From 4a80d97b731a8b9918e7ef2c80b93d320a47eae3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 9 Sep 2024 20:03:17 +0000 Subject: [PATCH] Auto-Update: 2024-09-09T20:00:18.574420+00:00 --- CVE-2022/CVE-2022-488xx/CVE-2022-48804.json | 156 +++++++++++++++++-- CVE-2022/CVE-2022-488xx/CVE-2022-48820.json | 97 +++++++++++- CVE-2023/CVE-2023-305xx/CVE-2023-30582.json | 39 ++++- CVE-2023/CVE-2023-305xx/CVE-2023-30583.json | 39 ++++- CVE-2023/CVE-2023-305xx/CVE-2023-30584.json | 39 ++++- CVE-2023/CVE-2023-305xx/CVE-2023-30587.json | 39 ++++- CVE-2023/CVE-2023-393xx/CVE-2023-39333.json | 39 ++++- CVE-2023/CVE-2023-405xx/CVE-2023-40548.json | 4 +- CVE-2023/CVE-2023-468xx/CVE-2023-46809.json | 39 ++++- CVE-2023/CVE-2023-500xx/CVE-2023-50096.json | 34 +++- CVE-2023/CVE-2023-510xx/CVE-2023-51092.json | 34 +++- CVE-2023/CVE-2023-514xx/CVE-2023-51429.json | 14 +- CVE-2023/CVE-2023-522xx/CVE-2023-52286.json | 34 +++- CVE-2023/CVE-2023-72xx/CVE-2023-7216.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24510.json | 25 +++ CVE-2024/CVE-2024-25xx/CVE-2024-2541.json | 66 +++++++- CVE-2024/CVE-2024-361xx/CVE-2024-36138.json | 14 +- CVE-2024/CVE-2024-406xx/CVE-2024-40643.json | 4 +- CVE-2024/CVE-2024-409xx/CVE-2024-40970.json | 105 ++++++++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40973.json | 81 +++++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40977.json | 93 ++++++++++- CVE-2024/CVE-2024-409xx/CVE-2024-40980.json | 129 ++++++++++++++-- CVE-2024/CVE-2024-409xx/CVE-2024-40981.json | 141 +++++++++++++++-- CVE-2024/CVE-2024-409xx/CVE-2024-40982.json | 81 +++++++++- CVE-2024/CVE-2024-427xx/CVE-2024-42759.json | 25 +++ CVE-2024/CVE-2024-443xx/CVE-2024-44333.json | 4 +- CVE-2024/CVE-2024-443xx/CVE-2024-44334.json | 25 +++ CVE-2024/CVE-2024-443xx/CVE-2024-44335.json | 25 +++ CVE-2024/CVE-2024-443xx/CVE-2024-44375.json | 4 +- CVE-2024/CVE-2024-447xx/CVE-2024-44720.json | 4 +- CVE-2024/CVE-2024-447xx/CVE-2024-44721.json | 41 ++++- CVE-2024/CVE-2024-448xx/CVE-2024-44849.json | 25 +++ CVE-2024/CVE-2024-450xx/CVE-2024-45041.json | 4 +- CVE-2024/CVE-2024-452xx/CVE-2024-45296.json | 64 ++++++++ CVE-2024/CVE-2024-454xx/CVE-2024-45406.json | 4 +- CVE-2024/CVE-2024-454xx/CVE-2024-45411.json | 68 ++++++++ CVE-2024/CVE-2024-46xx/CVE-2024-4629.json | 30 +++- CVE-2024/CVE-2024-59xx/CVE-2024-5967.json | 30 +++- CVE-2024/CVE-2024-61xx/CVE-2024-6162.json | 10 +- CVE-2024/CVE-2024-70xx/CVE-2024-7015.json | 4 +- CVE-2024/CVE-2024-72xx/CVE-2024-7260.json | 68 ++++++++ CVE-2024/CVE-2024-73xx/CVE-2024-7318.json | 68 ++++++++ CVE-2024/CVE-2024-73xx/CVE-2024-7341.json | 96 ++++++++++++ CVE-2024/CVE-2024-80xx/CVE-2024-8042.json | 4 +- CVE-2024/CVE-2024-83xx/CVE-2024-8372.json | 4 +- CVE-2024/CVE-2024-83xx/CVE-2024-8373.json | 4 +- CVE-2024/CVE-2024-85xx/CVE-2024-8509.json | 10 +- CVE-2024/CVE-2024-85xx/CVE-2024-8573.json | 84 +++++++++- CVE-2024/CVE-2024-85xx/CVE-2024-8574.json | 79 +++++++++- CVE-2024/CVE-2024-85xx/CVE-2024-8575.json | 79 +++++++++- CVE-2024/CVE-2024-85xx/CVE-2024-8576.json | 116 +++++++++++++- CVE-2024/CVE-2024-85xx/CVE-2024-8577.json | 106 ++++++++++++- CVE-2024/CVE-2024-85xx/CVE-2024-8578.json | 79 +++++++++- CVE-2024/CVE-2024-86xx/CVE-2024-8604.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8605.json | 4 +- README.md | 76 ++++----- _state.csv | 162 +++++++++++--------- 57 files changed, 2479 insertions(+), 281 deletions(-) create mode 100644 CVE-2024/CVE-2024-245xx/CVE-2024-24510.json create mode 100644 CVE-2024/CVE-2024-427xx/CVE-2024-42759.json create mode 100644 CVE-2024/CVE-2024-443xx/CVE-2024-44334.json create mode 100644 CVE-2024/CVE-2024-443xx/CVE-2024-44335.json create mode 100644 CVE-2024/CVE-2024-448xx/CVE-2024-44849.json create mode 100644 CVE-2024/CVE-2024-452xx/CVE-2024-45296.json create mode 100644 CVE-2024/CVE-2024-454xx/CVE-2024-45411.json create mode 100644 CVE-2024/CVE-2024-72xx/CVE-2024-7260.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7318.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7341.json diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48804.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48804.json index 278e60b1b33..863602e0924 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48804.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48804.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48804", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:04.830", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:19:25.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,173 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: vt_ioctl: corrige array_index_nospec en vt_setactivate array_index_nospec garantiza que un valor fuera de los l\u00edmites se establezca en cero en la ruta transitoria. Disminuir el valor en uno posteriormente provoca un desbordamiento de enteros transitorio. vsa.console debe reducirse primero y luego desinfectarse con array_index_nospec. Agradecimientos de Kasper: Jakob Koschel, Brian Johannesmeyer, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida del grupo VUSec en VU Amsterdam." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.302", + "matchCriteriaId": "EB8C5CE9-1D6E-4315-853C-949A5E076B69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.267", + "matchCriteriaId": "FD3CEBEB-60B8-4EA2-B346-6ADF49F754D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.320", + "matchCriteriaId": "3421D9CE-A117-4146-823F-2EC2FE3AD3E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.180", + "matchCriteriaId": "6808B38F-AD73-4D55-A158-6EF605E8EB66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.101", + "matchCriteriaId": "A154171E-A3B9-42BE-9E97-C9B0EA43FC54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.24", + "matchCriteriaId": "866451F0-299E-416C-B0B8-AE6B33E62CCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.10", + "matchCriteriaId": "679523BA-1392-404B-AB85-F5A5408B1ECC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/170325aba4608bde3e7d21c9c19b7bc266ac0885", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61cc70d9e8ef5b042d4ed87994d20100ec8896d9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6550bdf52846f85a2a3726a5aa0c7c4399f2fc02", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/778302ca09498b448620edd372dc908bebf80bdf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/830c5aa302ec16b4ee641aec769462c37f802c90", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae3d57411562260ee3f4fd5e875f410002341104", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffe54289b02e9c732d6f04c8ebbe3b2d90d32118", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48820.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48820.json index ebe87c4bfb9..3506be065d6 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48820.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48820.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48820", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T12:15:05.943", - "lastModified": "2024-07-16T13:43:58.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:29:22.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,104 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: phy: stm32: corrige una fuga de recuento en stm32_usbphyc_pll_enable() Esta ruta de error debe disminuir \"usbphyc->n_pll_cons.counter\" antes de regresar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.24", + "matchCriteriaId": "E4085917-8F39-402F-B183-8526BF102A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.10", + "matchCriteriaId": "679523BA-1392-404B-AB85-F5A5408B1ECC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ad1a88fa3eb0ded7798f52b79bc33f75fc9a6d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/94b16ca86ab688ed6fad4548f70137f93cf1f0a9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfc826c88a79e22ba5d8001556eb2c7efd8a01b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30582.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30582.json index 2b4b2930322..8dc5ea6358f 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30582.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30582.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30582", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T16:15:02.047", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T19:35:01.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se ha identificado una vulnerabilidad en la versi\u00f3n 20 de Node.js que afecta a los usuarios del modelo de permisos experimental cuando se utiliza el indicador --allow-fs-read con un argumento distinto de *. Esta falla surge de un modelo de permisos inadecuado que no restringe la supervisi\u00f3n de archivos a trav\u00e9s de la API fs.watchFile. Como resultado, los actores maliciosos pueden supervisar archivos a los que no tienen acceso de lectura expl\u00edcito. Tenga en cuenta que en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos es una caracter\u00edstica experimental de Node.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases", diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30583.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30583.json index df8ea1f31e5..ead78384928 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30583.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30583.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30583", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T16:15:02.117", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T19:35:01.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "fs.openAsBlob() puede eludir el modelo de permisos experimental al utilizar la restricci\u00f3n de lectura del sistema de archivos con el indicador `--allow-fs-read` en Node.js 20. Esta falla surge de una verificaci\u00f3n faltante en la API `fs.openAsBlob()`. Tenga en cuenta que en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos era una caracter\u00edstica experimental de Node.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases", diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30584.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30584.json index fb0c634b65e..3139b3cff7a 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30584.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30584.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30584", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T16:15:02.167", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T19:35:02.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se ha descubierto una vulnerabilidad en la versi\u00f3n 20 de Node.js, espec\u00edficamente en el modelo de permisos experimental. Esta falla est\u00e1 relacionada con el manejo inadecuado de la omisi\u00f3n de la ruta de acceso al verificar los permisos de los archivos. Tenga en cuenta que, en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos era una caracter\u00edstica experimental de Node.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases", diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30587.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30587.json index d6d346db15c..294a619b7a1 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30587.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30587.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30587", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T16:15:02.223", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T19:35:03.593", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad en la versi\u00f3n 20 de Node.js permite eludir las restricciones establecidas por el indicador --experimental-permission mediante el m\u00f3dulo inspector integrado (node:inspector). Al explotar la capacidad de la clase Worker de crear un \"trabajador interno\" con el s\u00edmbolo kIsInternal, los atacantes pueden modificar el valor isInternal cuando se adjunta un inspector dentro del constructor Worker antes de inicializar un nuevo WorkerImpl. Esta vulnerabilidad afecta exclusivamente a los usuarios de Node.js que emplean el mecanismo del modelo de permisos. Tenga en cuenta que en el momento en que se emiti\u00f3 esta CVE, el modelo de permisos era una caracter\u00edstica experimental de Node.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases", diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39333.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39333.json index 005ded38bea..49d139ce604 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39333.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39333.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39333", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T16:15:02.287", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T18:35:00.937", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los nombres de exportaci\u00f3n creados con fines malintencionados en un m\u00f3dulo WebAssembly importado pueden inyectar c\u00f3digo JavaScript. El c\u00f3digo inyectado puede tener acceso a datos y funciones a los que el m\u00f3dulo WebAssembly no tiene acceso, de forma similar a si el m\u00f3dulo WebAssembly fuera un m\u00f3dulo JavaScript. Esta vulnerabilidad afecta a los usuarios de cualquier l\u00ednea de versi\u00f3n activa de Node.js. La caracter\u00edstica vulnerable solo est\u00e1 disponible si Node.js se inicia con la opci\u00f3n de l\u00ednea de comandos `--experimental-wasm-modules`." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/october-2023-security-releases", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40548.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40548.json index 861fe840017..a605ca03bff 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40548.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40548.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40548", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-29T15:15:08.893", - "lastModified": "2024-09-06T18:15:04.977", + "lastModified": "2024-09-09T18:15:02.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-190" } ] }, diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46809.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46809.json index d08e7ef79a8..a603d68fae6 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46809.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46809.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46809", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T16:15:02.343", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T18:35:01.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las versiones de Node.js que incluyen una versi\u00f3n sin parches de OpenSSL o se ejecutan contra una versi\u00f3n vinculada din\u00e1micamente de OpenSSL que no tiene parches son vulnerables al ataque Marvin - https://people.redhat.com/~hkario/marvin/, si se permite el relleno PCKS #1 v1.5 al realizar el descifrado RSA usando una clave privada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-385" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases", diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50096.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50096.json index 62ce076dc5e..4cece97a6bd 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50096.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50096.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50096", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-01T18:15:09.197", - "lastModified": "2024-01-09T18:29:41.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-09T18:35:04.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51092.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51092.json index 5dacabd52a4..3a59f648017 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51092.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51092.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51092", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-26T18:15:08.173", - "lastModified": "2023-12-30T03:19:01.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-09T19:35:05.803", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51429.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51429.json index fde391332f1..74cccadb360 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51429.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51429.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51429", "sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4", "published": "2023-12-29T04:15:09.690", - "lastModified": "2024-01-04T23:36:16.723", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-09T18:35:06.063", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52286.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52286.json index 08c9e1990e5..42b6883db9d 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52286.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52286.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52286", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-31T07:15:07.580", - "lastModified": "2024-01-05T22:06:41.313", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-09T18:35:07.720", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7216.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7216.json index 0202e624a2d..81523c3c7e4 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7216.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7216.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7216", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-05T15:15:08.903", - "lastModified": "2024-06-12T13:15:49.690", + "lastModified": "2024-09-09T18:15:03.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-59" + "value": "CWE-22" } ] }, diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24510.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24510.json new file mode 100644 index 00000000000..53577f95778 --- /dev/null +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24510.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-24510", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T19:15:13.197", + "lastModified": "2024-09-09T19:15:13.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Alinto SOGo before 5.10.0 allows a remote attacker to execute arbitrary code via the import function to the mail component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://book.hacktricks.xyz/pentesting-web/xs-search/css-injection", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Alinto/sogo/commit/21468700718ed71774eaf2979ee59330fc569424", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2541.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2541.json index 7e927c28e02..c64cd32b5cc 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2541.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2541", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-29T13:15:06.403", - "lastModified": "2024-08-29T13:25:27.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:40:23.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.3.3", + "matchCriteriaId": "A7D6596C-29FE-4E4E-B064-E828B128E8BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/popup-builder/trunk/com/libs/Importer.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/086cd6a0-adb6-4e12-b34c-630297f036f3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36138.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36138.json index 63cd5ac8b01..276ec5adbd0 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36138.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36138.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36138", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T16:15:02.620", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-09T18:35:09.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/july-2024-security-releases", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40643.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40643.json index 6cebbbb89f7..d6397eab753 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40643.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40643", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-09T15:15:11.597", - "lastModified": "2024-09-09T15:15:11.597", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40970.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40970.json index 22ffe031244..d30199be108 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40970.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40970", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.687", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:07:59.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,116 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Evitar la saturaci\u00f3n de la matriz hw_desc en dw-axi-dmac. Tengo un caso de uso donde nr_buffers = 3 y en el que cada descriptor est\u00e1 compuesto por 3 segmentos, lo que da como resultado que el canal DMA descs_allocated sea 9. Dado que axi_desc_put() maneja hw_desc considerando descs_allocated, este escenario provocar\u00eda un p\u00e1nico en el kernel (la matriz hw_desc se desbordar\u00e1). Para solucionar este problema, la propuesta es agregar un nuevo miembro a la estructura axi_dma_desc, donde mantenemos el n\u00famero de hw_descs asignados (axi_desc_alloc()) y lo usamos en axi_desc_put() para manejar la matriz hw_desc correctamente. Adem\u00e1s, propongo eliminar la llamada axi_chan_start_first_queued() despu\u00e9s de completar la transferencia, ya que se identific\u00f3 que puede ocurrir un desequilibrio (los descriptores iniciados pueden interrumpirse y la transferencia se ignora debido a que el canal DMA no est\u00e1 habilitado)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.162", + "matchCriteriaId": "DD1E49C8-DE20-4CCB-8715-3FB3FA95ABC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.96", + "matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/333e11bf47fa8d477db90e2900b1ed3c9ae9b697", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c3bb96a20cd8db3b8824b2ff08b6cde4505c7e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9004784e8d68bcd1ac1376407ba296fa28f04dbe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd42570018f5962c10f215ad9c21274ed5d3541e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e151ae1ee065cf4b8ce4394ddb9d9c8df6370c66", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json index c6940068b97..a7c26f30dd2 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:18.890", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:09:01.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: medio: mtk-vcodec: posible deferencia de puntero nulo en SCP Es necesario verificar el valor de retorno de devm_kzalloc() para evitar la deferencia de puntero NULL. Esto es similar a CVE-2022-3113." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "97F8F699-7041-44A4-9087-0E1FFC0543C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3a693c7e243b932faee5c1fb728efa73f0abc39b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53dbe08504442dc7ba4865c09b3bbf5fe849681b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f066882293b5ad359e44c4ed24ab1811ffb0b354", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40977.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40977.json index 076da39630a..25c8904f28f 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40977.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40977", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:19.143", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:11:49.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: mt7921s: soluciona posibles tareas bloqueadas durante la recuperaci\u00f3n del chip Durante la recuperaci\u00f3n del chip (por ejemplo, reinicio del chip), existe una posible situaci\u00f3n en la que el trabajador del kernel reset_work est\u00e9 manteniendo el bloqueo y esperando. El hilo del kernel stat_worker se estacionar\u00e1, mientras stat_worker est\u00e1 esperando la liberaci\u00f3n del mismo bloqueo. Provoca un punto muerto que resulta en el volcado de mensajes de tareas colgadas y un posible reinicio del dispositivo. Este parche evita la ejecuci\u00f3n de stat_worker durante la recuperaci\u00f3n del chip." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.96", + "matchCriteriaId": "35AF7215-0096-45EB-86C7-28C9322438E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/85edd783f4539a994d66c4c014d5858f490b7a02", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e974dd4c22a23ec3ce579fb6d31a674ac0435da9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ecf0b2b8a37c8464186620bef37812a117ff6366", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40980.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40980.json index 7944691eb10..dc5c6923950 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40980.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40980", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:19.550", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:15:41.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,144 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drop_monitor: reemplaza spin_lock por raw_spin_lock Se llama a trace_drop_common() con la preferencia deshabilitada y adquiere un spin_lock. Esto es problem\u00e1tico para los kernels RT porque los spin_locks son bloqueos inactivos en esta configuraci\u00f3n, lo que provoca el siguiente s\u00edmbolo: ERROR: funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 1 , non_block: 0, pid: 449, nombre: rcuc/47 preempt_count: 1, esperado: 0 Profundidad del nido de RCU: 2, esperado: 2 5 bloqueos retenidos por rcuc/47/449: #0: ff1100086ec30a60 ((softirq_ctrl.lock) ){+.+.}-{2:2}, en: __local_bh_disable_ip+0x105/0x210 #1: fffffffffb394a280 (rcu_read_lock){....}-{1:2}, en: rt_spin_lock+0xbf/0x130 #2 : ffffffffb394a280 (rcu_read_lock){....}-{1:2}, en: __local_bh_disable_ip+0x11c/0x210 #3: ffffffffb394a160 (rcu_callback){....}-{0:0}, en: rcu_do_batch+0x360 /0xc70 #4: ff1100086ee07520 (&data->lock){+.+.}-{2:2}, en: trace_drop_common.constprop.0+0xb5/0x290 sello de evento irq: 139909 hardirqs habilitado por \u00faltima vez en (139908): [ ] _raw_spin_unlock_irqrestore+0x63/0x80 hardirqs deshabilitado por \u00faltima vez en (139909): [] trace_drop_common.constprop.0+0x26d/0x290 softirqs habilitado por \u00faltima vez en (139892): [ ] __local_bh_enable_ip+0x103/0x170 softirqs \u00faltimamente deshabilitado en (139898): [] rcu_cpu_kthread+0x93/0x1f0 Prelaci\u00f3n deshabilitada en: [] rt_mutex_slowunlock+0xab/0x2e0 CPU: 47 PID: 449 Comm: rcuc/47 No contaminado 6.9.0-rc2 - rt1+ #7 Nombre del hardware: Dell Inc. PowerEdge R650/0Y2G81, BIOS 1.6.5 15/04/2022 Seguimiento de llamadas: dump_stack_lvl+0x8c/0xd0 dump_stack+0x14/0x20 __might_resched+0x21e/0x2f0 rt_spin_lock+0x5e/0x130 ? trace_drop_common.constprop.0+0xb5/0x290? skb_queue_purge_reason.part.0+0x1bf/0x230 trace_drop_common.constprop.0+0xb5/0x290 ? preempt_count_sub+0x1c/0xd0? _raw_spin_unlock_irqrestore+0x4a/0x80? __pfx_trace_drop_common.constprop.0+0x10/0x10? rt_mutex_slowunlock+0x26a/0x2e0? skb_queue_purge_reason.part.0+0x1bf/0x230? __pfx_rt_mutex_slowunlock+0x10/0x10? skb_queue_purge_reason.part.0+0x1bf/0x230 trace_kfree_skb_hit+0x15/0x20 trace_kfree_skb+0xe9/0x150 kfree_skb_reason+0x7b/0x110 skb_queue_purge_reason.part.0+0x1bf/0x230 ? __pfx_skb_queue_purge_reason.part.0+0x10/0x10 ? mark_lock.part.0+0x8a/0x520 ... trace_drop_common() tambi\u00e9n desactiva las interrupciones, pero este es un problema menor porque podr\u00edamos reemplazarlo f\u00e1cilmente con local_lock. Reemplace spin_lock con raw_spin_lock para evitar dormir en un contexto at\u00f3mico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.279", + "matchCriteriaId": "5EBA530D-458E-447C-8744-13D4429CCC4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.221", + "matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.162", + "matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.96", + "matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/07ea878684dfb78a9d4f564c39d07e855a9e242e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/594e47957f3fe034645e6885393ce96c12286334", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76ce2f9125244e1708d29c1d3f9d1d50b347bda0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96941f29ebcc1e9cbf570dc903f30374909562f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b3722fb69468693555f531cddda5c30444726dac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f1e197a665c2148ebc25fe09c53689e60afea195", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f251ccef1d864790e5253386e95544420b7cd8f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40981.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40981.json index 61b7e5aaebb..8943d8afd7b 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40981.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40981", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:19.627", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:16:52.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: batman-adv: evita dep\u00f3sitos vac\u00edos en batadv_purge_orig_ref() Muchos informes de syzbot apuntan a bloqueos suaves en batadv_purge_orig_ref() [1] Se desconoce la causa ra\u00edz, pero podemos evitar gastar demasiado pasar tiempo all\u00ed y tal vez obtener informes m\u00e1s interesantes. [1] perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#0 bloqueada durante 27 segundos! [kworker/u4:6:621] M\u00f3dulos vinculados en: sello de evento irq: 6182794 hardirqs habilitados por \u00faltima vez en (6182793): [] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386 hardirqs deshabilitados por \u00faltima vez en (6182794) : [] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline] hardirqs deshabilitado por \u00faltima vez en (6182794): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common .c:551 softirqs habilitado por \u00faltima vez en (6182792): [] spin_unlock_bh include/linux/spinlock.h:396 [inline] softirqs habilitado por \u00faltima vez en (6182792): [] batadv_purge_orig_ref+0x114c/0x122 8 netos/ batman-adv/originator.c:1287 softirqs deshabilitados por \u00faltima vez en (6182790): [] spin_lock_bh include/linux/spinlock.h:356 [inline] softirqs deshabilitados por \u00faltima vez en (6182790): [] batadv_purge_orig_ref+ 0x164/0x1228 net/batman-adv/originator.c:1271 CPU: 0 PID: 621 Comm: kworker/u4:6 No contaminado 6.8.0-rc7-syzkaller-g707081b61156 #0 Nombre de hardware: Google Google Compute Engine/Google Compute Motor, BIOS Google 29/02/2024 Cola de trabajo: bat_events batadv_purge_orig pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: deber\u00eda_resched arch/arm64/include/asm/preempt.h:79 [en l\u00ednea] pc: __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388 lr: __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386 sp: ffff800099007970 x29: ffff800099007980 x28: 018fce1bd x27: dfff800000000000 x26: ffff0000d2620008 x25: ffff0000c7e70de8 x24 : 0000000000000001 x23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4 x20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: a817bb0 x17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001 x14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000000 3 x11: 0000000000000000 x10: 0000000000ff0100 x9: 0000000000000000 x8: 00000000005e5789 x7: ffff80008aab61dc x6: 0000000000000000 x5: 0000000000000000 x4: 0000000000000001 x3: 00000000000000000 x2: 0000000000000006 x1: 00000000000080 x0: ffff800125414000 Rastreo de llamadas: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [en l\u00ednea] arch_local_irq_enable arch/arm64/include /asm/irqflags.h:49 [en l\u00ednea] __local_bh_enable_ip+0x228/0x44c kernel/softirq.c: 386 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h: 167 [en l\u00ednea] 210 spin_unlock_bh include/linux/spinlock.h:396 [en l\u00ednea] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287 batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300 Process_one_work+0x694/0x120 4 kernel/workqueue.c:2633 Process_scheduled_works kernel/workqueue.c:2706 [en l\u00ednea] trabajador_thread+0x938/0xef4 kernel/workqueue.c:2787 kthread+0x288/0x310 kernel/kthread.c:388 ret_from_fork+0x10/0x20 arch/arm64 /kernel/entry.S:860 Env\u00edo de NMI desde la CPU 0 a las CPU 1: rastreo de NMI para la CPU 1 CPU: 1 PID: 0 Comm: swapper/1 No contaminado 6.8.0-rc7-syzkaller-g707081b61156 #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 29/02/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: arch_local_irq_enable+0x8/0xc arch/arm64/include/asm /irqflags.h:51 lr: default_idle_call+0xf8/0x128 kernel/sched/idle.c:103 sp: ffff800093a17d30 x29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4 x26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002 x23: 1ffff00011d93a74 x22:---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.317", + "matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.279", + "matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.221", + "matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.162", + "matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.96", + "matchCriteriaId": "61E887B4-732A-40D2-9983-CC6F281EBFB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "E1046C95-860A-45B0-B718-2B29F65BFF10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/154e3f862ba33675cf3f4abf0a0a309a89df87d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2685008a5f9a636434a8508419cee8158a2f52c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40dc8ab605894acae1473e434944924a22cfaaa0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79636f636126775436a11ee9cf00a9253a33ac11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82cdea8f3af1e36543c937df963d108c60bea030", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92176caf9896572f00e741a93cecc0ef1172da07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae7f3cffe86aea3da0e8e079525a1ae619b8862a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fed7914858a1f1f3e6350bb0f620d6ef15107d16", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-409xx/CVE-2024-40982.json b/CVE-2024/CVE-2024-409xx/CVE-2024-40982.json index 89b52d4ff2e..44de987bca0 100644 --- a/CVE-2024/CVE-2024-409xx/CVE-2024-40982.json +++ b/CVE-2024/CVE-2024-409xx/CVE-2024-40982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-12T13:15:19.800", - "lastModified": "2024-07-12T16:34:58.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-09T18:13:13.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ssb: corrige la posible desreferencia del puntero NULL en ssb_device_uevent() La funci\u00f3n ssb_device_uevent() primero intenta convertir el puntero 'dev' en 'struct ssb_device *'. Sin embargo, por error elimina la referencia a 'dev' antes de realizar la comprobaci\u00f3n NULL, lo que podr\u00eda provocar una desreferencia del puntero NULL si 'dev' es NULL. Para solucionar este problema, mueva la marca NULL antes de eliminar la referencia al puntero 'dev', asegur\u00e1ndose de que el puntero sea v\u00e1lido antes de intentar usarlo. Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.36", + "matchCriteriaId": "97F8F699-7041-44A4-9087-0E1FFC0543C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.7", + "matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/789c17185fb0f39560496c2beab9b57ce1d0cbe7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d43c8377c6fc846b1812f8df360425c9323dc56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c5dc2d8eb3981bae261ea7d1060a80868e886813", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42759.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42759.json new file mode 100644 index 00000000000..3ab62932ac5 --- /dev/null +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42759.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42759", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T19:15:13.270", + "lastModified": "2024-09-09T19:15:13.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Ellevo v.6.2.0.38160 allows a remote attacker to escalate privileges via the /api/usuario/cadastrodesuplente endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://csflabs.github.io/cve/2024/09/06/cve-2024-42759-approval-of-your-own-ticket-with-BFLA.html", + "source": "cve@mitre.org" + }, + { + "url": "https://ellevo.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44333.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44333.json index 615146797f1..d6e942b8db8 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44333.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44333", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T17:15:13.120", - "lastModified": "2024-09-09T17:15:13.120", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44334.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44334.json new file mode 100644 index 00000000000..a4ada1047c2 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44334.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44334", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T18:15:03.837", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution due to insufficient parameter filtering in the CGI handling function of upgrade_filter.asp." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Swind1er/563789899a7a4b9c261045a15efea952", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44335.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44335.json new file mode 100644 index 00000000000..9696948d796 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44335.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44335", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T18:15:03.893", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DI-7003G v19.12.24A1, DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution (RCE) via version_upgrade.asp." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Swind1er/029fb2a9dab916f926fab40cc059223f", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44375.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44375.json index 7cceb6f3210..6edd7d16929 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44375.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44375.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44375", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T14:15:14.290", - "lastModified": "2024-09-09T14:15:14.290", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44720.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44720.json index 59e3f1e04c5..0c0ee9cda87 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44720.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44720.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44720", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T16:15:02.780", - "lastModified": "2024-09-09T17:35:06.057", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44721.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44721.json index e85e51b6c3b..c4d00eeedbc 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44721.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44721.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44721", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T16:15:02.853", - "lastModified": "2024-09-09T16:15:02.853", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:35:10.070", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "SeaCMS v13.1 was discovered to a Server-Side Request Forgery (SSRF) via the url parameter at /admin_reslib.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/seacms-net/CMS/issues/23", diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44849.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44849.json new file mode 100644 index 00000000000..b3785fd02a6 --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44849.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44849", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-09T18:15:03.957", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.extencil.me/information-security/cves/cve-2024-44849", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/extencil/CVE-2024-44849?tab=readme-ov-file", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45041.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45041.json index 5a3d4dd9c76..fac793b47d2 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45041.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45041", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-09T15:15:11.940", - "lastModified": "2024-09-09T15:15:11.940", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45296.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45296.json new file mode 100644 index 00000000000..c7b4d1feb01 --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45296.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-45296", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-09T19:15:13.330", + "lastModified": "2024-09-09T19:15:13.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pillarjs/path-to-regexp/commit/29b96b4a1de52824e1ca0f49a701183cc4ed476f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pillarjs/path-to-regexp/commit/60f2121e9b66b7b622cc01080df0aabda9eedee6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45406.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45406.json index a4e774cf090..49eb6fa87e3 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45406.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45406", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-09T17:15:13.180", - "lastModified": "2024-09-09T17:15:13.180", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45411.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45411.json new file mode 100644 index 00000000000..ed0260d0d44 --- /dev/null +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45411.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-45411", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-09T19:15:13.543", + "lastModified": "2024-09-09T19:15:13.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Twig is a template language for PHP. Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. This vulnerability is fixed in 1.44.8, 2.16.1, and 3.14.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/twigphp/Twig/commit/11f68e2aeb526bfaf638e30d4420d8a710f3f7c6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/twigphp/Twig/commit/2102dd135986db79192d26fb5f5817a566e0a7de", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/twigphp/Twig/commit/7afa198603de49d147e90d18062e7b9addcf5233", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-6j75-5wfj-gh66", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json index 644e54d46ed..8bbaf40ecd0 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4629", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-03T20:15:09.003", - "lastModified": "2024-09-04T13:05:36.067", + "lastModified": "2024-09-09T19:15:13.760", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,34 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6493", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6494", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6495", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6497", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6499", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6500", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6501", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-4629", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5967.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5967.json index 568a6353403..565be04ffef 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5967.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5967.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5967", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-18T12:15:12.707", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-09-09T19:15:13.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,34 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6493", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6494", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6495", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6497", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6499", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6500", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6501", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-5967", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6162.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6162.json index c996534c4ac..a094d6e4bfa 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6162.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6162.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6162", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-20T15:15:50.570", - "lastModified": "2024-08-05T15:15:54.090", + "lastModified": "2024-09-09T18:15:04.023", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,14 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:1194", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4386", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:4884", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7015.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7015.json index 9347212ab08..91017f0cf5b 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7015.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7015", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-09-09T14:15:14.430", - "lastModified": "2024-09-09T14:15:14.430", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7260.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7260.json new file mode 100644 index 00000000000..84b3fee3208 --- /dev/null +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7260.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-7260", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-09-09T19:15:14.033", + "lastModified": "2024-09-09T19:15:14.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An open redirect vulnerability was found in Keycloak. A specially crafted URL can be constructed where the referrer and referrer_uri parameters are made to trick a user to visit a malicious webpage. A trusted URL can trick users and automation into believing that the URL is safe, when, in fact, it redirects to a malicious server. This issue can result in a victim inadvertently trusting the destination of the redirect, potentially leading to a successful phishing attack or other types of attacks.\r\n\r\nOnce a crafted URL is made, it can be sent to a Keycloak admin via email for example. This will trigger this vulnerability when the user visits the page and clicks the link. A malicious actor can use this to target users they know are Keycloak admins for further attacks. It may also be possible to bypass other domain-related security checks, such as supplying this as a OAuth redirect uri. The malicious actor can further obfuscate the redirect_uri using URL encoding, to hide the text of the actual malicious website domain." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6502", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6503", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2024-7260", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301875", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7318.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7318.json new file mode 100644 index 00000000000..593eae40c2e --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7318.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-7318", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-09-09T19:15:14.237", + "lastModified": "2024-09-09T19:15:14.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Keycloak. Expired OTP codes are still usable when using FreeOTP when the OTP token period is set to 30 seconds (default). Instead of expiring and deemed unusable around 30 seconds in, the tokens are valid for an additional 30 seconds totaling 1 minute.\r\nA one time passcode that is valid longer than its expiration time increases the attack window for malicious actors to abuse the system and compromise accounts. Additionally, it increases the attack surface because at any given time, two OTPs are valid." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-324" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6502", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6503", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2024-7318", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301876", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7341.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7341.json new file mode 100644 index 00000000000..5b6319c90df --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7341.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-7341", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-09-09T19:15:14.450", + "lastModified": "2024-09-09T19:15:14.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6493", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6494", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6495", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6497", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6499", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6500", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6501", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6502", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6503", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2024-7341", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302064", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8042.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8042.json index 5184e2bb7ba..18327cc9eb2 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8042.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8042", "sourceIdentifier": "cve@rapid7.com", "published": "2024-09-09T15:15:12.340", - "lastModified": "2024-09-09T15:15:12.340", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json index 5eff42031b5..5989212f44d 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8372", "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", "published": "2024-09-09T15:15:12.560", - "lastModified": "2024-09-09T15:15:12.560", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json index 896e0527af1..97d55d6d97b 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8373", "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", "published": "2024-09-09T15:15:12.887", - "lastModified": "2024-09-09T16:15:02.927", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8509.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8509.json index 53d4dbca107..b25f4e962e9 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8509.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8509.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8509", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-06T16:15:03.583", - "lastModified": "2024-09-06T16:46:26.830", + "lastModified": "2024-09-09T19:15:14.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Forklift Controller.\u00a0 There is no verification against the authorization header except to ensure it uses bearer authentication. Without an Authorization header and some form of a Bearer token, a 401 error occurs. The presence of a token value provides a 200 response with the requested information." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Forklift Controller. No hay verificaci\u00f3n con respecto al encabezado de autorizaci\u00f3n, excepto para garantizar que utilice autenticaci\u00f3n de portador. Sin un encabezado de autorizaci\u00f3n y alg\u00fan tipo de token de portador, se produce un error 401. La presencia de un valor de token proporciona una respuesta 200 con la informaci\u00f3n solicitada." } ], "metrics": { @@ -48,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6487", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8509", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8573.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8573.json index ee51b392a5a..dbb2fec0bbf 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8573.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8573", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T10:15:01.907", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-09T18:45:08.053", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,76 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.8cu.5207:*:*:*:*:*:*:*", + "matchCriteriaId": "8D79150A-A520-4A64-BBB5-BAD9DA00DF42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/AC1200T8/setParentalRules.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276807", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276807", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401262", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8574.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8574.json index b6e26cf02f9..7f2ef5972c9 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8574.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8574", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T11:15:10.430", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-09T18:47:10.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setUpgradeFW.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276808", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276808", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401289", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8575.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8575.json index dc2805ce6ba..6686679157e 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8575.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8575", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T17:15:11.390", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-09T18:47:45.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/AC1200T8/setWiFiScheduleCfg.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276809", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276809", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401263", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8576.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8576.json index 1a5b909919f..6baaa970177 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8576.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8576", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T18:15:02.313", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-09T18:59:57.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +150,98 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*", + "matchCriteriaId": "256F9D43-3753-4557-92C0-744E09076B4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C410805-E3D4-4F8C-8DF4-013ACE3937FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setIpPortFilterRules.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276810", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276810", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401264", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8577.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8577.json index 4896ab0656f..a4b6362aede 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8577.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8577", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T19:15:10.203", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-09T18:51:32.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,98 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*", + "matchCriteriaId": "256F9D43-3753-4557-92C0-744E09076B4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C410805-E3D4-4F8C-8DF4-013ACE3937FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setStaticDhcpRules.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276811", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276811", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401265", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8578.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8578.json index 099d4cec12c..3721f74405c 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8578.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8578", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T19:15:10.453", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-09T18:46:00.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setWiFiMeshName.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276812", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276812", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401290", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8604.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8604.json index bac0d8435e3..9d2ac9b8ae2 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8604.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8604", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-09T16:15:03.203", - "lastModified": "2024-09-09T16:15:03.203", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8605.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8605.json index 0f02d28511a..17ba639f5fc 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8605.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8605", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-09T16:15:03.570", - "lastModified": "2024-09-09T16:15:03.570", - "vulnStatus": "Received", + "lastModified": "2024-09-09T18:30:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index c1d8f2f8daf..a7380d72eae 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-09T18:00:19.755140+00:00 +2024-09-09T20:00:18.574420+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-09T17:59:29.787000+00:00 +2024-09-09T19:35:05.803000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262217 +262227 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `10` -- [CVE-2024-44333](CVE-2024/CVE-2024-443xx/CVE-2024-44333.json) (`2024-09-09T17:15:13.120`) -- [CVE-2024-44720](CVE-2024/CVE-2024-447xx/CVE-2024-44720.json) (`2024-09-09T16:15:02.780`) -- [CVE-2024-44721](CVE-2024/CVE-2024-447xx/CVE-2024-44721.json) (`2024-09-09T16:15:02.853`) -- [CVE-2024-45406](CVE-2024/CVE-2024-454xx/CVE-2024-45406.json) (`2024-09-09T17:15:13.180`) -- [CVE-2024-8604](CVE-2024/CVE-2024-86xx/CVE-2024-8604.json) (`2024-09-09T16:15:03.203`) -- [CVE-2024-8605](CVE-2024/CVE-2024-86xx/CVE-2024-8605.json) (`2024-09-09T16:15:03.570`) +- [CVE-2024-24510](CVE-2024/CVE-2024-245xx/CVE-2024-24510.json) (`2024-09-09T19:15:13.197`) +- [CVE-2024-42759](CVE-2024/CVE-2024-427xx/CVE-2024-42759.json) (`2024-09-09T19:15:13.270`) +- [CVE-2024-44334](CVE-2024/CVE-2024-443xx/CVE-2024-44334.json) (`2024-09-09T18:15:03.837`) +- [CVE-2024-44335](CVE-2024/CVE-2024-443xx/CVE-2024-44335.json) (`2024-09-09T18:15:03.893`) +- [CVE-2024-44849](CVE-2024/CVE-2024-448xx/CVE-2024-44849.json) (`2024-09-09T18:15:03.957`) +- [CVE-2024-45296](CVE-2024/CVE-2024-452xx/CVE-2024-45296.json) (`2024-09-09T19:15:13.330`) +- [CVE-2024-45411](CVE-2024/CVE-2024-454xx/CVE-2024-45411.json) (`2024-09-09T19:15:13.543`) +- [CVE-2024-7260](CVE-2024/CVE-2024-72xx/CVE-2024-7260.json) (`2024-09-09T19:15:14.033`) +- [CVE-2024-7318](CVE-2024/CVE-2024-73xx/CVE-2024-7318.json) (`2024-09-09T19:15:14.237`) +- [CVE-2024-7341](CVE-2024/CVE-2024-73xx/CVE-2024-7341.json) (`2024-09-09T19:15:14.450`) ### CVEs modified in the last Commit -Recently modified CVEs: `32` +Recently modified CVEs: `45` -- [CVE-2024-27784](CVE-2024/CVE-2024-277xx/CVE-2024-27784.json) (`2024-09-09T16:16:47.253`) -- [CVE-2024-27785](CVE-2024/CVE-2024-277xx/CVE-2024-27785.json) (`2024-09-09T16:18:45.420`) -- [CVE-2024-2911](CVE-2024/CVE-2024-29xx/CVE-2024-2911.json) (`2024-09-09T16:15:02.413`) -- [CVE-2024-2935](CVE-2024/CVE-2024-29xx/CVE-2024-2935.json) (`2024-09-09T16:15:02.587`) -- [CVE-2024-33509](CVE-2024/CVE-2024-335xx/CVE-2024-33509.json) (`2024-09-09T17:06:37.737`) -- [CVE-2024-38651](CVE-2024/CVE-2024-386xx/CVE-2024-38651.json) (`2024-09-09T17:35:02.663`) -- [CVE-2024-39498](CVE-2024/CVE-2024-394xx/CVE-2024-39498.json) (`2024-09-09T17:47:58.640`) -- [CVE-2024-39714](CVE-2024/CVE-2024-397xx/CVE-2024-39714.json) (`2024-09-09T17:35:03.387`) -- [CVE-2024-39715](CVE-2024/CVE-2024-397xx/CVE-2024-39715.json) (`2024-09-09T16:35:04.780`) -- [CVE-2024-40710](CVE-2024/CVE-2024-407xx/CVE-2024-40710.json) (`2024-09-09T17:35:04.207`) -- [CVE-2024-40711](CVE-2024/CVE-2024-407xx/CVE-2024-40711.json) (`2024-09-09T16:35:05.923`) -- [CVE-2024-40712](CVE-2024/CVE-2024-407xx/CVE-2024-40712.json) (`2024-09-09T16:35:06.673`) -- [CVE-2024-40964](CVE-2024/CVE-2024-409xx/CVE-2024-40964.json) (`2024-09-09T17:48:55.847`) -- [CVE-2024-40965](CVE-2024/CVE-2024-409xx/CVE-2024-40965.json) (`2024-09-09T17:57:18.697`) -- [CVE-2024-40967](CVE-2024/CVE-2024-409xx/CVE-2024-40967.json) (`2024-09-09T17:58:49.700`) -- [CVE-2024-40969](CVE-2024/CVE-2024-409xx/CVE-2024-40969.json) (`2024-09-09T17:59:29.787`) -- [CVE-2024-42019](CVE-2024/CVE-2024-420xx/CVE-2024-42019.json) (`2024-09-09T17:35:05.247`) -- [CVE-2024-6274](CVE-2024/CVE-2024-62xx/CVE-2024-6274.json) (`2024-09-09T16:15:27.780`) -- [CVE-2024-6275](CVE-2024/CVE-2024-62xx/CVE-2024-6275.json) (`2024-09-09T17:20:46.777`) -- [CVE-2024-6276](CVE-2024/CVE-2024-62xx/CVE-2024-6276.json) (`2024-09-09T17:20:48.280`) -- [CVE-2024-6277](CVE-2024/CVE-2024-62xx/CVE-2024-6277.json) (`2024-09-09T17:20:50.147`) -- [CVE-2024-6278](CVE-2024/CVE-2024-62xx/CVE-2024-6278.json) (`2024-09-09T17:20:52.050`) -- [CVE-2024-6279](CVE-2024/CVE-2024-62xx/CVE-2024-6279.json) (`2024-09-09T17:20:45.137`) -- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T16:15:02.927`) -- [CVE-2024-8517](CVE-2024/CVE-2024-85xx/CVE-2024-8517.json) (`2024-09-09T16:15:03.053`) +- [CVE-2024-40980](CVE-2024/CVE-2024-409xx/CVE-2024-40980.json) (`2024-09-09T18:15:41.347`) +- [CVE-2024-40981](CVE-2024/CVE-2024-409xx/CVE-2024-40981.json) (`2024-09-09T18:16:52.780`) +- [CVE-2024-40982](CVE-2024/CVE-2024-409xx/CVE-2024-40982.json) (`2024-09-09T18:13:13.997`) +- [CVE-2024-44333](CVE-2024/CVE-2024-443xx/CVE-2024-44333.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-44375](CVE-2024/CVE-2024-443xx/CVE-2024-44375.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-44720](CVE-2024/CVE-2024-447xx/CVE-2024-44720.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-44721](CVE-2024/CVE-2024-447xx/CVE-2024-44721.json) (`2024-09-09T18:35:10.070`) +- [CVE-2024-45041](CVE-2024/CVE-2024-450xx/CVE-2024-45041.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-45406](CVE-2024/CVE-2024-454xx/CVE-2024-45406.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-4629](CVE-2024/CVE-2024-46xx/CVE-2024-4629.json) (`2024-09-09T19:15:13.760`) +- [CVE-2024-5967](CVE-2024/CVE-2024-59xx/CVE-2024-5967.json) (`2024-09-09T19:15:13.920`) +- [CVE-2024-6162](CVE-2024/CVE-2024-61xx/CVE-2024-6162.json) (`2024-09-09T18:15:04.023`) +- [CVE-2024-7015](CVE-2024/CVE-2024-70xx/CVE-2024-7015.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-8042](CVE-2024/CVE-2024-80xx/CVE-2024-8042.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-8509](CVE-2024/CVE-2024-85xx/CVE-2024-8509.json) (`2024-09-09T19:15:14.837`) +- [CVE-2024-8573](CVE-2024/CVE-2024-85xx/CVE-2024-8573.json) (`2024-09-09T18:45:08.053`) +- [CVE-2024-8574](CVE-2024/CVE-2024-85xx/CVE-2024-8574.json) (`2024-09-09T18:47:10.577`) +- [CVE-2024-8575](CVE-2024/CVE-2024-85xx/CVE-2024-8575.json) (`2024-09-09T18:47:45.917`) +- [CVE-2024-8576](CVE-2024/CVE-2024-85xx/CVE-2024-8576.json) (`2024-09-09T18:59:57.423`) +- [CVE-2024-8577](CVE-2024/CVE-2024-85xx/CVE-2024-8577.json) (`2024-09-09T18:51:32.377`) +- [CVE-2024-8578](CVE-2024/CVE-2024-85xx/CVE-2024-8578.json) (`2024-09-09T18:46:00.300`) +- [CVE-2024-8604](CVE-2024/CVE-2024-86xx/CVE-2024-8604.json) (`2024-09-09T18:30:12.050`) +- [CVE-2024-8605](CVE-2024/CVE-2024-86xx/CVE-2024-8605.json) (`2024-09-09T18:30:12.050`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cbb9d926e6f..4e5af6a3945 100644 --- a/_state.csv +++ b/_state.csv @@ -115876,7 +115876,7 @@ CVE-2018-15456,0,0,2f5375f8b0f509603fd54b269e38b48a0e84eb432e0fcde4bdc157b3e7a84 CVE-2018-15457,0,0,cdfe8cdb910400a06d0e86e52da3f71533948b4b17b6875b4bad1a18bc50537e,2019-10-09T23:35:40.640000 CVE-2018-15458,0,0,4eb5b07daaa1a3f80fe57f2e45110d3b67ae8f6a4650f78feb2a0f6ffefe59ab,2019-10-09T23:35:40.797000 CVE-2018-15459,0,0,dae7ef94e050cebb33367e92f31c861188eddb57780a1409c0e04bdc73180bad,2019-10-09T23:35:40.953000 -CVE-2018-1546,0,1,3445ce9333d207bad13225edf4b9047dfb47f100802c6b2ac38b0a302e5dca2d,2024-09-09T17:15:12.590000 +CVE-2018-1546,0,0,3445ce9333d207bad13225edf4b9047dfb47f100802c6b2ac38b0a302e5dca2d,2024-09-09T17:15:12.590000 CVE-2018-15460,0,0,042368f743de9f2440d9b065fb6145817fac73be370a0d72fa5ee01a063e76b6,2020-09-16T14:14:08.843000 CVE-2018-15461,0,0,ae67f638beec243dec718374a8e6b1c09ecf1f3102af33850b52c3310bf7421b,2019-10-09T23:35:41.280000 CVE-2018-15462,0,0,bc1e46ac08a8d665be64afdd3c2427983783a6b60ca748eaa2e219b2bc09cf74,2019-10-03T00:03:26.223000 @@ -212328,7 +212328,7 @@ CVE-2022-48800,0,0,5bffec658ed745e51d5459e4aea9ac8807866d47f5990e78bf7633d4d1764 CVE-2022-48801,0,0,6653f1f5cf0e260b8c6a7c11277b02305adc16a1936040a89c4ab1b97527a852,2024-07-16T13:43:58.773000 CVE-2022-48802,0,0,9a5cfaff9acf94bf883296dd5ba65bc3c4b5cb5bacd82a666569b25935f67533,2024-07-16T13:43:58.773000 CVE-2022-48803,0,0,b4abff8be2e0f42801670ccff819cb36f420c74818031cf95a4f7137a7cf8225,2024-07-16T13:43:58.773000 -CVE-2022-48804,0,0,7b262e00543ee3abd61edfedc09999a236ba244c1b97838dcc5b87faeba44fcc,2024-07-16T13:43:58.773000 +CVE-2022-48804,0,1,1b544566e59d6cffc6a436e6a1e0e0355c4ed4d6d21e76bf59dd431d7c793a87,2024-09-09T18:19:25.403000 CVE-2022-48805,0,0,1a85ecd026455dac598947ecf46991ebc6a297c8cfda5f81b2eb41ab166a105a,2024-07-16T13:43:58.773000 CVE-2022-48806,0,0,aab5dfcaa90219a156231aad53f6d381bb84936e0bc5d4e4673459ac613f9b8c,2024-07-16T13:43:58.773000 CVE-2022-48807,0,0,de4929b5d1af2a8b0746e646b92b98ec03a88450fa058b3f8f0950077f98e404,2024-07-16T13:43:58.773000 @@ -212346,7 +212346,7 @@ CVE-2022-48817,0,0,b46f580097fc3446dd0a4e8effd9ba59641fc06b8157edecf15fc766f2b5c CVE-2022-48818,0,0,490ab441382474b175b901a53e5b7997385eb34ded426f7732ed36b0ed6a91f0,2024-07-16T13:43:58.773000 CVE-2022-48819,0,0,3b59299a47183c811c678e9c959fa3b53a49e93a33e7c29b6f620af028b259f9,2024-07-16T13:43:58.773000 CVE-2022-4882,0,0,6431d8699c3a0e0de78e9a56f61f6085416d72ba627cb8ae8a8a7725b50d9e3d,2024-05-17T02:17:01.177000 -CVE-2022-48820,0,0,eab5df0989f0bec25fac3e29c61610f1e6f346ee5a9ec3fdda7834c7f896ed90,2024-07-16T13:43:58.773000 +CVE-2022-48820,0,1,4dc5234f8e0022a650ebe0992dbe952a33672a36621be06d7a3d7c00e6a2a0bb,2024-09-09T18:29:22.697000 CVE-2022-48821,0,0,b2b9beaf3eef7e0d58b6f3d5cef3aed812b905a0edd4edce8e22c30bf1fa6614,2024-07-16T13:43:58.773000 CVE-2022-48822,0,0,504fa85be5a0659b456edd37017742da59d88f0b837d311430c41c5108ef4e6f,2024-08-07T19:14:37.987000 CVE-2022-48823,0,0,2038485fb972a6fe90032e25ff6c2381b5cc1bc3476a14d2e6b20c51a52fde80,2024-07-16T13:43:58.773000 @@ -222985,12 +222985,12 @@ CVE-2023-30576,0,0,a7beef98c4aaaa905d0d5c6034ba03cdb4e7ff8c323a7c6da61dd78d972b1 CVE-2023-30577,0,0,545749b2d6af0de8487bf303128bd274f5cfec0c086fb3a542d149f7fd574f53,2023-12-03T11:15:09.093000 CVE-2023-3058,0,0,9f7c305f8337fa20576361292d1d535cd2135f70c208fde6ed8bf974c1470dc5,2024-05-17T02:27:14.193000 CVE-2023-30581,0,0,b156a6b818374eedaecff7e6959cc25150181fbf1ed9a43d050cab8b1b8a4335,2023-12-11T20:49:02.543000 -CVE-2023-30582,0,0,c932b44938f4079ec044b351ea1af1f2511c47afcc538c7b314f7b09e2104f4e,2024-09-09T13:03:38.303000 -CVE-2023-30583,0,0,30e6b0c75b4d0ef681e2804c9d2b2cecc17b1b5270b1712bb4062e6b5b9d417b,2024-09-09T13:03:38.303000 -CVE-2023-30584,0,0,348b4881472be729071ac91cf7b17a24ca439e07b9527a2b967780a5179fd001,2024-09-09T13:03:38.303000 +CVE-2023-30582,0,1,7764763ecd07c5fb15156b35aae4db9eecddd9d0dcb2778caae4e418824f86ee,2024-09-09T19:35:01.063000 +CVE-2023-30583,0,1,180a89bfcb231691acf34b76fe1c45200ec66be43d4bfb42227e0f060994b9d7,2024-09-09T19:35:01.927000 +CVE-2023-30584,0,1,4ca7fe4ac6e95803188870af7f0323774db0a16049fa3b512008d8655e4394c6,2024-09-09T19:35:02.767000 CVE-2023-30585,0,0,4c270ea88734f0edd78509d8eca027a2098d9c89d2347788290267fbf36f49ab,2023-12-02T04:39:59.250000 CVE-2023-30586,0,0,bf20da47c5f055ad21020c7e67c7d525452f8799511bd277d6297dbafc9d6310,2023-11-17T18:10:10.547000 -CVE-2023-30587,0,0,5e2e622965334b0973f9b502df5a1b7ed8fd2562fd2ef6820267bcfbe1cfb5de,2024-09-09T13:03:38.303000 +CVE-2023-30587,0,1,319d358c976ae59a060c690eb562a6d72294381e651bff2a1e2bd9226722e98e,2024-09-09T19:35:03.593000 CVE-2023-30588,0,0,a1703c01c91f7ec3f12518570aa157bec106a6e47a4b5c830fd25b2f5d06d7b9,2024-06-21T19:15:26.490000 CVE-2023-30589,0,0,2e59889aea8b4d185427929d8248c7db826a772bdb815f4373802aa8827ce2c4,2024-06-21T19:15:26.617000 CVE-2023-3059,0,0,413b081f7eb8c91071124c10af4f4a512e1fa5ceafbd6298e1af000983a7d7cf,2024-05-17T02:27:14.300000 @@ -229652,7 +229652,7 @@ CVE-2023-39329,0,0,2e6ec28c106c0d41632f963bffc8abc1a0bced3a1e5cb0370e851b21b591d CVE-2023-3933,0,0,fd05fb2b687b880ce3ff695aa73fe42db295a332bee8b3e8fcbec1c8e7b0fcf3,2023-11-07T04:20:00.337000 CVE-2023-39331,0,0,02e0e1777d37caa02d2e32057898fb63511ee952aee19eced37ec4fc0e898e8a,2024-06-18T15:09:45.857000 CVE-2023-39332,0,0,76475ddfcfc452a138e1e0d4562b5d86f4dae11801e2d070da4b6af1f66855fd,2023-11-17T19:08:58.170000 -CVE-2023-39333,0,0,eb25d9f188bd48e6291dc8ea415b438dd96f96d3473e5bdea87cf2ba4139bd0f,2024-09-09T13:03:38.303000 +CVE-2023-39333,0,1,f1c336b23631d038a7cfd086c12484d19bf24b54ff2885775efdf7ce31ca445c,2024-09-09T18:35:00.937000 CVE-2023-39335,0,0,391f1786a78e0058a74e18dc26ba57212893360fd836a250684e772b3c475f4c,2024-08-29T20:35:15.520000 CVE-2023-39336,0,0,7f65c1025b8952cb21ab7102eb78f50a55e120d2ebcfb5ff658c9fa94cb22ef1,2024-01-12T18:56:43.137000 CVE-2023-39337,0,0,8c951edb0fb6f01ae36b21083287fddd571172317d01af32e379473e8e700145,2024-08-29T20:35:16.230000 @@ -230632,7 +230632,7 @@ CVE-2023-40544,0,0,0fc1193e5ecc7ee9670646c9d9c81e4c5888861b329951f2d39dd20b0e6ed CVE-2023-40545,0,0,4532249010b6a6004e21372516818bfffe3ad51f3d0730df682026d0392eb917,2024-02-13T21:08:23.400000 CVE-2023-40546,0,0,840c430022137117c69e42a7f85a3f99312bf3dfec8a88942e88061a03dc1303,2024-06-10T18:15:21.780000 CVE-2023-40547,0,0,9b90cf122878fddc15a84f80df6440afc6de66065e1022a164147da635a691b2,2024-06-10T18:15:22.260000 -CVE-2023-40548,0,0,13c275dcecd2c5f26e2e13665bb54b31eb9a834291d8cf0e3c84f67d413bed2c,2024-09-06T18:15:04.977000 +CVE-2023-40548,0,1,db0077eb81f27fc48574fa5abb038d4eeced71eb61d1e7cafee666a84f87d3ee,2024-09-09T18:15:02.980000 CVE-2023-40549,0,0,17a610c3a9d3095b0cee8a99f3d7863e83f494a96b51878da371261149b72c32,2024-06-10T18:15:22.643000 CVE-2023-4055,0,0,c84104f0c8ec282dfd40a04ff729cf2844caf560f3c96dbbf5c3172d6bb6b24f,2023-08-09T21:15:11.820000 CVE-2023-40550,0,0,a235f3871948c55fedc627d33971852268ff5ba363a67d042b3fb445b9b832f0,2024-06-10T18:15:22.887000 @@ -235007,7 +235007,7 @@ CVE-2023-46805,0,0,7a9f1e3efe4219f546adedaa2f65c4351ffba57ecf76ecbea9c0806444d5c CVE-2023-46806,0,0,49a0b042d8e030d1507dfed8a0c175f6283ca7615330bcadaded676c9bd069b4,2024-07-03T01:42:07.793000 CVE-2023-46807,0,0,c28cf6fba75d9bfea83f438d6bca59021e282ddfe25b1a9c7a037441645e037f,2024-07-03T01:42:08.520000 CVE-2023-46808,0,0,cdef8400d49144d76cd14db640e72e6ddc3bbdae9c9f71cbce92c9ab43c7187b,2024-08-01T13:45:01.253000 -CVE-2023-46809,0,0,454828ff6bd6236115c4e85d8034f2d5ec56ba8d62d8982af07114c85e2e1ec6,2024-09-09T13:03:38.303000 +CVE-2023-46809,0,1,62dde18d01e4774f90d6d2682a77703db225c6bafadad984aa4774ed53e18822,2024-09-09T18:35:01.803000 CVE-2023-4681,0,0,6a7d42fff12f87aaaa676e4a97a7c2caef6ee302b35c3ac3cee7aec36c668259,2023-09-05T16:22:15.077000 CVE-2023-46810,0,0,69baafce6135d40a26721e62348bd610599075db40480cebd36847b59a0b98f6,2024-05-31T19:14:47.793000 CVE-2023-46813,0,0,54a5b81ea9d5fb0a268b9293a603071610c41491ab8bbea7095535d094697af9,2024-01-11T21:15:10.350000 @@ -237318,7 +237318,7 @@ CVE-2023-50090,0,0,c476d0fb0c72dbc426157be8704beeba97f6843ec0df2b7eb876f585bb888 CVE-2023-50092,0,0,9b5eb870c1af9df920495397b818b722f645aaddadf668a1cade852a54a92fc3,2024-01-09T19:39:59.947000 CVE-2023-50093,0,0,3da104dc37e2a018e58d93121ace050880b700d676b2d7db473966f620978bf8,2024-01-09T19:50:01.367000 CVE-2023-50094,0,0,43bbd3c4b3f369f9ac77b378fcc986f7239703c6b3052be3a7feca9bf9aaf24a,2024-08-14T17:15:14.267000 -CVE-2023-50096,0,0,f8e77a782262f83cae33c8ff8d8d3c2adf457f6708523fce4c17c692603d44dc,2024-01-09T18:29:41.817000 +CVE-2023-50096,0,1,9c848991d41e7bf6153eada9652df75b791b91c8dae7041fa96431554cd62b91,2024-09-09T18:35:04.350000 CVE-2023-5010,0,0,8d38283ab93a029b68cbc433c8961ef4a27d2a19531fef9c755ab346438d57c3,2023-12-26T21:32:44.960000 CVE-2023-50100,0,0,540e014c2a7bd6691cec68187a1f5e75325873f2b5dc36b700971e833119f876,2023-12-16T01:10:05.103000 CVE-2023-50101,0,0,82b8fd4ddf38bc06206832806c323d02e049401e0b3df47b6272a763467b06d8,2023-12-16T01:41:17.923000 @@ -237923,7 +237923,7 @@ CVE-2023-51084,0,0,310a54590399af6643eb3f2a4d534733b8ed1310e66c361e30ecd1c61c0aa CVE-2023-5109,0,0,b1680c33c28b14a73fc98da5a977c404ccdfed113d43fc7fd4273d648ec1169d,2023-11-07T04:23:27.700000 CVE-2023-51090,0,0,4d3f4f533c86af2ccf4958139d82f895410ea9776f7dc2f32f15ef7f778707be,2023-12-30T03:18:55.947000 CVE-2023-51091,0,0,4862f60c5196b686b7961ea2e69e95065afd3665910d647a779ddcd3efdb57e0,2023-12-30T03:18:57.887000 -CVE-2023-51092,0,0,5eee074195a0df6f47d532a0f04803752f37a16dc2e1486b46f68a3474aaef45,2023-12-30T03:19:01.717000 +CVE-2023-51092,0,1,f606ca6d1ba674ad50e8b0b19c6d9a426892876570e0377f0664932373ff0219,2024-09-09T19:35:05.803000 CVE-2023-51093,0,0,3d6b67adebe749bd817206bcd0e02b5d1bc52ecda0910c401c410327704e77f0,2023-12-30T03:19:03.393000 CVE-2023-51094,0,0,5f1f0ac9e1a5648e082b1ef4418467407a6110708c72b13d7737d27424ea2556,2023-12-30T03:19:05.307000 CVE-2023-51095,0,0,4b3d23f32f8ed6ac30a7e319e3905419feda24e9cfd08750a7214a46a3d17220,2023-12-30T03:18:50.037000 @@ -238070,7 +238070,7 @@ CVE-2023-51425,0,0,f9e39da94c78596d7ea2c15c28c1c8a7a9fc609253cde02e6af946119dd74 CVE-2023-51426,0,0,d6e6b59005e83d3458df950140725ea70c726a3116055547e75034340319929e,2024-01-04T23:42:36.860000 CVE-2023-51427,0,0,99eda931f939f5d4dfc01593dfb07b995888779bc0a0a883a0da80baf598bc39,2024-01-04T23:40:05.267000 CVE-2023-51428,0,0,72588880e5357f8bdf42b541d20081c9705efb78cda0fbc25ef28cc3cd632102,2024-01-04T23:38:22.723000 -CVE-2023-51429,0,0,d3daedf43952cd9dc24a6822854b461bb8f86e4deeebb783a5312d1cc6af2862,2024-01-04T23:36:16.723000 +CVE-2023-51429,0,1,3ee51c7de5889195ac779d8bc8b3f2aee980d3c32726cb35f98a4d7acaf268f8,2024-09-09T18:35:06.063000 CVE-2023-5143,0,0,100c5c46321e49c9af8866e3f3edeaa776c8758c14e956ed2fc8b66251f5d1dc,2024-08-02T08:15:31.657000 CVE-2023-51430,0,0,4654395858fd5e64655dbdbde13a274df29b2f151ce1d7417d53b545080428bc,2024-01-05T16:04:45.100000 CVE-2023-51431,0,0,752bf4db2cb38815f84d32a045191d31ca45607b2c5d471d5b312d276f9891a4,2024-01-05T16:04:24.063000 @@ -238731,7 +238731,7 @@ CVE-2023-52277,0,0,f3f2651ddfdfb750c7d8253e4068534e7f0600d1f540c0067c4d9fa61e6cc CVE-2023-5228,0,0,9be4dce05638a6c6e82e9cfd37b8dc48d36a8a5248170a49a672ea0f8cf33037,2023-11-14T15:32:54.717000 CVE-2023-52284,0,0,49f8cbf866a818cc3793bc4227656111c408464168b5e3b1c991f1146a62de70,2024-01-08T19:07:52.047000 CVE-2023-52285,0,0,956740d4d21b61506275866a495151801a254b9adcdbe7994edf5590fa5ec0b4,2024-01-24T17:16:50.880000 -CVE-2023-52286,0,0,d57c75df7d4ddd4390fb4bc0cb787c8d5ccb33cbef5a941d5aa3217832550aca,2024-01-05T22:06:41.313000 +CVE-2023-52286,0,1,e0d74766b045a04a60f59d22cbe9fe7492937af52380aaa69b0702b384b2d4f4,2024-09-09T18:35:07.720000 CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9cdc0,2024-01-24T18:40:15.637000 CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000 CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000 @@ -239629,7 +239629,7 @@ CVE-2023-5565,0,0,9e7b8f54cd6b3190a6c2dac08622e882b08cbd368e6fd157742d6c77ea5aee CVE-2023-5566,0,0,12be08118b98fee554154ac5f8793e6b5b39c31b38e93f8ea1a17cb1449cc8ad,2023-11-07T04:24:08.480000 CVE-2023-5567,0,0,4a809f39fc79aea2b56a0f9381e47c90d1b0a4c5eac453c3a06cd429eeaab3fa,2023-11-14T19:11:40.360000 CVE-2023-5568,0,0,38d553e6bd63422157002920ac635048886ff5ffd8fe73a158c842ea275b4377,2023-11-24T09:15:09.767000 -CVE-2023-5570,0,1,87f206bc52392a520ad049babd3b47e2251ec78d9da7033b6ff5cee06408ea7f,2024-09-09T16:35:01.990000 +CVE-2023-5570,0,0,87f206bc52392a520ad049babd3b47e2251ec78d9da7033b6ff5cee06408ea7f,2024-09-09T16:35:01.990000 CVE-2023-5571,0,0,517e76e2863d0b91d16cb5f62e8628dcdcd61d5f895ca680836613c4517f20b9,2023-10-17T16:04:47.640000 CVE-2023-5572,0,0,d3874e77765ea8dd8afcd46f43f04e8854b2bc29554e637a4973cc68fd58bd1c,2023-10-17T16:08:09.450000 CVE-2023-5573,0,0,4fe63b19ad0fa3138adc11217ff249aecc853df2598d2ca13577829e18cb73dd,2023-10-17T16:08:58.677000 @@ -239677,7 +239677,7 @@ CVE-2023-5619,0,0,a19fb0d9c1ec2158ccf365d70c7c69e74f9a9e11e8a35b996d155c23740d5b CVE-2023-5620,0,0,4199d350e2e4c731dd763714d3bb3dd23b36ac346f07188e030f30ff30c41160,2023-12-02T04:36:03.177000 CVE-2023-5621,0,0,c418664501b2f113540a10fbe54573420e49f52f46bc96886f617927fd44a4ff,2023-11-07T04:24:12.930000 CVE-2023-5622,0,0,f19fe82900e70a4450099d29884259279e7aeae442e6aa22b36ae355f702bc7b,2023-11-07T18:04:15.357000 -CVE-2023-5623,0,1,2f3b29c1eef030c9ad5a4ede8de04f56f932e285b9b218b7356d7e60e1761594,2024-09-09T16:35:03.113000 +CVE-2023-5623,0,0,2f3b29c1eef030c9ad5a4ede8de04f56f932e285b9b218b7356d7e60e1761594,2024-09-09T16:35:03.113000 CVE-2023-5624,0,0,ba5097aba2a2a247854c1d9b4796e1185da31c5dd8141edfd0344a8f714da575,2023-11-06T18:20:25.737000 CVE-2023-5625,0,0,ac0ecbb6ed7210743894554a366916e8815b219327e42d98b1f6277193a8851d,2024-08-01T13:45:44.543000 CVE-2023-5626,0,0,340b8c1c87a43fe8a63e58d41c520f026228ad8445e5d8be6ece89714d56eba5,2023-10-25T00:11:45.460000 @@ -241094,7 +241094,7 @@ CVE-2023-7212,0,0,5fa6a38ddbce3d36f226f6907fc4ed570a38b483633cbb1115e731ad339adb CVE-2023-7213,0,0,a50411970960872ae25a485d8e121a5625575da78ca78df31cf68722c0663205,2024-05-17T02:34:18.533000 CVE-2023-7214,0,0,f371a14a8f059e4dc5d49b5c8077d84797abec4a09ab4f6122d1b881600b5111,2024-05-17T02:34:18.647000 CVE-2023-7215,0,0,c7e3ecabb17784bfd2634b4389a54ea1b01c4fe89bd36ccee55582bf564d1453,2024-05-17T02:34:18.757000 -CVE-2023-7216,0,0,f79e1ff9a76c1993dc181f9d1536936a51c1a23160d40e99519535bef37798df,2024-06-12T13:15:49.690000 +CVE-2023-7216,0,1,9ccbd2550b6979eac0d57ebbd1d24ab6d6903fe577f0dcbe54f99b584e216a1d,2024-09-09T18:15:03.647000 CVE-2023-7218,0,0,2fc03ceb2252ddc98b01b57815492ee2c37b5d9b2628dadfb93720d7663d8424,2024-05-17T02:34:18.900000 CVE-2023-7219,0,0,e3ef4045efef342c965c955f27d000ee3f949cefceb6a1a00f27d2c0e58d2ef5,2024-05-17T02:34:19.013000 CVE-2023-7220,0,0,672dc3e9ec353f7bf1c8715ff2fd0cacb6e92f484a358e6c40582e59c5c8fe88,2024-05-17T02:34:19.143000 @@ -244034,7 +244034,7 @@ CVE-2024-21520,0,0,a0a1b113a382a8f0d2c8531b6b39066eaa70707f33ee106e6bb420796b3de CVE-2024-21521,0,0,3d24dbb51985d4e34dfc96b8ce06b7a168669f2571a1659e2371fa09c11d0b75,2024-07-11T13:05:54.930000 CVE-2024-21522,0,0,2e8ebbda5c13599cfe2044d3c4c2928534e0a16f56db3f6070b4ffc7e0448bbd,2024-07-11T13:05:54.930000 CVE-2024-21523,0,0,2330ac0e4e609e6cb7b2d157ba739c957bd5fcf4369b9f17b9fa0a4336dfb21a,2024-08-01T13:46:46.460000 -CVE-2024-21524,0,1,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d2a8,2024-09-09T17:36:33.447000 +CVE-2024-21524,0,0,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d2a8,2024-09-09T17:36:33.447000 CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000 @@ -244187,7 +244187,7 @@ CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fc CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000 CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000 CVE-2024-21757,0,0,66e21018e776a45a8ac67481d369c1c7c7a16e8eeafbc02057073be569347dec,2024-08-22T14:34:54.550000 -CVE-2024-21759,0,1,d165ae3a9708367c28525bd41d7fe549357acc1e0023c89ebc6f25ff1ff9fe47,2024-09-09T16:02:11.507000 +CVE-2024-21759,0,0,d165ae3a9708367c28525bd41d7fe549357acc1e0023c89ebc6f25ff1ff9fe47,2024-09-09T16:02:11.507000 CVE-2024-2176,0,0,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000 CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000 CVE-2024-21762,0,0,84db6239690371b7c5c10ef720dbcf2d622d5440e87b70d1c21a79a857f8ea72,2024-02-13T18:21:14.607000 @@ -245474,7 +245474,7 @@ CVE-2024-23659,0,0,00fc339e96cf90505d259821db8c42ecca98975cfcf7d7475d9e6c3b75152 CVE-2024-2366,0,0,490db5028d325a3e3270a4bc51ed933daf1eb90560331895c813986c8416aa30,2024-05-16T13:03:05.353000 CVE-2024-23660,0,0,f59390a3bdd92fda69048aa3822f1db7f5498b44103925e2d96259b145eb2ed1,2024-02-15T16:01:29.370000 CVE-2024-23662,0,0,0bd2fe423ff125cd6b426da805efebc9c554fb6e799e24e8d56e6d24f2b3b973,2024-04-10T13:24:22.187000 -CVE-2024-23663,0,1,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000 +CVE-2024-23663,0,0,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000 CVE-2024-23664,0,0,d011c75099554e936d176a3c9a5468d2477ab8b77d1d9dbc825df199147abb3b,2024-06-03T14:46:24.250000 CVE-2024-23665,0,0,ccfa4de2b1b28a8c2ff6771f6bb08ec6cd2560932d59d5a7f456cced5fbbb5ed,2024-06-03T14:46:24.250000 CVE-2024-23667,0,0,08d118467751e068d01ea69371b6be0268151b83859ef5f994ee6bdd4d8baae1,2024-06-03T14:46:24.250000 @@ -245954,6 +245954,7 @@ CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46 CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000 CVE-2024-24507,0,0,df900bfc618cee6fc96303e9e74a6c7f402219022adee42ced57945155073210,2024-09-05T16:59:07.437000 CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000 +CVE-2024-24510,1,1,26dc65fb8976d07cf17fd086eed2859fff4fc25bfde1d7095baae07f52c76c96,2024-09-09T19:15:13.197000 CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000 CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000 CVE-2024-2452,0,0,cca6a173274889cd69a2095d63054482ce0ac9763c76eccaa731ce2a40b02048,2024-06-10T19:15:53.417000 @@ -246561,7 +246562,7 @@ CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c71 CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000 CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000 -CVE-2024-2541,0,0,343df38640b102b13a02f51d7503baf71055e95ae1246f0a02a5a45701d9f50e,2024-08-29T13:25:27.537000 +CVE-2024-2541,0,1,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000 CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000 CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000 CVE-2024-25414,0,0,adf1d11bdd5b149561578133c2144fc86b074e6ead373a55ead3bdaa0f1ac127,2024-08-29T20:36:20.677000 @@ -246971,7 +246972,7 @@ CVE-2024-26004,0,0,339e2df0f2a66d2f51de2b2daab023ea4699cfa93f488c0f3f4f084b719f3 CVE-2024-26005,0,0,d7747b5e2f088b172b1a4b499ddd44f15dbf75c021bae634b0baaa69faaf4efd,2024-03-12T12:40:13.500000 CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503286,2024-05-14T19:17:55.627000 CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000 -CVE-2024-26015,0,1,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000 +CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000 CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156748,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 @@ -248409,8 +248410,8 @@ CVE-2024-27776,0,0,c1f24ea22b57cf55cbaee5256ab64f8b8e0305819b509c8db14f64fd5ba1e CVE-2024-2778,0,0,e878f2e24cf14ae545b32e39b137fabc7b5a57fc71abbcd24b764cc029a658e7,2024-05-17T02:38:29.967000 CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000 CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000 -CVE-2024-27784,0,1,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000 -CVE-2024-27785,0,1,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000 +CVE-2024-27784,0,0,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000 +CVE-2024-27785,0,0,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000 CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000 CVE-2024-2779,0,0,2aa54c375187eea63fa6c956db70ce31dec68ec2b409a2e5d246e26b34790090,2024-05-17T02:38:30.057000 CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000 @@ -249328,7 +249329,7 @@ CVE-2024-29106,0,0,38cde57fa08b3bfbd936ed7f30983e2c016824cae4d1dc840ddec9b4b278c CVE-2024-29107,0,0,23005c58ce9ee2df1002def433e2cbd83b2e28f9c719a4edb30307d771834f1f,2024-03-19T16:33:58.680000 CVE-2024-29108,0,0,cdaabe4f2cb16eb242103f0f1468c544b782290af0779b39905eb340a946864b,2024-03-19T16:33:58.680000 CVE-2024-29109,0,0,3b2d209511aa0457f6921ee84bca59e5ee9cf59236c9fd65507b599ea52d49eb,2024-03-19T16:33:58.680000 -CVE-2024-2911,0,1,69fb3f57d9488dce7efad5e476c0a9718f5c486cc1255f55d06df83b940f95be,2024-09-09T16:15:02.413000 +CVE-2024-2911,0,0,69fb3f57d9488dce7efad5e476c0a9718f5c486cc1255f55d06df83b940f95be,2024-09-09T16:15:02.413000 CVE-2024-29110,0,0,fc265aa4deb4be9588bd77283ee4678d3bcd9ee2a8790d504bccff2ae254e584,2024-03-19T16:33:58.680000 CVE-2024-29111,0,0,01d648d6980d11229d1c2cd345c1d0fc4ef4bfb60c43f80653e2087ace4e5fef,2024-03-19T16:33:58.680000 CVE-2024-29112,0,0,0d0beca65e379f4bb6e4903985e3ae2f48dd68ffe582c66829971c90ab80ad5e,2024-03-19T16:33:58.680000 @@ -249486,7 +249487,7 @@ CVE-2024-29320,0,0,5a88a646bd3508d4821cd8830318eb2b89fbb2c1855b58fd2a38a2afb4c1e CVE-2024-2933,0,0,d37838d7f15a38d4ea11c8a25611399fe1881ebeb49155e9b10719125430e055,2024-06-03T14:46:24.250000 CVE-2024-29338,0,0,e217df75a675560f91a966c0f38d2dc94f5bdcd1b6f253203724d0904bfebb81,2024-08-26T14:35:04.427000 CVE-2024-2934,0,0,45a0042779c7d6f34e6fbc62fd386e8f0722656936a5982b81057995fcd91a4c,2024-05-17T02:38:37.907000 -CVE-2024-2935,0,1,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa987310b,2024-09-09T16:15:02.587000 +CVE-2024-2935,0,0,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa987310b,2024-09-09T16:15:02.587000 CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000 CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000 CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000 @@ -252341,7 +252342,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000 CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000 -CVE-2024-33509,0,1,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000 +CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000 CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000 CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 @@ -254246,7 +254247,7 @@ CVE-2024-36131,0,0,fe083931c777de5ebca95ef63997997b27461bd32c076901187f040a7a6fb CVE-2024-36132,0,0,1dce30d4e49190a42dd771e2cd02fc7bcd0f0b6c2d4894583a88755ab208fd59,2024-08-12T18:53:28.710000 CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6cfb,2024-08-15T17:31:15.880000 CVE-2024-36137,0,0,9438d2b71ef73887d75e6f454e33b7f397670092254d4a5da60582748cb22f74,2024-09-09T13:03:38.303000 -CVE-2024-36138,0,0,7a552e38b90840b2af3193735f8d5f878ecbc9c5a35c26dc9b4dcafb0ca59f9c,2024-09-09T13:03:38.303000 +CVE-2024-36138,0,1,e6354c672dea5a9efe6496da7c00037de66d6aa6e785f55fccdeccb25bc2c9b3,2024-09-09T18:35:09.367000 CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000 CVE-2024-36141,0,0,18db6c112ccc0d71f5b13b30aecab0a5f2370100cf994f0af07b87507f970796,2024-06-14T20:02:18.553000 CVE-2024-36142,0,0,6ae7dd3b3d84d3e60ab36df1a1df499d7a9063449a2d0a679757a0e6ad8f4e57,2024-06-14T20:00:46.803000 @@ -255938,7 +255939,7 @@ CVE-2024-38641,0,0,df92dc238d16f057f03f190a2a0bd50146ddee0163d1cf466c523734cfde7 CVE-2024-38642,0,0,3d8e7fc3ed981740e72aa339618d54c8baab28ebc8e7f9af1bb8a029676a3e30,2024-09-09T13:03:38.303000 CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000 CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000 -CVE-2024-38651,0,1,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000 +CVE-2024-38651,0,0,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000 CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000 CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 @@ -256404,7 +256405,7 @@ CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210 CVE-2024-39495,0,0,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000 CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000 CVE-2024-39497,0,0,2d6d1942d32951f62bed9c7f2b517cbb03d4fdefc867fdac7e0afd61c8c01f96,2024-07-12T16:34:58.687000 -CVE-2024-39498,0,1,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000 +CVE-2024-39498,0,0,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000 CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000 CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9d94,2024-07-12T16:34:58.687000 CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000 @@ -256584,8 +256585,8 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67 CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000 -CVE-2024-39714,0,1,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000 -CVE-2024-39715,0,1,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000 +CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000 +CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000 CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000 CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 @@ -256927,7 +256928,7 @@ CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d31 CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 -CVE-2024-40643,0,0,a04c312db9b1f932101b834bf66d135196bcfee6846cd0548b3469f7ce4f4ae6,2024-09-09T15:15:11.597000 +CVE-2024-40643,0,1,70d63ac3bf97bdf829f454273f2013c74a96b45a3177c5d57470b7fbfc94d47c,2024-09-09T18:30:12.050000 CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 @@ -256947,9 +256948,9 @@ CVE-2024-40704,0,0,3edc9bce3fb2efa51a5394090ae34392088b6a2e45c2b3fd2dca38dfa067b CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20b9c,2024-08-15T19:57:34.780000 CVE-2024-40709,0,0,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000 CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000 -CVE-2024-40710,0,1,e69c8c2858f2cb1ca9a0784717f7a4a629a4cef8cb6ad2ae23b5e076a46451c8,2024-09-09T17:35:04.207000 -CVE-2024-40711,0,1,361f1b538b9f657bc9f073bf0b7ae2c8e87e59189fa7af212f088252efa9b3ee,2024-09-09T16:35:05.923000 -CVE-2024-40712,0,1,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000 +CVE-2024-40710,0,0,e69c8c2858f2cb1ca9a0784717f7a4a629a4cef8cb6ad2ae23b5e076a46451c8,2024-09-09T17:35:04.207000 +CVE-2024-40711,0,0,361f1b538b9f657bc9f073bf0b7ae2c8e87e59189fa7af212f088252efa9b3ee,2024-09-09T16:35:05.923000 +CVE-2024-40712,0,0,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000 CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000 CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000 CVE-2024-40718,0,0,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000 @@ -257131,27 +257132,27 @@ CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000 CVE-2024-40962,0,0,3d1366142cae87f99bee1d01922e9c3346fad92689b81dead457f2b7f460d17c,2024-07-12T16:34:58.687000 CVE-2024-40963,0,0,2a96578cd7c6af1c34baa4ac9a95077df49820df6548101e36fdd738e266e9e1,2024-07-12T16:34:58.687000 -CVE-2024-40964,0,1,bd4dac04992501f9fd0e201796f1ee0c4d72c42426ef223857d38e1de010ee1d,2024-09-09T17:48:55.847000 -CVE-2024-40965,0,1,92f237bf538901b9ac55ac9b949dff9be047f3e7c43dbb137cb33205a52f1db1,2024-09-09T17:57:18.697000 +CVE-2024-40964,0,0,bd4dac04992501f9fd0e201796f1ee0c4d72c42426ef223857d38e1de010ee1d,2024-09-09T17:48:55.847000 +CVE-2024-40965,0,0,92f237bf538901b9ac55ac9b949dff9be047f3e7c43dbb137cb33205a52f1db1,2024-09-09T17:57:18.697000 CVE-2024-40966,0,0,4ce1565a3462904d8a95236c2afe6caa74a4190b9d43f1c02099c2813b4515f5,2024-07-12T16:34:58.687000 -CVE-2024-40967,0,1,5718545438538db86b5a682b261aed717a2ae65dfaddd38bc85d5d6dfd9462f7,2024-09-09T17:58:49.700000 +CVE-2024-40967,0,0,5718545438538db86b5a682b261aed717a2ae65dfaddd38bc85d5d6dfd9462f7,2024-09-09T17:58:49.700000 CVE-2024-40968,0,0,58b9d422fff97fcd02e7db46722391c97023d99d4c5142a1da4df7b00c917750,2024-07-12T16:34:58.687000 -CVE-2024-40969,0,1,bd76f22baee998edd0eecd2dc4390c859ca101f12b7c1b85df829c6cdeb35103,2024-09-09T17:59:29.787000 +CVE-2024-40969,0,0,bd76f22baee998edd0eecd2dc4390c859ca101f12b7c1b85df829c6cdeb35103,2024-09-09T17:59:29.787000 CVE-2024-4097,0,0,66ffa92526301cf6212a4835a680920c0ae3100deab31b53b6ec7270ebab3252,2024-05-02T18:00:37.360000 -CVE-2024-40970,0,0,d88eb9e98b544c6dabc96abad6de0495364e0a940487d036ee8839c00f74ddcc,2024-07-12T16:34:58.687000 +CVE-2024-40970,0,1,5beb80adf715c6c7b1dbf144897ade2b77d2d9bb20e6a7797b26e1adf6f8e58b,2024-09-09T18:07:59.283000 CVE-2024-40971,0,0,3a1ab5847a8c301b704d8bdd427dc329bf7ad68865a6fa0d6bfff5bf33c1b1e6,2024-07-12T16:34:58.687000 CVE-2024-40972,0,0,fa6af6e8974278ad24cb6ac5e07f413b788062237eafa75226e4473182991804,2024-08-29T17:15:07.830000 -CVE-2024-40973,0,0,6dfdebb89fb70fbd1dc579084a814033a1ee405421a3f1714de4350fb97fc05f,2024-07-12T16:34:58.687000 +CVE-2024-40973,0,1,99479033e0c736fbadb52dea10d6c869ad95d89f1bd751bd9988f2262c05d93c,2024-09-09T18:09:01.393000 CVE-2024-40974,0,0,32ab56cad597bafba819a3c3479ca0af2d6eedd509368346fb5dad5768478c2b,2024-07-12T16:34:58.687000 CVE-2024-40975,0,0,58c77162922e7538a8367d777b273d725db339abb61e841dcb00423a0d11d35e,2024-07-12T16:34:58.687000 CVE-2024-40976,0,0,04402ac9053380912ee7e6c1d61016d6abda090be8cc57a3ad4cb5cf98f6452e,2024-07-12T16:34:58.687000 -CVE-2024-40977,0,0,713d118c2989110406bd351ccd4a8ec5fa38da2f4ee4480c4fc17dc5e39b784c,2024-07-12T16:34:58.687000 +CVE-2024-40977,0,1,09f9939c9953b8dd7875e3c5c82671a11532d0f8b8049a9eece763f6f07418b4,2024-09-09T18:11:49.467000 CVE-2024-40978,0,0,049db6cb445635349bc13e282d7b1ae71453dbfe8ee45da390adcc7979ae0673,2024-07-12T16:34:58.687000 CVE-2024-40979,0,0,02d50a64dba912abbd440777d71574d402e4971f7eb59be79713869d142b77ff,2024-07-12T16:34:58.687000 CVE-2024-4098,0,0,0f5c5826eed3e5bcc26efbc30e873c5343c85ccb38a52d0933f2a19af76c3335,2024-06-20T12:43:25.663000 -CVE-2024-40980,0,0,7c8b617384c7ab821d9af539492e2145c828dacc0cb33c281c6b5d0cc9c18cc0,2024-07-12T16:34:58.687000 -CVE-2024-40981,0,0,9553c7f4d39fdb6df73318618295233392a46f09b0a4cc6f7eb164a063b2bc95,2024-07-12T16:34:58.687000 -CVE-2024-40982,0,0,697b1c4a0b072cf78a8717040e348060480ecef1718db2a6ab4408bb81735e06,2024-07-12T16:34:58.687000 +CVE-2024-40980,0,1,576e1e9ee775f60db7b44afe01772d0646186a87cb5ab7a64f30143e2fccc274,2024-09-09T18:15:41.347000 +CVE-2024-40981,0,1,8815556b38df0869d7e1f1e7fdbb64292425152399cf573795eefed2f74afe18,2024-09-09T18:16:52.780000 +CVE-2024-40982,0,1,7692df19ea134975c8868654bdd84c259c925fdbf056e59385a1462c002a19a6,2024-09-09T18:13:13.997000 CVE-2024-40983,0,0,1a9c0b04e5bf0ebfd6886d0b469cece9e2d9e059b2e016c3554bfb8d97d2daed,2024-07-12T16:34:58.687000 CVE-2024-40984,0,0,2d75ffe3bddb25f556a6715b7ad56385d47eb1b20abc2765f78492a4395f3521,2024-07-12T16:34:58.687000 CVE-2024-40985,0,0,970a3454923383859b25fd8adc1df8bdea3aeb351d8540e9bf26847d9471f582,2024-07-12T16:34:58.687000 @@ -257728,7 +257729,7 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 -CVE-2024-42019,0,1,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 +CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000 CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000 @@ -258237,6 +258238,7 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e CVE-2024-42756,0,0,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af301,2024-08-27T15:35:17.887000 CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 +CVE-2024-42759,1,1,ac5083d92193f368f1864650bc4b91635e61441c3b8c7903be95236a9a5ee6f2,2024-09-09T19:15:13.270000 CVE-2024-42761,0,0,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000 CVE-2024-42762,0,0,72ec602fc53ee57aef43714af8d33108807c25cff9ab4122dccfb6373af1e78c,2024-08-23T16:18:28.547000 CVE-2024-42763,0,0,a111402090b60e50fe4bee869a5fbabeff40957f7ec249ab20f07b5214e58d6c,2024-08-23T17:35:06.477000 @@ -258859,7 +258861,9 @@ CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c7109 CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000 CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 -CVE-2024-44333,1,1,a217e37b46b027f8dd7a13c3184f55fdcbee3b3214e03688ea541390163afd0a,2024-09-09T17:15:13.120000 +CVE-2024-44333,0,1,b4b2ce8bbe2173a4a2ad27aef82c9d61baf91d96fabc5b2f8fe2c31d19e6a883,2024-09-09T18:30:12.050000 +CVE-2024-44334,1,1,e2fc641be06c663c9c13f94d61505c6df855c5f221401faf9102910cd57803b0,2024-09-09T18:30:12.050000 +CVE-2024-44335,1,1,5029919fcf1c0fffa79e596435b9a0d37cbd0637008bfe0fe65b5982627427cf,2024-09-09T18:30:12.050000 CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000 CVE-2024-44340,0,0,d9735b689087fe69bacf9d01f51df4eff217f92bad40f97e93a199106e1c72ba,2024-08-30T14:56:38.207000 CVE-2024-44341,0,0,6f1abe8a37dcd02ea1515f2f8b8a8861a5b44588bacc4edb6b1f9eb0f68ae2d0,2024-08-30T14:57:07.260000 @@ -258867,7 +258871,7 @@ CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb7 CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 -CVE-2024-44375,0,0,c2ae69cbc723aea7579455f6ebc15cdc81a4940d69f5da87c1c2bddc9c15de6e,2024-09-09T14:15:14.290000 +CVE-2024-44375,0,1,5ccef9f247902f2583fb787042fb7baf80503f33032d96bab6dbab79a4c47cd0,2024-09-09T18:30:12.050000 CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000 CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000 CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000 @@ -258926,8 +258930,8 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037 CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000 CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000 CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 -CVE-2024-44720,1,1,315d4d2a0bd3c25c50b9c634960d467a7635424632644997a922df1d0e7e35ef,2024-09-09T17:35:06.057000 -CVE-2024-44721,1,1,b7a3f0061045e2f9816c8d1362a21479689750c2938d1c13b4ea274c91b49d8b,2024-09-09T16:15:02.853000 +CVE-2024-44720,0,1,053a90257f8d5ecb229ff9b7c992f5d05fdabdf5c3f4e28e0c0e65b8ca217662,2024-09-09T18:30:12.050000 +CVE-2024-44721,0,1,8cdb8797de36b06745d362c014a0e65a6e0bd3802d52013f788bbe7711e2d3cf,2024-09-09T18:35:10.070000 CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000 CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 @@ -258965,6 +258969,7 @@ CVE-2024-44839,0,0,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b7 CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000 CVE-2024-44844,0,0,d7edb2946c54286eb06291f1bb0ae1e0cb5e3a83126388a72075b84fdd746e33,2024-09-09T13:03:38.303000 CVE-2024-44845,0,0,84e2ecc1fd17f5d60179e3847f33ab1653ec969cd3a24d664be1cdba966a3b62,2024-09-09T13:03:38.303000 +CVE-2024-44849,1,1,1b81fe4e73a526b5e64f098efadee66982b41478061ab87b5298543a9fa228a9,2024-09-09T18:30:12.050000 CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000 CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000 CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000 @@ -259079,7 +259084,7 @@ CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1 CVE-2024-45039,0,0,73f90f9455839525425d48713bfe0ff12a525d69b4089ad55a03f7d130bbe254,2024-09-06T16:46:26.830000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 CVE-2024-45040,0,0,66fa952a980adfe3c28c0b6707b447d68c76ae01c0168cd5a5130d4c4798d20c,2024-09-06T16:46:26.830000 -CVE-2024-45041,0,0,76e90f035276fcf866db491ee4611b3feb28ed2e3671a49528af002652301a08,2024-09-09T15:15:11.940000 +CVE-2024-45041,0,1,4b2522a1114d682e3b617a29f59e1ed0cf6b7c351080d3ffad0297be3ffda9a5,2024-09-09T18:30:12.050000 CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000 CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000 CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000 @@ -259177,6 +259182,7 @@ CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66d CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 CVE-2024-45294,0,0,aea60512b4d24376f133c23c43cdb7817f0d718abc51286f2a286f4cb6d84051,2024-09-06T17:15:16.977000 CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000 +CVE-2024-45296,1,1,984878a106ba4ea85efc30862dc10400e329bd76ed0451957c95695776e1ce5d,2024-09-09T19:15:13.330000 CVE-2024-45299,0,0,954c7c10e3e27d01c74d7dbf2e119ecf2e67338229cd2f4df8e5453ce4a4b5ce,2024-09-06T16:46:26.830000 CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 CVE-2024-45300,0,0,16b87f5c0983c10d96a860a768ea4f018c449876fdebfed42bf2eda57fdf4026,2024-09-06T16:46:26.830000 @@ -259214,8 +259220,9 @@ CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b91 CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000 CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd48835a,2024-09-06T12:08:21.290000 CVE-2024-45405,0,0,e0983766e4b3d0668ba058c09b44bc2ee123196af9d88b08813ded0853cf5b2e,2024-09-06T16:46:26.830000 -CVE-2024-45406,1,1,bcbca4ccebf0fc90e19317fc2128c582fbe2f397d8d5fee9fa03c673c61e6676,2024-09-09T17:15:13.180000 +CVE-2024-45406,0,1,1459ad14d7127012093360f5f159c85f3ceb60f90c63e19182240dfb68b6c8c4,2024-09-09T18:30:12.050000 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 +CVE-2024-45411,1,1,ff880483fecdf387b2bf943d1ef54064cc42a6b040409c512a838b57b9acc875,2024-09-09T19:15:13.543000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000 CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000 @@ -259341,7 +259348,7 @@ CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc9 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000 CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000 -CVE-2024-4629,0,0,de70e58094ed9bde0a45edf5e050714f9463b77c9a32d7f0d22b81120f02c4a6,2024-09-04T13:05:36.067000 +CVE-2024-4629,0,1,2b60dd01cb9808bc30568cc7bd7fed85c03b82d3742fd80a9e7b4546151ed50d,2024-09-09T19:15:13.760000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 @@ -260494,7 +260501,7 @@ CVE-2024-5963,0,0,a4cccf44b2eb0314cba658473713210aafeaf2066181b69f96f839930da4f3 CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71e9,2024-07-18T12:28:43.707000 CVE-2024-5965,0,0,9678cf2eb18ba50e506ac9918028ddeb3c443af1b219027dc9d98541cb82736a,2024-06-24T20:00:37.057000 CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339d5,2024-06-24T20:00:23.970000 -CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e27,2024-06-20T12:44:01.637000 +CVE-2024-5967,0,1,2abd808298732cc4b1964c14eae7561fd71fe2ea4a15e03466adc54a1382b0dd,2024-09-09T19:15:13.920000 CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca37a,2024-07-29T14:12:08.783000 CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 CVE-2024-5971,0,0,01d70de536a697a1c65e871f029e293b5051eed9b63fc3f224826d44a6d72378,2024-08-12T13:38:38.567000 @@ -260652,7 +260659,7 @@ CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda2438413 CVE-2024-6158,0,0,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000 CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000 CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000 -CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000 +CVE-2024-6162,0,1,8b7ed74d124d4620011969b57cdb4de9675bbe6f80a77d5b12cad77131aa3550,2024-09-09T18:15:04.023000 CVE-2024-6163,0,0,38b12c0f7e168992652ab7a71785fb2aab63391cb3f79d2e2dd970485bc5678f,2024-08-20T17:44:11.677000 CVE-2024-6164,0,0,08afad8ab6b717af0b90be7bbe2f7a32357bf99ca8728b0f338d52b01a06d786,2024-08-22T16:35:18.693000 CVE-2024-6165,0,0,6301727d4094498886864a9dae2aa85ba81a15451475733d92db12396ffe834c,2024-08-01T14:00:13.553000 @@ -260745,12 +260752,12 @@ CVE-2024-6270,0,0,afb158e2a27846102675d7c9b52684128d3f9cc58ddd69c86dbb7ca5aa6443 CVE-2024-6271,0,0,427d631db618dffd77aaff0c6f93b041e9536bc7bd39022d5cb6f3d2036ef186,2024-08-01T14:00:18.090000 CVE-2024-6272,0,0,f7daf3f4a3aace9a87ac703b7515196ea33a67e89fc732d0dfedb60e5408f0c9,2024-08-01T15:35:19.753000 CVE-2024-6273,0,0,d046e8009aa5553aa5bf1fd3a64a9eb55ab80ff6184fba9c23626c1afd5e8440,2024-09-06T16:54:20.973000 -CVE-2024-6274,0,1,db8bfacbab3e41e186c76ac517f910a1d0628ea50e93784530b08ac7956bf39d,2024-09-09T16:15:27.780000 -CVE-2024-6275,0,1,7cbccc39bde4a795cde54afdb3fc1b8b532ed328b618c2b10a8f716c6775006e,2024-09-09T17:20:46.777000 -CVE-2024-6276,0,1,a54e62a78dc8ca63b29b87fd05364fc7b8a2f230b48b77f2d716d5640107aff7,2024-09-09T17:20:48.280000 -CVE-2024-6277,0,1,cdc407f78f971611f7a162adf54a64c93a9cb94e3239cd776401700e75ae18bc,2024-09-09T17:20:50.147000 -CVE-2024-6278,0,1,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e36230,2024-09-09T17:20:52.050000 -CVE-2024-6279,0,1,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000 +CVE-2024-6274,0,0,db8bfacbab3e41e186c76ac517f910a1d0628ea50e93784530b08ac7956bf39d,2024-09-09T16:15:27.780000 +CVE-2024-6275,0,0,7cbccc39bde4a795cde54afdb3fc1b8b532ed328b618c2b10a8f716c6775006e,2024-09-09T17:20:46.777000 +CVE-2024-6276,0,0,a54e62a78dc8ca63b29b87fd05364fc7b8a2f230b48b77f2d716d5640107aff7,2024-09-09T17:20:48.280000 +CVE-2024-6277,0,0,cdc407f78f971611f7a162adf54a64c93a9cb94e3239cd776401700e75ae18bc,2024-09-09T17:20:50.147000 +CVE-2024-6278,0,0,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e36230,2024-09-09T17:20:52.050000 +CVE-2024-6279,0,0,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000 CVE-2024-6280,0,0,53e9097fb099dd3ec6185a9b8b59575874e3b050c48e208cc0f20896ca10b944,2024-09-06T16:52:22.133000 CVE-2024-6281,0,0,709a859f49498e3e71bff09d88107556f15663d7c1ae6811fce3a162e288bb4f,2024-07-22T13:00:53.287000 CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000 @@ -261297,7 +261304,7 @@ CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400 CVE-2024-7012,0,0,f0e0d2f8670ad7a792afb91a6b1a381690a310d17396ef501ada2605889c18fa,2024-09-05T21:39:20.950000 CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 -CVE-2024-7015,0,0,a37549cf37e709a8db2d5e78b8cfa589e277c584ce2636170c10712178ad247b,2024-09-09T14:15:14.430000 +CVE-2024-7015,0,1,2dee0bb6add2610ee1b5dbb3ee1dba14ff9459a2d74dafeb83e9605451c4f04a,2024-09-09T18:30:12.050000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 CVE-2024-7029,0,0,771467b06f5734847da574d5da21068e3e7ec9c8571a268614524f88178f1827,2024-08-30T21:15:14.420000 CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000 @@ -261447,6 +261454,7 @@ CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 CVE-2024-7258,0,0,7daa83813c091cf4943890cfcc79fb77dbec053060dc3ee1861fb34d4faa0557,2024-08-23T16:18:28.547000 +CVE-2024-7260,1,1,d78d51d77d4419a0ede07ad9147325d7986787c168417bfe566956cff424692d,2024-09-09T19:15:14.033000 CVE-2024-7261,0,0,88fefc15b9eab7b2e919bd0caea05a9adad8b1510053f0adb03b22cb218cc2eb,2024-09-03T12:59:02.453000 CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000 CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000 @@ -261492,6 +261500,7 @@ CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000 CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000 CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 +CVE-2024-7318,1,1,42a9d93989945edb660e3681fabad6a88844dcae357a34fdd4028441ff2278c5,2024-09-09T19:15:14.237000 CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000 CVE-2024-7320,0,0,a6345ced50bd1b25dc54bd951c2133e1d51c039a215f4119dbfe976f4ac4ed65,2024-08-12T16:47:36.887000 CVE-2024-7321,0,0,42cb7d687a3ea14a5f795d2e8dc1d36894e3cc4a44b6104596b7ddb427645e4e,2024-08-12T16:49:01.887000 @@ -261513,6 +261522,7 @@ CVE-2024-7337,0,0,bb4e29754f24508ee03646d09f02a9e9792b2bdc0b40ad3f742f7daf359e30 CVE-2024-7338,0,0,40f9236687cb1fba08bae47e5bce5fdf8596baa7faf10b9e6c7a335576e73829,2024-08-09T14:51:45.677000 CVE-2024-7339,0,0,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a941603,2024-08-23T16:53:31.643000 CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000 +CVE-2024-7341,1,1,c51e86c4ae3d26929145dd2c08eb46f96e91de37872b177576283ccbb881225d,2024-09-09T19:15:14.450000 CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000 CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac1800,2024-09-05T14:11:00.493000 @@ -261967,7 +261977,7 @@ CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fc CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 CVE-2024-8041,0,0,6cc075dd4dd503d7a64ec1eb36d717de84b169042dbabd262ae9b25dfe6faf7c,2024-08-23T16:18:28.547000 -CVE-2024-8042,0,0,fff5d3a74bcd7a118083cddbd0cfac12e08a7843571e00308c3cc8aa8f2b757f,2024-09-09T15:15:12.340000 +CVE-2024-8042,0,1,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 @@ -262129,8 +262139,8 @@ CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927b CVE-2024-8368,0,0,e041f44a528823075791907fb829fe4e23ee08e4bad517d1712c799858033925,2024-09-03T12:59:02.453000 CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a09,2024-09-03T14:15:17.787000 CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000 -CVE-2024-8372,0,0,2792f9d8fc26192f2671e203534099dfcbde4d0179752e976e32f88cec413d35,2024-09-09T15:15:12.560000 -CVE-2024-8373,0,1,ca541a80f0aad718210fd95191cc74ae91005590cfc887f71e4ebdc821b651ae,2024-09-09T16:15:02.927000 +CVE-2024-8372,0,1,824598be017ed03f49e00dc10d01119221625b308bd2ce07fc53c22aed41c811,2024-09-09T18:30:12.050000 +CVE-2024-8373,0,1,2524f37ecee41fbdf36f86f2547ba392b5531495fcdadc7957495dc2dbc119db,2024-09-09T18:30:12.050000 CVE-2024-8374,0,0,9f8f53baf1bfbc489185aa032a32ccc1ef270e4caf925e0db81beb808ee10da0,2024-09-03T12:59:02.453000 CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000 CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000 @@ -262177,8 +262187,8 @@ CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76 CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000 -CVE-2024-8509,0,0,607386a7561a0cf76a75ba79c4a5e02f31641d78da4de1b4e77855ea4dab4759,2024-09-06T16:46:26.830000 -CVE-2024-8517,0,1,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000 +CVE-2024-8509,0,1,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 +CVE-2024-8517,0,0,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000 CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000 @@ -262200,12 +262210,12 @@ CVE-2024-8569,0,0,825765fab86e7246b7c8f1866c045e3d8eb383d3482602655f505175cad6da CVE-2024-8570,0,0,a35ad2ed8f4e40daba99661193190c020bbec00950eacb9abfa9a2b177a3196f,2024-09-09T13:03:38.303000 CVE-2024-8571,0,0,bc72f3f150d06377644ebf4c0afa9d59046664e5cf502a539ace8bb639b609c4,2024-09-09T13:03:38.303000 CVE-2024-8572,0,0,65c0182e0b6b9126e2a9480fb9dc08e73b2cfe03993460c6fe0066e5e3a46c29,2024-09-09T13:03:38.303000 -CVE-2024-8573,0,0,8d80a4ddbf879381b743e0f3d6805fd406bbf7dfdd1654c842160e60bb5f92ee,2024-09-09T13:03:38.303000 -CVE-2024-8574,0,0,354d94bfac840411b02f888d4a9cb214f038255dc83a5eb8295e20dc318152f7,2024-09-09T13:03:38.303000 -CVE-2024-8575,0,0,0a297d8c237ed61614b0d98fc90a7aa678cc0b27fbb45350bf2a076995dd7abc,2024-09-09T13:03:38.303000 -CVE-2024-8576,0,0,3a40907cd5014ae5614c7c697d9a2280ad523049041057a6e5e931c5ce24b54e,2024-09-09T13:03:38.303000 -CVE-2024-8577,0,0,630f9928a98961a656d952ca1642ac03977cbaf719ff11c0f8d8051c69f1ed42,2024-09-09T13:03:38.303000 -CVE-2024-8578,0,0,34dd3cad1e12545afb70bdcc5de75711202ca2debd8f32663968fc2846620eb9,2024-09-09T13:03:38.303000 +CVE-2024-8573,0,1,cb05d77c8c582afe17bd702ecaa70f87c8f55d0a642a886e3a581233ab307fe7,2024-09-09T18:45:08.053000 +CVE-2024-8574,0,1,19894d99d3070776fb1a44f17a54df633ea25e6bfa91923d40be07d8e4a21b2e,2024-09-09T18:47:10.577000 +CVE-2024-8575,0,1,1a894f380aae23a0c95d0f445bdf8ed48f5f6c32fa54c136a25ec7a57fd27b16,2024-09-09T18:47:45.917000 +CVE-2024-8576,0,1,1783676f924976381fafc0f96422ed382f270401d25c92fb033e06383df4a7f7,2024-09-09T18:59:57.423000 +CVE-2024-8577,0,1,96f1be189725676d2f3233dc01a21ddbf35a2a75bf7f74c80a804039b234d5e2,2024-09-09T18:51:32.377000 +CVE-2024-8578,0,1,72b1c5b8b0cbaa0c9c8584a9a193238855c2f41d4aec8b5a15264448a8ca7c65,2024-09-09T18:46:00.300000 CVE-2024-8579,0,0,5e850f0b011b9943620ead0d3063b902196cd66b4d55fb09d083b2d2656f9dc7,2024-09-09T13:03:38.303000 CVE-2024-8580,0,0,71fb7b71ee4e11efeceacb1480052da188f0c5c4d3e8d999f7cbbc85ef79e3d2,2024-09-09T13:03:38.303000 CVE-2024-8582,0,0,bf290c531eb532cb798b8923302db1861844d084d859b0eda7658f732f801dd8,2024-09-09T13:03:38.303000 @@ -262214,5 +262224,5 @@ CVE-2024-8584,0,0,7c7ad2063aa233a836e9a59682cb05dfcb95a707aa850cd9ec5b817e03f5e1 CVE-2024-8585,0,0,9988d1ca177f24ec925e5066ed58d9d8a162814f82b8247fbc323ff8f14711cf,2024-09-09T13:03:38.303000 CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000 CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000 -CVE-2024-8604,1,1,f8b7b7c3ac8ec659db72b62715d729cc6c8fc244da32bec2a2343fe3141c4500,2024-09-09T16:15:03.203000 -CVE-2024-8605,1,1,9804f309cecb16f6ee9b2ecaaae8931160ed1bde4e8a34dda2a863907695a175,2024-09-09T16:15:03.570000 +CVE-2024-8604,0,1,03dd9ea4b720aacc0e1e1cce008473e1a786aeb7eaa9fc848b1a9d53cc790e1f,2024-09-09T18:30:12.050000 +CVE-2024-8605,0,1,05de9fb886966e208a1d4ea135c5ccec7205233c650e87f0027c612a99575815,2024-09-09T18:30:12.050000