From 4fe20b5371e1e41d1f77d387204ae83560f02aa4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 29 Oct 2024 21:03:20 +0000 Subject: [PATCH] Auto-Update: 2024-10-29T21:00:19.713996+00:00 --- CVE-2022/CVE-2022-303xx/CVE-2022-30356.json | 41 +- CVE-2022/CVE-2022-303xx/CVE-2022-30358.json | 41 +- CVE-2022/CVE-2022-303xx/CVE-2022-30359.json | 41 +- CVE-2022/CVE-2022-303xx/CVE-2022-30360.json | 41 +- CVE-2022/CVE-2022-303xx/CVE-2022-30361.json | 41 +- CVE-2022/CVE-2022-487xx/CVE-2022-48731.json | 27 +- CVE-2022/CVE-2022-487xx/CVE-2022-48762.json | 27 +- CVE-2023/CVE-2023-202xx/CVE-2023-20248.json | 27 +- CVE-2023/CVE-2023-205xx/CVE-2023-20513.json | 14 +- CVE-2023/CVE-2023-214xx/CVE-2023-21405.json | 14 +- CVE-2023/CVE-2023-214xx/CVE-2023-21406.json | 14 +- CVE-2023/CVE-2023-233xx/CVE-2023-23346.json | 14 +- CVE-2023/CVE-2023-233xx/CVE-2023-23347.json | 14 +- CVE-2023/CVE-2023-233xx/CVE-2023-23348.json | 14 +- CVE-2023/CVE-2023-234xx/CVE-2023-23437.json | 14 +- CVE-2023/CVE-2023-237xx/CVE-2023-23702.json | 24 +- CVE-2023/CVE-2023-251xx/CVE-2023-25189.json | 14 +- CVE-2023/CVE-2023-321xx/CVE-2023-32189.json | 14 +- CVE-2023/CVE-2023-322xx/CVE-2023-32261.json | 14 +- CVE-2023/CVE-2023-324xx/CVE-2023-32475.json | 1151 ++++++++++++++++++- CVE-2023/CVE-2023-340xx/CVE-2023-34056.json | 14 +- CVE-2023/CVE-2023-359xx/CVE-2023-35983.json | 14 +- CVE-2023/CVE-2023-359xx/CVE-2023-35990.json | 14 +- CVE-2023/CVE-2023-374xx/CVE-2023-37439.json | 14 +- CVE-2023/CVE-2023-374xx/CVE-2023-37440.json | 14 +- CVE-2023/CVE-2023-375xx/CVE-2023-37521.json | 14 +- CVE-2023/CVE-2023-417xx/CVE-2023-41723.json | 14 +- CVE-2023/CVE-2023-456xx/CVE-2023-45626.json | 14 +- CVE-2023/CVE-2023-457xx/CVE-2023-45746.json | 24 +- CVE-2023/CVE-2023-466xx/CVE-2023-46613.json | 24 +- CVE-2023/CVE-2023-466xx/CVE-2023-46621.json | 24 +- CVE-2023/CVE-2023-466xx/CVE-2023-46640.json | 24 +- CVE-2023/CVE-2023-466xx/CVE-2023-46643.json | 24 +- CVE-2023/CVE-2023-467xx/CVE-2023-46753.json | 12 +- CVE-2023/CVE-2023-467xx/CVE-2023-46782.json | 24 +- CVE-2023/CVE-2023-467xx/CVE-2023-46783.json | 24 +- CVE-2023/CVE-2023-468xx/CVE-2023-46802.json | 24 +- CVE-2023/CVE-2023-468xx/CVE-2023-46822.json | 24 +- CVE-2023/CVE-2023-468xx/CVE-2023-46824.json | 24 +- CVE-2023/CVE-2023-68xx/CVE-2023-6876.json | 69 +- CVE-2024/CVE-2024-104xx/CVE-2024-10406.json | 70 +- CVE-2024/CVE-2024-104xx/CVE-2024-10407.json | 70 +- CVE-2024/CVE-2024-104xx/CVE-2024-10408.json | 71 +- CVE-2024/CVE-2024-104xx/CVE-2024-10409.json | 71 +- CVE-2024/CVE-2024-104xx/CVE-2024-10410.json | 71 +- CVE-2024/CVE-2024-104xx/CVE-2024-10411.json | 70 +- CVE-2024/CVE-2024-104xx/CVE-2024-10412.json | 66 +- CVE-2024/CVE-2024-104xx/CVE-2024-10413.json | 70 +- CVE-2024/CVE-2024-104xx/CVE-2024-10414.json | 71 +- CVE-2024/CVE-2024-104xx/CVE-2024-10415.json | 71 +- CVE-2024/CVE-2024-104xx/CVE-2024-10416.json | 81 +- CVE-2024/CVE-2024-104xx/CVE-2024-10417.json | 71 +- CVE-2024/CVE-2024-16xx/CVE-2024-1689.json | 49 +- CVE-2024/CVE-2024-17xx/CVE-2024-1768.json | 66 +- CVE-2024/CVE-2024-19xx/CVE-2024-1988.json | 66 +- CVE-2024/CVE-2024-217xx/CVE-2024-21727.json | 27 +- CVE-2024/CVE-2024-241xx/CVE-2024-24199.json | 63 +- CVE-2024/CVE-2024-251xx/CVE-2024-25197.json | 39 +- CVE-2024/CVE-2024-255xx/CVE-2024-25580.json | 39 +- CVE-2024/CVE-2024-256xx/CVE-2024-25662.json | 39 +- CVE-2024/CVE-2024-301xx/CVE-2024-30176.json | 39 +- CVE-2024/CVE-2024-355xx/CVE-2024-35563.json | 39 +- CVE-2024/CVE-2024-357xx/CVE-2024-35796.json | 27 +- CVE-2024/CVE-2024-358xx/CVE-2024-35809.json | 27 +- CVE-2024/CVE-2024-358xx/CVE-2024-35833.json | 27 +- CVE-2024/CVE-2024-358xx/CVE-2024-35859.json | 27 +- CVE-2024/CVE-2024-358xx/CVE-2024-35898.json | 27 +- CVE-2024/CVE-2024-359xx/CVE-2024-35903.json | 27 +- CVE-2024/CVE-2024-359xx/CVE-2024-35910.json | 27 +- CVE-2024/CVE-2024-359xx/CVE-2024-35913.json | 27 +- CVE-2024/CVE-2024-359xx/CVE-2024-35927.json | 27 +- CVE-2024/CVE-2024-359xx/CVE-2024-35973.json | 27 +- CVE-2024/CVE-2024-359xx/CVE-2024-35986.json | 27 +- CVE-2024/CVE-2024-359xx/CVE-2024-35999.json | 27 +- CVE-2024/CVE-2024-406xx/CVE-2024-40617.json | 34 +- CVE-2024/CVE-2024-407xx/CVE-2024-40799.json | 34 +- CVE-2024/CVE-2024-408xx/CVE-2024-40853.json | 27 +- CVE-2024/CVE-2024-408xx/CVE-2024-40867.json | 24 +- CVE-2024/CVE-2024-441xx/CVE-2024-44145.json | 27 +- CVE-2024/CVE-2024-442xx/CVE-2024-44208.json | 65 +- CVE-2024/CVE-2024-442xx/CVE-2024-44216.json | 39 +- CVE-2024/CVE-2024-442xx/CVE-2024-44217.json | 27 +- CVE-2024/CVE-2024-442xx/CVE-2024-44218.json | 41 +- CVE-2024/CVE-2024-442xx/CVE-2024-44222.json | 41 +- CVE-2024/CVE-2024-442xx/CVE-2024-44228.json | 64 +- CVE-2024/CVE-2024-442xx/CVE-2024-44229.json | 83 +- CVE-2024/CVE-2024-442xx/CVE-2024-44235.json | 71 +- CVE-2024/CVE-2024-442xx/CVE-2024-44240.json | 27 +- CVE-2024/CVE-2024-442xx/CVE-2024-44256.json | 27 +- CVE-2024/CVE-2024-442xx/CVE-2024-44257.json | 39 +- CVE-2024/CVE-2024-442xx/CVE-2024-44259.json | 29 +- CVE-2024/CVE-2024-442xx/CVE-2024-44263.json | 41 +- CVE-2024/CVE-2024-442xx/CVE-2024-44275.json | 41 +- CVE-2024/CVE-2024-442xx/CVE-2024-44289.json | 76 +- CVE-2024/CVE-2024-442xx/CVE-2024-44294.json | 76 +- CVE-2024/CVE-2024-442xx/CVE-2024-44297.json | 145 ++- CVE-2024/CVE-2024-471xx/CVE-2024-47170.json | 59 +- CVE-2024/CVE-2024-480xx/CVE-2024-48074.json | 43 +- CVE-2024/CVE-2024-481xx/CVE-2024-48120.json | 57 +- CVE-2024/CVE-2024-482xx/CVE-2024-48234.json | 39 +- CVE-2024/CVE-2024-482xx/CVE-2024-48235.json | 39 +- CVE-2024/CVE-2024-482xx/CVE-2024-48236.json | 39 +- CVE-2024/CVE-2024-482xx/CVE-2024-48238.json | 39 +- CVE-2024/CVE-2024-482xx/CVE-2024-48239.json | 39 +- CVE-2024/CVE-2024-483xx/CVE-2024-48343.json | 39 +- CVE-2024/CVE-2024-484xx/CVE-2024-48426.json | 39 +- CVE-2024/CVE-2024-484xx/CVE-2024-48459.json | 39 +- CVE-2024/CVE-2024-486xx/CVE-2024-48655.json | 39 +- CVE-2024/CVE-2024-487xx/CVE-2024-48700.json | 39 +- CVE-2024/CVE-2024-487xx/CVE-2024-48743.json | 39 +- CVE-2024/CVE-2024-488xx/CVE-2024-48825.json | 39 +- CVE-2024/CVE-2024-488xx/CVE-2024-48826.json | 39 +- CVE-2024/CVE-2024-48xx/CVE-2024-4887.json | 44 +- CVE-2024/CVE-2024-510xx/CVE-2024-51075.json | 39 +- CVE-2024/CVE-2024-510xx/CVE-2024-51076.json | 39 +- CVE-2024/CVE-2024-511xx/CVE-2024-51180.json | 39 +- CVE-2024/CVE-2024-511xx/CVE-2024-51181.json | 39 +- CVE-2024/CVE-2024-515xx/CVE-2024-51506.json | 39 +- CVE-2024/CVE-2024-515xx/CVE-2024-51507.json | 39 +- CVE-2024/CVE-2024-515xx/CVE-2024-51508.json | 39 +- CVE-2024/CVE-2024-515xx/CVE-2024-51509.json | 39 +- CVE-2024/CVE-2024-54xx/CVE-2024-5425.json | 81 +- CVE-2024/CVE-2024-56xx/CVE-2024-5607.json | 44 +- CVE-2024/CVE-2024-61xx/CVE-2024-6150.json | 14 +- CVE-2024/CVE-2024-66xx/CVE-2024-6600.json | 39 +- CVE-2024/CVE-2024-66xx/CVE-2024-6614.json | 39 +- CVE-2024/CVE-2024-67xx/CVE-2024-6760.json | 34 +- CVE-2024/CVE-2024-70xx/CVE-2024-7004.json | 34 +- CVE-2024/CVE-2024-72xx/CVE-2024-7208.json | 27 +- CVE-2024/CVE-2024-72xx/CVE-2024-7255.json | 34 +- CVE-2024/CVE-2024-75xx/CVE-2024-7518.json | 34 +- CVE-2024/CVE-2024-79xx/CVE-2024-7978.json | 34 +- README.md | 67 +- _state.csv | 394 +++---- 134 files changed, 6038 insertions(+), 614 deletions(-) diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json index cf600dbd7ea..0a4b5a2e953 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30356", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.387", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:01.120", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por una vulnerabilidad de escalada de privilegios a trav\u00e9s de una solicitud POST a /user/assignuserrole mediante los par\u00e1metros userid y role. Se requiere autenticaci\u00f3n con el privilegio de rol OE_ADMIN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/privilege-escalation#cve-2022-30356", diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json index 0ab33fdadc0..e137f2ff5e9 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30358", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.507", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:03.073", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por una vulnerabilidad de apropiaci\u00f3n de cuenta mediante una solicitud POST a /user/updatePassword mediante los par\u00e1metros userId y newPsw. Se requiere autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30358", diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json index f84bf203f4d..cd884e70aa4 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30359", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.570", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:04.317", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por una vulnerabilidad de exposici\u00f3n de datos confidenciales a trav\u00e9s de una solicitud GET a /user/getUserList. Se requiere autenticaci\u00f3n. La informaci\u00f3n divulgada est\u00e1 asociada con todos los usuarios registrados, incluidos el ID de usuario, el estado, la direcci\u00f3n de correo electr\u00f3nico, los roles, el tipo de usuario, el tipo de licencia y los detalles personales, como el nombre, el apellido, el g\u00e9nero y las preferencias del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30359", diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json index f5c283a3f6d..c9b2993448a 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30360", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.630", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:05.583", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por m\u00faltiples vulnerabilidades de XSS almacenado (tambi\u00e9n conocidas como persistentes o de tipo II) a trav\u00e9s de una solicitud POST a /profile/updateProfile mediante los par\u00e1metros slackid o phone. Se requiere autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/stored-xss#cve-2022-30360", diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json index ef5bb02808e..407eda9ace0 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30361", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.700", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:06.847", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "OvalEdge 5.2.8.0 y versiones anteriores se ven afectadas por una vulnerabilidad de exposici\u00f3n de datos confidenciales a trav\u00e9s de una solicitud GET a /user/getUserType. No se requiere autenticaci\u00f3n. La informaci\u00f3n divulgada est\u00e1 asociada con el ID de usuario registrado, el estado, la direcci\u00f3n de correo electr\u00f3nico, los roles, el tipo de usuario, el tipo de licencia y los detalles personales, como el nombre, el apellido, el g\u00e9nero y las preferencias del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30361", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48731.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48731.json index d903959cad6..52f93045c6d 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48731.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48731.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48731", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:11.517", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-10-29T19:35:01.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/kmemleak: evita escanear posibles agujeros enormes. Al usar devm_request_free_mem_region() y devm_memremap_pages() para agregar memoria ZONE_DEVICE, si se solicitaba, el pfn final de la regi\u00f3n de memoria libre era enorme (por ejemplo, 0x400000000), el node_end_pfn() tambi\u00e9n ser\u00e1 enorme (ver move_pfn_range_to_zone()). Por lo tanto, crea un enorme agujero entre node_start_pfn() y node_end_pfn(). Descubrimos que en algunas APU AMD, AMDKFD solicit\u00f3 una regi\u00f3n de memoria libre y cre\u00f3 un agujero enorme. En tal caso, el siguiente fragmento de c\u00f3digo simplemente estaba haciendo un bucle test_bit() ocupado en el enorme agujero. for (pfn = start_pfn; pfn < end_pfn; pfn++) { estructura p\u00e1gina *p\u00e1gina = pfn_to_online_page(pfn); si (!p\u00e1gina) contin\u00faa; ... } Entonces obtuvimos un bloqueo suave: perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU#6 bloqueada durante 26 segundos! [bash:1221] CPU: 6 PID: 1221 Comm: bash No contaminado 5.15.0-custom #1 RIP: 0010:pfn_to_online_page+0x5/0xd0 Seguimiento de llamadas:? kmemleak_scan+0x16a/0x440 kmemleak_write+0x306/0x3a0 ? common_file_perm+0x72/0x170 full_proxy_write+0x5c/0x90 vfs_write+0xb9/0x260 ksys_write+0x67/0xe0 __x64_sys_write+0x1a/0x20 do_syscall_64+0x3b/0xc0 Entry_SYSCALL_64_after_hwframe+0x4 4/0xae Hice algunas pruebas con el parche. (1) m\u00f3dulo amdgpu descargado antes del parche: usuario real 0m0.976s 0m0.000s sys 0m0.968s despu\u00e9s del parche: usuario real 0m0.981s 0m0.000s sys 0m0.973s (2) m\u00f3dulo amdgpu cargado antes del parche: real 0m35 .365s usuario 0m0.000s sys 0m35.354s despu\u00e9s del parche: real 0m1.049s usuario 0m0.000s sys 0m1.042s" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/352715593e81b917ce1b321e794549815b850134", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48762.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48762.json index 77d1a77ec0d..fea445c4fad 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48762.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48762.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48762", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:14.287", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-10-29T19:35:01.667", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: extable: corrige los \u00edndices de registro load_unaligned_zeropad() En ex_handler_load_unaligned_zeropad() extraemos err\u00f3neamente los datos y los \u00edndices de registro de direcciones de ex->type en lugar de ex->data. Como ex->type contendr\u00e1 EX_TYPE_LOAD_UNALIGNED_ZEROPAD (es decir, 4): * Siempre trataremos a X0 como el registro de direcci\u00f3n, ya que EX_DATA_REG_ADDR se extrae de los bits [9:5]. Por lo tanto, podemos intentar eliminar la referencia a una direcci\u00f3n arbitraria ya que X0 puede tener un valor arbitrario. * Siempre trataremos a X4 como el registro de datos, ya que EX_DATA_REG_DATA se extrae de los bits [4:0]. Por lo tanto, corromperemos X4 y provocaremos un comportamiento arbitrario dentro de load_unaligned_zeropad() y su llamador. Solucione este problema extrayendo ambos valores de ex->data como se pretend\u00eda originalmente. En una imagen QEMU habilitada para MTE, nos encontramos con el siguiente bloqueo: No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 Rastreo de llamadas: fixup_exception+0xc4/0x108 __do_kernel_fault+0x3c/0x268 do_tag_check_fault+0x3c/0x104 do_mem_abort+0x44/0 xf4 el1_abort+ 0x40/0x64 el1h_64_sync_handler+0x60/0xa0 el1h_64_sync+0x7c/0x80 link_path_walk+0x150/0x344 path_openat+0xa0/0x7dc do_filp_open+0xb8/0x168 do_sys_openat2+0x88/0x17c __arm64_s ys_openat+0x74/0xa0 invoke_syscall+0x48/0x148 el0_svc_common+0xb8/0xf8 do_el0_svc+ 0x28/0x88 el0_svc+0x24/0x84 el0t_64_sync_handler+0x88/0xec el0t_64_sync+0x1b4/0x1b8 C\u00f3digo: f8695a69 71007d1f 540000e0 927df12a (f940014a)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/3758a6c74e08bdc15ccccd6872a6ad37d165239a", diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json index cd4bebeca4d..8e562e64dd6 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20248.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20248", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-04-24T21:15:46.510", - "lastModified": "2024-04-25T13:18:20.370", + "lastModified": "2024-10-29T20:35:08.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del software Cisco TelePresence Management Suite (TMS) podr\u00eda permitir que un atacante remoto autenticado lleve a cabo un ataque de cross-site scripting (XSS) contra un usuario de la interfaz. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente por parte de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad insertando datos maliciosos en un campo de datos espec\u00edfico de la interfaz. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "ykramarz@cisco.com", diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20513.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20513.json index 80a05069bca..b1fcea09062 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20513.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20513.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20513", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:19.150", - "lastModified": "2024-08-14T02:07:05.410", + "lastModified": "2024-10-29T19:35:02.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", diff --git a/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json b/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json index eab1b194066..693a9a6b3aa 100644 --- a/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json +++ b/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21405", "sourceIdentifier": "product-security@axis.com", "published": "2023-07-25T08:15:09.927", - "lastModified": "2023-08-02T18:43:09.213", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:03.677", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-214xx/CVE-2023-21406.json b/CVE-2023/CVE-2023-214xx/CVE-2023-21406.json index 10b709ce440..f19460779d3 100644 --- a/CVE-2023/CVE-2023-214xx/CVE-2023-21406.json +++ b/CVE-2023/CVE-2023-214xx/CVE-2023-21406.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21406", "sourceIdentifier": "product-security@axis.com", "published": "2023-07-25T08:15:10.003", - "lastModified": "2023-08-02T03:53:46.127", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:04.477", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json index 767e767deb5..033740d0cf7 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23346", "sourceIdentifier": "psirt@hcl.com", "published": "2023-08-09T19:15:14.500", - "lastModified": "2023-08-15T19:58:44.960", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:05.173", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-327" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23347.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23347.json index 1e5863a8d65..2404ab501da 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23347.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23347.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23347", "sourceIdentifier": "psirt@hcl.com", "published": "2023-08-09T20:15:09.903", - "lastModified": "2023-08-16T17:00:58.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:08.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "CWE-327" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23348.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23348.json index e976c56ba49..50147d53f08 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23348.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23348.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23348", "sourceIdentifier": "psirt@hcl.com", "published": "2023-07-10T18:15:10.637", - "lastModified": "2023-07-19T15:48:28.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:09.140", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23437.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23437.json index ea0acb6d65b..76b054f1c38 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23437.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23437.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23437", "sourceIdentifier": "3836d913-7555-4dd0-a509-f5667fdf5fe4", "published": "2023-12-29T03:15:10.020", - "lastModified": "2024-01-04T23:28:07.187", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:09.880", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23702.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23702.json index 988c8685524..1b211b6b09a 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23702.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23702.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23702", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:07.827", - "lastModified": "2023-11-14T15:27:43.113", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:10.747", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json index 527c82f58c1..fbc44bd84bb 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25189", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T16:15:06.827", - "lastModified": "2024-09-26T13:32:02.803", + "lastModified": "2024-10-29T19:35:05.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25189/", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json index 4b055baa8d5..08eccf1fc1a 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32189", "sourceIdentifier": "meissner@suse.de", "published": "2024-10-16T14:15:04.140", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-29T20:35:10.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -83,6 +83,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32189", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32261.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32261.json index 162c446fab3..c9a2e2c6534 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32261.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32261.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32261", "sourceIdentifier": "security@opentext.com", "published": "2023-07-19T16:15:09.737", - "lastModified": "2023-07-28T14:23:01.077", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:11.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32475.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32475.json index f8747df84cd..2637d7c7ace 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32475.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32475.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32475", "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-07T03:15:08.950", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:04:54.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 6.0 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -51,10 +71,1135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_5625_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "6967CAD7-821C-4909-A6E3-F4A8934D7ED9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CB00804-D39C-4A1B-9762-A7249C4EA753" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_5515_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "F6CD2B14-0DE3-4B20-BF3F-E919F8AF2F11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5515:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EB96F99-DE8C-4344-BBB2-12AD92CE98A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_5415_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "F505CA5A-5438-4C23-B3D6-5C4764C0E184" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5415:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DC7AFBA-3492-44A7-9D78-51FD20C985F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_3405_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "26E98FFB-840E-49B4-93F9-B53D45BECBD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3405:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79142A75-EA84-4C9A-861B-0FF10E21450B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_16_5635_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "01AADB4A-439D-4468-8AC1-59A263C3A402" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_16_5635:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6BA027A-D8C7-478A-8C3B-42B9F722367B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_15_3535_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.0", + "matchCriteriaId": "6B0C7C65-BFC9-49C0-A449-A11958006374" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_15_3535:-:*:*:*:*:*:*:*", + "matchCriteriaId": "602150A8-8C3E-4962-889C-5E9051C71667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_15_3525_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.1", + "matchCriteriaId": "3FD1F48D-7D61-4519-A2FE-6387E0C477C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_15_3525:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA4B12B8-3686-4DF7-9160-A04D58F58A16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_15_3515_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "9AA00B2B-F2D2-47FF-B96D-12D544B1207A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_15_3515:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C66DDCF-85FC-455C-8A31-5CAAD7D92BDB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_14_3435_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.0", + "matchCriteriaId": "AD5F9DF4-D9A6-4C28-862F-265E0B235A9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_14_3435:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90140BF1-C455-495F-A2FA-E0FAF9B0D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vostro_14_3425_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.1", + "matchCriteriaId": "7434C5AF-CCD3-4117-AC56-92B73BDD1355" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_14_3425:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FCE2FED-41E1-4CE3-AE9B-2F73F04925D0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_7415_2-in-1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "107A2C1E-6F71-4112-A893-05FB3D725067" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7415_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFBBD87A-97E6-4EBB-8B04-0E343A6D3FF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_7405_2-in-1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.0", + "matchCriteriaId": "1B75E196-A7EE-471C-8966-2D358B520A26" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7405_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A723A28B-2CED-4A1A-B36C-82E9ABDE58E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_5515_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "6F23FCEA-96B0-4F35-988B-88817D3C25DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5515:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F05114EB-E200-4F8B-8D18-41AC80540F29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_5505_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.14.0", + "matchCriteriaId": "DB9A42C5-671F-4796-8E49-E61A97B61169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5505:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84379684-0B62-44BB-A53E-04C95CA09ED5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_5415_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "F2A24064-14F3-47F1-92AC-6D7A6AFF0137" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5415:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1563D5D8-CD81-4EE5-AE6F-6939C353377B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_5405_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.14.0", + "matchCriteriaId": "3065917D-3E56-4BC0-B7BD-2351FB0E6216" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5405:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED5439F-1A3C-4F5F-98C7-B2C471919477" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_3505_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "0FA188A3-4971-447D-8B57-A474A6D64F5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3505:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3137C79A-EE16-4B4E-95D8-6CF1E1E9A4CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_24_5415_all-in-one_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.17.0", + "matchCriteriaId": "CC3B1267-2BEF-49E6-83E5-3D3CECD21621" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_24_5415_all-in-one:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE0899CC-0FFF-4CD6-B39E-6A90E3D4183A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_16_7635_2-in-1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "0059B1F1-5C6F-4CDB-9D3A-9F06B93EDC65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_16_7635_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40C9F472-97F7-438A-8CAC-B9B3A85413BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_16_5635_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "32998813-4D00-44B9-BF6C-ED53B45DE3BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_16_5635:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4157A8EE-8838-4A87-A5AF-2EE1B0D03AEE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_16_5625_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "2E5BCAC9-6285-4965-9E19-21DCDD34B8A9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_16_5625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6D67E18-5D2F-4D1A-9570-A83F573C0B7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_15_3535_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.0", + "matchCriteriaId": "14DA511C-B06C-4CD4-B089-3067B64F8871" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_3535:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E43E62FB-FD2D-4189-A692-23527D838690" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_15_3525_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.1", + "matchCriteriaId": "5EE6427E-D5B1-4414-9D20-2C1ED56DB637" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_3525:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C818D45-465A-4BCE-A6E6-B7C54485EB3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_15_3515_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "B1E7746B-CCF6-4293-906B-6F91EF2A4069" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_3515:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C72CC59F-C18E-4668-853F-8F2BA59A129A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_14_7435_2-in-1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "9A7A5962-55C5-4EB0-926E-562FC2C20FB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_7435_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A037401-9C16-40A6-948E-AD310587E6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_14_7425_2-in-1_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "5AD152E5-FAAC-4533-98E7-B6C14C3A9502" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_7425_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AFF3169-604D-48F4-A04E-280056592521" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_14_5435_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "FCBD4767-B796-43A4-BE6C-BC25BB79BFEA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_5435:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71BEFBEB-548A-445E-98D3-28BBFC7CA412" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:inspiron_14_5425_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "890DF5F3-9D07-4D8E-83D4-FC513DA43244" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_5425:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2439A92-05B4-4654-A459-AC2E87745FFF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:g5_5505_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.18.0", + "matchCriteriaId": "69D7E3C5-6158-4360-A8A2-248496D34292" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g5_5505:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0566A03A-54DA-429D-B088-228559803249" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:g15_5535_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.0", + "matchCriteriaId": "A3A07529-B337-4100-B50A-B838260476C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g15_5535:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE33B5D-E5DF-443D-8CCA-09CFB259D20C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:g15_5525_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.0", + "matchCriteriaId": "CFDC8F0B-EFFC-40A7-9399-750BA719B82A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g15_5525:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68FD27D9-7C76-450C-8535-DE86FC006C46" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:g15_5515_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.0", + "matchCriteriaId": "AA9EB379-2C98-402A-BB3C-FC7180196487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g15_5515:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DD6D554-0CEC-411C-9D44-A0F3AE3D3A07" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m18_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9.0", + "matchCriteriaId": "BC8D3E27-68C4-4F38-8436-725B5294215F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72F40FC8-755B-4353-AB4E-73F59FF4E982" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m17_r5_amd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.0", + "matchCriteriaId": "B40466F0-EE69-4BD6-AA08-A2A6B353AACC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m17_r5_amd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7423FFC8-C206-46A3-B5EF-D8077C315514" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m16_r1_amd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9.0", + "matchCriteriaId": "340FA3F7-5D8A-4DEC-B115-8D81470C8450" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m16_r1_amd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B16CF02D-14B3-4C2A-BB00-D2FAEB563352" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m15_ryzen_edition_r5_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.16.0", + "matchCriteriaId": "F09AF627-20AB-4A2A-BF19-399F1DD27F59" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m15_ryzen_edition_r5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDDF9040-D1A2-4F53-B2A1-60A56A401DDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_m15_r7_amd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.0", + "matchCriteriaId": "6EFDB3FF-B12D-4E03-8846-3594C1DD6597" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m15_r7_amd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC05325D-7B5C-415E-A8C2-FE28AEC878D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.16.0", + "matchCriteriaId": "E48A0D38-6DCE-4531-8D3F-25C594C9DE61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66B64687-CF02-414E-B961-84A011DC49E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "34DF7BEA-2EF9-47A8-965D-C045C793F834" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503027CC-7D9B-4F00-9728-48C12B18BD7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:alienware_aurora_r10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.6.0", + "matchCriteriaId": "8D22BE20-CEC2-45EC-B217-737F14B2A874" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1B5E1A2-3F3B-42AF-93ED-01ABF2763BC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000215644/dsa-2023-222-security-update-for-an-amd-bios-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34056.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34056.json index bed7ac3a812..0716e29da18 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34056.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34056.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34056", "sourceIdentifier": "security@vmware.com", "published": "2023-10-25T18:17:27.953", - "lastModified": "2023-10-31T15:18:37.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:06.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35983.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35983.json index 21fb0094fe1..d33d6d52748 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35983.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35983.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35983", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:15.133", - "lastModified": "2023-08-02T00:46:23.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:07.507", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json index 619a7bdf895..0cce286a929 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35990", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:52.980", - "lastModified": "2023-10-12T02:12:41.530", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:08.297", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37439.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37439.json index abcf8b8f0c5..f55a23105af 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37439.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37439.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37439", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-08-22T19:16:38.817", - "lastModified": "2023-08-29T15:12:00.960", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:12.410", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37440.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37440.json index 1300e2623e3..447bee5fa3d 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37440.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37440.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37440", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-08-22T19:16:38.907", - "lastModified": "2023-08-29T15:25:40.923", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:13.140", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37521.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37521.json index e3477a6ceff..90dff13948c 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37521.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37521.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37521", "sourceIdentifier": "psirt@hcl.com", "published": "2024-01-16T16:15:10.893", - "lastModified": "2024-01-23T14:21:58.337", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:13.863", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41723.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41723.json index 00ea0df76c8..cb73aa8a105 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41723.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41723.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41723", "sourceIdentifier": "support@hackerone.com", "published": "2023-11-07T07:15:10.420", - "lastModified": "2023-11-14T20:30:54.470", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:10.820", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -71,6 +71,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45626.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45626.json index b8afb0e369a..e6ddadb19e9 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45626.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45626.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45626", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-11-14T23:15:11.410", - "lastModified": "2023-11-21T19:58:43.770", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:11.560", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45746.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45746.json index 55af6a0458f..83481090935 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45746.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45746.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45746", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-10-30T05:15:09.993", - "lastModified": "2023-11-08T12:49:08.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:12.283", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46613.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46613.json index 35a13adcbbf..5fecdcefefc 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46613.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46613.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46613", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-08T16:15:10.367", - "lastModified": "2023-11-15T03:37:23.457", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:12.497", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46621.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46621.json index c2335f095d7..d57cafef30a 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46621.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46621.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46621", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-08T16:15:10.470", - "lastModified": "2023-11-15T14:35:21.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:12.687", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46640.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46640.json index 623ccdf486b..869b599fe35 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46640.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46640.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46640", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-08T16:15:10.763", - "lastModified": "2023-11-14T21:36:12.310", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:12.860", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46643.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46643.json index b8f7c9bc780..bb2273ff8c1 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46643.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46643.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46643", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-08T17:15:07.860", - "lastModified": "2023-11-15T17:37:46.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:13.037", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46753.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46753.json index 84d4fc715f3..27384f02dbd 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46753.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46753.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46753", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-26T05:15:26.127", - "lastModified": "2024-04-28T07:15:08.623", + "lastModified": "2024-10-29T20:35:14.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46782.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46782.json index 8906cfeaf91..45968fc30ce 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46782.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46782.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46782", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:07.987", - "lastModified": "2023-11-14T15:27:33.713", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:13.217", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46783.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46783.json index 58dc14c732a..8fb338c60ed 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46783.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46783.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46783", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:08.060", - "lastModified": "2023-11-14T15:27:27.733", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:13.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46802.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46802.json index 9779dde944a..d7ef04c8692 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46802.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46802.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46802", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-11-06T02:15:07.333", - "lastModified": "2023-11-14T15:30:13.830", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:13.620", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46822.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46822.json index a4a3861356d..75cf9884593 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46822.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46822.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46822", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:08.200", - "lastModified": "2023-11-14T17:05:20.447", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:13.987", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46824.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46824.json index 0e92322988f..e9b67ead47d 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46824.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46824.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46824", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:08.330", - "lastModified": "2023-11-14T17:05:13.743", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T19:35:14.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6876.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6876.json index dd88b50023d..d92854a15ec 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6876.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6876.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6876", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T02:15:08.933", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:50:53.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -39,18 +59,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nayrathemes:clever_fox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "25.2.1", + "matchCriteriaId": "FF693F4C-5F67-481D-8E82-EE49F1FC8D20" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/clever-fox/trunk/clever-fox.php#L539", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3096085%40clever-fox&new=3096085%40clever-fox&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e1f94d9-8be6-4174-90a5-820c0207a2fa?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10406.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10406.json index abb5b6d97b4..d7e08ca4fc1 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10406.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10406", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-26T22:15:02.480", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:48:36.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/K1nako0/tmp_vuln7/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.281936", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281936", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431335", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10407.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10407.json index 4111992cfaa..89adb5357de 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10407.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10407.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10407", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T00:15:12.703", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:47:53.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/K1nako0/tmp_vuln8/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.281937", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281937", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431336", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10408.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10408.json index 43461f3cbbe..a33da2e4504 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10408.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10408", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T03:15:02.947", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:44:07.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/46090516ba1b13fe3d2607ab4c0114f1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281938", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281938", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431491", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10409.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10409.json index daeea4dd7cf..37951a2b24a 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10409.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10409", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T03:15:03.653", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:42:02.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/5f927c5e0502b4ec31b3f7ef12556942", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431494", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10410.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10410.json index 166ef918128..4b64d3799dd 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10410.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10410", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T04:15:02.617", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:41:20.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBD2F8A-02C4-4E06-87E0-D71F51952B0F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/K1nako0/tmp_vuln9/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431502", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10411.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10411.json index b865107b72f..64637e165ea 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10411.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10411.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10411", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T05:15:02.903", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:28:25.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBD2F8A-02C4-4E06-87E0-D71F51952B0F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/K1nako0/tmp_vuln10/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.281940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431586", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10412.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10412.json index 0843562835e..8432a52d6b0 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10412.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10412", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T08:15:02.540", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T20:40:13.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:poco-z:guns-medial:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "45C434BF-8FFD-44DF-A336-72968B8EE15A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Poco-z/Guns-Medical/issues/15", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.427005", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10413.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10413.json index d23d1801d10..af70e2a35ef 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10413.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10413.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10413", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T10:15:02.627", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T20:33:27.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:janobe:online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBD2F8A-02C4-4E06-87E0-D71F51952B0F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/K1nako0/tmp_vuln11/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.281954", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281954", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431595", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10414.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10414.json index f07e0f0dd0d..f53915c7ee8 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10414.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10414.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10414", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T11:15:02.407", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T20:46:10.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:vehicle_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4C526E65-D52A-44FC-9193-8544B55EB158" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/phpgurukul_vehicle_record_system_edit_brand_xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.281955", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281955", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431623", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10415.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10415.json index 61a052d19fe..13dc90a26f5 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10415.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10415.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10415", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T12:15:02.600", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T20:26:06.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/2aba05ef2277d85ea4148dc42189eae0", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281956", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281956", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431685", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10416.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10416.json index 80437418a45..7cbfac12af1 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10416.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10416.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10416", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T13:15:02.277", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T20:21:17.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +150,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/18cf04067697c8ceb2cba68980139dcc", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281957", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281957", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431686", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10417.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10417.json index b62457bc73b..c6d1d8759c2 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10417.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10417.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10417", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T13:15:02.590", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T20:19:03.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/bf0cf963ec56cfe0dcaba2956352bafd", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281958", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281958", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.431781", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1689.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1689.json index 6e0a906ed7a..f1a4c77b83c 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1689.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1689.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1689", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T02:15:09.203", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:49:01.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,18 +39,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themefarmer:woocommerce_tools:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.10", + "matchCriteriaId": "F1DFEB74-3723-41C2-B879-1BF4B503768D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/woo-tools/trunk/admin/admin-init.php#L61", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098165%40woo-tools&new=3098165%40woo-tools&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3830c901-be36-4c4b-976b-d388b6af0c67?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1768.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1768.json index 447a55429ff..ed630ca308c 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1768.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1768.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1768", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T03:15:09.237", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:44:53.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nayrathemes:clever_fox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "25.2.1", + "matchCriteriaId": "FF693F4C-5F67-481D-8E82-EE49F1FC8D20" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3096085%40clever-fox&new=3096085%40clever-fox&sfp_email=&sfph_mail=#file1", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16af8724-595c-4daa-80bd-8125a32cc502?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1988.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1988.json index 5b7a7b6b983..3a206a55247 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1988.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1988", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T04:15:25.850", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:54:30.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.81", + "matchCriteriaId": "E1454775-F754-4C6E-B469-F86E71AECE72" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3084503/post-grid/tags/2.2.81/includes/blocks/accordion-nested-item/index.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e49da9e7-26a1-442b-b5d0-1da3bcf0e8c9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21727.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21727.json index a51078c0803..3a4066b3086 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21727.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21727.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21727", "sourceIdentifier": "security@joomla.org", "published": "2024-02-15T07:15:11.167", - "lastModified": "2024-02-15T14:28:31.380", + "lastModified": "2024-10-29T19:35:15.020", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad XSS en el componente Calendario DP para Joomla." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24199.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24199.json index 53edf737cf6..32be3aa492c 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24199.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24199.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24199", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.567", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:26:03.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Se descubri\u00f3 que el commit 54b4dc de smartdns conten\u00eda una direcci\u00f3n desalineada en smartdns/src/dns.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pymumu:smartdns:45:*:*:*:*:*:*:*", + "matchCriteriaId": "F7567279-7406-4D75-A9BA-4723E6C33110" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pymumu/smartdns/issues/1628", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25197.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25197.json index 55d5497f339..057863727a6 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25197.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25197.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25197", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-20T14:15:09.213", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-10-29T20:35:16.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que las versiones humildes de Open Robotics Robotic Operating Sytstem 2 (ROS2) y Nav2 conten\u00edan una desreferencia de puntero NULL a trav\u00e9s de la funci\u00f3n isCurrent() en /src/layered_costmap.cpp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/ros-planning/navigation2/issues/3940", diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25580.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25580.json index 46aad6d7b97..bae5844be3a 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25580.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25580.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25580", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:12.007", - "lastModified": "2024-03-27T12:29:30.307", + "lastModified": "2024-10-29T20:35:17.633", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en gui/util/qktxhandler.cpp en Qt antes de 5.15.17, 6.x antes de 6.2.12, 6.3.x hasta 6.5.x antes de 6.5.5 y 6.6.x antes de 6.6.2. Se puede producir un desbordamiento del b\u00fafer y un bloqueo de la aplicaci\u00f3n a trav\u00e9s de un archivo de imagen KTX manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://www.qt.io/blog/security-advisory-potential-buffer-overflow-when-reading-ktx-images", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25662.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25662.json index 8f6648d3b57..9b5d996472c 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25662.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25662.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25662", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:05:59.287", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-10-29T20:35:18.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Oxygen XML Web Author v26.0.0 y anteriores y Oxygen Content Fusion v6.1 y anteriores son vulnerables a Cross-Site Scripting (XSS) para URL maliciosas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.oxygenxml.com/security/advisory/SYNC-2024-020601.html", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30176.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30176.json index 3d6f691d3ee..e90f943e728 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30176.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30176.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30176", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:19.500", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-10-29T20:35:19.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Logpoint anterior a 7.4.0, un atacante puede enumerar una lista v\u00e1lida de nombres de usuario utilizando URL de widgets compartidos expuestas p\u00fablicamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://logpoint.com", diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35563.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35563.json index a734700f365..14ae81b851a 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35563.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35563.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35563", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T17:15:11.130", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-10-29T20:35:20.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que CDG-Server-V5.6.2.126.139 y anteriores contienen una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro permisoId en CDGTempPermissions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://cdg.com", diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35796.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35796.json index 6f522b66509..18921114f67 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35796.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35796.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35796", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:11.673", - "lastModified": "2024-06-25T22:15:30.627", + "lastModified": "2024-10-29T20:35:21.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net:ll_temac: platform_get_resource reemplazada por una funci\u00f3n incorrecta La funci\u00f3n platform_get_resource fue reemplazada por devm_platform_ioremap_resource_byname y se llama usando 0 como nombre. Esto eventualmente termina en platform_get_resource_byname en la pila de llamadas, donde genera un puntero null en strcmp. if (type == Resource_type(r) && !strcmp(r->name, name)) Deber\u00eda haber sido reemplazado por devm_platform_ioremap_resource." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/3a38a829c8bc27d78552c28e582eb1d885d07d11", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json index f3581f02636..7d626dd7a5a 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35809", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:14.730", - "lastModified": "2024-06-27T13:15:58.890", + "lastModified": "2024-10-29T20:35:21.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI/PM: drena las devoluciones de llamada inactivas en tiempo de ejecuci\u00f3n antes de eliminar el controlador. Una condici\u00f3n de ejecuci\u00f3n entre la devoluci\u00f3n de llamada .runtime_idle() y la devoluci\u00f3n de llamada .remove() en el controlador PCI rtsx_pcr conduce a un crash de kernel debido a un error de p\u00e1gina no controlado [1]. El problema es que no se espera que rtsx_pci_runtime_idle() se ejecute despu\u00e9s de llamar a pm_runtime_get_sync(), pero esto \u00faltimo realmente no garantiza eso. Solo garantiza que las devoluciones de llamada de suspensi\u00f3n y reanudaci\u00f3n no se ejecutar\u00e1n cuando regrese. Sin embargo, si ya se est\u00e1 ejecutando una devoluci\u00f3n de llamada .runtime_idle() cuando se llama a pm_runtime_get_sync(), este \u00faltimo notar\u00e1 que el estado de PM en tiempo de ejecuci\u00f3n del dispositivo es RPM_ACTIVE y regresar\u00e1 de inmediato sin esperar a que se complete el primero. De hecho, no puede esperar a que se complete .runtime_idle() porque puede ser llamado desde esa devoluci\u00f3n de llamada (podr\u00eda decirse que no tiene mucho sentido hacerlo, pero no est\u00e1 estrictamente prohibido). Por lo tanto, en general, quien proporciona una devoluci\u00f3n de llamada .runtime_idle() debe protegerla para que no se ejecute en paralelo con cualquier c\u00f3digo que se ejecute despu\u00e9s de pm_runtime_get_sync(). [Tenga en cuenta que .runtime_idle() no se iniciar\u00e1 despu\u00e9s de que pm_runtime_get_sync() haya regresado, pero puede continuar ejecut\u00e1ndose si comenz\u00f3 antes.] Una forma de abordar esa condici\u00f3n de ejecuci\u00f3n es llamar a pm_runtime_barrier() despu\u00e9s de pm_runtime_get_sync() (no antes porque es necesario un valor distinto de cero del contador de uso de PM en tiempo de ejecuci\u00f3n para evitar que se invoquen devoluciones de llamada de PM en tiempo de ejecuci\u00f3n) para esperar a que se complete la devoluci\u00f3n de llamada .runtime_idle() en caso de que se est\u00e9 ejecutando en ese punto. Un lugar adecuado para hacerlo es pci_device_remove() que llama a pm_runtime_get_sync() antes de eliminar el controlador, por lo que tambi\u00e9n puede llamar a pm_runtime_barrier() posteriormente, lo que evitar\u00e1 que se produzca la ejecuci\u00f3n en cuesti\u00f3n, no s\u00f3lo en el controlador rtsx_pcr, sino en cualquier controlador PCI que proporcione devoluciones de llamada .runtime_idle()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/47d8aafcfe313511a98f165a54d0adceb34e54b1", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35833.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35833.json index 41241c0303b..b9bc13c462d 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35833.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35833.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35833", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:19.930", - "lastModified": "2024-06-25T23:15:30.767", + "lastModified": "2024-10-29T20:35:21.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: fsl-qdma: corregida una p\u00e9rdida de memoria relacionada con el comando de cola DMA. Este dma_alloc_coherent() no se deshace ni en la funci\u00f3n de eliminaci\u00f3n ni en la ruta de manejo de errores de fsl_qdma_probe() . Cambie a la versi\u00f3n administrada para solucionar ambos problemas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/15eb996d7d13cb72a16389231945ada8f0fef2c3", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35859.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35859.json index dfc79963a9f..3397177dffb 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35859.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35859", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:23.530", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-10-29T20:35:21.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloquear: reparar la fuga de referencia del m\u00f3dulo de la ruta de error bdev_open_by_dev. En el momento en que se llama a bdev_may_open(), la referencia del m\u00f3dulo ya est\u00e1 tomada, por lo tanto, la referencia del m\u00f3dulo debe liberarse si bdev_may_open() fallo. Este problema se encuentra mediante la revisi\u00f3n del c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/0e9327c67410b129bf85e5c3a5aaea518328636f", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json index 71aab3cc92e..878d07e634c 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:10.723", - "lastModified": "2024-06-27T12:15:26.020", + "lastModified": "2024-10-29T20:35:21.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: corrige una posible ejecuci\u00f3n de datos en __nft_flowtable_type_get() nft_unregister_flowtable_type() dentro de nf_flow_inet_module_exit() puede coincidir con __nft_flowtable_type_get() dentro de nf_tables_newflowtable(). Y no hay ninguna protecci\u00f3n cuando se itera sobre la lista nf_tables_flowtables en __nft_flowtable_type_get(). Por lo tanto, existe una posible ejecuci\u00f3n de datos de la entrada de la lista nf_tables_flowtables. Utilice list_for_each_entry_rcu() para iterar sobre la lista nf_tables_flowtables en __nft_flowtable_type_get() y utilice rcu_read_lock() en el llamador nft_flowtable_type_get() para proteger todo el proceso de consulta de tipos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/24225011d81b471acc0e1e315b7d9905459a6304", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35903.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35903.json index 73232ae36b0..2669d53625e 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35903.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35903.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35903", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:11.117", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-10-29T20:35:22.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: x86/bpf: corrige la IP despu\u00e9s de emitir la contabilidad de profundidad de llamadas. Ajuste la IP pasada a `emit_patch` para que calcule el desplazamiento correcto para la instrucci\u00f3n CALL si `x86_call_ Depth_emit_accounting` emite c\u00f3digo. De lo contrario, nos saltaremos algunas instrucciones y lo m\u00e1s probable es que fallemos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json index ed996fa173e..b3726bb6ad9 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35910", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:11.617", - "lastModified": "2024-06-27T12:15:26.153", + "lastModified": "2024-10-29T20:35:22.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: termina correctamente los temporizadores para los sockets del kernel. Recibimos varios informes de syzbot sobre los temporizadores tcp que se activan despu\u00e9s de que se han desmantelado las redes correspondientes. Afortunadamente, Josef Bacik pudo provocar el problema con m\u00e1s frecuencia y pudo probar un parche que escrib\u00ed hace dos a\u00f1os. Cuando los sockets TCP est\u00e1n cerrados, llamamos a inet_csk_clear_xmit_timers() para \"detener\" los temporizadores. Se puede llamar a inet_csk_clear_xmit_timers() desde cualquier contexto, incluso cuando se mantiene el bloqueo del socket. Esta es la raz\u00f3n por la que usa sk_stop_timer(), tambi\u00e9n conocido como del_timer(). Esto significa que los cron\u00f3metros en curso podr\u00edan finalizar mucho m\u00e1s tarde. Para los sockets de usuario, esto est\u00e1 bien porque cada temporizador en ejecuci\u00f3n tiene una referencia en el socket, y el socket de usuario tiene una referencia en las redes. Para los sockets del kernel, corremos el riesgo de que la red se libere antes de que se complete el temporizador, porque los sockets del kernel no mantienen referencias en las redes. Este parche agrega la funci\u00f3n inet_csk_clear_xmit_timers_sync() que usa sk_stop_timer_sync() para garantizar que todos los temporizadores finalicen antes de que se libere el socket del kernel. Los m\u00f3dulos que utilizan sockets del kernel los cierran en su controlador netns exit(). Tambi\u00e9n agregue el asistente sock_not_owned_by_me() para obtener soporte LOCKDEP: no se debe llamar a inet_csk_clear_xmit_timers_sync() mientras se mantiene el bloqueo del socket. Es muy posible que podamos revertir en el futuro la confirmaci\u00f3n 3a58f13a881e (\"net: rds: adquirir refcount en sockets TCP\") que intent\u00f3 resolver el problema solo en rds. (net/smc/af_smc.c y net/mptcp/subflow.c tienen c\u00f3digo similar) Probablemente podamos eliminar las pruebas check_net() de tcp_out_of_resources() y __tcp_close() en el futuro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 4.7 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35913.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35913.json index 0d8b2d8be30..2c5a28a2b42 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35913.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35913.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35913", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:11.837", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-10-29T20:35:22.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: elige la versi\u00f3n de SESSION_PROTECTION_NOTIF Cuando queremos saber si debemos buscar el mac_id o el link_id en la estructura iwl_mvm_session_prot_notif, debemos mirar la versi\u00f3n de SESSION_PROTECTION_NOTIF . Esto provoca ADVERTENCIAS: ADVERTENCIA: CPU: 0 PID: 11403 en drivers/net/wireless/intel/iwlwifi/mvm/time-event.c:959 iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm] RIP:iwl_mvm_rx_session_protect_notif+0x 333/0x340 [ iwlmvm] C\u00f3digo: 00 49 c7 84 24 48 07 00 00 00 00 00 00 41 c6 84 24 78 07 00 00 ff 4c 89 f7 e8 e9 71 54 d9 e9 7d fd ff ff 0f 0b e9 23 fe ff ff <0f> 0b e9 1c fe ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffb4bb00003d40 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff9ae63a 361000 RCX: ffff9ae4a98b60d4 RDX: ffff9ae4588499c0 RSI: 0000000000000305 RDI: ffff9ae4a98b6358 RBP: ffffb4bb00003d68 R08 : 0000000000000003 R09: 0000000000000010 R10: ffffb4bb00003d00 R11: 000000000000000f R12: ffff9ae441399050 R13: ffff9ae4761329e8 R14: 000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff9ae7af400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 0000000080050033 CR2: 000055fb75680018 CR3: 00000003dae32006 CR4: 0000000000f70ef0 PKRU: 55555554 Seguimiento de llamadas: ? show_regs+0x69/0x80? __advertir+0x8d/0x150 ? iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm] ? report_bug+0x196/0x1c0? handle_bug+0x45/0x80? exc_invalid_op+0x1c/0xb0? asm_exc_invalid_op+0x1f/0x30? iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm] iwl_mvm_rx_common+0x115/0x340 [iwlmvm] iwl_mvm_rx_mq+0xa6/0x100 [iwlmvm] iwl_pcie_rx_handle+0x263/0xa10 wifi] iwl_pcie_napi_poll_msix+0x32/0xd0 [iwlwifi]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/222abd95f503e28c0404e596291fe472fe90929c", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35927.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35927.json index 4ca0d8a5e42..26e53e6b773 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35927.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35927.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35927", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:48.860", - "lastModified": "2024-06-16T13:15:52.210", + "lastModified": "2024-10-29T20:35:22.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm: Verifique el sondeo de salida inicializado antes de deshabilitarlo. En drm_kms_helper_poll_disable() verifique si el soporte de sondeo de salida est\u00e1 inicializado antes de deshabilitar el sondeo. Si no, marca esto como una advertencia. Adem\u00e1s, en las llamadas drm_mode_config_helper_suspend() y drm_mode_config_helper_resume(), que son los llamadores de estas funciones, evite invocarlas si el sondeo no est\u00e1 inicializado. Para controladores como hyperv-drm, que no inicializan el sondeo del conector, si se llama a suspender sin esta verificaci\u00f3n, se produce una falla de suspensi\u00f3n con la siguiente pila [770.719392] Congelando las tareas restantes que se pueden congelar... (transcurridos 0,001 segundos) realizadas. [770.720592] printk: Suspensi\u00f3n de consola(s) (use no_console_suspend para depurar) [770.948823] ------------[ cortar aqu\u00ed ]------------ [ 770.948824] ADVERTENCIA: CPU: 1 PID: 17197 en kernel/workqueue.c:3162 __flush_work.isra.0+0x212/0x230 [770.948831] M\u00f3dulos vinculados en: rfkill nft_counter xt_conntrack xt_owner udf nft_compat crc_itu_t nft_fib_inet v4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink vfat fat mlx5_ib ib_uverbs ib_core mlx5_core intel_rapl_msr intel_rapl_common kvm_amd ccp mlxfw kvm psample hyperv_drm tls drm_shmem_helper drm_kms _helper irqbypass pcspkr syscopyarea sysfillrect sysimgblt hv_balloon hv_utils joydev drm fuse xfs libcrc32c pci_hyperv pci_hyperv_intf sr_mod sd_mod cdrom t10_pi sg hv_storvsc scsi_transport_fc hv_netvsc serio_raw hyperv_keyboard hid_hyperv crct1 0dif_pclmul crc32_pclmul crc32c_intel hv_vmbus ghash_clmulni_intel dm_mirror dm_region_hash dm_log dm_mod [ 770.948863] CPU: 1 PID: 17197 Comm: systemd-sleep No contaminado 5.14.0-362.2.1.el9_3.x86_64 #1 [ 770.9488 65] Nombre del hardware: M\u00e1quina virtual/M\u00e1quina virtual de Microsoft Corporation, BIOS Hyper-V UEFI Versi\u00f3n v4.1 09/05/2022 [ 770.948866] RIP: 0010:__flush_work.isra.0+0x212/0x230 [ 770.948869] C\u00f3digo: 8b 4d 00 4c 8b 45 08 89 ca 48 c1 e9 04 83 e2 08 83 e1 0f 83 ca 02 89 c8 48 0f ba 6d 00 03 e9 25 ff ff ff 0f 0b e9 4e ff ff ff <0f> 0b 45 31 ed e9 44 ff ff ff e8 8f 89 b2 00 66 66 2e 0f 1f 4 00 [ 770.948870] RSP: 0018:ffffaf4ac213fb10 EFLAGS: 00010246 [ 770.948871] RAX: 00000000000000000 RBX: 0000000000000000 RCX: ffffffff8c992857 [ 770.948872] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff9aad82b00330 [ 770.948873] RBP: ffff9aad82b00330 R08: 0000000000000000 R09: ffff9aad87ee3d10 [ 770.948874 ] R10: 0000000000000200 R11: 00000000000000000 R12: ffff9aad82b00330 [ 770.948874] R13: 00000000000000001 R14: 0000000000000000 R15: 000000000000001 [ 770.948875] FS: 00007ff1b2f6bb40(0000) GS:ffff9aaf37d00000(0000) knlGS:00000000000000000 [ 770.948878] CS: 0010 DS: 0000 : 0000 CR0: 0000000080050033 [ 770.948878] CR2: 0000555f345cb666 CR3: 00000001462dc005 CR4: 0000000000370ee0 [ 770.948879] Seguimiento de llamadas: [ 770.9488 80] [770.948881] ? show_trace_log_lvl+0x1c4/0x2df [770.948884]? show_trace_log_lvl+0x1c4/0x2df [770.948886]? __cancel_work_timer+0x103/0x190 [770.948887]? __flush_work.isra.0+0x212/0x230 [770.948889]? __advertir+0x81/0x110 [ 770.948891] ? __flush_work.isra.0+0x212/0x230 [770.948892]? report_bug+0x10a/0x140 [770.948895]? handle_bug+0x3c/0x70 [770.948898]? exc_invalid_op+0x14/0x70 [770.948899]? asm_exc_invalid_op+0x16/0x20 [770.948903]? __flush_work.isra.0+0x212/0x230 [ 770.948905] __cancel_work_timer+0x103/0x190 [ 770.948907] ? _raw_spin_unlock_irqrestore+0xa/0x30 [ 770.948910] drm_kms_helper_poll_disable+0x1e/0x40 [drm_kms_helper] [ 770.948923] drm_mode_config_helper_suspend+0x1c/0x80 [drm_kms_helper] [ 770.94 8933] ? __pfx_vmbus_suspend+0x10/0x10 [hv_vmbus] [ 770.948942] hyperv_vmbus_suspend+0x17/0x40 [hyperv_drm] [ 770.948944] ? __pfx_vmbus_suspend+0x10/0x10 [hv_vmbus] [ 770.948951] dpm_run_callback+0x4c/0x140 [ 770.948954] __device_suspend_noir ---truncated---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/18451798f4a4e7418b9fad7e7dd313fe84b1f545", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json index 208907b54bd..ec3c9bd528e 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.077", - "lastModified": "2024-06-27T12:15:26.977", + "lastModified": "2024-10-29T20:35:23.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: geneve: corrige la validaci\u00f3n del encabezado en geneve[6]_xmit_skb syzbot puede activar un valor uninit en geneve_xmit() [1] Problema: mientras que la mayor\u00eda de los asistentes de t\u00fanel IP (como ip_tunnel_get_dsfield( )) usa skb_protocol(skb, true), pskb_inet_may_pull() solo usa skb->protocol. Si se encuentra algo m\u00e1s que ETH_P_IPV6 o ETH_P_IP en skb->protocol, pskb_inet_may_pull() no hace nada en absoluto. Si la persona que llama proporcion\u00f3 una etiqueta vlan (af_packet en el caso de syzbot), es posible que el encabezado de la red no apunte a la ubicaci\u00f3n correcta y que la parte lineal de skb sea m\u00e1s peque\u00f1a de lo esperado. Agregue skb_vlan_inet_prepare() para realizar una validaci\u00f3n completa de Mac. Utilice esto en Ginebra por el momento. Sospecho que debemos adoptarlo de manera m\u00e1s amplia. v4: Jakub inform\u00f3 que v3 rompi\u00f3 la autoprueba de l2_tos_ttl_inherit.sh: solo llame a __vlan_get_protocol() para tipos de VLAN. v2,v3: se abordaron los comentarios de Sabrina sobre v1 y v2 [1] ERROR: KMSAN: valor uninit en geneve_xmit_skb drivers/net/geneve.c:910 [en l\u00ednea] ERROR: KMSAN: valor uninit en geneve_xmit+0x302d/0x5420 drivers/ net/geneve.c:1030 geneve_xmit_skb drivers/net/geneve.c:910 [en l\u00ednea] geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030 __netdev_start_xmit include/linux/netdevice.h:4903 [en l\u00ednea] netdev_start_xmit include/ linux/netdevice.h:4917 [en l\u00ednea] xmit_one net/core/dev.c:3531 [en l\u00ednea] dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547 __dev_queue_xmit+0x348d/0x52c0 net/core/dev.c: 4335 dev_queue_xmit include/linux/netdevice.h:3091 [en l\u00ednea] paquete_xmit+0x9c/0x6c0 net/packet/af_packet.c:276 paquete_snd net/packet/af_packet.c:3081 [en l\u00ednea] packet_sendmsg+0x8bb0/0x9ef0 net/packet/ af_packet.c:3113 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x30f/0x380 net/socket.c:745 __sys_sendto+0x685/0x830 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [en l\u00ednea ] __se_sys_sendto net/socket.c:2199 [en l\u00ednea] __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199 do_syscall_64+0xd5/0x1f0 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 Uninit se cre\u00f3 en slab_post_alloc _hook mm/slub.c:3804 [en l\u00ednea] slab_alloc_node mm/slub.c:3845 [en l\u00ednea] kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577 __alloc_skb+0x35b/0x7a0 net/core/skbuff.c: 668 alloc_skb include/linux/skbuff.h:1318 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504 sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795 paquete_alloc_skb net/packet/af_packet.c :2930 [en l\u00ednea] paquete_snd net/packet/af_packet.c:3024 [en l\u00ednea] paquete_sendmsg+0x722d/0x9ef0 net/packet/af_packet.c:3113 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x30f/0x380 net/ Socket.c: 745 __sys_sendto+0x685/0x830 net/Socket.c: 2191 __do_sys_sendto net/Socket.c: 2203 [en l\u00ednea] __se_sys_sendto net/Socket.c: 2199 [Inline] __X64_SYS_SENDTO+0x125/0x1d0 net/Socket/Socket. 2199 do_syscall_64+0xd5/0x1f0 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 CPU: 0 PID: 5033 Comm: syz-executor346 No contaminado 6.9.0-rc1-syzkaller-00005-g928a87efa423 #0 Nombre de hardware: Google Google Compute Engine/Google Motor de c\u00f3mputo, BIOS Google 29/02/2024" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/10204df9beda4978bd1d0c2db0d8375bfb03b915", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json index bdb06b6b525..8f2d6db37b9 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35986", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.990", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-10-29T20:35:23.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: phy: ti: tusb1210: resolver el bloqueo del cargador-det si el cargador psy no est\u00e1 registrado. El marco power_supply no est\u00e1 realmente manipulado para que haya referencias duraderas en el kernel a los dispositivos power_supply. Espec\u00edficamente, cancelar el registro de un power_supply mientras alg\u00fan otro c\u00f3digo tiene una referencia a \u00e9l activa una ADVERTENCIA en power_supply_unregister(): WARN_ON(atomic_dec_return(&psy->use_cnt)); Seguido por power_supply a\u00fan se elimina y los datos de respaldo se liberan de todos modos, dejando el c\u00f3digo de detecci\u00f3n del cargador tusb1210 con una referencia colgante, lo que resulta en un bloqueo la pr\u00f3xima vez que se llama a tusb1210_get_online(). Solucione este problema manteniendo \u00fanicamente la referencia en tusb1210_get_online() liber\u00e1ndola al final de la funci\u00f3n. Tenga en cuenta que esto a\u00fan deja una ventana de ejecuci\u00f3n te\u00f3rica, pero evita el problema al modificar manualmente el controlador del chip del cargador durante el desarrollo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/25b3498485ac281e5851700e33b97f12c9533fd8", diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json index 520ba1f78d1..da293f120d2 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35999", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:14.100", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-10-29T20:35:23.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: smb3: falta el bloqueo al seleccionar el canal. Coverity detect\u00f3 un lugar donde deber\u00edamos haber mantenido el bloqueo del canal al acceder al \u00edndice del canal ses. Direcciones-Cobertura: 1582039 (\"Condici\u00f3n de ejecuci\u00f3n de datos (MISSING_LOCK)\")" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40617.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40617.json index effc6c78b6d..56c2bd4a490 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40617.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40617.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40617", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-17T09:15:03.163", - "lastModified": "2024-09-10T13:45:37.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:23.730", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40799.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40799.json index 3782052eb7a..e5d4ce89824 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40799.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40799.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40799", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:12.667", - "lastModified": "2024-08-23T15:08:08.647", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:24.660", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json index 24247743c51..f91e7a280d5 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40853", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.810", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-29T20:35:25.610", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. Un atacante podr\u00eda usar Siri para habilitar la funci\u00f3n de respuesta autom\u00e1tica a llamadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121250", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json index b59f76b8f14..518f63b1da0 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40867", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.937", - "lastModified": "2024-10-29T17:41:59.300", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:26.040", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json index 4ffba4eccdf..00292f6475a 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44145.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44145", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:02.820", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:26.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Sequoia 15, iOS 18 y iPadOS 18. Un atacante con acceso f\u00edsico a un dispositivo macOS con Sidecar habilitado podr\u00eda ser capaz de eludir la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json index 5ad44baa46c..482ce268cb2 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44208.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44208", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.043", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:47:09.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda omitir ciertas preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json index 14ef9ef4f24..b487ce86e90 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44216.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44216", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:02.893", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:26.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales en el entorno aislado. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json index b3a915e6b71..955bd6370c4 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44217.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44217", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:02.960", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:27.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se solucion\u00f3 un problema de permisos eliminando el c\u00f3digo vulnerable y agregando comprobaciones adicionales. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18. El autocompletado de contrase\u00f1as puede completar las contrase\u00f1as despu\u00e9s de una autenticaci\u00f3n fallida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121250", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json index 32e3feb4c18..f2f46b50fd2 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44218", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.237", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:27.533", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, macOS Sonoma 14.7.1, iOS 18.1 y iPadOS 18.1. El procesamiento de un archivo manipulado con fines malintencionados puede provocar da\u00f1os en el mont\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json index 87e6ede27f8..601ff735f7a 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44222", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.297", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:35:15.710", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json index fef5e05e5e2..6c8c0908230 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44228.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44228", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.357", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:42:04.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "Este problema se solucion\u00f3 mejorando la verificaci\u00f3n de permisos. Este problema se solucion\u00f3 en Xcode 16. Una aplicaci\u00f3n puede heredar permisos de Xcode y acceder a datos de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0", + "matchCriteriaId": "6894DFF1-7930-4DF7-88CF-EB6C7E36336F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121239", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json index 81758530a44..330e29f8ee4 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44229", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.417", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:38:30.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,88 @@ "value": "Se solucion\u00f3 una fuga de informaci\u00f3n con una validaci\u00f3n adicional. Este problema se solucion\u00f3 en visionOS 2.1, iOS 18.1 y iPadOS 18.1. La navegaci\u00f3n privada puede filtrar parte del historial de navegaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json index f26cdcb901a..4b6205948cb 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44235.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44235", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.470", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:32:46.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,74 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json index 2727b9b3bdb..129a420bdec 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44240.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44240", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.107", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:28.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de una fuente manipulada con fines malintencionados puede provocar la divulgaci\u00f3n de la memoria del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121563", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json index 469cd08a2b0..d33c5970103 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44256.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44256", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.177", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:29.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con una mejora en la desinfecci\u00f3n de entradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda salir de su zona protegida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json index 1fe000f3a4a..886f81f66ec 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44257.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44257", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T22:15:03.243", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:29.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json index ced37a6c2b8..32f09ed31e1 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44259", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.160", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:30.023", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, visionOS 2.1, iOS 18.1 y iPadOS 18.1. Un atacante podr\u00eda hacer un uso indebido de una relaci\u00f3n de confianza para descargar contenido malicioso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121563", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json index 78854e84f38..86381e73905 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44263.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44263", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.333", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:35:30.263", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema l\u00f3gico con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json index 42e9c11385a..9b9181a4d94 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44275.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44275", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.877", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:35:17.777", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json index 91e7ddda459..89f81ff69d6 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44289", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.680", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:25:47.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,81 @@ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json index 74df359245c..1ec02cccc67 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44294.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44294", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.757", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:24:24.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,81 @@ "value": "Se solucion\u00f3 una vulnerabilidad de eliminaci\u00f3n de rutas al evitar que el c\u00f3digo vulnerable se ejecutara con privilegios. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un atacante con privilegios de superusuario podr\u00eda eliminar archivos de sistema protegidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json index 703bd9436fc..84203840858 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44297", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.910", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:23:37.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,160 @@ "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de un mensaje manipulado con fines malintencionados puede provocar una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "D3097D2F-1E4A-4C22-A811-AB177A90B089" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "E24E24AB-36B7-4843-A897-1C1246E8716B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json index 7653cde424b..9285edaa1b3 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47170.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47170", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-26T18:15:10.370", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:59:57.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:agnai:agnai:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.330", + "matchCriteriaId": "018F1D62-64B1-4A69-BC8B-37565BF64656" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/agnaistic/agnai/security/advisories/GHSA-h355-hm5h-cm8h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json index 0b1635c07a4..200a591aeb5 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48074.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48074", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T12:15:15.200", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:18.963", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authorized RCE vulnerability exists in the DrayTek Vigor2960 router version 1.4.4, where an attacker can place a malicious command into the table parameter of the doPPPoE function in the cgi-bin/mainfunction.cgi route, and finally the command is executed by the system function." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad RCE autorizada en el enrutador DrayTek Vigor2960 versi\u00f3n 1.4.4, donde un atacante puede colocar un comando malicioso en el par\u00e1metro de tabla de la funci\u00f3n doPPPoE en la ruta cgi-bin/mainfunction.cgi y, finalmente, el comando es ejecutado por la funci\u00f3n del sistema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Giles-one/Vigor2960Crack", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48120.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48120.json index 4f9ec54f843..f6f16c40c0f 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48120.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48120", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T14:15:11.780", - "lastModified": "2024-10-15T16:35:09.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:57:53.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x2engine:x2crm:8.5:*:*:*:*:*:*:*", + "matchCriteriaId": "7D3A8BCC-7431-4545-8B68-38979A8B0C1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://okankurtulus.com.tr/2024/09/12/x2crm-v8-5-stored-cross-site-scripting-xss-authenticated/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48234.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48234.json index 6e9238e9144..9e422b6cc49 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48234.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48234.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48234", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T22:15:02.453", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:19.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en mipjz 5.0.5. En el m\u00e9todo push de app\\tag\\controller\\ApiAdminTag.php, el valor del par\u00e1metro postAddress no se procesa y se pasa directamente a la ejecuci\u00f3n y salida de curl_exec, lo que genera una vulnerabilidad de Server-side request forgery (SSRF) que puede leer archivos del servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/sansanyun/mipjz/issues/18", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48235.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48235.json index 2fcfcce7247..c07931308ea 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48235.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48235.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48235", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T22:15:02.530", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:20.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en ofcms 1.1.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo de guardado del archivo TemplateController.java." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gitee.com/oufu/ofcms/issues/IASIES", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48236.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48236.json index 6bae45e0134..702c40bed70 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48236.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48236.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48236", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T22:15:02.590", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:21.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en ofcms 1.1.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n FileOutputStream en el m\u00e9todo de escritura String del archivo ofcms-admin\\src\\main\\java\\com\\ofsoft\\cms\\core\\uitle\\FileUtils.java" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gitee.com/oufu/ofcms/issues/IASIBT", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48238.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48238.json index 48d07fe934f..d55e28f2339 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48238.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48238.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48238", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T22:15:02.713", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:22.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "WTCMS 1.0 es vulnerable a la inyecci\u00f3n SQL en el m\u00e9todo edit_post de /Admin\\Controller\\NavControl.class.php a trav\u00e9s del par\u00e1metro parentid." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/taosir/wtcms/issues/14", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48239.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48239.json index f1cd85ef3ea..8686fcf584c 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48239.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48239.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48239", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T22:15:02.770", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:22.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en WTCMS 1.0. En el m\u00e9todo plupload en \\AssetController.class.php, los par\u00e1metros de la aplicaci\u00f3n no se procesan, lo que genera un ataque de Cross Site Scripting (XSS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/taosir/wtcms/issues/16", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json index 7a280e0c992..58c7340b941 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48343", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T18:15:04.250", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:23.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en ESAFENET CDG 5 y versiones anteriores permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro id de la p\u00e1gina dataSearch.jsp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/d038084d-6370-4bcb-a268-6cca9e0f6615?code=G8A6P3", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48426.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48426.json index 9ab90c77927..8435278e535 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48426.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48426.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48426", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T21:15:14.387", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-29T20:35:31.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se detect\u00f3 una falla de segmentaci\u00f3n (SEGV) en la funci\u00f3n SortByPTypeProcess::Execute de la librer\u00eda Assimp durante una prueba de fuzz con AddressSanitizer. El bloqueo se produjo debido a un acceso de lectura a una direcci\u00f3n de memoria no v\u00e1lida (0x1000c9714971)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/assimp/assimp/issues/5789", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48459.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48459.json index 40a3a491f5e..ada9b79312f 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48459.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48459.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48459", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:04.703", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T20:35:32.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comandos the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. Un atacante puede aprovechar esta vulnerabilidad mediante la construcci\u00f3n de un payload malicioso para ejecutar comandos y obtener acceso de shell al sistema de archivos del enrutador con los privilegios m\u00e1s altos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Swind1er/da24125da98f6616a50a35a3e60141f4", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48655.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48655.json index 875d704c80c..6eb5fdd2d60 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48655.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48655.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48655", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:04.817", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T20:35:33.500", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Total.js CMS v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo func.js." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/totaljs/cms/issues/49", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json index 5fd3fd94422..d647fdcae0c 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48700", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T18:15:04.407", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:24.643", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Kliqqi-CMS tiene una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario en segundo plano que los atacantes pueden explotar para implantar puertas traseras o getShell a trav\u00e9s del componente edit_page.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/ChangeYourWay/post/blob/main/CVE-2024-48700", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48743.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48743.json index 4484fd2cf7c..f001145ca23 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48743.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48743.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48743", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:04.873", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-29T19:35:25.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en Sentry v.6.0.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro z." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/rvismit/538232c3f258e468195febb69f3f2d3b", diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json index 8402cbc231c..af31a0f422d 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48825.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48825", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.173", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-29T19:35:26.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda AC7 v.15.03.06.44 ate_ifconfig_set tiene inyecci\u00f3n de comando de pre-autenticaci\u00f3n que permite a atacantes remotos ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/ixout/iotVuls/blob/main/Tenda/ac7_005/report.md", diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json index 5bb4c66e4d1..0b04eb34b74 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48826.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48826", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.237", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-29T19:35:27.303", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tenda AC7 v.15.03.06.44 ate_iwpriv_set tiene inyecci\u00f3n de comando de pre-autenticaci\u00f3n que permite a atacantes remotos ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/ixout/iotVuls/blob/main/Tenda/ac7_006/report.md", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4887.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4887.json index b57d96cb077..08c66e33f3f 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4887.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4887", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T04:15:31.777", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:52:44.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qodeinteractive:qi_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7.3", + "matchCriteriaId": "CA39CCD1-8E85-47C9-A718-80DBDBC1C9BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3096634/qi-addons-for-elementor/trunk/inc/admin/helpers/helper.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284daad9-d31e-4d29-ac15-ba293ba9640d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51075.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51075.json index fff2bf56fe9..81af2e5d45f 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51075.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51075.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51075", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T14:15:08.080", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:35.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /odms/admin/user-search.php in PHPGurukul Online DJ Booking Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Online%20DJ%20Booking/DJ%20online%20Cross%20Site%20Scripting%20%20u.pdf", diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51076.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51076.json index ef714cff84c..4f61e3fc2e5 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51076.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51076.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51076", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T14:15:08.183", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:35.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /odms/admin/booking-search.php in PHPGurukul Online DJ Booking Management System 1.0, which allows remote attackers to execute arbitrary code via the \"searchdata\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Online%20DJ%20Booking/Reflected%20Cross%20Site%20Scripting%20b.pdf", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51180.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51180.json index 363f592c5be..1cfaa159487 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51180.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51180.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51180", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T13:15:07.190", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:36.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifscfinder/index.php in PHPGurukul IFSC Code Finder Project v1.0, which allows remote attackers to execute arbitrary code via the \"searchifsccode\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/IFSC%20Code%20Finder/IFSC%20Code%20Finder%20do.pdf", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51181.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51181.json index 37c10ba462a..ba50dbc615f 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51181.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51181.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51181", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T13:15:07.297", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T20:35:37.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifscfinder/admin/profile.php in PHPGurukul IFSC Code Finder Project v1.0, which allows remote attackers to execute arbitrary code via \" searchifsccode\" parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/IFSC%20Code%20Finder/IFSC%20Code%20Finder%20Admin.pdf", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json index d3bc1d815e0..e2ffbd6306b 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51506.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51506", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.667", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T19:35:28.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado \"Crear una p\u00e1gina Wiki\" en la descripci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/8", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json index 1dd4774e700..58ed519faf6 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51507.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51507", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.753", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T19:35:29.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado \"Crear/Editar Wiki Externo\" en el Nombre." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/9", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json index 0cd1e20a437..b4d01370682 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51508.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51508", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.837", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T19:35:30.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado \"Crear/Editar Wiki Externo\" en el \u00cdndice." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/9", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json index ae5ef050d79..365afda6e5c 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51509.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51509", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T23:15:02.907", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T19:35:31.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Tiki hasta la versi\u00f3n 27.0 permite a los usuarios que tienen ciertos permisos insertar un payload XSS almacenado en \"M\u00f3dulos\" (tambi\u00e9n conocido como tiki-admin_modules.php) en el Nombre." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/r0ck3t1973/xss_payload/issues/10", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5425.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5425.json index 58232f7c270..7bc677723a6 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5425.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5425", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T04:15:32.597", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T19:49:44.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,26 +59,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lightpress:lightbox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.5", + "matchCriteriaId": "F4D2E969-99FD-47C4-86C5-734EA929BFB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lokesh/lightbox2/blob/dev/src/js/lightbox.js#L57", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-jquery-lightbox/trunk/jquery.lightbox.js", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097604/#file8", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-jquery-lightbox/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3439710-1159-4677-93c9-14bacfbf0b55?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5607.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5607.json index d6b30487883..873394066c4 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5607.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5607.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5607", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T03:15:09.630", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T20:08:50.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:gdpr_ccpa_compliance_\\&_cookie_consent_banner:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "893C0226-7DF7-4A8E-84E9-3BAA7E808655" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3097680%40ninja-gdpr-compliance&new=3097680%40ninja-gdpr-compliance&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b8f870a6-26a5-4f98-9bd6-12736c561265?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json index 429022ad4e7..d51f099ff4b 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6150.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6150", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:10.920", - "lastModified": "2024-07-11T13:05:54.930", + "lastModified": "2024-10-29T19:35:32.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://support.citrix.com/article/CTX678025", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json index 0a2e71eb886..0bc820dc6ff 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6600", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.273", - "lastModified": "2024-07-16T18:15:08.737", + "lastModified": "2024-10-29T20:35:38.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Debido a que las grandes comprobaciones de asignaci\u00f3n en Angle para los sombreadores GLSL son demasiado indulgentes, podr\u00eda ocurrir un acceso fuera de los l\u00edmites al asignar m\u00e1s de 8192 entradas en la memoria privada del sombreador en Mac OS. Esta vulnerabilidad afecta a Firefox < 128 y Firefox ESR < 115.13." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888340", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json index 209b3d816ed..da5396ad172 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6614", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.237", - "lastModified": "2024-07-16T18:15:09.813", + "lastModified": "2024-10-29T20:35:39.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El iterador de frames podr\u00eda quedarse atascado en un bucle cuando encuentre ciertos frames wasm que conduzcan a seguimientos de pila incorrectos. Esta vulnerabilidad afecta a Firefox < 128." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902983", diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6760.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6760.json index 8c30b70d715..17392dcb837 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6760.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6760.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6760", "sourceIdentifier": "secteam@freebsd.org", "published": "2024-08-12T13:38:40.447", - "lastModified": "2024-08-13T15:08:51.977", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:40.280", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7004.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7004.json index 47d447b421d..b9b7e06bda2 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7004.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7004", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-06T16:15:50.760", - "lastModified": "2024-08-07T21:32:44.190", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:41.127", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7208.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7208.json index d6abd4585f0..e07c54e5654 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7208.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7208.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7208", "sourceIdentifier": "cret@cert.org", "published": "2024-07-30T17:15:14.360", - "lastModified": "2024-08-02T15:16:37.420", + "lastModified": "2024-10-29T19:35:33.770", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Los servicios alojados no verifican el remitente de un correo electr\u00f3nico con usuarios autenticados, lo que permite a un atacante falsificar la identidad de la direcci\u00f3n de correo electr\u00f3nico de otro usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://kb.cert.org/vuls/id/244112", diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json index 98b52c741f7..4bccfb36075 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7255", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-01T18:15:26.723", - "lastModified": "2024-08-16T15:23:19.167", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:42.023", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7518.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7518.json index e57958f72b8..54dab058da8 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7518.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7518.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7518", "sourceIdentifier": "security@mozilla.org", "published": "2024-08-06T13:15:56.970", - "lastModified": "2024-08-19T17:52:53.887", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:43.097", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7978.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7978.json index 7dc0d801072..7d207f5c82f 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7978.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7978", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.697", - "lastModified": "2024-08-22T17:38:11.200", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T20:35:44.730", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/README.md b/README.md index 2284dc9594f..943cebcd99f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-29T19:00:19.928735+00:00 +2024-10-29T21:00:19.713996+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-29T18:45:47.057000+00:00 +2024-10-29T20:59:57.227000+00:00 ``` ### Last Data Feed Release @@ -38,48 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `0` -- [CVE-2019-25219](CVE-2019/CVE-2019-252xx/CVE-2019-25219.json) (`2024-10-29T17:15:03.567`) -- [CVE-2024-10491](CVE-2024/CVE-2024-104xx/CVE-2024-10491.json) (`2024-10-29T17:15:03.853`) -- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-29T18:15:05.690`) -- [CVE-2024-50459](CVE-2024/CVE-2024-504xx/CVE-2024-50459.json) (`2024-10-29T17:15:04.423`) -- [CVE-2024-50466](CVE-2024/CVE-2024-504xx/CVE-2024-50466.json) (`2024-10-29T17:15:04.640`) -- [CVE-2024-8924](CVE-2024/CVE-2024-89xx/CVE-2024-8924.json) (`2024-10-29T17:15:04.983`) -- [CVE-2024-9988](CVE-2024/CVE-2024-99xx/CVE-2024-9988.json) (`2024-10-29T17:15:05.227`) -- [CVE-2024-9989](CVE-2024/CVE-2024-99xx/CVE-2024-9989.json) (`2024-10-29T17:15:05.463`) -- [CVE-2024-9990](CVE-2024/CVE-2024-99xx/CVE-2024-9990.json) (`2024-10-29T17:15:05.707`) ### CVEs modified in the last Commit -Recently modified CVEs: `57` +Recently modified CVEs: `132` -- [CVE-2024-44144](CVE-2024/CVE-2024-441xx/CVE-2024-44144.json) (`2024-10-29T17:34:55.923`) -- [CVE-2024-44155](CVE-2024/CVE-2024-441xx/CVE-2024-44155.json) (`2024-10-29T17:34:16.487`) -- [CVE-2024-44156](CVE-2024/CVE-2024-441xx/CVE-2024-44156.json) (`2024-10-29T17:33:51.597`) -- [CVE-2024-44159](CVE-2024/CVE-2024-441xx/CVE-2024-44159.json) (`2024-10-29T17:33:37.147`) -- [CVE-2024-44174](CVE-2024/CVE-2024-441xx/CVE-2024-44174.json) (`2024-10-29T17:33:16.540`) -- [CVE-2024-48218](CVE-2024/CVE-2024-482xx/CVE-2024-48218.json) (`2024-10-29T18:35:08.783`) -- [CVE-2024-48222](CVE-2024/CVE-2024-482xx/CVE-2024-48222.json) (`2024-10-29T18:35:10.053`) -- [CVE-2024-48223](CVE-2024/CVE-2024-482xx/CVE-2024-48223.json) (`2024-10-29T18:35:11.373`) -- [CVE-2024-48224](CVE-2024/CVE-2024-482xx/CVE-2024-48224.json) (`2024-10-29T18:35:12.697`) -- [CVE-2024-4902](CVE-2024/CVE-2024-49xx/CVE-2024-4902.json) (`2024-10-29T18:07:23.897`) -- [CVE-2024-49978](CVE-2024/CVE-2024-499xx/CVE-2024-49978.json) (`2024-10-29T18:01:43.080`) -- [CVE-2024-49979](CVE-2024/CVE-2024-499xx/CVE-2024-49979.json) (`2024-10-29T18:02:14.197`) -- [CVE-2024-49999](CVE-2024/CVE-2024-499xx/CVE-2024-49999.json) (`2024-10-29T18:03:40.857`) -- [CVE-2024-50573](CVE-2024/CVE-2024-505xx/CVE-2024-50573.json) (`2024-10-29T17:12:14.760`) -- [CVE-2024-50574](CVE-2024/CVE-2024-505xx/CVE-2024-50574.json) (`2024-10-29T17:16:11.277`) -- [CVE-2024-50575](CVE-2024/CVE-2024-505xx/CVE-2024-50575.json) (`2024-10-29T17:18:26.957`) -- [CVE-2024-50576](CVE-2024/CVE-2024-505xx/CVE-2024-50576.json) (`2024-10-29T17:18:08.373`) -- [CVE-2024-50577](CVE-2024/CVE-2024-505xx/CVE-2024-50577.json) (`2024-10-29T17:18:02.127`) -- [CVE-2024-50578](CVE-2024/CVE-2024-505xx/CVE-2024-50578.json) (`2024-10-29T17:17:53.960`) -- [CVE-2024-50579](CVE-2024/CVE-2024-505xx/CVE-2024-50579.json) (`2024-10-29T17:17:46.297`) -- [CVE-2024-50580](CVE-2024/CVE-2024-505xx/CVE-2024-50580.json) (`2024-10-29T17:17:29.440`) -- [CVE-2024-50581](CVE-2024/CVE-2024-505xx/CVE-2024-50581.json) (`2024-10-29T17:17:20.747`) -- [CVE-2024-50582](CVE-2024/CVE-2024-505xx/CVE-2024-50582.json) (`2024-10-29T17:16:46.007`) -- [CVE-2024-5612](CVE-2024/CVE-2024-56xx/CVE-2024-5612.json) (`2024-10-29T18:05:42.823`) -- [CVE-2024-8923](CVE-2024/CVE-2024-89xx/CVE-2024-8923.json) (`2024-10-29T17:15:04.870`) +- [CVE-2024-48655](CVE-2024/CVE-2024-486xx/CVE-2024-48655.json) (`2024-10-29T20:35:33.500`) +- [CVE-2024-48700](CVE-2024/CVE-2024-487xx/CVE-2024-48700.json) (`2024-10-29T19:35:24.643`) +- [CVE-2024-48743](CVE-2024/CVE-2024-487xx/CVE-2024-48743.json) (`2024-10-29T19:35:25.777`) +- [CVE-2024-48825](CVE-2024/CVE-2024-488xx/CVE-2024-48825.json) (`2024-10-29T19:35:26.547`) +- [CVE-2024-48826](CVE-2024/CVE-2024-488xx/CVE-2024-48826.json) (`2024-10-29T19:35:27.303`) +- [CVE-2024-4887](CVE-2024/CVE-2024-48xx/CVE-2024-4887.json) (`2024-10-29T19:52:44.863`) +- [CVE-2024-51075](CVE-2024/CVE-2024-510xx/CVE-2024-51075.json) (`2024-10-29T20:35:35.130`) +- [CVE-2024-51076](CVE-2024/CVE-2024-510xx/CVE-2024-51076.json) (`2024-10-29T20:35:35.890`) +- [CVE-2024-51180](CVE-2024/CVE-2024-511xx/CVE-2024-51180.json) (`2024-10-29T20:35:36.680`) +- [CVE-2024-51181](CVE-2024/CVE-2024-511xx/CVE-2024-51181.json) (`2024-10-29T20:35:37.490`) +- [CVE-2024-51506](CVE-2024/CVE-2024-515xx/CVE-2024-51506.json) (`2024-10-29T19:35:28.723`) +- [CVE-2024-51507](CVE-2024/CVE-2024-515xx/CVE-2024-51507.json) (`2024-10-29T19:35:29.513`) +- [CVE-2024-51508](CVE-2024/CVE-2024-515xx/CVE-2024-51508.json) (`2024-10-29T19:35:30.513`) +- [CVE-2024-51509](CVE-2024/CVE-2024-515xx/CVE-2024-51509.json) (`2024-10-29T19:35:31.290`) +- [CVE-2024-5425](CVE-2024/CVE-2024-54xx/CVE-2024-5425.json) (`2024-10-29T19:49:44.357`) +- [CVE-2024-5607](CVE-2024/CVE-2024-56xx/CVE-2024-5607.json) (`2024-10-29T20:08:50.497`) +- [CVE-2024-6150](CVE-2024/CVE-2024-61xx/CVE-2024-6150.json) (`2024-10-29T19:35:32.787`) +- [CVE-2024-6600](CVE-2024/CVE-2024-66xx/CVE-2024-6600.json) (`2024-10-29T20:35:38.603`) +- [CVE-2024-6614](CVE-2024/CVE-2024-66xx/CVE-2024-6614.json) (`2024-10-29T20:35:39.450`) +- [CVE-2024-6760](CVE-2024/CVE-2024-67xx/CVE-2024-6760.json) (`2024-10-29T20:35:40.280`) +- [CVE-2024-7004](CVE-2024/CVE-2024-70xx/CVE-2024-7004.json) (`2024-10-29T20:35:41.127`) +- [CVE-2024-7208](CVE-2024/CVE-2024-72xx/CVE-2024-7208.json) (`2024-10-29T19:35:33.770`) +- [CVE-2024-7255](CVE-2024/CVE-2024-72xx/CVE-2024-7255.json) (`2024-10-29T20:35:42.023`) +- [CVE-2024-7518](CVE-2024/CVE-2024-75xx/CVE-2024-7518.json) (`2024-10-29T20:35:43.097`) +- [CVE-2024-7978](CVE-2024/CVE-2024-79xx/CVE-2024-7978.json) (`2024-10-29T20:35:44.730`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d9f100a1e3b..3c2ede5c509 100644 --- a/_state.csv +++ b/_state.csv @@ -138411,7 +138411,7 @@ CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000 CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000 CVE-2019-25218,0,0,5b80931fba7b5b61a09b6a7cef47b52c4c321e607f57f9764b15a065a78a0d69,2024-10-21T17:10:22.857000 -CVE-2019-25219,1,1,e88697049c6c7bfe4584917de7b3f889cee4d72f7defcac97255b8b6ae9a8f79,2024-10-29T17:15:03.567000 +CVE-2019-25219,0,0,e88697049c6c7bfe4584917de7b3f889cee4d72f7defcac97255b8b6ae9a8f79,2024-10-29T17:15:03.567000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -198426,13 +198426,13 @@ CVE-2022-30351,0,0,2df1fcff158bfaa98e8e388cc82c7b76555d1068f7cfc1016565d9f0f4974 CVE-2022-30352,0,0,9c99852cab9cb3dba12ad494a32dc9a161c396d474ce4e7a613cf8447766b558,2022-06-10T02:33:25.820000 CVE-2022-30354,0,0,ed31654501a11742f4e835fe4296b61b12005697eaeaf68a14d81cdf10777a0a,2024-10-28T13:58:09.230000 CVE-2022-30355,0,0,6d9fc5fb26ac7ab8171f413564a07cbf75052f46f57c7fd9530e6ad9c225361f,2024-10-28T13:58:09.230000 -CVE-2022-30356,0,0,f3ae3c6fd6b6cc6fff65327e0c11a9286874334297cf1f92c924e7d0c806a661,2024-10-28T13:58:09.230000 +CVE-2022-30356,0,1,3911a82262c22fcde844adec556eca0e4bb6c86fd6948605faf7eef6a43cda3d,2024-10-29T20:35:01.120000 CVE-2022-30357,0,0,9a65389899a6d289111e4563b3b9366a6e5ef747b49279b4e345f9f2dfcc58cc,2024-10-28T13:58:09.230000 -CVE-2022-30358,0,0,7235840ff003090ed649f735521c864d110a177cc85dd8c852074e92462c5639,2024-10-28T13:58:09.230000 -CVE-2022-30359,0,0,39292699d24e67d061e3b2da4f2daf855fffd6ae8b58666d89234334d807fd52,2024-10-28T13:58:09.230000 +CVE-2022-30358,0,1,20103d4be02aecc7d635ac6f528447d711ba29607714f08b073408db99ac233c,2024-10-29T20:35:03.073000 +CVE-2022-30359,0,1,ca67a6809b0f5bc5329dcbeee12c762d4d1e2dda248645d6d8da7c9c5d3f3b5d,2024-10-29T20:35:04.317000 CVE-2022-3036,0,0,c4abe10251774bed45d05e8655ab46440316bc2da3c56604182cb58b05d9789f,2022-09-21T15:01:39.933000 -CVE-2022-30360,0,0,5ffd4f18984b62d6450dbd5475469c48933d50894afa75deeb0ac8fbc32fd644,2024-10-28T13:58:09.230000 -CVE-2022-30361,0,0,49b6842d9299dd18f12db50eb002adbff5f0bdfe4a479c6cc5b84762206e5125,2024-10-28T13:58:09.230000 +CVE-2022-30360,0,1,b069b04fa47b91f9c7878081b8c9e8ed1ac31a5ba0958384a36363af477e1b41,2024-10-29T20:35:05.583000 +CVE-2022-30361,0,1,871c1de74822964343222386c12dff75f62adbdb0cc26e56094281c438c6494d,2024-10-29T20:35:06.847000 CVE-2022-30367,0,0,4ab429b852faf9723dbf506dba281ae94cd253e629be5b5f8d2fb2c552ccac49,2022-05-23T16:59:24.497000 CVE-2022-3037,0,0,c435799296f92b50e0bd30d245bc09441dcbbe40f6a0905fc66767266b6ff152,2023-11-07T03:50:43.193000 CVE-2022-30370,0,0,43e003e1eee0ff632ee04c0ec5c6be63af911ff9967992f449cf67592ab6166e,2022-05-23T16:49:37.360000 @@ -212276,7 +212276,7 @@ CVE-2022-48665,0,0,61f8dd0c53e94318dbff1c099a7764d159a4ff134c1b49d99d2540fba60ac CVE-2022-48666,0,0,a2bc98594445b6df1bd47c97ff822bb8a7beebd8a5e4e345cf76f70dcad5d756,2024-07-29T07:15:02.030000 CVE-2022-48667,0,0,5bbad8b7071d12ed897487a37454167ea6546dbc00672f8a744c08c8f65a23ab,2024-04-29T12:42:03.667000 CVE-2022-48668,0,0,ffa47e0d1e12cf1e004440647944ea09831e32184ce4ba444d32b7e58f5b8e56,2024-04-29T12:42:03.667000 -CVE-2022-48669,0,1,8ce958067a23f607d74ad3dcda99b5322da4d461e9894c58fa34c110f37456b9,2024-10-29T18:35:00.757000 +CVE-2022-48669,0,0,8ce958067a23f607d74ad3dcda99b5322da4d461e9894c58fa34c110f37456b9,2024-10-29T18:35:00.757000 CVE-2022-4867,0,0,63e49f2f48f56858cc93b1a43514f2600f0d5c18f31355382513a6c3bcb2d646,2023-01-06T21:26:37.597000 CVE-2022-48670,0,0,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000 CVE-2022-48671,0,0,392359edb3c2896ca37146c9f139f1d133a1b3f66bd661c4015d56ed55c4a3b6,2024-05-23T20:26:32.357000 @@ -212340,7 +212340,7 @@ CVE-2022-48728,0,0,4a8f54abce7793b55609eeea23d6695dfc0efb1124e2970f715dffaecbf7c CVE-2022-48729,0,0,3f0993d80fd7c7c3655705936ed012ade706e2f19c6274fc52ae7db7f708f4d8,2024-10-27T18:35:03.440000 CVE-2022-4873,0,0,9266192fd5e17bc961f9039902c555ad69216beb20dfd48249e4f37501df9445,2023-11-07T03:59:09.310000 CVE-2022-48730,0,0,927e7fae9500f7d1d76c595495e5d68ddde80a2da0a22ed9d01a96f4a588ddf8,2024-06-20T12:43:25.663000 -CVE-2022-48731,0,0,f2137fdaa4becb4ed0190377e8df6f4b116a98b0fb57b5a4ce7886128d2a2fb4,2024-06-20T12:43:25.663000 +CVE-2022-48731,0,1,07c54c72dd060548a2991440ebb37a05b3923061c5a210a15b01ccd0211c1484,2024-10-29T19:35:01.210000 CVE-2022-48732,0,0,d6cc74e82f107b126febfe008777c2c97d6e8cbe09c0878031c0fd17cd48e390,2024-08-19T17:58:27.230000 CVE-2022-48733,0,0,9ee2e6e9ecabae5b87258617eb99e87307e6a5268d57b03c37e160e5d564f656,2024-09-12T12:15:46.847000 CVE-2022-48734,0,0,a10c6df7a42e2cfe05caa8c89dfd6fc497700a9e09171ca89bd5070583fc92fa,2024-08-19T17:22:11.393000 @@ -212374,7 +212374,7 @@ CVE-2022-48759,0,0,7962889d3c432d97af1edc38f6b3670b53bb47c561e33f1c213dfd6884053 CVE-2022-4876,0,0,e65b1d52e56908a8a506a957a5c75cf98f657410276c30e7e528870e80a276e5,2024-05-17T02:17:00.467000 CVE-2022-48760,0,0,a822cc7f5fd5d465f57fc80abb1c1a54e7b02787f15d26b19ce6fe3fda938330,2024-06-20T12:43:25.663000 CVE-2022-48761,0,0,3cfd946ac77fc1af17cd081ed8684fb125d41afbc4ed1fc016776ff176eaeee1,2024-06-20T12:43:25.663000 -CVE-2022-48762,0,0,a00f0d8ad698e20bda1d31eee4ef434851c3e14ff4048008f9bee0d1ec3ff334,2024-06-20T12:43:25.663000 +CVE-2022-48762,0,1,f4510de1769eada9940776802a8e77e4c4286daddf6ec9206df95f4e10a02de8,2024-10-29T19:35:01.667000 CVE-2022-48763,0,0,019f757453c2977363dff510d05dc5a6e5a09147b632f78395e58e6c428efd83,2024-06-20T12:43:25.663000 CVE-2022-48764,0,0,e13b2251f00635b9efcac93235bb561c717b11baca1d4d8de3b6f250c8e755d2,2024-06-20T12:43:25.663000 CVE-2022-48765,0,0,84ad02e5d8e4b2b68f2606184b9db643b6473e4cacb7a99b922c82145d37f1c7,2024-06-20T12:43:25.663000 @@ -214900,7 +214900,7 @@ CVE-2023-20244,0,0,ef5478e6a90272c45b27c3024a322efd31f35322e79f6b0994a3b3012d2da CVE-2023-20245,0,0,7c8defe7656b99a3490f5dec78fa33f59a3a7bf2860cf92c81908c0515386af3,2024-01-25T17:15:40.723000 CVE-2023-20246,0,0,81cba30e219c8679b8396c88108fb74f4c8c322984fd96f8a7800232a08154a8,2024-02-06T21:15:08.530000 CVE-2023-20247,0,0,37a3b7d9f826b891939ada0ed7eb492ad5e82d4a7dd399f90d1fc087a7527626,2024-01-25T17:15:40.990000 -CVE-2023-20248,0,0,59cbd953e770ba575f36ae23f62474d6113891024b88f613da72cf0f067372cb,2024-04-25T13:18:20.370000 +CVE-2023-20248,0,1,39954ad85699f555c5ee70d48a99e37cb624a3ac677dd13d455e376c8ce8c715,2024-10-29T20:35:08.117000 CVE-2023-20249,0,0,503e248e38fb83582d3bcbdf1228cbd29d87aa7a836644e43b90c3e52648ed9b,2024-04-25T13:18:20.370000 CVE-2023-2025,0,0,eb3c38f5376ca43f18139aee2b9a4c6ddc7ce1d59903d03001d269d33080d051,2023-05-25T18:10:38.033000 CVE-2023-20250,0,0,d8de3fd05332392ffc6997dff53eb0911814f3a5f8d7a86630beb3fe06d2eba1,2024-01-25T17:15:41.117000 @@ -214958,7 +214958,7 @@ CVE-2023-20509,0,0,395f73289a6f2f7eed9b4f4e528e974be15f70c1b66bce0a7ce57b1b555d4 CVE-2023-2051,0,0,aae0b82e887061c7db66b0d038eeb5f5dd09f4b2acd07b8f05b78ea85d55a2f1,2024-05-17T02:22:37.033000 CVE-2023-20510,0,0,a28fddaa3bb3d74952e71d2d049a0f73848147e98f221e4c4bbda55281a9d31f,2024-08-14T02:07:05.410000 CVE-2023-20512,0,0,485351d2e78c81b2f4044ef20dd427abdf744602927c019c1e2f2cd30cf3b981,2024-08-14T02:07:05.410000 -CVE-2023-20513,0,0,1409bf0afdda5d3245f788d07f8485669bddf81495f50baa24c043999b1261a4,2024-08-14T02:07:05.410000 +CVE-2023-20513,0,1,bedf986696c54474aae2806d10f9f60c33dd651ce7b0ebcbca1af4e2722b9a1f,2024-10-29T19:35:02.140000 CVE-2023-20518,0,0,39651a26110416a2938e76df66f55751d93c1e32e70ee39308d5bb16185f29fb,2024-08-14T02:07:05.410000 CVE-2023-20519,0,0,56bc283b215c337f135e3f89a4ebe5a0dc3c2788b2f6ae0b85cb9f259a5eee98,2023-11-21T20:27:42.837000 CVE-2023-2052,0,0,dcec65c7f2c455bd5f2a27def018d9efbaa0541c20520cdc4f00cc433a61fb13,2024-05-17T02:22:37.137000 @@ -215844,8 +215844,8 @@ CVE-2023-21401,0,0,0562c694b15f268586d911a4fa9f4ac3f898d7a95a06b6c6a5ac7e726f2b7 CVE-2023-21402,0,0,c8743eea26a7b86966c77f8ff159a59ec6c576fa71f852b7f6d86602a17c1e2d,2023-12-22T01:15:09.100000 CVE-2023-21403,0,0,cc171ba692d41da349cb1ce1bfbeb293c9ea0222f6c469295542e186e869f4de,2023-12-22T01:15:09.167000 CVE-2023-21404,0,0,2fe7804853333e1c97d1219045e675778d248011ffad11ff5de23e9d35573336,2023-05-15T16:58:09.600000 -CVE-2023-21405,0,0,333bb23f864069b3af4bb01e118cac71a743a819b4a3605147bc277b0e0adc9e,2023-08-02T18:43:09.213000 -CVE-2023-21406,0,0,c56f411bd2c2f08abd892c967d75a43cfa45755a7c8d44e4c7417908b77e69f0,2023-08-02T03:53:46.127000 +CVE-2023-21405,0,1,0ed7b6270164d386990477dcbcc6d3d904783e3cfcab9f9565f9560032fc119e,2024-10-29T19:35:03.677000 +CVE-2023-21406,0,1,750bfe240aeec35955fabd92830525ac0d40d09068e1aee161d06b91ab5d8ab2,2024-10-29T19:35:04.477000 CVE-2023-21407,0,0,f1a7d1d4211e44cab40ed3f4db33209fe7cbf312190d658794433fa2c0b82728,2023-08-07T19:22:06.127000 CVE-2023-21408,0,0,bf6e81c8ea2cf89317e5754bb180f19c45a0076b9c07631801a93caac10bbfd6,2023-08-07T19:25:39.517000 CVE-2023-21409,0,0,b5fb3cf5dfe4f4b8bfd8b4b120d54e23363f24232f8bdfcf9caa873abca4766a,2023-08-07T19:25:48.833000 @@ -217414,9 +217414,9 @@ CVE-2023-23333,0,0,942c32ba625080b74216116af0c1468dd17dbef732e038aa3fb34c9b9fd49 CVE-2023-23342,0,0,927371a0ac83bc2cacfbab75d724b33a5fd5994becf43de482d1ba75c5ca0cfb,2023-08-17T14:42:57.963000 CVE-2023-23343,0,0,9d9b82ebb81749090a5e129117525e956301d7d1149368d9db1b96ec1bfba0ef,2023-07-03T19:03:11.543000 CVE-2023-23344,0,0,2cab60dbf0d362832c12bdcb74a57be840607fc7fcdee0dc0035bb3b45897c1e,2023-07-03T19:16:21.420000 -CVE-2023-23346,0,0,e3555877102ce15539ac9dd035272780298313e344068789083a2000ee9205b5,2023-08-15T19:58:44.960000 -CVE-2023-23347,0,0,ccaa461e5a00f6a8da75fd1a4bc750b4985febd67d6dfee5b436c84a6aa2658c,2023-08-16T17:00:58.277000 -CVE-2023-23348,0,0,701ef318cf0ef40fb43bebcffab49ae528e62078bfbab6da71ed557e69ad45e7,2023-07-19T15:48:28.893000 +CVE-2023-23346,0,1,15a86cacd15ccb3055a83bd614e86273a4f95d8fa5d2426df76feeb466b61b53,2024-10-29T19:35:05.173000 +CVE-2023-23347,0,1,8edf0f7b2abf5ebd50482da480a781ea5e8921007e249a0f6b044e6194c93d33,2024-10-29T20:35:08.403000 +CVE-2023-23348,0,1,6573a87baf1824dbeab9525aae2826a614030b6025949d42b20dde47ce72697a,2024-10-29T20:35:09.140000 CVE-2023-23349,0,0,0418be82659d420c89d916c9c9180ccf20d4f163f1c45df2317729958de36d75,2024-03-22T19:02:10.300000 CVE-2023-2335,0,0,718be33c9d43296b28a594538497f86513fdd03da8e9a6051744ed2763e2b3b9,2023-05-08T18:42:19.487000 CVE-2023-23355,0,0,9ca55962d17db1122cf4c2760cf73cc8de8e25e2577f033fb66d8fe1fd14c511,2023-09-01T17:10:05.397000 @@ -217499,7 +217499,7 @@ CVE-2023-23433,0,0,d7b24dea30ecdcb6cefe8acb9737f21bcec52d0c1c650b3e7e6c9553cac74 CVE-2023-23434,0,0,d06d744f3fa5462cc1970f9d2816d444c9009cb4f6f0a756f0130b4bf7cd637f,2024-01-04T23:06:17.407000 CVE-2023-23435,0,0,643e857bce8df5bd1bcdfd47bbe59936f3606485bb14b5ca39c9b6ff5637a6e3,2024-01-04T23:04:54.210000 CVE-2023-23436,0,0,5e4b5d420c6f0c7b8ec88369a10d01010bdffd902c5133c50047202bcd39e21a,2024-01-04T23:04:04.897000 -CVE-2023-23437,0,0,d968133674adcd23efdca7d59fb9243d92424e9d9c2b09a42a8056f3f7bc3ff8,2024-01-04T23:28:07.187000 +CVE-2023-23437,0,1,f06f53dae0edd987a98855d7bb35654156db6c934a091797a9c98159a7a69388,2024-10-29T20:35:09.880000 CVE-2023-23438,0,0,6f12004686208561666dcbce18a383c79163faf9f6fe3e9856e4389ae8837e8a,2024-01-04T23:17:04.077000 CVE-2023-23439,0,0,10399a9a2e47c52ab44b4e2458182b4e532179c46f6eb5f4951ac6eb406cbf21,2024-01-04T23:15:43.513000 CVE-2023-2344,0,0,6b3e2932ba9c0ae1d195031e3e9d348be9ac11da4433b76588a3b53732f16050,2024-05-17T02:22:51.890000 @@ -217760,7 +217760,7 @@ CVE-2023-23699,0,0,f52f9db198ba63b54ddbab1502842c7fe92bc96015775b8ba46d92f54a8a2 CVE-2023-2370,0,0,30c47a535b019eccfd7734a80d0c3356170e46a2a4c5256cb0bf6f646cd8dae3,2024-05-17T02:22:53.750000 CVE-2023-23700,0,0,419e19cdfb7c3388079ab11c612d648de028b1c0eef65ba827828a5db1ba79bc,2024-05-17T18:36:05.263000 CVE-2023-23701,0,0,bf4262f3861617f2649f6f6fc35d7688fdbca4016bce87251a6d52cca713c9a1,2023-05-15T19:43:41.283000 -CVE-2023-23702,0,0,4a5fe33e667f4ecfb2c0cc7e5b388265980a487812046c114169dad431d17c38,2023-11-14T15:27:43.113000 +CVE-2023-23702,0,1,6a3ec1e98edf099b46ec4efc68e0f5e42b242d6616ee46e022b5e93f865cf898,2024-10-29T20:35:10.747000 CVE-2023-23703,0,0,d4064bb7e84f025e1ba566721148a110b6e9dc4000c77e063b5b219ad6f91ede,2023-05-23T18:53:27.673000 CVE-2023-23704,0,0,b982caf9d2b60c533735108ff4a81f193866a8f4062a5c70bd03a9817389a23e,2023-07-13T19:49:05.277000 CVE-2023-23705,0,0,6f5f33f3838226c430e2ca12038fc7b18f83e8bc116701b9546d8cfb79dc8ec6,2023-05-26T18:38:06.127000 @@ -219008,7 +219008,7 @@ CVE-2023-25185,0,0,1135c662e57f51c34416e024b4987aa850e5741deacd604b74a870538bfd2 CVE-2023-25186,0,0,84fdf198fca54d82274bf23f7a19407034d6d7950ada02a9b488f31cf7adb57c,2023-07-05T15:48:07.843000 CVE-2023-25187,0,0,e89bd4fa4c1c86879c04daf0b42f122bc213686f65f5bd42b68cf2726238ff4f,2023-06-29T19:17:48.053000 CVE-2023-25188,0,0,99a89a05ad15ad65c3e7bcd487b49199dddb071e95c006fb1db1eae71d2117f6,2023-06-30T16:10:18.383000 -CVE-2023-25189,0,0,bd30d48be47051d80e37d6ea5536ff430181fb5ceea8f06deeb251856c5786e3,2024-09-26T13:32:02.803000 +CVE-2023-25189,0,1,f83ac5dc41e2b07f3978db3cbe5635df1aa8694f54478919e72883ceba673861,2024-10-29T19:35:05.910000 CVE-2023-2519,0,0,8cda41d4e7e8d661e9517bd8596373028e42458752588636e6f9350df8a49a49,2024-05-17T02:23:01.927000 CVE-2023-25191,0,0,85db906bc04b5d6fc3bb6f91c549d5e5b7ee59e11d5b5bb8995020c923f11762,2023-02-24T17:51:34.277000 CVE-2023-25192,0,0,408ab00a0fee17449a1dde61e3baf17726d13732731f80e617385e1174ac9859,2023-02-24T18:02:49.487000 @@ -224404,7 +224404,7 @@ CVE-2023-32184,0,0,123bec51d72ff65d7213bf06e3d98dc3786350eb64238bdb1de857862a0ef CVE-2023-32186,0,0,e06556634f58d819dfae5b78cb8714f5c9bc5370508503590046fde23b8885e0,2023-09-22T02:00:06.313000 CVE-2023-32187,0,0,604bbf8f396584f0efa1594da6fe3c409bf951238cacbb8e57499c590e5e3fd1,2023-09-21T15:21:31.567000 CVE-2023-32188,0,0,6342fff4b4390ac18a6726657d68439603d1b5561b3fa56098696efce5331028,2024-10-16T16:38:14.557000 -CVE-2023-32189,0,0,b09241c01956a023687415df7aca2a79444d9b14f4d1d13b891e78345b36706b,2024-10-16T16:38:14.557000 +CVE-2023-32189,0,1,37cfc07f7494d95fc6c9e9147435c754f8bc950a209c39c74b87aedf969edd95,2024-10-29T20:35:10.940000 CVE-2023-3219,0,0,6eb56310ef4fd619262ae96943204b765f45a221a776e69bfc250b710761d69b,2023-11-07T04:18:14.830000 CVE-2023-32190,0,0,3201abe2ab70cc4232c73963cb10958ad3bfa000270484c6b78c46c057ec420a,2024-10-16T16:38:14.557000 CVE-2023-32191,0,0,6cd92c37512c4b0d3b5275c10885feeeaffd72677bde01a19fe2611d880ed9ec,2024-10-16T16:38:14.557000 @@ -224471,7 +224471,7 @@ CVE-2023-32258,0,0,3765cc941b240ae55ac325df051cd68b23e7f4aeaf6466a32872913e20fc6 CVE-2023-32259,0,0,63d94242b8b0d4e358593674a90324955b50adf4e3d50cf943b4320e76d2c808,2024-03-19T16:33:58.680000 CVE-2023-3226,0,0,f374a8fec37bbb146b103948aced2aaf6543c8988572ca127a48f77cd827c0ef,2023-12-15T11:15:09.510000 CVE-2023-32260,0,0,b9cd8dd7693e77252f036c5a8a5da5ab355842eec3ef40a54fe05bd3713e1328,2024-03-19T16:33:58.680000 -CVE-2023-32261,0,0,b5f957fd4bc84f45daf97401345ea47ab75e5c4ed4ac5c9ed726a279d696d9bb,2023-07-28T14:23:01.077000 +CVE-2023-32261,0,1,ca3776983e4ed615dd0d7388949ad52cdc5fb718ecea16b6c18a1b2c36a269a8,2024-10-29T20:35:11.680000 CVE-2023-32262,0,0,b550eca0ee08972d1cae0350199922a2cc169c5b2de227991c4fabdc9201c447,2023-07-28T14:22:49.793000 CVE-2023-32263,0,0,93849585e3dab76d3ee6dc91178495b03a100a6882a75904921cddfc88af30b2,2023-07-28T14:22:16.300000 CVE-2023-32264,0,0,563815ef645d4cd0c2f7ecaba185753d66411c101e6dc1c31944e625cf41ef11,2024-03-08T21:19:43.127000 @@ -224687,7 +224687,7 @@ CVE-2023-32470,0,0,1d1831b86e4f49c8df32eecce1f1b20c4ae5ed94d12e60777f158aa9c9815 CVE-2023-32471,0,0,9c9d6c937b7a4cf236caebdfa0a905ac426901daae91bd4d8caec19df1a4d7a2,2024-09-11T13:50:39.613000 CVE-2023-32472,0,0,145900bdd957067cf76e10b26678c9515ceace22573fa494be4bed188e634244,2024-09-26T12:15:02.800000 CVE-2023-32474,0,0,d6a828b10f15016d3a4296d029159cd45eff255f547ac600257d313f221bad5c,2024-02-12T21:37:18.687000 -CVE-2023-32475,0,0,1d606a374c4ae0f3a73cad6cf7cc78e1a939167312580108942fa2c074cb968a,2024-06-07T14:56:05.647000 +CVE-2023-32475,0,1,0d2c5c75ffb775abf6aa3ad8de049f0ccfe5cf60e0377f9d2f0d9626e65f3af2,2024-10-29T20:04:54.807000 CVE-2023-32476,0,0,0a877195e1c4b61d22bd75366e39696468fd30e4aa5b4ad618693c77d2beca40,2023-07-31T17:05:59.917000 CVE-2023-32477,0,0,9cb3f585008efdbad77ec6f8a6c399a7edb6e4a824958532bcbce3d8e836a873,2023-10-03T15:57:15.073000 CVE-2023-32478,0,0,3ade38bec10597f0b5dc9e1fb6aef4424e70d51e696bd6ef64c9b2655b6d57a0,2023-07-31T15:08:44.263000 @@ -225436,7 +225436,7 @@ CVE-2023-33285,0,0,346fa2aebff3b26e0dce2415d6b55e51dd2abe88b804a2ec163b1e68a3cbb CVE-2023-33287,0,0,70d0ca72b61a84f71b61b504883cf3dfcdbe7867b29c7e605eb36ca8df5fefa5,2023-06-08T01:26:27.440000 CVE-2023-33288,0,0,6e9d4ead552c3a0ba41f51c29d0a89ad413f57965894731b38b2e51f2a1622af,2023-11-07T04:14:48.630000 CVE-2023-33289,0,0,332faade8248ed04cde9e44917be14c9483113c17b05cf9f234a56b4d5484390,2023-06-28T16:44:05.340000 -CVE-2023-3329,0,1,e05aa6061a406908952f348db2436efeb6f700b85bc2d9a87e8c493b2a301257,2024-10-29T18:35:02.750000 +CVE-2023-3329,0,0,e05aa6061a406908952f348db2436efeb6f700b85bc2d9a87e8c493b2a301257,2024-10-29T18:35:02.750000 CVE-2023-33290,0,0,53581d74a4614054c7e40cff2a64bb5baac85c4040f2c05262fe63d04e3e8a25,2023-06-21T16:06:56.787000 CVE-2023-33291,0,0,e9db5278b53d838c69e38b9c0ca1574d9600832eb966ddf8cf2cff4260f638e5,2023-06-03T04:27:48.593000 CVE-2023-33293,0,0,aaba53a5bd9606bf2b9ebb8058082a8f9430e4008d1677208c38c998718dc513,2023-05-30T15:18:16.863000 @@ -225968,7 +225968,7 @@ CVE-2023-34052,0,0,3d2b2af7876c02b3773f59fe0a30417e2bd32eb914da60894cbc7e749741a CVE-2023-34053,0,0,034cd90c2080da1a6fa114cbdb7aa6f791b2e4a6f27daf71b8fff575650020d9,2023-12-14T10:15:07.520000 CVE-2023-34054,0,0,f49f83a5d44173c776903b4a7b7ddbb5138502ba8012f904c618f121a7be311f,2023-12-04T19:59:30.713000 CVE-2023-34055,0,0,97039ed3c5ffbcc622971cd41506fd706a52c7f5f3fec9a6d847ee5181981433,2023-12-21T22:15:13.760000 -CVE-2023-34056,0,0,435aa4888cf30f64b39e698f3010d6f2ce83890f27db606d674ba92591037ae9,2023-10-31T15:18:37.153000 +CVE-2023-34056,0,1,ab4eded5d5a5184cbe8bae6070426451e0dd745e91eed09606e1a9fab93c4bf6,2024-10-29T19:35:06.640000 CVE-2023-34057,0,0,5fdcc9c1a4f5a40ae0f24a31652197dfaceed156f0ab9c7032d2fd4490d646f5,2023-11-07T21:00:35.270000 CVE-2023-34058,0,0,51a8aff6dfb1b6c6d0563b26a5600627bef6c83739a1990f91b799a0788d3dc9,2024-02-01T02:29:46.450000 CVE-2023-34059,0,0,973738a4ca34806a8650be62bda56a1b761bb97e54acb3e8589aa21e5922ffcf,2023-11-27T12:15:07.590000 @@ -226956,10 +226956,10 @@ CVE-2023-35673,0,0,af7a2faf5f17208be8e9b27e9e2cec66d6cafcd9d2d31f5c5d0ef58b562e4 CVE-2023-35674,0,0,63d50b140777b09745cba48ef9f56f33eb5c7cfc093f659778c3fc8ec1ef810c,2024-09-30T01:35:19.420000 CVE-2023-35675,0,0,dd907efec7bb9661ca3412922449fce7a3a8de3faadf9ff8a1de1fa932b2f6b1,2023-09-13T17:40:35.963000 CVE-2023-35676,0,0,4f46b1bdafea48d731ba296299a9f54c45fec7c2e74d32462c1c58fd4e63e3a8,2024-09-26T15:35:17.767000 -CVE-2023-35677,0,1,96a324f86235abb123254deb4f17fe6c9cee6f46fe6cf833409157f486f104d4,2024-10-29T18:35:00.990000 +CVE-2023-35677,0,0,96a324f86235abb123254deb4f17fe6c9cee6f46fe6cf833409157f486f104d4,2024-10-29T18:35:00.990000 CVE-2023-35679,0,0,253a86941c9d14de34abc41b4a6f9cdbb792759a76539299020cca5163a19f58,2023-09-13T17:39:43.833000 CVE-2023-3568,0,0,16fc4b2c4899ec32532ab1977d49aa0a92cf21f20ade7158957493db49fc0558,2024-07-12T14:17:46.530000 -CVE-2023-35680,0,1,987c41cb842fed8c3331802116dc58ae370add08e161604b2c7a66a465881665,2024-10-29T18:35:01.837000 +CVE-2023-35680,0,0,987c41cb842fed8c3331802116dc58ae370add08e161604b2c7a66a465881665,2024-10-29T18:35:01.837000 CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd39c7,2023-09-13T14:39:48.377000 CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000 CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000 @@ -227241,14 +227241,14 @@ CVE-2023-3598,0,0,0bec453a320ef3194afc51df94ed7de4eb3a3c7d0be97fcceebcfc6cca0706 CVE-2023-35980,0,0,6d06c308dbb98ae6b6712e4954d37cada67c78f1207efa940a6e0c7bd3f8f478,2023-08-02T16:23:32.867000 CVE-2023-35981,0,0,4bd208787f4aec49886b6e30bcbc3e8a5ba16f1557b900c635aaf5b34186a34b,2023-08-02T16:23:09.933000 CVE-2023-35982,0,0,38a850522108af408b4461940e85f4afe5eb74e92460a8f1b75216742a7a396d,2023-08-02T16:20:18.270000 -CVE-2023-35983,0,0,75d532199796e5e95b5e17169f0d107eb9d14c4d1573606f0968af81866b9bbf,2023-08-02T00:46:23.367000 +CVE-2023-35983,0,1,9fdcbbed2d0d4d5c6ef6528463ab8d79341e2a17ae932616e4ee0c097145d45c,2024-10-29T19:35:07.507000 CVE-2023-35984,0,0,2f631a7d4814af436c65e66ab0c864de34cbdb8525fb6e3152edb4981ed75ab1,2023-10-05T14:33:38.430000 CVE-2023-35985,0,0,dd9309b9458693f6fb2ccae89fefa74f9ece5007014e63d8c628e3ff805e4e77,2023-12-01T20:55:23.353000 CVE-2023-35986,0,0,3f30155cb4093330975cd0b7f74f8220d44a70c8fa2546c2ac7976d29dba5cb4,2023-10-25T14:28:44.120000 CVE-2023-35987,0,0,0092d8acb4edfca24b67c2de9a222432602b6c7bb47187fca3b07b36a3f1055f,2023-07-14T14:42:24.310000 CVE-2023-35989,0,0,5ea9fc86c15be01a2e0360817ae8cbdf04bf51dc78857327e32dbc2673e7ad31,2024-04-09T21:15:10.167000 CVE-2023-3599,0,0,047495667ec956e514235d0914b269f9c6d59aae1a47ba378f0248d9961cd2ab,2024-05-17T02:27:37.867000 -CVE-2023-35990,0,0,ad3a4c8f9a76469497327f695ade5fb8a1e4ee3d1419eab7fd161eb4adcbe022,2023-10-12T02:12:41.530000 +CVE-2023-35990,0,1,03f2a8194568ddd8e5e378fa873afb948266017c7040bf1032056de971ce1c71,2024-10-29T19:35:08.297000 CVE-2023-35991,0,0,2ef776d5417daabb2e9168bbf8d0aadc490009c020bd7b0f34274fc64760ca51,2024-10-21T21:35:01.433000 CVE-2023-35992,0,0,99196ff9394e726bbf48e9e4cb99c587562102b371d12ef02b41d14fb7d44e94,2024-04-09T21:15:10.260000 CVE-2023-35993,0,0,a97a4bb39b3e03a07df9977e4883832fa1549e90c2d7d30de6ab91a48ca03f48,2023-08-03T17:01:05.247000 @@ -228343,9 +228343,9 @@ CVE-2023-37435,0,0,2e0989d5806e4f8439c029b8017c204675fbc2522d7821d0a2da6913e2469 CVE-2023-37436,0,0,a30c042dc7433e0d6fb2a7036af05ffeeb16985a312aa32d3985c00518386a76,2023-08-29T13:19:12.480000 CVE-2023-37437,0,0,8f9242c5f83dedf6a72e3d5b2ec1a48b6b13c67ddc81a8d6eaae54c1dcd2f378,2023-08-29T13:32:27.810000 CVE-2023-37438,0,0,3a74fa89eae821ff21d4a4f3b6dfb827d160edcd35de8efec51da77e2f4c5e36,2023-08-29T15:07:36.370000 -CVE-2023-37439,0,0,0a50034f24d9f063afe0bf6a64c47de6888a9a141b6ef925594527a6fb139dde,2023-08-29T15:12:00.960000 +CVE-2023-37439,0,1,6c59918b9be770965baf1395587a692195bc1b49bdf74ec1139bc51f7468e1c8,2024-10-29T20:35:12.410000 CVE-2023-3744,0,0,1edf21a648aac506895c70622239621d6d9a77ca89e4103da440dd5ca452dee4,2023-10-04T13:41:29.220000 -CVE-2023-37440,0,0,f7e923ef2900306b14e08d5d07c8634ec5c85a8b2f6ed41040d7244a67361dd1,2023-08-29T15:25:40.923000 +CVE-2023-37440,0,1,2200e0823ff1daf0c443ce921be8abcf0df85792c4c0a5c4a86b6cadc5f75edc,2024-10-29T20:35:13.140000 CVE-2023-37442,0,0,b43a253e6071250e253301ed7e70e8582ceb8f42c8eec0c7d67761b5c57a320d,2024-04-09T21:15:11.870000 CVE-2023-37443,0,0,58fc713adbc2e0711fee236d35cf8857a0454167ba75fedae211e1693eb7cfea,2024-04-09T21:15:11.960000 CVE-2023-37444,0,0,e40f54498c699d6c60d18818c0ae69fc90060420290133650604ba678295cac2,2024-04-09T21:15:12.050000 @@ -228414,7 +228414,7 @@ CVE-2023-37518,0,0,b471b1baae78b9e0d5ac886f06b7bd06ffdf0d9e4f33857462ad1157a1d59 CVE-2023-37519,0,0,dbd6249885b2f38d902efa26103a8d3ce6c1b945c09a2e63cfd7220327b42dcc,2023-12-29T19:12:49.727000 CVE-2023-3752,0,0,4b024bec9b4af7e0c78b2c5270972e858322d3308f2be0677cb9c2e79afaf99f,2024-05-17T02:27:45.440000 CVE-2023-37520,0,0,a77a831578ddc6896e6dc5b0cfdaaf2553410547c7881dab0a7a3b8f7fdb3122,2023-12-29T19:28:51.770000 -CVE-2023-37521,0,0,20690775a1e26fb2b9524e98c1b68e7820ba1a3e98c1e0d5279b65883fb476c7,2024-01-23T14:21:58.337000 +CVE-2023-37521,0,1,2a90138ff268bfce1886907a85f95543451fad1b885979a9dd08d64281af5f01,2024-10-29T20:35:13.863000 CVE-2023-37522,0,0,648f13adbb6a296f24f08ac64dcc5195bed5c8cfed8cf220593435a1d652a48c,2024-01-23T19:39:58.380000 CVE-2023-37523,0,0,0466cdbf811df780cef6f210307cb749f131ef905bd115a8800c7087ca412964,2024-01-23T16:54:43.840000 CVE-2023-37526,0,0,52c90d7c68b8a7d4b4d80db1072ce180a695c5c2d23e49ef6621eca890ff56f1,2024-07-03T01:40:35.700000 @@ -231734,7 +231734,7 @@ CVE-2023-41719,0,0,faea68bb506de02c40aa19d358929c67cdc07c9418389ac5747964f0f1130 CVE-2023-4172,0,0,91a5523735beaaf386988ad574da4f746b7e3dea210dbb60bef0f34aab091dd1,2024-05-17T02:31:23.737000 CVE-2023-41720,0,0,0093919089e89ef5358fa71b3834e693e345c61cd72f1576c7fde67f41fd42db,2024-03-26T19:27:41.727000 CVE-2023-41721,0,0,22a4214fb88e6b55772a953168a15ae047fbfca11f00c8ca07e543faa2f479f5,2024-09-10T21:35:05.073000 -CVE-2023-41723,0,0,aaa0ff80b06e16db3127d59a5b19fb8c6f1bb032144613ccb8f008f360fd5606,2023-11-14T20:30:54.470000 +CVE-2023-41723,0,1,b41b276bc211b3f14b96cd394ec4d459005ed49f0e884f7f290819020689ab91,2024-10-29T19:35:10.820000 CVE-2023-41724,0,0,fb1604319899a68549be540318d0c25739412976b98d9685e4f321322d31d223,2024-08-01T13:44:44.643000 CVE-2023-41725,0,0,188227db5f1bdbcb9fa793a5415f81f08b29487ded2b95ecfb0402e0b9f1fad1,2024-09-05T15:35:12.987000 CVE-2023-41726,0,0,d9ab0da174c2aa4e1dd092c79f59129d7905c3f5017f297d2d0141e455a0f851,2024-09-06T19:35:05.220000 @@ -234326,7 +234326,7 @@ CVE-2023-45622,0,0,88931168774979ebff7be74b8e4b8d4469d747969586f22c2561acb997f35 CVE-2023-45623,0,0,e62a76aac7931fab64355493c604d7f8fa3a8f31f8e078a3f9cfb8f87a25cef4,2023-11-22T17:26:16.690000 CVE-2023-45624,0,0,9ef076b56105e6e519abf608c17c28952f6d1cf8c7ac5c86e448e71819efe403,2023-11-22T17:15:26.837000 CVE-2023-45625,0,0,002efc58c2ffa4d55e931c52b7dda7ee51d118b6430c5f56414d2045a0e9140a,2023-11-21T19:51:31.120000 -CVE-2023-45626,0,0,f991b3814f339122b3365e29c4a7690bbf06386f42237107b1fe533a623a949d,2023-11-21T19:58:43.770000 +CVE-2023-45626,0,1,804aab5d0e49f52a258358e81e6436fa713a16d3161e7b7f6da9207668503881,2024-10-29T19:35:11.560000 CVE-2023-45627,0,0,aa22ea18951eb9ed5dda33655b76fd253e10c25223e65b495d10cfbebe669137,2023-11-21T20:00:49.907000 CVE-2023-45628,0,0,7933fcba16aac3b6ddfe25704b68607b1e8a614d8049c361c7e582ed3c151f91,2023-10-25T01:26:12.197000 CVE-2023-45629,0,0,effe5fb08d66950b83a31264d992dfcef61a0a58ac2c5798039eaa4044b45bdd,2024-02-01T16:02:06.650000 @@ -234427,7 +234427,7 @@ CVE-2023-45742,0,0,35452ecfeae9584d009014eba0ac410083f89f21227ec55f8af7eb076af13 CVE-2023-45743,0,0,46a6db2fb446a87479820a04e738600dc6c4636f7b8b5bcda37977b3f892de7b,2024-05-17T18:36:05.263000 CVE-2023-45744,0,0,68322b0ad6daa46139129bdda380112bf72863191d85180ad122a9e2ff47b9a7,2024-04-17T17:15:12.760000 CVE-2023-45745,0,0,3fa7c92c19a5891b058fa83b89bb3878a887d63d792a1a0596bb302499d093f5,2024-06-21T19:15:29.473000 -CVE-2023-45746,0,0,5261d209b9f0379111e2d2b131e41b1222d3a89cd884fb6f783a6603140dbbab,2023-11-08T12:49:08.920000 +CVE-2023-45746,0,1,dbfb62f5278dacdbe27081b60a5f852f0c4a271618e6ed63da26e6d0e75a84fc,2024-10-29T19:35:12.283000 CVE-2023-45747,0,0,5981280d4b995b51ff60fd3f0bec3ec84a08ed284e23916dfb06fcf65dc3c73a,2023-10-27T21:57:07.240000 CVE-2023-45748,0,0,c3b6b63cc459c60a50a9262d21d34b67d5c608fd27a69f6bdec66a2df6543ad7,2023-10-19T13:50:00.853000 CVE-2023-45749,0,0,42d9843ed3fd30227273b44d3bac6a616aba4f0f529c56858fd28ae93f6cf4bd,2023-10-19T14:06:48.303000 @@ -235080,7 +235080,7 @@ CVE-2023-46602,0,0,875983a4f04889c078c8cefe07f695cb244f5d722d1c989c6e201d51cb1b8 CVE-2023-46603,0,0,809f7b4db1995edba6f148bb7005bc62f08335a102a28e52b5719ee21a784a33,2024-01-09T02:51:06.413000 CVE-2023-46604,0,0,d1e17921b01fd33d108fab2f64dba0dc2288f89b2a4a9034578176c625d2efc5,2024-06-27T18:30:23.517000 CVE-2023-4661,0,0,98d2a0a1a775ec3ad63d452f96f15499cb98b8db94bb52acdc90acfb5980d232,2023-09-20T15:09:24.373000 -CVE-2023-46613,0,0,b6af521f7ebc19f77f2ce5714819dc83e3c08e967b43f946a2e764fcf9ad8cc7,2023-11-15T03:37:23.457000 +CVE-2023-46613,0,1,f061a099afc81cd6053e4e57179cd3bb55f021a4d937eb97487fa0a51a20d977,2024-10-29T19:35:12.497000 CVE-2023-46614,0,0,d619b5937e29641f4030512056156b72f91f06f0312e6712a2467ec9e507e231,2023-11-15T02:26:24.490000 CVE-2023-46615,0,0,3ce65aca27d86599d61b4257dc53923b997be1ebcbc4521ecf243d635d44615f,2024-10-10T13:24:23.423000 CVE-2023-46617,0,0,61a4ff8e8840e94d1989554db2bff21b33a6d02c389996d1f54be5e0e829a543,2023-12-20T04:16:54.720000 @@ -235088,7 +235088,7 @@ CVE-2023-46618,0,0,4e10b86c26d7691c369365eaf3b99317ee503d346e2223d9ad50e258e736a CVE-2023-46619,0,0,2f5e4c20ae73a1191dd13f372435ae95e6c5be8e07895d7b10a6c4a1351fc714,2023-11-17T00:47:22.077000 CVE-2023-4662,0,0,62e96c10d3030470c41273345162f367774b166ae35324860dff5eb30e41362b,2023-12-05T07:15:08.223000 CVE-2023-46620,0,0,5ff4d4939175ad4d378eb72bc28fdf6311b7e0f6da5a22f04170bc4cb43913af,2023-11-16T23:43:27.633000 -CVE-2023-46621,0,0,19cd6629e21a9cc1a04ee2d22be95c5b6784cea06216756259af0f6556e5fd19,2023-11-15T14:35:21.467000 +CVE-2023-46621,0,1,1ff29aea937c1b5ce0c57a74076322c35547ae26754e813a999f42dea8dc6e6f,2024-10-29T19:35:12.687000 CVE-2023-46622,0,0,dd064f524d8b7c208d442a836869b9dc3215cba623f8333011d43176c0a5a0c0,2023-11-08T02:23:55.480000 CVE-2023-46623,0,0,37e3079b8658b5682bb5cdbac4c43129dd6e0ddef72ff4d8c6f9f0f8c1ef98ce,2024-01-04T21:28:03.787000 CVE-2023-46624,0,0,4513eac490ada78ea8418dedddfe06d3286316d3041ff9a166ce4c3db4d3f785,2023-12-29T02:56:36.643000 @@ -235102,10 +235102,10 @@ CVE-2023-46634,0,0,5ff1dcb4a40fdfb68a91d74c76e3e1b9c8b3a58cb3ab3e0c657ccddb84e8c CVE-2023-46636,0,0,03f738b196f31007e253c9a18bef3a564380ac5dfeb14180a6807492df9a925e,2023-11-16T23:43:01.907000 CVE-2023-46638,0,0,f3fed83997c68074e6b0491ec0545a409ec837208f47beedfe1105c0c135ce2b,2023-11-16T23:42:55.590000 CVE-2023-4664,0,0,a9625c307cb2eaa1de2b342724ccd0ba49e41554b2dbcc08e5a3d3a06753ede0,2023-11-30T09:15:07.313000 -CVE-2023-46640,0,0,d8f4f64559a8f2957f6ff1530b46a837fe47102ca9b54e016dfec7f0ed40b16d,2023-11-14T21:36:12.310000 +CVE-2023-46640,0,1,5cfd0f47e81434de0d5e183c0193f54b863b51e1f23276b117a39c19f96915f6,2024-10-29T19:35:12.860000 CVE-2023-46641,0,0,fa63835a7ced6e2fe317006aae49c3fb10cb99e500c62642b34bf9fd4f6f03dd,2023-12-12T17:11:31.140000 CVE-2023-46642,0,0,4cb9b1522b568780511955e50cfa5490af0f35a8c00215a123a5d28e1abe32be,2023-11-15T18:45:53.883000 -CVE-2023-46643,0,0,f8c4c7d6f51a34f42439bec3ceccb7d5486d4f56d28bf6d52f4b8395fbac041d,2023-11-15T17:37:46.157000 +CVE-2023-46643,0,1,a928d57a073a2f36f0237c732f0ea8d1038b2cc77b638dd40d692e8b017afd59,2024-10-29T19:35:13.037000 CVE-2023-46645,0,0,9661774bfde32b55c022a1985a58838f6c0fc1c74ca43a22880eebf8424e06f1,2023-12-29T16:27:51.847000 CVE-2023-46646,0,0,1e8b5c102ce00b418d87bd025b1376a5392eabf8e11ccbf9163b174ad2d74475,2023-12-29T15:52:25.340000 CVE-2023-46647,0,0,751e57f145ae417e9f9a4a6f5cf0d3f720fdec4071461632306b0d7e4b7e9317,2023-12-29T15:52:07.093000 @@ -235206,7 +235206,7 @@ CVE-2023-4675,0,0,04c604b6d66db3974d0beb31ea92a2ae7441bf56d7e2e6250aa910da9f9bad CVE-2023-46750,0,0,83b4005a30ed1aa97215ed1d1b9d4e897f752e4051b110ea25bb4ecbd095eddf,2023-12-18T20:10:48.703000 CVE-2023-46751,0,0,49565da213511c366435a8c3c467257a156e6b54e4c211cd5dd0323a9bffc1bb,2023-12-16T01:15:07.820000 CVE-2023-46752,0,0,02ba18beeea3d9cd2589127e949af27cc274848f7001f95dd52a5768446ec2dd,2024-04-28T07:15:08.540000 -CVE-2023-46753,0,0,a358632885874e1096965fa2cd9f4b2b0003da5864eafc8abcb4f334eae8fb20,2024-04-28T07:15:08.623000 +CVE-2023-46753,0,1,869b82a612e8a0e2f473fa715fb242f9182c0e21399efc947c51502c0c60cb4e,2024-10-29T20:35:14.587000 CVE-2023-46754,0,0,1ffcf9d46b272f7e633897ba307e7fc0cfd404c3206f5762d36b8dab1832675c,2023-11-07T15:56:54.830000 CVE-2023-46755,0,0,f006abf3387ee385702fe38ad1783df75a9a1c12fb78bd37f05eb4006c002947,2024-09-03T21:35:03.293000 CVE-2023-46756,0,0,43f3563c4505975db0e07f9c314367c7c7d35f79a19ff50cfdf146eecbac9c87,2024-09-04T15:35:15.437000 @@ -235238,8 +235238,8 @@ CVE-2023-46779,0,0,fb8dd4588744165f72717c6f7064a9d35a0fc366824ae88742f0b14ef2388 CVE-2023-4678,0,0,38248279f2fa62a8482191e3a53fbfd6c141788a325046ef84e5cd7c6951e6d6,2023-09-05T16:25:18.257000 CVE-2023-46780,0,0,0536a1d17e54dea2e10342aada2843adfc4a23b9b52a8f274b4302542fae52d4,2023-11-14T16:23:28.687000 CVE-2023-46781,0,0,a2693bc46d308bd0366b285aa181477ccb9e317818766b52604ef302a97dcf95,2023-11-14T16:23:15.617000 -CVE-2023-46782,0,0,e4b069410c17c912a62ec0ad6201563af065cce7b3dd03e26a23d3c0323158a4,2023-11-14T15:27:33.713000 -CVE-2023-46783,0,0,4a66af7b2ad9c4085a25417ffd79b31592ad9a860f829a26596fcc636efe0807,2023-11-14T15:27:27.733000 +CVE-2023-46782,0,1,cd41d9db54af0f97e48c72379297f6b7c529bad92c32e680be774cf5917ed37c,2024-10-29T19:35:13.217000 +CVE-2023-46783,0,1,446dcd6acf96d4dcc39c5563dea30b44967d2d45510a6992661911fa26f80629,2024-10-29T19:35:13.403000 CVE-2023-46784,0,0,22f038692a883e4388cb54cf4b31d7b58ed12d7d38c766165b69712f3cfba25e,2024-05-17T18:36:05.263000 CVE-2023-46785,0,0,ec8436933bcc2f394a7009445cedda97038eb4877a0234c3a8f23a8bebf49d7a,2023-11-13T17:57:21.990000 CVE-2023-46786,0,0,bf4916e892e13d9bd5f18249e97f7ed4aeb5247f2854f8c308efd96466799496,2024-01-02T22:15:08.210000 @@ -235259,7 +235259,7 @@ CVE-2023-46799,0,0,4361c68cf7b923562592dd8fdbdffd552913294117946ddb972d4a241348b CVE-2023-4680,0,0,5ee0fd366bc4806d601827ec2ac7ea0e096b1e2a942d42496bd5e6c9f4c231df,2024-09-26T17:15:03.190000 CVE-2023-46800,0,0,d52933e53d6d15f5a2eaebc826a5324854d68f2efe77d60c5a7b7fcae21b94c4,2023-11-13T17:57:34.490000 CVE-2023-46801,0,0,4e1a8a1f940de104e1d38238b3b24ce46843f18ab50836a6a35b43390998bdeb,2024-08-01T13:45:00.980000 -CVE-2023-46802,0,0,c0da1cc5144de9428d72b3f4e2aaf6e20b248ee8e4010663f547f245abb34d46,2023-11-14T15:30:13.830000 +CVE-2023-46802,0,1,ba0209fbce9dc51166dfd1f23a6077b1e114927fe03dff63d97130a58e208146,2024-10-29T19:35:13.620000 CVE-2023-46803,0,0,cb9bb8e58cc7d3efaa7032194e8201cb447933fa588b63421b6631ce6a007215,2023-12-21T04:49:22.117000 CVE-2023-46804,0,0,076b3f265bfaa2ea0a3df1bc482a172069ea8f2d8965ae045330a23041a00075,2023-12-21T04:49:19.073000 CVE-2023-46805,0,0,7a9f1e3efe4219f546adedaa2f65c4351ffba57ecf76ecbea9c0806444d5c5e9,2024-06-10T15:39:50.823000 @@ -235279,9 +235279,9 @@ CVE-2023-46819,0,0,b9144c8b43b7e50be02f0a7adb87559b3a81cc8b960f11a9c9b61dc6bebac CVE-2023-4682,0,0,c1c0d3bcf2f406c6bcb06b0a440260f9dabf84e5ad23fa025bbfa655e8c647fb,2023-09-05T16:24:54.687000 CVE-2023-46820,0,0,aa393ad58ea962d201742c7c0922f5354d3e88c5c877ebf040d42c8c1854c0a0,2023-12-06T17:29:13.157000 CVE-2023-46821,0,0,b9ae41bf73dc8c4d515dffe86f079303167a84f4c65b46ae0b6be2ddb87f9d76,2024-09-05T16:35:18.747000 -CVE-2023-46822,0,0,8c05d50ce279914b9368614ca9374ab94d572c57106adaeb969171d9e37b0bc1,2023-11-14T17:05:20.447000 +CVE-2023-46822,0,1,00066216c7e230152e80f56c6c4fcaede6fc32c21c17e455892d56b4e1a8d219,2024-10-29T19:35:13.987000 CVE-2023-46823,0,0,838996d884d75f252032956fee2566dbd07b3e32228ec936beec7708a42ee70d,2023-11-14T17:05:47.417000 -CVE-2023-46824,0,0,e6fd14c677d2928a78738bda0cb11b0c31e9600c7371df7212465bdfb458e0aa,2023-11-14T17:05:13.743000 +CVE-2023-46824,0,1,a73699dea74839d06ed8ed5b64800e4947950fe748ce53a1327f406d500ff704,2024-10-29T19:35:14.480000 CVE-2023-4683,0,0,40cea1dc03eef3e027bc32dd2ae941f65bd936f05a85036cfc49b15f4068841a,2023-09-06T00:16:36.840000 CVE-2023-46835,0,0,25bbc68dc75b3ccf60a7afebb412eded7c69fc7a3dcead527835c06dc08953f7,2024-01-11T15:56:04.093000 CVE-2023-46836,0,0,f5ce4ff90551bdc127de2610cb54770c0ee6eeab88d256f3d330df3bb8f0a1ae,2024-01-11T17:09:02.020000 @@ -240747,7 +240747,7 @@ CVE-2023-6486,0,0,f30b4f91411f6d838e99a6d7d4e0f648fa3f917770bbcb5921078f6f74e39b CVE-2023-6487,0,0,0400727c4be78a4437d7bab9f01463a335bba30bb6a0fbdcf4b814b871937056,2024-05-22T12:46:53.887000 CVE-2023-6488,0,0,69d54387deab2db88978d844ce91bb01950b5f879635a3ee4d2c3e5acadc4ce7,2023-12-22T19:30:36.993000 CVE-2023-6489,0,0,18aabb1d7ecee57048bc26cc9eeba74364244cb824c8d03f99a9ed281d8a1d5a,2024-10-03T07:15:25.407000 -CVE-2023-6491,0,1,6bfbb08fd448511783bd433c7fcbc4b217d245487c97d681d2df06fb699ba193,2024-10-29T17:59:12.477000 +CVE-2023-6491,0,0,6bfbb08fd448511783bd433c7fcbc4b217d245487c97d681d2df06fb699ba193,2024-10-29T17:59:12.477000 CVE-2023-6492,0,0,1851fea27d9ba20b4d9d04875b636eb1c88a0f2bb9cbd0f884c78de5da3ee920,2024-06-17T12:43:31.090000 CVE-2023-6493,0,0,dfdf9a07fa82a52f51f58783c334348e9f4e2ad4cc59d93f5110b998219c24a7,2024-01-10T15:10:40.807000 CVE-2023-6494,0,0,80dcbf3f6d7d049ebe223948e82130bdff4600f7af5680262795b83b3fc9c537,2024-07-11T15:05:17.510000 @@ -241075,7 +241075,7 @@ CVE-2023-6872,0,0,724364bff09a1d79a78aaa45d6fbbf4f971d3441905004df82b74b069e3003 CVE-2023-6873,0,0,49669310eb593a130a8c0b6d9b86743d8b50de862f6be4b06e7aacefd665460c,2024-02-02T02:29:27.507000 CVE-2023-6874,0,0,b82068fd9feb99f841309790de7d0d7de12ec6e8814590c679efe39a2b624443,2024-09-25T16:15:09.773000 CVE-2023-6875,0,0,112ab71dbc43443bd36e485eee215426e7155ea7027f59ddbeb52b546d2a947b,2024-01-18T16:11:25.827000 -CVE-2023-6876,0,0,b4edc77fdd5e36942044d6d3efca301bb94b768849844e07f437166240596220,2024-06-07T14:56:05.647000 +CVE-2023-6876,0,1,4d033e53b46d2da5d8df95ce1df32aaa396a2db776ba4ceacd3cdca88e026f4a,2024-10-29T19:50:53.943000 CVE-2023-6877,0,0,1ba400724cdfa0e83b80abd00aa055ba38b62cc33b1e79011bf973661e716b47,2024-04-08T18:48:40.217000 CVE-2023-6878,0,0,5a09a713291a7fecc8c6ebbbd1d3bd22bb38b4781b78601783e2f3d28f0fb53e,2024-01-18T16:34:53.617000 CVE-2023-6879,0,0,03596d33431c24da355b257a15c25d49d4f1082a2e1fed243b0f4380c2c78fc3,2024-02-02T02:27:15.863000 @@ -241236,7 +241236,7 @@ CVE-2023-7043,0,0,631516d4137929bddc551c24967ad607585a3a4a643a006531f43d1639a14d CVE-2023-7044,0,0,42a96d312ac1ab60458f9e3f29deb24de87d15012229bb07eb2dcbd172c0240e,2024-01-10T16:12:34.983000 CVE-2023-7045,0,0,56f72b8799718b9a57c25f98da5738945d9d62f196c72ae2e5b5400f5c5f902c,2024-05-24T01:15:30.977000 CVE-2023-7046,0,0,1325b623fc707ac674099e6d171e788fc0b1271e372288eb5bdf13523bf4b8ca,2024-04-10T13:24:00.070000 -CVE-2023-7047,0,1,f1965492a368ae5a03391039868b810a276148507878bf44dcae6e2073c1c108,2024-10-29T17:35:02.770000 +CVE-2023-7047,0,0,f1965492a368ae5a03391039868b810a276148507878bf44dcae6e2073c1c108,2024-10-29T17:35:02.770000 CVE-2023-7048,0,0,083baa3f6965f5009fe64187caefcf38bee2f72058b5af742496e5b61251d78e,2024-01-17T22:32:55.657000 CVE-2023-7049,0,0,d1a1bd4afe9a5ad3f4e40bc7a2a260ca6671c9e46632ad87c5a02d99799583f5,2024-08-19T13:00:23.117000 CVE-2023-7050,0,0,4bac6368bd056bdc5019cf32a62705315940d90e07b309dce57a8f7c89dab9f8,2024-05-17T02:34:05.373000 @@ -242382,7 +242382,7 @@ CVE-2024-1007,0,0,bb97efced7fb486712fbb95488bae5086c8742bff2dc7feb7593b966188b1c CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000 CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000 CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000 -CVE-2024-10073,0,1,9ac62420226c9fe9ed2bbe058542cdb11512629d78e7df28a3c14d1c56a17916,2024-10-29T17:18:17.690000 +CVE-2024-10073,0,0,9ac62420226c9fe9ed2bbe058542cdb11512629d78e7df28a3c14d1c56a17916,2024-10-29T17:18:17.690000 CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000 CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000 CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000 @@ -242485,7 +242485,7 @@ CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b4 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 CVE-2024-10266,0,0,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 -CVE-2024-10276,0,1,913e45b2b0c4a67a031924d52b79fd99196e0bfd1eaceb610aead0724000ee9a,2024-10-29T18:15:05.140000 +CVE-2024-10276,0,0,913e45b2b0c4a67a031924d52b79fd99196e0bfd1eaceb610aead0724000ee9a,2024-10-29T18:15:05.140000 CVE-2024-10277,0,0,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000 CVE-2024-10278,0,0,56ee6a4da4de5c0e9a8258a03df3a3a9b6b90c37d9c7631850f400938a22db00,2024-10-23T15:12:34.673000 CVE-2024-10279,0,0,e64edd41252858e04d752ad843858b5ee1ffab4901d78e52b3de9d4b7b86a8b2,2024-10-23T15:12:34.673000 @@ -242557,19 +242557,19 @@ CVE-2024-10387,0,0,12b5ab9fc09cd164a10e40d20079f8a9e53a7fb87af2edbf444782194d8bf CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000 CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000 -CVE-2024-10406,0,0,221a7efead5f27e3b3abc63d9f72684023abd03aeb147fbd02411e40375485fb,2024-10-28T13:58:09.230000 -CVE-2024-10407,0,0,fe69266866e86ba7590c1f8424b338d693842d0572d34bdd87b4403ba0ec28af,2024-10-28T13:58:09.230000 -CVE-2024-10408,0,0,2409a5e34382e3b1590068a5ccd19a88c47a7a15478b9afb8158b8ac25ca3c6d,2024-10-28T13:58:09.230000 -CVE-2024-10409,0,0,a3dce72a2c64f61b442cf462f1a516aa77ed375752ce999f95ab24467f6a929a,2024-10-28T13:58:09.230000 +CVE-2024-10406,0,1,f8d1d6248605ffe4053f9b52a61613e02e78b8c0be64963fa210f6d8ad819ef9,2024-10-29T20:48:36.967000 +CVE-2024-10407,0,1,6c4bf2fe29a2385cba5b2b1ce0bfb1889a0963ac415bea59881bc608a3bd65ab,2024-10-29T20:47:53.667000 +CVE-2024-10408,0,1,7fbd2905356b1f27afe6d22754d2c1171b4e8cd43f2d1e3bec51bca0656a621f,2024-10-29T20:44:07.630000 +CVE-2024-10409,0,1,49d686a87f9f1dfcd8ca8992e61f32fe2ebe9399b353981c3b1a888fa2314f8d,2024-10-29T20:42:02.603000 CVE-2024-1041,0,0,991d5a9e7f9515845650bb9d6b0cbb707e5b40a6073b13e973f0804460a34ef9,2024-04-10T13:23:38.787000 -CVE-2024-10410,0,0,d91908f6182fd9d32c59fd7c1b1f1e6636c65cadd64c890009a253a074be9e20,2024-10-28T13:58:09.230000 -CVE-2024-10411,0,0,30ebe7333454b0eb8b96615f70f49eebb0184c9ad969605854f1b9f633d65022,2024-10-28T13:58:09.230000 -CVE-2024-10412,0,0,03869d7d68edba477f62cfb51f5692dafd623b352bb245247b6d1cd9783f9372,2024-10-28T13:58:09.230000 -CVE-2024-10413,0,0,55d33dff6674b0154ddb345feb0a8418fefdc44987b1502b6f819f5b0f87d77f,2024-10-28T13:58:09.230000 -CVE-2024-10414,0,0,76421d0088308cec05c346897fdb9ce7692718eef7ab4b1b9ec129bfed5916a2,2024-10-28T13:58:09.230000 -CVE-2024-10415,0,0,c52fe306bb5c5d6647f55514f71f5cece55c9bc3a0b78d0097cc65536f9d8825,2024-10-28T13:58:09.230000 -CVE-2024-10416,0,0,9a7d3e0cfc655fabe6bcf7434086a5882b4b75bc7d3e4f90e4a2ac1b6a478d16,2024-10-28T13:58:09.230000 -CVE-2024-10417,0,0,17447b4ad87b7bcf012f172b846b60efc9d4718d7162bd4c062e4bb8c339397d,2024-10-28T13:58:09.230000 +CVE-2024-10410,0,1,f23a146c8ba30c7c4f1de6922cf32a3ed367d37dbbc53cec523a60fffe68b02a,2024-10-29T20:41:20.520000 +CVE-2024-10411,0,1,248609493ca8b5ee30a60712ec7590d803794fdeb0b89c1140be753803f3eb7b,2024-10-29T20:28:25.267000 +CVE-2024-10412,0,1,0f90d03cfda3a90d57cc9b100e29474c6fc7a2aba75bc81d7284080a07ecf32f,2024-10-29T20:40:13.753000 +CVE-2024-10413,0,1,ae819c0715152e055205d603bbfe89b543be560c705f5e267731c8f140fb1266,2024-10-29T20:33:27.950000 +CVE-2024-10414,0,1,6d807c406c4e0718f0927385207ffec8d373fa5e86f076b030983d43288006b5,2024-10-29T20:46:10.327000 +CVE-2024-10415,0,1,0ebf05284c847f6124cab2cfb847bf97ddbc25d2bbbfcb6007c0abdbe1037050,2024-10-29T20:26:06.347000 +CVE-2024-10416,0,1,3ec8abb6a7228db0e4c1e348b0cdc0931d2b22835516288d46bbdcb5891229b9,2024-10-29T20:21:17.490000 +CVE-2024-10417,0,1,b4843604c23fc2c71887b2d39cafd60004ca10533ff69d0aca374bab620a3fa5,2024-10-29T20:19:03.620000 CVE-2024-10418,0,0,f33696c9c3c7d459e1c0f0dfd5dff756bdd6d76592c1cb12d78e482b5a11c95c,2024-10-29T00:38:29.063000 CVE-2024-10419,0,0,65687643a20563eccdc9ddc6bddd7818b35d4f03bc5f4234951494325a2f5475,2024-10-29T00:28:59.117000 CVE-2024-1042,0,0,87dc787933fa568693623eb2222edd1702eaf068420e0f5081ad1d377d2eb6d4,2024-04-10T13:23:38.787000 @@ -242623,7 +242623,7 @@ CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46 CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000 -CVE-2024-10491,1,1,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000 +CVE-2024-10491,0,0,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000 CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 @@ -243219,7 +243219,7 @@ CVE-2024-1685,0,0,52ebc28025f57fba31216035550fa84131fc9d72b996fd38059ce631ee2981 CVE-2024-1686,0,0,19b1055c595cf4b61f35bde97388a645f90f19cd3e3ebab97e4a91bf8bb6f320,2024-02-27T14:20:06.637000 CVE-2024-1687,0,0,2828142cb6b89e2c77cd8d9196f72a118d52ecf8a2ed1bcdb4a378aa1324f571,2024-02-27T14:20:06.637000 CVE-2024-1688,0,0,8850870586d637e2b9ec5592e31d4f62aa6f4d6fc52c3f63c60a5b3439693927,2024-05-02T18:00:37.360000 -CVE-2024-1689,0,0,98072f4a6a343ed888c46d524b0ba2ce391504ceb56efdf42a32930a92f784b6,2024-06-07T14:56:05.647000 +CVE-2024-1689,0,1,1184e4dc30b1b559a3a32407880e328ef89119e720fceefcb2ed3e65bf8f9733,2024-10-29T19:49:01.637000 CVE-2024-1690,0,0,43710398ffbfd97fd2d2298464d22f4652f5075ca69bcdcca56d9f56aad3c283,2024-03-13T18:15:58.530000 CVE-2024-1691,0,0,2ef9826de93209d069c81e6ab358d8eb246774f7a80e6c411cef0c396fac265e,2024-03-13T18:15:58.530000 CVE-2024-1692,0,0,e629a44d67e992e57af157f5aea9a741f288cdc07f581fddcf0fc8e93b27323f,2024-04-01T01:12:59.077000 @@ -243295,7 +243295,7 @@ CVE-2024-1764,0,0,738ad87d60294ab476866e630e3fc0cf64eea72d083d756f17aaf78f284ead CVE-2024-1765,0,0,f39dadb643a5bec889d884a7eb993100eaca0427da6a70914fd30f53f03c22b8,2024-03-13T12:33:51.697000 CVE-2024-1766,0,0,38f0912b19b4ee9ae81b53676b6e5830e7b55be1b35b37ee84ae1276afe50dd7,2024-07-23T17:11:08.703000 CVE-2024-1767,0,0,7395c2b7d4a729a5785affef03d9683ff7403cf9fad3e379a92eafa2f471ac9a,2024-03-11T01:32:39.697000 -CVE-2024-1768,0,0,a13452c7baf7ba94c369fdae54594bf85d851a04306fc375c630d83151591a76,2024-06-07T14:56:05.647000 +CVE-2024-1768,0,1,57fd996568783fe6e7b6835bce433bc8efa05669d3e573d70d99dffac8f7a76a,2024-10-29T19:44:53.940000 CVE-2024-1769,0,0,04498df6e589468446e1a8a9f44ebbdc8bbfb71dd20b9576ca4eef8a5490a2f5,2024-03-05T13:41:01.900000 CVE-2024-1770,0,0,4a17a3189b1e239a46c897807edcc337a09f0aca25d5d06fdeaf35fd7ac4a89d,2024-03-28T12:42:56.150000 CVE-2024-1771,0,0,145e9aa8a8938df0b27d83016a1bd20846fba92bee84097627cff7b74ab18344,2024-03-06T15:18:08.093000 @@ -243503,7 +243503,7 @@ CVE-2024-1984,0,0,0df5f78cf6f051e72d7153fa9aaf52ccd4fe0017e9b67b93f803c09a232964 CVE-2024-1985,0,0,1459c7f573c3744b2b1652f27b199f79aabe6c56cefc45a9b4a45ee58d612ad3,2024-03-13T18:15:58.530000 CVE-2024-1986,0,0,4ef9e64d76ba71a51e1573d6242f316d4be047372da694274254226bd1edf605,2024-03-08T14:02:57.420000 CVE-2024-1987,0,0,2b91c4c5ce2db3d375b6d50c675815de67a5bdbff7288350c4bb1fce6d1caeb9,2024-03-08T14:02:57.420000 -CVE-2024-1988,0,0,141d2676676c3536e4001a4cd859b04eb224aee45152afd8f71b7157c2bb1710,2024-06-07T14:56:05.647000 +CVE-2024-1988,0,1,bddd4a19d3d5b747d7efb7ec2be8e38dae1735c0758d99e06624467851d6430b,2024-10-29T19:54:30.767000 CVE-2024-1989,0,0,03f8d2039b427c1e136e161bfa4ec77f10532a75db9acaa34873bf816fb1a357,2024-03-06T15:18:08.093000 CVE-2024-1990,0,0,7f35438f76cc13c648c19cc21e3dab246731c7cc24946b1e711cf29624b16bc2,2024-04-10T13:23:38.787000 CVE-2024-1991,0,0,99c23c1299b7d5ff644929da36668a8c4c24854fc3a70c6c626bb04cbab5f07b,2024-04-10T13:23:38.787000 @@ -243870,7 +243870,7 @@ CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 CVE-2024-20480,0,0,1929c3dc705e1e48392e67050891180fdb659aa9ab6d1d255c10d5b0e58c773c,2024-10-03T20:07:33.900000 -CVE-2024-20481,0,1,767ae1c0f6a7066da50f07948c514a10ef87b2b329ab72db1baf3efae941c3eb,2024-10-29T17:47:44.083000 +CVE-2024-20481,0,0,767ae1c0f6a7066da50f07948c514a10ef87b2b329ab72db1baf3efae941c3eb,2024-10-29T17:47:44.083000 CVE-2024-20482,0,0,c505bd145f9bf1b6b0a0c01302a4586adad5dfa33086e10ef815e7cb1d8f4913,2024-10-25T12:56:07.750000 CVE-2024-20483,0,0,7bbf4d5b1e3697b5bad7f81531333e630361007007985921b04d8f51e2bedc77,2024-10-03T01:44:17.827000 CVE-2024-20485,0,0,5676d455c5c74a14ae9e8ea761092b4ccea7f25b150dd70cffdd2f214235258c,2024-10-25T12:56:07.750000 @@ -244949,7 +244949,7 @@ CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bc CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000 CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000 CVE-2024-21726,0,0,6323b2b43ac337f244a115fea0a0997a8ee4d7e666452b5dae48b4ac07f1f7fb,2024-02-29T13:49:29.390000 -CVE-2024-21727,0,0,4af573498420db9348e00aac06b95b56a5038edabffc25cb0f25ab9c01be1a45,2024-02-15T14:28:31.380000 +CVE-2024-21727,0,1,2cfa1a63a24a03456c625f31f74d2ce885912143f39c319c4ec56855c86f3f44,2024-10-29T19:35:15.020000 CVE-2024-21728,0,0,6d3de60c64db99ec16689d15b3a09c6273756d73ea66742792a8ee295b84ce4d,2024-02-16T13:38:00.047000 CVE-2024-21729,0,0,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000 CVE-2024-2173,0,0,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000 @@ -246597,7 +246597,7 @@ CVE-2024-24015,0,0,6dd8da6fd758089d629fcd12838913dcde6db052a6374d2b8f5793d22fe99 CVE-2024-24017,0,0,81c6774a56f1a586f4f906f1f0b789f480a61b64162df23776574dcc345f003f,2024-08-01T13:47:23.277000 CVE-2024-24018,0,0,66626bf92ddfad532b99d0b35acef3a9eaf6184c69914a430432ce2d48a53bb9,2024-02-10T04:01:03.227000 CVE-2024-24019,0,0,f7d524e99ee9469f902506a2564eea181d03a93dd9aaf0d0017baf7a52b53e6f,2024-02-10T04:05:08.660000 -CVE-2024-2402,0,1,de84edd7aa83f5c9dfbf4bf08a3744a558172d278922cd4b0bbc8dde752ca26c,2024-10-29T17:35:05.720000 +CVE-2024-2402,0,0,de84edd7aa83f5c9dfbf4bf08a3744a558172d278922cd4b0bbc8dde752ca26c,2024-10-29T17:35:05.720000 CVE-2024-24021,0,0,9ff2fcb0b3f701136e7c1af508590d1c0d49240ce75f0784418e54285102806a,2024-02-10T04:00:25.390000 CVE-2024-24023,0,0,642c4f33e7e273d8ffe2e62be3ad44d72d9be38908b4529fcd373e9d68112f1c,2024-08-26T20:35:12 CVE-2024-24024,0,0,54797987dfab0043520f2b481266093ad88b83f5fdd601dd22b176c0ad5e0032,2024-08-19T20:35:02.680000 @@ -246674,11 +246674,11 @@ CVE-2024-24186,0,0,5a579d13423508550990c499595359bab96d5e71f3e2468ac12440495b705 CVE-2024-24188,0,0,f039657d8a519295dbe9d8b913550e51e3da4171c20796692de50c30be3792df,2024-02-10T04:04:38.810000 CVE-2024-24189,0,0,4341dec91a6c4ea964ce95e8e93498362b7b635156f701f9e5b916d3cca9d99d,2024-02-10T04:04:19.630000 CVE-2024-2419,0,0,5fcca91de88b5162a5d5aeb9dd468155ecc506341b89e036ecb778a50946c5eb,2024-04-17T16:15:08.470000 -CVE-2024-24192,0,1,5f5743ea32ad6f3a178d4076fc71d41014a2b5278f5ece1e273f777397eff487,2024-10-29T18:25:10.853000 +CVE-2024-24192,0,0,5f5743ea32ad6f3a178d4076fc71d41014a2b5278f5ece1e273f777397eff487,2024-10-29T18:25:10.853000 CVE-2024-24194,0,0,6e4b565f8b358bea94fb9302f51a0554b1c64f689126d61ef7288c2abd366315,2024-08-23T19:35:08.380000 -CVE-2024-24195,0,1,699de951a7724eaa9ddff4f109dd98dd6b0da1c456245391dd7c4f18986cf968,2024-10-29T18:24:07.370000 -CVE-2024-24198,0,1,86dfd44006b9adb863db60277804fa4a82e3dd0260045a4e72a376b198931477,2024-10-29T18:45:47.057000 -CVE-2024-24199,0,0,7ba43404c5022da254878ea129b205d46b0f249a8f3526c8415be3cc2a20e0ce,2024-06-07T14:56:05.647000 +CVE-2024-24195,0,0,699de951a7724eaa9ddff4f109dd98dd6b0da1c456245391dd7c4f18986cf968,2024-10-29T18:24:07.370000 +CVE-2024-24198,0,0,86dfd44006b9adb863db60277804fa4a82e3dd0260045a4e72a376b198931477,2024-10-29T18:45:47.057000 +CVE-2024-24199,0,1,956558a019bced3cdab8f2f4bfd9c9e973ec8d8e5d916df7bdc663228c5b2420,2024-10-29T19:26:03.577000 CVE-2024-2420,0,0,13b83832dbf3c227f1bb0a786d7224f8bb2d919ddb4e3730a2d048cbbb3f3674,2024-05-30T18:18:58.870000 CVE-2024-24202,0,0,668325610a66240d6d1186abf034222333d655c33a74fab67ccef821464427c8,2024-08-19T20:35:04.473000 CVE-2024-2421,0,0,d6a9f4a7ca738e43373fd351f7d51d46e3ad2798d84cdbebb07a7724c675a343,2024-05-30T18:18:58.870000 @@ -247302,7 +247302,7 @@ CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac CVE-2024-25190,0,0,c3a0f2b38cd0b3f7473eb6954f63f83b24d13fd5e163be63555d08acedef83ae,2024-08-19T20:35:06.090000 CVE-2024-25191,0,0,a79a6f6dac299c349e2de385c864fbf66ec48043f058d11d55221ed1f7cad150,2024-02-15T05:03:05.180000 CVE-2024-25196,0,0,4e1523df7155bcca6a8e3ac35657f04bf40ec93a62ac21976dc74cbf4e73e9ca,2024-08-15T14:35:01.030000 -CVE-2024-25197,0,0,ca56aa502aafa76f9e203f1bfea1c7e7bb5407645a514e5c3184e8ae0b1b850e,2024-02-20T19:50:53.960000 +CVE-2024-25197,0,1,09c04dd87cf49aaf08dee7921fc40c2dc120e656f8b023eee0243de0913138be,2024-10-29T20:35:16.730000 CVE-2024-25198,0,0,8aa0d37f4bf223abe553de23cb491c2673e155f232b262f589f7488596dbdbf5,2024-08-01T13:47:35.120000 CVE-2024-25199,0,0,d33e75cb185e28214353dae974809449ab7463b45d5a48e92f3050c570cbd3a3,2024-08-29T20:36:17.543000 CVE-2024-2520,0,0,d7b1b472e2762f8919bcba220a7088868d014fda6dad19db1c82e45c5a25eda5,2024-05-17T02:38:16.700000 @@ -247518,7 +247518,7 @@ CVE-2024-25576,0,0,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e8211 CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000 CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000 CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000 -CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8cc67,2024-03-27T12:29:30.307000 +CVE-2024-25580,0,1,aae407d3ca56bd796a76b9a34e38ae064cf192b4e3de93c97edbd1466335c748,2024-10-29T20:35:17.633000 CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000 CVE-2024-25582,0,0,62d9159e0b1a2860275799366d4e29ceadc17aa10726dd8de14b9c6e306d70ce,2024-08-19T12:59:59.177000 CVE-2024-25583,0,0,6e3f5afaa55d00544b0a17a1114934680c9d4fc2071988d62cf80e5688bf7955,2024-05-01T17:15:29.917000 @@ -247601,12 +247601,12 @@ CVE-2024-25659,0,0,88174b778d870fdc12ed643f568e9458232b4f95d93f07523e7da51acad70 CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000 CVE-2024-25660,0,0,ad712a4e222b0c88ffa7f36ff960afdbc7e9f638af83533eaaaec2072a0dad26,2024-10-04T13:51:25.567000 CVE-2024-25661,0,0,d62ae2da0c147daa882078e5dee413b7ca84b663d7dec27b4446fedce1ad0298,2024-10-04T13:51:25.567000 -CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000 +CVE-2024-25662,0,1,860021a3268fdeb6700f9d47623c5b6a1ee6bd8c07c87537de3da50bb2a1010f,2024-10-29T20:35:18.547000 CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000 CVE-2024-25673,0,0,020bf3214c5ffa87859d3ca28dd29461160bdf033b62023050f62c5799071658,2024-09-24T19:08:32.737000 CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000 CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000 -CVE-2024-25676,0,1,e1c339d977188c227b8d7765d78710c2237053c6caa92049e6e94ad2d15a2ce2,2024-10-29T18:35:03.590000 +CVE-2024-25676,0,0,e1c339d977188c227b8d7765d78710c2237053c6caa92049e6e94ad2d15a2ce2,2024-10-29T18:35:03.590000 CVE-2024-25677,0,0,89ae1e71ce0f9721b50106e0a4f1d73d4234e37c3823e6f368eaa275cdd88dfa,2024-02-15T19:43:24.983000 CVE-2024-25678,0,0,73a90dfe7018508f2c5748a1f15a22c5b27a554d514f84b241713ad39d9cc947,2024-02-15T18:45:09.663000 CVE-2024-25679,0,0,336671d7a9b81f2d934eec43295d86632d4115fa00ebe07b3b7b7b64cbb71b0d,2024-02-15T18:44:40.547000 @@ -250969,7 +250969,7 @@ CVE-2024-3017,0,0,b401b23402ebc6f6ec3d2296f1d5b4f9799017607076ff54b8bb3575020024 CVE-2024-30170,0,0,cfe0eb8b7b3f847ca52fcf65cc23d512fa1cb604da9a76e828706eb61b361e3a,2024-08-12T16:13:53.803000 CVE-2024-30171,0,0,a054e0dd8c720b4bdd9579beb1d65acc89fe1ba4a7ad35fbd80151de95e57949,2024-08-19T18:35:08.793000 CVE-2024-30172,0,0,e23d65cae1ab6574d22c6026de16bab78b6c6028b759790600f9957da66d8b50,2024-06-14T13:15:51.730000 -CVE-2024-30176,0,0,b9c656776bec57369b0fb415cb86239071847d4185cfc200250f61ff82ba37c3,2024-05-01T19:50:25.633000 +CVE-2024-30176,0,1,1d8984309d63bbf01c05df243705dbdb40254f70cf0f60e94fe482c994c7a96b,2024-10-29T20:35:19.470000 CVE-2024-30177,0,0,df35a874768fb67f0f9af572132423fb724b172bc8802b6ae0e895e47f280bdb,2024-03-27T12:29:30.307000 CVE-2024-30178,0,0,e2149847254f2db5d78930d249067cc7fe0160a2330b4827a6f115e2e19795f4,2024-03-27T12:29:30.307000 CVE-2024-30179,0,0,cb7c6dc1da1adce19f492fff28986bf11939a7b8d6d8e6a4d7f5a2af32b3b67b,2024-03-27T12:29:30.307000 @@ -253015,7 +253015,7 @@ CVE-2024-32876,0,0,8a2a937b5bb789a06f1b910a6e7251f42791b60b4d46c3846bf785e13f1c5 CVE-2024-32877,0,0,7f7dbd86b3341b766ca5f99c5f601e528712f8c9efd5934029d4fb31e4ebb756,2024-05-31T13:01:46.727000 CVE-2024-32878,0,0,4eb2015e7db57db77c843b6c80b50f5aca6814f486e5f807ded849f6013237af,2024-04-29T12:42:03.667000 CVE-2024-32879,0,0,508c215f23d679b62226be2a6ee13d4db437b14d64001cf50facd812cf5bf65b,2024-04-25T13:18:20.370000 -CVE-2024-3288,0,1,6c2c38160834c2f9324d6f6b0e9d71b9e3f99f123a1f5787e4af8f8df6f900c1,2024-10-29T17:52:30.007000 +CVE-2024-3288,0,0,6c2c38160834c2f9324d6f6b0e9d71b9e3f99f123a1f5787e4af8f8df6f900c1,2024-10-29T17:52:30.007000 CVE-2024-32880,0,0,82299b1373137a25af0fecd2e6ce5b08025fe9939bd4a98c7ddeafbd0e90647f,2024-04-26T19:59:19.793000 CVE-2024-32881,0,0,d8c07ebc677d8eb073520c9ca316aef2ad519bc36edc394076186ae12ed97d2a,2024-04-29T12:42:03.667000 CVE-2024-32882,0,0,8a97faf6ffed5ca47beef857830dc3d4291f8dfdcc63d173b880ecd48671129b,2024-05-02T13:27:25.103000 @@ -254809,7 +254809,7 @@ CVE-2024-35559,0,0,567b6880d14443b1ae9f48b92c8e2230d656fdae8fe7665c8cab362d07c93 CVE-2024-3556,0,0,9787ca18b88896ee1584412198f4dc04ba2a937adc3d7411830de60cf4601cb2,2024-04-09T22:15:07.470000 CVE-2024-35560,0,0,ff151a7a7d20f3bafb68c34544272bf8fe13bc313aeb97863454326a7a0d4ff0,2024-07-03T02:01:52.840000 CVE-2024-35561,0,0,0f98d3d1d82169454df85fa83ca0314a03305baa144f8463e8917c2d376c1b99,2024-08-19T16:35:16.997000 -CVE-2024-35563,0,0,1bfa223c0dfd285b34476b24e0896f1c65800d9fe09bf0f44cc0c8c65f260e6d,2024-05-29T13:02:09.280000 +CVE-2024-35563,0,1,0b5d718b1e25e653141b923cbdd3874a861b09d0e008ed36b66fc9ed1a88adae,2024-10-29T20:35:20.270000 CVE-2024-3557,0,0,9b81ae4b28f3d03624006d648ce1a0a6ebabae2aa06c1a39550ab506cbe47513,2024-05-24T13:03:11.993000 CVE-2024-35570,0,0,dae7b6614707edc42c756e65a628758e946c4b0b202643efae8a8cc65ba64ded,2024-08-26T16:35:08.370000 CVE-2024-35571,0,0,737c2a7f64c2812d810288ac20005c00d1a957dbded3b4f543f336361b86f200,2024-07-03T02:01:53.540000 @@ -255013,7 +255013,7 @@ CVE-2024-35792,0,0,69a47ec5d6102d16ed919d7d14a7dcbee08f69805abd1510100d9a318037a CVE-2024-35793,0,0,3bdab6aefbdb92609dd5d1d2221b1fd9e877cefdad437c4799c3b5ed0e4633fb,2024-05-17T18:35:35.070000 CVE-2024-35794,0,0,98eed75e6df024f22b4bb41a36fc36e3e9baa5185ab79fb95f0f4482b261c48a,2024-05-17T18:35:35.070000 CVE-2024-35795,0,0,c4375eb0dac66668e1eb3c75468506dbe063c57de76a5bbc7908d84ae07fa095,2024-05-17T18:35:35.070000 -CVE-2024-35796,0,0,74cbd11fded89ed9d6321e06de59f211389184a3f8f16441fe6b187f4897965c,2024-06-25T22:15:30.627000 +CVE-2024-35796,0,1,3b5e595bce7b627349554709eb1aaea58d160e31fb28e7fc13ae2746f1a166be,2024-10-29T20:35:21.073000 CVE-2024-35797,0,0,5d191573df70b8ecabb4b3e8db1feb40dcd5737961b1f2da8e55d32c7ff2e1b8,2024-05-17T18:35:35.070000 CVE-2024-35798,0,0,c6621222abaf060f395461638bd7c76ec0183db720d30b3003bc12d1b0276d22,2024-05-17T18:35:35.070000 CVE-2024-35799,0,0,2dce7d3c01c6b462983682ed86f45e0447833392232f61fcdb54d3cb67bf0d68,2024-07-03T02:02:11.170000 @@ -255027,7 +255027,7 @@ CVE-2024-35805,0,0,4db8efd595c906efa1b6dd21031f81afa188386bfc2fb184db688e2540722 CVE-2024-35806,0,0,97a73216f8e91af382753d08bf95024218c539e234800c09e4da10dc347b989e,2024-06-27T12:15:25.303000 CVE-2024-35807,0,0,3f3c2f974fce40f1fcbd170272aeba8dc4fc313794beb371feac21a6ae7c1a97,2024-06-27T13:15:58.810000 CVE-2024-35808,0,0,c81f7c468864ad9441a4ecd8ab81f01f958dec7cb30c2d7e414a30568f81bd8f,2024-05-17T18:35:35.070000 -CVE-2024-35809,0,0,206fe4b4ccbec84f6a586c2fcc9c5f9e44c3b45d2c0272552fdcedcec5ac662b,2024-06-27T13:15:58.890000 +CVE-2024-35809,0,1,0bb559cbd3e66be3480947e5ca36d18307e6987241182b4a63269fe345ebc023,2024-10-29T20:35:21.370000 CVE-2024-3581,0,0,61378f3e5edf5ed6304f4a6f4a61a1e427ba52376086cef730521f61b2b80cfe,2024-05-02T18:00:37.360000 CVE-2024-35810,0,0,88603c9d61934f0a3379a17b2dc9868f3e2e26f40900d2cbcbca6bf7459bc8b6,2024-05-17T18:35:35.070000 CVE-2024-35811,0,0,87e348ad0fbd035fe2a326eab3e392e4fdbfc8662b3bf06f2587bfb74c2faf40,2024-06-27T13:15:58.970000 @@ -255054,7 +255054,7 @@ CVE-2024-3583,0,0,e548e4abe52948e18dfbaf87768dce4dfcbc5130989386239fba7b7693a74b CVE-2024-35830,0,0,18a2e096fdec4bfc99926aa74942fe9187f5b51669df87fe21c69fa44a47be1c,2024-06-27T12:15:25.440000 CVE-2024-35831,0,0,e1fc7f0c23288b900631cc5188ff473f5fa3fdb4e972cc7bfb87b54902c97350,2024-05-17T18:35:35.070000 CVE-2024-35832,0,0,16e51c73c8492f6c41ac59c1b69f8a852bd6d4b4a851405fa3ce91979c7ac289,2024-05-17T18:35:35.070000 -CVE-2024-35833,0,0,1b5bb562fce50c90cd334f090178aeb0b63398e7948f1b11e9b36333324fb872,2024-06-25T23:15:30.767000 +CVE-2024-35833,0,1,8a7ce93b6074a17034d3251969d81f252f037a4b7c0df435d8e44326604c368a,2024-10-29T20:35:21.597000 CVE-2024-35834,0,0,5790f34b9247e53213fb9b46635ec2095a0128f0902ae39f44312cfee4914f39,2024-05-17T18:35:35.070000 CVE-2024-35835,0,0,58305a0718227fa97c3b8c9384433f286905502fca972bf007da6df44a26371a,2024-06-27T12:15:25.503000 CVE-2024-35836,0,0,9b23a77395582da383d04f18fcf78c45edf3e53bc59c70e097e42d6ca3f4fb8e,2024-05-17T18:35:35.070000 @@ -255082,7 +255082,7 @@ CVE-2024-35855,0,0,7a6faf927fecf5745102e7d86df70892c3a7f4ba6df38a0596c046b52575e CVE-2024-35856,0,0,8fc14b612fa10944be756eeb4f8a750a66ffd39dc673285029b906939af7d6ac,2024-05-17T18:35:35.070000 CVE-2024-35857,0,0,4efda8333baf772bcb9392f8fc365b8e3a5a6822945cf1f9837566f081b264eb,2024-05-17T18:35:35.070000 CVE-2024-35858,0,0,bfff27ebcbccba615ef2de828be335ec8f27d10900f72df7d32a4096ec699699,2024-05-17T18:35:35.070000 -CVE-2024-35859,0,0,575ab3323b9ef3767df50f7c8dd71c61dffd012399c618715b7ca890ecafac9e,2024-05-17T18:35:35.070000 +CVE-2024-35859,0,1,7f1678203f81416d98306299e487804408e32f90e9b0a7f3852d96b3f313eccb,2024-10-29T20:35:21.800000 CVE-2024-35860,0,0,a05179b14b1c35d7f803eb738878dcaae93dbf9d67cce34b775ec120657089ee,2024-05-20T13:00:04.957000 CVE-2024-35861,0,0,beb35e0232b4dec0e6df93b5d6912b7c148a747ee2117e6c091e6f8116bc9ae1,2024-05-20T13:00:04.957000 CVE-2024-35862,0,0,92ef56ea802ddc733f0cb1951743baf6a7a656a19a67e36ea14c6fa952167b86,2024-05-20T13:00:04.957000 @@ -255123,13 +255123,13 @@ CVE-2024-35894,0,0,1790b8bdc53af1b32b593033531b9c956bd1f4a63d07b8a3998381f558327 CVE-2024-35895,0,0,c7298cadfd8993347498fa8764731635c42612e209d877b8a7a623f8de654d15,2024-08-29T17:15:07.480000 CVE-2024-35896,0,0,38740fa9e0e28c1998375bca10b45aa3bea5349d16d5bb779072be0a08a5ef50,2024-06-25T22:15:32.433000 CVE-2024-35897,0,0,93dd335f3c661b184a9126ceda6682793e22f6e45c2ebebcb998960eb0c68b3e,2024-06-25T22:15:32.503000 -CVE-2024-35898,0,0,f2046edcf7a6f808589e35b06e7686f88f49d32de2ed71667b4d90ced64d89c8,2024-06-27T12:15:26.020000 +CVE-2024-35898,0,1,c0eb5361e7112dbe2f4302ec6f4972baf895e047a9d3b9255c6942f0ddd60280,2024-10-29T20:35:21.987000 CVE-2024-35899,0,0,4dbe75b47a1246880346d207e2caf3bd12899b72a9fbfa1f3838858346681f0f,2024-07-03T02:02:23.870000 CVE-2024-3590,0,0,ecd599d2024811d7e4dba1970704a54055fa584cc9df087a6b1053a3f8a6a0dd,2024-08-21T21:35:07.913000 CVE-2024-35900,0,0,209f03e2c7f8a26f9615592392c404b536c539af27e1d45bce559140a2f91b57,2024-06-25T22:15:32.823000 CVE-2024-35901,0,0,46a8946b537056fbdf89b6c0c01774a7932e4c39290c8079b2a807551fced0eb,2024-05-20T13:00:04.957000 CVE-2024-35902,0,0,a500266164e7c77ccc8a48349779198ba10d1f10a0a7ef418ed4a8f27509ee82,2024-06-27T12:15:26.087000 -CVE-2024-35903,0,0,0a63295aad896a70b301483e6e615dd74adaee61d9f38f0b6ca4700c5c5740c2,2024-05-20T13:00:04.957000 +CVE-2024-35903,0,1,e255984a41d001eb6bfd032df58a22d561c094d53a462c2e5b737f37bf2a1ba2,2024-10-29T20:35:22.193000 CVE-2024-35904,0,0,ea79ed0d95a37d83239195200e4ae7ee6c42eef52b00985110ada2012a4bfede,2024-06-10T17:16:31.803000 CVE-2024-35905,0,0,93e43682c61b57763cbc7537715adc44dc2fe3faa2cbe0901a05c0373e1ca214,2024-06-25T22:15:32.957000 CVE-2024-35906,0,0,70641f3710ab7a414753b1ae812647e2cbc2c61278b599a8ddd224db78108501,2024-05-23T14:15:10.010000 @@ -255137,10 +255137,10 @@ CVE-2024-35907,0,0,65eb433cee48c7d3f68afefb5a91721bc8d3fa48c6d69a81f6414fce95607 CVE-2024-35908,0,0,ba4b56337c77434a14e66192f3f3f5f114b5b421408c8943fa8510cd10f293b2,2024-05-20T13:00:04.957000 CVE-2024-35909,0,0,82142d3fefd466f7b696860574f7b1aa7595e70c1f779da55c202a317c458606,2024-05-20T13:00:04.957000 CVE-2024-3591,0,0,4f5feabd0ed5cea474d31b0018a5e4c8adefe0e7f6d9b6fdf7ea049c5a0733ba,2024-07-03T02:06:23.340000 -CVE-2024-35910,0,0,87441835190397b42e2e9fb991ea60c459649d57f1078275388fa0ff7eb15baf,2024-06-27T12:15:26.153000 +CVE-2024-35910,0,1,2a1dd431c6d507a5c34626ed2899d0fc43843afa07b29feeacdaa9904a7684e5,2024-10-29T20:35:22.403000 CVE-2024-35911,0,0,27fadd3ce88ab6b4763dc30debe583532163eba8e34ae3377b650b4127b9898a,2024-05-20T13:00:04.957000 CVE-2024-35912,0,0,92dbc5f452d437b2bb7e0b863d5fe5de44086813cb939b9d0e2bce4f50aa0618,2024-05-20T13:00:04.957000 -CVE-2024-35913,0,0,f63206f672163dfa5cdbd23f9f713e59e581422d9b2a95b8dd0df5d59e731ad5,2024-05-20T13:00:04.957000 +CVE-2024-35913,0,1,220fe9065c9da79496da8f0f47af2b430c89c4b49f3239195cac9a423cf69e98,2024-10-29T20:35:22.610000 CVE-2024-35914,0,0,807d953d8d08f072504c4c6ccc17ec8f3981a1368b6dba79340f71aba1e737b0,2024-05-20T13:00:04.957000 CVE-2024-35915,0,0,4b8e80b7e0df701bf5661f81d3a455421f102d76dba1c849ae68cf406ec48adb,2024-06-27T12:15:26.230000 CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a1ac,2024-05-20T13:00:04.957000 @@ -255155,7 +255155,7 @@ CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243a CVE-2024-35924,0,0,b39bdb23f2feb88e9aacc57adc5f27f92b233675c91052df81326e616e9fffb4,2024-05-20T13:00:04.957000 CVE-2024-35925,0,0,30ebc4f343833c76845bb76d8e8f167d70a03ecc8048d80e822269442474294b,2024-06-27T13:15:59.470000 CVE-2024-35926,0,0,6610fe93199f78576a20add5448018d64aee07e0d40a034a20e7a887869440a5,2024-05-20T13:00:04.957000 -CVE-2024-35927,0,0,b1f3f100003003197eb93e58d47e978b1ac2c219cd2f7a93a54003213a938063,2024-06-16T13:15:52.210000 +CVE-2024-35927,0,1,3b680e36b2211e2fd5539e65dd2355e6f9f5c6c6b864b71ee70c6d9f105c0ff2,2024-10-29T20:35:22.800000 CVE-2024-35928,0,0,102385c7f1bb504005c44f5f2c1aba551e6d0cd1f1d9993e2061a484da552bfb,2024-05-20T13:00:04.957000 CVE-2024-35929,0,0,73a993ec997c53ff6a6460308b2bfb68053392ab54cfba7f390232cc5635dd25,2024-05-20T13:00:04.957000 CVE-2024-3593,0,0,947085007226fef01cc2727961178192187496061ab2fede3d06a29a222ce50d,2024-08-20T20:40:37.603000 @@ -255206,7 +255206,7 @@ CVE-2024-3597,0,0,75a7819de93664529fde26d6546c7502e2875af3213925a87bf3c85f5cec0e CVE-2024-35970,0,0,f412b0fc32058b1c3254455ca20439b7bcea99cc8d63c3a4fb8f474b7a6fa77d,2024-05-20T13:00:04.957000 CVE-2024-35971,0,0,f6116ac7ec424eec70e9f8f9696fd8cc3c252a3be88ce23a3aea15911b12a4d8,2024-06-10T18:15:35.383000 CVE-2024-35972,0,0,f2192d50ea420577056b9a7c4e781e3b14a7a9d14514af3e2b89df5bf9f73d9b,2024-05-23T21:04:02.433000 -CVE-2024-35973,0,0,25403367b0e182ac705d9f8ba46554a73ec7a21f4fc5b515da785bb1718ae1b2,2024-06-27T12:15:26.977000 +CVE-2024-35973,0,1,eaf9ed5e646d8003c116c8b7170d56b77dd5eb54181f3d07f2961525913c35cc,2024-10-29T20:35:23.003000 CVE-2024-35974,0,0,e6129042cabc8209035f22f4edfbecdf4cb9a6f04084052e20017c7cfcf82ac4,2024-05-20T13:00:04.957000 CVE-2024-35975,0,0,3b1807b80c7d5103a6fd5965441a190393709f477eef6d8f664c5038026f650a,2024-05-20T13:00:04.957000 CVE-2024-35976,0,0,a1c7ae1a2e94c6eb8c6b7cc9e8bc855cf953cbdd2c589a0bd19a73cc11e0717c,2024-07-05T08:15:02.450000 @@ -255220,7 +255220,7 @@ CVE-2024-35982,0,0,efe5f8e92e1dc23047935b9e354b4d469c0a950d6b8c98030e7d193da70f3 CVE-2024-35983,0,0,6461f6fdaad6f0beb8c8b3a14e5d847b85c51243d9c2c591735010f063d6c283,2024-06-25T23:15:31.383000 CVE-2024-35984,0,0,1637c74ee99d5901382398c913fe8306241f687b3774dab2a00b574556916fb7,2024-06-27T12:15:27.137000 CVE-2024-35985,0,0,6a0ec59d3e51fdf53bb1ddc338ad85428352a8c3d8fca537814e3edb294fddb5,2024-05-20T13:00:04.957000 -CVE-2024-35986,0,0,1de44beca75ed80335049c88b888442cd0f49b6236c886b1098ef04a944bef67,2024-05-20T13:00:04.957000 +CVE-2024-35986,0,1,233bf34b93f6b6b3cb174407b52ced003b0cd3d3120afc7209f6ec63dacd4e33,2024-10-29T20:35:23.230000 CVE-2024-35987,0,0,6cfebc44336088901ce4a0eaab623f6c781664328e18b6c07774b9d25b96510a,2024-05-20T13:00:04.957000 CVE-2024-35988,0,0,9e4aa3541b4f8c9746b0897daa431b666a7015d508272fc87df5f96bb5f44395,2024-06-25T23:15:31.573000 CVE-2024-35989,0,0,46abdcb76a249c82abe2d123fbf3f5ba6c783f37da81b575ca0e9ef075bb8c78,2024-05-20T13:00:04.957000 @@ -255234,7 +255234,7 @@ CVE-2024-35995,0,0,522f1c2f82c6dbd97dd7208350660f7b316943cdbac4894f26337a8c6db98 CVE-2024-35996,0,0,eebb1e2ad99f3c58ace711a07a05c981b269971bdf03e926d4967e7b6bd58eea,2024-06-25T22:15:34.480000 CVE-2024-35997,0,0,3aed6129e9a81f4a2f88008deb262317e454a81e54068a57ef6255c0d5dfb98a,2024-07-03T02:02:34.990000 CVE-2024-35998,0,0,1d5b21aca629cec1a1ce09bafe11bb92a432ede50bbe890b50a370c21f70896b,2024-05-20T13:00:04.957000 -CVE-2024-35999,0,0,68a9efe4c9dcf63cf64db5280a1e29408393bd34029716fc783e2f74d6e1b6f6,2024-05-20T13:00:04.957000 +CVE-2024-35999,0,1,d427963a76af12f7e91c064e8621c6c4898f4daf7685113ff44ee6156b3c52ef,2024-10-29T20:35:23.460000 CVE-2024-3600,0,0,31c2a10e262713845affd371cfe54a6d7328d52233bee0f893bebf2dc3865f82,2024-04-19T13:10:25.637000 CVE-2024-36000,0,0,5ae6e86e7694236fadca84cbf7f8aa0519cd85ab88b8c1493687d0ef9653eada,2024-05-20T13:00:04.957000 CVE-2024-36001,0,0,b156b2eb6af10f83da0fdd89e42c2b09b4fa8e94b0d2691d2c7b7819718813e8,2024-05-20T13:00:04.957000 @@ -255632,7 +255632,7 @@ CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14 CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000 CVE-2024-36517,0,0,f6ee0eedf2e64a55166ea4be64f622599a7d65058d16696b7490edcac4631238,2024-08-27T13:29:02.527000 CVE-2024-36518,0,0,064cad3de67032c4f830b8ce3196cfd8df79e51094d50317231dcf250dd1a617,2024-08-12T13:41:36.517000 -CVE-2024-3652,0,1,75034171ecec6977e07b3b6c2d385dadd9a9e6c86e2ca512d7ca4524455b812d,2024-10-29T18:35:08.263000 +CVE-2024-3652,0,0,75034171ecec6977e07b3b6c2d385dadd9a9e6c86e2ca512d7ca4524455b812d,2024-10-29T18:35:08.263000 CVE-2024-36522,0,0,86674e42114231d1026f4ff35fe6fe6affeea594b7c00b1a81ef4e17dc0fe83d,2024-08-01T13:52:58.033000 CVE-2024-36523,0,0,509aa41f79d639bcf8d1da94de1df3fba083ad2047ce4b8c7f980f34318ba2c7,2024-09-06T17:35:10.403000 CVE-2024-36526,0,0,1ddb30b565e6d7a152e00264224393d020c0bb948b7f968c326e2d1f8170cd41,2024-08-01T13:52:58.227000 @@ -256451,9 +256451,9 @@ CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 CVE-2024-37844,0,0,e92866aea9b310ce4b128c5f2fa285465297f99b6b41a105e42d6be7945f9dd4,2024-10-28T14:35:11.803000 -CVE-2024-37845,0,1,2fbb245c05e69100edbeb6bd8d6ef93427bfd7db32c67bd81b3947a76ff82479,2024-10-29T18:35:04.397000 -CVE-2024-37846,0,1,0a771dd4297ecb7d6b521e019dc9e4e37262258e8937f6940b3754658324b8b2,2024-10-29T18:35:05.693000 -CVE-2024-37847,0,1,4a1f07d2568b8def7f98c67a4d243c1afbe30f9de21a43af0fc95c8f1b1da6c5,2024-10-29T18:35:06.983000 +CVE-2024-37845,0,0,2fbb245c05e69100edbeb6bd8d6ef93427bfd7db32c67bd81b3947a76ff82479,2024-10-29T18:35:04.397000 +CVE-2024-37846,0,0,0a771dd4297ecb7d6b521e019dc9e4e37262258e8937f6940b3754658324b8b2,2024-10-29T18:35:05.693000 +CVE-2024-37847,0,0,4a1f07d2568b8def7f98c67a4d243c1afbe30f9de21a43af0fc95c8f1b1da6c5,2024-10-29T18:35:06.983000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 @@ -256993,7 +256993,7 @@ CVE-2024-38472,0,0,0483e32b4907ebc7f547fb87caf5b24bef6a9183e30ea4e30b4ad6dc0faa9 CVE-2024-38473,0,0,36c5b6d67728da1356289c3874d586ffc56f76a7fbb2f457e14a9e4a12de691d,2024-08-01T13:54:52.397000 CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f2035049e0,2024-08-21T15:03:30.407000 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 -CVE-2024-38476,0,1,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 +CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 @@ -257961,7 +257961,7 @@ CVE-2024-39866,0,0,0bddfcc7166db633e0a49dd296f68c67d479c22344839cf47c4ff170603ef CVE-2024-39867,0,0,e0b523c69bf41895d3df037f6b822ca9285a09b8d9cfe0acfc9c28f6f1b409a8,2024-09-09T15:19:17.710000 CVE-2024-39868,0,0,78ccb1e363b02e6a5457d10d342090c91e1ddd9c3baeb364919e295c1513db63,2024-09-09T15:20:25.113000 CVE-2024-39869,0,0,2a98a7966dea8b84e0420990ca6ca60d60610e5bb2ffa0b0ee856d0ac6bd32db,2024-09-09T15:20:59.443000 -CVE-2024-3987,0,1,6e75bcf458cbd86b744a3128ca96cbf4d5aa90652e310d97d76d92283acdeb7c,2024-10-29T18:39:09.830000 +CVE-2024-3987,0,0,6e75bcf458cbd86b744a3128ca96cbf4d5aa90652e310d97d76d92283acdeb7c,2024-10-29T18:39:09.830000 CVE-2024-39870,0,0,f4f5a1b62a4e2b774cca66ba202d2df839e4383c1fab2dd1630fb0ec5e81e380,2024-09-09T15:21:43.183000 CVE-2024-39871,0,0,e3e081733d59550559abd98a1a1d3b568ae09bad776342114b1a824ad3292212,2024-09-06T18:32:01.667000 CVE-2024-39872,0,0,574f41ececf7bb009ac85776aa8f840f96c77ee6418907d60f3992a2c5c0d4e8,2024-09-09T15:24:26.130000 @@ -258233,7 +258233,7 @@ CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca6842 CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000 CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000 CVE-2024-40616,0,0,f080804a22bb99d6bad6cefea7d430cb07b5ac0dbf796cced63e81300b3d547a,2024-10-14T15:15:13.407000 -CVE-2024-40617,0,0,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000 +CVE-2024-40617,0,1,7cdccc58c01766374bd7c6a73be1693c863ace2ede90aeba01b265449e2e4031,2024-10-29T20:35:23.730000 CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000 CVE-2024-40619,0,0,71752a5fbb09ad3b98ad49ccde5e7b24e7278b9eb9f9bc361b3decfc42effc78,2024-08-15T13:01:10.150000 CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000 @@ -258351,14 +258351,14 @@ CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9a CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40790,0,0,f74af1b6450b7abb69693b13c877ce53db126e23128080b9a116672c6aa27da8,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,1462bf4b5845ed6535d6a4bb5a36a3a889e0ddd7f70e74baa361a7ba6c70fe5c,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,1,a2585380a94744be6a95f288afe3479213e76d2dc54ce4f58c8ac2539e20051b,2024-10-29T17:28:34.383000 +CVE-2024-40792,0,0,a2585380a94744be6a95f288afe3479213e76d2dc54ce4f58c8ac2539e20051b,2024-10-29T17:28:34.383000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 CVE-2024-40796,0,0,167dda6d5b53df5808d22d86ff64345a4ddef11147328dbbb9b5e6428b829c22,2024-08-23T15:11:50.193000 CVE-2024-40797,0,0,722094ea7afe1c9bd51e5d92c4b0c3521881889694d8585ed72d7a43304febea,2024-09-24T15:58:56.083000 CVE-2024-40798,0,0,6d1152787dcea537c7e301ba90812de2a5fee24ebce973ba886712a223c78f27,2024-08-23T15:10:16.290000 -CVE-2024-40799,0,0,30d98ec87bf2d9634952ceda39a0df401d585b86f88feda233e1fd632794577c,2024-08-23T15:08:08.647000 +CVE-2024-40799,0,1,24ebd93d929e5635fadbdf9008510cede3a78d8dca8823a269d114179d61aaea,2024-10-29T20:35:24.660000 CVE-2024-4080,0,0,3208a4e2c1701a8955389b97eb99ba9a08ddab88da9fab5dc755bfee24643da9,2024-09-05T17:16:23.233000 CVE-2024-40800,0,0,8982c6397894b1dc7853d99d7f7ed84917fd2baa65d0f955e452134c8e783d29,2024-08-01T13:58:06.780000 CVE-2024-40801,0,0,52beb350edba65ec03038f81a4d6fde1d93b820d94c1009c48668f7e4376051d,2024-09-24T15:43:37.490000 @@ -258411,10 +258411,10 @@ CVE-2024-40847,0,0,ac34ef361fd419d2c48bb6c61015668892d59a23316cf5cdc2086e1759e39 CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d92f,2024-09-24T15:57:03.893000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000 -CVE-2024-40851,0,1,d166c2651cf2b1d0771f62424448f43af8bd64c88c74e8ac42bdfd1d1ad76720,2024-10-29T17:42:35.217000 +CVE-2024-40851,0,0,d166c2651cf2b1d0771f62424448f43af8bd64c88c74e8ac42bdfd1d1ad76720,2024-10-29T17:42:35.217000 CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000 -CVE-2024-40853,0,0,1edd93b2cd04ef970830591d2fe9edf915eff310e2a5aa02f2d62ec6f87bce5e,2024-10-29T14:34:50.257000 -CVE-2024-40855,0,1,90f4bd8e2db22cf8648d6901c6c3a67ee009b99fe00cc69ba2463d3c3905a513,2024-10-29T17:42:18.573000 +CVE-2024-40853,0,1,8b571240b2aaeae983c05f75ab22f4e2c4695165f3df0121995d9ccc6e81c7ac,2024-10-29T20:35:25.610000 +CVE-2024-40855,0,0,90f4bd8e2db22cf8648d6901c6c3a67ee009b99fe00cc69ba2463d3c3905a513,2024-10-29T17:42:18.573000 CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000 CVE-2024-40859,0,0,e6bef66eff66d00ffd29922d241a25fd31e85836830114d7614152c90136861b,2024-09-24T20:31:34.780000 @@ -258425,7 +258425,7 @@ CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe8 CVE-2024-40863,0,0,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000 CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000 CVE-2024-40866,0,0,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000 -CVE-2024-40867,0,1,418d9aef813de30f90d877d2952e25f28770cbde3e1a9bc98675621dc13ec6bb,2024-10-29T17:41:59.300000 +CVE-2024-40867,0,1,47c9003dab5bf582ee4d8f19bcbfedecfa4c1a2eeedc52908a3ff5c5617344c8,2024-10-29T20:35:26.040000 CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 @@ -258901,8 +258901,8 @@ CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d4 CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a574,2024-08-14T18:13:25.017000 CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 -CVE-2024-41617,0,1,61baa558004fe3e2a94e7dd33896f0442316de7e93851c52a26c6fa34b5b1e13,2024-10-29T17:35:07.133000 -CVE-2024-41618,0,1,8623058b3efd2e6d61642d389eedf719180dd306bd54a3511e002fca28168d4f,2024-10-29T17:35:08.150000 +CVE-2024-41617,0,0,61baa558004fe3e2a94e7dd33896f0442316de7e93851c52a26c6fa34b5b1e13,2024-10-29T17:35:07.133000 +CVE-2024-41618,0,0,8623058b3efd2e6d61642d389eedf719180dd306bd54a3511e002fca28168d4f,2024-10-29T17:35:08.150000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 CVE-2024-41622,0,0,44ca2934b754519243a779c6615220559421c07f2d4e7de3fb58db6e584b3b36,2024-08-30T14:55:54.423000 CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000 @@ -259599,7 +259599,7 @@ CVE-2024-42504,0,0,73b4e7fd81224455554066b5ec07433b0220ee7fb806342f0ac7873775612 CVE-2024-42505,0,0,2fcd58f857ce6c82725ed74b63d72047c82b9583f361cc1246e436db45ee28c1,2024-09-26T13:32:02.803000 CVE-2024-42506,0,0,a50836bc4b1264acacafbcc6caa08df43b3dfb5e0abc0c4e6db32750472d07f5,2024-09-26T13:32:02.803000 CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb509124921a9,2024-09-26T13:32:02.803000 -CVE-2024-42508,0,1,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7cd6,2024-10-29T17:38:49.330000 +CVE-2024-42508,0,0,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7cd6,2024-10-29T17:38:49.330000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 @@ -260653,11 +260653,11 @@ CVE-2024-44116,0,0,f539024555f2c30aff387b07786f96ec82aa197562db4318d2a4d0edb7b50 CVE-2024-44117,0,0,e1e7d2c07b8cb4271ea5948f1fafb7d04df2168a6fe40662a14c8cff93dd2ef2,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 -CVE-2024-44122,0,1,1e9fa52c3aa8426c7e5b8d77a9c61659bbf7250c9743ea15e0507a8d110f05fc,2024-10-29T17:38:18.457000 -CVE-2024-44123,0,1,88d0bce5752b63476feb00eb01b30d0d91ea73a13fa7bca943baa86634d2287a,2024-10-29T17:37:15.990000 +CVE-2024-44122,0,0,1e9fa52c3aa8426c7e5b8d77a9c61659bbf7250c9743ea15e0507a8d110f05fc,2024-10-29T17:38:18.457000 +CVE-2024-44123,0,0,88d0bce5752b63476feb00eb01b30d0d91ea73a13fa7bca943baa86634d2287a,2024-10-29T17:37:15.990000 CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000 CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000 -CVE-2024-44126,0,1,e3f13534f1bb95a079835f7c6785dffc552a7bdc61a3a3fa27781c0dd79d152d,2024-10-29T17:35:48.850000 +CVE-2024-44126,0,0,e3f13534f1bb95a079835f7c6785dffc552a7bdc61a3a3fa27781c0dd79d152d,2024-10-29T17:35:48.850000 CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000 CVE-2024-44128,0,0,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000 CVE-2024-44129,0,0,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000 @@ -260668,11 +260668,11 @@ CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000 CVE-2024-44135,0,0,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000 -CVE-2024-44137,0,1,a1303ac7097be287e1eaadfa4d5badf532f6156271b2f456a656e51bb1656681,2024-10-29T17:35:23.423000 +CVE-2024-44137,0,0,a1303ac7097be287e1eaadfa4d5badf532f6156271b2f456a656e51bb1656681,2024-10-29T17:35:23.423000 CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,57715e2d990f9d527737048c7f2d3ad8cfd6106560321ec000dbd72a512ea712,2024-10-25T12:56:07.750000 -CVE-2024-44144,0,1,9f7daf7d2cbfe1fd78cead72648026b3b7c156cb5bc9c8b929e32f9d13902247,2024-10-29T17:34:55.923000 -CVE-2024-44145,0,0,61196886e731f714891067a20c53eefb6667f07cb96b5fcd610eb0fa4c068181,2024-10-29T14:34:04.427000 +CVE-2024-44144,0,0,9f7daf7d2cbfe1fd78cead72648026b3b7c156cb5bc9c8b929e32f9d13902247,2024-10-29T17:34:55.923000 +CVE-2024-44145,0,1,53605ebdf8625a251b92e11ea3f86db7df3839bbf6de917d2345b674349215e6,2024-10-29T20:35:26.280000 CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000 CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000 CVE-2024-44148,0,0,059ce4bebff22300cb485a8cc23c3238cb5bdcfaba9ac22cf4f5aea163483afa,2024-09-24T16:09:49.490000 @@ -260681,11 +260681,11 @@ CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb218 CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000 CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000 CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000 -CVE-2024-44155,0,1,bc69f7eda0ccc25d9ce40996abffd50dd53eb3f764e8a2b160a1b820e4079129,2024-10-29T17:34:16.487000 -CVE-2024-44156,0,1,c7b3823189e90823d63dfcd6d29d891ddc5936a4d7c2355696b7ee8e9b86261b,2024-10-29T17:33:51.597000 +CVE-2024-44155,0,0,bc69f7eda0ccc25d9ce40996abffd50dd53eb3f764e8a2b160a1b820e4079129,2024-10-29T17:34:16.487000 +CVE-2024-44156,0,0,c7b3823189e90823d63dfcd6d29d891ddc5936a4d7c2355696b7ee8e9b86261b,2024-10-29T17:33:51.597000 CVE-2024-44157,0,0,97a910630a3e98feb305f0a101a5c0c80098e87c8c858ed1c75250af3ffe7b5f,2024-10-27T02:35:03.400000 CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000 -CVE-2024-44159,0,1,112c99577483027f4f4d46361803a0ef723bdb32f41c221ffcbe92ee2303dbad,2024-10-29T17:33:37.147000 +CVE-2024-44159,0,0,112c99577483027f4f4d46361803a0ef723bdb32f41c221ffcbe92ee2303dbad,2024-10-29T17:33:37.147000 CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000 CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000 CVE-2024-44162,0,0,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000 @@ -260699,7 +260699,7 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 CVE-2024-44170,0,0,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000 -CVE-2024-44174,0,1,d2cb0e7ad84890f6139370595ba064d76537c6c7d2d5c9be0cdbe685157f9470,2024-10-29T17:33:16.540000 +CVE-2024-44174,0,0,d2cb0e7ad84890f6139370595ba064d76537c6c7d2d5c9be0cdbe685157f9470,2024-10-29T17:33:16.540000 CVE-2024-44175,0,0,0805e9680cd4598d38e2619ed87e7fe43d1a4e74e8e872e4630253007f322a07,2024-10-29T14:34:50.257000 CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000 @@ -260730,23 +260730,23 @@ CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2 CVE-2024-44205,0,0,e33dfb139154886257e161081c01cc4f82c900563ff347637d97391b0de316f3,2024-10-29T15:27:08.630000 CVE-2024-44206,0,0,0dee03077037b5bedfd5810735cd4c9d1f4f0ec504b17081ef96258683a63d8b,2024-10-29T15:31:02.493000 CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000 -CVE-2024-44208,0,0,d9c90ab83e9966704661dc1dbbaf16880493e16688d4cb3e4d97fb1b40b33aaf,2024-10-29T14:34:50.257000 +CVE-2024-44208,0,1,1be70d7561ee435c2d0f8e81dc051c8c001e4fcd1cadd09db81bc9c1630bcb7e,2024-10-29T20:47:09.883000 CVE-2024-44213,0,0,8f3af05cc28637515ddd7c72b05e054e2da62bf3199c29442c79bb3fd6a47a3a,2024-10-29T14:34:50.257000 CVE-2024-44215,0,0,857f244c4b6f0129b65da808880593dd1da0efe0b6a97e93140557ee3b01e4f9,2024-10-29T14:34:50.257000 -CVE-2024-44216,0,0,8a22d717307edd2963aefe79220e9b12f1b5e7d0db9f246878930d2be4e96b9d,2024-10-29T14:34:04.427000 -CVE-2024-44217,0,0,8b60f51ef8644c438039e06b8992ee66edeebbbd14221559db35349bd3ce234e,2024-10-29T14:34:04.427000 -CVE-2024-44218,0,0,5e78ad3891c577ae40b5b1c743613204fd22830c4fb22669ad5665bd144df815,2024-10-29T14:34:50.257000 +CVE-2024-44216,0,1,de6ac6e9b2d69b5b6744c8356c035a6b7070bb6dd38f2674516e3ca7750277fb,2024-10-29T20:35:26.520000 +CVE-2024-44217,0,1,ab4aae72c487ef9961bd4471dfdd070d691c131f2334ec94271933c28ef8ef43,2024-10-29T20:35:27.313000 +CVE-2024-44218,0,1,0577675dc967a8af0ba8199d6549acb67fb12345391312d52db564fcf4863868,2024-10-29T20:35:27.533000 CVE-2024-4422,0,0,19c238465441950f6a856008185dbc8a7b4e94407f1040ce4816040c86860490,2024-05-30T13:15:41.297000 -CVE-2024-44222,0,0,430e43230c18cb76b0c6a5776e43d6984589993d5e4e16522b5e6f96310d424e,2024-10-29T14:34:50.257000 -CVE-2024-44228,0,0,b4ec0c286c90b7d110826c3e3050b88cf72adf886ea6358e084ef440fad91f6c,2024-10-29T14:34:50.257000 -CVE-2024-44229,0,0,0d821d59fa68c4f6699d76b52e3fa7165222d86e16164a61bb15f4854a8f65fe,2024-10-29T14:34:50.257000 +CVE-2024-44222,0,1,6876cf4f9ef2e09faf0fff40698500ab66abf0475d8e16d35fa6cdc8f22a00f2,2024-10-29T19:35:15.710000 +CVE-2024-44228,0,1,fe7edec8c83c3f0586e9f6a97768d2ff14a75aa7bfd4217491cf596d00d7ae54,2024-10-29T20:42:04.980000 +CVE-2024-44229,0,1,483751ba3a78008ca9cdefaa93b030d21f07bb61d9a8246d7e7aaca1d2ddbde8,2024-10-29T20:38:30.203000 CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 -CVE-2024-44235,0,0,286733f8c5a68de9c8fb971876ae84b3c9daf32f559dc19006287da0e5f6f126,2024-10-29T14:34:50.257000 +CVE-2024-44235,0,1,bff9483ed01f45367c2cc53c10da12b8ef5b3cc5871d67ec16f360502d98ebcc,2024-10-29T20:32:46.747000 CVE-2024-44236,0,0,63dc023055d62715d02d7757545e9c305c5de9f2e48481980e7aa98b7bee53e9,2024-10-29T14:34:50.257000 CVE-2024-44237,0,0,67841c059fe7a0535a392295730ef15e50508d709ee3c5904a837cd50e2c0c32,2024-10-29T14:34:04.427000 CVE-2024-44239,0,0,6572c4bd50e97c915779c9681dec90ff254e0ffa6df2363add5efde003d61b9f,2024-10-29T14:34:50.257000 CVE-2024-4424,0,0,f0ec85c26b242f03f1dda01796c703344a9d3cb93681b5b37fa83e955b9558c1,2024-05-14T16:11:39.510000 -CVE-2024-44240,0,0,185e7fe99a086851f3813e2fc4dba328997e038ef58b8ffee754df543f88d5e3,2024-10-29T14:34:04.427000 +CVE-2024-44240,0,1,e5ba92ee4549f224efe1d86523187caae6bf204f299f708564698d6b997335ba,2024-10-29T20:35:28.870000 CVE-2024-44244,0,0,30aeed51fbbfd226df0eec4456cf731bd27b2cd7c71970d76a2ba0b7d174b801,2024-10-29T14:34:04.427000 CVE-2024-44247,0,0,d7b92efdaa300dd98e4987c2d8849c05e732d8243dade9113cd309b9e95e3b2f,2024-10-29T14:34:04.427000 CVE-2024-4425,0,0,42da9fd06b4c286cf2ec4b279ef4c006e94043f167bd5abbfb6b02300a24e0e6,2024-07-03T02:07:33.267000 @@ -260755,15 +260755,15 @@ CVE-2024-44252,0,0,1f56156c1b3504c9e6ce29efa3aa1850aadb21fc5cc83f9d279e387e16772 CVE-2024-44253,0,0,9dfc45ca17e6731fbad34191bc8c6dd082b2ad98644cfc4500dc83643e48425f,2024-10-29T14:34:04.427000 CVE-2024-44254,0,0,9ffc01c4a01fb0cf2dfa1b937b902fdcdac883a07b08df9e5c9982b891104dde,2024-10-29T14:34:04.427000 CVE-2024-44255,0,0,c293b56d90061943fca03b3c22094ae16c5cc4b9fe38c830f913fdf59fc5c0ed,2024-10-29T14:34:04.427000 -CVE-2024-44256,0,0,98d942d6a9d59f1af584e5bd1bc5f9388bafd2b33f312fa8187b69e94e48ace6,2024-10-29T14:34:04.427000 -CVE-2024-44257,0,0,6bba3e0f67307ea0c3e8120f777b72620e4f81e0e2ecd0184d7952182961a617,2024-10-29T14:34:04.427000 +CVE-2024-44256,0,1,17aa03a2ed4c3fc9cc6050efee4584273e8e878058b24cc398dd2574b5d0db34,2024-10-29T20:35:29.053000 +CVE-2024-44257,0,1,fbfaa04f8cbb781c7b5c9b4d7e31917aa6b40ea53153adf50b1bee22b30132a9,2024-10-29T20:35:29.240000 CVE-2024-44258,0,0,cc430542de7d98821c8b71a980b44111ab28852dadd6ee720ceb482eaccacf5c,2024-10-29T14:34:04.427000 -CVE-2024-44259,0,0,b33d61ba14321cd629b5384b5755a71fd96b24fb8d98530def81d7b250119a8e,2024-10-29T14:34:04.427000 +CVE-2024-44259,0,1,ce7a8ad9bf785acb9cd01af90d551bb64d7edd64e3b0715f9f2b8aaf16a448ec,2024-10-29T20:35:30.023000 CVE-2024-4426,0,0,438c7e77bba5537169c045ba2dc210873849174945e68052d5a8bbbd94b93b11,2024-05-30T13:15:41.297000 CVE-2024-44260,0,0,52cd827ed188e2ba87c94f3763c13e0c3db6d730465a38e348b9fbbbcf519ef7,2024-10-29T14:34:04.427000 CVE-2024-44261,0,0,22fd5a823bbc562d733fa25b554334b6c66a67b7c9a20626885d5951caa0d590,2024-10-29T14:34:04.427000 CVE-2024-44262,0,0,1e84b5b5e920ae0a5d39bb092052fca1937f3b656c20347fc26958279d3169e6,2024-10-29T14:34:04.427000 -CVE-2024-44263,0,0,136e35ae5da9571910fb8139bfedb30afe70554d37ea2b002ad552501aa73d5b,2024-10-29T14:34:04.427000 +CVE-2024-44263,0,1,a819848c86eae35a801a866c7cc8c7d5416433f8b99a5a8aa14e7494fd1ec8c4,2024-10-29T20:35:30.263000 CVE-2024-44264,0,0,373b827613c9a9c7f3a770e81e0fe9608c0c7e87e15a1473f6a79c0a693604a6,2024-10-29T14:34:04.427000 CVE-2024-44265,0,0,15fd2e5ab0bd9692c8b85fcbfa245a300e35e9c55661f38c9ca204f7cedba610,2024-10-29T14:34:04.427000 CVE-2024-44267,0,0,f5c2dfd9358b1edbc0f2868c6f458bbbeb2bb0f961b2dba9781285f6322034e4,2024-10-29T14:34:04.427000 @@ -260772,7 +260772,7 @@ CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666 CVE-2024-44270,0,0,fa1da7541e315914d13db03404f7944f7fff55d48c82c634d2d8fa5d00e47e2f,2024-10-29T14:34:04.427000 CVE-2024-44273,0,0,11a628ab450ae1f43cfd6e9012e9c8730804b871d63d3b05a279a1370eed85aa,2024-10-29T14:34:04.427000 CVE-2024-44274,0,0,7042f1a17d79ad7857d5d12b1176335958b275fae27c4e0945876e2b01ab9aec,2024-10-29T14:34:04.427000 -CVE-2024-44275,0,0,77f960a6c909a3fb64168321393f7fb91df2928e5a403ea1281205d85c48e809,2024-10-29T14:34:04.427000 +CVE-2024-44275,0,1,d8e06bb43c158fcc4281797d1ccceef0155ebbbf771c23024f0bfd1184657b41,2024-10-29T19:35:17.777000 CVE-2024-44277,0,0,fe261596084ebbb2024c9ef906f0ef31586c9b779d9ed86fafd7c7620d98c2d1,2024-10-29T14:34:04.427000 CVE-2024-44278,0,0,45d301e85733876f61356281523db1b97bd7d9239c67f80b5edc2a6444ad1fc3,2024-10-29T14:34:04.427000 CVE-2024-44279,0,0,3d3d2782cf38cfbab9143a09adbd7eeae67209432aad5b737f58221076c4a8cf,2024-10-29T14:34:04.427000 @@ -260784,12 +260784,12 @@ CVE-2024-44283,0,0,a423cd05f62df911ca6ddacbb8c38c7df53f15d86abee9d91d2471a48967b CVE-2024-44284,0,0,c76de62ca97b26366f3caef3b2ac2c50f1359a184662302dbdc75806232b62e6,2024-10-29T14:34:04.427000 CVE-2024-44285,0,0,b656a197156ce3f639f54c5926d64ea036ead860c09dc50b8dcfb70113581d04,2024-10-29T14:34:04.427000 CVE-2024-44287,0,0,4b2b7e8101daf580110e865664d09e9b8e738d0759f08414f92a6a6cfd3889a2,2024-10-29T14:34:04.427000 -CVE-2024-44289,0,0,17ea3e31cbf229ba697914c0bb3a6428c768ba70e730ea12af09c5d0c2b9e013,2024-10-29T14:34:04.427000 +CVE-2024-44289,0,1,95b7ed6d214067d4cbde2ea5a535523545f584614d824c4c4e1d05bd792af21f,2024-10-29T20:25:47.537000 CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000 -CVE-2024-44294,0,0,fa812b7e03fe790d73b0aac952d1f53f6ad4492b6a56aeea2457ae94b001b0b6,2024-10-29T14:34:04.427000 +CVE-2024-44294,0,1,b9a1d0b661442ba00a65134d92d6ac7d65e9dc83e3895e08a9ebd9bf7b86cce7,2024-10-29T20:24:24.867000 CVE-2024-44295,0,0,e21fb01feb4b35c66953337c3e4ea909631ed01420e1b8c957b47fb33e8b6e42,2024-10-29T14:34:04.427000 CVE-2024-44296,0,0,8eae18df893df94f7a0550282d74d94b11ab475bc0e7df7b22fda27831ec706c,2024-10-29T14:34:04.427000 -CVE-2024-44297,0,0,5340f0bfd5196685137d920973c09b0e792fd4738c99aad86b1c7ddfacfd18ec,2024-10-29T14:34:04.427000 +CVE-2024-44297,0,1,a2d7fdd78fa61e8c5def00a5081796bfd5f69bbe7fba009315ee29ab843f149e,2024-10-29T20:23:37.967000 CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000 CVE-2024-44301,0,0,1947d3abeb8f3c617a953d82aff9239aa51a781f132c513eb9bd113e9e3104ce,2024-10-29T14:34:04.427000 CVE-2024-44302,0,0,135dd022b19581dad4cc89a6e95bc2764f06cd4002b60ed18a51aacb9b5fcb7d,2024-10-29T14:34:04.427000 @@ -262270,7 +262270,7 @@ CVE-2024-47167,0,0,4c86185472551a2b9180107cbdd6b98169696575a22927ca991ef9ad610ef CVE-2024-47168,0,0,98da9c7578a24c3d90ca8df79642035cdb40468b52b7f244646b864ebfe072c2,2024-10-17T17:00:47.057000 CVE-2024-47169,0,0,3d7d577c82be13838843013d038c262ca65c719ce4179d733fb886eea7d8c747,2024-09-30T12:46:20.237000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 -CVE-2024-47170,0,0,5b51e77bbaf0aa4d73aaed7035aaf98c0f3c0e8a355756474eeb1aa8a1be9c4f,2024-09-30T12:46:20.237000 +CVE-2024-47170,0,1,a85abb331c710555402bc0d82b6c178a53d0789a4a177e8b976e0e4f16299a52,2024-10-29T20:59:57.227000 CVE-2024-47171,0,0,48e31c72c69d0bb6a9d666c7c99661a52d3c05dd11adcb85b19ee942d0085d2e,2024-09-30T12:46:20.237000 CVE-2024-47172,0,0,4b79f4b3803af95fc411c443fe5cc5794c9441cfc034adffdc054b0882caedf7,2024-10-04T13:51:25.567000 CVE-2024-47173,0,0,05b2b633f7d32e023424835d76c61946451664d5230f0a57160406ff89f5847a,2024-10-25T12:56:07.750000 @@ -262840,7 +262840,7 @@ CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 -CVE-2024-48074,0,0,9f8e87819b4cbd70b424fc1b1beb1686903edc8cbc94afedd20cf2ce6d292948,2024-10-28T13:58:09.230000 +CVE-2024-48074,0,1,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 @@ -262848,7 +262848,7 @@ CVE-2024-48107,0,0,b3b56031af4c83db1aa8c8b7592d603d12b933dd8dd7f5c4ea819744e41ae CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000 CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50de7,2024-10-17T18:35:09.890000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 -CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000 +CVE-2024-48120,0,1,ac048d30db75e88feb91392efffb6e9bab5a19e9dc21f5cdbbca8a6a240da1c5,2024-10-29T20:57:53.360000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 CVE-2024-48139,0,0,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 @@ -262878,11 +262878,11 @@ CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000 -CVE-2024-48218,0,1,4df2a1737bc3ceef8118ffc8f43bf6e7bfd49691ee8956737c4244a24a4c0e36,2024-10-29T18:35:08.783000 +CVE-2024-48218,0,0,4df2a1737bc3ceef8118ffc8f43bf6e7bfd49691ee8956737c4244a24a4c0e36,2024-10-29T18:35:08.783000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 -CVE-2024-48222,0,1,97fd76ae3dd28f1e5888fec68e340e9e5e41841170d874971e984dd4b28f68c5,2024-10-29T18:35:10.053000 -CVE-2024-48223,0,1,a9b041f56d6046d662d47741900d11180ff109d214fa15a9b38fe6f39c8abe71,2024-10-29T18:35:11.373000 -CVE-2024-48224,0,1,c634fb714a989ce5fdfe470e52e395775fab9b0ab26c37c53b870c4afe668500,2024-10-29T18:35:12.697000 +CVE-2024-48222,0,0,97fd76ae3dd28f1e5888fec68e340e9e5e41841170d874971e984dd4b28f68c5,2024-10-29T18:35:10.053000 +CVE-2024-48223,0,0,a9b041f56d6046d662d47741900d11180ff109d214fa15a9b38fe6f39c8abe71,2024-10-29T18:35:11.373000 +CVE-2024-48224,0,0,c634fb714a989ce5fdfe470e52e395775fab9b0ab26c37c53b870c4afe668500,2024-10-29T18:35:12.697000 CVE-2024-48225,0,0,a8831170e3eda9980baee63e48cc804c9b2092188511bc7b12f356f931e0b4b8,2024-10-28T21:35:18.743000 CVE-2024-48226,0,0,4cb662eb4f15899ccf7a0dbcb626d5a6b1f5cd6d5d2bcdd68aafd729b2a4945d,2024-10-28T21:35:19.080000 CVE-2024-48227,0,0,d2fa684dbc5ea7a1fe7a4ea371675722e3492c6e4916e182a238767c00f4362b,2024-10-28T21:35:20.360000 @@ -262893,12 +262893,12 @@ CVE-2024-48230,0,0,07e07a763d45296ea9f758120b7e045d4db9e8f15abf026e375b470c1a3f3 CVE-2024-48231,0,0,937449141a6aa1a64ac6ee0f623969ee8c2a56a4e76a3e216a9b1fafdd881546,2024-10-21T19:35:06.217000 CVE-2024-48232,0,0,a15a37bc5cf553a9350d2f351e36c4b7f2bc20b6f19a2709ec711b4b2383074b,2024-10-28T13:58:09.230000 CVE-2024-48233,0,0,3dc80b8ed5c72c97d2c4584373e19faef72f870f3154046e61dfdbbc1e6bed2f,2024-10-28T13:58:09.230000 -CVE-2024-48234,0,0,0b49b8bb382cb52a508fbc9f69d76652ac98af098e83bb3d7db1acd8d5e6a4ac,2024-10-28T13:58:09.230000 -CVE-2024-48235,0,0,6c8fb31a502e07b78ecc76581e26ad66b063d7ac49c202371afb1f13959b1bb8,2024-10-28T13:58:09.230000 -CVE-2024-48236,0,0,bf521fb690c0f681b4f14c50372f9f4cebfb180343930a09329aa11bcbc7afd4,2024-10-28T13:58:09.230000 +CVE-2024-48234,0,1,1a8d3e559037bd1781a9cae98ca9ac055b21e9cc548e55db5056102c863a9c6e,2024-10-29T19:35:19.743000 +CVE-2024-48235,0,1,34c8dce734cf6a79d3c05c66d81a06f8b97a702d18a590252918c2829053c503,2024-10-29T19:35:20.530000 +CVE-2024-48236,0,1,40c021b9ab0ef0fe1121c89c55613819f1f21cd79a305756de1a8bc6502d5e11,2024-10-29T19:35:21.310000 CVE-2024-48237,0,0,f3d3944c7915cd53a5149061b05fd23c13ecbc6a88f801480d775419cbc2f7ef,2024-10-28T13:58:09.230000 -CVE-2024-48238,0,0,658b5db2071a471e74bce611b04408bc0d959f48378a1e84250ee9edfb3d36f9,2024-10-28T13:58:09.230000 -CVE-2024-48239,0,0,18f7f4786be97be34423b9eb083ce4c0e635a48bf9c19ffd9e089a379d6d2cf3,2024-10-28T13:58:09.230000 +CVE-2024-48238,0,1,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000 +CVE-2024-48239,0,1,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 @@ -262915,7 +262915,7 @@ CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b9 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 -CVE-2024-48343,0,0,bbc85276f1233bf8cda5fb28da7b9d61383e810674b2a1c30f2b4d48eae2eb1d,2024-10-28T13:58:09.230000 +CVE-2024-48343,0,1,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 CVE-2024-48356,0,0,eb83e1244399418d09f0af15f0e28266d6d5b9219ba01c88a810a4fca8aabef3,2024-10-29T14:34:04.427000 CVE-2024-48357,0,0,6b9632f69af5b85b728c9706bae3831119448965b03733f601b0a0d518bb13b0,2024-10-29T14:34:50.257000 @@ -262932,7 +262932,7 @@ CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d4 CVE-2024-48423,0,0,8c282145a9dde1964a7595668e5968537e68f0c62ec8f7f792ca8b027908f113,2024-10-25T12:56:07.750000 CVE-2024-48424,0,0,40269a486047942b0c54d704b8b037cd3035d9ce415f6a7c6672231218b45918,2024-10-28T18:35:03.257000 CVE-2024-48425,0,0,b7eeb0390e7509460e2ea67ebb1efb7a20815aad1587b963750ef8a2fc35ee7d,2024-10-28T19:35:28.823000 -CVE-2024-48426,0,0,e81e85165a900ebe44b3c1b666ef9e10ab0bb6a4f34405cfc3b6695d78f79056,2024-10-25T12:56:07.750000 +CVE-2024-48426,0,1,22eae115788dfb6a3644903c8f26a6434c39a09ebbab312f7ce1d4567eeebedc,2024-10-29T20:35:31.967000 CVE-2024-48427,0,0,a2dbe17e1ab904805a4b4afa06242a9d799fda55188dba7fd25d1116aa604ef2,2024-10-28T20:35:21.523000 CVE-2024-48428,0,0,b055cb9e49a105018eb6bba42b6452d165d40b51996ef2595e224525a6c11c1d,2024-10-28T13:58:09.230000 CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000 @@ -262944,7 +262944,7 @@ CVE-2024-48448,0,0,98fcebd73d7422556b035319ef440054f9e000945d2053a198ce662c689ba CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000 CVE-2024-48450,0,0,f5aa5cc58edfc45011da40939fe7187d94727340304abe3913585d89b4a40d5d,2024-10-28T13:58:09.230000 CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000 -CVE-2024-48459,0,0,65ca4f10924c21cc174ad9ec301c89dd215bdae747929dfbd469f345081a8a5f,2024-10-28T13:58:09.230000 +CVE-2024-48459,0,1,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 CVE-2024-48465,0,0,b7bc8b7cfc9842a5d866167a988ef7343bad75516e5493e6477a6a79f57bd11b,2024-10-29T14:34:50.257000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 @@ -262998,7 +262998,7 @@ CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf105901666 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000 CVE-2024-48654,0,0,b1175c42eb9b6ad703f77f6cacd261d0eb5f65c9d2e13e20c8b31a8501988240,2024-10-28T13:58:09.230000 -CVE-2024-48655,0,0,d304e667b97f8f00ad03c9c5efd69f59136fcf1807647e00db54e1208d4b9097,2024-10-28T13:58:09.230000 +CVE-2024-48655,0,1,deba327296a08d0d696cf679af86f2908e28c85780c887ff64191976b25da062,2024-10-29T20:35:33.500000 CVE-2024-48656,0,0,7991ecc43dfce32475e8e1d32ee086228d1cf510284114bf3bd76e22363c0bc1,2024-10-24T14:37:36.353000 CVE-2024-48657,0,0,92137caf7714ad77e1f5fbc8130edf53e1c7b0ac9e690fd892c8d5cb42ccb1b6,2024-10-24T14:38:41.620000 CVE-2024-48659,0,0,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000 @@ -263006,7 +263006,7 @@ CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 -CVE-2024-48700,0,0,14ee8cd6c8005aeee5e1190fb7499326bbf0b7f84723a4100fc64148aa4480a3,2024-10-28T13:58:09.230000 +CVE-2024-48700,0,1,498b6c948c1fef5839fe542228c950391a625f976434be0997a68c56eb15e0ef,2024-10-29T19:35:24.643000 CVE-2024-48706,0,0,e747f2815f744d2574a2c914482979e92abcb175ce526e54d28ad054b049d395,2024-10-25T18:58:35.380000 CVE-2024-48707,0,0,fd9b1d38f6684577739099dad2b9e541d52b6b52c575d76793119672c0ee0220,2024-10-25T19:11:54.310000 CVE-2024-48708,0,0,117d10f4a9b96b209a6f5e6f3097728d8a65264e256ad998e6bda4d438b21882,2024-10-25T19:10:08.457000 @@ -263019,7 +263019,7 @@ CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d CVE-2024-4872,0,0,8b2c6820c717681d25c56a744060fc3e2d72667acf04ef8505ca37b89fed7638,2024-10-29T14:15:07.950000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 -CVE-2024-48743,0,0,5291e828b5f933381ba044fe83ffa30a9574aa3244ef7e9ed3868e54f2102d06,2024-10-28T13:58:09.230000 +CVE-2024-48743,0,1,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000 CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 CVE-2024-48758,0,0,a0017ffb6fab9626ea62b98de0c6903a7dbb8c74f73f1e588de68b4bc17a833d,2024-10-18T12:53:04.627000 @@ -263061,14 +263061,14 @@ CVE-2024-48821,0,0,bacabe03ec9f89b5265709188c25b3f847a116b26433e5bc3285ba68cbdbd CVE-2024-48822,0,0,33e7e72a841539b756d8e81e286546360560772d3a59e9e42ee72ea342d844c8,2024-10-15T15:35:21.887000 CVE-2024-48823,0,0,1aba983e62a885979e02cb791116a00e379a5949592156d79fd5ef8d26455419,2024-10-15T15:35:22.140000 CVE-2024-48824,0,0,d6d0f4584129fd346e0e9fbe3994976e485ae1972b08f2a06e763bdf12528646,2024-10-15T15:35:22.403000 -CVE-2024-48825,0,0,d9524f2e37516b65dfb5220c80baafb64a063d442a9eaa76f6a5e2668c5806a8,2024-10-29T14:34:50.257000 -CVE-2024-48826,0,0,73e23842f367eecdabbf52a8da74f665aeb85747a4dc90c6a1cb3c394c038e89,2024-10-29T14:34:50.257000 +CVE-2024-48825,0,1,ad369d1cf502489a8c86407b4cab4059378b0524ef59b99c231bc11027e4f3fd,2024-10-29T19:35:26.547000 +CVE-2024-48826,0,1,75c9450df85723c7e5fe507735f7be7d84001c192ccab935bbc0ccf65a95117e,2024-10-29T19:35:27.303000 CVE-2024-48827,0,0,b8784c14c4c0a2af4d656264bee611472f424ecc32bdba68ae4a9cb4ecb6178a,2024-10-15T12:58:51.050000 CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000 CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000 CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 -CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000 +CVE-2024-4887,0,1,a9fcb128c464af9b649411220acdd6815488462c8e19ba3fbbc0069b693c8d04,2024-10-29T19:52:44.863000 CVE-2024-48870,0,0,9db15b771a088b28bd1f0b1772504cda9cfbd6a68039dc698e13b987df9abdfe,2024-10-25T12:56:07.750000 CVE-2024-4888,0,0,3f4c58ee217cc87037d385e3cb53da7d318e33e3629509fa30ad3e9220377781,2024-10-17T18:38:58.457000 CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000 @@ -263106,7 +263106,7 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5 CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000 CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 -CVE-2024-48955,1,1,c96a5ce1c87b3d5a9b2b4d5d855b7232ba502145857e0669df496ee4162c9fc6,2024-10-29T18:15:05.690000 +CVE-2024-48955,0,0,c96a5ce1c87b3d5a9b2b4d5d855b7232ba502145857e0669df496ee4162c9fc6,2024-10-29T18:15:05.690000 CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000 CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 @@ -263118,7 +263118,7 @@ CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32f CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 -CVE-2024-4902,0,1,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 +CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 CVE-2024-49023,0,0,9f037b5f7ba370d94cf43694c94339d7393d2d61a5cb700dc6fe38d18df30faa,2024-10-18T17:01:32.803000 CVE-2024-4903,0,0,9834633a0ed5c23d729720f750c23f97a9d35acd2a8ef750805e2c39c4f8bfe7,2024-06-07T20:15:11.967000 CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000 @@ -263573,8 +263573,8 @@ CVE-2024-49974,0,0,4d1ad9e69552c2546e3ebc37028a81d020f8c81c7e81067843bb3e0268b54 CVE-2024-49975,0,0,de9d4372aecbebb1ac36a8d6bd20891e93dd433b503ae45f7f641c708149f769,2024-10-25T20:15:21.160000 CVE-2024-49976,0,0,7d789ab3b505b06d9a92626022d239eccb66342a26f5e0408c14647cf8cd1540,2024-10-25T20:14:03.387000 CVE-2024-49977,0,0,1fa968b4b6ffe89f61827f270e7cc697b9e8aa1241eadd73e01f50d4c563edc5,2024-10-25T20:03:36.737000 -CVE-2024-49978,0,1,f3d61134b9c5d10fd2ab4e39b19ef4b5767227435be40207fd8a06c0cd6a1116,2024-10-29T18:01:43.080000 -CVE-2024-49979,0,1,f8baa0b1d12557a520a3d58ee95542c5e5816ff4eafb95d3e16fe1836897fae6,2024-10-29T18:02:14.197000 +CVE-2024-49978,0,0,f3d61134b9c5d10fd2ab4e39b19ef4b5767227435be40207fd8a06c0cd6a1116,2024-10-29T18:01:43.080000 +CVE-2024-49979,0,0,f8baa0b1d12557a520a3d58ee95542c5e5816ff4eafb95d3e16fe1836897fae6,2024-10-29T18:02:14.197000 CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000 CVE-2024-49980,0,0,1b7f876e1e74006c4cbc36f26a364fbc1043d115c2b25809299afdde070e9fbd,2024-10-23T15:13:25.583000 CVE-2024-49981,0,0,be8906564b57b0b9a043fe42c3d38b8548c4c2cbb0858120a7fa2fad8e2b8ee7,2024-10-25T14:56:40.073000 @@ -263596,7 +263596,7 @@ CVE-2024-49995,0,0,dda237a1fe4774b5eebf428932a14ed6406dee0beb5398e416cf454331ede CVE-2024-49996,0,0,81c0545f780fa695d599970a227ba85a22409c164ec567cfb530b43ba7149524,2024-10-25T19:56:10.320000 CVE-2024-49997,0,0,cf5723beb2d565000e47548f495cd0fbfb40a16e23a8183bd208246596745eee,2024-10-29T16:20:49.107000 CVE-2024-49998,0,0,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000 -CVE-2024-49999,0,1,c4d5cc08a6fa2bfc1b546ebac4901fe5a0eb0ff16c4c5bfcd1daaaba7805a557,2024-10-29T18:03:40.857000 +CVE-2024-49999,0,0,c4d5cc08a6fa2bfc1b546ebac4901fe5a0eb0ff16c4c5bfcd1daaaba7805a557,2024-10-29T18:03:40.857000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 CVE-2024-50000,0,0,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182c42,2024-10-25T19:55:55.357000 CVE-2024-50001,0,0,886b8a582aeed728b3b4fd74e088fd22423f5fc4d8231c2d820afabe46d603d5,2024-10-23T15:13:25.583000 @@ -263767,7 +263767,7 @@ CVE-2024-50451,0,0,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1 CVE-2024-50453,0,0,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000 CVE-2024-50457,0,0,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000 CVE-2024-50458,0,0,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000 -CVE-2024-50459,1,1,eea4813483e9d2e8960b2a9dc9cf62e677f3b1f5e321cd5005ec12a761726039,2024-10-29T17:15:04.423000 +CVE-2024-50459,0,0,eea4813483e9d2e8960b2a9dc9cf62e677f3b1f5e321cd5005ec12a761726039,2024-10-29T17:15:04.423000 CVE-2024-5046,0,0,61eff6fbe16c762ff136f32fbf7c7454761f98bd61a41d7bf57a3431cdb819c7,2024-06-04T19:20:57.247000 CVE-2024-50460,0,0,82d4ab7fefa246ce57a72383ca35008e1c66070e05dd2e7ddad07c6838704d66,2024-10-29T14:34:50.257000 CVE-2024-50461,0,0,e926adc646135f96a8c30b094b43a59a8c4d2ffe68507adf959cf049381e29b7,2024-10-29T14:34:50.257000 @@ -263775,7 +263775,7 @@ CVE-2024-50462,0,0,4ccfb8409add318d1d381a3ba39c166e299f826cc0027453ac31d88195954 CVE-2024-50463,0,0,41f5357ec154cc687872e4ff2451d70da03c70ee2d1be893e9fa2dcf4c51e71e,2024-10-29T16:25:01.827000 CVE-2024-50464,0,0,cf609d0bd47c8857d574d513c156d84098d01d1e1d4103f4808d20a068af8082,2024-10-29T14:34:50.257000 CVE-2024-50465,0,0,00483e074c079de056773fdab6eb221b7f1834669791e4a86b920536bcd400c0,2024-10-28T13:58:09.230000 -CVE-2024-50466,1,1,28d02b3d6bf24b3bb895029fd1d597a0dbe23f51eb3bd7b79c96bee1ce74f4ef,2024-10-29T17:15:04.640000 +CVE-2024-50466,0,0,28d02b3d6bf24b3bb895029fd1d597a0dbe23f51eb3bd7b79c96bee1ce74f4ef,2024-10-29T17:15:04.640000 CVE-2024-50467,0,0,4552ef78134a17bc23e57cbfd601f4e3eea4839d3e1dfc8a1846ef7af61ace53,2024-10-29T14:34:50.257000 CVE-2024-50468,0,0,dcb5fc7c0ad36e7911e6c02d0d96134d3b094fc419a37a9b5d1969d6d7f9c083,2024-10-29T14:34:50.257000 CVE-2024-50469,0,0,abcf4835413ee0cc04940d284cf5f3c90b0ebd44c44430c8cbae403d769d726a,2024-10-29T14:34:50.257000 @@ -263820,17 +263820,17 @@ CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635e CVE-2024-50550,0,0,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 CVE-2024-5057,0,0,6ac23c507e757b24b72de98245da87576f9a2b62e0f8d57278541740a6070ccf,2024-09-20T19:31:39.437000 -CVE-2024-50573,0,1,6166bba949b905ceb4319678694597e7477dff6436071dabfbd162d318e60f8a,2024-10-29T17:12:14.760000 -CVE-2024-50574,0,1,b4c85ee17cab7a2dc3355aa11a3a7bb2af1a1df68c9041971813110ae5b2fe8a,2024-10-29T17:16:11.277000 -CVE-2024-50575,0,1,fc32d20f0e12c8f088f3b45de0e6be389ad7ff627245b3eedb03a983727ced9c,2024-10-29T17:18:26.957000 -CVE-2024-50576,0,1,e65c7c04bfc9eeffadec88ef925ee437dd09576ddef413ae03cff5080e57b8d2,2024-10-29T17:18:08.373000 -CVE-2024-50577,0,1,1ae1c98455304e03c86795b0b0797e69b9be8f4f00bfc6ca75dbac1131e8d554,2024-10-29T17:18:02.127000 -CVE-2024-50578,0,1,6ec0931fb10b85f3988f728576d721b0819731aa2bc7455c72c7d06854b7d9e6,2024-10-29T17:17:53.960000 -CVE-2024-50579,0,1,8bdb4d7fbba4f77c00e2d29f79c5dc0ea8d516735bb22f5f3096b24aec948c36,2024-10-29T17:17:46.297000 +CVE-2024-50573,0,0,6166bba949b905ceb4319678694597e7477dff6436071dabfbd162d318e60f8a,2024-10-29T17:12:14.760000 +CVE-2024-50574,0,0,b4c85ee17cab7a2dc3355aa11a3a7bb2af1a1df68c9041971813110ae5b2fe8a,2024-10-29T17:16:11.277000 +CVE-2024-50575,0,0,fc32d20f0e12c8f088f3b45de0e6be389ad7ff627245b3eedb03a983727ced9c,2024-10-29T17:18:26.957000 +CVE-2024-50576,0,0,e65c7c04bfc9eeffadec88ef925ee437dd09576ddef413ae03cff5080e57b8d2,2024-10-29T17:18:08.373000 +CVE-2024-50577,0,0,1ae1c98455304e03c86795b0b0797e69b9be8f4f00bfc6ca75dbac1131e8d554,2024-10-29T17:18:02.127000 +CVE-2024-50578,0,0,6ec0931fb10b85f3988f728576d721b0819731aa2bc7455c72c7d06854b7d9e6,2024-10-29T17:17:53.960000 +CVE-2024-50579,0,0,8bdb4d7fbba4f77c00e2d29f79c5dc0ea8d516735bb22f5f3096b24aec948c36,2024-10-29T17:17:46.297000 CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000 -CVE-2024-50580,0,1,5b968edfe9310465a4a61d2a3470b2d0d4ec8adbdbfce2d72a22506917527d5b,2024-10-29T17:17:29.440000 -CVE-2024-50581,0,1,e5fb4cee2b881a0a54f5919c2bacd493c5e5939555d4d28ee9d7fe9ce108f7ac,2024-10-29T17:17:20.747000 -CVE-2024-50582,0,1,8ee09c1822530ab12253edb2ea8a5293a80f3664e0faaa7e73f6ab343465ff36,2024-10-29T17:16:46.007000 +CVE-2024-50580,0,0,5b968edfe9310465a4a61d2a3470b2d0d4ec8adbdbfce2d72a22506917527d5b,2024-10-29T17:17:29.440000 +CVE-2024-50581,0,0,e5fb4cee2b881a0a54f5919c2bacd493c5e5939555d4d28ee9d7fe9ce108f7ac,2024-10-29T17:17:20.747000 +CVE-2024-50582,0,0,8ee09c1822530ab12253edb2ea8a5293a80f3664e0faaa7e73f6ab343465ff36,2024-10-29T17:16:46.007000 CVE-2024-50583,0,0,db2a2ad9d7e60027a7a0abb846b837f27b8194afb56c33e89ab55cbf708c9a52,2024-10-25T21:35:08.253000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 @@ -263886,8 +263886,8 @@ CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000 -CVE-2024-51075,0,0,552654645a7aa81d5ed2831dafeaafc72eb231e0261d5c643a1680368a0d4e42,2024-10-29T14:34:04.427000 -CVE-2024-51076,0,0,f29f14a6d6263f0ea29fba266cf4eb680f3fd81509f85036f71e3215970a786a,2024-10-29T14:34:04.427000 +CVE-2024-51075,0,1,552465fb7c055ecfb398f22c9432551758d85e6dc6767f3b187c510f15761dd9,2024-10-29T20:35:35.130000 +CVE-2024-51076,0,1,3a12fe30660d75d0270cdd7bd56ceece76ba34d3765c2f273f497b6ff97fc1c5,2024-10-29T20:35:35.890000 CVE-2024-5108,0,0,b8eaa0c49e3b7a0772fb8d227eefbcd229b705e71c1ea537a10c0b9ca289502f,2024-06-04T19:20:59.700000 CVE-2024-5109,0,0,ceb18a5d96497e9a6ac7740a19ad17f4e12924c64b1533f15150f5dd2571e331,2024-06-04T19:20:59.803000 CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000 @@ -263899,8 +263899,8 @@ CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3d CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 -CVE-2024-51180,0,0,ec97a9e97d18a7900cf99e5896474449d0db8231f779e8fc5a292a25cc3455cc,2024-10-29T14:34:04.427000 -CVE-2024-51181,0,0,c1316549e099a4a2c3e3cd425574fa5ef167c2c9a4fa1f57146fbe739c1e1d23,2024-10-29T14:34:04.427000 +CVE-2024-51180,0,1,f7c1e2704fd53fd258ad2c035d34b8930a6be3203c897cd87f3f4423d71c151f,2024-10-29T20:35:36.680000 +CVE-2024-51181,0,1,b1e8196eba586b0b379f46f5b8f33f822f9d8ac73f2b377d90962a169a613c6e,2024-10-29T20:35:37.490000 CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000 CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 @@ -263929,10 +263929,10 @@ CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe73 CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 -CVE-2024-51506,0,0,c88e78bfaf14f8d0bca992fe3403170d31c1a380aad632270c875e55067a55f0,2024-10-29T14:34:04.427000 -CVE-2024-51507,0,0,7fe2110c0e3dea0d2c93789d83d24e5f3a0499c9a799c4c9d2c88a63c0ea584d,2024-10-29T14:34:04.427000 -CVE-2024-51508,0,0,3dd011dfae2ceaccb8259eabd1aca7b9fece5a037f8ba43555f2e4288d978d02,2024-10-29T14:34:04.427000 -CVE-2024-51509,0,0,19f103a17824310cb94f455901fbb6e58a26940599face0db6183ee10f94fe7c,2024-10-29T14:34:04.427000 +CVE-2024-51506,0,1,aeb585d1723ff2c89aafbc7f5be7b06442a99eb384784bc9840750395f547af1,2024-10-29T19:35:28.723000 +CVE-2024-51507,0,1,4365a7f2aa23ce999509e0b8da9d3ae401991203445005454373679a589ef433,2024-10-29T19:35:29.513000 +CVE-2024-51508,0,1,84627a5fdd5d7fda34b7d1542f218a3bd3a3d801d78362e1d620b375cd43b4c5,2024-10-29T19:35:30.513000 +CVE-2024-51509,0,1,993e17af07ecf25dc3d4222a841d363b0f42df6e2488040b502ab5fa96fcdf3d,2024-10-29T19:35:31.290000 CVE-2024-5151,0,0,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000 CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000 CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000 @@ -264191,7 +264191,7 @@ CVE-2024-5421,0,0,687f3a5898a97c7e4a575e3431d3fe4a696cee8599b8881eabbed4fc7122e8 CVE-2024-5422,0,0,a7ac042f03539b57f700d43aa5929a4431fad7f2a64327cabdefb452ddb8c884,2024-06-10T18:15:38.520000 CVE-2024-5423,0,0,c0eb8661372608209ca31873262040c83e56e01f96081eb3f127055f8501110c,2024-08-29T15:41:13.247000 CVE-2024-5424,0,0,dd542e2b4b449f200a4b1a82e6055968c0edff7c6325ff444ef99264bbf9b209,2024-06-28T10:27:00.920000 -CVE-2024-5425,0,0,6a4e5f79f55def4d138c1c07874dfb0365b816ea97355d904460c326f384651d,2024-06-07T14:56:05.647000 +CVE-2024-5425,0,1,7d8dd52f9b5040e861c03af02095bfdd1ee95b73febed41b79937ba528037fac,2024-10-29T19:49:44.357000 CVE-2024-5426,0,0,34afa7194afb894f777aa3dfb9357e73895bc2898fe4d0744eeb7d3dbc6f96b2,2024-06-11T18:03:58.213000 CVE-2024-5427,0,0,8f69f2258320069dff3e4ca54576ebef2bbd612c89873dcb7f321da375d5baac,2024-05-31T13:01:46.727000 CVE-2024-5428,0,0,2246dbdf3f6f57b875e58f7afe2bbf25e943033499540bdd9e572873773785a4,2024-05-28T14:59:09.827000 @@ -264345,11 +264345,11 @@ CVE-2024-5602,0,0,8cf9d280620610332df37dd5b54e1df45f42bd437784ccdc12a9aa2cf86b1f CVE-2024-5604,0,0,027d101e3d13ee1355c5d00a90e628c742a0d98d010571ef0346cd7c4d888687,2024-08-01T13:59:54.710000 CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000 CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000 -CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000 +CVE-2024-5607,0,1,67caeca140f7eb5262774880708d3570fd00f51c1ec8c02e2fb5765a6a820f7f,2024-10-29T20:08:50.497000 CVE-2024-5608,0,0,91d3b8760217c3d2e17ddc8bd099d48bf3bda4341e3d053182f418df616ce552,2024-10-25T12:56:07.750000 CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,257f707c49e1adeab5f30937de3668453c65dc87c2e8ac71cda38f1fe1bbc4e5,2024-06-17T12:42:04.623000 -CVE-2024-5612,0,1,28ceb837b16c04d60c80c2106288728343a6af941bee1c42d1e76e6ac30c4a71,2024-10-29T18:05:42.823000 +CVE-2024-5612,0,0,28ceb837b16c04d60c80c2106288728343a6af941bee1c42d1e76e6ac30c4a71,2024-10-29T18:05:42.823000 CVE-2024-5613,0,0,d9550d95a21bd950ae7717d597381d24b04054ec554e6d52d8ed280e70034f18,2024-06-10T02:52:08.267000 CVE-2024-5614,0,0,3235a098278ef12466faacc7eb682cba1cb99cc913b9ed567c082bb65c13d254,2024-07-29T14:12:08.783000 CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000 @@ -264818,7 +264818,7 @@ CVE-2024-6146,0,0,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a61954 CVE-2024-6147,0,0,db2ce187f9efb973dad5a788ee3407e3ef389a31e13ca493ef84c0a33e1e2b14,2024-09-25T15:29:33.477000 CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000 CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 -CVE-2024-6150,0,0,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000 +CVE-2024-6150,0,1,87db0b553bc062d88fb3c76f7d5f286a84f7e24b7adec5b18488fc80e7200f90,2024-10-29T19:35:32.787000 CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d73f,2024-08-01T14:00:12.180000 CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000 CVE-2024-6153,0,0,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000 @@ -265210,7 +265210,7 @@ CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c7153734695 CVE-2024-6596,0,0,8001cefbd18b27b44dffd25d89889cfeadffdcc6d2b877cab97cdf4b13170018,2024-10-01T12:26:45.967000 CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000 CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000 -CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000 +CVE-2024-6600,0,1,d38b8e15b440ec379e5d4dcf9d0495a2b72fd02b3eb8c13111cb9109e149894f,2024-10-29T20:35:38.603000 CVE-2024-6601,0,0,74bd12650644545b1291f8db8f4e6e0658cc842c9789ebef1ecd5bf8c2e27b3e,2024-07-16T18:15:08.830000 CVE-2024-6602,0,0,f6a87652a2fe583b38a38e64b24a5e6d6d6790eb720538440a254ce49a22d782,2024-07-16T18:15:08.900000 CVE-2024-6603,0,0,69cec991ec6c96faca0e6549878f06a74d4f5b721edfdd20399a8cd286528c4f,2024-07-16T18:15:08.990000 @@ -265224,7 +265224,7 @@ CVE-2024-6610,0,0,e7175b3f300966611850e9b1403e59c253bcbbb5dce9d539450c19b2bca9cf CVE-2024-6611,0,0,102d605bb189ea442954feec50cbc1b79d4cb5728b389bfc836cc71d32e19f50,2024-10-25T18:35:10.737000 CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520a0,2024-07-16T18:15:09.667000 CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000 -CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000 +CVE-2024-6614,0,1,7b1ab431dd00d0b77013ef22ffc7ae9ad28e8d90c8eb9568e6ea3ce7f8df225d,2024-10-29T20:35:39.450000 CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9ba8,2024-07-16T18:15:09.893000 CVE-2024-6617,0,0,5909931dadcbc2469c78c33ae14eaaff085d3be701252e008f4f95589a185469,2024-09-27T21:28:35.543000 CVE-2024-6618,0,0,e35778534e5c89186065378dfc4e3df4bed15c4f9d7950adea6d3cb891d47959,2024-08-14T02:07:05.410000 @@ -265345,7 +265345,7 @@ CVE-2024-6756,0,0,fa0fe14081662fc33911ee3a0e4b2970b04961552ab67c6e139fa887872f5d CVE-2024-6757,0,0,fb3007b9a88fec22f91fb6d1fadba90dbd147d894ecc0b28edfab77fb89d4e4a,2024-10-17T21:09:59.643000 CVE-2024-6758,0,0,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82fe4,2024-08-13T14:58:47.857000 CVE-2024-6759,0,0,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000 -CVE-2024-6760,0,0,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000 +CVE-2024-6760,0,1,a76c183825576fe72f07ff04dae750de4c3ae153951f7812e7ec529e1f35bb75,2024-10-29T20:35:40.280000 CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000 CVE-2024-6762,0,0,fcaaf729db45af2612bf9f46b8e278194cef379f27ee7baaa80c09eaa2d6af12,2024-10-15T12:57:46.880000 CVE-2024-6763,0,0,fd31d3c0fd752e1a07a116124e51ff424968e796839048241e4dcd5afc3e0580,2024-10-15T12:57:46.880000 @@ -265542,7 +265542,7 @@ CVE-2024-6999,0,0,3d9b1f97dbc942174309d469efc0277ceb0893110b247bd73fd7c466f200a3 CVE-2024-7000,0,0,b61c4fdaacbd3e7380b44ba4054d348fc894838ac2f22194f356da3638a8da46,2024-08-07T22:08:32.963000 CVE-2024-7001,0,0,c36cc44ed743aca43eac7951b6662bd893691f9a45d57142d09098c4fe318e57,2024-08-07T21:33:07.960000 CVE-2024-7003,0,0,c2f51c1b71164a15818ef9209a48a467e859077ffdde417023c4b7a222f91993,2024-08-07T19:52:18.500000 -CVE-2024-7004,0,0,579c7092925f522b24930d2f858d246e2f0e8b8814ade95b044da8929a9fa444,2024-08-07T21:32:44.190000 +CVE-2024-7004,0,1,fba76c8e8c7223314c6c608975d171b8f62916ad77641194d26a60c67a45fe60,2024-10-29T20:35:41.127000 CVE-2024-7005,0,0,50047c6e5a9aa1663d251a4f8d2f7feee05d4f308668b613173701adaf5c68b3,2024-08-07T19:56:48.777000 CVE-2024-7006,0,0,d510a15f87dd1c79e35f8009bc9e9e19d5574ea60c240c6e393b2fbd477adf6c,2024-10-11T14:39:13.093000 CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000 @@ -265696,7 +265696,7 @@ CVE-2024-7204,0,0,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee33 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 CVE-2024-7206,0,0,02a602b43f4540e21329531f0a0b4a806bf816792b4fb6675c407686a1ac2ab9,2024-10-10T12:56:30.817000 CVE-2024-7207,0,0,685939e6da39eea18941ae363d793c2135cdd34b1de02f3365cc55972f116f83,2024-09-30T19:15:04.540000 -CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 +CVE-2024-7208,0,1,a95038e96f9afe6fe37b20e18c6a9c15dc86ade5344c89eed90180e8c1f47bea,2024-10-29T19:35:33.770000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 CVE-2024-7211,0,0,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000 CVE-2024-7212,0,0,d8e81c1df21541a2a61b1ee61c0b13c7c5575d5a7c0cad80faa94c0502ea9af9,2024-08-06T14:06:56.937000 @@ -265722,7 +265722,7 @@ CVE-2024-7250,0,0,2714d196410008034281d23fd2726bb5d251b721e04c2e3643d0ed11cf2d60 CVE-2024-7251,0,0,e880a7a9378bf8b927f40852329063562fbba4ad5a97a9957dc1093c25591f2f,2024-08-20T15:00:02.603000 CVE-2024-7252,0,0,490536b1b267bc05e09f33c429c150806f5477f059597f5cad78d37cad62a66a,2024-08-20T15:00:39.470000 CVE-2024-7254,0,0,8400894e8711410825184771bcde9b50c684e58b49dfe4878e8d0a79485e219d,2024-09-20T12:30:17.483000 -CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000 +CVE-2024-7255,0,1,4863127059f6d450bc39bc659baa7b1b6efaf5c368e1eb2bd96d7a11061a9c5b,2024-10-29T20:35:42.023000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 CVE-2024-7258,0,0,d87745b439eb0eec0ee02b318012450e9a5bbd9a1641e9180767ba5e2e2be570,2024-09-27T13:05:06.930000 @@ -265944,7 +265944,7 @@ CVE-2024-7512,0,0,64969c8356c27f20386cdfa0c38d50ded85817d5026c9d96e7d342b04fbd9f CVE-2024-7513,0,0,9e0dea33b007eccb273e626ffa6cce86e938d130dbfcfa937121ca05aa4099ce,2024-08-15T13:01:10.150000 CVE-2024-7514,0,0,655c87ffa4ff4008320c4821d9c63bb232bfab91cd0bfa739db07a9e11bd1757,2024-10-15T12:58:51.050000 CVE-2024-7515,0,0,3a174c853c7ff7ac11f06a078625d3fec604b25f74f3c9dd6a512b7295373686,2024-08-15T13:01:10.150000 -CVE-2024-7518,0,0,3d74948c02d4c957921d5b67aab57df80b7795ebc72bd26ca456b0a500d24f9e,2024-08-19T17:52:53.887000 +CVE-2024-7518,0,1,9415ffd03a6bd0db1eeec3e299c6a6e287c86d70550126d9de8ce19171619aab,2024-10-29T20:35:43.097000 CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da32737657,2024-08-12T16:04:20 CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000 CVE-2024-7521,0,0,93e518aa5fe4de4582901fabd10f56f08fc773ab920d9d06860ccc32d826d11d,2024-08-12T16:05:10.907000 @@ -266330,7 +266330,7 @@ CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c74 CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000 CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000 CVE-2024-7977,0,0,7f96e9ae91564fe788773f7fc620ef26ab3a10a3c58ea5396e14a68a3ee2a8b8,2024-08-22T20:35:28.140000 -CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52ea9,2024-08-22T17:38:11.200000 +CVE-2024-7978,0,1,32f4e05559c2808de89ac0caea53fb83c96439d90c95d7208a9711199924c25c,2024-10-29T20:35:44.730000 CVE-2024-7979,0,0,7197dd548ee44d45e84f2f2c61d6a52a80bd0fd2ed16f305497f42e667362bae,2024-08-26T15:13:19.383000 CVE-2024-7980,0,0,cda5d0604d61479305f3aa6d24c7a46f2d1d2a7e936538d9b59a5f61a8d4d4b3,2024-08-26T15:14:10.730000 CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000 @@ -266959,8 +266959,8 @@ CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc5 CVE-2024-8920,0,0,42fc84557f46536ee5298e40d09a285310a4aead85db529ff9c7f89249448d09,2024-10-18T12:52:33.507000 CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 -CVE-2024-8923,0,1,1a1c008c7cd10c982e2e742709b2930fd5916241742fc2a1b2a9a4a46bfb6b34,2024-10-29T17:15:04.870000 -CVE-2024-8924,1,1,329d97b4ddecec7a888f06c50c8c22d832c133b4f48330aff42c5aebe55b0404,2024-10-29T17:15:04.983000 +CVE-2024-8923,0,0,1a1c008c7cd10c982e2e742709b2930fd5916241742fc2a1b2a9a4a46bfb6b34,2024-10-29T17:15:04.870000 +CVE-2024-8924,0,0,329d97b4ddecec7a888f06c50c8c22d832c133b4f48330aff42c5aebe55b0404,2024-10-29T17:15:04.983000 CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 @@ -267555,7 +267555,7 @@ CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000 CVE-2024-9987,0,0,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000 -CVE-2024-9988,1,1,58433c05029d9c569d3f28a63e34b08c51240dd4434ea3e597388fdae5562825,2024-10-29T17:15:05.227000 -CVE-2024-9989,1,1,320ed77d3aa97170fc244ba74fe5ddfc3438f8cf8230ad18b3c7ebec643706e9,2024-10-29T17:15:05.463000 -CVE-2024-9990,1,1,94018f02836bf5c840641be68f5ed07996d46dbd4d58aab5bb268a59dd3443d9,2024-10-29T17:15:05.707000 +CVE-2024-9988,0,0,58433c05029d9c569d3f28a63e34b08c51240dd4434ea3e597388fdae5562825,2024-10-29T17:15:05.227000 +CVE-2024-9989,0,0,320ed77d3aa97170fc244ba74fe5ddfc3438f8cf8230ad18b3c7ebec643706e9,2024-10-29T17:15:05.463000 +CVE-2024-9990,0,0,94018f02836bf5c840641be68f5ed07996d46dbd4d58aab5bb268a59dd3443d9,2024-10-29T17:15:05.707000 CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820e2,2024-10-28T13:58:09.230000