000
CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000
CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
@@ -251494,7 +251494,7 @@ CVE-2024-31894,0,0,657ebec51508a8a9e81a6bf77e1af55b91d39f1157660d9afa903879def9d
CVE-2024-31895,0,0,fe374e20832c9aae350e47d74978bf183f5d5c0369f487d8af68df70d3c0f094,2024-05-24T01:15:30.977000
CVE-2024-31897,0,0,a9f6dffdef42db63de321f283f9008f4cc590873723e0b6ff14df57c7407f3ac,2024-07-11T14:52:52.907000
CVE-2024-31898,0,0,98b5fee92aa3e78db3b92a2045655a85910d78a165cc0fc0eb03d45c453d34fe,2024-07-31T18:56:36.063000
-CVE-2024-31899,0,0,07b49bfc9a3140de40692054cf70e51ff7e6f23102bae54fee696f03887a68a7,2024-09-26T14:15:08.433000
+CVE-2024-31899,0,1,d3ab48eb0549390802c7ce478f98972d59b7f83b38a5ec8cc60f4f971420698f,2024-09-30T12:46:20.237000
CVE-2024-3190,0,0,59b4ce24fb505a0884244f905c395c98b38f50a3b44829542252bc93265789b6,2024-05-30T13:15:41.297000
CVE-2024-31902,0,0,792ebd92048a7d574f1f4f622d29c5adae49f7f37a902660c4b217f76bba207a,2024-07-31T19:20:04.903000
CVE-2024-31904,0,0,77f4db6cab579901d99ba6c75def744c8e9197f1a2c93d4ffef011323b61b3cc,2024-05-24T01:15:30.977000
@@ -252546,8 +252546,8 @@ CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e
CVE-2024-33345,0,0,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000
CVE-2024-33350,0,0,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000
CVE-2024-33365,0,0,753a357764251688c2c58169a412ba47dbb205dad7d51ffa0d9b46ec5f577645,2024-08-01T13:51:53.400000
-CVE-2024-33368,0,0,ced3fbed5b37a6fa351703c9cf22fcdd82c5bc9ab2bbebf55feac1ee46b043de,2024-09-27T19:35:38.347000
-CVE-2024-33369,0,0,e125b4b53bf8f30eab800b99fb1930c4542a7a8a1d8d9782e28c6e80dc67c7e0,2024-09-27T19:35:39.847000
+CVE-2024-33368,0,1,2f5067ef9bf994f7fb5cd656c368e61e6b35d90adf8c6aa0bea0d7ff77e8fdd7,2024-09-30T12:45:57.823000
+CVE-2024-33369,0,1,e07a4670752358e6ec32ea35286e6cac9785d6a308e48b8ed639b1fdb8c373a9,2024-09-30T12:45:57.823000
CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48f8,2024-05-02T18:00:37.360000
CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000
CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000
@@ -252798,7 +252798,7 @@ CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aa
CVE-2024-33698,0,0,a8c5e7c040b3c6d1c0f9bc21543a8682893b5aa4922da330e8b0355256cea828,2024-09-10T12:09:50.377000
CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000
CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000
-CVE-2024-3373,0,0,e3f0b06cda529fba8bd3ac22f4f7ed89f090b30ded0d545b2ba52fbd4a5ce487,2024-09-27T15:15:14.577000
+CVE-2024-3373,0,1,02bb0a6a8cf1c8cb960f2645d7165e4c706cc177e4cf5e50be0530bbf35b3163,2024-09-30T12:45:57.823000
CVE-2024-3374,0,0,3ebd1bd07a69ff470e060c4c065f62c59313c2dfc13f260402ece495f026b11b,2024-05-14T19:17:55.627000
CVE-2024-33748,0,0,066f13e7dc76dff0529f136e64473f4bf178cc6b6f4c44f335cc233ab954b6f1,2024-07-03T01:58:38.810000
CVE-2024-33749,0,0,f9dfa03193fccdb082b9724eae52d9e0afc932b6dd471bafd143ead723900e53,2024-08-14T19:35:22.807000
@@ -253397,7 +253397,7 @@ CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87
CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000
CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000
CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000
-CVE-2024-34542,0,0,448bec67e5a9de69972bffb223f111a5ccd69a8038bd7509dd3b254bb012cc6b,2024-09-27T18:15:04.453000
+CVE-2024-34542,0,1,abe2047da40b5785dff1e0c16af2d28a2147a236649d3b2de564da1c534a88f5,2024-09-30T12:45:57.823000
CVE-2024-34543,0,0,d1d082cf58fb09716352a1b771df34e1a1085cf8f4fe64f8d879c516dd412fbe,2024-09-23T14:17:42.957000
CVE-2024-34545,0,0,30a1d58a5a9c49dffb8cec6e8682b29a77cba507757112fa783e98111c20a31c,2024-09-23T14:13:07.883000
CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000
@@ -254699,7 +254699,7 @@ CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c97
CVE-2024-3632,0,0,b5152c6f3734461efaf203a246eaafe8ef0e2600523c2de907e61dd2f01c5bfc,2024-08-01T13:56:37.647000
CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26
CVE-2024-3634,0,0,5d02e3f893ea5650c3ad2b96f123134b624618fa357ff3bdcb3a7b4c93242ece,2024-05-15T16:40:19.330000
-CVE-2024-3635,0,0,c19eeb031d6ada07af20951c7a2775fdb42697fae7dca83bc4ac8ca05e01f84f,2024-09-30T06:15:13.623000
+CVE-2024-3635,0,1,be8d24d4a59cfcb2b77f55c360473f6c2e8d8db8923f00e7443f43c627e427f3,2024-09-30T12:45:57.823000
CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000
CVE-2024-36359,0,0,f23101db48854affc5e103b47d6b2305b7e6ac13ffa7941483a75abefead3f7b,2024-06-11T13:54:12.057000
CVE-2024-3636,0,0,4d79aacd53f2ff2167f5a1fa2a92eed22c11ede875a2d9112617f861658a4106,2024-08-07T16:35:14.110000
@@ -255197,7 +255197,7 @@ CVE-2024-37120,0,0,e217f7fee1fd744744a6e451bd7bab1af64ac11cf693c5332902861bc57f3
CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3ef5,2024-07-25T19:27:44.087000
CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000
CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000
-CVE-2024-37125,0,0,a9d961e2fb8e09f2141c21357d68455764a0d5ffa479caa6b3e5fd3d9a63b85d,2024-09-26T17:15:03.400000
+CVE-2024-37125,0,1,c3a964a559ab27819f31020b758acab28f92a62819c1ba1ac4d044bd4955ee74,2024-09-30T12:46:20.237000
CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000
CVE-2024-37127,0,0,d9e870bed45357108f05b43be573ea51c7d15f5150f07ef26a707da9d896bb8b,2024-08-27T15:23:21.370000
CVE-2024-37129,0,0,1bda6b021f1f7698674c595a8a84e9d380a54f5551f6ad0383f5d9c8c50d327f,2024-08-13T15:26:46.890000
@@ -255255,7 +255255,7 @@ CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862
CVE-2024-37182,0,0,2c3b8dc4ac8a4c58e16690b89b8b1d4e60a1d50b12c336b43ce7311fbfe9a142,2024-08-07T16:08:10.810000
CVE-2024-37183,0,0,40759211984c4bbc303ff8d56740c06e4761a951d68b4235158aaff8607d5316,2024-06-21T11:22:01.687000
CVE-2024-37185,0,0,7506242f1ce72376b2b30a412cd4235ec1046d86e8f141e3c3ab3099b75bd0d2,2024-09-09T12:21:53.383000
-CVE-2024-37187,0,0,0c334888e3fcf27416a1e2144d76380d91baba943b26ddcbdbab63bc187e8f6f,2024-09-27T18:15:04.690000
+CVE-2024-37187,0,1,312d55182df0df28071c2452e125c249aef1e836f688a9e0683be1ceac87c828,2024-09-30T12:45:57.823000
CVE-2024-3719,0,0,e1388f5d62a0fd4143182e88b2e1e453aac0737837b6c91a5acc29cfca670145,2024-06-04T19:20:23.553000
CVE-2024-37198,0,0,bf34a330875867b427d853b7c401fbf1da6acf891d942b32d41eff0d38e81318,2024-06-24T18:55:25.417000
CVE-2024-37199,0,0,e0bc94ff3ffb2d447b176c847adbfd46c016cf032811bab5a07d3d759b2c5626,2024-07-25T19:28:39.857000
@@ -256050,7 +256050,7 @@ CVE-2024-38303,0,0,028afe1755065337ff24d15854e1a09f4321a858b56f8ecffef2fc2440540
CVE-2024-38304,0,0,c9c5e31995efec3c1031188bcbced9384b5bd23fcd1002d4307a7715d8d36271,2024-08-29T13:25:27.537000
CVE-2024-38305,0,0,ee5caad84873fbd92352a0446fe4dbaa8294a3e8c08e38b564114b506da289eb,2024-08-21T12:30:33.697000
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
-CVE-2024-38308,0,0,ede660bbdd3acded62256ac010e414c1e3400250af21c3fc60205062b6b984eb,2024-09-27T18:15:04.933000
+CVE-2024-38308,0,1,6e6d245b5d633e47443021abc902c14fad4262920b7632bf3e509e3057fa955d,2024-09-30T12:45:57.823000
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000
CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000
@@ -256440,12 +256440,12 @@ CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
CVE-2024-38793,0,0,8ad7655f99bb4b3fa4f36342468e0b68d719584b816ac8effce8d0ff63e4b98c,2024-09-13T20:57:16.150000
CVE-2024-38795,0,0,83e6ed558db6ed1b1b849abb4b7528bc0fb3b0856b9448de9d080b54c41c3121,2024-08-30T16:31:03.887000
-CVE-2024-38796,0,0,427b62fcd3401b83db8f34cb8e43b32c20a3cb4a0ccf3e3dde8fc590ec06176a,2024-09-27T22:15:13.153000
+CVE-2024-38796,0,1,3d9cb4aa62a4ae6711850289216ae812a45627870de9e62adff5833551edb19a,2024-09-30T12:45:57.823000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000
CVE-2024-38808,0,0,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eeea3f,2024-08-20T15:44:20.567000
-CVE-2024-38809,0,0,2d6123022f4801f9e015259807c633edfa4d06b025c196110fe84161d9cf6ae8,2024-09-27T20:35:10.383000
+CVE-2024-38809,0,1,3253fab0ee312e8a4e0cc4bceda27a807a19a408952e7e246fe3ca5d4d34ef0e,2024-09-30T12:45:57.823000
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000
CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000
@@ -256461,7 +256461,7 @@ CVE-2024-38858,0,0,c2e046d5d75320cc690e509cc93285ebeb3c1c26a8f79c6f003385d5db961
CVE-2024-38859,0,0,de323bde3647e4f305c3b46157fa86379bf5b570b3bfbebf89dea8495917b5d3,2024-08-26T15:15:23.727000
CVE-2024-3886,0,0,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000
CVE-2024-38860,0,0,266a5ea7baf50ab92e42d7685db3a6cf2803dcca1365001a34024abb32b3b89e,2024-09-20T12:30:51.220000
-CVE-2024-38861,0,0,de57b8c84f052f5e4dbe7761f23a1d7dcd731f578a432762b8e5c5cf76194bb7,2024-09-27T09:15:02.873000
+CVE-2024-38861,0,1,c849569e1ce9ba1b5e191f651dac8e0341ee6fab90d6f85280ffa2b71faa4392,2024-09-30T12:46:20.237000
CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000
CVE-2024-38868,0,0,f5122b748e151420a9f3845d24af4920bd437f9bfb8619e2cdc643a0cfcffcd9,2024-09-04T19:13:29.983000
CVE-2024-38869,0,0,c0f887639cd5f8290b163362347e9df211e2de0bfae6dfee57ed54004469d16e,2024-08-30T18:15:07.150000
@@ -256640,7 +256640,7 @@ CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb
CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000
CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000
CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000
-CVE-2024-39275,0,0,ab9311e8c17c5cead5320c770d56f66a0814f9dc1363bdd82612f13758d50912,2024-09-27T18:15:05.173000
+CVE-2024-39275,0,1,c9a86fdd3d7992138c3a9cb3361973b3f4c162741be0221d55c8ff9e9557385e,2024-09-30T12:45:57.823000
CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000
CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000
CVE-2024-39278,0,0,0601498c3389c5dd00f8ed9530dea3d77d09d81c315f48a8850ef30911e72e8d,2024-09-06T12:08:04.550000
@@ -256673,7 +256673,7 @@ CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdd
CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6ff7,2024-07-02T17:44:45.700000
CVE-2024-39317,0,0,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000
CVE-2024-39318,0,0,d84809b5481c68217d59c341f89a33a753d6db4b36e662db9d71acc330a074f7,2024-08-01T12:42:36.933000
-CVE-2024-39319,0,0,91427d9ed878735bd99e1803488e83a78233c7fcae651eda382ab6910ffc8ce4,2024-09-26T16:15:07.947000
+CVE-2024-39319,0,1,fc55ad0d090f68867940d18aa2fde9c1bb5fedcab6c273e1d435217e3e041234,2024-09-30T12:46:20.237000
CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000
CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000
CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000
@@ -256706,7 +256706,7 @@ CVE-2024-39353,0,0,2167a4e696755ebb97fec80f167f71100aa107b125d2865a5fb1a76c1e17f
CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882ba5,2024-05-02T18:00:37.360000
CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
-CVE-2024-39364,0,0,cddbdbf9385162913cdd829bcfd022489ed3440be471312e0e9ca4e079cfd82d,2024-09-27T18:15:05.417000
+CVE-2024-39364,0,1,b1aae8c993ed814613269c7b92bcab8df246636e5f77bcc9570a7ff102a4d793,2024-09-30T12:45:57.823000
CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000
CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000
CVE-2024-39373,0,0,49313ed17734e6debe931be9bab23ed5eb2e40aab9f298cb157f10a9804c26ee,2024-09-17T18:26:20.067000
@@ -256772,11 +256772,11 @@ CVE-2024-39428,0,0,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f
CVE-2024-39429,0,0,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
CVE-2024-39430,0,0,1e2b9ea56442b26f7737a9950103fafe605e5c7a90c854837eacf7ef42d0ec7f,2024-08-27T17:44:25.593000
-CVE-2024-39431,0,0,66931d5fea012032a4cc38dde303e83da1435c7ef31127696e0f162ca0aaa9d8,2024-09-27T08:15:02.513000
-CVE-2024-39432,0,0,6a181c3a6fdaf52948ae1a9c718dc793e15e76af06ab14ef8f29dd963c88c5bf,2024-09-27T08:15:03.530000
-CVE-2024-39433,0,0,d3723e2cf121ee7d59abd3045cab248baf49a68c6104e1be45088bcf5eaca811,2024-09-27T08:15:03.710000
-CVE-2024-39434,0,0,8d83fbba085547974f811661b6419c32b98cc9fd85d55546fa40dc52dcdaf317,2024-09-27T08:15:03.873000
-CVE-2024-39435,0,0,d26a28ed5369519c6f001d57e9ac342b6fef3c32f5d9c07b24b2a87415cc6e6a,2024-09-27T08:15:04.030000
+CVE-2024-39431,0,1,90a6829637c027c6c1676fb097e9eb7f26788c64ec2a6f6d2976760360f416d1,2024-09-30T12:46:20.237000
+CVE-2024-39432,0,1,aeac819d505f2cb2e82093d66b2236ae0ab8530e69995f15ad476f76487347b9,2024-09-30T12:46:20.237000
+CVE-2024-39433,0,1,d4d782fd1bb786b09c1fa8beabe4863a20cdc54d4d78b91f909ee667c43313ba,2024-09-30T12:46:20.237000
+CVE-2024-39434,0,1,4c0637c717d73c37fad20911bc5e85aa1bb7ff912a103d1b88e4480925f1e80b,2024-09-30T12:46:20.237000
+CVE-2024-39435,0,1,abd59a8c43da780df7186aa14ddc91ec6f181b4a632bf3979773e0a458fc89f8,2024-09-30T12:46:20.237000
CVE-2024-3944,0,0,5f019f02cc03a38e43d6ce346d35a78d9422843cd57b5ebc3224417ac95f2368,2024-08-29T13:25:27.537000
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000
@@ -256895,7 +256895,7 @@ CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
CVE-2024-39574,0,0,19f7903aaa2fe3131935c172a6b15d77efbdb8c9899ed2e523d65e46645a7e43,2024-09-16T15:59:10.653000
CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
-CVE-2024-39577,0,0,7c99a2167f03955233bf02d24c0a140bb2d5a8e7e1fee9b2f5b7ed5b45187aa5,2024-09-26T18:15:05.717000
+CVE-2024-39577,0,1,a29f5fe5fe8f1b2ad43af1c8556f3cdf1a9d04c0f6fa260150fa000f3fc74f1b,2024-09-30T12:46:20.237000
CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000
CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000
CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000
@@ -257295,13 +257295,13 @@ CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d
CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000
CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000
CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000
-CVE-2024-40506,0,0,56d318dec543a258e8379a1056b94aea1892fa3bff6a76d94a32df617adb6a0a,2024-09-27T19:35:41.900000
-CVE-2024-40507,0,0,bac0094e397379a7a3429530e79371989beb903cb3ba3dcf6941846c376629fa,2024-09-27T19:35:42.957000
-CVE-2024-40508,0,0,163caea35cee6de2b2bade7074186a4c5c69d6089b94566378ffeefdb0584ca2,2024-09-27T20:35:11.070000
-CVE-2024-40509,0,0,d1633f4b5cac1c7260d34a3e180cc3caa4c2c54ee32e532915a9d5bbdd1fd3f4,2024-09-27T17:35:02.243000
-CVE-2024-40510,0,0,1cd8bae3c191b5c9c2bfb7f84e21a91a9f6f5b24548f0743b8a50e4f9c574a44,2024-09-27T15:15:14.820000
-CVE-2024-40511,0,0,f8d973732f909d09045739fe483e49a99cd19af67b105075b44a6edfd4a75026,2024-09-27T17:35:05.557000
-CVE-2024-40512,0,0,68c56f60e1b6a6fa9385d4b2eb4dab907a454571247a342f79e8aeac21ea4dd6,2024-09-27T17:35:06.970000
+CVE-2024-40506,0,1,99cac06f2be0fca419cbf97fe605eb59b764640f047e9a45a650dce636361044,2024-09-30T12:46:20.237000
+CVE-2024-40507,0,1,cef45793245e2a8c95f682a77b163357ed0d91048127bce174598f3d64922935,2024-09-30T12:46:20.237000
+CVE-2024-40508,0,1,f924448caa34c0bc8cefe1f28edc19d9a4103366d1ef77d05bf9802f14ad0e7c,2024-09-30T12:46:20.237000
+CVE-2024-40509,0,1,4c8ad03e59795be20e51f47ef409855dc6a1e695485dc002242eb0aa3ed74b3a,2024-09-30T12:45:57.823000
+CVE-2024-40510,0,1,7e6497bec023a8601df576286fdb218892baf5488a56317dc49ac470a953afcd,2024-09-30T12:45:57.823000
+CVE-2024-40511,0,1,45f3b0fb3621caf5ba301b2ca9fb97ce41790df5b852ecfadbab29746a4fae44,2024-09-30T12:45:57.823000
+CVE-2024-40512,0,1,6b95f2fb9a75be87931b675200bfcb1c37dac8fc6270fe980a6eb37ec9c5a76e,2024-09-30T12:45:57.823000
CVE-2024-40515,0,0,d91b9531ef5ed5978894d52371df8275215aaf629121566b57a4e661954c33e9,2024-08-01T13:57:33.567000
CVE-2024-40516,0,0,aed239a0d38ccfd87fd9b80e3f289cfeb35e1a0ac4b960ecd30c2aa738783f2c,2024-08-01T13:57:34.333000
CVE-2024-40518,0,0,bbc8a85aaa975d14f5cd2cd0045fd3aa844f2bf8933730369940256a4cf29a05,2024-08-01T13:57:35.120000
@@ -257650,7 +257650,7 @@ CVE-2024-40986,0,0,e11c6af819396a110129f1e7859e06c0772bed04c3fb1bbbaea29870bb8d4
CVE-2024-40987,0,0,bd162da49fe1fb86bcc7ce9143288253658754ac905f49dbeb8377eff94c5a38,2024-07-12T16:34:58.687000
CVE-2024-40988,0,0,fee50aa21ac1f7599bace66ea0a5b4dd99eddaf99acede81ddb3e4c91a447b9e,2024-07-12T16:34:58.687000
CVE-2024-40989,0,0,2f3227e456cf3b119ccfa262dfec37e99ce70cb4da10bde2d819344e6e1324eb,2024-07-12T16:34:58.687000
-CVE-2024-4099,0,0,0be5009b04cdf94057b8c5b75407b321bc12867098cb6ef692cba8244f00df4e,2024-09-26T23:15:02.873000
+CVE-2024-4099,0,1,2994d7ee981e892a4dc8572fb71beb8653844de52462fd9e0650f7e53d7d61f5,2024-09-30T12:46:20.237000
CVE-2024-40990,0,0,cd4ca053a0ec5d11c69e407da176119a515b6b0abc494934cf9d76e0e1606550,2024-07-12T16:34:58.687000
CVE-2024-40991,0,0,ec2ddb2f3ffaaab4f22b585138329157aff6badf22f9c0dc433ce0a15fb727e1,2024-07-12T16:34:58.687000
CVE-2024-40992,0,0,59330320f1c372354ad798dc40538850329b5c6373bec47c4461455ccd576b86,2024-07-12T16:34:58.687000
@@ -257974,7 +257974,7 @@ CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652
CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000
CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000
CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000
-CVE-2024-41605,0,0,9d6196c9cfebf8f4125967f18a39b43ec450c91ace7e30313c5ff6709c3251f8,2024-09-27T13:15:13.227000
+CVE-2024-41605,0,1,bb255aac120d8e7bcca665451b615d0034f2513afeb2d3aeb08551ca63d9661a,2024-09-30T12:46:20.237000
CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000
CVE-2024-41610,0,0,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1adb9,2024-08-01T13:58:58.120000
CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000
@@ -258053,14 +258053,14 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000
CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000
-CVE-2024-41715,0,0,2eff0f2ab1df75431520d8eacfd37f1a6d52444e5f8e6e3f272a1ce8184368b4,2024-09-26T18:15:05.950000
+CVE-2024-41715,0,1,e39209f97fb107cb854f69c69d3465a7c8c1fe7039e1d43f377c1c5c61ce5810,2024-09-30T12:46:20.237000
CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000
CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000
CVE-2024-41721,0,0,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000
-CVE-2024-41722,0,0,5d07f20d77edcdff2b0c48115f0a106e17545e598dc19737d2e74f4cc90da333,2024-09-26T18:15:06.193000
+CVE-2024-41722,0,1,f733309575158343ebd0680abc925b6ccf0b2e8a425ec48461fce81378d53712,2024-09-30T12:46:20.237000
CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000
CVE-2024-41725,0,0,9fa43c2bc17c8b3a4f55f7cab7925b510f29704748d43554c32ada9221146150,2024-09-26T13:32:02.803000
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
@@ -258192,8 +258192,8 @@ CVE-2024-41927,0,0,28b0e861c649b30f117a5ffa21dceff5e2eb3f40c9e49c2283b3efe64f1c3
CVE-2024-41928,0,0,fac45a5eba953351f64e8420aefaa828221c1e8b109e75da05d07c8ee7a8c443,2024-09-06T17:35:13.400000
CVE-2024-41929,0,0,7547305bee5f10749b150ea9e1b86a9a69192b8070c36c448e7faebd542862fc,2024-09-20T12:30:51.220000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
-CVE-2024-41930,0,0,63928bfdcc381b15d510631522bb1e512a85b5c66677d22982efc3b8854ef96d,2024-09-27T09:15:03.550000
-CVE-2024-41931,0,0,f180c6fca54cf52eee1343c8a59435802042a122aa78bb1e04626855b2ec0ff4,2024-09-26T18:15:06.453000
+CVE-2024-41930,0,1,aa58d3ec2ec1f583bc94527e5b89837194106277c444e0d511759663a04c7f55,2024-09-30T12:46:20.237000
+CVE-2024-41931,0,1,9c2124168bc46e4a350c443bdcbcbbbb127e0a178890f307b9acfa7aed9bb5f4,2024-09-30T12:46:20.237000
CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000
CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000
CVE-2024-41938,0,0,3ab7c3a39df7962916b58b6a8012e354ce7c2e72731bfa6d3bfa597d2e12afa7,2024-08-14T18:08:42.777000
@@ -258237,7 +258237,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913
CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000
CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
-CVE-2024-41999,0,0,cca09fe754c5e5dbbbc86626d754e65e6325e3fbfa8cc2856cbf99a3021691d7,2024-09-30T08:15:03.210000
+CVE-2024-41999,0,1,eda0f5064ff156637d04b412b72ccae48193d82cb6ad42aecc4697e2a0668f54,2024-09-30T12:45:57.823000
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
CVE-2024-42005,0,0,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000
@@ -258460,13 +258460,13 @@ CVE-2024-42268,0,0,470e4d27aa12d8779499ba3b2e25164e689e6957fb0c4ad57dfd46175c593
CVE-2024-42269,0,0,491dada60f7e866fa32ebe8fcb0b4475c420242ae55bfcda826cc5feafe78ccd,2024-08-19T20:53:51.717000
CVE-2024-42270,0,0,b49f12c003a5a0b58712f7f59d9683820dd71ed90538d1c5cea863c711e0b061,2024-08-19T20:01:09.520000
CVE-2024-42271,0,0,0df7c75ef67f151a59228bcb8e14b7a35ce523209f0a0893d4ae076e680c9f4a,2024-08-19T20:03:31.840000
-CVE-2024-42272,0,0,1b7bae7295bac968617b34ce16eeed5e4d17a65b3f99f681114326017ebaa241,2024-08-19T12:59:59.177000
+CVE-2024-42272,0,1,4ba13f8e5718a93f24843f6144c19d01257a1af5824ca6d1bc43dfcbfe2b9255,2024-09-30T13:40:21.843000
CVE-2024-42273,0,0,89c3e5fcb30a2aae5aa3d49a5c5b01333443b5f3eb420974b5dde59246bd10b4,2024-08-19T12:59:59.177000
CVE-2024-42274,0,0,41adbee025c5f4a53a652bf0a753c3ea42a40dbdd574998956145692ea179777,2024-08-19T12:59:59.177000
CVE-2024-42275,0,0,1d4b2e93b72816cd6a71a64e9e12e8f0ea317c294fa31038a9062c70cd86a8ff,2024-08-19T12:59:59.177000
CVE-2024-42276,0,0,1cf69353aae1f5622016d0abc7d910b7648f9f601915d22e1d47d592ff1edcb4,2024-08-19T12:59:59.177000
CVE-2024-42277,0,0,19bde7d6dc9b4ed08395676e8f60fb260a552c136c888e4a84bff3d56a015f00,2024-09-10T18:46:21.620000
-CVE-2024-42278,0,0,af1c28c8e89a179e1fa420f7dfccccb43b6e94042a487c7a74866a983c0b018e,2024-08-19T12:59:59.177000
+CVE-2024-42278,0,1,22acb1f3b4167363f816d9b78ce23cc7298191759368c6e4873d1b309dd28a77,2024-09-30T12:53:36.420000
CVE-2024-42279,0,0,4072eea42cb14ef4445f722c9302e69097aa69e91098ddb0b91b0bf4f0001b6d,2024-08-19T12:59:59.177000
CVE-2024-4228,0,0,22331e972270e81a8a4d9238da77e1f1eab8644e20c13e517da1e3ed609f3be8,2024-06-27T12:47:19.847000
CVE-2024-42280,0,0,1694248546c938a9fc132aaac5ad50510fba699e64b961da898fcab9edf57703,2024-09-10T18:43:31.077000
@@ -258486,7 +258486,7 @@ CVE-2024-42293,0,0,7cf92cea47cf0aeade81c478f71bad3f09bbe1b4ba14510e43dd89a0a6440
CVE-2024-42294,0,0,1014993f483faff29cfdc56b3a6e1108bbfa3c0b5440094cc7d24f2d59b3641b,2024-08-19T19:43:22.460000
CVE-2024-42295,0,0,f0cd0e6a993b87e3204ed117d3bdfa9958e49bdcdf9632bb8d42fdd57196683b,2024-08-19T12:59:59.177000
CVE-2024-42296,0,0,6f0a4e19d0af7904c42d2fd48012f42857e020384d64582beaccc791074f5639,2024-08-19T12:59:59.177000
-CVE-2024-42297,0,0,af783682b3acd49cecbeb309a7be7be02b11d85338c75538675796b3c9b51fc2,2024-08-19T12:59:59.177000
+CVE-2024-42297,0,1,c38e2bcae83888d7fe0c2d877c480224913ecc13bd6e4035e6e0a1ef6092ed92,2024-09-30T13:41:26.463000
CVE-2024-42298,0,0,a7a104314be64271f752c48d4221bba0e238f1aac61a20a74aa57ea83b79a4c1,2024-09-10T18:42:19.607000
CVE-2024-42299,0,0,1d9a7f76ca05044914ea6b23419a3afe5dfacda94e0276680ead40f3cc253bdb,2024-08-19T12:59:59.177000
CVE-2024-42300,0,0,0085a0d67ebb00a2eb0fdee834d161b381fb524f015d1781780f7c3f00257248,2024-08-19T12:59:59.177000
@@ -258511,7 +258511,7 @@ CVE-2024-42317,0,0,44f472938e0f5464917f6f6f19a154afd8a7d285193dd7544e55d6415831a
CVE-2024-42318,0,0,9010727792eb410d1e9ad3b39440509d19383e8fe33f90305bb640c17c956a4b,2024-08-19T12:59:59.177000
CVE-2024-42319,0,0,eb5fc32e810c02d0e4bc3b0d9ebaf0ea35abaefd35cea63e1339820db2a46ad1,2024-08-19T12:59:59.177000
CVE-2024-4232,0,0,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d54942c,2024-07-03T02:07:15.740000
-CVE-2024-42320,0,0,f9df773abc3333437daca67b80c5a05403fbb972fde81725c79cec5ff40fd2e8,2024-08-19T12:59:59.177000
+CVE-2024-42320,0,1,9ab2cff26285853f85d66a38705f8fa32d92402cfa798a6b747cef97addd9302,2024-09-30T12:54:12.897000
CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000
CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000
CVE-2024-42323,0,0,53a82aa56b3376607f69ef6442a0c95be14356f4dffb06936b0b758d7aae490a,2024-09-26T13:32:55.343000
@@ -258642,7 +258642,7 @@ CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084
CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000
CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000
CVE-2024-42495,0,0,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000
-CVE-2024-42496,0,0,9edc039c277f910eda42d50ae489c2146aecec365f2ef52a04b17b1a7cc45b91,2024-09-30T08:15:03.553000
+CVE-2024-42496,0,1,82629bcd722b8cb6d341bed3916823c994361fb6b4946b9099c29ac012cbc5a4,2024-09-30T12:45:57.823000
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000
@@ -258936,7 +258936,7 @@ CVE-2024-43099,0,0,1e8651c725576df83054b4b74436ff5087c13bad1e13244cb0e6a25df0f7b
CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000
CVE-2024-43102,0,0,08e196b4c8739548226238903033d07bdd98395e1a6fb3461533ef08cfa70faf,2024-09-05T21:23:40.503000
CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000
-CVE-2024-43108,0,0,47a57e102eb90cd8ecab9e088eb8f89335b210e0681716c3a3c3463504f54156,2024-09-26T18:15:06.713000
+CVE-2024-43108,0,1,4daa1ec5e889e4107ee7f635a38462faaf042aae4f3d1f8aa109cd7c3213f7b8,2024-09-30T12:46:20.237000
CVE-2024-43110,0,0,1fe822a52c0b3af1ede7bdafa556f57158a1ace3adaf6fcd1e0c1b1f3c86485b,2024-09-05T21:22:04.810000
CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000
CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000
@@ -258990,10 +258990,10 @@ CVE-2024-4318,0,0,7b0a62dc8691f5e6f2210e7e19a78c6d4d5c9f053f662e7593a96cdc8c097a
CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000
CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000
CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000
-CVE-2024-43191,0,0,5f67b16219345fcf95dfd06c9c3534096ce258dac0d31872dec3aca9db9936a8,2024-09-26T16:15:08.347000
+CVE-2024-43191,0,1,39f06d3c6ad8405bfc0c97c3e896524beacc5fba902e2cdc1730fdb616dc0623,2024-09-30T12:46:20.237000
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000
-CVE-2024-43201,0,0,1cb9c408cdac4166bfc707332bad69ac09ccf565f3b94099914e1bf7d83574f0,2024-09-26T13:32:55.343000
+CVE-2024-43201,0,1,7e96b5c7a529af9864170f10f2d4ed0205422d478997957170bbef8405d06316,2024-09-30T13:55:38.390000
CVE-2024-43202,0,0,9ce3457395226f6b2d3e3ae28bae28adde4e9867d0df01a0022666c3aba587f5,2024-08-20T15:44:20.567000
CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66f6b,2024-08-19T12:59:59.177000
CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000
@@ -259235,7 +259235,7 @@ CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17a
CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000
CVE-2024-43692,0,0,d1b5697b63da654d2d13d1fcc82e59a0dedefb31c825ca2a41153e80bbedc1d3,2024-09-26T13:32:02.803000
CVE-2024-43693,0,0,19b4b7db75ade941f1cdaeb9b641488dc13ac3956c210b270b644d2601c579e2,2024-09-26T13:32:02.803000
-CVE-2024-43694,0,0,496852a249506b9b30012d03f0de3852265c7aabeff9a97bc92bb94ebec6a378,2024-09-26T18:15:06.960000
+CVE-2024-43694,0,1,434bc8cdaf2a6d1396d2d645518686d4cc41f3871d28bf2405799bf16cb88062,2024-09-30T12:46:20.237000
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
CVE-2024-43700,0,0,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
@@ -259286,7 +259286,7 @@ CVE-2024-43809,0,0,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f4747
CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000
CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000
CVE-2024-43813,0,0,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000
-CVE-2024-43814,0,0,884ff68c844499e18350ea6c3335f9c79fad1f176e74be1c40c7efa0b079b319,2024-09-26T18:15:07.207000
+CVE-2024-43814,0,1,d383664babe5bb7ed26bba6e0409d5ed3581591dc93bdc63df28d2c824fa0dc6,2024-09-30T12:46:20.237000
CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000
CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000
CVE-2024-43817,0,0,40ac22692ed786254f5ec48928bcf93ac877c29f85c735a88d69b269b19e064f,2024-09-03T17:41:46.407000
@@ -259298,11 +259298,11 @@ CVE-2024-43821,0,0,6b0e9cb35a5b6e032d8dc153d9b81ba7d6475c202a42151c153b72b750312
CVE-2024-43822,0,0,4b30c97c59fde25edad2ddef4aadc560c3590e445036e23d418a5d9b0009bfe3,2024-09-03T17:49:33.007000
CVE-2024-43823,0,0,415804e4f8eed1337d29cbbb761efe6861f75ea20f4e23a3083e452f5f4746c1,2024-09-03T17:49:03.910000
CVE-2024-43824,0,0,96ac4b3d40968a435b003b39f652f4b72c5c89619f936eca147dfa5683737ac9,2024-09-03T17:48:39.160000
-CVE-2024-43825,0,0,630e35074c43feee4a0169705a99e32b9fd3fb276b829ad157298d50396b62bb,2024-08-19T12:59:59.177000
+CVE-2024-43825,0,1,876e3c155e7ee67745c0de3fe5e0d75b2ec271552b3e94411f036b1769978e20,2024-09-30T13:53:21.440000
CVE-2024-43826,0,0,19b9e65dcef3547ac09f1e3335abc85678bc165e6f805e49f1110dd703b3f07f,2024-09-12T18:15:09.137000
-CVE-2024-43827,0,0,969ea5f54077b19be32ca6fe8ae129bbdf206d0e1dd38aeaee7713d913691f36,2024-08-19T12:59:59.177000
+CVE-2024-43827,0,1,6f187b4a628a9c1092a0e456264cf6891a8b3e41538d8f695edc3aa2a42d452f,2024-09-30T12:51:34.970000
CVE-2024-43828,0,0,34d93531989f41b09094ffb798c3bd14e32cc02dc3ecd2194ff28e1c3f3ed704,2024-08-22T15:41:50.870000
-CVE-2024-43829,0,0,a63b2922cf902c2ca576dcfd3377747b7e362f85a99f5a658cd9af4917e83a9b,2024-08-19T12:59:59.177000
+CVE-2024-43829,0,1,168b7cb494ff072c316f52d1496a53f0d680b97b14acc01cf2dd68c5302cda1a,2024-09-30T12:51:56.770000
CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000
CVE-2024-43830,0,0,0c202a646bcfaaaa39d2cb27400c7552b5186a7ed520c033e84fbd5365796f5a,2024-08-19T12:59:59.177000
CVE-2024-43831,0,0,d2d2b5793f8c890b4b992408f65959bbc46269161bd855b4336fdc8262090039,2024-08-19T12:59:59.177000
@@ -259317,7 +259317,7 @@ CVE-2024-43839,0,0,8837353b52a881be05b25b7fd8ffdec6b5f99540c518bf74d996a0bee6721
CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000
CVE-2024-43840,0,0,23c960f08c72e92672042c1b393c21288af5920aee8a16c3fbfc5fa814adb315,2024-08-19T12:59:59.177000
CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd3eb,2024-08-19T12:59:59.177000
-CVE-2024-43842,0,0,33623f67e6087852ab47ab4eb71895740028c2b87e54eeedc99a19887c3f5e77,2024-08-19T12:59:59.177000
+CVE-2024-43842,0,1,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000
CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000
CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000
CVE-2024-43845,0,0,975e9883b95b773086eb2dd70b312cb34500f721b9f0912731724d7ad97a858e,2024-08-29T17:15:08.397000
@@ -259326,7 +259326,7 @@ CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075
CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000
CVE-2024-43849,0,0,4e7441e23902fce37752729b14d7b654ff080b4dff9f1f8570b222a7a4400bc3,2024-08-19T12:59:59.177000
CVE-2024-4385,0,0,77dea89143b3a0633a6b8d90c0521dc82338402099ab7a378f8d43e8fe04ecd2,2024-05-16T13:03:05.353000
-CVE-2024-43850,0,0,a256223538db4b1ea083b10c0ae76737556091791686980a6f200e7fc1d13511,2024-08-19T12:59:59.177000
+CVE-2024-43850,0,1,7e6dd9c8f88731d422517e091653519aa83f51a04dd873998a3ab4d290941bf3,2024-09-30T13:57:33.400000
CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000
CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000
CVE-2024-43853,0,0,3a6c96c14ae012eaed5b1ef682d62a9cbd9b79ece1f1039255ad0f2a7b3d5c29,2024-09-04T12:15:04.827000
@@ -259734,7 +259734,7 @@ CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e74
CVE-2024-44851,0,0,b06ae94265ebaf06a2cbe7f2decfe95140f8875bcd4429129ed5fbd14698dada,2024-09-13T16:34:45.413000
CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000
CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000
-CVE-2024-44860,0,0,8eb6fe76005f4162a0e7ffc2c965686ded6cfb07dadb6ba1659a2473ab277ae7,2024-09-26T18:35:09.097000
+CVE-2024-44860,0,1,41d84a1117916a50039f47bb63a227530e8f48bc84adf2948f5e378d6a1a39f8,2024-09-30T12:46:20.237000
CVE-2024-44867,0,0,cd6a6afd2f8bf5129300a4aaa71447e1cefe42047245db3824a71c8f9b607a2e,2024-09-10T15:50:57.713000
CVE-2024-4487,0,0,4ec04e3a5fad37f02884076b1172c7e1dd67ad4c891fc4fe04112b3c8765dc55,2024-05-14T16:11:39.510000
CVE-2024-44871,0,0,1356acf26c4ae6b59ff57670a194625c19205b79d8f3e0651dc4d2caf4793728,2024-09-13T15:28:21.260000
@@ -259745,9 +259745,9 @@ CVE-2024-44893,0,0,635f24da6eb74b01d8797a39660e22d01234cd87632ab79dff33aeb2842ca
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
CVE-2024-44902,0,0,803913154fc81eaf377836b68ca7807a5abb6fbb4b4d7ccd7271b82f1104776c,2024-09-20T14:55:38.087000
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
-CVE-2024-44910,0,0,f1f589ed97502e92f7c4f94eafa0ca86ec0ddff2d365d771307164e8c415de39,2024-09-27T15:15:14.907000
-CVE-2024-44911,0,0,9743596caf9c07be5fca95a11551930914d3a16d6100507de8f5d2846cb8be0e,2024-09-27T15:15:14.990000
-CVE-2024-44912,0,0,be45a70e189a5066adaad668a77db08b32a30a1414532025964a835bf3592938,2024-09-27T15:15:15.063000
+CVE-2024-44910,0,1,7e09a623d72179ffb357d81ad618ebc9082f7f00bb3f9178f530d3d8ff21029a,2024-09-30T12:45:57.823000
+CVE-2024-44911,0,1,562e366c63f6430f2f23c5dff1d751ff845572655d2b1425cdf56564dfe7165f,2024-09-30T12:45:57.823000
+CVE-2024-44912,0,1,25f047df5cf0569484c7050e613f71495c585bb948fd01b8e90a988f71901197,2024-09-30T12:45:57.823000
CVE-2024-44913,0,0,332529f8a2f25e9795d6a65fec291670cc1d8fe0aef2e9fae357f99f95186d81,2024-08-30T16:01:54.347000
CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d420b,2024-08-30T16:01:45.013000
CVE-2024-44915,0,0,599d20f62f376d9c9860ebd338604a632ba16d7b9219c3aadc9555ff97ab4b9e,2024-08-30T16:01:10.753000
@@ -259878,7 +259878,7 @@ CVE-2024-45039,0,0,0967c84c315cac168258b3bd286849d311dca2008818c6f6887587ae82f83
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
CVE-2024-45040,0,0,37ed54ed372ce3bdf51dabacbff5eaa56f209b445759510f5117c47e52aec1ad,2024-09-20T00:13:23.323000
CVE-2024-45041,0,0,1e2da4c1302b38fb57fb38280037032da391876c3275a0d8eb8672700cab0b97,2024-09-18T17:31:53.903000
-CVE-2024-45042,0,0,eb21440d21643e9eb1ab90993f31af56eb66294e3e97fff69b27a21e0e882efc,2024-09-26T18:15:07.463000
+CVE-2024-45042,0,1,6793be8730257e46ad88a09e98f4684cd523c8cf74bb8340929a30960f6d06de,2024-09-30T12:46:20.237000
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
CVE-2024-45044,0,0,2ed42d19dae2f6825c5977ea48282a4184680e7c5fcc5191852ec831d989e86c,2024-09-10T15:50:47.237000
CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000
@@ -259957,7 +259957,7 @@ CVE-2024-45192,0,0,7ebf90a7dd47be6e13a820a7a55bd25a33fd9e3b9dd577584cb0c6cebe711
CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96a08,2024-09-10T19:35:10.143000
CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
-CVE-2024-45200,0,0,ca075e6f113f51bdd2d083dbd16f0924124d71b9b5506f45e4190bee070cd24a,2024-09-30T08:15:03.760000
+CVE-2024-45200,0,1,341f31059becdff3ffdb369c42ede5b70f73e10280e558f08f2a1342b48e6133,2024-09-30T12:45:57.823000
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
@@ -260000,7 +260000,7 @@ CVE-2024-45294,0,0,571ccadaa63af3685b6ee82cf020ce004878004e5a04088787ea6924189ff
CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000
CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000
CVE-2024-45298,0,0,3855d0d2f5eeba6af655c62306c41db8dfb0c660d64bc08f64547216bf276198,2024-09-20T12:30:17.483000
-CVE-2024-45299,0,0,25a73913f7ab6d65c34ae4be0e0d9ed22a4816663678f10de7d875ee5d34b515,2024-09-06T16:46:26.830000
+CVE-2024-45299,0,1,9c3c8396841ffa0041cd432be8da2038212f3a02e0878e8a646a9564573126e8,2024-09-30T12:48:22.930000
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
CVE-2024-45300,0,0,27fd775164e57067a38ceabd2aa31d5b4a7f60dbeadc170d1b287ab3c44d3eb5,2024-09-29T00:08:14.363000
CVE-2024-45302,0,0,2643a37ef19c9772537ce62d37ff849e3e9fbe197380391a278662073d8a215f,2024-08-30T13:00:05.390000
@@ -260031,7 +260031,7 @@ CVE-2024-45368,0,0,563bfc1ed8b31a23579e2f54c884aca7d778495c2d744e0c86e6262fb50de
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
CVE-2024-45372,0,0,ed980d92931893d9eec78d3783ee6eee46758477e6e3155c959d481ad52ab077,2024-09-26T13:32:02.803000
CVE-2024-45373,0,0,5056ad24b7f0c08109af18e31c67cc6492a0071e1c33f675a5518cfe8e99ed44,2024-09-26T13:32:02.803000
-CVE-2024-45374,0,0,aebae42ad4312ffb80c614342596b18c7053fa2bbc5c220fa5163855d573c3d9,2024-09-26T18:15:07.687000
+CVE-2024-45374,0,1,4772ced234a2d503bc98f499430415f71ce86653942a78c695286d994a51f79c,2024-09-30T12:46:20.237000
CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000
CVE-2024-45383,0,0,235a14ef262025a5c45e6e746df2b6dcf33186b99aef4d19b36fdcfc9676da5c,2024-09-18T20:24:29.247000
CVE-2024-45384,0,0,583f6b0150a5c6e4d0e90be5e6cc15f9937a4f3e905df3e759e07d110131191d,2024-09-20T12:30:51.220000
@@ -260172,10 +260172,10 @@ CVE-2024-45698,0,0,ae3e99b30522a0cc22ac110f0e079a19451e6ffc669d2c6984799a2bd6bce
CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
-CVE-2024-45723,0,0,430d19c6d20cc3fa27977641a485d1cb611429e5af94903d5c0f824233aa5175,2024-09-26T18:15:07.927000
+CVE-2024-45723,0,1,40985dfb19c85dffe04dd201a1084d51c2c103b608851077c7532c013bd4081c,2024-09-30T12:46:20.237000
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
-CVE-2024-45744,0,0,12cdd282bbeb6dcaae97e5625f3c388f0a743cf0d2b647f5666841d51cb6d2e6,2024-09-27T17:15:12.993000
-CVE-2024-45745,0,0,228ac34cebbbf1dbb6f2db7f96e496ca39885acc6830fe3dadc9b25f7c8420ef,2024-09-27T17:15:13.167000
+CVE-2024-45744,0,1,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
+CVE-2024-45745,0,1,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
@@ -260186,8 +260186,8 @@ CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
CVE-2024-45770,0,0,e98fab17d907c24beb2a28773665764214c6145643120e7f9304697540dec889,2024-09-20T12:30:17.483000
CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000
-CVE-2024-45772,0,0,3d01ac1b4c9062c73d29933d692a7356dc1665ebaa1ad030187ea10f08efe9e2,2024-09-30T09:15:02.670000
-CVE-2024-45773,0,0,e9cdc5014d806c3c3d60272185c9e7326070306ad511fa12380b521b6efff99f,2024-09-27T15:35:02.620000
+CVE-2024-45772,0,1,6555d43da9bfa4c08a055fabdfb02970bdf58ae6833a8d9c15b564b7914c2669,2024-09-30T12:45:57.823000
+CVE-2024-45773,0,1,fa80a32ca25578799d772108a6e7f2b87164fbdfd3820c41dab7e96e6c83084e,2024-09-30T12:45:57.823000
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
CVE-2024-45786,0,0,1027a4a71b54e4ed926e7c4d82608ed7bf7290e7e8486a1ac94d8f7e4edfad02,2024-09-18T20:12:47.337000
CVE-2024-45787,0,0,46f8564066b3f70e712610c0aca9059d9bda6862d53c941af56b2ef72737a51d,2024-09-18T18:15:07.650000
@@ -260224,7 +260224,7 @@ CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c67
CVE-2024-45833,0,0,d66bcdb35ef05ab6c240a22f01c308be4dcef309fd562be6507d54a47e85401a,2024-09-23T13:43:42.073000
CVE-2024-45835,0,0,2bbb89ffd28b8dc1adee7dde89d168866e6c50e525c50f0b4fc33c67b9ff7524,2024-09-17T12:11:48.833000
CVE-2024-45836,0,0,cbff046fd2ba2d8b660c4c08f598ee5586a8344514f02f65136577d6391cc3fa,2024-09-26T13:32:02.803000
-CVE-2024-45838,0,0,3deb0cb3b16c38538b00d8547397ba2a428f66ac16a27fa4491ffae3ed0af8be,2024-09-26T18:15:08.170000
+CVE-2024-45838,0,1,dacaa129c1769017c4959972a826e50da7a7c2cf7383060c4356b48584434244,2024-09-30T12:46:20.237000
CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000
CVE-2024-45843,0,0,d277f4e7f1b7f77ab48f44241b10d59e0715a005bfff8db99caa28f9596ebe66,2024-09-26T18:42:26.697000
CVE-2024-45845,0,0,b549a9e321160df47bcb67d5d4737d4567fe304513c57d25b052b060dcd0ae25,2024-09-12T20:15:05.273000
@@ -260245,28 +260245,29 @@ CVE-2024-45858,0,0,b5441be916d9d638a5a087843bce9f2981a17328a32cafaa10622a0d2ef26
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
CVE-2024-45861,0,0,06da4e301ea3f4e44ad40215bb90dc27994813b6ecf99be9d6a5f2f497d7d785,2024-09-20T12:30:17.483000
CVE-2024-45862,0,0,4e9b066250722e9cd280f4a8d9e78c648ab8f1036530303a9a0926348d90730f,2024-09-20T12:30:17.483000
-CVE-2024-45863,0,0,fd048866aa707237f5e54143a9d87b2c08dcd9e461d7c79379b8ee0322294442,2024-09-27T15:35:02.800000
+CVE-2024-45863,0,1,fa53199e81e1f2d3cad3f37b555d35fb431e4ff73450f766bc0b9224d0bde527,2024-09-30T12:45:57.823000
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000
CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000
CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000
CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000
+CVE-2024-45920,1,1,aecffc21707d23a7569a67e5884c316b7c27e8b8c18def266a5e39e0b431918c,2024-09-30T13:15:02.450000
CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000
CVE-2024-4594,0,0,6353480e983dfe68c6b174c583e75b67b6ebde5befefc4e80bf75a35aedb2302,2024-06-04T19:20:43.657000
CVE-2024-4595,0,0,a34d956039b7343ba69c0066573aab0165928a92f89b42d7c5d672a51296492e,2024-06-17T19:15:59.063000
CVE-2024-4596,0,0,dbe0fd0eb8770735bec19f4c23a1e0e23418b2478aa147d47acbafa8a1854f1c,2024-06-04T19:20:43.750000
CVE-2024-4597,0,0,098adbd2826136caa11e67cd45a2f45f6208425bc1c84711667f353f70d7a203,2024-05-14T16:11:39.510000
-CVE-2024-45979,0,0,20900760776888720bc452f948a22393f2454a614fa8aa7fbac42514a7060eb2,2024-09-26T19:35:18.603000
-CVE-2024-45980,0,0,ffaf4fca3fa64b261a72e8089eec57c304182191befa533f835558e642471c45,2024-09-26T19:35:19.337000
-CVE-2024-45981,0,0,55493d23e37aba5a13e63ff62e6893e63571ae517e3126a692b53ee3c7a37e80,2024-09-26T19:35:20.077000
-CVE-2024-45982,0,0,9827426dd688694de22af563154a60b20bc7cbeaf43718eafc880ff62f6d08cc,2024-09-26T21:35:21.020000
-CVE-2024-45983,0,0,e89b9d4b14ec1f1422528c39849cbf428bab3483b79187c5a60f900783b9935c,2024-09-26T19:35:20.827000
-CVE-2024-45984,0,0,078c8933034572f782fb2476803297f39dd2d9fe34829528787233d8040a4bf1,2024-09-26T19:35:21.550000
-CVE-2024-45985,0,0,04a7e20fcfe8eda08bfd4033a96db01f2d42bf196c98b75de28fa4696134823b,2024-09-26T18:35:10.080000
-CVE-2024-45986,0,0,33cf79b8162b128f06c2389ba5a8930d2d312e7cd0044c59851c2ed8856240d2,2024-09-26T21:35:21.760000
-CVE-2024-45987,0,0,313eae185e734966d596e1f8f46a2e23a8d75ab06d253b00492d98a798714e18,2024-09-26T18:15:08.583000
-CVE-2024-45989,0,0,af7080c89647f989ac2ca7d839fcda290a1db2a2584e5ec2b33ecc9edab6b0e0,2024-09-27T15:35:02.983000
+CVE-2024-45979,0,1,0482757b935fe16e8666637b8de38f7a7ad511da9e453512eb3d62b894d1236e,2024-09-30T12:46:20.237000
+CVE-2024-45980,0,1,ded57935070da9b29c36c9f95713cf4ac252f503e27a31ee2114452772d0590b,2024-09-30T12:46:20.237000
+CVE-2024-45981,0,1,ee65d3def52ce7ec5d6bf2c7e86cdebd6e620d115c275dfbcce303dfb9c98da4,2024-09-30T12:46:20.237000
+CVE-2024-45982,0,1,3ab97acaeffec13ebe083f682659ce210fb2510a51c31864acf74045ae8a1e8c,2024-09-30T12:46:20.237000
+CVE-2024-45983,0,1,47a651db6002a6bfd3e82bafffaac1886e81f4692dc67d6e4d2483e3dc577bed,2024-09-30T12:46:20.237000
+CVE-2024-45984,0,1,829531605b75a351fb56301753b24a33b57031b7baaa6c10937b46d15b07e739,2024-09-30T12:46:20.237000
+CVE-2024-45985,0,1,91f6b11d4a0e69e50043609710335a2e6ecb9c0b2023813e0b5e8a7a41eb0525,2024-09-30T12:46:20.237000
+CVE-2024-45986,0,1,a85d3ec3755f724362fff27a6a522f83d6b30d560b1ead4324df3dd3027d06bf,2024-09-30T12:46:20.237000
+CVE-2024-45987,0,1,78f20ed33f2f525a22db6a5cf4bd6c14205c0abb553bb982099aff60afe849a3,2024-09-30T12:46:20.237000
+CVE-2024-45989,0,1,ab3f6bd3392b087dcb35df06d536b3edd1a33ced94d9672493bfe0cf20988e7e,2024-09-30T12:46:20.237000
CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
@@ -260286,7 +260287,7 @@ CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca963
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
-CVE-2024-46097,0,0,627e0402b1b50ebb8f11b3a815189def5c5f266d46c51926b2c740ac6fe4e699,2024-09-27T20:35:12.027000
+CVE-2024-46097,0,1,512a1e36bd43b76dc23993f25084db214121a78b92f1064375f403c11dada0c4,2024-09-30T12:45:57.823000
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
CVE-2024-46101,0,0,a18b9da5d1e727101239ea9a87c2c4486b3562ecdcf33f11510119792a28bbeb,2024-09-26T13:32:55.343000
CVE-2024-46103,0,0,b2f06763cf5ad1bb9c9824f579431b62a9daa95bd664b0f57e87a402f9838181,2024-09-26T13:32:55.343000
@@ -260304,26 +260305,26 @@ CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d
CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
-CVE-2024-46256,0,0,dba316197e905e3b34748116deb503c053e35ccafe66da2ac53cf681697b8db5,2024-09-27T18:15:05.787000
-CVE-2024-46257,0,0,d2db966c8ceff75ace32702d7ee24ee8dfca463e199814f65b0905374cef38a2,2024-09-27T18:15:05.870000
+CVE-2024-46256,0,1,3b1fbc605e16114ce563e72036bda20657faf5824bcb546aa9068019df133a1a,2024-09-30T12:45:57.823000
+CVE-2024-46257,0,1,97c0bb598edca401298a2c44e1e55f9c450b6967f78a45d9cce1b7ff0feafc66,2024-09-30T12:45:57.823000
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000
-CVE-2024-46327,0,0,d6172f02cd57f92bcb2dc3b72e7511432679981e69d942e65c0a83dbb0797c69,2024-09-26T15:35:24.607000
-CVE-2024-46328,0,0,d3f937aaae9e9bcb0a1efdd2fbc630a7cc602ed3ecc4d7ad11b685e169712060,2024-09-26T15:35:25.783000
-CVE-2024-46329,0,0,8c553e98ee568f1064be541dd05386f283d7f017d99dcf74d27780eb8dc41327,2024-09-26T15:35:27.397000
-CVE-2024-46330,0,0,4035a2d5ea03776bf28c54a7689cec785d84d883637680d1abcc062505d717c1,2024-09-26T15:35:28.713000
-CVE-2024-46331,0,0,22938aafdadbf7022de7390605aae86613d7f1d9bb1d3857d6ec9f21a3624baf,2024-09-27T17:35:09.747000
-CVE-2024-46333,0,0,992c78f88d887bc986be2e0a520e5ea7469626b0dc2226548b9127039487360e,2024-09-27T17:35:11.090000
+CVE-2024-46327,0,1,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000
+CVE-2024-46328,0,1,150e1d7b5fcc22f852cb919b13410447bdf1e8cb19cb878b6bbbd7be01f4269b,2024-09-30T12:46:20.237000
+CVE-2024-46329,0,1,8c93b211ce727ef89bff0e17a07fc114c301812ff446c3d9b747d9a6ed124748,2024-09-30T12:46:20.237000
+CVE-2024-46330,0,1,694a83d49b52528846704b8ab10d96522c40f75c60f0196ff365133296a0aac0,2024-09-30T12:46:20.237000
+CVE-2024-46331,0,1,bc972d3ed92383a2cca8ac982c2c605e5d48eb080cd2e18eef8c2744ad28678e,2024-09-30T12:45:57.823000
+CVE-2024-46333,0,1,353a1745548fb23b6f535da18db20a292a6e09d70b0bb02da74b22f7aa66ca4f,2024-09-30T12:45:57.823000
CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000
CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000
CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000
CVE-2024-46362,0,0,8cdb883bb64f25e58b7c696699971ee36778fa528121237250c7da4497ad58d6,2024-09-20T12:30:51.220000
-CVE-2024-46366,0,0,a15ad5c8e03195f0c0817bbf460e8b8c3bdb9facd8ec23d661b448c5e6e4edd8,2024-09-27T20:35:12.770000
-CVE-2024-46367,0,0,c21f1fb2d7acf1b4c5929a647f7c8baa785c92c3b650529e7205a0d9e25436de,2024-09-27T20:35:13.517000
+CVE-2024-46366,0,1,9c4e72ca3b8720f0b622f88753a363ffad436d80b8652149c9eddfd50537b900,2024-09-30T12:45:57.823000
+CVE-2024-46367,0,1,dedabfa86a6336a5adc9d7e818bb36ca67f2b7ba71060ff6fc576ecbbcb9e268,2024-09-30T12:45:57.823000
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
CVE-2024-46372,0,0,e3b69cc491c1ce73557c9fae2d89432e3f39b15e7ad51da831599618ee55991e,2024-09-24T15:40:12.980000
CVE-2024-46373,0,0,364353f8eed746e65cf065bb51dddf6fa9b6298b578b96d8db4d43f0b16ff53a,2024-09-20T12:30:17.483000
@@ -260342,16 +260343,16 @@ CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385
CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe250aa,2024-09-17T14:35:30.557000
CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000
CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000
-CVE-2024-46441,0,0,2418b86253ca00f9dc7f73a4a3e896b30ddde24c4b20f0f372cbb6dbc59ef2a5,2024-09-27T15:35:03.803000
+CVE-2024-46441,0,1,4b4be1d9027655599991c0b9ab932c1005548268b9b4c663bc49101f1899dc44,2024-09-30T12:45:57.823000
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000
-CVE-2024-46453,0,0,b68bb15bb440f00a38a1c5270a76c20c1ee28b0799a4573dd099acd9176b420e,2024-09-27T21:15:03.350000
+CVE-2024-46453,0,1,033c216941b91cea31c7caeadaceb41143136fb19ef1cb0af7e577c164e2a18f,2024-09-30T12:45:57.823000
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
-CVE-2024-46470,0,0,3ad4aad17d452edf94f38b5d839ce49d9b50a73f0481564a12ffe427a0924e17,2024-09-27T17:35:12.203000
-CVE-2024-46471,0,0,67ec8948185820878b939e5160fdc8fc3ee9ad846fe6cd648eb35b97ff25955a,2024-09-27T17:35:13.333000
-CVE-2024-46472,0,0,87b04d7053b57545ffb357ee31072a5c84eea10b695d4541748c5e6a56882f8a,2024-09-27T16:35:02.850000
+CVE-2024-46470,0,1,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000
+CVE-2024-46471,0,1,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000
+CVE-2024-46472,0,1,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000
CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000
@@ -260410,10 +260411,10 @@ CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf
CVE-2024-46610,0,0,6224d590ad053e155d100016a07cc2f3151c2a8745936d3316b691dc668900af,2024-09-26T13:32:02.803000
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
-CVE-2024-46627,0,0,2d97afaae826c5582be81e574e277b4f6fe41b8dad48517b39b84d283362a60b,2024-09-27T15:35:04.583000
-CVE-2024-46628,0,0,c27e816cb0ec46fa1f117835bce851202bebe4b3d8ba9e46a6dcc357c18fdf7a,2024-09-26T21:35:22.537000
+CVE-2024-46627,0,1,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000
+CVE-2024-46628,0,1,f50f1f0723583928f80e0fb1e30a1b830ba848791b571a0759dc9426674fa140,2024-09-30T12:46:20.237000
CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000
-CVE-2024-46632,0,0,a4b613b047da9ac8f459b3b9d152212eef946036bf6e18be68c7d5e20a43b558,2024-09-26T19:35:22.293000
+CVE-2024-46632,0,1,abc659def740354695cf2f3df5ac488f8137388dc197ea59e5551153368ce0a9,2024-09-30T12:46:20.237000
CVE-2024-46639,0,0,32a1c80f017ce1b9b0a593e635fc1fe3b0612fc660594feed34360cf471ca787,2024-09-26T13:32:55.343000
CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000
CVE-2024-46640,0,0,8a8901a45f157bc967024a42c670214bc1166786f3fd7086e031ee10a8d6de95,2024-09-26T13:32:55.343000
@@ -260474,7 +260475,7 @@ CVE-2024-46710,0,0,99ad059fec6100ef5344b9476dea58e8105bf6e298abfd9609e18d1b32dd8
CVE-2024-46711,0,0,91f6e71bff9276f1e56a88764fca11ade7e1d2c1501a9c829689237f0828b894,2024-09-19T13:12:30.390000
CVE-2024-46712,0,0,225e28d58d121274afe8a67bb7e9b2a631f03521abd17c753d0a27bb12faae1a,2024-09-19T13:09:22.957000
CVE-2024-46713,0,0,a6f4ee9871c0b122806551f92aee6c4bb9f19a62163eec4e9b4f68119693903f,2024-09-13T16:37:22.997000
-CVE-2024-46714,0,0,408a614120ceb60cd5122f1f7c5b0afdcc13dfc83ded664d6de66c1ff210903c,2024-09-20T12:30:51.220000
+CVE-2024-46714,0,1,6dd453713f22355d2e4d2a4ee22ea277622b46b6dc272f8c0b98970706a0a485,2024-09-30T12:50:27.723000
CVE-2024-46715,0,0,f6acc12b1eecea12bf9d6f195b39a00b75ddb201277b4ad1fc8ac95e25d25405,2024-09-20T12:30:51.220000
CVE-2024-46716,0,0,285e828ee8aa50fa4c3aa4bd8a3abe4a01c20af8ed00007aa5c1fe4778857afd,2024-09-20T12:30:51.220000
CVE-2024-46717,0,0,cd61e7eb874e3f98372d85a33e9e40d7e36ee1787456cd2287e7b17844f088a5,2024-09-20T12:30:51.220000
@@ -260488,11 +260489,11 @@ CVE-2024-46723,0,0,b2624b2a21160a8d4a59b7fec6cc7978e601b3e3a7818f220883cbdff8b32
CVE-2024-46724,0,0,6c553f378b7cb7dd68150fea097a0f4d041e50f4ab427769b0d527656c79da2a,2024-09-20T18:30:58.980000
CVE-2024-46725,0,0,509dc11dae441e04b0c8fea7acf1636c9004b5d1cec287f96ad48f7578f554c6,2024-09-20T18:40:42.753000
CVE-2024-46726,0,0,6f5f3ef17f2e9948e78b6f7e567b0bc7ef81f62ef77f0f62b43f6510fb120a9f,2024-09-20T18:36:27.070000
-CVE-2024-46727,0,0,c432d5f3aa89ca129651c4ee5afd1195b4a525955783ebd17efaeffa66bcfd4e,2024-09-20T12:30:51.220000
+CVE-2024-46727,0,1,6cb6806829841ab9a4ed55adc115c1f86d2ca14ed6d79053ffe1784df4b7a39f,2024-09-30T12:49:43.097000
CVE-2024-46728,0,0,b41c3dc555ca9fe309841348a5a63c5246a0e7a294011225be7b3eea5aabda83,2024-09-26T13:31:34.347000
CVE-2024-46729,0,0,7b3dc0c090bb6cc0b1332923d5e2f0f6592c4f5e0390aac8790a4bd11f0fc162,2024-09-20T12:30:51.220000
CVE-2024-4673,0,0,534fe3baa36c9b2de1fe1f9372b44f4a695e5779fe305c090e0c97233d7085b1,2024-06-04T19:20:45.437000
-CVE-2024-46730,0,0,0ed0580d09d08563481351041189dcb8bb2fd6b6af0aab2b8356e901dfe76a91,2024-09-20T12:30:51.220000
+CVE-2024-46730,0,1,656cbb6e436fdfc2738dbb10cc3f1dd4875b9e7405783e752daaeddca561fb36,2024-09-30T12:49:00.333000
CVE-2024-46731,0,0,819cced81520d9f96f9b886212fc7b127f26019bfc7a6b4e191e1cee82bf615d,2024-09-26T13:29:19.877000
CVE-2024-46732,0,0,d75dfdfc158d4c29a001d6993f043ff82e1ab649a4d9a9b9cf4e720caab3cd0e,2024-09-26T13:28:07.157000
CVE-2024-46733,0,0,79186a2b7b8560d75a3f382848c11d76972e45dfdd742ee0a98c810d97481fb5,2024-09-20T12:30:51.220000
@@ -260507,15 +260508,15 @@ CVE-2024-46740,0,0,d4717fc628887090b7eb7198113033485898a54dca129d114c0f2b9979d86
CVE-2024-46741,0,0,57723406524ab51c560f304ba8e714435f3fd19a56628487c9d048fc115bb129,2024-09-20T18:33:27.960000
CVE-2024-46742,0,0,7652f750a872ccfc513a3dc4349e7ac393b527211852a63dedceed1ca4a6947f,2024-09-20T18:32:34.303000
CVE-2024-46743,0,0,df0d7d2eb3182449b16b6affacc8470eebcbcc10a1de999cd67e31652253986f,2024-09-20T18:32:11.827000
-CVE-2024-46744,0,0,f35d015e0fb536ab62263808397a9a9c5681dbb98905649b81f66dfc59b45e8b,2024-09-20T12:30:51.220000
+CVE-2024-46744,0,1,001ad6157ba3e894a0bf6639341ebac27f12a74b3c1a9e9fc3008c6d5e526e13,2024-09-30T13:36:19.557000
CVE-2024-46745,0,0,1810fdd8cfd3dd07004fc4f09934af972754cc295d1890751708649bd77ab182,2024-09-20T12:30:51.220000
CVE-2024-46746,0,0,7880eb752c4578e177f1e05923fbb260f9ebedc769ed15c86919f8afb6ffea22,2024-09-26T12:47:53.267000
CVE-2024-46747,0,0,1948e1f9201fe25611a5c77cbc29febebe96132e9112ffb9f995f2387902f930,2024-09-20T18:31:19.190000
CVE-2024-46748,0,0,1f58ab5daa8fdc3cf242c066f17a57853dc64a33693f07928a094111674fe835,2024-09-20T12:30:51.220000
CVE-2024-46749,0,0,d08c889b54155801d0848154d2e5a797f952a6f23df8a481d6edd8b60c2beb27,2024-09-20T18:45:43.483000
CVE-2024-4675,0,0,897bf9bfba1675ab43c3b9cceb7b3ad24a12ab65256b892b47361d9f07ed1f4e,2024-06-04T19:20:45.627000
-CVE-2024-46750,0,0,94d0b2c6525c5236b580346029666bab576a5a0ad66ee70cd0edd0e2a69fe9b3,2024-09-20T12:30:51.220000
-CVE-2024-46751,0,0,692b8f2562e977a4f52a43b019c5df009b1a6beff9a1fbd4d578ab574d0abbfc,2024-09-20T12:30:51.220000
+CVE-2024-46750,0,1,22cfa8358c96bcb83c85084d88d9a005669fc9c87baa0b753617e9078377e6d1,2024-09-30T13:27:45.787000
+CVE-2024-46751,0,1,208f13994fe5e65a4068b1b9018b8eb7e74b537fdf5de13d08a1d60cf7590bfb,2024-09-30T12:45:56.957000
CVE-2024-46752,0,0,a6e483848fd846991fe052cf397d8e3748be44625f58093adb7b1755e086fa32,2024-09-20T12:30:51.220000
CVE-2024-46753,0,0,3d7493508cc733effcafdd7d2b06bc7d70b1185c0794738e42492fc29ea4f135,2024-09-20T12:30:51.220000
CVE-2024-46754,0,0,d335bc48b5fc1eebe1a7eef0e7eae5f8d2c1b537f7a261d71a0e5ceb10c05e28,2024-09-20T12:30:51.220000
@@ -260534,7 +260535,7 @@ CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2
CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000
CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000
CVE-2024-46768,0,0,404d33c105e2f2e7a4f6108144330470208ba943ab19e3a7f2654703cb3bf44e,2024-09-20T12:30:51.220000
-CVE-2024-46769,0,0,59e9fd73ed5771a3f0357badc95770f27642db2c24338119ac66ce339c7a8d75,2024-09-20T12:30:51.220000
+CVE-2024-46769,0,1,c9bbe9575cc2848fce277d2f64a3b4e07e53acfd7fdf23d95dd87f904a651799,2024-09-30T12:44:27.907000
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000
CVE-2024-46771,0,0,d3e25589d0aa5cc76f678addd8f11cf59207b44575da23e672799ad7db6233bc,2024-09-20T12:30:51.220000
@@ -260571,79 +260572,79 @@ CVE-2024-46799,0,0,9272007b77b1874a111bd3818178b47066e5b2d005f81deac8b6b5c2b5db8
CVE-2024-4680,0,0,0c8976c1b63cea89edb43ad9d9b81fc90d65237e24435549d62994fa7d6af35d,2024-07-19T18:51:53.003000
CVE-2024-46800,0,0,87d1b49029d5e1e7de4c32d994818d53e59bb26db74de770ef90f55c819e5407,2024-09-20T17:18:55.260000
CVE-2024-46801,0,0,239d949d680f6da2e86f32ffc06e9b107781e443c485e3945602ddf3b4e94f6c,2024-09-20T17:18:17.810000
-CVE-2024-46802,0,0,e9f139917d1f7ff6bc7947e33e1bbf87c15a20c520c2d26c4d874ead7ccbfa78,2024-09-27T13:15:13.483000
-CVE-2024-46803,0,0,b3fcfb3d231601be8c65634e6f78b288f39fa649eb74dfcb459160f458c615dd,2024-09-27T13:15:13.570000
-CVE-2024-46804,0,0,334690fb38ed7bfd5a78f53f0a3b1ba033c8865cf2d15422a75c925c8f677cdd,2024-09-27T13:15:13.637000
-CVE-2024-46805,0,0,bec2b82aa25f22a5735a97792596f23efc4ed675414c01d6771246c835479c92,2024-09-27T13:15:13.707000
-CVE-2024-46806,0,0,5560b74f3e5070b55a9f244d2f06275af64aa76d7a93d6b943a47162abffb710,2024-09-27T13:15:13.773000
-CVE-2024-46807,0,0,70894da795b0bc31a39b431d1af62b819a9b8fa3cb03591a8fd0ae7d5e59c80b,2024-09-27T13:15:13.840000
-CVE-2024-46808,0,0,d6a2e7bf81073bb0bedd4129bd3a93e6a707e93048454aa00c3bf5c905b11311,2024-09-27T13:15:13.907000
-CVE-2024-46809,0,0,e6c1916b524d146a7c6e6f4b333f0bdd09785c3cdad8a05b4f1cdf2a858b26fc,2024-09-27T13:15:13.973000
+CVE-2024-46802,0,1,b40cd914285cdefcd5e4dfe2042b8118c515297d02218391168e1658f152bdc2,2024-09-30T12:45:57.823000
+CVE-2024-46803,0,1,2e09b859425719e963f765ba90f27c8f58ab7ac1e8b05d3a66af8d6bb4800e2a,2024-09-30T12:45:57.823000
+CVE-2024-46804,0,1,2fde954d7701fe2244ffccb1e1435e60de864c686b315e9228ec7893126c8498,2024-09-30T12:45:57.823000
+CVE-2024-46805,0,1,0fc5e73bf541084c92d501533c0877f3abf3b9f2ee69353f8dc61318ee2b5035,2024-09-30T12:45:57.823000
+CVE-2024-46806,0,1,6582f79f40103e18fb0bc87c6feac7d3bac4310e683063c9dbe929a8065dcab2,2024-09-30T12:45:57.823000
+CVE-2024-46807,0,1,b76c0c8bfa99626db7385b1837463a89a2e9018b1d828861a724cca1379fa995,2024-09-30T12:45:57.823000
+CVE-2024-46808,0,1,0e595e769def5afc290f6d875d68aefbfd56e01db58514615beebbf4da8fde20,2024-09-30T12:45:57.823000
+CVE-2024-46809,0,1,76e7d93e2fcac77b727fe55d77bd4ffccf126388001c0509474bbeb489abf906,2024-09-30T12:45:57.823000
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
-CVE-2024-46810,0,0,f06b5ed6e4e57d9440cd1356035324bf3168516128d45f5ed833162a15e26f61,2024-09-27T13:15:14.037000
-CVE-2024-46811,0,0,9c06cbe983cf0281e42eba97849b4611a6c0b2d318efacae009163eba509674c,2024-09-27T13:15:14.107000
-CVE-2024-46812,0,0,ca538231b55475d7517cdaeacca9edd93858da44dbc948175f5cd1b98a5d49f1,2024-09-27T13:15:14.163000
-CVE-2024-46813,0,0,3dc255f99046ece5258ed3bcf8b01348f3f55504bb6e19b6345060f5ecf2fc70,2024-09-27T13:15:14.230000
-CVE-2024-46814,0,0,f28000dab7af4247743c13ee681bcb793731a3eb937baf961910ddf725759f73,2024-09-27T13:15:14.297000
-CVE-2024-46815,0,0,b1beb3dbae3607898e3f5adb0992665712715079c3a99aab4feefb9c28cac7fa,2024-09-27T13:15:14.370000
-CVE-2024-46816,0,0,d1006d0a997be568c964833163a5bfecf77f8efff19a50a5acb948bb349d9443,2024-09-27T13:15:14.433000
-CVE-2024-46817,0,0,5cc4604d98bfc67e8ebbd371a5ce325e16351c3c8d9a44dcb107a5d4d900539e,2024-09-27T13:15:14.493000
-CVE-2024-46818,0,0,1702b1609a0fc23fd13330b17748f4ff44ba31d80af3898c888487d1b291f1c4,2024-09-27T13:15:14.563000
-CVE-2024-46819,0,0,cdc2c2b19527c84de8f6216d9a7222b8d3add79380829866240a5d28d9b0b569,2024-09-27T13:15:14.640000
+CVE-2024-46810,0,1,a004c05f40757352e590e4add8906fd2708235fe021561ff9969f78d0a01b392,2024-09-30T12:45:57.823000
+CVE-2024-46811,0,1,dd40eb9e1bbb069f67774be0b419ff6c5ccaf3106f399f589385d01ab8fe713b,2024-09-30T12:45:57.823000
+CVE-2024-46812,0,1,134272cc7effe83799d5018c6b8c85291ae3808b9eeebc0177d5fdded748636a,2024-09-30T12:45:57.823000
+CVE-2024-46813,0,1,0507ac6bd5121c75cb70bd0583657487480aa556e007ea357bd10b722630fcf4,2024-09-30T12:45:57.823000
+CVE-2024-46814,0,1,c3b356da3199588bd13c3026cf8d24650602d16ed285dfd89ce84f4d69ecc771,2024-09-30T12:45:57.823000
+CVE-2024-46815,0,1,8e2c427d67a958bd4334f2e61500d197e9f6057cf203fc26da513bf775828fa9,2024-09-30T12:45:57.823000
+CVE-2024-46816,0,1,6e1ee4b9a0fc40aba55bc57257790b6850327e05245dce2bb930d1d6b61ecbc7,2024-09-30T12:45:57.823000
+CVE-2024-46817,0,1,dc8f68844dd932520dad6317afc3216af6f89b4cba7b42867a432814b5f55ca7,2024-09-30T12:45:57.823000
+CVE-2024-46818,0,1,2d15bae17ea9a3ff380f085de402d81319fc73cba47219e129d3d4d5a69a5e60,2024-09-30T12:45:57.823000
+CVE-2024-46819,0,1,a7df575d1b5203b7d18b4381810a990ecbae0552b68c1b660793d4465a3dd4d2,2024-09-30T12:45:57.823000
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
-CVE-2024-46820,0,0,3ef433eca50b8bd880575b57a9b58c18ffddc5a5a29a46e58c7877eb973fc74c,2024-09-27T13:15:14.707000
-CVE-2024-46821,0,0,32fb2951ec83a47620f623c9885f71efdb8d75e12224b1ad77812cb21a28fb72,2024-09-27T13:15:14.767000
-CVE-2024-46822,0,0,f1263b53fab54e020783396758327e9d0e6c9b7c3cf62a5eb0c23b97f90ffe7c,2024-09-27T13:15:14.830000
-CVE-2024-46823,0,0,ad968e6be2162e32fa37f28af2db1dedd823e343548f0a908d2b6aeb802b54fc,2024-09-27T13:15:14.897000
-CVE-2024-46824,0,0,8e11bc388ee51b12d3aba87ff77058a91456bfc97cf3ed3834b5741b51cb1a4b,2024-09-27T13:15:14.960000
-CVE-2024-46825,0,0,dc9d6285049da1f45b87678682b02617dda0c172ebdac120be2d6f420af90752,2024-09-27T13:15:15.027000
-CVE-2024-46826,0,0,a79263a9942a970ced521484b96b8e8d54879cf827f2fad9c371bf134adccd67,2024-09-27T13:15:15.087000
-CVE-2024-46827,0,0,839d4960c2a4c7aed872145df3ce93b8155bd816176ff84646919168f458121c,2024-09-27T13:15:15.153000
-CVE-2024-46828,0,0,73d4c98ad163d106929727032cc2364c3fa94ac5f6af7f2fc5ca9a38c4607c43,2024-09-27T13:15:15.220000
-CVE-2024-46829,0,0,7513df9dc08d13690238979c00ad51e66c406e53942c6057ed1d8fa9e1776ed4,2024-09-27T13:15:15.300000
+CVE-2024-46820,0,1,e02b77fbfb7c27b691f35a8ec06822e6f9168446acdd71a423d10b4bf4e98574,2024-09-30T12:45:57.823000
+CVE-2024-46821,0,1,a58e1f258f369639bd3c99b89ead13b97a56b7b3683a78b0943484df7d677421,2024-09-30T12:45:57.823000
+CVE-2024-46822,0,1,19e62f97cd95c4ebecb7cd6380a998c32d3223a946cd27e9c0206ed06024373e,2024-09-30T12:45:57.823000
+CVE-2024-46823,0,1,74e6b65053b916be51d6af5908af9de8bcd9c2ddf8063fe700f6963a1faa4849,2024-09-30T12:45:57.823000
+CVE-2024-46824,0,1,c33f01161d783d965e12027dc75f87bbd37e2fd6545509fef1820ba38acc571a,2024-09-30T12:45:57.823000
+CVE-2024-46825,0,1,aa389e364217a0b9e16c3fcf17f7f0c6382d69ded44339c5aa61a7007a867b8d,2024-09-30T12:45:57.823000
+CVE-2024-46826,0,1,be734978861d0287bcd7e4a1cb0186beed982fdcb864acc473dc75997a104c25,2024-09-30T12:45:57.823000
+CVE-2024-46827,0,1,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000
+CVE-2024-46828,0,1,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000
+CVE-2024-46829,0,1,19d64d7c072f5269d00a2ccb33995fbca00a5f6b46fafe08de6159d81d1dbfdc,2024-09-30T12:45:57.823000
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
-CVE-2024-46830,0,0,555fbd23e90e6a4d8ed9fc3e2eca36a0921cdb43ed2b42ddaef05104c9065f7d,2024-09-27T13:15:15.380000
-CVE-2024-46831,0,0,3dc39b10de7d65692acfd01caa41762cb48e875e45d7c8e01cf68c9c32e8067e,2024-09-27T13:15:15.457000
-CVE-2024-46832,0,0,8a1fb9539331fab60df65adb24a11cc6547e8c12c01455cbc70879b717832d56,2024-09-27T13:15:15.517000
-CVE-2024-46833,0,0,adb5ff85207df54032ae82679b3a2df42bc9c878ec4542ddfe015405ece402bf,2024-09-27T13:15:15.593000
-CVE-2024-46834,0,0,688c15b693b074e3e8c9eaa1aa90d0b27824550e5cda417a8a3100e5485703c6,2024-09-27T13:15:15.660000
-CVE-2024-46835,0,0,bd4756ea73ef83edea87ca48ade55fe7fd9d7c9ad2f007d94e4ac9a64fa48807,2024-09-27T13:15:15.720000
-CVE-2024-46836,0,0,d122e6c84b1df5ab0f643192a6dece9f096e3630c5b46fc1c3ecfe33f629aadd,2024-09-27T13:15:15.780000
-CVE-2024-46837,0,0,657a60314cbdeb0d214650deab977b47bcd2c3c230a9ab235b55f2a676691232,2024-09-27T13:15:15.850000
-CVE-2024-46838,0,0,714c00816c1783ceb7c4ab1ce3b3d0ed56f5411141d8872b72ac5a3e6d3aee22,2024-09-27T13:15:15.920000
-CVE-2024-46839,0,0,50455736c6dd8fe8730b4c3de68b4dae5c09fe48f915e4ea05d48dbb7fa20420,2024-09-27T13:15:15.980000
+CVE-2024-46830,0,1,5a3220ccf0c3370380e51de1b5caff7b25885a9b9d75271a4ec592a9375f4960,2024-09-30T12:45:57.823000
+CVE-2024-46831,0,1,2823a070ee1cb0b2fe5e9cc29a895201cbceb52654d06d4ff3f1b3f444b21262,2024-09-30T12:45:57.823000
+CVE-2024-46832,0,1,8056b5e14167e4606637fcebc8226e228ba73f7d145bd772a270292fde9f772f,2024-09-30T12:45:57.823000
+CVE-2024-46833,0,1,fae6ea6196846013711f1d6709341f19b674b8cfa05631975d23add168bca551,2024-09-30T12:45:57.823000
+CVE-2024-46834,0,1,dfbe2716c14d1826440661fb87f8c8d7efb813d6e40029f94868f663adf505ad,2024-09-30T12:45:57.823000
+CVE-2024-46835,0,1,c73119802cfb411b3708098065f71b210c1428bee11d85adb00f63f660376c9f,2024-09-30T12:45:57.823000
+CVE-2024-46836,0,1,b54d41ae5ec465d61622911e4de8c30a51746c8af7c3149de1568c26e0143a26,2024-09-30T12:45:57.823000
+CVE-2024-46837,0,1,973e22b93c60a220a53fc9bfa0f28bffad9d8b2bb149dda4f854bc862f5ccb09,2024-09-30T12:45:57.823000
+CVE-2024-46838,0,1,9183a6da766b06f913d1a3a8712e6c6d56d2e3592b7da6af3b2719974e1942f7,2024-09-30T12:45:57.823000
+CVE-2024-46839,0,1,150b6fef669f38671a8239eedde5852dec87bcaa422caa99b88d8c4cf1268596,2024-09-30T12:45:57.823000
CVE-2024-4684,0,0,76a2bcc81dc9a2c7f19544710090eea770016f263f5b8a63e7b8f826540bfd29,2024-06-04T19:20:46.347000
-CVE-2024-46840,0,0,6b2fa36be6044c2e6c7390f4b17867705bc01d5d9f8042ad1283c2312c824bce,2024-09-27T13:15:16.057000
-CVE-2024-46841,0,0,df19dc471a4d283b56f4fc2152cfed78bb6777693c89f01284d2ab648fec09a1,2024-09-27T13:15:16.130000
-CVE-2024-46842,0,0,7182a8bafa709a3acd8e7be1b39c8c3306260b5f6efd0bc8b8f994ce6a432517,2024-09-27T13:15:16.190000
-CVE-2024-46843,0,0,fb456a5b80db8d6621d16b8a73d382a8c2703e9783a4da9880da40e45a3acc27,2024-09-27T13:15:16.250000
-CVE-2024-46844,0,0,da93dce1dd9e9b752304fe37d74bd5feac9b871c3846b3ae9491151ddcac1089,2024-09-27T13:15:16.313000
-CVE-2024-46845,0,0,58824907706a811a1a09e91eeaf9c2af2e6d29a45cf2298723929cab62e9ca1f,2024-09-27T13:15:16.397000
-CVE-2024-46846,0,0,9b22315605a2e611e51e7817f4272aec0b9d06c1b21856864d348b2ee6060a2e,2024-09-27T13:15:16.480000
-CVE-2024-46847,0,0,f403b8e963763ce9d81a628c3e84dcad121b7022281c6fc5382ce58651628d62,2024-09-27T13:15:16.570000
-CVE-2024-46848,0,0,5d5bc0c9f7ca69b110d37e437fc2b95e88bf0d02189c3a5d3068eaa5fd021983,2024-09-27T13:15:16.657000
-CVE-2024-46849,0,0,8e00099733b45c4761a725d526666bbfa9c0a5f1159c26f360f3cf422d7dac17,2024-09-27T13:15:16.723000
+CVE-2024-46840,0,1,d8e5431b753614a53a08cede9d1dc8d8174b6d84df5473ed659ee616870598b3,2024-09-30T12:45:57.823000
+CVE-2024-46841,0,1,89d23cf5d6a67427b3a52d9320f801118193f51775c7e9f100ee3dbac22f74cd,2024-09-30T12:45:57.823000
+CVE-2024-46842,0,1,22faf02261aa59d11cf2767b0d7c9469127ac25d1afcaba10a2d060d376b0a90,2024-09-30T12:45:57.823000
+CVE-2024-46843,0,1,eb3231d989152db17c7206ea44c2fc597f70c097ca38cf8e226bf5d34b414947,2024-09-30T12:45:57.823000
+CVE-2024-46844,0,1,bbe1f9dd18f2af5983fe8f9fb4e6731bb90b60b5f60bca7f399dc042d1f3579e,2024-09-30T12:45:57.823000
+CVE-2024-46845,0,1,d2e297a5f6a048256befcd844c26b24b6f53edb5a3284e8874908dc68c1497a6,2024-09-30T12:45:57.823000
+CVE-2024-46846,0,1,90e473ff3287976c7a74ed9b83a018488b7185ddf6d520cb6c65035a8de1c7f9,2024-09-30T12:45:57.823000
+CVE-2024-46847,0,1,1e69114042530e8c198667e9f8902d0babfc7bf1c48ac2011808c7a040ba7738,2024-09-30T12:45:57.823000
+CVE-2024-46848,0,1,75be985f4c307071e6330022d7ad7e21418ad2edaa3f1ab8b4ddbeb44c053e41,2024-09-30T12:45:57.823000
+CVE-2024-46849,0,1,cc82526e821f0ff4f36a8e806bb302e7c60840cab8896adacc548ad8e9eaf759,2024-09-30T12:45:57.823000
CVE-2024-4685,0,0,38350af74ad68911fd851342727812175d5d39b6f847c1ca12945db68e23926c,2024-06-04T19:20:46.443000
-CVE-2024-46850,0,0,4f262e2458bf867873395eb1be206dc95131f0ca7899833372d25c463782fe17,2024-09-27T13:15:16.787000
-CVE-2024-46851,0,0,4ef6a63c49c19f1f0606ad6391b5b8e01536eed259c2d187dfbc5ca66e8ced6f,2024-09-27T13:15:16.850000
-CVE-2024-46852,0,0,4d57dbe85354a8265bd8961196b2eba9526edfc3a33c74c97081c3e33639523e,2024-09-27T13:15:16.917000
-CVE-2024-46853,0,0,1a561997e56ca448bc9b9306b8c8f023ce4fa58b91ef7d2bfcf08c8937ff9e94,2024-09-27T13:15:16.997000
-CVE-2024-46854,0,0,6b4b8e3a1763a75b94fee7079bffa9a836dc1962e35d0c74221e9b3490bf0200,2024-09-27T13:15:17.063000
-CVE-2024-46855,0,0,367ccc9814a06e060c65f49493361f6016bdb2e0dae7ef3551e1deba3573154c,2024-09-27T13:15:17.133000
-CVE-2024-46856,0,0,c6de094553adece9d8b4314b32053a86ff4989311778f6efbe882e7b6c6f1151,2024-09-27T13:15:17.210000
-CVE-2024-46857,0,0,10433c2ba74e2dcaee28f156ebcf8e72dadd20f6f216fb23bd30b126205c3166,2024-09-27T13:15:17.277000
-CVE-2024-46858,0,0,a2960ce21730d5c76dc962c9159bb0b3a9ba6b7e28e33460f91a80a497a0e168,2024-09-27T13:15:17.353000
-CVE-2024-46859,0,0,19794ab467d8d430f5ff0af3ddf03ebebbf21aa4cacfd9477037687bfef359d7,2024-09-27T13:15:17.430000
+CVE-2024-46850,0,1,df0fab5aa79c4224bbd3a172b9a628fd1454850eccb1477435ff857cf9584215,2024-09-30T12:45:57.823000
+CVE-2024-46851,0,1,f3ed0fe4ee19ec15f4bb442357f21e0223d20c2421d00dab280963b1e02330f3,2024-09-30T12:45:57.823000
+CVE-2024-46852,0,1,f6c3cf367f5bab4a41cfddd0fb266cbdb42b9d28fc2536f259ad23f4065a578c,2024-09-30T12:45:57.823000
+CVE-2024-46853,0,1,4868439611c1a951c75fb49a337863b87e0042c9653d37b9045f4d3c24af69c2,2024-09-30T12:45:57.823000
+CVE-2024-46854,0,1,7d44de6eb6b12e1a80438c0a536ce999b328137a59e14f0a793bb51497f4e44f,2024-09-30T12:45:57.823000
+CVE-2024-46855,0,1,c2852f5a4b4af97dbb65bb99333a9c26e262e2e400498608798f5dcd0f8960bf,2024-09-30T12:45:57.823000
+CVE-2024-46856,0,1,4845335674e59b93b1694f04fafbf7f16e8a83921d3a3fab54f0bd298c014d32,2024-09-30T12:45:57.823000
+CVE-2024-46857,0,1,0fdd1fce39d86223651760570dff5d32c7ccd91cb1ca53839a7b5df6c8989bb3,2024-09-30T12:45:57.823000
+CVE-2024-46858,0,1,085bb86860233a0d4bfa05da0fe4ddb45f39141b5e97b146b0a5ca1cc566ec3c,2024-09-30T12:45:57.823000
+CVE-2024-46859,0,1,219881cf57e0abd9fdd1246bb95fa67acffa1997ce6f943edb640b7145167614,2024-09-30T12:45:57.823000
CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c891096,2024-06-20T20:15:19.483000
-CVE-2024-46860,0,0,0df983f2eb92cc3b84570b02adb6b4b777d10dcb2dc7082af2b6a5233c6d5e74,2024-09-27T13:15:17.493000
-CVE-2024-46861,0,0,ff4ce1e67ee5c0143292d9664a0e40d0d03af20384cb8616942a881722ad45d9,2024-09-27T13:15:17.563000
-CVE-2024-46862,0,0,a37124b1a78b42c293cc5e8694627936a5f2b47374a8359618860d7e55a17b34,2024-09-27T13:15:17.627000
-CVE-2024-46863,0,0,049de94b0edf7a6cb3a13d19398d8d6c073734c335bcb7575ee8e38866e801dd,2024-09-27T13:15:17.690000
-CVE-2024-46864,0,0,4c906437925acc01e0722fb1c63950a249a7408d540cc416fbdb0a039a800e92,2024-09-27T13:15:17.747000
-CVE-2024-46865,0,0,1dbc9b5ba186923b4742e36d49203a434956c8fbe94fcc66757c5dcafc28984e,2024-09-27T13:15:17.820000
-CVE-2024-46866,0,0,982d7ec829e63761004e72cab06c55eec1acd818ec554d5ba1c8696819c1fdf8,2024-09-27T13:15:17.887000
-CVE-2024-46867,0,0,fe7c2edcd1c7e392d0823fc3aa8ffeb9c78398713a78de62c1887c286221356e,2024-09-27T13:15:17.937000
-CVE-2024-46868,0,0,e1f3ecacc97b31ed308f3f47ebdc27c0a1b062ab67d1ce71db8ea81907e1770a,2024-09-27T13:15:18.007000
+CVE-2024-46860,0,1,3a4d894006be96dab162d1a05bf8cc6b85cc3a0a33c8774b75f8f0436f3f0b2e,2024-09-30T12:45:57.823000
+CVE-2024-46861,0,1,c6ebac6253a83dc2f920da893d314648878d5859bee9d7cdfe7dfd4445c9abef,2024-09-30T12:45:57.823000
+CVE-2024-46862,0,1,8ed5b69c03f390ff3625d3e803e9cc39c3a1ad18d3dc6c15990d96abef3f3d32,2024-09-30T12:45:57.823000
+CVE-2024-46863,0,1,d79d5950a88e299aa0f19f6f5fd912414b163ffb8236ed8adb506b0f7f1da245,2024-09-30T12:45:57.823000
+CVE-2024-46864,0,1,7d2f080e7db77c9466322e29001d51d095accf0776afdc67a3f06d6f74dcfb0f,2024-09-30T12:45:57.823000
+CVE-2024-46865,0,1,8856d943e6bac6edc1b8d17f62726a44dfd3a608905c22f05a95decb6da14058,2024-09-30T12:45:57.823000
+CVE-2024-46866,0,1,9afa3f840fa224a8243f9e6c9f3cb7c513f5e2bd8db2e5b5ae7d4067e3271b3f,2024-09-30T12:45:57.823000
+CVE-2024-46867,0,1,8f4325a0424e9ac315599a33ba37a3c1e3df59d8b3fbc4ee7e2c9328a49864d8,2024-09-30T12:45:57.823000
+CVE-2024-46868,0,1,be6540b29e2e0469ebbcc0580d7ac6de7ea0bd656303fcfd4e016c141e820839,2024-09-30T12:45:57.823000
CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000
CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
@@ -260702,12 +260703,12 @@ CVE-2024-47061,0,0,fe88cb5968145d279da6e4fd6edb09ab3be3c5c5915bf3eb5f15f2dbcdbe9
CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d4304ec,2024-09-26T13:32:55.343000
CVE-2024-47066,0,0,c938aa14b4956e02dcf0b434c18945502d356432c94e760748910c81591de152,2024-09-26T13:32:55.343000
CVE-2024-47068,0,0,9a2d3108eea50eff8603bc77d70d90bfdff4f750554a22e7f34077cf80622f21,2024-09-26T13:32:55.343000
-CVE-2024-47069,0,0,d1ca0b59cb9b908604f17a277156c965bb34001301ad8409e27c97bc1fb1cbd9,2024-09-26T13:32:55.343000
+CVE-2024-47069,0,1,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
-CVE-2024-47070,0,0,4ea115eca8debbd7f8407d6153d3e721624d09ee0302b5e6b473ba0a4b62d9df,2024-09-27T16:15:05.413000
-CVE-2024-47075,0,0,a955baee439f43ff23f5603c3dab864843c41f14129f6e95ff6edd6519063b1b,2024-09-26T18:15:08.757000
-CVE-2024-47076,0,0,b5d605f7718f33043eab4238edb58432c818261140586c8ea1ba1781225e2f86,2024-09-26T22:15:04.063000
-CVE-2024-47077,0,0,0283963e39ed592e425ac7ebe5b36c330cbd285fa06d3f973d91b681dd5b6580,2024-09-27T16:15:06.043000
+CVE-2024-47070,0,1,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000
+CVE-2024-47075,0,1,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
+CVE-2024-47076,0,1,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
+CVE-2024-47077,0,1,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000
CVE-2024-47078,0,0,f62e4b6a06a4e25ca8c2b3e5dfd5368a6f25a3a562d4ac9b28b8f541444fb2d7,2024-09-26T13:32:02.803000
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
CVE-2024-47082,0,0,d7ffc8b868640d5bbc5bc3253e64c223c49da037df585cfe29979998a6e29188,2024-09-26T13:32:02.803000
@@ -260721,17 +260722,17 @@ CVE-2024-4709,0,0,291d83b7a71e23f3ddf2ffe4b4f9de6c9c89e71bab3de54c457add53e92c99
CVE-2024-4710,0,0,bc3d641a4dcd652350f442cdc80714adde1798c9afb82fb5cdb92bbe3aa27b20,2024-05-21T12:37:59.687000
CVE-2024-4711,0,0,d363465dc42b9acab3c0c0b87ab6c465a5fbabc481e6b69ff97f983a499169d2,2024-07-18T16:32:23.447000
CVE-2024-4712,0,0,3843a22d246b1dcd1f463ab35db131587d98590206b11784167b4cf4df51610c,2024-09-26T02:15:02.550000
-CVE-2024-47121,0,0,2abc44e82b91061374428baa95d98be438515edd437c930a13d7d9de43fea669,2024-09-26T18:15:08.967000
-CVE-2024-47122,0,0,2170aa4dfeac4bbc52e87a16782745e8ac712b111430bda3cd588071322be153,2024-09-26T18:15:09.077000
-CVE-2024-47123,0,0,d560ae833c1fc1e39422023d549653d94d9e84912627e203ec79dbe996a4a915,2024-09-26T19:35:23.310000
-CVE-2024-47124,0,0,f6cd6c37bdb924ab5c2399ebc265497198fcb191cc20b1343b44f62567705662,2024-09-26T18:15:09.310000
-CVE-2024-47125,0,0,a9ecb5731c9df1e95ba9e76506e2f8bc344763358288482282b22d6b08ef7ec5,2024-09-26T18:15:09.430000
-CVE-2024-47126,0,0,0d1e47b9cbe889325c40d99197a022c89f5f9e398c07e9dbc21fdcc6070283a1,2024-09-26T18:15:09.553000
-CVE-2024-47127,0,0,d1cc30a0e619440f975b9f0425e21cad01edb82b64a8e6267448b157025c39e2,2024-09-26T18:15:09.667000
-CVE-2024-47128,0,0,61ec8e44be4259ea6363a62c71fe5208bc50565db6ec7ecdf29eaf6dd07d40e0,2024-09-26T18:15:09.783000
-CVE-2024-47129,0,0,32ad92b0587706b36edbfa7c109cf70441b78b3d63d7faad2531349555f855e5,2024-09-26T18:15:09.913000
+CVE-2024-47121,0,1,830f62a6be0f79218c681ce5c0f56ef71ebb1165874ffa7d35d9dfc9d8a4f5cf,2024-09-30T12:46:20.237000
+CVE-2024-47122,0,1,e0f9aa8f0596b587e90b4400a29626a8b64f4ddfbdc9e6c1ab628dbfb23c739c,2024-09-30T12:46:20.237000
+CVE-2024-47123,0,1,bbdbfb51901632a47c535ea4dcd5d299921e18e7ddcf75b4811c11a55f0ec3e4,2024-09-30T12:46:20.237000
+CVE-2024-47124,0,1,b7142db2d87171fa9c8437da35c28c748743d2f5cee3bd45d72fc56f18b32079,2024-09-30T12:46:20.237000
+CVE-2024-47125,0,1,b16294f21498f29acb0be92ad1121314c8fab64747f8de5536a2117c7b38353c,2024-09-30T12:46:20.237000
+CVE-2024-47126,0,1,84dfb74d84b1b3363993deeb26a144697dcdefb9c446b3389765cbda7d49bb21,2024-09-30T12:46:20.237000
+CVE-2024-47127,0,1,d5552eca3981a4fe398a49de0bd6fbe19a0b510e5b226a4e47633efaf395b3f1,2024-09-30T12:46:20.237000
+CVE-2024-47128,0,1,1727b49c83ebd7be4044d1f9cc5656a5d5ac70a701c41bc505c51da444c0197c,2024-09-30T12:46:20.237000
+CVE-2024-47129,0,1,324c3dd1ecd2f0f0ca3446b858ac813a9b0dbb52075d3c73204469e924321ae9,2024-09-30T12:46:20.237000
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
-CVE-2024-47130,0,0,5bacd748f0875cb25861037aa6872a4594c12cd9e061380d0c56138bdd59a121,2024-09-26T18:15:10.040000
+CVE-2024-47130,0,1,71f2aebb29564e83f6cddf4f0c3a7d505431af4f47491e66b63b23434970a974,2024-09-30T12:46:20.237000
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
@@ -260739,20 +260740,20 @@ CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000
CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000
-CVE-2024-47169,0,0,e33f3db3bdd04702a8c2e5ea09346c94608ffc9003bc25e394406542f8f3d008,2024-09-26T18:15:10.157000
+CVE-2024-47169,0,1,3d7d577c82be13838843013d038c262ca65c719ce4179d733fb886eea7d8c747,2024-09-30T12:46:20.237000
CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000
-CVE-2024-47170,0,0,e5b16e6a39bacfb59f03271eb8e950abf0e773e9fb8adfac98aa1a5b714c888f,2024-09-26T18:15:10.370000
-CVE-2024-47171,0,0,9e279b103eb844b23e178eb21a348a67acdd9164c91f1d21a226be600f0e424d,2024-09-26T18:15:10.590000
-CVE-2024-47174,0,0,6fa26d82a1b33f95bbf8a1e0855ff6535581811be06cf33594f6d97fe6aafdc1,2024-09-26T18:15:10.840000
-CVE-2024-47175,0,0,fa1548d1257cebc826a6ec01d6dff7de7a1e2b2a3589aa8e2b64c71d8cd9c8d8,2024-09-26T22:15:04.283000
-CVE-2024-47176,0,0,a3d89dc21721bc279bdf94eb1d8216e0f9c78b0a6a16de589d205570e1c8050e,2024-09-26T22:15:04.497000
-CVE-2024-47177,0,0,d56fbb29ccdd9e7d283709e77d445f4bcb1fa0f8852fbd135e120bef7752ca00,2024-09-26T22:15:04.740000
-CVE-2024-47179,0,0,ef247904a19c46d2694845ae7cade3025603bb814bd5be3dbbff64d9d3a8a82b,2024-09-26T20:15:06.950000
+CVE-2024-47170,0,1,5b51e77bbaf0aa4d73aaed7035aaf98c0f3c0e8a355756474eeb1aa8a1be9c4f,2024-09-30T12:46:20.237000
+CVE-2024-47171,0,1,48e31c72c69d0bb6a9d666c7c99661a52d3c05dd11adcb85b19ee942d0085d2e,2024-09-30T12:46:20.237000
+CVE-2024-47174,0,1,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae7df,2024-09-30T12:46:20.237000
+CVE-2024-47175,0,1,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000
+CVE-2024-47176,0,1,27547436bf8c76fe92f2f835eaacfc443553990b4bb1849aa668400451f9d2cb,2024-09-30T12:46:20.237000
+CVE-2024-47177,0,1,c3d1fff6e6c651906b3b7b3db7e611572822f47ef60858bd0aa18bbf89a3315d,2024-09-30T12:46:20.237000
+CVE-2024-47179,0,1,f556f6c034532f0e7809bac52c7041c445d298cb44c326963214d4d05cb55a7e,2024-09-30T12:46:20.237000
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
-CVE-2024-47180,0,0,edb02c70b31e5ebeb97c297f7a7d274f95b47ea6afca69e49dfd4eb097628c5e,2024-09-26T20:15:07.310000
-CVE-2024-47182,0,0,69a16fc9154ea6d7ac97d74655916e8770997f865ecb98299d0d581a01a394b7,2024-09-27T14:15:04.620000
-CVE-2024-47184,0,0,af8ebb1816d7ba0a039271d512029a4f3a5177b9bc7103f3acf040e130a3146c,2024-09-27T14:15:04.833000
-CVE-2024-47186,0,0,e4f8ce43fafbf516bf28164ab1dec73a08a2eb15490bbcac5ce1bb957b6e3c72,2024-09-27T21:15:03.443000
+CVE-2024-47180,0,1,657c5516ab8b6145e58c8aac2b3c60b2287f164333060e376b2fc3a8acbd6fb3,2024-09-30T12:46:20.237000
+CVE-2024-47182,0,1,e6d6599745fb7b6ca571eb228e79e45bdc8c54e3ef9ca737532323ab39f37b76,2024-09-30T12:45:57.823000
+CVE-2024-47184,0,1,8c33cb631f21c310fa82c8b5254a8b4bd69f77d420e21f25811748f0f58bb5de,2024-09-30T12:45:57.823000
+CVE-2024-47186,0,1,85f9ee5a5901f7a68ce64fa53ba9991136dfecf88b48bceba5f09bc991f04ddc,2024-09-30T12:45:57.823000
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
CVE-2024-47197,0,0,e744485fe82b2c7f5b7c9d650df3296f2a00094efea0a5ed0597ce38048212b5,2024-09-26T13:32:02.803000
CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000
@@ -260773,11 +260774,11 @@ CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f4
CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
CVE-2024-4729,0,0,793714828270400d3e2e2e67107ba4695f8b79c963b6760f5298d6611fbd5811,2024-06-04T19:20:48.027000
-CVE-2024-47290,0,0,f3c54bd93682b2301e4b6099a4679b4cb039ffb0c99206f8fd19b5283e8b5468,2024-09-27T11:15:11.203000
-CVE-2024-47291,0,0,8d445e3a1c73c7ed7d3207d2331cd702c6fd5f2ae04bcd09e740c2fc3d195836,2024-09-27T11:15:11.800000
-CVE-2024-47292,0,0,2386cf869c0d107475c209458ef3f19c73ef6cc00177d26f90ed5d6c7458d1d3,2024-09-27T11:15:12.210000
-CVE-2024-47293,0,0,5d2a0e1cad32192bc4cc99dba37af169ae413f84937c055d9eb88657bb5c95be,2024-09-27T11:15:12.527000
-CVE-2024-47294,0,0,ae54dd149eb38050f07ac5e44c5a87854ffee13d09e886789d38e0fb7744ace5,2024-09-27T11:15:12.840000
+CVE-2024-47290,0,1,67ba86168f3e87509509955776ed8f1683ea731294e213a17c0da0258cc97062,2024-09-30T12:46:20.237000
+CVE-2024-47291,0,1,95f4f6d1ad76b75958b53fcce48efd4386245ae4c1203fa615a86bf26d91d4ad,2024-09-30T12:46:20.237000
+CVE-2024-47292,0,1,e7af822d5ebdcd8e266086596c1d2c3d8ab220c35b937e696621c6b982bac2e4,2024-09-30T12:46:20.237000
+CVE-2024-47293,0,1,cb8f6e82d7a55b0155c705860639b79c929e16ad9c10eac6bded35a62d320076,2024-09-30T12:45:57.823000
+CVE-2024-47294,0,1,d823222cf57129592969fc1ba04ff680133708feacea1954e2fba7743e757725,2024-09-30T12:45:57.823000
CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000
CVE-2024-47303,0,0,4fd81bf971579cf0e00271b5e072c908021bfefdc76c11f84286ad7788e9cb34,2024-09-26T13:32:02.803000
CVE-2024-47305,0,0,2c8f799a296592421ee25aa9899e311f2f61ad0eb53c72b4da9231822f1148ec,2024-09-26T13:32:02.803000
@@ -260814,6 +260815,7 @@ CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d
CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000
CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
+CVE-2024-47641,1,1,d8a923752c07b02ea5386415a7b0ad8cc8f9093d938474666f31f411f6951ce8,2024-09-30T13:15:02.570000
CVE-2024-4765,0,0,2cc9c7bf1e2c28194496aab966e3be262d91c35cfd4edb32adc2df596a464b78,2024-08-29T21:35:11.807000
CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000
CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000
@@ -261934,6 +261936,7 @@ CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc06
CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
+CVE-2024-6051,1,1,39393e293c6f3fb8ea07035e5bacb8f4320a88b440b3db66b904ff2903a9ff77,2024-09-30T13:15:02.800000
CVE-2024-6052,0,0,32d564c18d4d17b199f574c28ffe31c1fb3d7a1b6f6859f56e252f37a5a22c28,2024-09-16T14:15:13.410000
CVE-2024-6053,0,0,bad8fea9e1557f6e3942b82b20978ade64544c8438a72e97ebb03355ea705f3f,2024-09-19T17:22:36.697000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
@@ -262234,7 +262237,7 @@ CVE-2024-6389,0,0,97619f937594e57440ea9f8cb3d55fe9ec171c40b4959fd4a8bcfb76e0e631
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
CVE-2024-6392,0,0,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000
-CVE-2024-6394,0,0,e8715a716bae22a04adf96a8d9a6fc3358c87508833ebccacb07bf2edf8ee2ce,2024-09-30T08:15:03.850000
+CVE-2024-6394,0,1,ac3b1d2e0af624503920e5a866ea41a1e7a192d616e1128676db976e0c511281,2024-09-30T12:45:57.823000
CVE-2024-6395,0,0,8949d2f54703284d3b545906a65282811d0c7a0bd7bd2d1ca2dc3e2d333d4c69,2024-09-17T16:30:03.617000
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000
@@ -262268,7 +262271,7 @@ CVE-2024-6431,0,0,fcbb0ceb19b6b17057a6532823d607ef530236adc570023f161f002351d029
CVE-2024-6433,0,0,4cb445c95e15de0c345d2cc06e9508b276183ca5d50834d0b48eec3d0df1757b,2024-07-12T08:15:11.963000
CVE-2024-6434,0,0,0183eab14185d66c3308593554f63a98c54f148b051e07902898143029a6dc1e,2024-07-05T17:22:04.687000
CVE-2024-6435,0,0,537ce55d66a34e30f0cdc2fa5f4ebac2551f4222db736332f8b163433bf2dbed,2024-07-16T13:43:58.773000
-CVE-2024-6436,0,0,64ddc4176d1222c2cbf78da7882b182362473f77dc357849500fda95706d0bbf,2024-09-27T20:15:06.043000
+CVE-2024-6436,0,1,224820c7f949891ea506c05aa457656d569b99560a1415f2943cf9d66e87bb75,2024-09-30T12:45:57.823000
CVE-2024-6438,0,0,dda5c3ef0b29175f6296e0b89d7c12c3e07fe51c2f0cc30ea59ffede8f26636c,2024-07-02T17:54:02.370000
CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a09a,2024-07-02T17:58:39.773000
CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000
@@ -262449,7 +262452,7 @@ CVE-2024-6650,0,0,06d380480b3184a2b1dceb59084b40d2dcd977ecfc30eac16df686ef247b89
CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000
CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
-CVE-2024-6654,0,0,0cdc2cb5aa50ec2d377a4abf1ea8dda62b6e713e698b7d9c623109702419ca69,2024-09-27T09:15:03.937000
+CVE-2024-6654,0,1,54a7043c0137494f800eea52170122f73e1c0412c839f31743781981feb6fdda,2024-09-30T12:46:20.237000
CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000
CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000
CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000
@@ -262537,7 +262540,7 @@ CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f277
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
CVE-2024-6767,0,0,e624184eb5b85e1f323682c46b24401770f3ecb164370e5143c01069a4262025,2024-08-21T12:30:33.697000
CVE-2024-6768,0,0,82748b5876adf1db3885f7851e524fbc4111b7e46f9748cb3a4056bb52182449,2024-08-13T12:58:25.437000
-CVE-2024-6769,0,0,19d9fdadb40748d19ec5907cd6e50a633a0ed22af18e8e4e6561d0090bc78bab,2024-09-26T21:15:07.787000
+CVE-2024-6769,0,1,f181c4073d959706bb536605bd8c537106ccaa8b98a783415c90f2242dd0a422,2024-09-30T12:46:20.237000
CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000
CVE-2024-6772,0,0,f0ffeebc9a92372629de2eb0378ed8854f5d1b95881919ea662c83ca59f4b1a0,2024-08-06T19:35:10.307000
CVE-2024-6773,0,0,1bdc9e628b27751c087418245f6e220f86984c0c8a171e81c36efa661e11acef,2024-08-06T19:35:11.320000
@@ -262657,7 +262660,7 @@ CVE-2024-6927,0,0,e148b46f63346622a06f6186d016b89227da86b491e3aa4a6ce8be2d756e17
CVE-2024-6928,0,0,04e0edb45267f653103b1b4b8ed00c7e0e3fce07f9c3ed23eb9bfbde1bd8f41d,2024-09-10T14:35:09.507000
CVE-2024-6929,0,0,8bfdfdeee5eedcabcdc8115a8b9e0de4383a4f6cebfda630b8dc6730a4ae0a8c,2024-09-12T14:32:51
CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000
-CVE-2024-6931,0,0,76367b5935858c2f7eb8d45f1cdd06411a579d531561b43946f9a9738cab3290,2024-09-27T09:15:04.130000
+CVE-2024-6931,0,1,7c60ca7d08176de598892ff461d990cf31895fb99e274d9ddd67abe9eb23249b,2024-09-30T12:46:20.237000
CVE-2024-6932,0,0,b45f238b66342b8a7c2c79c0dddcacbab87276fdb0cd01ae77c1653350b609b3,2024-09-10T20:24:40.790000
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
CVE-2024-6934,0,0,e803290e0f45598964544bee83d9eab1d1648748432498a6102e4608f1e931cb,2024-09-10T20:22:56.390000
@@ -262704,8 +262707,8 @@ CVE-2024-6977,0,0,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdf
CVE-2024-6978,0,0,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000
CVE-2024-6979,0,0,c462ab441dc6fef278b8d322b06d9bbe90e009e07f8beeb96cea48ccdc45139d,2024-09-10T12:09:50.377000
CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000
-CVE-2024-6981,0,0,8048b57105d4b6d8dd7d83d7e2217a3c5e7600ba0d800660465d27661f89b230,2024-09-27T17:15:13.653000
-CVE-2024-6983,0,0,5235a8757eb971eb238703857266679240cb5146acb8e0f374f6dd5e0ef3718b,2024-09-27T16:15:06.533000
+CVE-2024-6981,0,1,510d4c4925a1eb3b58785bbc8ab5a73c80a24b4283cae4ebe7ab898a6ac026fd,2024-09-30T12:45:57.823000
+CVE-2024-6983,0,1,26d1c914038fe83b8e6a8b16fb4211c387129700e5470999eec99bc2e4f2518e,2024-09-30T12:45:57.823000
CVE-2024-6984,0,0,923e45bdbdeb390a80e72f79f52c794d2a4658d69ca6fdf4fb6edad3e12c000f,2024-09-11T16:39:37.253000
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
@@ -262727,7 +262730,7 @@ CVE-2024-7006,0,0,407596314396364e4943bbca86287583cbccbfd5ef54346220152eb6a6a023
CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000
CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000
CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000
-CVE-2024-7011,0,0,db0f561cfd39f03fcabcf1112beeb29601844f9f50d58cb76258e2d5815add6d,2024-09-27T03:15:02.307000
+CVE-2024-7011,0,1,fafa14a9632dbca7dce2bf31a9559a65baefeba7773bf0dacaafeb6e3837c6c8,2024-09-30T12:46:20.237000
CVE-2024-7012,0,0,7505e34b161e28dbe95eb89541c44fc261402b7bb3b4a766cd0492f45404fdcf,2024-09-19T06:15:03.777000
CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
@@ -262808,7 +262811,7 @@ CVE-2024-7144,0,0,57a5a71f7611d2bbf4fd3384e95cd03b39e04b60449356a588f871c88f4479
CVE-2024-7145,0,0,09358b8e986da363b6baeebea664dedb137746de39229d5884046e73cf837e28,2024-09-13T14:39:44.490000
CVE-2024-7146,0,0,0d097eb41f121dd3c78bcb7ece20b3c3122f8d7908fd573306f5f8009daac9d3,2024-08-19T13:00:23.117000
CVE-2024-7147,0,0,d64b7d45d4df4fda891fe044ed5ed11da3adfb67eec103504ae2ce9a34185836,2024-08-19T13:00:23.117000
-CVE-2024-7149,0,0,db751ba45894771bbe2c7358eb82d0e711876ef9a7845804adf4692a0c8494e5,2024-09-27T14:15:05.043000
+CVE-2024-7149,0,1,ef084513070b63be43d2b9419aae4af22b746649f4805a3227c23f4589d058d4,2024-09-30T12:45:57.823000
CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000
CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000
CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000
@@ -262896,7 +262899,7 @@ CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
CVE-2024-7258,0,0,d87745b439eb0eec0ee02b318012450e9a5bbd9a1641e9180767ba5e2e2be570,2024-09-27T13:05:06.930000
-CVE-2024-7259,0,0,14b500a59c2c12c9d5ca0fda58c51c0ba565f96064f6fc4fe3ced6f2a4e3f2df,2024-09-26T16:15:08.997000
+CVE-2024-7259,0,1,d4438210aa17856647b0aa5459be2a749346b240c9abcce1f67f7b06e87c6cb8,2024-09-30T12:46:20.237000
CVE-2024-7260,0,0,7ac5c086a530cf5346822fe722bc0e211467ce336a1543005152dae602c7481a,2024-09-26T15:01:07.803000
CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd8c,2024-09-13T19:39:40.570000
CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000
@@ -263019,7 +263022,7 @@ CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb3
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
CVE-2024-7398,0,0,7ca8fddb8ef1f52901b2255125fac0a0a6c61da66ccb82e3e8b1d5c901cab621,2024-09-26T13:32:02.803000
CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000
-CVE-2024-7400,0,0,0a91a315bbc76957faa74c611b1f8ea1f3c1591bc708d3cbdea4cd805efe4da3,2024-09-27T07:15:03.387000
+CVE-2024-7400,0,1,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000
CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000
CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000
CVE-2024-7409,0,0,f8780d25575ceaa72bb05ea56c673e2b6be1f1e6ecd77c7a6074e31ef6bc0967,2024-09-25T17:15:19.213000
@@ -263162,7 +263165,7 @@ CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261
CVE-2024-7591,0,0,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000
CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000
CVE-2024-7593,0,0,60b30c808c702e818d231ca6cd3e332309e25b5d629eb181703aa0b1b2d6d1a4,2024-09-25T01:00:03.110000
-CVE-2024-7594,0,0,de160147e3a77d4784909b90cc5c2e8e40459f6d6d2428f4df61cf3e137d849b,2024-09-26T20:15:07.687000
+CVE-2024-7594,0,1,50bb68bb7c7b3b35ea93d7055373890f8c2c41a7f5afce88f9c057abc04ebed3,2024-09-30T12:46:20.237000
CVE-2024-7599,0,0,bfed51419671bdac1f3d9d2ff4e2a39cacf92b9f7219234693d312300db2a267,2024-09-26T16:45:58.507000
CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000
CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000
@@ -263260,8 +263263,8 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb
CVE-2024-7709,0,0,4ea4e71ad8cd2325399b6f32c817fafe76ecfe7c20ad1838061c8bb44a136e96,2024-08-17T10:15:10.957000
CVE-2024-7711,0,0,5f68b281cfe401fc4184ff1613ff12ae79d70995453a2a2aa130ad5c1bee1478,2024-09-27T18:17:05.577000
CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000
-CVE-2024-7713,0,0,34768f13d879ef5560f0127c1e010a7eebd91adf6561c5201fe5dc9293502e1e,2024-09-27T06:15:11.327000
-CVE-2024-7714,0,0,705d8fa26395ef610bad264ffef178490d23a61ef3ede9b9fe5bf2e0a9ab5182,2024-09-27T17:35:15.420000
+CVE-2024-7713,0,1,608268c8e80bdefbfcf7190965c2d075c75468673e36e9bc2ac348a3c7c1f1ab,2024-09-30T12:46:20.237000
+CVE-2024-7714,0,1,1de968039a3e84d2ad9379982f0ef490e2a2401f89ef2e51628e45ac22865e4b,2024-09-30T12:46:20.237000
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
CVE-2024-7716,0,0,6e32ca8fc3d9f498e4c95945e19f3ae22dd503780e7b0ea7d794bef53d1a899a,2024-09-25T19:35:32.990000
CVE-2024-7717,0,0,e5222da2115bd620271297bf5411cb792a41b0c4403b5c6c14bafe7da668a41a,2024-09-20T00:08:55.973000
@@ -263530,7 +263533,7 @@ CVE-2024-8110,0,0,35b29aa278bc186f939dacbb87981e7b3283cd41ccc0818c634be4d5c87818
CVE-2024-8112,0,0,68d19c324dfb08f42fbaae63f6c41217ad9d464e632ed1f450780261e0cb818a,2024-09-12T18:23:22.507000
CVE-2024-8113,0,0,955ebfeb47657ee688d94f4a91bdebad900106533d62e5ae0eb920a40b616cec,2024-09-12T18:21:30.677000
CVE-2024-8117,0,0,8911918cea1d80613ef158836fc25c8d180447229a308c8b8d66c79bd51e5356,2024-09-06T16:04:23.413000
-CVE-2024-8118,0,0,5fc6ed737462cfefaff190aa8cfe3373c52265e785d5cdc2b756c9adc41aed6c,2024-09-26T19:15:07.663000
+CVE-2024-8118,0,1,d03bd1088dd7cb21afc11db9cdab895da8448f1f18598e5ee7682cb773fed419,2024-09-30T12:46:20.237000
CVE-2024-8119,0,0,209c67cb8bfc8afcb7a4732dcac7c96ef9caf231c5c5c990646aa6c9fa168084,2024-09-06T16:11:02.370000
CVE-2024-8120,0,0,94d6700060407df9049e5baa85dfe75b2dcfe8ef464f0408d491eefb42a5e54b,2024-09-17T20:07:46.117000
CVE-2024-8121,0,0,ff1e52368219900437efe7b0d09c59c3cd45c1a8ee1d51b7c00a17f9caa0d460,2024-09-06T16:20:59.767000
@@ -263583,7 +263586,7 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
-CVE-2024-8189,0,0,d89c5bfc8943ae070ff29ff8abbdfff70e8df8a9a0e2ee2d76a26fcff979a1fb,2024-09-28T13:15:12.190000
+CVE-2024-8189,0,1,7c118d28fa2d288822bbca196dc18ebda7ab98f6b3afe3d390058317e69efdc5,2024-09-30T12:45:57.823000
CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
CVE-2024-8191,0,0,af2edabb2340196237a0a5f2ba571c0c8b12c14869cbef7778e55b204fc2e4fe,2024-09-12T21:50:39.507000
CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
@@ -263620,7 +263623,7 @@ CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd
CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff5273,2024-09-11T16:26:11.920000
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
CVE-2024-8235,0,0,98b75635820a87efbdd2b77979ec96dd3fdeb5e53f45b0aed13f360f5eadfbaa,2024-09-25T18:56:19.090000
-CVE-2024-8239,0,0,95714125eb5a594a6835a3977b75e9b9e9413e58a9acd2c7801bb04bc2515b5d,2024-09-30T06:15:14.520000
+CVE-2024-8239,0,1,266409fe0881819a388e8bf1d2c2b39de1a8837698b7268de6885e9087cd7049,2024-09-30T12:45:57.823000
CVE-2024-8241,0,0,a45702ddf12409bcabe5a92099c2b574d3c26b3fd7159f1bd1748fa16b9a5652,2024-09-26T22:03:42.123000
CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
CVE-2024-8246,0,0,bdaeed559e2a925d1cf782bec3165b97ce80a327963423b92b0db3cfac285297,2024-09-26T14:00:09.783000
@@ -263644,7 +263647,7 @@ CVE-2024-8278,0,0,fc32e2167ccf88370e539f3d055e0ff107942d544d0900ce5dc32eec47fdcd
CVE-2024-8279,0,0,a7de1f6bcd7acd612433087dd62d700c55c2713edbe09e73822c3aefec563e44,2024-09-14T11:47:14.677000
CVE-2024-8280,0,0,ee8246d9e12854e999c4fc7d4ea10afbd0920ea1f9472e1c543327a9ae0730e7,2024-09-14T11:47:14.677000
CVE-2024-8281,0,0,6e64aec5696815efe009b246052ca974dfd6e9415a9b5d9826067281cc5ba11d,2024-09-14T11:47:14.677000
-CVE-2024-8283,0,0,becd8cec389abdecafd3ca9c77045e12bd17a0eb98eff5a842e768c81ede60c6,2024-09-30T06:15:14.603000
+CVE-2024-8283,0,1,63c897f82dabc8d84136a694d903018ce23d93f10e485ba2d6b5e962b5c03172,2024-09-30T12:45:57.823000
CVE-2024-8285,0,0,b03f6a28365b23ccdd28cfaabc1a4440173ac6451ac16c91954a645332d3ac9d,2024-09-25T18:48:21.620000
CVE-2024-8287,0,0,a69e7cb2d3c0316abfeaff67da311f8b23d877ec163f8b4d2f35a96004b37bbb,2024-09-24T15:52:38.047000
CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000
@@ -263661,7 +263664,7 @@ CVE-2024-8302,0,0,e8302268b823029df660336594addee00302ff9a5d73561baeea3f2fb742c2
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000
-CVE-2024-8310,0,0,4b4d09bbae7dc3c7636d9c5d157a7a2629566e4bc2921727c3269659425cdb4b,2024-09-27T17:15:13.970000
+CVE-2024-8310,0,1,7c8549a7a64d3579b34aa56e199885805550ab7f5a2102b636629253bc8a75c3,2024-09-30T12:45:57.823000
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
CVE-2024-8316,0,0,a248c418c551695f5f3999b43393b9999b710986073d296562b230ac2e92eb88,2024-09-26T13:32:02.803000
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
@@ -263695,7 +263698,7 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
CVE-2024-8349,0,0,66c929a2bd31259ac7f99499cacb7946e158950a66ce33bab4e6efb6d8c7636a,2024-09-26T13:32:02.803000
CVE-2024-8350,0,0,f8ffd63945ba91a36195e839079351a67afb6a0aef5d0bff0efca569bbd0260e,2024-09-26T13:32:02.803000
-CVE-2024-8353,0,0,7873b1b26e2f282038fe014741f07e32586bb76fb27d55cfbf21f17de32bf93d,2024-09-28T02:15:09.880000
+CVE-2024-8353,0,1,d89f4b318c2b5dfded66f7e85df1940ef56213b078dd62fb87405ec44f175435,2024-09-30T12:45:57.823000
CVE-2024-8354,0,0,0cb564ed9384fcf3167b4bc2e43f53ae9109518b7fd9476c53aef4e78eb45a15,2024-09-25T16:58:59.537000
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
@@ -263711,7 +263714,7 @@ CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722a
CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
CVE-2024-8375,0,0,58cea17ca7f7a98f8126bafea3caa90f64ce326ce0b828e067a1c86c7d982ac6,2024-09-20T12:30:17.483000
-CVE-2024-8379,0,0,d9ab9f01a7c155bb3c5e1f872af06b807a3852cfdce5208e3697f5771a20deaa,2024-09-30T06:15:14.697000
+CVE-2024-8379,0,1,f8d2daf95821326426d83fdaad9c098c22cfd62d4ff0262c7b4625cd0cba0d8f,2024-09-30T12:45:57.823000
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
CVE-2024-8382,0,0,6313fe051491464f5060a11c4fbfc0623b9d0d82cc5fbeccd812557ff3cd8b8d,2024-09-06T17:15:17.677000
@@ -263751,18 +263754,18 @@ CVE-2024-8440,0,0,8dcfa58740a8b45172e18897b2d796d55a68f35b9034374864c3da0c6b77c0
CVE-2024-8441,0,0,0efac0f95475c5b753f85a6e07784bad0c26116c06bdd47c81e7d9e5f2143687,2024-09-12T21:53:43.387000
CVE-2024-8443,0,0,3c60ad7b83386f919c8526ae161201f0c09636191f73ee0cc137a0cb5f793af8,2024-09-26T14:34:03.157000
CVE-2024-8445,0,0,27d6183cbf221ef18e3639e3533cc8ca212a51b0f7239a93c253eea652cb910f,2024-09-05T17:44:56.007000
-CVE-2024-8448,0,0,e569d02b6b9d2143b7b3a9c54dbe4b0b786a49195c18e4bb51b3c7a937dbf20e,2024-09-30T07:15:03.507000
-CVE-2024-8449,0,0,839f7a1e43ea31dba5d7b2d46464bd9d4a413873c05cfd799b3f59a2e39ee208,2024-09-30T07:15:03.937000
-CVE-2024-8450,0,0,576ff502c197477720dc256248c8efe54492c06b81ccea5e7f00ed9d2f98f285,2024-09-30T07:15:04.170000
-CVE-2024-8451,0,0,76caa55b3ad35b38c289608ddb96935839c1fa9f0bc32a92e0e4a30e6b268a1e,2024-09-30T07:15:04.417000
-CVE-2024-8452,0,0,48538fa963900fe4d6ff37e1c84e8e468a5db4822ecaa7847c7d9c39eaf8e7ed,2024-09-30T07:15:04.647000
-CVE-2024-8453,0,0,dd45133d796e3f8d94dab490e053ea3ec63a6ed383cd28df54baf939a89ba27e,2024-09-30T08:15:04.093000
-CVE-2024-8454,0,0,0b1db7a12abef20a8fe2c00d5760b512baff0383307abe5de81fdc6d66f3f862,2024-09-30T08:15:04.340000
-CVE-2024-8455,0,0,1d982345b41f5266a608c04c6367742d0447f0cfaff1aef16dd4e62cbdc8e7ce,2024-09-30T08:15:04.570000
-CVE-2024-8456,0,0,a5deef205f5b140a12d4d6286d81a51dc186b0406413c34008253ae4b9174a91,2024-09-30T08:15:04.797000
-CVE-2024-8457,0,0,ae5446589fbe32e1b3291507a03b66d980a5aa76b2d0d8007a2046521a3a5578,2024-09-30T08:15:05.020000
-CVE-2024-8458,0,0,13edae9b071cf2daf310de2efa82dbc05262091f3af3c1110fc55a607fe00e50,2024-09-30T08:15:05.223000
-CVE-2024-8459,0,0,772220caf0f5153aeb1b136013eee4b3f5d9cfb89e510d3da1622f2a39d4f440,2024-09-30T08:15:05.460000
+CVE-2024-8448,0,1,a5ecbda13e54e62f08aad0fb96b46ee6676b77e076cfa11ddb79678d5c149797,2024-09-30T12:45:57.823000
+CVE-2024-8449,0,1,abd472db671ae2c583e74e98c342c94b8a5a9f987684dd21bb2b434bdad834ec,2024-09-30T12:45:57.823000
+CVE-2024-8450,0,1,2f10ea74f337b4e5e3d54aecde245c4e719ad338c5a035141a0dccc4aed1fbcf,2024-09-30T12:45:57.823000
+CVE-2024-8451,0,1,c6876e4a8298badeb846baab9198eec99562410a0f7dc1a0e903949fd6fcd2b7,2024-09-30T12:45:57.823000
+CVE-2024-8452,0,1,56cd2dc95326e296a11fc8eeafd157dc83627a29d7b41ea9ab6a8dfcee989e15,2024-09-30T12:45:57.823000
+CVE-2024-8453,0,1,512ac1f0fea4b945dba36aac6eb0a8046059e5e52a29c290abb9251aad896315,2024-09-30T12:45:57.823000
+CVE-2024-8454,0,1,f01aacf6c3d306141716538508729b80293cbd5a6efec89d4a7e407efbfb8717,2024-09-30T12:45:57.823000
+CVE-2024-8455,0,1,fb4180f68dc5f7a7d4e169ecf1b483c0d435d863d5046d966e8c67cc182c72c1,2024-09-30T12:45:57.823000
+CVE-2024-8456,0,1,90c4951fad9ca1eeb40ac1dc29ee81cf0bb4e6c09b5e7911515aeecf48133ecb,2024-09-30T12:45:57.823000
+CVE-2024-8457,0,1,6bca3616312f3a516e33d2e693f648bf6a9bfcd1774dd62ec13f27b464e06156,2024-09-30T12:45:57.823000
+CVE-2024-8458,0,1,1d0097115c29931bb4ab484538070a356c56cdc1c264e4aef332fd3ae5e3bca1,2024-09-30T12:45:57.823000
+CVE-2024-8459,0,1,6e09ffd5ab601b4fb83c24864245a152539b60b96fe2b695751f65bd42552eab,2024-09-30T12:45:57.823000
CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000
CVE-2024-8461,0,0,b8d6008c0677dd1308b9960cd16592ca94dc9bda7b3637748d1d22aa5c67576f,2024-09-12T17:17:57.733000
CVE-2024-8462,0,0,f8474602b1827b45bf4e783834309517ba415e30cec135f1beb9e6ec5ff83e07,2024-09-05T17:45:07.877000
@@ -263799,12 +263802,12 @@ CVE-2024-8522,0,0,2ab431c4f2cf5ab967664e41dd1dc524f59071081def8323632354294bee4f
CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000
CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38b9,2024-09-13T16:11:25.400000
CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000
-CVE-2024-8536,0,0,94ec0e9a3cc5633a752aeaea8ba2105ec561977e2b54053a3e128c1446fa0a92,2024-09-30T06:15:14.823000
+CVE-2024-8536,0,1,4dcc89efd89caba952f5bef04690bdf6d7809c55319294cccc2a197567c48e00,2024-09-30T12:45:57.823000
CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000
CVE-2024-8543,0,0,1827ebc325d7546f1e75a8e16ffad13bc42c9eac828d9fdcb95bbdde0c532bed,2024-09-27T16:46:26.243000
CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000
CVE-2024-8546,0,0,21c437f0d9de25e8960a2d9fbc9927a015111c992509c4b53747f59b9615f4f7,2024-09-26T13:32:02.803000
-CVE-2024-8547,0,0,ad348c287d155b64ea4b0103a16f672d6e30a6a1d965182b02cee0946fe0d765,2024-09-28T02:15:10.150000
+CVE-2024-8547,0,1,29fe82b8c0ab38b765e0be3ae3ce18e6ec7de58c1b556459781d617a88c52c89,2024-09-30T12:45:57.823000
CVE-2024-8549,0,0,26824bba4a7be5d3e1980cceb3f14676382c512f326742b207079a7edab4cb14,2024-09-26T13:32:02.803000
CVE-2024-8552,0,0,6594d79506dd28071c715cfa6c7597507b339576bdff1f377ea688092ea69413,2024-09-26T13:32:02.803000
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
@@ -263842,9 +263845,9 @@ CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b3
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
CVE-2024-8606,0,0,c19a3da486de068c4625e8e25dc67324e334aba2f868c0ed9a722d4209377311,2024-09-26T13:32:55.343000
-CVE-2024-8607,0,0,2ddb0309fe1197047db89200e1244a0ab07c4cc8c5b67b4ff257922493e74f5b,2024-09-27T12:15:03.617000
-CVE-2024-8608,0,0,70a6908469f677ff13fb63da61d58f7946f34054726b2ac2f47edb4296c4ca33,2024-09-27T12:15:03.823000
-CVE-2024-8609,0,0,5a99fdb2093de97963ab5690f22ae5bbf17fb50466c32aba9a5a2535ef0c4ee9,2024-09-27T12:15:03.997000
+CVE-2024-8607,0,1,b0f39539b8bed207062265f59e081e49e8ba8aed569e6c37a54a45664ada9d09,2024-09-30T12:45:57.823000
+CVE-2024-8608,0,1,194d0f0fc166de5660166a07647a65c68659829d4df5dc40c612eb3331638978,2024-09-30T12:45:57.823000
+CVE-2024-8609,0,1,fe7ca13c3d9b9fe01af247daf88d9820e61ee6ae3eab253016b6fdcb76d7191e,2024-09-30T12:45:57.823000
CVE-2024-8610,0,0,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000
CVE-2024-8611,0,0,3d63bb09edc11ef6327fe857dfe381551fd3ed233dd119eaa741dce3b9b25e8e,2024-09-18T17:24:34.163000
CVE-2024-8612,0,0,7904070a64ce6b0c617a391de31eeccb03d9f0e9421f89781a9fa23b513c6a78,2024-09-26T13:32:55.343000
@@ -263853,7 +263856,7 @@ CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1
CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000
CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000
CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000
-CVE-2024-8630,0,0,69a27a840e91c607a813416fcba4f9f4f6ef755929d1d9c70a9d24bb45f19f82,2024-09-27T17:15:14.180000
+CVE-2024-8630,0,1,171e223312e05c108be17689ae4f899562cfc4dd591123d96527e97a9f5e9c7e,2024-09-30T12:45:57.823000
CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000
CVE-2024-8633,0,0,b5b3cb7bf92993a95877e5bb9de5f9fe762b28b46c227d23bc70c2891d4703fa,2024-09-26T13:32:02.803000
CVE-2024-8635,0,0,7a33169aa1c56166fecdf7f4d906662353a5e22f1362c34800f026c91df08470,2024-09-14T15:24:45.657000
@@ -263864,8 +263867,8 @@ CVE-2024-8639,0,0,81b4d237da336d5cfc4eef796e8c69ea1e42ce312224983662ce770673b442
CVE-2024-8640,0,0,355c8649c87d5efaa043494b8ec77b10dd7fca0f372cd99c6e0195d9ec1f3b26,2024-09-14T15:37:37.257000
CVE-2024-8641,0,0,6714847a0a2d7b4da8f2ecb0f7b3c9e94c4657d9429961f088a44e0537d8381a,2024-09-18T19:12:18.930000
CVE-2024-8642,0,0,2aae0632e6322f09814ded77019a17c6bdd3adefc0841a6f6e92e4043db21740,2024-09-19T15:18:47.917000
-CVE-2024-8643,0,0,abb56bfd0e482e5c7719cb049b85dd605dcd566e9e794a81e21255a1b93e2afd,2024-09-27T12:15:04.210000
-CVE-2024-8644,0,0,3daab34a01fefef4393191c7f856d42692489d65740ec2fb464a6318ebfac63e,2024-09-27T12:15:04.390000
+CVE-2024-8643,0,1,36ec93f0fe66994ea4d9825b32b68c1984de51b97f373ed37b5e26394daeee97,2024-09-30T12:45:57.823000
+CVE-2024-8644,0,1,862b058c621996bfdfdf11691638934b99ec09ba771841dc3edcdcb1614c84fa,2024-09-30T12:45:57.823000
CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000
CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000
CVE-2024-8651,0,0,98f15bd48d1c12270cdb328a70de9359f32b42ef85efa713989e765f41ce1150,2024-09-23T17:51:13.050000
@@ -263887,7 +263890,7 @@ CVE-2024-8669,0,0,a540528fa4f0bbb5defe17259c589787942e6df5d18ff3bf79d91bf53c9aac
CVE-2024-8671,0,0,44eb9fc4ae83bda74c805da6c8f69132f0b0ddef607b7afc290779058022b5c0,2024-09-26T16:38:24.447000
CVE-2024-8678,0,0,889d21ef247546a6f2ba4419351284ba9f2f3727a17d89355bbfe7a36fdacaf2,2024-09-26T13:32:02.803000
CVE-2024-8680,0,0,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000
-CVE-2024-8681,0,0,e85827f2b8828da8ba7ea80cebc7e3cc190a5b387dcc33f1d81b64fa55a98704,2024-09-27T07:15:05.123000
+CVE-2024-8681,0,1,2484646e871f9b5ca6a59ede5b5ef399a66580b77d3877c591e127c40a1ace52,2024-09-30T12:46:20.237000
CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000
CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000
CVE-2024-8688,0,0,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000
@@ -263908,10 +263911,10 @@ CVE-2024-8708,0,0,661e441f732f7c590146c851caa19d4b9d733a437db35f14f249fe50618d2c
CVE-2024-8709,0,0,c4b78e9440da9a95da6880cb2eb594efc3dc26da0951b28cab597493ad1bb06a,2024-09-13T16:27:21.273000
CVE-2024-8710,0,0,4c5169ef585cdb335030b939d5748b4dbbc0a0ee6166dc565231ca1259e5b90c,2024-09-13T16:25:47.510000
CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ecb4,2024-09-13T16:18:15.670000
-CVE-2024-8712,0,0,50c8b955b867e54c67f097c66622da6de593bdb6b5d7888352e6bc40f5c29004,2024-09-28T09:15:02.167000
+CVE-2024-8712,0,1,2cf01b3948959a9bde5d2a30913b311e3b77a5b6a2ce30febed88c3b53c36dc6,2024-09-30T12:45:57.823000
CVE-2024-8713,0,0,77e6eb32497c4838ab6eff0729860dc19e9280431833bec790cbdd0c191045a7,2024-09-26T13:32:02.803000
CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce13,2024-09-26T20:06:46.330000
-CVE-2024-8715,0,0,5dd80a9e377e26833109e36a9f853397f40930511fcbb10d79b8fb2a0b5afb14,2024-09-28T03:15:02.330000
+CVE-2024-8715,0,1,304c326f65febbbc8f7632ccde75c6cb540626ca7b3f92b1e87ea6c962675cd3,2024-09-30T12:45:57.823000
CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000
CVE-2024-8723,0,0,778d0a0398aed78fe986c3e106c93b2232e3d42b0102981078399ce3c143c0f8,2024-09-26T13:32:02.803000
CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000
@@ -263937,7 +263940,7 @@ CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588df
CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
-CVE-2024-8771,0,0,9145a8cb6464fa49eba000518b265b9222a8405fbd22e3aeb240835bffe774a5,2024-09-26T16:15:09.293000
+CVE-2024-8771,0,1,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
CVE-2024-8775,0,0,1f8b246503d32d66b42e8fe1d2ca1b6d98900c0e0fb5babb06cd69ea0d0b6cab,2024-09-14T11:47:14.677000
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
@@ -263947,7 +263950,7 @@ CVE-2024-8780,0,0,390f3cd9aeaa4212ebd65fe7e603fc1df2783bc2afd801c860ac757dc6f099
CVE-2024-8782,0,0,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
-CVE-2024-8788,0,0,9acf7ba86dfe3bb0d2f7badc30361934124d525e34346debde47c3772d9f6d12,2024-09-28T02:15:10.380000
+CVE-2024-8788,0,1,0c1c31433060e0573e6670d95af66fa7676c5096baf38d35fa0fd856e69a1acd,2024-09-30T12:45:57.823000
CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecffd5,2024-09-26T16:25:34.120000
CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000
CVE-2024-8795,0,0,f7b3fc89482c22947a1a26e63d2f04d7dee1f77ad827021897b332709b04072d,2024-09-26T16:46:55.587000
@@ -263993,7 +263996,7 @@ CVE-2024-8910,0,0,b0443c5ae704d14459c44a4608f4ef463625446d5c4272eef73791c7d26c39
CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000
CVE-2024-8917,0,0,335953e24e12abbc8145f3320ee4f0273b970843143b0a5e292bf9bd7b191fa7,2024-09-26T13:32:02.803000
CVE-2024-8919,0,0,12c0ac43496a9b38bd7825dfb5f140b90abdde078e3fcd0e3c34df036cfd6170,2024-09-26T13:32:02.803000
-CVE-2024-8922,0,0,d01182920fe7ae18059f0e89e44d786dc7b76d5f456699ce60e265b658289f29,2024-09-27T06:15:12.817000
+CVE-2024-8922,0,1,20529fa1692fa50986ba215b54fa6394828d24b19e91b98ecf8bcc0f353de572,2024-09-30T12:46:20.237000
CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000
CVE-2024-8940,0,0,881a745a1b77233fe3ad09218f06df01a2061a4c2e5cfa2c2a81ed440bf13f5f,2024-09-26T13:32:02.803000
CVE-2024-8941,0,0,5a23216cd953abba28d73d2932ca5626321bd4676456d325dae99c04345ab028,2024-09-26T13:32:02.803000
@@ -264008,12 +264011,12 @@ CVE-2024-8951,0,0,888c97aa442d5e8c89ae77387b914cd3981839dfe932748e6b429d09cccb70
CVE-2024-8956,0,0,469912f1c3a233b9c6103ff1ea98b03260e653e6a7cf65fa430bb18bb060e2a0,2024-09-20T12:30:51.220000
CVE-2024-8957,0,0,479bb87a5ce094312d7bf571ad4a1b1d6922673dde5733f096aa7041bc35da67,2024-09-20T12:30:51.220000
CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000
-CVE-2024-8965,0,0,0ef598dcedee293bef38c56e28c705f06609872221bfcc0ed18037f3b1832029,2024-09-27T06:15:13.223000
+CVE-2024-8965,0,1,4ba541e4606533e3a8bee7a33ff07d0a9f7a7b73c53d09de5034be2d80daa7c8,2024-09-30T12:46:20.237000
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
-CVE-2024-8974,0,0,14dc536dc6bbaddfa8263fea422178640df68d52c4042ed544504bcf81267614,2024-09-26T23:15:03.083000
+CVE-2024-8974,0,1,d4bcc9476e440aef15c3a18c780e18e6939f5911111a1f36c9f70c7d14bcd4bb,2024-09-30T12:46:20.237000
CVE-2024-8975,0,0,6182f1c2aabebf93149118ffbf69a7c7fbdd0fa2fe06938640fbc8c09a95a52c,2024-09-26T17:15:04.283000
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
-CVE-2024-8991,0,0,7af65a81f30483ba707f5704da13f2dc8efd5036ae0f4cd35e430bcd3d191502,2024-09-27T07:15:05.493000
+CVE-2024-8991,0,1,09885cc5ee50368e772186dae89932abe94e78de6f22233b671ca629cda9542e,2024-09-30T12:46:20.237000
CVE-2024-8996,0,0,1db2f409b274638c0f9c246162c3dd0fbc2dbe210d25860090dd9c3c8a087a10,2024-09-26T17:15:04.373000
CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000
CVE-2024-9003,0,0,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000
@@ -264024,12 +264027,12 @@ CVE-2024-9008,0,0,52622a85f30c63eabac86e540eb777bb56ea4ab0b052ff445cc04b0bad1ec8
CVE-2024-9009,0,0,8ca9aa7668c5d5c77c4f8dc75f965a1fc61562deadeb769eddb6e3d475ae864f,2024-09-25T17:46:59.077000
CVE-2024-9011,0,0,31757df34dd4fee90035c8c1e734eec12ab6ab10926115bc714ff7e9ad5eeaab,2024-09-25T17:48:14.820000
CVE-2024-9014,0,0,a8e29b928e7c02e09a31b50dee33eaa8cea5cb50c9cc022c5089f67468915a88,2024-09-26T13:32:55.343000
-CVE-2024-9023,0,0,f3f770c3bab7ed6db411221917d2e6cf153aa5ab1765ee7edc1ce2207a5361ca,2024-09-28T02:15:10.630000
+CVE-2024-9023,0,1,791ecf17c09683ef3ebffb71174cce8e121540e79fef0c6a3bb0a2d8d2ba42c0,2024-09-30T12:45:57.823000
CVE-2024-9024,0,0,a169982dad174bdcc00c2c78e9efcbc44e6a47176e89361fcc86b05c73e5527a,2024-09-26T13:32:02.803000
CVE-2024-9025,0,0,4a3763d182986e8a9ef475614c0f7e993d3440f162fb5fd30f9debf5502d2386,2024-09-26T13:32:02.803000
CVE-2024-9027,0,0,c409316250f48b36be20429f87c4942220d7d23db3624ffd7bf099b6e997d609,2024-09-26T13:32:02.803000
CVE-2024-9028,0,0,066617345a002ab3642d548e56d10899015c968402247f796f72778f556d5654,2024-09-26T13:32:02.803000
-CVE-2024-9029,0,0,35f447da90177f30c2552d1befa021521534c64f52e07afbe3088997f751fc53,2024-09-27T13:15:18.060000
+CVE-2024-9029,0,1,9076ca7374bbbeb2209faec4a2cd78108bb0db6f5ed66892cd6b13e6647405d7,2024-09-30T12:46:20.237000
CVE-2024-9030,0,0,c11a97e3409538e48c43922920e3ccde8c323ec97995f0c28aa92b45cd65fb6b,2024-09-25T18:01:19.270000
CVE-2024-9031,0,0,a2a75f47877f3d25b358bad394fac156601d3202f3a82ad425179531288fce65,2024-09-25T16:52:25.327000
CVE-2024-9032,0,0,2d5c67bc837303d0499a93a9054ad23141a54194cf6f137859840c55c4e34922,2024-09-20T17:04:51.490000
@@ -264043,8 +264046,8 @@ CVE-2024-9039,0,0,2a46914eca39fc29da2da7edd5c8d5e2462d724fc7b13f9f758dbc7e741a3a
CVE-2024-9040,0,0,0fb966ef41b73391708aea4bb41bcdf22035487df6b2f9dfc89d7d54ff500837,2024-09-27T15:53:28.333000
CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b48,2024-09-27T15:57:55.073000
CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000
-CVE-2024-9048,0,0,4ba18ed8eae3391d4e9aa556ea2ddeeeb6600d1984fd49b296429d6d44643fc6,2024-09-26T13:32:55.343000
-CVE-2024-9049,0,0,d8dd6afd09a2bd54cb5c89c5fa3727e5d81ad9892bff0cc251ba3a30c729408a,2024-09-27T07:15:06.120000
+CVE-2024-9048,0,1,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
+CVE-2024-9049,0,1,82d816109853a6bb7858af705f595879c6e18b2b65b2b9fb172af3dd7d5e2811,2024-09-30T12:46:20.237000
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
CVE-2024-9068,0,0,595a98d7de817a377ea8bab7638422f5e22adb9ec7bbec5ed5ab04456ef8d738,2024-09-26T13:32:02.803000
CVE-2024-9069,0,0,288e488da0f8012f61662f009372321cf218ded299a5ebbf98a6261cf2fe518d,2024-09-26T13:32:02.803000
@@ -264077,57 +264080,57 @@ CVE-2024-9122,0,0,8303a0c1b693e1f9637d76c62abb1e6e7e78f3941c479dc3e2dfaa8a5c17fa
CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c661,2024-09-26T13:32:02.803000
CVE-2024-9125,0,0,4bf17e508e09bae08b4b8c10069fa346e7a680100ea6e1ec52201e0cb1be815b,2024-09-26T13:32:02.803000
CVE-2024-9127,0,0,a2d913b976807bfe9181864a651a87affe3eacf586bda2ed55716688386fa758,2024-09-26T13:32:02.803000
-CVE-2024-9130,0,0,eba8a21b8e5f4f1c3278b978fa9c1e7b11d6346074a962dd45e110d99d2ec027,2024-09-27T06:15:13.570000
-CVE-2024-9136,0,0,ba0aa3109f813b23fede3acd2c1a3889f7a4d72a995f937fa93d02af3e8a26a9,2024-09-27T11:15:13.150000
+CVE-2024-9130,0,1,5bd25b655f8e7a913dbf125185040ed90a768cc24bf73a5555fb1985c6ebc282,2024-09-30T12:46:20.237000
+CVE-2024-9136,0,1,3a2123a7313620918321ccc10071ef5907ddec267af09127e6959a072bce8ae3,2024-09-30T12:45:57.823000
CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000
CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000
CVE-2024-9148,0,0,a2b86d02d2dda10d9a4ece1fcb6c3b3948b7b33e22077676fb92f337dfc2bfe6,2024-09-26T13:32:02.803000
-CVE-2024-9155,0,0,1b0f8e094b1673c486612b7c024f78b2d5f340c1de061b10e95815d9098cc2cc,2024-09-26T15:15:18.060000
-CVE-2024-9160,0,0,715ee1443ce6e224602c969cbcd987ef5a27c7bcedffe295ef23dde41ba44f85,2024-09-27T19:15:10.733000
-CVE-2024-9166,0,0,929d4d086f95ac8f3df2b53abe6903284eaab50db26058949a84c11a8f2f55cf,2024-09-26T17:15:04.460000
+CVE-2024-9155,0,1,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000
+CVE-2024-9160,0,1,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000
+CVE-2024-9166,0,1,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000
CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000
CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000
CVE-2024-9173,0,0,2168d2731be3fe970ffc5ab950f08498fa3240b2ba08eefc5bcf00b7c10db164,2024-09-26T13:32:02.803000
-CVE-2024-9177,0,0,25f2d6e915a4acbc1b72f6f368b990d8f1018d61c410464c35b01ce7ed8ec208,2024-09-26T14:15:09.697000
-CVE-2024-9189,0,0,c94b870458a85f1fb676ae0d9e28df7c35aa469ab3b3e36f030359db84d8bb06,2024-09-28T02:15:10.860000
+CVE-2024-9177,0,1,538b136929b66f2da77b71c4f345460987a86315e3e44122bd269ab3a2a9e52e,2024-09-30T12:46:20.237000
+CVE-2024-9189,0,1,6fc70667b6c052aedd9065fd849720c6949b418d7c844ad831e0ce3249ae6d1c,2024-09-30T12:45:57.823000
CVE-2024-9198,0,0,dc0289b7baa714eeb93a27fa0b615eecbc27114f3616c98feb15bac80300ac00,2024-09-26T13:32:02.803000
CVE-2024-9199,0,0,3ca7b00968012de33482b7967da315774f8cea9a5b3070fbe655db855473b739,2024-09-26T13:32:02.803000
-CVE-2024-9202,0,0,5d3f2d6a33ba631f7d073198e169a0e32af3f18d36ba441e4605889790f358ed,2024-09-27T10:15:02.827000
-CVE-2024-9203,0,0,b3eb699cdc2242b8a267bc3eaa2cf9ccdee8ce0006004cfcc81cffc0cdf23309,2024-09-26T17:15:04.593000
+CVE-2024-9202,0,1,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000
+CVE-2024-9203,0,1,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000
CVE-2024-9268,0,0,7e7771d589d5219f5f8e1d4b856d8a4ecc833e195b34661fddc76da01954ef5a,2024-09-27T17:15:14.497000
CVE-2024-9273,0,0,d541667891e816199f828382e531f52a986321fd7f85b5856a4bc94c161620a8,2024-09-27T17:15:14.550000
-CVE-2024-9275,0,0,6bebcdc92872db9a9776b966b7829994144cd16473a7fe0a7c466b08b5f6ad63,2024-09-27T11:15:13.477000
-CVE-2024-9276,0,0,2cf75b1670ae2606d26d1435cd74bce525bf12e634f531162074c3a9fd3c7c76,2024-09-27T12:15:04.590000
-CVE-2024-9277,0,0,ec04fe753eee8ed7818abf01b73dcc860c29bf948c4c38797a452fce8113417c,2024-09-27T12:15:04.733000
-CVE-2024-9278,0,0,dc87e9b21a88b467ef6951489f3df167a6f2698a87bf34540b6f8d41c1a7f7d0,2024-09-27T11:15:14.877000
-CVE-2024-9279,0,0,ea949a7d6cfef3252e95b9f876f621c026806686480a2a483245588415753746,2024-09-27T12:15:04.857000
-CVE-2024-9280,0,0,fd07a0abd60c00c43ea242b9a30c0c6f1ba1b12d0f394c37d752db673f5c0152,2024-09-27T12:15:05.227000
-CVE-2024-9281,0,0,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d720942176920,2024-09-27T13:15:18.153000
-CVE-2024-9282,0,0,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000
-CVE-2024-9283,0,0,0dc135be53023bca555d778c9a31c3d6f3a80278eb8a9232d8da6a70571f147e,2024-09-27T14:15:05.330000
-CVE-2024-9284,0,0,a3f6be1f322902c2dd706322ffd372bfbe9b47cbadedd7cc30aad50104d2b033,2024-09-27T17:15:14.600000
-CVE-2024-9291,0,0,cb57967e7b1c1e3b6bbd39bdcccb61b556906a24da36a7110dece4902c704d59,2024-09-27T21:15:03.667000
-CVE-2024-9293,0,0,58d1b3c8bf6371fb336102f333c7989d6dbbcc39b37756484826d43b383204c0,2024-09-27T21:15:03.937000
-CVE-2024-9294,0,0,ecc4d06c597aa37fc99c049d1c5765db52fd8734fa53dc2d290464be84fc4820,2024-09-27T22:15:13.363000
-CVE-2024-9295,0,0,2059e80eecdba7e0e8296ba30a6d99f30eadea57334392b722bd6631f9d60107,2024-09-28T07:15:04.123000
-CVE-2024-9296,0,0,dded0f6e9e44e64bc57cf92e6d2ef3c1cf85d250453ac5cec64d525a4c889bac,2024-09-28T09:15:02.600000
-CVE-2024-9297,0,0,87c9d7f7ce642704ac841598cb2cfac6b587f0ff0236f8b054d46575b3d1ffd3,2024-09-28T12:15:10.780000
-CVE-2024-9298,0,0,2f4e6c82eec176574620d4340a003c33a2c20e43e1eb64c4140e5caefaeeb556,2024-09-28T14:15:02.020000
-CVE-2024-9299,0,0,799e3f49439baf2432b26834e94671a2c07ca8bcc110298b74e6fbc73a1e5279,2024-09-28T14:15:02.540000
-CVE-2024-9300,0,0,4aee81e48dbe8631e425ca1253bf1fefcd0e37e8736692eb326116d6964fe2c0,2024-09-28T15:15:14.263000
-CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000
-CVE-2024-9315,0,0,1aaf0b25bc5db159a5983cc16616c1ec4eda1359782a55e5468dbd7b3fd618c0,2024-09-28T19:15:12.353000
-CVE-2024-9316,0,0,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000
-CVE-2024-9317,0,0,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000
-CVE-2024-9318,0,0,359284304f599d5b46dabbdd36eaf80d2e0ebae0fa4900079642b914d1c2b0ed,2024-09-28T23:15:13.530000
-CVE-2024-9319,0,0,b2fe2ad1e388c2749f77abfa2db425092adbe510b046b9d6e937cbbe5cf1be69,2024-09-29T00:15:02.490000
-CVE-2024-9320,0,0,464590e46b839d984f0a0ad2d7ccb9c1f45a752e70158d32e6cd6caff1e1dfa8,2024-09-29T00:15:03.093000
-CVE-2024-9321,0,0,8d44d6a0220594c840d5ffc3b3d9aea21dff06cb8c335a9ed24bd3372a33185e,2024-09-29T01:15:10.380000
-CVE-2024-9322,0,0,725a94e9266d4e1943b03cefed3c8abd7d3b3d9a61735bdada8262937a361da3,2024-09-29T03:15:02.357000
-CVE-2024-9323,0,0,e4f7bfb3f916d3ca21cf9532e0cfe8d808536a11dc4c1c587e655cf9274a0f26,2024-09-29T07:15:02.260000
-CVE-2024-9324,0,0,4b665fd179fb332aa0fd75901b46bc0b25541a261194454a98b873a3c9b38268,2024-09-29T07:15:02.740000
-CVE-2024-9325,0,0,d4b02edb144e84234fbcaaa656a9201a16347a532cc3335ced6913e992031cec,2024-09-29T08:15:02.243000
-CVE-2024-9326,0,0,4f2956e49e05fd6cddacc774174e023a39dda4ef7c221926f06bc604bacf3d55,2024-09-29T08:15:02.547000
-CVE-2024-9327,0,0,ac3ac07735217a3cc0b474fff6a94f4cdd2cee34691ae427c5274690b54c662b,2024-09-29T11:15:11.083000
-CVE-2024-9328,0,0,b1aed10ed4eb0995b3f68eaee8d7b11ac99b61efd94387b3d283d3e0fa80e544,2024-09-29T23:15:13.067000
-CVE-2024-9329,0,0,103e8bc021364f65084f81291f6f1a44ad2cae4d25419a9b673c16a69da63610,2024-09-30T08:15:05.690000
+CVE-2024-9275,0,1,2d363e7e722e63cd2661e2a98149b3adb868d16d23141b985f0c74f5c5c9c2f4,2024-09-30T12:45:57.823000
+CVE-2024-9276,0,1,f734c634e0a6a6bec2ec58d8e7062cd3473bc99a18d0bd4e8d6373e8c6062747,2024-09-30T12:45:57.823000
+CVE-2024-9277,0,1,f1e655f47eee936d686b54fb8b9515ecc545b62a1b1d9dc4ecb649b1a6422fb1,2024-09-30T12:45:57.823000
+CVE-2024-9278,0,1,c98fcdf08646aa34f8340bebd0cc0bb33c3ae12e8654eff8d2a257bd74e720e1,2024-09-30T12:45:57.823000
+CVE-2024-9279,0,1,120a04e58ff2856b1c90656215ddc756b7c903dbeb054250ac7ba7fa5bad9d2a,2024-09-30T12:45:57.823000
+CVE-2024-9280,0,1,154585c0a1da4b9e6aecc43fd773bb8a235f7dbe7152a130bce56aa888f62393,2024-09-30T12:45:57.823000
+CVE-2024-9281,0,1,c535ba93d476c27150ada599110947211096684c7f9bbe8d00abfb427ea61a29,2024-09-30T12:45:57.823000
+CVE-2024-9282,0,1,28da861d055c9625e1f872cd5351aaa1e1bfe131c026ad30a30cf3906bc154e7,2024-09-30T12:45:57.823000
+CVE-2024-9283,0,1,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000
+CVE-2024-9284,0,1,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000
+CVE-2024-9291,0,1,b88fea8223aa63c1df245ec34d5a9ae6249acdcbf799f14cbc2ab52d8c1fa2a6,2024-09-30T12:45:57.823000
+CVE-2024-9293,0,1,cfc68c60c376b348e2db1dfc60e29304979c6f29bbb8e9627dd9fb163636b5c5,2024-09-30T12:45:57.823000
+CVE-2024-9294,0,1,df4e8ca812056069ce686ccc519c918f454c6a35b9074b986ab12abfbd42a42d,2024-09-30T12:45:57.823000
+CVE-2024-9295,0,1,b46872ee270db182385eaeb1edf15d8bee31b92680591a6ab090236c7a4ab480,2024-09-30T12:45:57.823000
+CVE-2024-9296,0,1,c187e09fb0f5123bdac32b5ca86228410de54d6a8c601379347e4bb97ee7fb47,2024-09-30T12:45:57.823000
+CVE-2024-9297,0,1,aeebb4652a4b72839667bc291226ba6b1738309d60bafae15a2198061f484a24,2024-09-30T12:45:57.823000
+CVE-2024-9298,0,1,f6a0d8d5b76d1aca4b69e13596b3400394f23f0dc87d91cebd3e86c263b5e909,2024-09-30T12:45:57.823000
+CVE-2024-9299,0,1,2773a88eca4ad2b201e410f54eb34e7be4ec55a7df5adc0de816905a9bc67c8b,2024-09-30T12:45:57.823000
+CVE-2024-9300,0,1,88b79df48ae91214ef2b5e7a373c5f9d2b02a0d6ce5a7c0140d5fcd61004ba7d,2024-09-30T12:45:57.823000
+CVE-2024-9301,0,1,73ba33e42a5a66e63775d86ddfdf57e7a04bcd9ceda925406fc4894f153c084a,2024-09-30T12:45:57.823000
+CVE-2024-9315,0,1,6afda6e8d97f7cdbf8ace9f41e8c225dffbff5865ed3f741b65fa4f76a307c30,2024-09-30T12:45:57.823000
+CVE-2024-9316,0,1,af6982dcd9c7f4909113b26e934c15a53c63fefb9a4ab04a604458d8e878131e,2024-09-30T12:45:57.823000
+CVE-2024-9317,0,1,3c9218a807df8c095b3daeae2a193534fba5ac123ab4c2c0d37100757693fc05,2024-09-30T12:45:57.823000
+CVE-2024-9318,0,1,26d3425e4d7d05aa0607b33516dfdeb37597a75580681987e253f316343c5958,2024-09-30T12:45:57.823000
+CVE-2024-9319,0,1,c9375b5a7e25bb44d0c4588d9ee9df500e304df3b025067bd6649ae6c5348368,2024-09-30T12:45:57.823000
+CVE-2024-9320,0,1,02e2fa96ad5c66ebca9446dcc0130b28d15e9af5b6c0023eef1b26d0995dfbb2,2024-09-30T12:45:57.823000
+CVE-2024-9321,0,1,096298945e9cc4eec972e9a41e1d6a6e0d493cc51946eb7b8a8f5bae2b2878af,2024-09-30T12:45:57.823000
+CVE-2024-9322,0,1,83622da96852f8160b7cb4de275a853d47028c78a856911661c52ce661f3230d,2024-09-30T12:45:57.823000
+CVE-2024-9323,0,1,d390da15614204ad49d970a50751af198b97149e872974d17f7a2863b22bd058,2024-09-30T12:45:57.823000
+CVE-2024-9324,0,1,d9b1c9975090056a56d06e6271867d8078cd6d8fe57f72ba6bd95d8f5b8dba93,2024-09-30T12:45:57.823000
+CVE-2024-9325,0,1,917db361764ac408fb00b54b0b65d73b76ab0f3d7d21087de757b7eb913d62a9,2024-09-30T12:45:57.823000
+CVE-2024-9326,0,1,bc58a26c9b43fcdd4054d9300d5d0cde5547399aaa29865b7fca11d142895d07,2024-09-30T12:45:57.823000
+CVE-2024-9327,0,1,789b0175cdbfabd0a2b291c27ea4b21dfccf76f50782f3eac2c88bada4dfe956,2024-09-30T12:45:57.823000
+CVE-2024-9328,0,1,039c805f27d68662103bc550331061850ab15ee7d6eac61ed5a2b4119b078e99,2024-09-30T12:45:57.823000
+CVE-2024-9329,0,1,98bed362b2a24e4db4311c4ce14eee7b5d7d3a2b87c87f5c94a31ac7bc8ac4f5,2024-09-30T12:45:57.823000