Auto-Update: 2024-10-24T22:00:18.909139+00:00

This commit is contained in:
cad-safe-bot 2024-10-24 22:03:20 +00:00
parent fdb76a4aa0
commit 47316cb78f
55 changed files with 2101 additions and 349 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48958",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:07.270",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T20:00:34.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,199 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ethernet: aeroflex: se corrige una posible fuga de skb en greth_init_rings() La funci\u00f3n greth_init_rings() no liberar\u00e1 el skb reci\u00e9n asignado cuando dma_mapping_error() devuelva un error, por lo que se debe agregar dev_kfree_skb() para corregirlo. Solo se prob\u00f3 la compilaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.34",
"versionEndExcluding": "4.9.336",
"matchCriteriaId": "DE72942B-2F89-4BEA-A298-C2FA7DCC6DB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.302",
"matchCriteriaId": "FB3E1F82-01A3-456E-9C83-D567B9A75815"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.269",
"matchCriteriaId": "1185B8E3-712E-4BFB-BD01-78D47F7EF1F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.227",
"matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.159",
"matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.83",
"matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.13",
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/063a932b64db3317ec020c94466fe52923a15f60",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/223654e2e2c8d05347cd8e300f8d1ec6023103dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/87277bdf2c370ab2d07cfe77dfa9b37f82bbe1e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/99669d94ce145389f1d6f197e6e18ed50d43fb76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bfaa8f6c5b84b295dd73b0138b57c5555ca12b1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c7adcbd0fd3fde1b19150c3e955fb4a30c5bd9b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb1e293f858e5e1152b8791047ed4bdaaf392189",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dd62867a6383f78f75f07039394aac25924a3307",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48961",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:07.887",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T20:02:22.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,129 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mdio: arregla el recuento de referencias de fwnode no balanceado en mdio_device_release() Hay un informe de advertencia sobre una fuga de recuento de referencias de of_node mientras se sondea el dispositivo mdio: OF: ERROR: fuga de memoria, se esperaba un recuento de referencias de 1 en lugar de 2, of_node_get()/of_node_put() no balanceado - destruye la entrada de cset: adjunta el nodo superpuesto /spi/soc@0/mdio@710700c0/ethernet@4 En of_mdiobus_register_device(), aumentamos el recuento de referencias de fwnode mediante fwnode_handle_get() antes de asociar el of_node con el dispositivo mdio, pero nunca se ha reducido en la ruta normal. Desde entonces, en mdio_device_release(), necesita llamar a fwnode_handle_put() adem\u00e1s en lugar de llamar a kfree() directamente. Despu\u00e9s de lo anterior, simplemente llamar a mdio_device_free() en la ruta del controlador de errores de of_mdiobus_register_device() es suficiente para mantener el recuento de referencias equilibrado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "5.15.83",
"matchCriteriaId": "73BF1A37-67E4-474D-84C2-1BDDFC244D25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.13",
"matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/16854177745a5648f8ec322353b432e18460f43a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a5c6de1a6656b8cc6bce7cb3d9874dd7df4968c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb37617687f2bfa5b675df7779f869147c9002bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29929",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-21T18:15:09.173",
"lastModified": "2024-08-22T21:15:15.840",
"lastModified": "2024-10-24T20:35:02.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-121"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38334",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-20T18:15:12.170",
"lastModified": "2023-07-31T18:42:53.743",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-24T21:35:02.113",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38335",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-20T18:15:12.227",
"lastModified": "2023-07-31T18:42:46.760",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-24T21:35:04.503",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49233",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T17:15:14.400",
"lastModified": "2024-09-03T21:35:04.420",
"lastModified": "2024-10-24T20:35:03.457",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-522"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:11.923",
"lastModified": "2024-08-13T14:35:00.967",
"lastModified": "2024-10-24T20:35:04.223",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,18 +39,6 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.sonos.com/en-us/security-advisory-2024-0001",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10327",
"sourceIdentifier": "psirt@okta.com",
"published": "2024-10-24T21:15:11.730",
"lastModified": "2024-10-24T21:15:11.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Okta Verify for iOS versions 9.25.1 (beta) and 9.27.0 (including beta) allows push notification responses through the iOS ContextExtension feature allowing the authentication to proceed regardless of the user\u2019s selection. When a user long-presses the notification banner and selects an option, both options allow the authentication to succeed. \nThe ContextExtension feature is one of several push mechanisms available when using Okta Verify Push on iOS devices. The vulnerable flows include: \n* When a user is presented with a notification on a locked screen, the user presses on the notification directly and selects their reply without unlocking the device; \n* When a user is presented with a notification on the home screen and drags the notification down and selects their reply; \n* When an Apple Watch is used to reply directly to a notification. \n\n A pre-condition for this vulnerability is that the user must have enrolled in Okta Verify while the Okta customer was using Okta Classic. This applies irrespective of whether the organization has since upgraded to Okta Identity Engine."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@okta.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@okta.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://help.okta.com/en-us/content/topics/releasenotes/okta-verify-release-notes.htm#panel2",
"source": "psirt@okta.com"
},
{
"url": "https://trust.okta.com/security-advisories/okta-verify-for-ios-cve-2024-10327/",
"source": "psirt@okta.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21687",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-07-16T21:15:10.257",
"lastModified": "2024-08-01T13:46:48.050",
"lastModified": "2024-10-24T20:35:05.307",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,18 +39,6 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34734",
"sourceIdentifier": "security@android.com",
"published": "2024-08-15T22:15:06.337",
"lastModified": "2024-08-19T13:00:23.117",
"lastModified": "2024-10-24T20:35:05.433",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-453"
"value": "CWE-1188"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36130",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-08-07T04:17:17.967",
"lastModified": "2024-08-12T18:52:50.947",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-24T20:35:06.217",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -71,16 +71,6 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36877",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T16:15:15.300",
"lastModified": "2024-08-15T16:15:19.160",
"lastModified": "2024-10-24T20:35:06.353",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,18 +39,6 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-123"
}
]
}
],
"references": [
{
"url": "https://csr.msi.com/global/product-security-advisories",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40531",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T16:15:36.800",
"lastModified": "2024-08-28T19:15:08.797",
"lastModified": "2024-10-24T20:35:06.753",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,18 +39,6 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://critical.lt/blog/authorization-bypass-and-mass-assignment-in-pantera-crm/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41250",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T17:15:51.837",
"lastModified": "2024-08-08T21:35:16.680",
"lastModified": "2024-10-24T20:35:06.947",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,16 +69,6 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41251",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-07T16:15:45.850",
"lastModified": "2024-08-08T20:35:09.980",
"lastModified": "2024-10-24T20:35:07.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,16 +69,6 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42815",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-19T20:15:07.193",
"lastModified": "2024-09-03T21:15:16.197",
"lastModified": "2024-10-24T20:35:07.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-121"
"value": "CWE-787"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42966",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:20.130",
"lastModified": "2024-08-19T19:35:09.913",
"lastModified": "2024-10-24T20:35:08.087",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-863"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42977",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:20.860",
"lastModified": "2024-08-19T20:35:17.330",
"lastModified": "2024-10-24T20:35:08.860",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-121"
"value": "CWE-787"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42986",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-15T17:15:21.717",
"lastModified": "2024-08-19T21:35:07.937",
"lastModified": "2024-10-24T20:35:09.653",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-121"
"value": "CWE-787"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-45242",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T20:15:04.243",
"lastModified": "2024-10-24T20:15:04.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EnGenius ENH1350EXT A8J-ENH1350EXT devices through 3.9.3.2_c1.9.51 allow (blind) OS Command Injection via shell metacharacters to the Ping or Speed Test utility. During the time of initial setup, the device creates an open unsecured network whose admin panel is configured with the default credentials of admin/admin. An unauthorized attacker in proximity to the Wi-Fi network can exploit this window of time to execute arbitrary OS commands with root-level permissions."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-45242",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-45242_Extended_Report.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45259",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T20:15:04.323",
"lastModified": "2024-10-24T20:15:04.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Delete%20Any%20File%20via%20Download%20Interface.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45260",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:11.977",
"lastModified": "2024-10-24T21:15:11.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Unauthorized%20Access%20to%20File%20Download%20and%20Upload%20Interfaces.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45261",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:12.057",
"lastModified": "2024-10-24T21:15:12.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypassing%20Login%20Mechanism%20with%20Passwordless%20User%20Login.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45262",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:12.143",
"lastModified": "2024-10-24T21:15:12.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Improper%20Pathname%20Restriction%20Leading%20to%20Path%20Traversal%20in%20Restricted%20Directories.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-45263",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:12.217",
"lastModified": "2024-10-24T21:15:12.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-47878",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:12.293",
"lastModified": "2024-10-24T21:15:12.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `/extension/gdata/authorized` endpoint includes the `state` GET parameter verbatim in a `<script>` tag in the output, so without escaping. An attacker could lead or redirect a user to a crafted URL containing JavaScript code, which would then cause that code to be executed in the victim's browser as if it was part of OpenRefine. Version 3.8.3 fixes this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenRefine/OpenRefine/commit/10bf0874d67f1018a58b3732332d76b840192fea",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-pw3x-c5vp-mfc3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47879",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:12.523",
"lastModified": "2024-10-24T21:15:12.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, lack of cross-site request forgery protection on the `preview-expression` command means that visiting a malicious website could cause an attacker-controlled expression to be executed. The expression can contain arbitrary Clojure or Python code. The attacker must know a valid project ID of a project that contains at least one row, and the attacker must convince the victim to open a malicious webpage. Version 3.8.3 fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenRefine/OpenRefine/commit/090924ca923489b6c94397cf1f5df7f7f78f0126",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-3jm4-c6qf-jrh3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47880",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:12.750",
"lastModified": "2024-10-24T21:15:12.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the `export-rows` command can be used in such a way that it reflects part of the request verbatim, with a Content-Type header also taken from the request. An attacker could lead a user to a malicious page that submits a form POST that contains embedded JavaScript code. This code would then be included in the response, along with an attacker-controlled `Content-Type` header, and so potentially executed in the victim's browser as if it was part of OpenRefine. The attacker-provided code can do anything the user can do, including deleting projects, retrieving database passwords, or executing arbitrary Jython or Closure expressions, if those extensions are also present. The attacker must know a valid project ID of a project that contains at least one row. Version 3.8.3 fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-348"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenRefine/OpenRefine/commit/8060477fa53842ebabf43b63e039745932fa629d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-79jv-5226-783f",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-47881",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:12.957",
"lastModified": "2024-10-24T21:15:12.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenRefine is a free, open source tool for working with messy data. Starting in version 3.4-beta and prior to version 3.8.3, in the `database` extension, the \"enable_load_extension\" property can be set for the SQLite integration, enabling an attacker to load (local or remote) extension DLLs and so run arbitrary code on the server. The attacker needs to have network access to the OpenRefine instance. Version 3.8.3 fixes this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenRefine/OpenRefine/commit/853a1d91662e7dc278a9a94a38be58de04494056",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-87cf-j763-vvh8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-47882",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:13.160",
"lastModified": "2024-10-24T21:15:13.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenRefine is a free, open source tool for working with messy data. Prior to version 3.8.3, the built-in \"Something went wrong!\" error page includes the exception message and exception traceback without escaping HTML tags, enabling injection into the page if an attacker can reliably produce an error with an attacker-influenced message. It appears that the only way to reach this code in OpenRefine itself is for an attacker to somehow convince a victim to import a malicious file, which may be difficult. However, out-of-tree extensions may add their own calls to `respondWithErrorPage`. Version 3.8.3 has a fix for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-81"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenRefine/OpenRefine/blob/master/main/webapp/modules/core/error.vt#L52-L53",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenRefine/OpenRefine/commit/85594e75e7b36025f7b6a67dcd3ec253c5dff8c2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-j8hp-f2mj-586g",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-47883",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:13.430",
"lastModified": "2024-10-24T21:15:13.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OpenRefine fork of the MIT Simile Butterfly server is a modular web application framework. The Butterfly framework uses the `java.net.URL` class to refer to (what are expected to be) local resource files, like images or templates. This works: \"opening a connection\" to these URLs opens the local file. However, prior to version 1.2.6, if a `file:/` URL is directly given where a relative path (resource name) is expected, this is also accepted in some code paths; the app then fetches the file, from a remote machine if indicated, and uses it as if it was a trusted part of the app's codebase. This leads to multiple weaknesses and potential weaknesses. An attacker that has network access to the application could use it to gain access to files, either on the the server's filesystem (path traversal) or shared by nearby machines (server-side request forgery with e.g. SMB). An attacker that can lead or redirect a user to a crafted URL belonging to the app could cause arbitrary attacker-controlled JavaScript to be loaded in the victim's browser (cross-site scripting). If an app is written in such a way that an attacker can influence the resource name used for a template, that attacker could cause the app to fetch and execute an attacker-controlled template (remote code execution). Version 1.2.6 contains a patch."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-36"
},
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenRefine/simile-butterfly/commit/537f64bfa72746f8b21d4bda461fad843435319c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenRefine/simile-butterfly/security/advisories/GHSA-3p8v-w8mr-m3x8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48208",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:14.040",
"lastModified": "2024-10-24T21:15:14.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pure-ftpd before 1.0.52 is vulnerable to Buffer Overflow. There is an out of bounds read in the domlsd() function of the ls.c file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jedisct1/pure-ftpd/pull/176",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48423",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:14.143",
"lastModified": "2024-10-24T21:15:14.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/assimp/assimp/issues/5788",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48424",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:14.223",
"lastModified": "2024-10-24T21:15:14.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap-buffer-overflow vulnerability has been identified in the OpenDDLParser::parseStructure function within the Assimp library, specifically during the processing of OpenGEX files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/assimp/assimp/issues/5787",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48425",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:14.303",
"lastModified": "2024-10-24T21:15:14.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/assimp/assimp/issues/5791",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48426",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T21:15:14.387",
"lastModified": "2024-10-24T21:15:14.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971)."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/assimp/assimp/issues/5789",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48454",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T19:15:15.803",
"lastModified": "2024-10-24T19:15:15.803",
"lastModified": "2024-10-24T21:35:05.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in SourceCodester Purchase Order Management System v1.0 allows a remote attacker to execute arbitrary code via the /admin?page=user component"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/N0zoM1z0/CVEs/blob/main/CVE-2024-48454.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48538",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T16:15:05.210",
"lastModified": "2024-10-24T16:15:05.210",
"lastModified": "2024-10-24T20:35:10.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Incorrect access control in the firmware update and download processes of Neye3C v4.5.2.0 allows attackers to access sensitive information by analyzing the code and data within the APK file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "http://neye3c.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48539",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T17:15:16.873",
"lastModified": "2024-10-24T17:15:16.873",
"lastModified": "2024-10-24T20:35:11.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Neye3C v4.5.2.0 was discovered to contain a hardcoded encryption key in the firmware update mechanism."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "http://neye3c.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48544",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T17:15:17.257",
"lastModified": "2024-10-24T17:15:17.257",
"lastModified": "2024-10-24T21:35:06.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Incorrect access control in the firmware update and download processes of Sylvania Smart Home v3.0.3 allows attackers to access sensitive information by analyzing the code and data within the APK file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "http://sylvania.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48548",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T17:15:17.663",
"lastModified": "2024-10-24T17:15:17.663",
"lastModified": "2024-10-24T21:35:07.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://cloudsmartlock.com/m/app.html",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-48931",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:14.580",
"lastModified": "2024-10-24T21:15:14.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the ZimaOS API endpoint `http://<Zima_Server_IP:PORT>/v3/file?token=<token>&files=<file_path>` is vulnerable to arbitrary file reading due to improper input validation. By manipulating the `files` parameter, authenticated users can read sensitive system files, including `/etc/shadow`, which contains password hashes for all users. This vulnerability exposes critical system data and poses a high risk for privilege escalation or system compromise. The vulnerability occurs because the API endpoint does not validate or restrict file paths provided via the `files` parameter. An attacker can exploit this by manipulating the file path to access sensitive files outside the intended directory. As of time of publication, no known patched versions are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-hjw2-9gq5-qgwj",
"source": "security-advisories@github.com"
},
{
"url": "https://youtu.be/FyIfcmCyDXs",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-48932",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-24T21:15:14.790",
"lastModified": "2024-10-24T21:15:14.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-9mrr-px2c-w42c",
"source": "security-advisories@github.com"
},
{
"url": "https://youtu.be/wJFq8cuyFm4",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49869",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:08.340",
"lastModified": "2024-10-23T15:13:58.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T20:28:21.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: send: corrige la detecci\u00f3n de desbordamiento de b\u00fafer al copiar la ruta a la entrada de cach\u00e9 A partir de el commit c0247d289e73 (\"btrfs: send: annotate struct name_cache_entry with __counted_by()\"), anotamos la matriz de longitud variable \"name\" de la estructura name_cache_entry con __counted_by() para mejorar la detecci\u00f3n de desbordamiento. Sin embargo, eso solo no era correcto, porque la longitud de esa matriz no coincide con el campo \"name_len\" - coincide con eso m\u00e1s 1 para incluir el terminador de cadena NUL, por lo que hace que un kernel fortificado piense que hay un desbordamiento e informe un splat como este: strcpy: desbordamiento de b\u00fafer detectado: escritura de 20 bytes de tama\u00f1o de b\u00fafer 19 ADVERTENCIA: CPU: 3 PID: 3310 en __fortify_report+0x45/0x50 CPU: 3 UID: 0 PID: 3310 Comm: btrfs No contaminado 6.11.0-prnet #1 Nombre del hardware: CompuLab Ltd. sbc-ihsw/Intense-PC2 (IPC2), BIOS IPC2_3.330.7 X64 15/03/2018 RIP: 0010:__fortify_report+0x45/0x50 C\u00f3digo: 48 8b 34 (...) RSP: 0018:ffff97ebc0d6f650 EFLAGS: 00010246 RAX: 7749924ef60fa600 RBX: ffff8bf5446a521a RCX: 0000000000000027 RDX: 00000000ffffdfff RSI: ffff97ebc0d6f548 RDI: ffff8bf84e7a1cc8 RBP: ffff8bf548574080 R08: ffffffffa8c40e10 R09: 0000000000005ffd R10: 0000000000000004 R11: ffffffffa8c70e10 R12: ffff8bf551eef400 R13: 0000000000000000 R14: 0000000000000013 R15: 000000000000003a8 FS: 00007fae144de8c0(0000) GS:ffff8bf84e780000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fae14691690 CR3: 00000001027a2003 CR4: 00000000001706f0 Seguimiento de llamadas: ? __warn+0x12a/0x1d0 ? __fortify_report+0x45/0x50 ? report_bug+0x154/0x1c0 ? handle_bug+0x42/0x70 ? exc_invalid_op+0x1a/0x50 ? asm_exc_invalid_op+0x1a/0x20 ? __fortify_report+0x45/0x50 __fortify_panic+0x9/0x10 __get_cur_name_and_parent_+0x3bc/0x3c0 get_cur_path+0x207/0x3b0 send_extent_data+0x709/0x10d0 ? find_parent_nodes+0x22df/0x25d0 ? mas_nomem+0x13/0x90 ? mtree_insert_range+0xa5/0x110 ? btrfs_lru_cache_store+0x5f/0x1e0 ? iterate_extent_inodes+0x52d/0x5a0 process_extent+0xa96/0x11a0 ? __pfx_lookup_backref_cache+0x10/0x10 ? __pfx_store_backref_cache+0x10/0x10 ? __pfx_iterate_backrefs+0x10/0x10 ? __pfx_check_extent_item+0x10/0x10 changed_cb+0x6fa/0x930 ? tree_advance+0x362/0x390 ? __pfx___clone_root_cmp_sort+0x10/0x10 _btrfs_ioctl_send+0x1ac/0x240 btrfs_ioctl+0x75b/0x850 __se_sys_ioctl+0xca/0x150 do_syscall_64+0x85/0x160 ? __count_memcg_events+0x69/0x100 ? handle_mm_fault+0x1327/0x15c0 ? __se_sys_rt_sigprocmask+0xf1/0x180 ? syscall_exit_to_user_mode+0x75/0xa0 ? do_syscall_64+0x91/0x160 ? do_user_addr_fault+0x21d/0x630 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fae145eeb4f C\u00f3digo: 00 48 89 (...) RSP: 002b:00007ffdf1cb09b0 EFLAGS: 00000246 ORIG_RAX: 000000000000010 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fae145eeb4f RDX: 00007ffdf1cb0ad0 RSI: 0000000040489426 RDI: 0000000000000004 RBP: 00000000000078fe R08: 00007fae144006c0 R09: 00007ffdf1cb0927 R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffdf1cb1ce8 R13: 000000000000003 R14: 000055c499fab2e0 R15: 000000000000004 Solucione esto al no almacenar el terminador de cadena NUL ya que en realidad no lo necesitamos para las entradas de cach\u00e9 de nombres, de esta manera \"name_len\" corresponde al tama\u00f1o real de la matriz \"name\". Esto requiere marcar el campo de matriz \"nombre\" con __nonstring y usar memcpy() en lugar de strcpy() como lo recomiendan las pautas en: https://github.com/KSPP/linux/issues/90"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/843738ede6cb8b959fb22591fcbabe8b456d7216",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/96c6ca71572a3556ed0c37237305657ff47174b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49871",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:08.500",
"lastModified": "2024-10-23T15:13:58.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T20:22:19.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,136 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Entrada: adp5589-keys - correcci\u00f3n de la desreferencia de puntero NULL Registramos una acci\u00f3n devm para llamar a adp5589_clear_config() y luego pasamos el cliente i2c como argumento para que podamos llamar a i2c_get_clientdata() para obtener nuestro objeto de dispositivo. Sin embargo, i2c_set_clientdata() solo se establece al final de la funci\u00f3n de sondeo, lo que significa que obtendremos una desreferencia de puntero NULL en caso de que la funci\u00f3n de sondeo falle antes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/122b160561f6429701a0559a0f39b0ae309488c6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/34e304cc53ae5d3c8e3f08b41dd11e0d4f3e01ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4449fedb8a710043fc0925409eba844c192d4337",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c3f04223aaf82489472d614c6decee5a1ce8d7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a38791ee79bd17d225c15a6d1479448be127a59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fb5cc65f973661241e4a2b7390b429aa7b330c69",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49873",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:08.763",
"lastModified": "2024-10-23T15:13:58.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T20:22:42.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/filemap: correcci\u00f3n de la serie de parches de p\u00e1nico de THP filemap_get_folios_contig \"memfd-pin huge page fixes\". Corrige varios errores que ocurren al usar memfd_pin_folios con p\u00e1ginas hugetlb y THP. Los errores de hugetlb solo afectan cuando la p\u00e1gina a\u00fan no tiene errores cuando se llama a memfd_pin_folios. El error de THP afecta cuando el desplazamiento inicial pasado a memfd_pin_folios no est\u00e1 alineado con la p\u00e1gina enorme. Consulte los mensajes de confirmaci\u00f3n para obtener m\u00e1s detalles. Este parche (de 5): memfd_pin_folios en la memoria respaldada por THP entra en p\u00e1nico si el desplazamiento de inicio solicitado no est\u00e1 alineado con una p\u00e1gina enorme: ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000036 RIP: 0010:filemap_get_folios_contig+0xdf/0x290 RSP: 0018:ffffc9002092fbe8 EFLAGS: 00010202 RAX: 000000000000002 RBX: 0000000000000002 RCX: 0000000000000002 El error ocurre aqu\u00ed porque xas_load devuelve un folio con el valor 2: filemap_get_folios_contig() para (folio = xas_load(&amp;xas); folio &amp;&amp; xas.xa_index &lt;= end; folio = xas_next(&amp;xas)) { ... if (!folio_try_get(folio)) &lt;-- BOOM \"2\" es una entrada hermana de xarray. Lo obtenemos porque memfd_pin_folios no redondea los \u00edndices pasados a filemap_get_folios_contig a los l\u00edmites de p\u00e1ginas enormes para THP, por lo que cargamos desde el medio de un rango de p\u00e1ginas enormes para ver un hermano. (S\u00ed redondea para hugetlbfs, en la prueba is_file_hugepages). Para solucionarlo, si el folio es un hermano, entonces devuelva el siguiente \u00edndice como punto de inicio para la siguiente llamada a filemap_get_folios_contig."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/570dd14bfecf281fa467c80f8ec92b26370ee36a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c225c4f6056b46a8a5bf2ed35abf17a2d6887691",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49874",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:08.983",
"lastModified": "2024-10-23T15:13:58.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T20:27:51.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: master: svc: Se corrige la vulnerabilidad de use after free en el controlador svc_i3c_master debido a la condici\u00f3n de ejecuci\u00f3n En la funci\u00f3n svc_i3c_master_probe, &amp;master-&gt;hj_work est\u00e1 vinculado con svc_i3c_master_hj_work, &amp;master-&gt;ibi_work est\u00e1 vinculado con svc_i3c_master_ibi_work. Y svc_i3c_master_ibi_work puede iniciar hj_work, svc_i3c_master_irq_handler puede iniciar ibi_work. Si eliminamos el m\u00f3dulo que llamar\u00e1 a svc_i3c_master_remove para realizar la limpieza, liberar\u00e1 master-&gt;base a trav\u00e9s de i3c_master_unregister mientras que el trabajo mencionado anteriormente se utilizar\u00e1. La secuencia de operaciones que pueden provocar un error de UAF es la siguiente: CPU0 CPU1 | Solucione el problema asegur\u00e1ndose de que el trabajo se cancele antes de continuar con la limpieza en svc_i3c_master_remove."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "56DA35BA-143D-4269-9914-273743A40222"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/27b55724d3f781dd6e635e89dc6e2fd78fa81a00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4318998892bf8fe99f97bea18c37ae7b685af75a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ac637122930cc4ab7e2c22e364cf3aaf96b05b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/61850725779709369c7e907ae8c7c75dc7cec4f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49875",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T18:15:09.183",
"lastModified": "2024-10-23T15:13:58.783",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-24T20:13:50.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: asignar EBADMSG a nfserr_io para evitar advertencias Ext4 arrojar\u00e1 -EBADMSG a trav\u00e9s de ext4_readdir cuando se produzca un error de suma de comprobaci\u00f3n, lo que dar\u00e1 como resultado la siguiente ADVERTENCIA. Solucione el problema asignando EBADMSG a nfserr_io. nfsd_buffered_readdir iterar_dir // -EBADMSG -74 ext4_readdir // .iterate_shared ext4_dx_readdir ext4_htree_fill_tree htree_dirblock_to_tree ext4_read_dirblock __ext4_read_dirblock ext4_dirblock_csum_verify advertir_sin_espacio_para_csum __ advertir_sin_espacio_para_csum return ERR_PTR(-EFSBADCRC) // -EBADMSG -74 nfserrno // ADVERTENCIA [ 161.115610] ------------[ cortar aqu\u00ed ]------------ [ 161.116465] nfsd: no est\u00e1ndar errno: -74 [ 161.117315] ADVERTENCIA: CPU: 1 PID: 780 en fs/nfsd/nfsproc.c:878 nfserrno+0x9d/0xd0 [ 161.118596] M\u00f3dulos vinculados en: [ 161.119243] CPU: 1 PID: 780 Comm: nfsd No contaminado 5.10.0-00014-g79679361fd5d #138 [ 161.120684] Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qe mu.org 04/01/2014 [ 161.123601] RIP: 0010:nfserrno+0x9d/0xd0 [ 161.124676] C\u00f3digo: 0f 87 da 30 dd 00 83 e3 01 b8 00 00 00 05 75 d7 44 89 ee 48 c7 c7 c0 57 24 98 89 44 24 04 c6 05 ce 2b 61 03 01 e8 99 20 d8 00 &lt;0f&gt; 0b 8b 44 24 04 eb b5 4c 89 e6 48 c7 c7 a0 6d a4 99 e8 cc 15 33 [ 161.127797] RSP: 0018:ffffc90000e2f9c0 EFLAGS: 00010286 [ 161.128794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [161.130089] RDX: 1ffff1103ee16f6d RSI: 0000000000000008 fffff52000 1c5f2a [ 161.131379] RBP: 0000000000000022 R08: 0000000000000001 R09: ffff8881f70c1827 [ 161.132664] R10: ffffed103ee18304 R11: 00000000000000001 R12: 0000000000000021 [ 161.133949] R13: 00000000ffffffb6 R14: ffff8881317c0000 R15: ffffc90000e2fbd8 [ 161.135244] FS: 000000000000000(0000) GS:ffff8881f7080000(0000) knlGS:0000000000000000 [ 161.136695] CS: 0010 DS: 0000 ES: 0000 CR0: 000000080050033 [ 161.137761] CR2: 00007fcaad70b348 CR3: 0000000144256006 CR4: 0000000000770ee0 [ 161.139041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000000000 [ 161.140291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 161.141519] PKRU: 55555554 [ [161.142076] Rastreo de llamadas: [161.142575] ? __warn+0x9b/0x140 [161.143229] ? nfserrno+0x9d/0xd0 [161.143872] ? report_bug+0x125/0x150 [161.144595] ? handle_bug+0x41/0x90 [161.145284] ? exc_invalid_op+0x14/0x70 [161.146009] ? asm_exc_invalid_op+0x12/0x20 [161.146816] ? nfsd_buffered_filldir+0xf0/0xf0 [ 161.150093] ? esperar_escrituras_concurrentes+0x170/0x170 [ 161.151004] ? tama\u00f1o_de_archivo_gen\u00e9rico_llseek+0x48/0x160 [ 161.151895] nfsd_readdir+0x132/0x190 [ 161.152606] ? nfsd4_encode_dirent_fattr+0x380/0x380 [ 161.153516] ? nfsd_unlink+0x380/0x380 [ 161.154256] ? override_creds+0x45/0x60 [ 161.155006] nfsd4_encode_readdir+0x21a/0x3d0 [ 161.155850] ? nfsd4_encode_readlink+0x210/0x210 [ 161.156731] ? escritura_bytes_en_xdr_buf+0x97/0xe0 [ 161.157598] ? __escritura_bytes_en_xdr_buf+0xd0/0xd0 [ 161.158494] ? bloqueo_downgrade+0x90/0x90 [ 161.159232] ? nfsd_svc+0x380/0x380 [ 161.164137] ? svc_printk+0x160/0x160 [ 161.164846] ? svc_xprt_do_enqueue.part.0+0x365/0x380 [ 161.165808] ? nfsd_svc+0x380/0x380 [ 161.166523] ? rcu_is_watching+0x23/0x40 [ 161.167309] svc_process+0x1a5/0x200 [ 161.168019] nfsd+0x1f5/0x380 [ 161.168663] ? nfsd_shutdown_threads+0x260/0x260 [ 161.169554] kthread+0x1c4/0x210 [ 161.170224] ? kthread_insert_work_sanity_check+0x80/0x80 [ 161.171246] ret_from_fork+0x1f/0x30"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-354"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.227",
"matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.55",
"matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.14",
"matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.3",
"matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0ea4333c679f333e23956de743ad17387819d3f2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/340e61e44c1d2a15c42ec72ade9195ad525fd048",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6fe058502f8864649c3d614b06b2235223798f48",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/825789ca94602543101045ad3aad19b2b60c6b2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c76005adfa93d1a027433331252422078750321f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e9cfecca22a36b927a440abc6307efb9e138fed5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f7d8ee9db94372b8235f5f22bb24381891594c42",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50382",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-23T17:15:19.453",
"lastModified": "2024-10-23T17:15:19.453",
"lastModified": "2024-10-24T20:35:12.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Botan before 3.6.0, when certain LLVM versions are used, has compiler-induced secret-dependent control flow in lib/utils/ghash/ghash.cpp in GHASH in AES-GCM. There is a branch instead of an XOR with carry. This was observed for Clang in LLVM 15 on RISC-V."
},
{
"lang": "es",
"value": "En las versiones anteriores a la 3.6.0 de Botan, cuando se utilizan ciertas versiones de LLVM, el compilador genera un flujo de control dependiente del secreto en lib/utils/ghash/ghash.cpp en GHASH en AES-GCM. Hay una rama en lugar de un XOR con acarreo. Esto se observ\u00f3 para Clang en LLVM 15 en RISC-V."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://arxiv.org/pdf/2410.13489",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50383",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-23T17:15:19.540",
"lastModified": "2024-10-23T17:15:19.540",
"lastModified": "2024-10-24T20:35:13.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Botan before 3.6.0, when certain GCC versions are used, has a compiler-induced secret-dependent operation in lib/utils/donna128.h in donna128 (used in Chacha-Poly1305 and x25519). An addition can be skipped if a carry is not set. This was observed for GCC 11.3.0 with -O2 on MIPS, and GCC on x86-i386. (Only 32-bit processors can be affected.)"
},
{
"lang": "es",
"value": "En las versiones anteriores a la 3.6.0 de Botan, cuando se utilizan ciertas versiones de GCC, se produce una operaci\u00f3n dependiente del secreto inducida por el compilador en lib/utils/donna128.h en donna128 (usada en Chacha-Poly1305 y x25519). Se puede omitir una adici\u00f3n si no se configura un acarreo. Esto se observ\u00f3 para GCC 11.3.0 con -O2 en MIPS y GCC en x86-i386. (Solo se pueden ver afectados los procesadores de 32 bits)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://arxiv.org/pdf/2410.13489",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7535",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-06T21:16:04.140",
"lastModified": "2024-08-12T18:31:56.687",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-24T20:35:14.177",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-122"
"value": "CWE-787"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-7763",
"sourceIdentifier": "security@progress.com",
"published": "2024-10-24T21:15:15.033",
"lastModified": "2024-10-24T21:15:15.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WhatsUp Gold versions released before 2024.0.0,\u00a0\n\nan Authentication Bypass issue exists which allows an attacker to obtain encrypted user credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024",
"source": "security@progress.com"
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7973",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.407",
"lastModified": "2024-08-26T15:13:04.650",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-24T20:35:14.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -86,7 +86,7 @@
"description": [
{
"lang": "en",
"value": "CWE-122"
"value": "CWE-787"
}
]
}

105
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-24T20:00:26.666685+00:00
2024-10-24T22:00:18.909139+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-24T19:59:47.737000+00:00
2024-10-24T21:35:07.050000+00:00
```
### Last Data Feed Release
@ -33,68 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266959
266980
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `21`
- [CVE-2024-10295](CVE-2024/CVE-2024-102xx/CVE-2024-10295.json) (`2024-10-24T18:15:05.597`)
- [CVE-2024-10313](CVE-2024/CVE-2024-103xx/CVE-2024-10313.json) (`2024-10-24T18:15:05.920`)
- [CVE-2024-10337](CVE-2024/CVE-2024-103xx/CVE-2024-10337.json) (`2024-10-24T18:15:06.170`)
- [CVE-2024-10338](CVE-2024/CVE-2024-103xx/CVE-2024-10338.json) (`2024-10-24T18:15:06.437`)
- [CVE-2024-38314](CVE-2024/CVE-2024-383xx/CVE-2024-38314.json) (`2024-10-24T18:15:07.957`)
- [CVE-2024-46478](CVE-2024/CVE-2024-464xx/CVE-2024-46478.json) (`2024-10-24T18:15:08.863`)
- [CVE-2024-46994](CVE-2024/CVE-2024-469xx/CVE-2024-46994.json) (`2024-10-24T19:15:13.843`)
- [CVE-2024-46995](CVE-2024/CVE-2024-469xx/CVE-2024-46995.json) (`2024-10-24T19:15:14.137`)
- [CVE-2024-46996](CVE-2024/CVE-2024-469xx/CVE-2024-46996.json) (`2024-10-24T19:15:14.383`)
- [CVE-2024-46998](CVE-2024/CVE-2024-469xx/CVE-2024-46998.json) (`2024-10-24T19:15:14.600`)
- [CVE-2024-47173](CVE-2024/CVE-2024-471xx/CVE-2024-47173.json) (`2024-10-24T19:15:14.817`)
- [CVE-2024-48139](CVE-2024/CVE-2024-481xx/CVE-2024-48139.json) (`2024-10-24T19:15:15.050`)
- [CVE-2024-48140](CVE-2024/CVE-2024-481xx/CVE-2024-48140.json) (`2024-10-24T19:15:15.150`)
- [CVE-2024-48141](CVE-2024/CVE-2024-481xx/CVE-2024-48141.json) (`2024-10-24T19:15:15.240`)
- [CVE-2024-48142](CVE-2024/CVE-2024-481xx/CVE-2024-48142.json) (`2024-10-24T19:15:15.333`)
- [CVE-2024-48143](CVE-2024/CVE-2024-481xx/CVE-2024-48143.json) (`2024-10-24T19:15:15.427`)
- [CVE-2024-48144](CVE-2024/CVE-2024-481xx/CVE-2024-48144.json) (`2024-10-24T19:15:15.510`)
- [CVE-2024-48145](CVE-2024/CVE-2024-481xx/CVE-2024-48145.json) (`2024-10-24T19:15:15.607`)
- [CVE-2024-48427](CVE-2024/CVE-2024-484xx/CVE-2024-48427.json) (`2024-10-24T19:15:15.703`)
- [CVE-2024-48440](CVE-2024/CVE-2024-484xx/CVE-2024-48440.json) (`2024-10-24T18:15:09.190`)
- [CVE-2024-48441](CVE-2024/CVE-2024-484xx/CVE-2024-48441.json) (`2024-10-24T18:15:09.583`)
- [CVE-2024-48442](CVE-2024/CVE-2024-484xx/CVE-2024-48442.json) (`2024-10-24T18:15:09.890`)
- [CVE-2024-48454](CVE-2024/CVE-2024-484xx/CVE-2024-48454.json) (`2024-10-24T19:15:15.803`)
- [CVE-2024-48514](CVE-2024/CVE-2024-485xx/CVE-2024-48514.json) (`2024-10-24T18:15:10.227`)
- [CVE-2024-10327](CVE-2024/CVE-2024-103xx/CVE-2024-10327.json) (`2024-10-24T21:15:11.730`)
- [CVE-2024-45242](CVE-2024/CVE-2024-452xx/CVE-2024-45242.json) (`2024-10-24T20:15:04.243`)
- [CVE-2024-45259](CVE-2024/CVE-2024-452xx/CVE-2024-45259.json) (`2024-10-24T20:15:04.323`)
- [CVE-2024-45260](CVE-2024/CVE-2024-452xx/CVE-2024-45260.json) (`2024-10-24T21:15:11.977`)
- [CVE-2024-45261](CVE-2024/CVE-2024-452xx/CVE-2024-45261.json) (`2024-10-24T21:15:12.057`)
- [CVE-2024-45262](CVE-2024/CVE-2024-452xx/CVE-2024-45262.json) (`2024-10-24T21:15:12.143`)
- [CVE-2024-45263](CVE-2024/CVE-2024-452xx/CVE-2024-45263.json) (`2024-10-24T21:15:12.217`)
- [CVE-2024-47878](CVE-2024/CVE-2024-478xx/CVE-2024-47878.json) (`2024-10-24T21:15:12.293`)
- [CVE-2024-47879](CVE-2024/CVE-2024-478xx/CVE-2024-47879.json) (`2024-10-24T21:15:12.523`)
- [CVE-2024-47880](CVE-2024/CVE-2024-478xx/CVE-2024-47880.json) (`2024-10-24T21:15:12.750`)
- [CVE-2024-47881](CVE-2024/CVE-2024-478xx/CVE-2024-47881.json) (`2024-10-24T21:15:12.957`)
- [CVE-2024-47882](CVE-2024/CVE-2024-478xx/CVE-2024-47882.json) (`2024-10-24T21:15:13.160`)
- [CVE-2024-47883](CVE-2024/CVE-2024-478xx/CVE-2024-47883.json) (`2024-10-24T21:15:13.430`)
- [CVE-2024-48208](CVE-2024/CVE-2024-482xx/CVE-2024-48208.json) (`2024-10-24T21:15:14.040`)
- [CVE-2024-48423](CVE-2024/CVE-2024-484xx/CVE-2024-48423.json) (`2024-10-24T21:15:14.143`)
- [CVE-2024-48424](CVE-2024/CVE-2024-484xx/CVE-2024-48424.json) (`2024-10-24T21:15:14.223`)
- [CVE-2024-48425](CVE-2024/CVE-2024-484xx/CVE-2024-48425.json) (`2024-10-24T21:15:14.303`)
- [CVE-2024-48426](CVE-2024/CVE-2024-484xx/CVE-2024-48426.json) (`2024-10-24T21:15:14.387`)
- [CVE-2024-48931](CVE-2024/CVE-2024-489xx/CVE-2024-48931.json) (`2024-10-24T21:15:14.580`)
- [CVE-2024-48932](CVE-2024/CVE-2024-489xx/CVE-2024-48932.json) (`2024-10-24T21:15:14.790`)
- [CVE-2024-7763](CVE-2024/CVE-2024-77xx/CVE-2024-7763.json) (`2024-10-24T21:15:15.033`)
### CVEs modified in the last Commit
Recently modified CVEs: `63`
Recently modified CVEs: `32`
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-10-24T18:15:08.177`)
- [CVE-2024-40431](CVE-2024/CVE-2024-404xx/CVE-2024-40431.json) (`2024-10-24T18:35:07.010`)
- [CVE-2024-44141](CVE-2024/CVE-2024-441xx/CVE-2024-44141.json) (`2024-10-24T18:35:07.340`)
- [CVE-2024-46257](CVE-2024/CVE-2024-462xx/CVE-2024-46257.json) (`2024-10-24T18:15:08.617`)
- [CVE-2024-47575](CVE-2024/CVE-2024-475xx/CVE-2024-47575.json) (`2024-10-24T18:56:47.930`)
- [CVE-2024-48541](CVE-2024/CVE-2024-485xx/CVE-2024-48541.json) (`2024-10-24T19:35:04.263`)
- [CVE-2024-48542](CVE-2024/CVE-2024-485xx/CVE-2024-48542.json) (`2024-10-24T19:35:05.013`)
- [CVE-2024-48545](CVE-2024/CVE-2024-485xx/CVE-2024-48545.json) (`2024-10-24T19:35:05.767`)
- [CVE-2024-48546](CVE-2024/CVE-2024-485xx/CVE-2024-48546.json) (`2024-10-24T19:35:06.563`)
- [CVE-2024-48547](CVE-2024/CVE-2024-485xx/CVE-2024-48547.json) (`2024-10-24T19:35:07.320`)
- [CVE-2024-49863](CVE-2024/CVE-2024-498xx/CVE-2024-49863.json) (`2024-10-24T19:43:56.103`)
- [CVE-2024-49876](CVE-2024/CVE-2024-498xx/CVE-2024-49876.json) (`2024-10-24T19:57:06.843`)
- [CVE-2024-49877](CVE-2024/CVE-2024-498xx/CVE-2024-49877.json) (`2024-10-24T19:58:55.383`)
- [CVE-2024-49879](CVE-2024/CVE-2024-498xx/CVE-2024-49879.json) (`2024-10-24T19:59:12.897`)
- [CVE-2024-49923](CVE-2024/CVE-2024-499xx/CVE-2024-49923.json) (`2024-10-24T19:43:27.327`)
- [CVE-2024-50033](CVE-2024/CVE-2024-500xx/CVE-2024-50033.json) (`2024-10-24T19:56:04.097`)
- [CVE-2024-50034](CVE-2024/CVE-2024-500xx/CVE-2024-50034.json) (`2024-10-24T19:56:29.170`)
- [CVE-2024-50035](CVE-2024/CVE-2024-500xx/CVE-2024-50035.json) (`2024-10-24T19:54:01.987`)
- [CVE-2024-50041](CVE-2024/CVE-2024-500xx/CVE-2024-50041.json) (`2024-10-24T19:31:39.373`)
- [CVE-2024-50043](CVE-2024/CVE-2024-500xx/CVE-2024-50043.json) (`2024-10-24T19:32:21.480`)
- [CVE-2024-50044](CVE-2024/CVE-2024-500xx/CVE-2024-50044.json) (`2024-10-24T19:36:12.717`)
- [CVE-2024-50045](CVE-2024/CVE-2024-500xx/CVE-2024-50045.json) (`2024-10-24T19:38:03.343`)
- [CVE-2024-50046](CVE-2024/CVE-2024-500xx/CVE-2024-50046.json) (`2024-10-24T18:59:55.950`)
- [CVE-2024-50050](CVE-2024/CVE-2024-500xx/CVE-2024-50050.json) (`2024-10-24T19:35:08.107`)
- [CVE-2024-5206](CVE-2024/CVE-2024-52xx/CVE-2024-5206.json) (`2024-10-24T19:48:31.637`)
- [CVE-2024-21687](CVE-2024/CVE-2024-216xx/CVE-2024-21687.json) (`2024-10-24T20:35:05.307`)
- [CVE-2024-34734](CVE-2024/CVE-2024-347xx/CVE-2024-34734.json) (`2024-10-24T20:35:05.433`)
- [CVE-2024-36130](CVE-2024/CVE-2024-361xx/CVE-2024-36130.json) (`2024-10-24T20:35:06.217`)
- [CVE-2024-36877](CVE-2024/CVE-2024-368xx/CVE-2024-36877.json) (`2024-10-24T20:35:06.353`)
- [CVE-2024-40531](CVE-2024/CVE-2024-405xx/CVE-2024-40531.json) (`2024-10-24T20:35:06.753`)
- [CVE-2024-41250](CVE-2024/CVE-2024-412xx/CVE-2024-41250.json) (`2024-10-24T20:35:06.947`)
- [CVE-2024-41251](CVE-2024/CVE-2024-412xx/CVE-2024-41251.json) (`2024-10-24T20:35:07.133`)
- [CVE-2024-42815](CVE-2024/CVE-2024-428xx/CVE-2024-42815.json) (`2024-10-24T20:35:07.330`)
- [CVE-2024-42966](CVE-2024/CVE-2024-429xx/CVE-2024-42966.json) (`2024-10-24T20:35:08.087`)
- [CVE-2024-42977](CVE-2024/CVE-2024-429xx/CVE-2024-42977.json) (`2024-10-24T20:35:08.860`)
- [CVE-2024-42986](CVE-2024/CVE-2024-429xx/CVE-2024-42986.json) (`2024-10-24T20:35:09.653`)
- [CVE-2024-48454](CVE-2024/CVE-2024-484xx/CVE-2024-48454.json) (`2024-10-24T21:35:05.410`)
- [CVE-2024-48538](CVE-2024/CVE-2024-485xx/CVE-2024-48538.json) (`2024-10-24T20:35:10.890`)
- [CVE-2024-48539](CVE-2024/CVE-2024-485xx/CVE-2024-48539.json) (`2024-10-24T20:35:11.713`)
- [CVE-2024-48544](CVE-2024/CVE-2024-485xx/CVE-2024-48544.json) (`2024-10-24T21:35:06.263`)
- [CVE-2024-48548](CVE-2024/CVE-2024-485xx/CVE-2024-48548.json) (`2024-10-24T21:35:07.050`)
- [CVE-2024-49869](CVE-2024/CVE-2024-498xx/CVE-2024-49869.json) (`2024-10-24T20:28:21.597`)
- [CVE-2024-49871](CVE-2024/CVE-2024-498xx/CVE-2024-49871.json) (`2024-10-24T20:22:19.530`)
- [CVE-2024-49873](CVE-2024/CVE-2024-498xx/CVE-2024-49873.json) (`2024-10-24T20:22:42.387`)
- [CVE-2024-49874](CVE-2024/CVE-2024-498xx/CVE-2024-49874.json) (`2024-10-24T20:27:51.700`)
- [CVE-2024-49875](CVE-2024/CVE-2024-498xx/CVE-2024-49875.json) (`2024-10-24T20:13:50.927`)
- [CVE-2024-50382](CVE-2024/CVE-2024-503xx/CVE-2024-50382.json) (`2024-10-24T20:35:12.650`)
- [CVE-2024-50383](CVE-2024/CVE-2024-503xx/CVE-2024-50383.json) (`2024-10-24T20:35:13.417`)
- [CVE-2024-7535](CVE-2024/CVE-2024-75xx/CVE-2024-7535.json) (`2024-10-24T20:35:14.177`)
- [CVE-2024-7973](CVE-2024/CVE-2024-79xx/CVE-2024-7973.json) (`2024-10-24T20:35:14.967`)
## Download and Usage

View File

@ -166543,7 +166543,7 @@ CVE-2021-2019,0,0,c2fe290beda99097f5af950e201b3cf3c32a2eafc405e8b574e7ef8ffeede0
CVE-2021-20190,0,0,d2a8ac28104325dedcd0c87eded18a9574d175e48753331ead04a44d2bda47d0,2023-11-07T03:28:59.363000
CVE-2021-20191,0,0,8658ab2c479f565f855ecc101f68d9f5292be58ee1512085fe01387f35c89d78,2023-12-28T19:15:12.460000
CVE-2021-20192,0,0,3dd8be816a8dc6c137adf1504c8646a23863e79bd887c70954eb2bc7f2280695,2023-11-07T03:28:59.460000
CVE-2021-20193,0,1,3e3cf18e7000b6cb7f5439046326d8cb2606b66a11db2d415c8beefc917a97b0,2024-10-24T18:15:14.167000
CVE-2021-20193,0,0,3e3cf18e7000b6cb7f5439046326d8cb2606b66a11db2d415c8beefc917a97b0,2024-10-24T18:15:14.167000
CVE-2021-20194,0,0,76270653c30089eb381a4aad399b3282136badba7d5b2c69bb6e812746cd2765,2023-02-12T22:15:16.563000
CVE-2021-20195,0,0,4ee77b9328d95dff9be6e18003cc5fceadbdb127bccc3a2835319150f0cc6bf8,2022-08-05T15:21:13.307000
CVE-2021-20196,0,0,db1eae87c55f404199c52b091d78744dd8b805a4d21844de7a0eb80d7b2d633d,2023-02-12T22:15:16.717000
@ -208929,7 +208929,7 @@ CVE-2022-43697,0,0,686896906763250874b16d5ab0c4c6c9de8102038fc6500dd580314ffa3b4
CVE-2022-43698,0,0,86648de9a3b9cddadd560e0414759c5c112333ec5a9b33030e1cfeeeda7cfaf5,2023-05-15T19:27:09.167000
CVE-2022-43699,0,0,a3e68481c8e86891832fdc60b1fc21c2f076950a8075ae1b88211a1d0c48ffc1,2023-04-24T19:46:49.317000
CVE-2022-4370,0,0,21e2b08860aeacd5f81650f3feefc307848c743c02a091180993201ae7aeaafc,2023-11-07T03:57:40.473000
CVE-2022-43701,0,1,ff7eb56d7ec8625eb0aac7c8283a7142763321b82a88c440976e64f53685f693,2024-10-24T18:35:01.700000
CVE-2022-43701,0,0,ff7eb56d7ec8625eb0aac7c8283a7142763321b82a88c440976e64f53685f693,2024-10-24T18:35:01.700000
CVE-2022-43702,0,0,9c868191de040381101d2f471e797f332c090e7c70bd985613d0f3d2b84d56fc,2024-02-13T20:15:51.373000
CVE-2022-43703,0,0,298ecbf048f181c8ab59c3a4fa8a669dfea7813a0f682c5d610b3cec4bfbe5a8,2024-02-13T20:15:51.457000
CVE-2022-43704,0,0,4b8a50994e6868c3dec07c015a4af22d97eae7e777cfe2c1b8ae11b7877b17c3,2023-01-27T15:05:28.433000
@ -212565,18 +212565,18 @@ CVE-2022-48950,0,0,df7cdcc43adc0fe4790bfeee6795f91b28a4c15b10566f630a78891552ade
CVE-2022-48951,0,0,ba9d8cef5379b0ff4a935922614acdd38174cd969734d165c8703c7601b1f6a8,2024-10-23T15:13:25.583000
CVE-2022-48952,0,0,cf21a0255246b5b3ab6d95e6ea99d72bc42c2b56c4888d478133ad8ae4632324,2024-10-23T15:13:25.583000
CVE-2022-48953,0,0,037e26b090bc3b5c06ab9dffbf7de850a858e5fc3604925c0be082d71471c418,2024-10-23T15:13:25.583000
CVE-2022-48954,0,1,739575e3093a499b0052cdcdfb603ce436f9aa9028374fc974a8acd1648a7210,2024-10-24T19:57:39
CVE-2022-48955,0,1,86162b259bd0edabf491f8d7ac9901887414111ced735b0c7ce8d9a40e920beb,2024-10-24T19:58:17.230000
CVE-2022-48956,0,1,7b71de397ebb97c317a78adf75e7c6d21e7a987b6ee245bfd5c45d538640e7d3,2024-10-24T19:59:47.737000
CVE-2022-48954,0,0,739575e3093a499b0052cdcdfb603ce436f9aa9028374fc974a8acd1648a7210,2024-10-24T19:57:39
CVE-2022-48955,0,0,86162b259bd0edabf491f8d7ac9901887414111ced735b0c7ce8d9a40e920beb,2024-10-24T19:58:17.230000
CVE-2022-48956,0,0,7b71de397ebb97c317a78adf75e7c6d21e7a987b6ee245bfd5c45d538640e7d3,2024-10-24T19:59:47.737000
CVE-2022-48957,0,0,b7e09cd0df5d0a3d101f25f751f05c8c173e31e135a7f732ca112404e9035b67,2024-10-24T14:41:15.423000
CVE-2022-48958,0,0,64a1b4825cb7fe46a7f91cfb2ea852904955b0ccb818b0aff987ae8d6445afa5,2024-10-23T15:13:25.583000
CVE-2022-48959,0,1,88128a4f0643312be4e2e4a9aa6240bb58f1815b805dfae61f1720ba8689fdcb,2024-10-24T19:23:49.373000
CVE-2022-48958,0,1,4182df9899f38a81befcfb4c79a73d7adc9622574acd654f938dddef6cf02389,2024-10-24T20:00:34.033000
CVE-2022-48959,0,0,88128a4f0643312be4e2e4a9aa6240bb58f1815b805dfae61f1720ba8689fdcb,2024-10-24T19:23:49.373000
CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000
CVE-2022-48960,0,1,306ba4d096a9e7e54cbf14e13ef7e723aedf0c00b16364be4ce75c8355664d3f,2024-10-24T19:24:43.627000
CVE-2022-48961,0,0,9079782a53ac6f878f46ee5a7bd8c6d64ab25ec3e859504aac9ecda2b190e0a9,2024-10-23T15:13:25.583000
CVE-2022-48962,0,1,3e9352cb14da09460dabd4c4ed0ebf1fe375e3760484bb430b88096f74fb87ff,2024-10-24T19:27:13.900000
CVE-2022-48963,0,1,2cc67ac27a70e3eaf4305fbb0c71925d0a7c77e13764203ad9a8a86e3f22ee89,2024-10-24T19:27:58.603000
CVE-2022-48964,0,1,13bd5cdda7ac4f5878a520e8c12bce36b9b8e913c0c74c77b4e8a6c22e52198f,2024-10-24T19:28:48.867000
CVE-2022-48960,0,0,306ba4d096a9e7e54cbf14e13ef7e723aedf0c00b16364be4ce75c8355664d3f,2024-10-24T19:24:43.627000
CVE-2022-48961,0,1,74d18016dfde0cb8a0047a37ab2c07bf8c19a292b832e4231d1a582e5692395c,2024-10-24T20:02:22.347000
CVE-2022-48962,0,0,3e9352cb14da09460dabd4c4ed0ebf1fe375e3760484bb430b88096f74fb87ff,2024-10-24T19:27:13.900000
CVE-2022-48963,0,0,2cc67ac27a70e3eaf4305fbb0c71925d0a7c77e13764203ad9a8a86e3f22ee89,2024-10-24T19:27:58.603000
CVE-2022-48964,0,0,13bd5cdda7ac4f5878a520e8c12bce36b9b8e913c0c74c77b4e8a6c22e52198f,2024-10-24T19:28:48.867000
CVE-2022-48965,0,0,5c2d1d54d8b3c46630fcded2c16f38c7fffd2383699aeb72a69572ed1749a87e,2024-10-23T15:13:25.583000
CVE-2022-48966,0,0,7b5ea2cdb27342c6837b1d63b8ed702b4c34ea924734529cc736266041c3d692,2024-10-23T15:13:25.583000
CVE-2022-48967,0,0,9a4dff8791ae44e4087bbdddb5fbc68f8736e971375d2e967fe26661594f6b57,2024-10-23T15:13:25.583000
@ -212625,22 +212625,22 @@ CVE-2022-49005,0,0,996bcc00649f5f4d6806dab3ae223e12d9b68c5372e06c85334c63daf1a1a
CVE-2022-49006,0,0,11e74bb0eed70588405216f8164bddc6145e3f7d92995a8a649678fb341b062c,2024-10-23T15:13:25.583000
CVE-2022-49007,0,0,d8181ccdf2d774c95472fe77412f5c5f6b4c10d6c0a508bc04c802e0d59cc425,2024-10-23T15:13:25.583000
CVE-2022-49008,0,0,858dc4a8a05732b95c403be0591a3fe4ca899c97593a1ac4eca126dfe89df3b4,2024-10-23T15:13:25.583000
CVE-2022-49009,0,1,bd4572466d1414f52fbe7936b1a0c728ae05c93f9a35a8642cb3c09affa0841c,2024-10-24T18:59:25.877000
CVE-2022-49009,0,0,bd4572466d1414f52fbe7936b1a0c728ae05c93f9a35a8642cb3c09affa0841c,2024-10-24T18:59:25.877000
CVE-2022-4901,0,0,b216b364f33ab0ef7a0c7606c08559e2c099c064cab5e2ac5756fa24252b7a04,2023-03-09T01:06:23.703000
CVE-2022-49010,0,1,d80576c7b56f00013ea7b7dc864a80d590c14a16de91c0b1fdc858f0c8ef5805,2024-10-24T19:03:50.847000
CVE-2022-49011,0,1,599b28539b8e427f24e26f370e4a82372844dcaf9874238111619d456f6deff5,2024-10-24T19:01:47.513000
CVE-2022-49012,0,1,c7f131c8a5ce582750cf22f237762a39b122200ff928897e73148ae98ccfd3ae,2024-10-24T19:07:46.193000
CVE-2022-49013,0,1,44aaf107cfeec645dd34f52f0cd065b9499e789ec820d67b73614f086e7af59b,2024-10-24T19:09:30.677000
CVE-2022-49014,0,1,578af6a0495c8c75967a8dfd95a15b35f965fe7a5668f9b6fbf3061b11b875bf,2024-10-24T18:29:23.407000
CVE-2022-49015,0,1,362e9ebd4f952db666a5cf7b235271e1730ba231d19e1a877c82c9ab348361bb,2024-10-24T18:31:54.943000
CVE-2022-49016,0,1,c1d9958f2bd8f84adc504d3a1280ec26573c2ebb3355642f1cbe6170b0e41127,2024-10-24T18:35:01.597000
CVE-2022-49017,0,1,854114d469a6f0821cf36adf0bc76d655074aeb2472ed60acd8104bc233f489e,2024-10-24T18:36:13.233000
CVE-2022-49018,0,1,3f1b2cc632016094ee9af7738f5b2a34861f719ead535be5133fc7f41ee9348d,2024-10-24T18:38:38.033000
CVE-2022-49019,0,1,5c0cc209de7b277a9f730293250f0e61a5ef16c4c75dfb71b519c0273182aba2,2024-10-24T18:43:50.413000
CVE-2022-49010,0,0,d80576c7b56f00013ea7b7dc864a80d590c14a16de91c0b1fdc858f0c8ef5805,2024-10-24T19:03:50.847000
CVE-2022-49011,0,0,599b28539b8e427f24e26f370e4a82372844dcaf9874238111619d456f6deff5,2024-10-24T19:01:47.513000
CVE-2022-49012,0,0,c7f131c8a5ce582750cf22f237762a39b122200ff928897e73148ae98ccfd3ae,2024-10-24T19:07:46.193000
CVE-2022-49013,0,0,44aaf107cfeec645dd34f52f0cd065b9499e789ec820d67b73614f086e7af59b,2024-10-24T19:09:30.677000
CVE-2022-49014,0,0,578af6a0495c8c75967a8dfd95a15b35f965fe7a5668f9b6fbf3061b11b875bf,2024-10-24T18:29:23.407000
CVE-2022-49015,0,0,362e9ebd4f952db666a5cf7b235271e1730ba231d19e1a877c82c9ab348361bb,2024-10-24T18:31:54.943000
CVE-2022-49016,0,0,c1d9958f2bd8f84adc504d3a1280ec26573c2ebb3355642f1cbe6170b0e41127,2024-10-24T18:35:01.597000
CVE-2022-49017,0,0,854114d469a6f0821cf36adf0bc76d655074aeb2472ed60acd8104bc233f489e,2024-10-24T18:36:13.233000
CVE-2022-49018,0,0,3f1b2cc632016094ee9af7738f5b2a34861f719ead535be5133fc7f41ee9348d,2024-10-24T18:38:38.033000
CVE-2022-49019,0,0,5c0cc209de7b277a9f730293250f0e61a5ef16c4c75dfb71b519c0273182aba2,2024-10-24T18:43:50.413000
CVE-2022-4902,0,0,287e358bd6e692608595d8f35e480fa1fc0a17dda86b7a57dcb446074ab1fd22,2024-05-17T02:17:02.280000
CVE-2022-49020,0,1,f909ba59e6e38da2e0c04e27bc86f983845d877b769100ad0347ac8d59e90616,2024-10-24T18:43:20.887000
CVE-2022-49021,0,1,7abf5de0439d79af2db36a4427bee3124c6a1194b3d8cb96c822cec62146005d,2024-10-24T18:44:24.567000
CVE-2022-49022,0,1,7916fb2a9efb7b7197f996804cc94d2927bd3fc41af2ccb83d88860d15a94534,2024-10-24T18:48:52.560000
CVE-2022-49020,0,0,f909ba59e6e38da2e0c04e27bc86f983845d877b769100ad0347ac8d59e90616,2024-10-24T18:43:20.887000
CVE-2022-49021,0,0,7abf5de0439d79af2db36a4427bee3124c6a1194b3d8cb96c822cec62146005d,2024-10-24T18:44:24.567000
CVE-2022-49022,0,0,7916fb2a9efb7b7197f996804cc94d2927bd3fc41af2ccb83d88860d15a94534,2024-10-24T18:48:52.560000
CVE-2022-49023,0,0,0735ff18caf8246b03c79c33b83cf62d783640bfd0713348e2d4e58370c405b0,2024-10-24T03:50:29.357000
CVE-2022-49024,0,0,c66f01f2c8a41a2a22849da074498e2a47f55851811c1bb200d8ff998c2a459a,2024-10-24T03:50:03.797000
CVE-2022-49025,0,0,74891ed957efad34f677418cab3fc02558af109bc31094684e4f71f7e513262c,2024-10-24T03:49:31.117000
@ -212649,7 +212649,7 @@ CVE-2022-49027,0,0,08617aba8accba8d40c33a2dd9323ed07c4a53388d9fcae1554c4898c8121
CVE-2022-49028,0,0,151442faeff9b14d8ce2ae4c9a4c94db2834ff9ccfc2de89b8fd58ca69c8cc70,2024-10-24T15:51:45.197000
CVE-2022-49029,0,0,bc3565ae22eee1b819f7f608c3234a9c6a391de68ad397b4af9e7a0668ef7d9d,2024-10-24T15:59:48.417000
CVE-2022-4903,0,0,cf9430f75554b10fc3063c2d4e895e2575b24650a7af1dc91ee51937fe80926d,2024-05-17T02:17:02.397000
CVE-2022-49030,0,1,904b99924e5bfabd402744e1f2641368862a3c302dd16691ee4dde25d15ff21f,2024-10-24T18:42:07.703000
CVE-2022-49030,0,0,904b99924e5bfabd402744e1f2641368862a3c302dd16691ee4dde25d15ff21f,2024-10-24T18:42:07.703000
CVE-2022-49031,0,0,27b7324be957657ebfe2fa70a41fdfbee66b5d1a8d8879fc8bbe3b24c5b9c3f7,2024-10-24T16:03:12.907000
CVE-2022-49032,0,0,efe71c7b59c43b9d0e289b0876c4b1896d076c1fbbeb41a201c57f837f1793c0,2024-10-24T16:04:49.880000
CVE-2022-49033,0,0,f1525e73208fdc16ccb4e511516019213374c129e7ea61503d159b482ea92060,2024-10-23T15:12:34.673000
@ -222796,7 +222796,7 @@ CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db
CVE-2023-29924,0,0,2ccc0584144c29564d1fa45d30873eda11c23ddf1e798e28992e89d0b774a992,2023-04-28T03:47:31.073000
CVE-2023-29926,0,0,9225094d01fee3ffa7bc831fb1f80da9744a24dd565cc13e21927794981302ba,2023-04-28T03:48:49.887000
CVE-2023-29927,0,0,9e8a9e15293311c93fbe723ab56ed0471994959c871514d4222963584fadee8d,2023-05-25T16:05:07.423000
CVE-2023-29929,0,0,c4b7c8db7151fa57c0c0242b0a906c7d8eab412a4479e9c2d1bd3d305adc2920,2024-08-22T21:15:15.840000
CVE-2023-29929,0,1,6f2f8abf6aeedfd5cac3854fce64a85cdbc520801b8f2ffbd3979521bcd9ccd5,2024-10-24T20:35:02.040000
CVE-2023-2993,0,0,d44c9fbb84d48f2f2e04efcd22910452a7ca1db8b85f5163ca6dff6f458b6b41,2023-07-05T17:30:11.073000
CVE-2023-29930,0,0,1d6d963e7d9226c0bd795ab7eb7ac30c93bd3ab4c90e9f87c9c6ddc10964c899,2023-05-24T13:50:58.667000
CVE-2023-29931,0,0,4072247749c61f868b116869af506293a452ef82a75e1183fa4bb269840f61e7,2023-06-29T18:17:31.473000
@ -229069,8 +229069,8 @@ CVE-2023-38330,0,0,b11b8311a56bc5c17f1fe686168a5a3db032ce08d438e4c5a2dffd1a1d730
CVE-2023-38331,0,0,7adf2751ba17cd1de1ffb6db6153690ae0959f213d375c3f0b6f8984c63016b2,2023-08-03T14:04:00.513000
CVE-2023-38332,0,0,e95a36d3dce855564a1d07d4ecd697bc91781b7e03ef51934460306e7db83fb5,2023-08-09T17:13:24.760000
CVE-2023-38333,0,0,54189fbdb51ca920edb02fcd8a50bd8033eb837bf070c984cf975ab78207d49f,2023-08-15T19:57:13.227000
CVE-2023-38334,0,0,01dd551fb6895c67930679c9cec3f0a5f61fa8a322b90de949bee81d70ac3f1e,2023-07-31T18:42:53.743000
CVE-2023-38335,0,0,d473c72c16cf555bc131e99be56f25a47b8e1af3b2e36819a84c87e6b8ab373e,2023-07-31T18:42:46.760000
CVE-2023-38334,0,1,e6ae68becd7817f442354911f9642a20ef01d0c1d9ec40e4847d4a0bc96ea63f,2024-10-24T21:35:02.113000
CVE-2023-38335,0,1,5d0833ce00b493e720d1adb6ca16176c7f99498655258ff431cc5847064b5075,2024-10-24T21:35:04.503000
CVE-2023-38336,0,0,43fdd10d8ccba2af679e7c7c5fa3793c85bc46c5094c33aa3e80000cce1b5f4c,2023-07-27T03:22:54.967000
CVE-2023-38337,0,0,f4c79ade4dd8bc46340daddde44bf3d0768b2f1f21fc874630a9ca34158f8667,2023-07-27T03:23:39.037000
CVE-2023-3834,0,0,79f59e2e98a9edb2bce976eba92b3e888a255a070425958fd0ee797e6d1975cb,2024-05-17T02:27:51.830000
@ -229294,7 +229294,7 @@ CVE-2023-38562,0,0,127d1a2b630856d5538c1ca38a31578c3089871c39c5f3a8684c910dd7a42
CVE-2023-38563,0,0,cd5653006ddb237fe74acb1487f8018dcc309b748db7c43e87d0e1655d65393a,2023-09-11T13:39:23.730000
CVE-2023-38564,0,0,b6614995561f59800bbe304c9a4bb6f0df0678257f2d10dccc98201621f1d3d9,2023-08-03T16:48:13.720000
CVE-2023-38565,0,0,149d8b68307130cd8b5fad99ef6f47e115e292c7805ed5f155c2ac1a686f799e,2023-08-03T16:42:43.680000
CVE-2023-38566,0,1,b9e80dde1f400d3627e1e34a307490af49781464f00fb20fe903b4baaf1e192f,2024-10-24T19:14:10.307000
CVE-2023-38566,0,0,b9e80dde1f400d3627e1e34a307490af49781464f00fb20fe903b4baaf1e192f,2024-10-24T19:14:10.307000
CVE-2023-38568,0,0,fe3006418b3150234fc6bb5ea0ab250bf9ebe277e16313987e9ddcf20bb4bb1b,2023-09-11T13:39:55.610000
CVE-2023-38569,0,0,e2c03e6bc874a9668ba615ef460a626240bf2f5be648e4d4af24f747a77bb59d,2023-09-08T16:47:59.860000
CVE-2023-3857,0,0,f764245d305ac578d0764cadf8c08c7c2c58efa3cea28d80654e277802d84d75,2024-05-17T02:27:54.180000
@ -229977,7 +229977,7 @@ CVE-2023-39427,0,0,bc7e52ed8676d0287ba324301b50627a151b43fb5cd244be9fa42525dbdfd
CVE-2023-39429,0,0,e45d5f249dbba37b2a0f500dde0eaa26a84ef98250d6082bd2805021c83d4156,2023-10-04T17:08:58.890000
CVE-2023-3943,0,0,3bfea338ff2ecfcf77a5fa067300607a2b70e9f53e16468b7b1451e54df83026,2024-05-21T16:54:26.047000
CVE-2023-39431,0,0,26cadede41c2c3cb84c880d51209fee4b6934336388976525c85faa63e994ed0,2023-10-25T13:50:25.650000
CVE-2023-39432,0,1,041ac297269e9be2639d7ad5add979739e1837b348d5cab6c1b9d11b46590240,2024-10-24T19:13:32.777000
CVE-2023-39432,0,0,041ac297269e9be2639d7ad5add979739e1837b348d5cab6c1b9d11b46590240,2024-10-24T19:13:32.777000
CVE-2023-39433,0,0,f891132ba414524367ca6e5b3376c4fd3194df781c7ccd69c825a121a915823e,2024-05-17T18:36:05.263000
CVE-2023-39434,0,0,bc693e7754388058b19485a72219b0597d4d79b71ecc558e086fe03a669881fc,2024-01-31T15:15:09.663000
CVE-2023-39435,0,0,2cde1591acdec05b9dded1c5b5ca1d20ab1200f3c8779b480c0f389d969c7be2,2024-08-02T18:16:11.260000
@ -230288,14 +230288,14 @@ CVE-2023-39928,0,0,91282e780c029bca5230571e26da05cea4f7f8bbaeff21c9d74ff4f370d1c
CVE-2023-39929,0,0,9ee055206e5132be81815049aebeff6d468d3e81abaeb697797813c03df4adb1,2024-05-17T18:36:05.263000
CVE-2023-3993,0,0,6a4502fc730b10244b2a5f12fef2d075a1d38a2dac53ba48d1dcf3cdcda08ad9,2024-10-03T07:15:17.247000
CVE-2023-39930,0,0,d750d5de68ec1cde9c7f725fc00c339d92094ec5ff393b14c4e64987eda9f87a,2023-10-31T18:10:51.270000
CVE-2023-39932,0,1,12634c5c9ef0cff268f86e10b0c67410af36a28d1b513a74ce59753107a369e3,2024-10-24T19:04:48.510000
CVE-2023-39932,0,0,12634c5c9ef0cff268f86e10b0c67410af36a28d1b513a74ce59753107a369e3,2024-10-24T19:04:48.510000
CVE-2023-39933,0,0,1a0ab502e85598b40e7e961fd8e000415def9edc0b9351c41ae3d4f4e819b315,2024-03-18T01:53:02.353000
CVE-2023-39935,0,0,e7273cf6b42db016c2234872a9e6b2af9325c39c0fbeec800f945c24cae29ab6,2023-09-11T13:41:11.193000
CVE-2023-39936,0,0,c91849e55c7a55e36d3d0035f9880ed7b3b78132a705018d93999265c90b8b67,2023-11-06T18:13:06.433000
CVE-2023-39938,0,0,b7f60caca70de06cad432a98ecc140601aca695ee4a3c25c4662905e139bf0e3,2023-09-08T18:45:56.717000
CVE-2023-39939,0,0,4965016f7617cd5b3490ccc0805310c4ec2bb5245820676f8b5e01f5a194480e,2023-08-25T16:08:34.140000
CVE-2023-3994,0,0,1b2340bec7f9a348a26613e1fc8a292c8b2aaa50d40e47a84eecd8c9324f6268,2024-10-03T07:15:17.590000
CVE-2023-39941,0,1,7a7b0ebde101066406c8606dcd2e5bcb0d5dda26a40ce4a09946a3c0510ba6d6,2024-10-24T19:28:18.327000
CVE-2023-39941,0,0,7a7b0ebde101066406c8606dcd2e5bcb0d5dda26a40ce4a09946a3c0510ba6d6,2024-10-24T19:28:18.327000
CVE-2023-39944,0,0,1470e34a741cc4686e482386839a0af88bb3580a2d1e2f77be44953e184809f9,2023-08-23T16:47:51.790000
CVE-2023-39945,0,0,27452af8682e7fc1dc0d0187e72741ecfe96e38d136e3ba6496d4fb2131d56a6,2023-08-22T16:12:14.807000
CVE-2023-39946,0,0,ab0dbf5664c8a595401a21854502bec62dd8f35d5d1f6dfd019f4649b8c57813,2023-08-22T14:21:30.250000
@ -231255,7 +231255,7 @@ CVE-2023-41088,0,0,49329b5d67d4cd3940fce7a9adab0d791c43fb70872ff5ce3deb4e26e23e1
CVE-2023-41089,0,0,330c83575a9976e5107ccd3bae1c646ffa2e4fef50c0897f1ccd9bee7e5907f8,2023-10-25T13:38:19.127000
CVE-2023-4109,0,0,8baa8250e57f9070f1588ee57a6aaa5e217a410144b639ec04878717d28bc67a,2023-11-07T04:22:05.817000
CVE-2023-41090,0,0,854b0d414b7b6c0e11cc9e6219a438b183a76dbd03346da869904dfb3e0d1bf5,2024-10-23T15:36:17.703000
CVE-2023-41091,0,1,ad7652e2d3c1b7f6e6e675f34f7c1c34cd6f691deb9d5ce07924a50cf1e09c08,2024-10-24T19:14:34.080000
CVE-2023-41091,0,0,ad7652e2d3c1b7f6e6e675f34f7c1c34cd6f691deb9d5ce07924a50cf1e09c08,2024-10-24T19:14:34.080000
CVE-2023-41092,0,0,4e8e931d3ededed79b2045da3cc968b68e4b0145dbe88e1d7c336f100fc82182,2024-05-17T18:36:05.263000
CVE-2023-41093,0,0,e2ec8ffe14945965701d15ef17979727c54dc987034806d91272b18047967a11,2024-09-10T16:19:41.973000
CVE-2023-41094,0,0,f19259e18ee5ecc21aebc175659559c20ae9ee22625a898f985fcca4d69d87b5,2024-09-26T22:15:03.453000
@ -236105,7 +236105,7 @@ CVE-2023-48188,0,0,e25a0a9426de91c2097231c68f9a1c0e2db42b370754a400dac508d2f5877
CVE-2023-4819,0,0,2ad6f927c78343f2e16fc822f7a5b92dab83a61bfd87f35e8c8dce495558816a,2023-11-07T04:23:00.223000
CVE-2023-48192,0,0,5359a2542f7e7d23640bf862f7875ef2bd7b86d2f2452622e10713c4dc3be1cf,2023-11-29T18:00:50.257000
CVE-2023-48193,0,0,ec5c02890cd9e1fffae359e8523a6a385c1312695a72f38433ff889cec94469e,2024-08-02T22:15:29.943000
CVE-2023-48194,0,1,b3a7c1f9bd761e4291d34b5439919381f06d227ddaf4fe52f85e67b9a35945d7,2024-10-24T18:15:05.247000
CVE-2023-48194,0,0,b3a7c1f9bd761e4291d34b5439919381f06d227ddaf4fe52f85e67b9a35945d7,2024-10-24T18:15:05.247000
CVE-2023-48197,0,0,bd09279ecf36494f3533f0148ecc550e2b331b062d976962b46e6c7441a8b350,2024-01-24T22:15:14.793000
CVE-2023-48198,0,0,118e4bd5449c9efc19936d81813ba9bd553d9241e436b3c8887cd622b8a518bc,2023-11-28T21:15:08.420000
CVE-2023-48199,0,0,e5a552a9394f09277a2430652250b1515245f28b6cc3f5e1fb31928938b223d2,2023-11-28T21:15:08.477000
@ -236993,7 +236993,7 @@ CVE-2023-4923,0,0,ce7fc500dde57469ac63f0d59e3b430b03bd8f45530b68eebb245625ccf8cf
CVE-2023-49230,0,0,4ac429fff5dad6e7c2619e17899b81d72294b4ca67a40312f774f6a762a4a586,2024-01-04T17:17:22.257000
CVE-2023-49231,0,0,c62fd1865f2eec72e7e6740f19af9d0cb475298622080bf6c81c19f47c897674,2024-08-27T19:35:08.170000
CVE-2023-49232,0,0,9ca3b1a982e1c7a2ec1772835ea21cbd9593765c02546da72550a094ad870e5e,2024-08-01T13:45:09.797000
CVE-2023-49233,0,0,5121a302ad4e119a4a0fae8bc29f849d9f16596272d8782981cc921ca87ec2e4,2024-09-03T21:35:04.420000
CVE-2023-49233,0,1,0fd1771cca59f0b1f94b4e27247bf8f38e4a82f6c89a9d3221c17acc2af386bb,2024-10-24T20:35:03.457000
CVE-2023-49234,0,0,42b8e485b1c2a4cac6ef6d6ad94acb217368faece94ca890be93bbb463698a19,2024-04-05T17:15:07.690000
CVE-2023-49235,0,0,251e067594908fcdc9ea0af907df30c24f21af889b96692ba9e2877adfcb0e54,2024-01-12T19:51:24.593000
CVE-2023-49236,0,0,043e2d596773c1427321050092baafadbd74f95bf10543e717d7f7b30af8f0a7,2024-01-12T20:39:27.197000
@ -237959,7 +237959,7 @@ CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9
CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000
CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000
CVE-2023-50808,0,0,eb111853188ca06e9540385134be25115b61d3ae24652382189ac577efef0822,2024-10-17T14:35:01.797000
CVE-2023-50809,0,0,7719a810705ea5c5a85faa78514d3a43be3a8cdc8a452351afdb2453caacced0,2024-08-13T14:35:00.967000
CVE-2023-50809,0,1,bc071172f4263c6ad714cd837284dbe1dad1416a743fc7cfef6ab03d74ce787e,2024-10-24T20:35:04.223000
CVE-2023-5081,0,0,0e732bce81b0acde4513851a952ca536476787a34e895e3dce2d7f429b7ac3bd,2024-09-16T15:15:15.767000
CVE-2023-50810,0,0,ee660c82097e8ab9c992185745b4404dffd149b82690962a0ed8a0cb829c0aef,2024-08-23T15:35:03.107000
CVE-2023-50811,0,0,094c840cf26fbf426edc4fdb20f1490465693445542cafd34c1943f1940efb84,2024-04-29T19:52:21.503000
@ -240128,7 +240128,7 @@ CVE-2023-5820,0,0,84dc0c1c53fde44ab4c05c82ab5a2520c185f28133977ced9ce8f2cd09ee60
CVE-2023-5821,0,0,e28393f5c28b9240685235d5df02d1a7ae14f1e20637f91ebbc54582eac12c8a,2023-11-07T04:24:27.417000
CVE-2023-5822,0,0,a51a65f577998995d417ed51f86cef9948919caf09e4a292400acbf0bd22020b,2023-11-29T19:15:14.147000
CVE-2023-5823,0,0,28470bb07246c70804364affe86bdccda42a47cc222585e7bb729e6b070dc476,2023-11-14T16:18:57.250000
CVE-2023-5824,0,1,1998a360c26373b26fdef6f25fafcfb4347ac685ad7c26343981286e8cfed19a,2024-10-24T18:15:05.393000
CVE-2023-5824,0,0,1998a360c26373b26fdef6f25fafcfb4347ac685ad7c26343981286e8cfed19a,2024-10-24T18:15:05.393000
CVE-2023-5825,0,0,23edd36c9ccca6999373400a33456815056795d3867dea57d3ee2ac949146a8c,2024-10-08T19:01:27.957000
CVE-2023-5826,0,0,77f5256c0b3e05297e344b8d4e57780d4479e864cd2195e9176c3e5c17241118,2024-05-17T02:33:20.243000
CVE-2023-5827,0,0,4c86fad4c27658fb1ce8352df5d774bb9cb4abc80afb1b424ce85b5e8b692d54,2024-05-17T02:33:20.353000
@ -242455,7 +242455,7 @@ CVE-2024-10290,0,0,d3e172c9c7b7b0403c392ffa2d79ecaff1aea477f009179997ba8147d4bbe
CVE-2024-10291,0,0,4221f9dc258e6d84993fa0f34bdeaf5dfcbfbf20fdb69558d099a0b3635f00b4,2024-10-23T16:15:04.597000
CVE-2024-10292,0,0,8f4c4ab580d9e369d7e7dd331e4604716d13ad341c8b824d3d76d119c02d65de,2024-10-23T16:15:04.943000
CVE-2024-10293,0,0,a923f6e085338d69ea2111da01f3e4f9e0b9ff921e35106d46ce0e7cea63eda3,2024-10-23T16:15:05.207000
CVE-2024-10295,1,1,a13dd697d69319dadd65bd708ebbbc7dff277fa249c7141ba4bca06236d03bd2,2024-10-24T19:35:03.070000
CVE-2024-10295,0,0,a13dd697d69319dadd65bd708ebbbc7dff277fa249c7141ba4bca06236d03bd2,2024-10-24T19:35:03.070000
CVE-2024-10296,0,0,6780536acb419474ab08f42f0ff74d0f3d24a7a6b50377aafc4dcdaecc7d294f,2024-10-23T17:15:13.690000
CVE-2024-10297,0,0,21e16b153ab50c5e76cb5a479cf3c5f080b3f490cdf8b294a5380f2a80d7bd42,2024-10-23T18:15:05.137000
CVE-2024-10298,0,0,62d5e88eb741969e4d70e673f71e4b81aab32ca793b396e4ddc4938c3dc3242a,2024-10-23T19:15:14.920000
@ -242464,15 +242464,16 @@ CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884f
CVE-2024-10300,0,0,d1168f9c1ffba532571d74378610bb66b2289577686fbcbcb64095e338234da5,2024-10-23T20:15:05.060000
CVE-2024-10301,0,0,29f96455927e9f4a2ae674b61ef5b8d39692dd5959eef8ab3ccd238c47977136,2024-10-23T20:15:05.310000
CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000
CVE-2024-10313,1,1,04194b1dbc8be595a4e5096cd0c21e48e5ea37adc11df72735299fd02aaeac0a,2024-10-24T18:15:05.920000
CVE-2024-10313,0,0,04194b1dbc8be595a4e5096cd0c21e48e5ea37adc11df72735299fd02aaeac0a,2024-10-24T18:15:05.920000
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
CVE-2024-10327,1,1,700b62762191bb41bc182ea69953bf414df4934f86eb96bd3a0692e3d649e1f1,2024-10-24T21:15:11.730000
CVE-2024-1033,0,0,6041b3ccd70df4052a8c26438331689f702c93b37a47aeb2d707df9d77ed7f49,2024-05-17T02:35:12.047000
CVE-2024-10331,0,0,0ea4704cb0b6d504547be8cbdae887d3647db162f6beaaee72d4b7584e44cc6c,2024-10-24T11:15:14.327000
CVE-2024-10332,0,0,85cf635cfe3f26ffd48ff5c222b99c1eb587859c46939f8e6364d970eb422157,2024-10-24T13:15:11.830000
CVE-2024-10335,0,0,d1262d29e5dc663657a331eba3883b5a351e7279597dd05852a56269f6e891d2,2024-10-24T17:15:14.823000
CVE-2024-10336,0,0,33e82271c1bad361b028f2e98191e887a62f8fe553b83c9e8d440090c3c1fb29,2024-10-24T17:15:15.143000
CVE-2024-10337,1,1,a69476b83db6c1f12d365a088fb8bc4d825727f073e5a237b1dd6d1ef8718249,2024-10-24T18:15:06.170000
CVE-2024-10338,1,1,834519410f43f4f4c77b02126281b19245f19896884e0511305f98f5f48cd646,2024-10-24T18:15:06.437000
CVE-2024-10337,0,0,a69476b83db6c1f12d365a088fb8bc4d825727f073e5a237b1dd6d1ef8718249,2024-10-24T18:15:06.170000
CVE-2024-10338,0,0,834519410f43f4f4c77b02126281b19245f19896884e0511305f98f5f48cd646,2024-10-24T18:15:06.437000
CVE-2024-1034,0,0,454f09f0f5fc636699352f4449a6882a204ccb564a121fe5e40109839ef595a1,2024-05-17T02:35:12.150000
CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000
CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000
@ -243693,7 +243694,7 @@ CVE-2024-20433,0,0,5e566651815d3cb842d80bb54328b0e8280ee578655d8a254f288aa4418bc
CVE-2024-20434,0,0,904368830c218856dc09e88c749c79a929855ae5c25f03306a83a7691e310e6c,2024-10-08T16:20:30.933000
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
CVE-2024-20436,0,0,5d5cf7d2b852964575995c0ffa88e22ef644ab7daf1e554efb7370d28d6f8d68,2024-10-08T21:00:00.670000
CVE-2024-20437,0,1,f5342e83073163f5076b37217bd88c609cebc8e5fd125a4eaf2dc842fb175051,2024-10-24T19:45:01.540000
CVE-2024-20437,0,0,f5342e83073163f5076b37217bd88c609cebc8e5fd125a4eaf2dc842fb175051,2024-10-24T19:45:01.540000
CVE-2024-20438,0,0,a9dc208e682d6b275639ddea51e6d0791542b6ddcec3dc7b8e7fc31fc89eece9,2024-10-08T13:54:46.450000
CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
@ -243709,7 +243710,7 @@ CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58a
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000
CVE-2024-20455,0,1,0eab0e0d21dc4342feafbdcb7840d45bd73b5886ce73a3d40c40f5d3f5d5114a,2024-10-24T19:47:49.750000
CVE-2024-20455,0,0,0eab0e0d21dc4342feafbdcb7840d45bd73b5886ce73a3d40c40f5d3f5d5114a,2024-10-24T19:47:49.750000
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
CVE-2024-20458,0,0,7fb1e55e612ee6c8cc09ba5c55e99526661fa33e17c363c55add3406c5a053f4,2024-10-22T18:03:09.777000
CVE-2024-20459,0,0,5cd54a48218e6b57b046cb69743cb297e897ffabcfc93cde2b5b5db91e60d9df,2024-10-22T18:06:48.333000
@ -243717,8 +243718,8 @@ CVE-2024-20460,0,0,358defc63ad86f792960aac125709e2fb3ed671fce4437f964487072e33fe
CVE-2024-20461,0,0,c15342729fb0990fca2c54c1ab369938cf9683949c2cefcc250f30164551b25e,2024-10-22T18:26:01.890000
CVE-2024-20462,0,0,b4e4c93a961318330887a3ec7cd87acb06e21170fac85cb813ac45cad8cb70ab,2024-10-22T18:33:31.410000
CVE-2024-20463,0,0,2fbbbaedfda9bb304c7dda8b513af588802004e5e8905e7372610fd9adcd741c,2024-10-22T18:36:35.487000
CVE-2024-20464,0,1,f24579468ebdb84e5fe9b1671318293b6d5b473cae484edf3392abda0d117c91,2024-10-24T19:47:29.740000
CVE-2024-20465,0,1,58c61302cfd8374a2de79b49d5aac585902b54820b0fbcf82d9f704341c07483,2024-10-24T19:46:15.007000
CVE-2024-20464,0,0,f24579468ebdb84e5fe9b1671318293b6d5b473cae484edf3392abda0d117c91,2024-10-24T19:47:29.740000
CVE-2024-20465,0,0,58c61302cfd8374a2de79b49d5aac585902b54820b0fbcf82d9f704341c07483,2024-10-24T19:46:15.007000
CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000
CVE-2024-20467,0,0,c1af58980ccad99499fcb95639264b5a0614f69936f5a7ffc5edb35f8fbf6c29,2024-10-03T20:09:50.970000
CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000
@ -244801,7 +244802,7 @@ CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36
CVE-2024-21684,0,0,59f12a4b04761da303d7e3a40c8e6edc45c41d4945c065d5a0ffea737104115d,2024-07-25T12:36:39.947000
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000
CVE-2024-21687,0,0,376ba9a42cfc804d783dd58059d1accf85ade36be58bc6e24e95588c80302a09,2024-08-01T13:46:48.050000
CVE-2024-21687,0,1,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000
CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
CVE-2024-21690,0,0,63aa6e78c909be7fa5e5f93bbdaf8524fe66cd24db06ace89e57fd339e74e16d,2024-08-21T17:25:08.560000
@ -251907,7 +251908,7 @@ CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79a
CVE-2024-31495,0,0,cc64a104bd02c0ad2ecb59ee5b7d31fe176ceb300f836393c6f4ac68db9adc74,2024-06-13T18:36:45.417000
CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9af9,2024-06-20T19:15:49.960000
CVE-2024-31498,0,0,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000
CVE-2024-3150,0,1,c04bcaa026ade77c6b3f2254ca025e593677eeaae597c362ec21f5c24ac7a445,2024-10-24T19:35:19.290000
CVE-2024-3150,0,0,c04bcaa026ade77c6b3f2254ca025e593677eeaae597c362ec21f5c24ac7a445,2024-10-24T19:35:19.290000
CVE-2024-31502,0,0,48eff8d0e1056f4d498c02b25fa6f36fe79ddc405bd5236ddde6ae6266b87571,2024-07-03T01:55:04.920000
CVE-2024-31503,0,0,63f26c08bc84d4a6878a828315f5d6a190e4224cc41f797a0adf367284c5896d,2024-08-19T21:35:06.150000
CVE-2024-31504,0,0,ff5e6de58bbe8f153bd36ad8b71b66ea5d63fceb3d05f083e0fcf1527f2e563c,2024-07-11T16:23:42.943000
@ -254206,7 +254207,7 @@ CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f769
CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000
CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000
CVE-2024-34731,0,0,c2796903b18972c85283f94e39f216adab1245ab24ab7429de75a096f2bef3ba,2024-08-19T13:00:23.117000
CVE-2024-34734,0,0,889d7cdea2a82a0f6a204d9bb0c40732ce31288993c2c8f191f18be876975fbf,2024-08-19T13:00:23.117000
CVE-2024-34734,0,1,03ca469f8cd315011dd153921c263a875a2212423b28ba9a9477308f69d8631d,2024-10-24T20:35:05.433000
CVE-2024-34736,0,0,af7fdcabef2746a86c0f80295ca02f0456c75246f9b931e1983da2058f718a9f,2024-08-19T13:00:23.117000
CVE-2024-34737,0,0,8a32b951cb912392f48b43bbae36eebc622522d304125ad1990c6adfae52defd,2024-08-19T13:00:23.117000
CVE-2024-34738,0,0,cabf58b36133aa62c93cf33c152bee953c7fc9fc19123e817a90962fd3ea12ad,2024-08-19T13:00:23.117000
@ -254435,7 +254436,7 @@ CVE-2024-35173,0,0,49a434371ec4a6229edf5da12202cfa5598a4af286c41c326bfe7f54ebc1c
CVE-2024-35174,0,0,b1c7ded9fc748474b589a3a5bf1c3406f1a807641e59436d3b061c2f7ba5cdeb,2024-05-17T18:35:35.070000
CVE-2024-35175,0,0,c8c86729e26a3f8e4e543bcb56b2884e73c6c8c90917029f391628b680dfad69,2024-05-15T16:40:19.330000
CVE-2024-35176,0,0,6ca7e7edb5c74cc4529c2f1d06dd954facb0383c2589dae58213add18d8e2594,2024-05-17T18:36:31.297000
CVE-2024-35178,0,1,966d194fde3b588d2e33c6baaec163a3ac04113c9251192e56ae69f02639f080,2024-10-24T19:22:04.123000
CVE-2024-35178,0,0,966d194fde3b588d2e33c6baaec163a3ac04113c9251192e56ae69f02639f080,2024-10-24T19:22:04.123000
CVE-2024-35179,0,0,60884268b480220b0ed8e7d049c3aba7d13418af0d36f7c5bd91c29c2d5e7e96,2024-05-15T16:40:19.330000
CVE-2024-3518,0,0,7a83fec6c9edcb89d532948688bb01695519330d58da21735682b3ae91dffe67,2024-05-22T12:46:53.887000
CVE-2024-35180,0,0,190aa281c362464f8b05fe476a49394f7d0058a0dab615a9223a47f1581d0fb3,2024-05-21T16:54:35.880000
@ -255199,7 +255200,7 @@ CVE-2024-36127,0,0,f67ed99c9205750d87408264109b0b2da12607ef1d07ca1d5849393d1955e
CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5007,2024-06-03T19:23:17.807000
CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000
CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000
CVE-2024-36130,0,0,4671d62b05ac637a601468320fbde1254b9e1ab2c793e3e63f9ae03e57d902ad,2024-08-12T18:52:50.947000
CVE-2024-36130,0,1,723d001970495d97ee77549d24284e1d4ff25a575094f2e8f64d2626c31b3c6f,2024-10-24T20:35:06.217000
CVE-2024-36131,0,0,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb25e,2024-08-21T18:35:05.670000
CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000
CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000
@ -255634,7 +255635,7 @@ CVE-2024-36857,0,0,a3957f20952d5f831d537cb81d4dc06ce5ec4152a9e930178e7fb48d5d56e
CVE-2024-36858,0,0,bf952cd9ddab2a4c534851d95449ac4e2ed1c44a5763e3b560caa5613bebe64c,2024-08-14T19:35:23.693000
CVE-2024-3686,0,0,4edaa8377de4644f957d15220cb91ea9e071a6615200cbf20f58f4b97f92967e,2024-05-17T02:40:03.933000
CVE-2024-3687,0,0,0790df61296b0929bb9b469121387dd5b7cd2b562eeab594414896ab3fb872c8,2024-05-17T02:40:04.027000
CVE-2024-36877,0,0,fb3a2ad7e0cda628050a16e7622b1d0d259b14fce2ceaae888658e10a286c5d3,2024-08-15T16:15:19.160000
CVE-2024-36877,0,1,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000
CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000
CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000
CVE-2024-36881,0,0,462fdd40c8930daf000297e318f0ca45e554b77fd5b7375bf9db7855ebe0f739,2024-05-30T18:18:58.870000
@ -255968,7 +255969,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5
CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000
CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000
CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000
CVE-2024-3727,0,1,b0e2ad58d0d2a68040573151b20db183d58ae1205fb7aacdf4a0e26b9877e66f,2024-10-24T18:15:08.177000
CVE-2024-3727,0,0,b0e2ad58d0d2a68040573151b20db183d58ae1205fb7aacdf4a0e26b9877e66f,2024-10-24T18:15:08.177000
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000
@ -256739,7 +256740,7 @@ CVE-2024-38308,0,0,fe139b0ba6074f0e39f21bcc0d3b2863f88a6047b3a5a779d5f8bedf54884
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000
CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000
CVE-2024-38314,1,1,f448bf43b0dcbd6f94057272eb0ce97542343e31622558d7a1a88ad6059e9f30,2024-10-24T18:15:07.957000
CVE-2024-38314,0,0,f448bf43b0dcbd6f94057272eb0ce97542343e31622558d7a1a88ad6059e9f30,2024-10-24T18:15:07.957000
CVE-2024-38315,0,0,aeb4bea82071a33b9340679ee227ee40ee52d5ed9a6712f0f0c3d02c04ca6f7f,2024-09-20T14:09:24.733000
CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804509,2024-06-24T12:57:36.513000
CVE-2024-3832,0,0,9a695728462575e75497ca13bb41d4307d467f786773e32ceb92b024954b50b9,2024-08-14T20:35:21.240000
@ -257986,7 +257987,7 @@ CVE-2024-40422,0,0,d3469c3cd9d0a29c183d0e0059bb4038c9b4a37bd15891a6493843f933bd0
CVE-2024-40425,0,0,00190f9170b077ba334795fc09138437ec577bc0e167bbe92fc8ad126823e729,2024-08-01T13:57:26.300000
CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000
CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000
CVE-2024-40431,0,1,5fb9c8d8e8eca2c6ce117cc8be2e6523610d310535354e9e5f55716d61b6e614,2024-10-24T18:35:07.010000
CVE-2024-40431,0,0,5fb9c8d8e8eca2c6ce117cc8be2e6523610d310535354e9e5f55716d61b6e614,2024-10-24T18:35:07.010000
CVE-2024-40432,0,0,c6bfa7d4fd77ce07d834ccbc132b9835555374c8e776fbf0436e00b0d426ea31,2024-10-24T16:35:06.560000
CVE-2024-40433,0,0,e7a4ec9affcd5459ba2865b747a3c21f3af0ec6afc5f3d7573785ee38941782a,2024-08-01T13:57:28.500000
CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000
@ -258040,7 +258041,7 @@ CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce19
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
CVE-2024-40530,0,0,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
CVE-2024-40531,0,0,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
CVE-2024-40531,0,1,cc72e41b5bd2c6e2acfb1db33dcaeb70a55b5a6a8e5bfdb7a47fc8a0c92293ce,2024-10-24T20:35:06.753000
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
@ -258582,8 +258583,8 @@ CVE-2024-41247,0,0,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1
CVE-2024-41248,0,0,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
CVE-2024-41249,0,0,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
CVE-2024-41250,0,0,ed2ec7774a8ec7b69d0fb8bbb5a6282e439116063707acc8ce2b97cfaf8b3d0e,2024-08-08T21:35:16.680000
CVE-2024-41251,0,0,da008bc6dc7814b48f867f21af4633a6806e17edefa70e303dbf35845dd6cab0,2024-08-08T20:35:09.980000
CVE-2024-41250,0,1,e8c371b03a2b06097cf7b2f842c8aceaa0ac0c54683cfa50a27fdd6a98e8319c,2024-10-24T20:35:06.947000
CVE-2024-41251,0,1,680fca5f9457aaf0fe813ceb0c7b82b77965d9e2392bd52cc49d8a570b8ba3f2,2024-10-24T20:35:07.133000
CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000
CVE-2024-41254,0,0,f212e1634835b1fd96f85fe8003b7cfe4c7c22a05d9dcb9e60d767469bc03438,2024-08-15T13:15:29.170000
@ -259619,7 +259620,7 @@ CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b627
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
CVE-2024-42812,0,0,5004482ab060d12928a1d563b5c5dacbbbdd48ef5a3cb8b0e65730030005a510,2024-10-10T20:18:11.100000
CVE-2024-42813,0,0,ac2ce0206860ac49c7a00dc981456912113a83f39c5bd8ad9fc9aeb5495f6bf9,2024-08-20T15:44:20.567000
CVE-2024-42815,0,0,fa939825da2520b0805320da8ef3bf06e37d61d20e773887864a50a3aa224eef,2024-09-03T21:15:16.197000
CVE-2024-42815,0,1,70be5d3a8744ada575f0b9865a24fec76f60de84aad90d61f985ade26c35ea95,2024-10-24T20:35:07.330000
CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95dec,2024-08-27T14:35:07.077000
CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000
CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000
@ -259674,7 +259675,7 @@ CVE-2024-42953,0,0,8851520fe29c4e2cdfe788f671b16257937bb484146dbc70d9979d7ec9114
CVE-2024-42954,0,0,d7dc5fdc7066bd66ef4157db7606f6118c02f98972de6c14f0326e5f39a08ace,2024-08-16T18:14:12.620000
CVE-2024-42955,0,0,00b8e7d9e7586e92f9d97b1e6a1644d4d4ca5fa3cfd628bfbd234416a0d76773,2024-08-16T17:35:08.957000
CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000
CVE-2024-42966,0,0,11fb4f8406b51aaf92dcd9c74f137affdd9a6a6d3d3dd012cff469b6ec43d58b,2024-08-19T19:35:09.913000
CVE-2024-42966,0,1,77e676b8250f096a6ea0260af1378bb768a2addd8ad1a0d47894c67e134689a8,2024-10-24T20:35:08.087000
CVE-2024-42967,0,0,9bc6baaf78abe67d011872c60700b9f7e2345b7623db19a03a7fee28d9c0f735,2024-09-06T17:35:16.717000
CVE-2024-42968,0,0,ea8af3ba9d524f0f7175c3ac05010317eb6e0c3232797df2ec4eeeed8bf7be47,2024-08-16T18:14:39.303000
CVE-2024-42969,0,0,8304dea3c274f1ae2ddaad05a344a9bb249c0e2abc4bd40a669c59c89b06623c,2024-08-16T18:35:15.027000
@ -259682,7 +259683,7 @@ CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828
CVE-2024-42973,0,0,ea510c6d08cc16bdb4d726fb68ca476e64ed97e5805f96a8d49cb53ef02d84a3,2024-08-16T18:11:51.570000
CVE-2024-42974,0,0,938719a5c39f954ba2ac313637062853a8371b455f4b682f3eb1a2aeb5004821,2024-08-16T18:11:47.980000
CVE-2024-42976,0,0,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000
CVE-2024-42977,0,0,284c1cb74b11c8add0a4a2fd16aa0430e19948019ec5006358de30f607388a3a,2024-08-19T20:35:17.330000
CVE-2024-42977,0,1,7367f2b13f0a3175b01c6619c589a12f88c913a35b3e0a4ed5daa8eed6519355,2024-10-24T20:35:08.860000
CVE-2024-42978,0,0,7f0bf0c687f04da83ed3192c78fe85643b350fb1ecb2a064e81c90dfb54e9756,2024-09-03T18:35:13.590000
CVE-2024-42979,0,0,8fe829910a5c801caddb18b0a08003433bde998168b919898eba6ac640ceb18a,2024-08-16T18:11:41.197000
CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000
@ -259692,7 +259693,7 @@ CVE-2024-42982,0,0,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613
CVE-2024-42983,0,0,c725dcbfb5bb576199cbbf3ee9c5a740bda0a1873727d4ce4b2ca1e69a43a819,2024-08-16T18:11:08.020000
CVE-2024-42984,0,0,2fd3b2ae263fff500fb556980428a38b378e10c4993fb651d635c225d8b2007e,2024-08-16T18:10:53.680000
CVE-2024-42985,0,0,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000
CVE-2024-42986,0,0,0b2d204ff26f9eb28ce17ac6820e07d93d61424a006dadbf321ab643bf7229ed,2024-08-19T21:35:07.937000
CVE-2024-42986,0,1,333c29170d72b4f06c7cca25735b4ef703fb9bbd3ea5ccd5d0f80272270b1301,2024-10-24T20:35:09.653000
CVE-2024-42987,0,0,78d20dcc8dedb262666f57c924ed05a38397e8611300fdadb69763919f535881,2024-09-03T18:35:13.793000
CVE-2024-42988,0,0,6aad3ac6d5993957fb72ff6f9df2be456bfc38550cbc776bedc5dee8b4a51ef7,2024-10-10T12:51:56.987000
CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000
@ -260499,7 +260500,7 @@ CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44f
CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000
CVE-2024-44135,0,0,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000
CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000
CVE-2024-44141,0,1,2b676934bee762ca814654c97686c92039f139c445711b8df78a2b6d97ae559a,2024-10-24T18:35:07.340000
CVE-2024-44141,0,0,2b676934bee762ca814654c97686c92039f139c445711b8df78a2b6d97ae559a,2024-10-24T18:35:07.340000
CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000
CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000
CVE-2024-44148,0,0,059ce4bebff22300cb485a8cc23c3238cb5bdcfaba9ac22cf4f5aea163483afa,2024-09-24T16:09:49.490000
@ -261016,6 +261017,7 @@ CVE-2024-45239,0,0,c3ffeaf25be7007252e004249861dec4385985427eba5bc5855dd2ae53128
CVE-2024-4524,0,0,8e732eea1a281702bf1b965cf73e8243f70f2376e5e0521757bce6618382002a,2024-06-04T19:20:41.520000
CVE-2024-45240,0,0,71d060de9ce29049494d6966979673903641ebddefc965fc9df5c7a08f6ba1cb,2024-08-26T12:47:20.187000
CVE-2024-45241,0,0,db0315abb9e90395d374e44a8c98955e324445d54e9a189001fc6da18a250f14,2024-08-26T16:35:14.650000
CVE-2024-45242,1,1,18d91e6932033aaec9d2a0b41034538b1797e282fe9646d40d2af10d74bfe2af,2024-10-24T20:15:04.243000
CVE-2024-45244,0,0,a9f691efb65025129369bbba49bc88f6c172529b68c55b8214f47c2d49100aff,2024-09-12T16:07:49.530000
CVE-2024-45245,0,0,b25df5848e1262f8558faee75f4c21da809ef74bc3ff13bc7e48405a4a50dd95,2024-10-07T17:47:48.410000
CVE-2024-45246,0,0,94be062f72d49f47aeb4b27d54c3f9016c0bc6c7db145a96e840fd34f148105c,2024-10-07T17:47:48.410000
@ -261028,7 +261030,12 @@ CVE-2024-45251,0,0,4723402deaff257a03485bee19d0c63cf2e4218538079529007db41f2e86b
CVE-2024-45252,0,0,d5507db1b0bfef3e2d4dc8033cbb1d8a5c92c659f9cc4356d3a7d9eed6325773,2024-10-07T17:47:48.410000
CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000
CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000
CVE-2024-45259,1,1,7332344db080c8332d8c2b2689d11bc571195487a52df5d104b5dea3e2db3b7f,2024-10-24T20:15:04.323000
CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000
CVE-2024-45260,1,1,1aa3fc7a31f1d175292f9ae22a3503f70b287eb23e86a51d9e5354e53eecdf35,2024-10-24T21:15:11.977000
CVE-2024-45261,1,1,a0d160f94d52e481048dbc76418ac520896782812f343ba6a62a70926a34a4d4,2024-10-24T21:15:12.057000
CVE-2024-45262,1,1,d0d1fc6e55fc07600b32b06bf58f90e08aff5f6855aa915ac2a24e96da72f708,2024-10-24T21:15:12.143000
CVE-2024-45263,1,1,da3f78074c5f3da8ff1b0c477c73c07ad05ca64c52a17c347c8391bfb261f0dd,2024-10-24T21:15:12.217000
CVE-2024-45264,0,0,822145f9a1da648532bc7a1b41e14edccb94fd2d8996f04c204c8fc97c8f117a,2024-08-30T15:02:34.610000
CVE-2024-45265,0,0,0bfdc3ea11a3a8b692c725170390e0ed5e5bfa861ba7586668c7c78868fd4e58,2024-09-05T18:30:23.883000
CVE-2024-45269,0,0,930c2dda66909b7393cc3daf8d8e0bcb8066c589d45124dd784354d0c2c32ffd,2024-09-04T11:49:36.950000
@ -261469,7 +261476,7 @@ CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d3278
CVE-2024-46240,0,0,e1fabb07f498fd1cd5336ee19dd4a0cded9959b31a2fc1d149406578714fa211,2024-10-23T15:12:34.673000
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
CVE-2024-46256,0,0,8bf470a14240bc761051ec27ff055fa64e8fa7727cdd73b13c40b5c555057a54,2024-10-24T17:15:16.690000
CVE-2024-46257,0,1,77ff81579b9686846d30b6279f2f3ca51486f319de7ee8b1a0a61768d1f232f7,2024-10-24T18:15:08.617000
CVE-2024-46257,0,0,77ff81579b9686846d30b6279f2f3ca51486f319de7ee8b1a0a61768d1f232f7,2024-10-24T18:15:08.617000
CVE-2024-46258,0,0,8b56e4a9f9fd1a589c584ad7ce0a4a87192f12ba82adb8f81ba743ebccc7f757,2024-10-04T16:41:08.497000
CVE-2024-46259,0,0,e52f3ae459d8b17def76efdc5501c5aee7ccdfd88a953171600235a977929f57,2024-10-04T16:40:29.857000
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
@ -261540,7 +261547,7 @@ CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1b
CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000
CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000
CVE-2024-46475,0,0,6dd32d21b34d5ed62fc4d47e4e31b7806525d2f693fc3da0c33e5fca3fe88762,2024-10-04T13:51:25.567000
CVE-2024-46478,1,1,95ee5e2c4e35afae36a9c0b6b6f68536735b14d9ae9e5853beb3b8db167d2831,2024-10-24T18:15:08.863000
CVE-2024-46478,0,0,95ee5e2c4e35afae36a9c0b6b6f68536735b14d9ae9e5853beb3b8db167d2831,2024-10-24T18:15:08.863000
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
CVE-2024-46482,0,0,0bd11529577a79bda1c61c449bff3d306490c152de71c2fae5d4eea05925babd,2024-10-23T18:35:03.670000
CVE-2024-46483,0,0,efd1621b21138809f35625ddb77fc021e753097710878e96af20d908574d610c,2024-10-23T19:35:11.493000
@ -261902,11 +261909,11 @@ CVE-2024-46988,0,0,e779744a9671f7163b46329d2305c8a1127f2655ca3ac90cf4c0a252af1bc
CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
CVE-2024-46990,0,0,a651df2006ba8ce24b06699e6e89ccb4decc32abf73ae7975ae4d0581b357bf8,2024-09-20T12:30:17.483000
CVE-2024-46994,1,1,49d5bf09d2fe81f6bd806321a9bb9a1c9bda4f75f99522632bb8d04104b0636c,2024-10-24T19:15:13.843000
CVE-2024-46995,1,1,4797f99ee69a6adf04c3acfa4aa75af0727164e3bb515bf340c219f12ab03f85,2024-10-24T19:15:14.137000
CVE-2024-46996,1,1,4e16780a92fc50de10e47210cf065b6c0b45866ce1f17019fe60c069c55f53c8,2024-10-24T19:15:14.383000
CVE-2024-46994,0,0,49d5bf09d2fe81f6bd806321a9bb9a1c9bda4f75f99522632bb8d04104b0636c,2024-10-24T19:15:13.843000
CVE-2024-46995,0,0,4797f99ee69a6adf04c3acfa4aa75af0727164e3bb515bf340c219f12ab03f85,2024-10-24T19:15:14.137000
CVE-2024-46996,0,0,4e16780a92fc50de10e47210cf065b6c0b45866ce1f17019fe60c069c55f53c8,2024-10-24T19:15:14.383000
CVE-2024-46997,0,0,1e9d71d3dbd956d3ef6cb30e686537e0e0a898601c4508e786607d0a3d9c0450,2024-10-07T17:20:10.427000
CVE-2024-46998,1,1,288003db18ccc322862e7f067e931335e4ad4a239f6ed7ccc91c1d5a25b486d7,2024-10-24T19:15:14.600000
CVE-2024-46998,0,0,288003db18ccc322862e7f067e931335e4ad4a239f6ed7ccc91c1d5a25b486d7,2024-10-24T19:15:14.600000
CVE-2024-46999,0,0,3f752cfc2057db8c9e88a86dc03848f68cfeb464ea96f96eaca0cf77bb84d96a,2024-09-24T20:20:39.253000
CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000
CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000
@ -261998,7 +262005,7 @@ CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691a
CVE-2024-47170,0,0,5b51e77bbaf0aa4d73aaed7035aaf98c0f3c0e8a355756474eeb1aa8a1be9c4f,2024-09-30T12:46:20.237000
CVE-2024-47171,0,0,48e31c72c69d0bb6a9d666c7c99661a52d3c05dd11adcb85b19ee942d0085d2e,2024-09-30T12:46:20.237000
CVE-2024-47172,0,0,4b79f4b3803af95fc411c443fe5cc5794c9441cfc034adffdc054b0882caedf7,2024-10-04T13:51:25.567000
CVE-2024-47173,1,1,25b0312246555b80a6520c6df372eba8e49ba0734474a70ffb9ed2408cefaebf,2024-10-24T19:15:14.817000
CVE-2024-47173,0,0,25b0312246555b80a6520c6df372eba8e49ba0734474a70ffb9ed2408cefaebf,2024-10-24T19:15:14.817000
CVE-2024-47174,0,0,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae7df,2024-09-30T12:46:20.237000
CVE-2024-47175,0,0,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000
CVE-2024-47176,0,0,1236859fb548f3604f95f88a62b235a85b1497f9815e39d76c2bb849d27602db,2024-10-02T20:15:11.520000
@ -262229,7 +262236,7 @@ CVE-2024-47562,0,0,f948ab473eac72b74771d65275c3bce022b2870f6200aad718c4a235ef7a7
CVE-2024-47563,0,0,8e14a8aeeab89240dc7f71203e62b9d2c2b2c697ebcb095329938e996837371a,2024-10-11T20:05:05.143000
CVE-2024-47565,0,0,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29d8c,2024-10-11T20:05:59.237000
CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000
CVE-2024-47575,0,1,45fa428c1b4284f712341ec98e74ee7d5ba71df025a020ce212880fb54ef8dfe,2024-10-24T18:56:47.930000
CVE-2024-47575,0,0,45fa428c1b4284f712341ec98e74ee7d5ba71df025a020ce212880fb54ef8dfe,2024-10-24T18:56:47.930000
CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000
@ -262468,7 +262475,13 @@ CVE-2024-47874,0,0,88e5d0bddb2eed021dc78650aabb938bda29c8272245d4971b4c42756e899
CVE-2024-47875,0,0,7d3f699a2dfd28fae24f11f0ffebcb02477b8963ab93d8f474f9ee88d14cf58e,2024-10-15T12:58:51.050000
CVE-2024-47876,0,0,1c9291ffcd100f5445236e1c704211e20624e03c95916aeaee6676900242dcd8,2024-10-16T16:38:43.170000
CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92bc00,2024-10-15T12:57:46.880000
CVE-2024-47878,1,1,6a12549d5ddab7cb2f08af44b6f03f9581ecd0ce4ccac29cde3371a2fe32d986,2024-10-24T21:15:12.293000
CVE-2024-47879,1,1,0637657e23bf47a56fc2ccd272e3d67c5502a5f9055f76ada6c94a9795fb6723,2024-10-24T21:15:12.523000
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
CVE-2024-47880,1,1,284aaacc3ea9751c521883a4130e34ef0be92bd63b4d6c94042c415d90c23524,2024-10-24T21:15:12.750000
CVE-2024-47881,1,1,b50839dd365fd4efe4b78d6ccb2b031d8e4f17af022b3e7bb61b4f89a88cd655,2024-10-24T21:15:12.957000
CVE-2024-47882,1,1,dfa40aa92880435b3b642b6706da4d6e6f5868973f7967fbe7de7582c65f84a2,2024-10-24T21:15:13.160000
CVE-2024-47883,1,1,5bc92c060441a71da4f11273814c3adebc694f79bfeba110bbb1aa8caa763089,2024-10-24T21:15:13.430000
CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000
CVE-2024-47885,0,0,0d40ba494c86913544c4c9553c55befe8904b360cb2214c55ae6a6aeadb78d12,2024-10-15T12:57:46.880000
CVE-2024-47887,0,0,a738abaa50c0f4cc119f2ab1db4d555ac635e57265d1892adcc800cfdded0011,2024-10-18T12:53:04.627000
@ -262558,14 +262571,14 @@ CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
CVE-2024-48139,1,1,d6ed07547f7603768865e253f9fa277c4c0effbd5fa0d391daf68b8f307d7eb9,2024-10-24T19:15:15.050000
CVE-2024-48139,0,0,d6ed07547f7603768865e253f9fa277c4c0effbd5fa0d391daf68b8f307d7eb9,2024-10-24T19:15:15.050000
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
CVE-2024-48140,1,1,dfeef73409fff7eba38e932c52f1a85532a96d7282df609347b4f4c1be1c9e21,2024-10-24T19:15:15.150000
CVE-2024-48141,1,1,eee86c527f910cf44eef17cb96788695084b540e91fdea5652cc9032c32ba2a0,2024-10-24T19:15:15.240000
CVE-2024-48142,1,1,5e09d80b70ae1c1370cf5625d40b9c9431b3acfa7452f829828119c0e1b16139,2024-10-24T19:15:15.333000
CVE-2024-48143,1,1,7d0f5bf4da43da110ac78a237a08e3a5ded43ba9ec77eb3c73f07d90f1591c4e,2024-10-24T19:15:15.427000
CVE-2024-48144,1,1,20ee409c728fbf50d2dd0717a0f9484a812232a1e6450931cf72a4a9d382fa50,2024-10-24T19:15:15.510000
CVE-2024-48145,1,1,f97aa6f2f2dc7108422f93720da6ac0ea9cb673f4750cd0be12c42fb4b0d0e9c,2024-10-24T19:15:15.607000
CVE-2024-48140,0,0,dfeef73409fff7eba38e932c52f1a85532a96d7282df609347b4f4c1be1c9e21,2024-10-24T19:15:15.150000
CVE-2024-48141,0,0,eee86c527f910cf44eef17cb96788695084b540e91fdea5652cc9032c32ba2a0,2024-10-24T19:15:15.240000
CVE-2024-48142,0,0,5e09d80b70ae1c1370cf5625d40b9c9431b3acfa7452f829828119c0e1b16139,2024-10-24T19:15:15.333000
CVE-2024-48143,0,0,7d0f5bf4da43da110ac78a237a08e3a5ded43ba9ec77eb3c73f07d90f1591c4e,2024-10-24T19:15:15.427000
CVE-2024-48144,0,0,20ee409c728fbf50d2dd0717a0f9484a812232a1e6450931cf72a4a9d382fa50,2024-10-24T19:15:15.510000
CVE-2024-48145,0,0,f97aa6f2f2dc7108422f93720da6ac0ea9cb673f4750cd0be12c42fb4b0d0e9c,2024-10-24T19:15:15.607000
CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
CVE-2024-48150,0,0,3a74ef17dd937b2ce7ec4baf65ca0a0269cc457ed04e16b8c883126dbac56b6f,2024-10-15T16:35:10.450000
CVE-2024-48153,0,0,ed2a32bb2c14f00255ae97ac8d2c6b7371ced6a3b47f478082697408eb2eccac,2024-10-17T18:35:10.707000
@ -262577,6 +262590,7 @@ CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f4
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000
CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000
CVE-2024-48208,1,1,8d9bf7193529295bbcf221221e1dad02aac7d666b68c4aaf492bea77d35673bc,2024-10-24T21:15:14.040000
CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000
CVE-2024-48213,0,0,9acba2f77331378acc2327633dc745b7cd0142fda56453bd7cad6ba33d483d3d,2024-10-23T22:15:02.600000
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
@ -262607,33 +262621,37 @@ CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab51
CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000
CVE-2024-48415,0,0,f0924ee00bd27af7c2e3b4df709006fd2e622c007a3785ddb6461472428a80bb,2024-10-23T16:35:09.317000
CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
CVE-2024-48427,1,1,b915126bb99cfd938cf21385d6a03b7881d183c1661def008f3bd462961c90da,2024-10-24T19:15:15.703000
CVE-2024-48423,1,1,89da1be78ed0de5633d53fa4447af647ff25fe50e4b81e14ef8f0786f2dc7e2a,2024-10-24T21:15:14.143000
CVE-2024-48424,1,1,dbc2e0c8c06b8ffdffd23459075027ff9cbcd101768c8979714c5a09f46fea57,2024-10-24T21:15:14.223000
CVE-2024-48425,1,1,d25461bc59be120a67c064e10771de5b714958b59599ddc0afeab7fb071765fb,2024-10-24T21:15:14.303000
CVE-2024-48426,1,1,9d7c477a1623fd3fcd4e2f8515f69e1566d150e8b3386e6fdf475fc323c3097e,2024-10-24T21:15:14.387000
CVE-2024-48427,0,0,b915126bb99cfd938cf21385d6a03b7881d183c1661def008f3bd462961c90da,2024-10-24T19:15:15.703000
CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000
CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000
CVE-2024-48440,1,1,88afc6f58873a5bd37dc9229c56f010e9701063642a2a78c89c795057409a8c3,2024-10-24T18:15:09.190000
CVE-2024-48441,1,1,e3b28b135bd4d048d7af438b2ad84c0f8403bdae07b4248663c93a98599da599,2024-10-24T18:15:09.583000
CVE-2024-48442,1,1,cd4f2215d895367e53ea257b0a4be0990410ba42e316921212d9f6d26caed6f7,2024-10-24T18:15:09.890000
CVE-2024-48440,0,0,88afc6f58873a5bd37dc9229c56f010e9701063642a2a78c89c795057409a8c3,2024-10-24T18:15:09.190000
CVE-2024-48441,0,0,e3b28b135bd4d048d7af438b2ad84c0f8403bdae07b4248663c93a98599da599,2024-10-24T18:15:09.583000
CVE-2024-48442,0,0,cd4f2215d895367e53ea257b0a4be0990410ba42e316921212d9f6d26caed6f7,2024-10-24T18:15:09.890000
CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000
CVE-2024-48454,1,1,34e88a1ad53cbd83b0c86e1af450c0246ceedd95ac8dfdc33afc121ec5dc990b,2024-10-24T19:15:15.803000
CVE-2024-48454,0,1,cbd7d1efbc522c443f78b7a0c38957e1ad80bf68787a915e8fbb212f54bd8823,2024-10-24T21:35:05.410000
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000
CVE-2024-48509,0,0,c6a322b44f1b5c48c99b4ab0a24ca78577b459bf4c9409e8862d334d073306ba,2024-10-23T15:12:34.673000
CVE-2024-4851,0,0,444f4e959fbd50fab42bb9cd6f5b1019a6d50ea56a5371bcf4f4fa6566e3e360,2024-10-17T18:45:13.093000
CVE-2024-48514,1,1,09d714c67d2d2f09be073ea6d53cfb7a82d3597f530a76d50d0b7f262abf2baa,2024-10-24T18:15:10.227000
CVE-2024-48514,0,0,09d714c67d2d2f09be073ea6d53cfb7a82d3597f530a76d50d0b7f262abf2baa,2024-10-24T18:15:10.227000
CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000
CVE-2024-48538,0,0,dadc6051db8759534fe89315aed37502c34e5b56c665246d832d6d18a18543de,2024-10-24T16:15:05.210000
CVE-2024-48539,0,0,be4889126f141dfbdc6e2433d99c3daffa1a8da8d0c7c7fc879a44f6c2251d0c,2024-10-24T17:15:16.873000
CVE-2024-48538,0,1,93c25a23e70da94546cfcd6a85313310cb2740d1f764ddbbbbd1d1a3ec0b79f8,2024-10-24T20:35:10.890000
CVE-2024-48539,0,1,e6db30982b3fe01f6a261ef9b0aa8eb6f3c5c34d50d31b9e3da7e644365a2ee9,2024-10-24T20:35:11.713000
CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000
CVE-2024-48540,0,0,58c5ed3a4f6c16734d8df4a028a090a29237a126df7814573b2ad97904b8f426,2024-10-24T17:15:16.967000
CVE-2024-48541,0,1,2d1760725ee9fc68d63395107ba154f476370d3f43646be2a1e082989d14d579,2024-10-24T19:35:04.263000
CVE-2024-48542,0,1,95d0562f9fbfeb9012b52632ad838b2b85fa093f22956c17a96e66e33b2baf4b,2024-10-24T19:35:05.013000
CVE-2024-48544,0,0,124659c28d5b6f5e5cdb2a9ad0e42300f914ae0aa4e9efb15dd6f767f0dbfa8a,2024-10-24T17:15:17.257000
CVE-2024-48545,0,1,ef403d082c3d91800733fca609f0434128edabfbaae749785d13c103549498e3,2024-10-24T19:35:05.767000
CVE-2024-48546,0,1,3d5f1fe8e93e0caca62917dfb71818c633551cf5ded134b2d4b4298fccd0322a,2024-10-24T19:35:06.563000
CVE-2024-48547,0,1,2bbaa609896584d67644fbb09a4bfdbea61913d2d0753af7e9e6b82679e61355,2024-10-24T19:35:07.320000
CVE-2024-48548,0,0,34778b0a1151822f708ea1f53b0b807b21b36fa281f672fd592e9a5093322129,2024-10-24T17:15:17.663000
CVE-2024-48541,0,0,2d1760725ee9fc68d63395107ba154f476370d3f43646be2a1e082989d14d579,2024-10-24T19:35:04.263000
CVE-2024-48542,0,0,95d0562f9fbfeb9012b52632ad838b2b85fa093f22956c17a96e66e33b2baf4b,2024-10-24T19:35:05.013000
CVE-2024-48544,0,1,eecaf3c9522aac12bd369d4e73db52bc1e66dce83085e58f7146e19d1b1d06fe,2024-10-24T21:35:06.263000
CVE-2024-48545,0,0,ef403d082c3d91800733fca609f0434128edabfbaae749785d13c103549498e3,2024-10-24T19:35:05.767000
CVE-2024-48546,0,0,3d5f1fe8e93e0caca62917dfb71818c633551cf5ded134b2d4b4298fccd0322a,2024-10-24T19:35:06.563000
CVE-2024-48547,0,0,2bbaa609896584d67644fbb09a4bfdbea61913d2d0753af7e9e6b82679e61355,2024-10-24T19:35:07.320000
CVE-2024-48548,0,1,6aa626d9d4fb8e41914be3bc122dcb6a13ad79eabefb0826ec61c69e3c941808,2024-10-24T21:35:07.050000
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
@ -262751,6 +262769,8 @@ CVE-2024-48927,0,0,01a9606e87c9d0fe295b7af78c12d3892f336c8d52386afeb159eacf9a03d
CVE-2024-48929,0,0,8f42514e5e40293361141ad0a32c5cc2c18cee04cb42f38abe2f83b6fba170dd,2024-10-23T15:12:34.673000
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000
CVE-2024-48931,1,1,db9cdbd978b5e846ca388828c9a36b00b388132edef9463aebcc700ba8e86180,2024-10-24T21:15:14.580000
CVE-2024-48932,1,1,72ddca77e442289d84b6d93c091c087fe60047a92c1cee4761989b03164b7098,2024-10-24T21:15:14.790000
CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000
CVE-2024-48938,0,0,42546c0230f7c9740d6f2b303141b0c584cd79f3d515c30c7b8554d560fc1ee9,2024-10-17T19:49:56.327000
@ -263054,23 +263074,23 @@ CVE-2024-49859,0,0,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99a
CVE-2024-49860,0,0,58465836429dbe2e6aaf835a73a59e39240a71d370ac212d7b09986db7503b3c,2024-10-23T16:44:58.473000
CVE-2024-49861,0,0,1653e7df85a45b515fcdc441f9cb9f122cb6f11d500f6cbca9f4d9d62723f07c,2024-10-23T16:48:47.573000
CVE-2024-49862,0,0,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c511,2024-10-23T16:53:51.050000
CVE-2024-49863,0,1,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000
CVE-2024-49863,0,0,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000
CVE-2024-49864,0,0,11ee8b000b9a62890a75dd63920e4a33890ab9d058f73a94a2fe3382caeb81d2,2024-10-23T15:13:58.783000
CVE-2024-49865,0,0,c4cae66eab62f15595d2364d0fa9447b0b6ab33d31dbe60340c7ef0ef852d1c8,2024-10-24T03:44:33.947000
CVE-2024-49866,0,0,64fdfad45770d631f65ff417b8e0b441a9ced54aafec781f55abff0506219420,2024-10-23T15:13:58.783000
CVE-2024-49867,0,0,11525928326247994afa37f5f74290d14e35f5766721fa984acf8b349134099f,2024-10-23T15:13:58.783000
CVE-2024-49868,0,0,6609c1a314b5164f8a7adeabef80c2a74cbb80bc7c2a2e5c84963dbc51c9cd4a,2024-10-23T15:13:58.783000
CVE-2024-49869,0,0,d690b4f2f8651d319485a5bc5cca48765c250e0f74f356167c1a1d3ed44b7fd9,2024-10-23T15:13:58.783000
CVE-2024-49869,0,1,1ef7e6775f5061caa7e4dead4df8426a79419a75af385b7d702a23087606b23b,2024-10-24T20:28:21.597000
CVE-2024-49870,0,0,bd25832bdab748cbefddb0beafc59ded25cc04cad6fd191b9be1b37f3e63d060,2024-10-23T15:13:58.783000
CVE-2024-49871,0,0,ff3a0400aee2237325121a8977f8f422a8adc0802dd41c581f84b4b2b95f7591,2024-10-23T15:13:58.783000
CVE-2024-49871,0,1,c02508465ea9d0c1ce0cc95a6cd2e44aadfbb3634ea87e7cb860d1d87e5795b7,2024-10-24T20:22:19.530000
CVE-2024-49872,0,0,f6cbcd97baebde3f8280c71cb6b25b64732424c878389d8a2470cbdc55168647,2024-10-23T15:13:58.783000
CVE-2024-49873,0,0,c6b069511598e461d2e296ba6e220ac16e5f671f4d49f2f2af9d3aa6afc61d05,2024-10-23T15:13:58.783000
CVE-2024-49874,0,0,4f4502a656a6919bb0fc2df63ac79790c27837d9594594fa2f35c7d172253253,2024-10-23T15:13:58.783000
CVE-2024-49875,0,0,82bafbcf170d072fa3aabc0828e31168f5d6064939d809bc95477f24f2a13491,2024-10-23T15:13:58.783000
CVE-2024-49876,0,1,0c2ec3870c02d4651dcfea621e276acb9d0ae36a4e21afff13d7735e3b487729,2024-10-24T19:57:06.843000
CVE-2024-49877,0,1,d6737343e2e6d35b24e2372e9def747b4bc65b280702cdab9fa882c14670143a,2024-10-24T19:58:55.383000
CVE-2024-49873,0,1,9dd0affda433e9ea1287a2619ec66001c95cda8669905ec1e1e5816fb33b6e00,2024-10-24T20:22:42.387000
CVE-2024-49874,0,1,bb64364be843ef37eaa2e7e28e1c1f68871769861f3b1beeca2cf5035cca4de4,2024-10-24T20:27:51.700000
CVE-2024-49875,0,1,752d21cda2ec448a67a51c1316311354be9fdd8594fd8f17251472d1e3b8d00b,2024-10-24T20:13:50.927000
CVE-2024-49876,0,0,0c2ec3870c02d4651dcfea621e276acb9d0ae36a4e21afff13d7735e3b487729,2024-10-24T19:57:06.843000
CVE-2024-49877,0,0,d6737343e2e6d35b24e2372e9def747b4bc65b280702cdab9fa882c14670143a,2024-10-24T19:58:55.383000
CVE-2024-49878,0,0,b8c9bc38c52857d113170f626183012a77e29f98422a41470a6d55d4836a25af,2024-10-23T15:13:58.783000
CVE-2024-49879,0,1,4ba4f4e2755978e6b26e142493deaf8ac3f7043a28c24533d747809c633568d6,2024-10-24T19:59:12.897000
CVE-2024-49879,0,0,4ba4f4e2755978e6b26e142493deaf8ac3f7043a28c24533d747809c633568d6,2024-10-24T19:59:12.897000
CVE-2024-4988,0,0,ff557f66f633c813e65ed42f6b56820b4233d3efc23d00548e6797ba166f3d35,2024-08-21T03:15:05.460000
CVE-2024-49880,0,0,451749fefd67e74bbeb3c0f709643bae60f2a71eb71ec77d830a94e7a1231b73,2024-10-23T15:13:58.783000
CVE-2024-49881,0,0,a457e708f151afe70f4353ab787a197eced712e7eb008a4ae460560f613817df,2024-10-23T15:13:58.783000
@ -263117,7 +263137,7 @@ CVE-2024-4992,0,0,e061228a83f2d41e21e64f404fd50aefb3a354b638438e4cf4870e41885d01
CVE-2024-49920,0,0,1be42ef77ee9fc1c65ad81ab0dcd66fba1641a6fdde817094ddeecfb3f06d5d0,2024-10-23T15:13:25.583000
CVE-2024-49921,0,0,6967ef728c2f67d4bb212d10da40edb6fbaf0fe7acdb581bbe0d307f401b8b13,2024-10-23T15:13:25.583000
CVE-2024-49922,0,0,ca91ba7162cc32dc4e2cf14fb163208d854cd671aa75638cf4d3976a29621ea0,2024-10-23T15:13:25.583000
CVE-2024-49923,0,1,09ac36e1842b66b81133b68e0fa1454145946558f64c3262440b063666a332ca,2024-10-24T19:43:27.327000
CVE-2024-49923,0,0,09ac36e1842b66b81133b68e0fa1454145946558f64c3262440b063666a332ca,2024-10-24T19:43:27.327000
CVE-2024-49924,0,0,e3e9d77dac8e6a933e59737e42ece4edc4793234e163acb67d340babaa85575b,2024-10-23T15:13:25.583000
CVE-2024-49925,0,0,6717452f4abf1a8f70ff5a0320447c3ada5e06f5537ce54743f004253e0476ee,2024-10-23T15:13:25.583000
CVE-2024-49926,0,0,c340907a54f3f82bc1267ccf326bdc9da10ebc5c7cb46a2ab73c0d413d3ff7bf,2024-10-23T15:13:25.583000
@ -263235,26 +263255,26 @@ CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed65
CVE-2024-50030,0,0,0347086f25dca26915e1436dcfd2de7f4b8fab3635e9fbe7eb8d2175af5dab95,2024-10-23T15:12:34.673000
CVE-2024-50031,0,0,cc20af791cbec3a7c1c3bd59071b20e2915a6a03702994dd9f9650b8797df511,2024-10-23T15:12:34.673000
CVE-2024-50032,0,0,9431344800434d7ee15e18d71c026f970a422c249ecc1b3c7c4159bc2d6ab597,2024-10-23T15:12:34.673000
CVE-2024-50033,0,1,31b01ea83bcca81918c070b63b5485c88672f34d727199970bc597721f06bb09,2024-10-24T19:56:04.097000
CVE-2024-50034,0,1,ef0ee6c054fa6d95d82a1cc5e3a063aef10790efa19e561bb55f1a0df403b297,2024-10-24T19:56:29.170000
CVE-2024-50035,0,1,9397571eb914efebc6686d6fee86d3765ca656654c3527a13621032f6dad372b,2024-10-24T19:54:01.987000
CVE-2024-50033,0,0,31b01ea83bcca81918c070b63b5485c88672f34d727199970bc597721f06bb09,2024-10-24T19:56:04.097000
CVE-2024-50034,0,0,ef0ee6c054fa6d95d82a1cc5e3a063aef10790efa19e561bb55f1a0df403b297,2024-10-24T19:56:29.170000
CVE-2024-50035,0,0,9397571eb914efebc6686d6fee86d3765ca656654c3527a13621032f6dad372b,2024-10-24T19:54:01.987000
CVE-2024-50036,0,0,28901e0166f56dd1988eca00f958e5283f611146fde3cc7b000114e6ee533ed9,2024-10-23T15:12:34.673000
CVE-2024-50037,0,0,4ee031bfddc4e8f99ddb949f282f6ad1a356c779ae1c3537126fd37e56dbeca8,2024-10-23T15:12:34.673000
CVE-2024-50038,0,0,13f261ea139b7c77c532175eab38c9e4be7c3afe3db507ae1ed5105376d28292,2024-10-23T15:12:34.673000
CVE-2024-50039,0,0,75801edb89c7be222bf7c69a5ad76563c04d4f50df342fe887cbc18b83b75ff9,2024-10-23T15:12:34.673000
CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000
CVE-2024-50040,0,0,981131558689eff63e7408bc26260009c579c8ae379b09b9fc858d45385e4ec1,2024-10-23T15:12:34.673000
CVE-2024-50041,0,1,d48ad1d9e36b6ac3d6d954212f935345fcc28a78e693e8da5498dd1085259517,2024-10-24T19:31:39.373000
CVE-2024-50041,0,0,d48ad1d9e36b6ac3d6d954212f935345fcc28a78e693e8da5498dd1085259517,2024-10-24T19:31:39.373000
CVE-2024-50042,0,0,47d7a84ed9d469b00f4e210ab7562f73a18e6669a1c07a4576676ffef293e83f,2024-10-23T15:12:34.673000
CVE-2024-50043,0,1,2972cb53a30dd078fc2eb8fda442a65781870d0dbaebb36d8be92565bfd7f051,2024-10-24T19:32:21.480000
CVE-2024-50044,0,1,41e0e7cf31c36df6f6442bbd80b53a07a7e614cf4d1cf42a43ab7eecafb0b9a9,2024-10-24T19:36:12.717000
CVE-2024-50045,0,1,6b3c6f611baa60631c237de06e0c9f244d76e5c84ee48cc375c5fff0d7c11f86,2024-10-24T19:38:03.343000
CVE-2024-50046,0,1,92dff903e2c1a515c4d71882720d0d8376f6d82cd5b825071a3b47f34c34752e,2024-10-24T18:59:55.950000
CVE-2024-50043,0,0,2972cb53a30dd078fc2eb8fda442a65781870d0dbaebb36d8be92565bfd7f051,2024-10-24T19:32:21.480000
CVE-2024-50044,0,0,41e0e7cf31c36df6f6442bbd80b53a07a7e614cf4d1cf42a43ab7eecafb0b9a9,2024-10-24T19:36:12.717000
CVE-2024-50045,0,0,6b3c6f611baa60631c237de06e0c9f244d76e5c84ee48cc375c5fff0d7c11f86,2024-10-24T19:38:03.343000
CVE-2024-50046,0,0,92dff903e2c1a515c4d71882720d0d8376f6d82cd5b825071a3b47f34c34752e,2024-10-24T18:59:55.950000
CVE-2024-50047,0,0,14e282f60ba539c523eed67f2ff3efdc4ac28f90eb922d10809f6bfe74f01181,2024-10-23T22:16:21.783000
CVE-2024-50048,0,0,d005bc43ac7dffe85bb1b4c62a0be79335a5f23ef87660a48780d7c73272a7ca,2024-10-23T21:46:11.533000
CVE-2024-50049,0,0,8a3f3791bfb77ef3d490e872a72df28d44a50dd01f038b8f63798b04c8c73740,2024-10-23T21:45:43.657000
CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506ca,2024-10-15T12:58:51.050000
CVE-2024-50050,0,1,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000
CVE-2024-50050,0,0,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000
CVE-2024-50055,0,0,223ed98e7a7f4160f8634a62679e487b1296c8eb2d61be84de5731c91a2cb49b,2024-10-23T21:45:15.137000
CVE-2024-50056,0,0,67d5758c0ace6615570a11511305d2b63ab44abb1709d3f0417dc90e404e22ad,2024-10-23T15:12:34.673000
CVE-2024-50057,0,0,ba05620682b6a9a556450ee0eed48c115fc6212d5ab9174ae69859e3d6638159,2024-10-24T16:12:52.007000
@ -263296,8 +263316,8 @@ CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a8
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
CVE-2024-50382,0,0,ef507e79e3a47cb5db46886c833025ed9d096f55ed6dede99fee1d7a588181b0,2024-10-23T17:15:19.453000
CVE-2024-50383,0,0,b31f839fb6680eaf55759b6413c371459ae54edfc8f56e29ccc0f46b2b3bc113,2024-10-23T17:15:19.540000
CVE-2024-50382,0,1,c7db57f8effd3e1ea04692a5bac746c796993a38c824e102eb82dd6f88f2b374,2024-10-24T20:35:12.650000
CVE-2024-50383,0,1,0c7ab126828c2415a37efc5d6f10e03eeca3ebe4707c43955c3e9d43f8de4938,2024-10-24T20:35:13.417000
CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000
CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000
CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000
@ -263448,7 +263468,7 @@ CVE-2024-5202,0,0,506e1bf31418d031771b54eb5cec35a7698867910819f07cfbd45cd0a9a0bc
CVE-2024-5203,0,0,e867d44b31fa735ecaef1844aba382841138e742c9b7e957e6089969316cab00,2024-09-13T11:15:10.197000
CVE-2024-5204,0,0,87eb5b753d379a1bd1ef79b260f2b73c84b7ff9a4b79082cf351323e04c98a6d,2024-05-29T13:02:09.280000
CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e385d,2024-05-24T13:03:11.993000
CVE-2024-5206,0,1,b3f524211e1d68f8da056248f629dbe7f435bd9f6a2b4ba4133bd7fb2ec50998,2024-10-24T19:48:31.637000
CVE-2024-5206,0,0,b3f524211e1d68f8da056248f629dbe7f435bd9f6a2b4ba4133bd7fb2ec50998,2024-10-24T19:48:31.637000
CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000
CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000
CVE-2024-5209,0,0,7531866dc2069833de5cded2977d100fe13c1eac0700fc84557e1bd601c0dcd0,2024-08-19T13:00:23.117000
@ -265414,7 +265434,7 @@ CVE-2024-7531,0,0,dbb6c7bb708cc7892d9b9398cb954ae50065a4639c2a03cb64cbbe4b190ba0
CVE-2024-7532,0,0,90c76a771bf2c3087c95892c6c8636149d558f7e7c6e8fc118a6fd5792493066,2024-08-12T18:31:14.987000
CVE-2024-7533,0,0,c20f52f22bd957e76ce7ee76b3d504a6bf1b0987ab46e3435092f6d8144882d0,2024-08-12T18:31:36.127000
CVE-2024-7534,0,0,e617e0746161521c688d11311339489549549660c20c373432ae0156acd463b5,2024-10-15T14:35:08.213000
CVE-2024-7535,0,0,406a485be4ed145018eee5a42eee293edf3f855e9e608d288637ad13611ff84e,2024-08-12T18:31:56.687000
CVE-2024-7535,0,1,35bb740627c756df8eadc3267735e3fa59ff4ff1ce06f1f974335d8c5c571073,2024-10-24T20:35:14.177000
CVE-2024-7536,0,0,6d744a1cdbceb73b2517cc38c4973ef8f9e81b399df7da1dbc0e072ba9141ac8,2024-08-12T18:32:03.167000
CVE-2024-7537,0,0,9b18c1e3141b81ab91d34faba60a5c749d81521efc9642561225894aa8d298d0,2024-08-29T18:01:05.103000
CVE-2024-7538,0,0,193fad63547610339afca51fb42f4e1b63efd1246fa12674999d016a71d7b352,2024-08-29T17:59:31.983000
@ -265607,6 +265627,7 @@ CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8f
CVE-2024-7755,0,0,ef971a5ecbec92118875058fb4e190fc41fb035586060e0897fad69139da7909,2024-10-18T12:52:33.507000
CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888de,2024-09-14T11:47:14.677000
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
CVE-2024-7763,1,1,76e0407420c9036e24c38fc1bf9bc13eaafe34ef52d06910bad5acfce7ff99f0,2024-10-24T21:15:15.033000
CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000
CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000
CVE-2024-7772,0,0,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000
@ -265773,7 +265794,7 @@ CVE-2024-7969,0,0,004186edac2fefffd328a41ea15a25fa627c517f8fe839d3b4b4abc33a5fb6
CVE-2024-7970,0,0,4bb992b64808219b839c5254e00c2c7348ddd7f9644ca29d4ab55ca307fec90f,2024-09-04T14:35:15.343000
CVE-2024-7971,0,0,46adb6d7721c1dfcc60ee3fda6e97e01d50ab2f0fa3271375a72069a513c0516,2024-08-27T01:00:02.883000
CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829d6,2024-08-26T15:11:35.017000
CVE-2024-7973,0,0,57e1fa2533e5bc6ff8715efadca7a59b7db56c81e1c88635dd66a97401e58114,2024-08-26T15:13:04.650000
CVE-2024-7973,0,1,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000
CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000

Can't render this file because it is too large.