Auto-Update: 2024-11-14T13:01:00.990980+00:00

This commit is contained in:
cad-safe-bot 2024-11-14 13:04:02 +00:00
parent cbb2a8a5c4
commit 38f3dc1368
19 changed files with 1015 additions and 39 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-31666",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:16.083",
"lastModified": "2024-11-14T12:15:16.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Harbor fails to validate user permissions while deleting Webhook policies, allowing malicious users to view, update and delete Webhook policies of other users.\u00a0\u00a0The attacker could modify Webhook policies configured in other projects."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-8hwq-5f22-jfr3",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-31667",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:16.390",
"lastModified": "2024-11-14T12:15:16.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Harbor fails to validate the user permissions when updating a robot account that\u00a0belongs to a project that the authenticated user doesn\u2019t have access to.\u00a0\n\nBy sending a request that attempts to update a robot account, and specifying a robot\u00a0account id and robot account name that belongs to a different project that the user\u00a0doesn\u2019t have access to, it was possible to revoke the robot account permissions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-31668",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:16.607",
"lastModified": "2024-11-14T12:15:16.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Harbor fails to validate the user permissions when updating p2p preheat policies.\u00a0By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-31669",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:16.817",
"lastModified": "2024-11-14T12:15:16.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Harbor fails to validate the user permissions when updating tag immutability policies.\u00a0\n\nBy sending a request to update a tag immutability policy with an id that belongs to a\nproject that the currently authenticated user doesn\u2019t have access to, the attacker could\nmodify tag immutability policies configured in other projects."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-8c6p-v837-77f6",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-31670",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:17.040",
"lastModified": "2024-11-14T12:15:17.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Harbor fails to validate the user permissions when updating tag retention policies.\u00a0\n\nBy sending a request to update a tag retention policy with an id that belongs to a project\u00a0that the currently authenticated user doesn\u2019t have access to, the attacker could modify\ntag retention policies configured in other projects."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3637-v6vq-xqqw",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2022-31671",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:17.250",
"lastModified": "2024-11-14T12:15:17.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Harbor fails to validate user permissions when reading and updating job execution logs through the P2P preheat execution logs. By sending a request that attempts to read/update P2P preheat execution logs and specifying different job IDs, malicious authenticated users\u00a0could read all the job logs stored in the Harbor database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
"source": "security@vmware.com"
},
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-q76q-q8hw-hmpw",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2023-4134",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T11:15:03.730",
"lastModified": "2024-11-14T11:15:03.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad de use-after-free en el controlador cyttsp4_core del kernel de Linux. Este problema se produce en la rutina de limpieza del dispositivo debido a un posible rearme del watchdog_timer desde la cola de trabajo. Esto podr\u00eda permitir que un usuario local bloquee el sistema, lo que provocar\u00eda una denegaci\u00f3n de servicio. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4134",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221700",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2023-4458",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T12:15:17.487",
"lastModified": "2024-11-14T12:15:17.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4458",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325516",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-590/",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-10571",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-14T11:15:04.630",
"lastModified": "2024-11-14T11:15:04.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Chartify \u2013 WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
},
{
"lang": "es",
"value": "El complemento Chartify \u2013 WordPress Chart Plugin para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 2.9.5 incluida a trav\u00e9s del par\u00e1metro 'source'. Esto permite que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/chart-builder/tags/2.9.6/admin/partials/charts/actions/chart-builder-charts-actions-options.php?rev=3184238",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4837258-c749-4194-926c-22b67e20c1fc?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-3447",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T12:15:17.743",
"lastModified": "2024-11-14T12:15:17.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3447",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274123",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45099",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-14T12:15:17.980",
"lastModified": "2024-11-14T12:15:17.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security ReaQta 3.12 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.5,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7172212",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45642",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-14T12:15:18.323",
"lastModified": "2024-11-14T12:15:18.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security ReaQta 3.12 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-942"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7172212",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45670",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-14T12:15:18.570",
"lastModified": "2024-11-14T12:15:18.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security SOAR 51.0.1.0 and earlier contains a mechanism for users to recover or change their passwords without knowing the original password, but the user account must be compromised prior to the weak recovery mechanism."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7172206",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-7730",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T12:15:18.857",
"lastModified": "2024-11-14T12:15:18.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7730",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304289",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-8180",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-11-14T11:15:04.933",
"lastModified": "2024-11-14T11:15:04.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions from 17.3 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. Improper output encoding could lead to XSS if CSP is not enabled."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en GitLab CE/EE que afecta a todas las versiones desde la 17.3 hasta la 17.3.7, desde la 17.4 hasta la 17.4.4 y desde la 17.5 hasta la 17.5.2. Una codificaci\u00f3n de salida incorrecta podr\u00eda provocar un error XSS si no se habilita CSP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/#html-injection-in-vulnerability-code-flow-could-lead-to-xss-on-self-hosted-instances",
"source": "cve@gitlab.com"
},
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/480720",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2654010",
"source": "cve@gitlab.com"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.\n\n\nPalo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.\n\n\nThis issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:\n\n * 10.2.7-h12\n * 10.2.8-h10\n * 10.2.9-h9\n * 10.2.9-h11\n * 10.2.10-h2\n * 10.2.10-h3\n * 10.2.11\n * 10.2.11-h1\n * 10.2.11-h2\n * 10.2.11-h3\n * 11.1.2-h9\n * 11.1.2-h12\n * 11.1.3-h2\n * 11.1.3-h4\n * 11.1.3-h6\n * 11.2.2\n * 11.2.2-h1"
},
{
"lang": "es",
"value": "Una desreferencia de puntero nulo en el software PAN-OS de Palo Alto Networks en las plataformas de hardware de las series PA-800, PA-3200, PA-5200 y PA-7000 cuando la pol\u00edtica de descifrado est\u00e1 habilitada permite que un atacante no autenticado bloquee PAN-OS mediante el env\u00edo de tr\u00e1fico espec\u00edfico a trav\u00e9s del plano de datos, lo que genera una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Los intentos repetidos de activar esta condici\u00f3n har\u00e1n que PAN-OS entre en modo de mantenimiento. Las series VM, Cloud NGFW y Prisma Access de Palo Alto Networks no se ven afectados. Este problema solo afecta a las series PA-800, PA-3200, PA-5200 y PA-7000 que ejecutan estas versiones espec\u00edficas de PAN-OS: * 10.2.7-h12 * 10.2.8-h10 * 10.2.9-h9 * 10.2.9-h11 * 10.2.10-h2 * 10.2.10-h3 * 10.2.11 * 10.2.11-h1 * 10.2.11-h2 * 10.2.11-h3 * 11.1.2-h9 * 11.1.2-h12 * 11.1.3-h2 * 11.1.3-h4 * 11.1.3-h6 * 11.2.2 * 11.2.2-h1"
}
],
"metrics": {

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9693",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-11-14T11:15:05.210",
"lastModified": "2024-11-14T11:15:05.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.0 prior to 17.3.7, starting from 17.4 prior to 17.4.4, and starting from 17.5 prior to 17.5.2, which could have allowed unauthorized access to the Kubernetes agent in a cluster under specific configurations."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en GitLab CE/EE que afectaba a todas las versiones desde la 16.0 anterior a la 17.3.7, desde la 17.4 anterior a la 17.4.4 y desde la 17.5 anterior a la 17.5.2, lo que podr\u00eda haber permitido el acceso no autorizado al agente de Kubernetes en un cl\u00faster con configuraciones espec\u00edficas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/497449",
"source": "cve@gitlab.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-14T11:00:56.559636+00:00
2024-11-14T13:01:00.990980+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-14T10:15:09.423000+00:00
2024-11-14T12:15:18.857000+00:00
```
### Last Data Feed Release
@ -33,36 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
269664
269680
```
### CVEs added in the last Commit
Recently added CVEs: `17`
Recently added CVEs: `16`
- [CVE-2024-2550](CVE-2024/CVE-2024-25xx/CVE-2024-2550.json) (`2024-11-14T10:15:04.137`)
- [CVE-2024-2551](CVE-2024/CVE-2024-25xx/CVE-2024-2551.json) (`2024-11-14T10:15:04.547`)
- [CVE-2024-2552](CVE-2024/CVE-2024-25xx/CVE-2024-2552.json) (`2024-11-14T10:15:04.957`)
- [CVE-2024-38479](CVE-2024/CVE-2024-384xx/CVE-2024-38479.json) (`2024-11-14T10:15:05.347`)
- [CVE-2024-45253](CVE-2024/CVE-2024-452xx/CVE-2024-45253.json) (`2024-11-14T10:15:05.633`)
- [CVE-2024-45254](CVE-2024/CVE-2024-452xx/CVE-2024-45254.json) (`2024-11-14T10:15:06.207`)
- [CVE-2024-47914](CVE-2024/CVE-2024-479xx/CVE-2024-47914.json) (`2024-11-14T10:15:06.677`)
- [CVE-2024-47915](CVE-2024/CVE-2024-479xx/CVE-2024-47915.json) (`2024-11-14T10:15:07.067`)
- [CVE-2024-47916](CVE-2024/CVE-2024-479xx/CVE-2024-47916.json) (`2024-11-14T10:15:07.540`)
- [CVE-2024-50305](CVE-2024/CVE-2024-503xx/CVE-2024-50305.json) (`2024-11-14T10:15:08.013`)
- [CVE-2024-50306](CVE-2024/CVE-2024-503xx/CVE-2024-50306.json) (`2024-11-14T10:15:08.230`)
- [CVE-2024-5917](CVE-2024/CVE-2024-59xx/CVE-2024-5917.json) (`2024-11-14T10:15:08.607`)
- [CVE-2024-5918](CVE-2024/CVE-2024-59xx/CVE-2024-5918.json) (`2024-11-14T10:15:08.813`)
- [CVE-2024-5919](CVE-2024/CVE-2024-59xx/CVE-2024-5919.json) (`2024-11-14T10:15:09.027`)
- [CVE-2024-5920](CVE-2024/CVE-2024-59xx/CVE-2024-5920.json) (`2024-11-14T10:15:09.223`)
- [CVE-2024-7787](CVE-2024/CVE-2024-77xx/CVE-2024-7787.json) (`2024-11-14T09:15:28.200`)
- [CVE-2024-9472](CVE-2024/CVE-2024-94xx/CVE-2024-9472.json) (`2024-11-14T10:15:09.423`)
- [CVE-2022-31666](CVE-2022/CVE-2022-316xx/CVE-2022-31666.json) (`2024-11-14T12:15:16.083`)
- [CVE-2022-31667](CVE-2022/CVE-2022-316xx/CVE-2022-31667.json) (`2024-11-14T12:15:16.390`)
- [CVE-2022-31668](CVE-2022/CVE-2022-316xx/CVE-2022-31668.json) (`2024-11-14T12:15:16.607`)
- [CVE-2022-31669](CVE-2022/CVE-2022-316xx/CVE-2022-31669.json) (`2024-11-14T12:15:16.817`)
- [CVE-2022-31670](CVE-2022/CVE-2022-316xx/CVE-2022-31670.json) (`2024-11-14T12:15:17.040`)
- [CVE-2022-31671](CVE-2022/CVE-2022-316xx/CVE-2022-31671.json) (`2024-11-14T12:15:17.250`)
- [CVE-2023-4134](CVE-2023/CVE-2023-41xx/CVE-2023-4134.json) (`2024-11-14T11:15:03.730`)
- [CVE-2023-4458](CVE-2023/CVE-2023-44xx/CVE-2023-4458.json) (`2024-11-14T12:15:17.487`)
- [CVE-2024-10571](CVE-2024/CVE-2024-105xx/CVE-2024-10571.json) (`2024-11-14T11:15:04.630`)
- [CVE-2024-3447](CVE-2024/CVE-2024-34xx/CVE-2024-3447.json) (`2024-11-14T12:15:17.743`)
- [CVE-2024-45099](CVE-2024/CVE-2024-450xx/CVE-2024-45099.json) (`2024-11-14T12:15:17.980`)
- [CVE-2024-45642](CVE-2024/CVE-2024-456xx/CVE-2024-45642.json) (`2024-11-14T12:15:18.323`)
- [CVE-2024-45670](CVE-2024/CVE-2024-456xx/CVE-2024-45670.json) (`2024-11-14T12:15:18.570`)
- [CVE-2024-7730](CVE-2024/CVE-2024-77xx/CVE-2024-7730.json) (`2024-11-14T12:15:18.857`)
- [CVE-2024-8180](CVE-2024/CVE-2024-81xx/CVE-2024-8180.json) (`2024-11-14T11:15:04.933`)
- [CVE-2024-9693](CVE-2024/CVE-2024-96xx/CVE-2024-9693.json) (`2024-11-14T11:15:05.210`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-9472](CVE-2024/CVE-2024-94xx/CVE-2024-9472.json) (`2024-11-14T10:15:09.423`)
## Download and Usage

View File

@ -199591,7 +199591,13 @@ CVE-2022-31662,0,0,4716baf2173369b6ff3e13b07755ad4e0e453df4c6dc19303fe237ad32cf3
CVE-2022-31663,0,0,c250a0e102f60432d255e827fdd6db289d62d1a4e1292229b591504e22573b3c,2022-08-11T16:13:03.250000
CVE-2022-31664,0,0,8ae94e3e4b372e5f45259d81541342947ae361ebba4e6da89206986ea919de52,2023-08-08T14:22:24.967000
CVE-2022-31665,0,0,7a06345a1942d5d52d9b06c0ee41416d4ed2364fdc0d69c8a0c3f480ee888cbb,2022-08-11T16:14:08.620000
CVE-2022-31666,1,1,93d1afa53e2b5e8dd574073ccb898437a22ca265be8333512b7d05e6509f49bb,2024-11-14T12:15:16.083000
CVE-2022-31667,1,1,935dfca0b6ac3114c6c92c29854500f621ad40965dccc9fe68e985807237ba29,2024-11-14T12:15:16.390000
CVE-2022-31668,1,1,1a34cb3f8dee7d08cd0bf80d68a64e47937ab73a6d606a5fc18ccbd84cb45663,2024-11-14T12:15:16.607000
CVE-2022-31669,1,1,aae168e446b1b7b360056538dfe78a6cfcb29a95f62c1b7b749be0fd99d72e4d,2024-11-14T12:15:16.817000
CVE-2022-3167,0,0,47921e8a9cb97995d6f2ce8276ccf118a65fe4731d6ac6de65dd0ec114eec596,2022-09-14T15:32:08.950000
CVE-2022-31670,1,1,abeb6dc4aedfef2c517ff862d14065c92b5c07b435e7bbbe658b14725b3e6d9b,2024-11-14T12:15:17.040000
CVE-2022-31671,1,1,a228ea7ef75cbf94677ef050b31280cda6c7f9c0fe5f23cfbf5744b72bfa57cf,2024-11-14T12:15:17.250000
CVE-2022-31672,0,0,f935cb14a924ae93702f89793daf0806536a0ce42ff8289dde093642be80a068,2023-08-08T14:22:24.967000
CVE-2022-31673,0,0,da7dcaa4140053d84527543292fb585bb296fa966885cdf6f4d876302e1f87da,2023-08-08T14:21:49.707000
CVE-2022-31674,0,0,332df8a6563c46e3b27acddce953af7226cedea008975ba4b629bdb187c43e75,2022-08-15T18:56:24.003000
@ -231577,6 +231583,7 @@ CVE-2023-41336,0,0,b635acad925f51897708f1c284f31b52e812f930d0f8a69e729a597a376bd
CVE-2023-41337,0,0,15e5e52f40f65a0229a0cdd3d18e84b3f05954948f9735ee45da4880e8cdce6b,2023-12-19T19:10:12.043000
CVE-2023-41338,0,0,4ff13041d1d920a3e7cf920d32fc2747c67006ee742953739c10eeb93bb4c4dc,2023-09-12T19:12:29.057000
CVE-2023-41339,0,0,d5e9f04e6c95a3d0eb6da07191e971e3e5f23fc0a4622beb8f9610cba2e4c6d5,2023-10-31T19:53:57.670000
CVE-2023-4134,1,1,ce3f34903bbe3a1b32f01cc07034b778a77263d9eb3b998ba638b6d0499828bf,2024-11-14T11:15:03.730000
CVE-2023-41343,0,0,d014d94f0c954572fa228d52527071fd46ed723d95e2596289d617e9451c129a,2023-11-09T21:59:36.353000
CVE-2023-41344,0,0,fd945b61a59b0f15cf1f2c1695c5c3de41b28d458dedce455cfee4907f8e8504,2023-11-13T19:54:38.750000
CVE-2023-41345,0,0,ee8a523a2662b0bb570a5de5622ce7c196dfd6d4b60b13c44584d06fa25b5a77,2023-11-13T16:59:55.303000
@ -233829,6 +233836,7 @@ CVE-2023-4454,0,0,fb429f754193553b6975a0d32c55113a293441b320ca968748467aa80d3d24
CVE-2023-4455,0,0,20e2a71b7fd8a18a1114b92d93267c5ab15590b2a47c5b1f075ea92a982f3a49,2023-08-24T21:11:31.950000
CVE-2023-4456,0,0,369c0fad995b8264d64349ce435b2c1dc3089365795bdcd3741dfadaea65acc6,2023-11-07T04:22:38.447000
CVE-2023-4457,0,0,ee0b8eadfc3272ee478862dc9e8584d1b618758034c6a68efc19123317a2c60b,2023-10-20T15:17:32.870000
CVE-2023-4458,1,1,5c42a68b97724184291e899bb0d3a84117fb9f7533fba14f383a6e0777f4c2d6,2024-11-14T12:15:17.487000
CVE-2023-4459,0,0,ded88117b55c4284762f2f8393f20b576cf09dfb8895bd1c0d3f42fcb1ae428a,2024-04-25T14:15:09.507000
CVE-2023-4460,0,0,5fb802ae85625b42d8217a009e041c135e908761081f43a6b546052a002e9402,2024-10-01T16:35:12.403000
CVE-2023-4462,0,0,6ee35d095410fea9ab00663779e595263154c8235788b3e851e641d73c81658c,2024-05-17T02:31:35.497000
@ -242779,6 +242787,7 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
CVE-2024-10571,1,1,c0573ee024b89e8cb2673955332f8d3c3706906f08577458df0aac62f4e60965,2024-11-14T11:15:04.630000
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
CVE-2024-10575,0,0,d60bf0a0bfff7c064a609e35a84fef721491108a3e1293beb652d4120d21f4e8,2024-11-13T17:01:16.850000
CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000
@ -247964,7 +247973,7 @@ CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e
CVE-2024-25469,0,0,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000
CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000
CVE-2024-2548,0,0,40cde8752e3c8848aae41da66672115ef0cd24cbd123858c9556b9dd3342115f,2024-10-17T15:52:32.283000
CVE-2024-2550,1,1,5e86919977fb53ff2eff4e17809552931e33dd8e013f78df883f54e1d97b0b78,2024-11-14T10:15:04.137000
CVE-2024-2550,0,0,5e86919977fb53ff2eff4e17809552931e33dd8e013f78df883f54e1d97b0b78,2024-11-14T10:15:04.137000
CVE-2024-25501,0,0,53c57009bf13ac9e81165c240313efc6336b1030bc10f61986ac8903ee95ed6c,2024-08-27T20:35:14.160000
CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000
CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000
@ -247972,7 +247981,7 @@ CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e
CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000
CVE-2024-25508,0,0,90339bb48fc1cfbfbe04d77c441539b4eb12357264469da7dce73e670017a9bc,2024-08-01T20:35:25.160000
CVE-2024-25509,0,0,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000
CVE-2024-2551,1,1,1d814e7cd17a2a7cb6f0b91456c56fa6cef3d08af17516e4c4b24379d0b802a9,2024-11-14T10:15:04.547000
CVE-2024-2551,0,0,1d814e7cd17a2a7cb6f0b91456c56fa6cef3d08af17516e4c4b24379d0b802a9,2024-11-14T10:15:04.547000
CVE-2024-25510,0,0,861a29eb687c50c63d985cbe3b942fd6dcb2a5ed2f01fa956e441eba24a1e618,2024-07-03T01:48:53.193000
CVE-2024-25511,0,0,45841a27c05abdda5e88c8662dccb1b2ce0612679a4549ee5889dfadc7c35b1c,2024-07-03T01:48:53.997000
CVE-2024-25512,0,0,30e70416daf9bc731aa2cc10d3309e50db92ad7a3860e9d31d00559db96a5244,2024-07-03T01:48:54.810000
@ -247982,7 +247991,7 @@ CVE-2024-25515,0,0,9552fe583425297ae50d0d3fb3aef41d1ff7ccab24982b4401e1de2eb3120
CVE-2024-25517,0,0,2d5bfca64a87833b4bf7fcaafb0e1c6c75a7c73d9c79ee7ef678b3593647ad5d,2024-07-03T01:48:58.093000
CVE-2024-25518,0,0,4f656721efc43904c6c1b7982efa8acf36cdc63eca4dc6a739fe56633964cd05,2024-07-03T01:48:58.917000
CVE-2024-25519,0,0,1e9856bf69a42caa8c87d9efc940250a43a6d8133746dd534ead5365966d2794,2024-07-03T01:48:59.717000
CVE-2024-2552,1,1,8db340bdef42e1446619888f064f8ea116f96e25972de2c22775973aeb619fc3,2024-11-14T10:15:04.957000
CVE-2024-2552,0,0,8db340bdef42e1446619888f064f8ea116f96e25972de2c22775973aeb619fc3,2024-11-14T10:15:04.957000
CVE-2024-25520,0,0,ef18d590b5f58eb9bb7ec3b39fa017b59c50accc89216dbff8503dbc68a15ded,2024-07-03T01:49:00.550000
CVE-2024-25521,0,0,92b6345ac0bc5186de3acc2eb108650c8fdf5ebf11f9b3b43771a2e77e69def2,2024-07-03T01:49:01.367000
CVE-2024-25522,0,0,20bcbb11d104068e82316fe242ad3d32a079fcd34efa7624e69f8b13b3bb1c9c,2024-07-03T01:49:02.173000
@ -254723,6 +254732,7 @@ CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411
CVE-2024-34467,0,0,903bd38a14a72c5e31ca95b7f024225144ec2f1cfed11b0213915da81da29f0c,2024-08-16T19:35:11.493000
CVE-2024-34468,0,0,b164ab2b609bf8b9d79a88576e6595ba967431973eb7a086f2ba71149d9690e8,2024-05-06T12:44:56.377000
CVE-2024-34469,0,0,c68e04abdf928312d44ac341a209cf5378ddee40d6b8b27a9211f964972de340,2024-08-01T13:52:22.830000
CVE-2024-3447,1,1,ac8d540e8e074eb9e1d447a69aba75608690bbc7caea682160f4ae74862ba7cf,2024-11-14T12:15:17.743000
CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16af48,2024-07-03T02:00:10.887000
CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000
CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000
@ -257738,7 +257748,7 @@ CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f203504
CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000
CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000
CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000
CVE-2024-38479,1,1,ae8d4fe4cee56e3fa0df61bc7ba838dbd35927401f04ef96a32b3fc49065681c,2024-11-14T10:15:05.347000
CVE-2024-38479,0,0,ae8d4fe4cee56e3fa0df61bc7ba838dbd35927401f04ef96a32b3fc49065681c,2024-11-14T10:15:05.347000
CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000
CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000
CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000
@ -262123,6 +262133,7 @@ CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c5455
CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000
CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000
CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000
CVE-2024-45099,1,1,e1f7554d7008461bbb4f440ce7777acd35ccd117526f34ce5d56e7eb080ede19,2024-11-14T12:15:17.980000
CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000
CVE-2024-45101,0,0,cad1255565408251227b424af7803fa7b621bb0a87132fd60fe56f4ddc9639ef,2024-09-14T11:47:14.677000
CVE-2024-45103,0,0,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000
@ -262251,8 +262262,8 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d
CVE-2024-45250,0,0,e9b56e111bbc8f345e771d0d97f6c666ffbfb94747161b5a547dc2214faeb00b,2024-10-07T17:47:48.410000
CVE-2024-45251,0,0,4723402deaff257a03485bee19d0c63cf2e4218538079529007db41f2e86ba8e,2024-10-07T17:47:48.410000
CVE-2024-45252,0,0,d5507db1b0bfef3e2d4dc8033cbb1d8a5c92c659f9cc4356d3a7d9eed6325773,2024-10-07T17:47:48.410000
CVE-2024-45253,1,1,9c844f8b6482daf2c9e9c619f77138672c77c72437fed22b52ea10fbc4c2f52c,2024-11-14T10:15:05.633000
CVE-2024-45254,1,1,d077d3a82c20cb66140b9ebe698ba5da6c884bf474a50526bde47dfe1280eaff,2024-11-14T10:15:06.207000
CVE-2024-45253,0,0,9c844f8b6482daf2c9e9c619f77138672c77c72437fed22b52ea10fbc4c2f52c,2024-11-14T10:15:05.633000
CVE-2024-45254,0,0,d077d3a82c20cb66140b9ebe698ba5da6c884bf474a50526bde47dfe1280eaff,2024-11-14T10:15:06.207000
CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000
CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000
CVE-2024-45259,0,0,5969bc7c5f33ec37926b142b968946029edbf5a989ec1eaf52aded1cc1f71bb1,2024-10-28T20:35:13.597000
@ -262487,10 +262498,12 @@ CVE-2024-45624,0,0,7a0e35c55ac45641bb752e88253516bf9e2f94ec9e17765278ecb76cea70f
CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44b6a,2024-09-10T11:19:40.113000
CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000
CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000
CVE-2024-45642,1,1,a563b90e1d94665aa870097dba4a01ca73a67305095ae38b5397dd7a59c4707b,2024-11-14T12:15:18.323000
CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000
CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8cf5,2024-10-29T14:34:04.427000
CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
CVE-2024-45670,1,1,851960da2818a1988b138d527b50d6f0503f315beb4f5bb4d2af5048acfa6e20,2024-11-14T12:15:18.570000
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
@ -263885,9 +263898,9 @@ CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae10
CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000
CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b38510fd,2024-10-23T15:12:34.673000
CVE-2024-47913,0,0,7cee4e2f0a703b60f4905ba90942e3ad4333a4649dfd698a2259843e49767bfc,2024-10-07T17:48:28.117000
CVE-2024-47914,1,1,5c1a1c65fd01e6bd94989accfa4c1506f1cf9f8b5a1a5bd5806c7686a7627eb7,2024-11-14T10:15:06.677000
CVE-2024-47915,1,1,60eddd3046b360d3289fe3509ac1bfe6bb4b437174540ba79ec51a82b1079af5,2024-11-14T10:15:07.067000
CVE-2024-47916,1,1,2b9b1008ac9b5bf6818ff9dfb5cda417cc71c0062d59e5e2b8d800f5df2ee80b,2024-11-14T10:15:07.540000
CVE-2024-47914,0,0,5c1a1c65fd01e6bd94989accfa4c1506f1cf9f8b5a1a5bd5806c7686a7627eb7,2024-11-14T10:15:06.677000
CVE-2024-47915,0,0,60eddd3046b360d3289fe3509ac1bfe6bb4b437174540ba79ec51a82b1079af5,2024-11-14T10:15:07.067000
CVE-2024-47916,0,0,2b9b1008ac9b5bf6818ff9dfb5cda417cc71c0062d59e5e2b8d800f5df2ee80b,2024-11-14T10:15:07.540000
CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
CVE-2024-47939,0,0,fb0122088811efc1ccf3ce2b970c428eb00ae94db66e7aa25ff544122afe9a3d,2024-11-01T12:57:03.417000
@ -265165,8 +265178,8 @@ CVE-2024-50261,0,0,b4e106f44d4a2eb815d0dd8f540fce25308f032b907e878b88914bfdb4dcb
CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000
CVE-2024-50263,0,0,2e071cb68f4a0777e46edaa767663e26ff7c76ecb6dc8a74b30d3bdec9f4ef8b,2024-11-12T13:55:21.227000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-50305,1,1,32cba8395bb8f36501f7e711a4f56600fb80cd2e3ef145d3ce8fad1597b52437,2024-11-14T10:15:08.013000
CVE-2024-50306,1,1,727b7f8b36ac152cbb0b1c517b3517041fae26c484de46eade41a6fc95da4194,2024-11-14T10:15:08.230000
CVE-2024-50305,0,0,32cba8395bb8f36501f7e711a4f56600fb80cd2e3ef145d3ce8fad1597b52437,2024-11-14T10:15:08.013000
CVE-2024-50306,0,0,727b7f8b36ac152cbb0b1c517b3517041fae26c484de46eade41a6fc95da4194,2024-11-14T10:15:08.230000
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000
@ -266578,10 +266591,10 @@ CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b
CVE-2024-5914,0,0,5ab56ff6e03c38766463339097d3da51e1161518db555649197f85ab7972331e,2024-08-20T16:22:06.357000
CVE-2024-5915,0,0,02c85b3460ff280d15df03319450806b3e5d30c71b9189b0ecc887e95a66b96e,2024-08-20T16:23:10.493000
CVE-2024-5916,0,0,5c958efb87a06f0a35735b489fd355d0842ab659e7fda78c1c111ac292a5fa45,2024-08-20T19:30:11.980000
CVE-2024-5917,1,1,8312a0373c8ae07af5f5ff1c9de2dc34bf27ce28cb7dc87b5ceb7bc0541ae223,2024-11-14T10:15:08.607000
CVE-2024-5918,1,1,601111e345cc602a705aa6e6333f879bc4848188533dab44825b2b0c4edbdab0,2024-11-14T10:15:08.813000
CVE-2024-5919,1,1,ef37f8c39509464f0f0ee3958c2bb090e15db003bf1922feacaacba6b6b1823e,2024-11-14T10:15:09.027000
CVE-2024-5920,1,1,d8577d51641e20a781d4d81162248086899f1355b1a3025dae0803d61f107939,2024-11-14T10:15:09.223000
CVE-2024-5917,0,0,8312a0373c8ae07af5f5ff1c9de2dc34bf27ce28cb7dc87b5ceb7bc0541ae223,2024-11-14T10:15:08.607000
CVE-2024-5918,0,0,601111e345cc602a705aa6e6333f879bc4848188533dab44825b2b0c4edbdab0,2024-11-14T10:15:08.813000
CVE-2024-5919,0,0,ef37f8c39509464f0f0ee3958c2bb090e15db003bf1922feacaacba6b6b1823e,2024-11-14T10:15:09.027000
CVE-2024-5920,0,0,d8577d51641e20a781d4d81162248086899f1355b1a3025dae0803d61f107939,2024-11-14T10:15:09.223000
CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000
CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802bd,2024-06-17T12:43:31.090000
CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000
@ -268106,6 +268119,7 @@ CVE-2024-7725,0,0,0aa115eb5d51c7a8f3b04c61085136493dcca84fb2460c54ba86db4138dcdd
CVE-2024-7727,0,0,210da2d03590f7837e73d2a797749f40cf37c3d8121af3fa52cb49298f27dd84,2024-09-18T18:07:55.450000
CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000
CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000
CVE-2024-7730,1,1,a634741f495e3ec408272e754c9efb333594cc9ebc6a1fdfa7605f286255efbe,2024-11-14T12:15:18.857000
CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000
CVE-2024-7732,0,0,301f49d15dd3186d40aa3031630ea252f10589d241790753d1277daa7600dd48,2024-10-03T18:39:20.227000
CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000
@ -268147,7 +268161,7 @@ CVE-2024-7783,0,0,39c8808c8c931a81ab6f36457422df672bce6f594a7e28cbb717d3fa5f5b7d
CVE-2024-7784,0,0,7e942e70a98522ec84a0bbfc9f820ed1b39966f32999b97410584854b83e96dc,2024-11-08T09:15:08.083000
CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000
CVE-2024-7786,0,0,fc116ee7a384561ad006648b89134c44e9184040e8b317407aecf4e96010cf80,2024-10-07T17:46:08.943000
CVE-2024-7787,1,1,79ae0a178ab0d95375d06015f2f8124773b17fc844e5199caeeee900f5e4fd10,2024-11-14T09:15:28.200000
CVE-2024-7787,0,0,79ae0a178ab0d95375d06015f2f8124773b17fc844e5199caeeee900f5e4fd10,2024-11-14T09:15:28.200000
CVE-2024-7788,0,0,70ac00bf2f1b71d3cd198f79846cc3aedcbc03d7b166d0d3297938d6d80c8e0c,2024-09-25T19:56:45.847000
CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000
CVE-2024-7791,0,0,7416656b44e86a668ddf90bfa89c01f36bde25a07c507963ab58656b2d115a3d,2024-08-27T13:01:37.913000
@ -268458,6 +268472,7 @@ CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd8
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e5b,2024-09-26T13:32:02.803000
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
CVE-2024-8180,1,1,3f527220eaed68bc730314de70b8de4960a606f59b9267ff7aee238c3ece9a2a,2024-11-14T11:15:04.933000
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8184,0,0,92c1db6b8911f83c9668ff411c9a02657286363b11f9f1292cd97f0715f9d11d,2024-11-08T21:00:09.857000
@ -269353,7 +269368,7 @@ CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e924
CVE-2024-9469,0,0,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000
CVE-2024-9470,0,0,13c3a583553fbf2e90723a5a0ed6f2354808c5a1753993b658aba04d0ed9b282,2024-10-10T12:51:56.987000
CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000
CVE-2024-9472,1,1,5a5c8ff54e790973f95e3d96fd46657726d5bdf29433beef2a8f42fc4d72a67e,2024-11-14T10:15:09.423000
CVE-2024-9472,0,1,dc9ffbb1de0e29c95cab92cb460779413a192268196ad2222d33e0638a30bd5d,2024-11-14T10:15:09.423000
CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000
CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000
CVE-2024-9476,0,0,c74fb00e254178958964ec01cef72d6ba991350b2ce7f9bcc28af446dec9cb13,2024-11-13T17:15:12.747000
@ -269486,6 +269501,7 @@ CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a06
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
CVE-2024-9689,0,0,8f8c579186810d2b61eae71f3a64a7543fcf1895acd4679afad8157c388bec86,2024-11-07T20:35:16.807000
CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000
CVE-2024-9693,1,1,c6ea5ba17df453e037e2d4723b967aff1042a36b3e7f6b3b7751a1a0eb47d0a9,2024-11-14T11:15:05.210000
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000
CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000

Can't render this file because it is too large.