diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47078.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47078.json index 567671a7890..f29f00f463c 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47078.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47078.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47078", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:47.333", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-11-01T08:35:01.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/rxe: borra todos los campos QP si la creaci\u00f3n falla. rxe_qp_do_cleanup() se basa en valores de puntero v\u00e1lidos en QP para los creados correctamente, pero en caso de que rxe_qp_from_init() fallara, se llen\u00f3 con basura y provoc\u00f3 el siguiente error. refcount_t: desbordamiento insuficiente; Use After Free. ADVERTENCIA: CPU: 1 PID: 12560 en lib/refcount.c:28 refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28 M\u00f3dulos vinculados en: CPU: 1 PID: 12560 Comm: syz-executor.4 No contaminado 5.12.0 -syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28 C\u00f3digo: e9 db fe ff ff 48 89 df e8 2c c2 ea fd e9 8a fe ff ff e8 72 6a a7 fd 48 c7 c7 e0 b2 c1 89 c6 05 dc 3a e6 09 01 e8 ee 74 fb 04 <0f> 0b e9 af fe ff ff 0f 1f 84 00 00 00 00 00 41 56 41 55 41 54 55 RSP: 0018:ffffc900097ceba8 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 00000000000000000 RCX: 0000000000000000 RDX: 00 00000000040000 RSI: ffffffff815bb075 RDI: fffff520012f9d67 RBP: 0000000000000003 R08: 00000000000000000 R09: 00000000000000000 R10: ffffffff815b4eae R 11: 0000000000000000 R12: ffff8880322a4800 R13: ffff8880322a4940 R14: ffff888033044e00 R15: 0000000000000000 FS: 00007f6eb2be3700(0000) GS:ffff8880b9d00000(0000) knlGS :0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdbe5d41000 CR3: 000000001d181000 CR4: 00000000001506e0 DR0: 0000 000000000000 DR1 : 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: __refcount_sub_and_test include/linux/refcount.h:283 [ en l\u00ednea] __refcount_dec_and_test include/linux/refcount.h:315 [en l\u00ednea] refcount_dec_and_test include/linux/refcount. h:333 [en l\u00ednea] kref_put include/linux/kref.h:64 [en l\u00ednea] rxe_qp_do_cleanup+0x96f/0xaf0 drivers/infiniband/sw/rxe/rxe_qp.c:805 ejecutar_in_process_context+0x37/0x150 kernel/workqueue.c:3327 rxe_elem_release +0x9f/0x180 controladores/infiniband/sw/rxe/rxe_pool.c:391 kref_put include/linux/kref.h:65 [en l\u00ednea] rxe_create_qp+0x2cd/0x310 controladores/infiniband/sw/rxe/rxe_verbs.c:425 controladores _ib_create_qp /infiniband/core/core_priv.h:331 [en l\u00ednea] ib_create_named_qp+0x2ad/0x1370 controladores/infiniband/core/verbs.c:1231 ib_create_qp include/rdma/ib_verbs.h:3644 [en l\u00ednea] create_mad_qp+0x177/0x2d0 controladores/infiniband /core/mad.c:2920 ib_mad_port_open drivers/infiniband/core/mad.c:3001 [en l\u00ednea] ib_mad_init_device+0xd6f/0x1400 drivers/infiniband/core/mad.c:3092 add_client_context+0x405/0x5e0 drivers/infiniband/core/ device.c:717 enable_device_and_get+0x1cd/0x3b0 drivers/infiniband/core/device.c:1331 ib_register_device drivers/infiniband/core/device.c:1413 [en l\u00ednea] ib_register_device+0x7c7/0xa50 drivers/infiniband/core/device.c :1365 rxe_register_device+0x3d5/0x4a0 controladores/infiniband/sw/rxe/rxe_verbs.c:1147 rxe_add+0x12fe/0x16d0 controladores/infiniband/sw/rxe/rxe.c:247 rxe_net_add+0x8c/0xe0 controladores/infiniband/sw/r xe /rxe_net.c:503 controladores rxe_newlink/infiniband/sw/rxe/rxe.c:269 [en l\u00ednea] controladores rxe_newlink+0xb7/0xe0/infiniband/sw/rxe/rxe.c:250 controladores nldev_newlink+0x30e/0x550/infiniband/ core/nldev.c:1555 rdma_nl_rcv_msg+0x36d/0x690 controladores/infiniband/core/netlink.c:195 rdma_nl_rcv_skb controladores/infiniband/core/netlink.c:239 [en l\u00ednea] rdma_nl_rcv+0x2ee/0x430 controladores/infiniband/core/netlink .c:259 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [en l\u00ednea] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927 sock_sendmsg_nosec net/socket. c:654 [en l\u00ednea] sock_sendmsg+0xcf/0x120 net/socket.c:674 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350 ___sys_sendmsg+0xf3/0x170 net/socket.c:2404 __sys_sendmsg+0xe5/0x1b 0 red/toma .c:2433 do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47 Entry_SYSCALL_64_after_hwframe+0 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70", diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45896.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45896.json index 6504b2919d1..1c8ced2c8a9 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45896.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45896.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45896", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-28T05:15:13.657", - "lastModified": "2024-09-04T15:15:13.160", + "lastModified": "2024-11-01T08:35:03.997", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "ntfs3 en el kernel de Linux anterior a 6.5.11 permite a un atacante f\u00edsicamente pr\u00f3ximo leer la memoria del kernel montando un sistema de archivos (por ejemplo, si una distribuci\u00f3n de Linux est\u00e1 configurada para permitir montajes sin privilegios de medios extra\u00edbles) y luego aprovechar el acceso local para activar una lectura fuera de los l\u00edmites. Un valor de longitud puede ser mayor que la cantidad de memoria asignada. NOTA: la perspectiva del proveedor es que no hay vulnerabilidad cuando un ataque requiere una imagen del sistema de archivos modificada por el atacante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.11", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json index dae495c007b..a8cd9478c44 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26894", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.630", - "lastModified": "2024-06-27T12:15:22.177", + "lastModified": "2024-11-01T08:35:09.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPI: procesador_idle: corrige la p\u00e9rdida de memoria en acpi_processor_power_exit() Despu\u00e9s de cancelar el registro del dispositivo de CPU inactivo, la memoria asociada con \u00e9l no se libera, lo que genera una p\u00e9rdida de memoria: objeto sin referencia 0xffff896282f6c000 (tama\u00f1o 1024): comunicaci\u00f3n \"swapper/0\", pid 1, santiam\u00e9n 4294893170 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ........... ..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ retroceso (crc 8836a742): [] kmalloc_trace+ 0x29d/0x340 [] acpi_processor_power_init+0xf3/0x1c0 [] __acpi_processor_start+0xd3/0xf0 [] acpi_processor_start+0x2c/0x50 [] realmente_probe+0xe2/0x480 [] __driver_probe_device+ 0x78/0x160 [] driver_probe_device+0x1f/0x90 [] __driver_attach+0xce/0x1c0 [] bus_for_each_dev+0x70/0xc0 [] bus_add_driver+0x112/0x210 [] driver_register+ 0x55/0x100 [] acpi_processor_driver_init+0x3b/0xc0 [] do_one_initcall+0x41/0x300 [] kernel_init_freeable+0x320/0x470 [] kernel_init+0x16/0x1b0 [] ret_from_fork+ 0x2d/0x50 Solucione este problema liberando el dispositivo de CPU inactivo despu\u00e9s de cancelar su registro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48237.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48237.json index 974d07a4c56..3f2e73ab1e1 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48237.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48237.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48237", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T22:15:02.653", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-11-01T08:35:14.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "WTCMS 1.0 es vulnerable a un control de acceso incorrecto en \\Common\\Controller\\HomebaseController.class.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://github.com/taosir/wtcms/issues/15", diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json new file mode 100644 index 00000000000..fcd0bee2162 --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7424.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-7424", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-01T08:15:11.647", + "lastModified": "2024-11-01T08:15:11.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Multiple Page Generator Plugin \u2013 MPG plugin for WordPress is vulnerable to unauthorized modification of and access to data due to a missing capability check on several functions in all versions up to, and including, 4.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those functions intended for admin use resulting in subscribers being able to upload csv files and view the contents of MPG projects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/trunk/controllers/DatasetController.php#L261", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/trunk/models/ProjectModel.php#L286", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3174918/multiple-pages-generator-by-porthas/trunk/controllers/DatasetController.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3174918/multiple-pages-generator-by-porthas/trunk/models/ProjectModel.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3178830%40multiple-pages-generator-by-porthas%2Ftrunk&old=3174918%40multiple-pages-generator-by-porthas%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/860848c1-dd67-4baf-a571-bc866c5f12f8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json new file mode 100644 index 00000000000..2fc4e0b4ce8 --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9655.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-9655", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-01T08:15:12.047", + "lastModified": "2024-11-01T08:15:12.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Icon widget in all versions up to, and including, 6.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/trunk/includes/assets/js/kb-tippy.min.js", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fkadence-blocks&old=3162912&new_path=%2Fkadence-blocks&new=3170375&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/kadence-blocks/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.kadencewp.com/kadence-blocks/changelog/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4027138-9a8a-4602-90fd-19e9f7c45bb4?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 90035ef32ce..a1a8d74f4f9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-01T07:00:32.139590+00:00 +2024-11-01T09:00:19.760358+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-01T06:15:12.883000+00:00 +2024-11-01T08:35:14.437000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267791 +267793 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `2` -- [CVE-2024-0105](CVE-2024/CVE-2024-01xx/CVE-2024-0105.json) (`2024-11-01T06:15:12.397`) -- [CVE-2024-0106](CVE-2024/CVE-2024-01xx/CVE-2024-0106.json) (`2024-11-01T06:15:12.883`) -- [CVE-2024-10620](CVE-2024/CVE-2024-106xx/CVE-2024-10620.json) (`2024-11-01T05:15:05.167`) -- [CVE-2024-21510](CVE-2024/CVE-2024-215xx/CVE-2024-21510.json) (`2024-11-01T05:15:05.640`) -- [CVE-2024-47939](CVE-2024/CVE-2024-479xx/CVE-2024-47939.json) (`2024-11-01T05:15:05.950`) -- [CVE-2024-49501](CVE-2024/CVE-2024-495xx/CVE-2024-49501.json) (`2024-11-01T05:15:06.280`) +- [CVE-2024-7424](CVE-2024/CVE-2024-74xx/CVE-2024-7424.json) (`2024-11-01T08:15:11.647`) +- [CVE-2024-9655](CVE-2024/CVE-2024-96xx/CVE-2024-9655.json) (`2024-11-01T08:15:12.047`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `4` +- [CVE-2021-47078](CVE-2021/CVE-2021-470xx/CVE-2021-47078.json) (`2024-11-01T08:35:01.573`) +- [CVE-2023-45896](CVE-2023/CVE-2023-458xx/CVE-2023-45896.json) (`2024-11-01T08:35:03.997`) +- [CVE-2024-26894](CVE-2024/CVE-2024-268xx/CVE-2024-26894.json) (`2024-11-01T08:35:09.973`) +- [CVE-2024-48237](CVE-2024/CVE-2024-482xx/CVE-2024-48237.json) (`2024-11-01T08:35:14.437`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 933f0caab78..7cccc3b51ff 100644 --- a/_state.csv +++ b/_state.csv @@ -187000,7 +187000,7 @@ CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece78 CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000 CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000 CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000 -CVE-2021-47078,0,0,c542ef22d3de681d52aa777c9a245a2dbc0717f17878f713ae50dab60ff5c6b7,2024-03-01T22:22:25.913000 +CVE-2021-47078,0,1,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000 CVE-2021-47079,0,0,0fdf09d917088dbab8085d0fa49a84cd4b4756a3cecc44c63f7f393d13877289,2024-03-01T22:22:25.913000 CVE-2021-47080,0,0,37f5be84057b2b7143e8efca1bf959654367bf74dea826635ad8969b16f72a22,2024-03-01T22:22:25.913000 CVE-2021-47081,0,0,fa9e53fcea8371f1d81146e970b4908deb3f6d5f71952985438c27e9598afcd2,2024-03-01T22:22:25.913000 @@ -234561,7 +234561,7 @@ CVE-2023-4589,0,0,5823a1bbdcd3fd3dad6a9d361ad6771c5169f34ce23ef9e39b305d1aaf66a9 CVE-2023-45892,0,0,31ea99a81b63e5dc5404654e4231556ec48f5c4f723835f37c58ea694f43c518,2024-01-08T19:31:03.043000 CVE-2023-45893,0,0,8d1a5a8422c61644ae8727f2e16c55cf2cebb8170e0670e9c625ddf903cfff6b,2024-09-06T18:35:05.837000 CVE-2023-45894,0,0,acbbd0369c677d90271e9d43ae921ffda1b227f19a0c24cf767e01f00c88765f,2023-12-20T16:44:29.960000 -CVE-2023-45896,0,0,219c348b3e14417d281e67cea4b9228bbfb7da477408d782c62f097d03c0428d,2024-09-04T15:15:13.160000 +CVE-2023-45896,0,1,574edb4c4981d990f2925fa7a7bc3ce022e38048f9e267255e3b9d1b20597db1,2024-11-01T08:35:03.997000 CVE-2023-45897,0,0,734daadcbcf83a77d0375bea2b59862190723c5d109c64b97c90f46f832ac6a4,2023-11-21T16:33:02.183000 CVE-2023-45898,0,0,f3261a8736c0c34cdaa65c9211bd18854b9e3c8fbb8c9c8e0fd98bdbf7fab3eb,2024-08-26T16:07:21.753000 CVE-2023-45899,0,0,8ea5b9ddd2874024b78e9d2dcda12439e81d1dbfe77d0f8413dab38e7cc66b6f,2023-11-08T16:54:12.307000 @@ -241543,8 +241543,8 @@ CVE-2024-0101,0,0,6c543091c34f4a748deb2ce2cce2816a258ea3dcb0e0560ed0bed55e86ee09 CVE-2024-0102,0,0,aac583927adc7db5e6a95a28a1f19367ab609db53a34bc65219a25c1bce42b64,2024-09-16T19:37:37.487000 CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000 CVE-2024-0104,0,0,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000 -CVE-2024-0105,1,1,60fd17b4603518f02d825b743a7f2e8102175b79226f47cc38be34ef2d2a380e,2024-11-01T06:15:12.397000 -CVE-2024-0106,1,1,9729fc8649cbf920c9730e34e1ceb5586c73e24a7b31152ef501cc9836de7ac5,2024-11-01T06:15:12.883000 +CVE-2024-0105,0,0,60fd17b4603518f02d825b743a7f2e8102175b79226f47cc38be34ef2d2a380e,2024-11-01T06:15:12.397000 +CVE-2024-0106,0,0,9729fc8649cbf920c9730e34e1ceb5586c73e24a7b31152ef501cc9836de7ac5,2024-11-01T06:15:12.883000 CVE-2024-0107,0,0,825deb4e82dfaf0b98f1fe2772df92223b06ae0e932511c6a748f272f8b997c9,2024-09-17T12:10:22.063000 CVE-2024-0108,0,0,66f975a41bb5f0143618b7229f9a8d90fdad314725e86f6c633b765a762e46f3,2024-09-16T19:27:19.833000 CVE-2024-0109,0,0,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000 @@ -242693,7 +242693,7 @@ CVE-2024-10617,0,0,c115ebd9184b04fc7c1cf06aa9e26acdfffe6db202fbc33d47a11aa0aee63 CVE-2024-10618,0,0,a0ee98e6f2a3bb5f39d4ca6b901dbbe1976515e97aa421510e0aab57a1e74106,2024-11-01T04:15:09.513000 CVE-2024-10619,0,0,5bf4086f57746e212e6ba5450810be6502ee6bcc7a030b63851d5cf33f5cbe7a,2024-11-01T04:15:10.897000 CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000 -CVE-2024-10620,1,1,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b77774f3,2024-11-01T05:15:05.167000 +CVE-2024-10620,0,0,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b77774f3,2024-11-01T05:15:05.167000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000 CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 @@ -244861,7 +244861,7 @@ CVE-2024-21507,0,0,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15 CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000 CVE-2024-21509,0,0,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000 CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000 -CVE-2024-21510,1,1,9e00d286caa4b89f7c2914a724fdce91b68b92573be43bba3e8dc44b44508504,2024-11-01T05:15:05.640000 +CVE-2024-21510,0,0,9e00d286caa4b89f7c2914a724fdce91b68b92573be43bba3e8dc44b44508504,2024-11-01T05:15:05.640000 CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000 CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000 CVE-2024-21513,0,0,2cc4921b2e7cf735a4c6ffcd0f834de9cbd6a82ef6ed4bcebed2a92ed1ba3df5,2024-08-01T13:46:45.590000 @@ -248647,7 +248647,7 @@ CVE-2024-26890,0,0,442ddef52e9c264bc395f1d392f8e749c4361ea4cfc6bd82e29e835d19500 CVE-2024-26891,0,0,e75c6313f07c138ae9c36d0ab38fdf2f3dec2472492fc6c7e58e9f5d631654b1,2024-06-25T22:15:25.327000 CVE-2024-26892,0,0,806d8c2f00888544d8f546c55fd045afd90c70f07a594d3bdbeb1d45feddd5ff,2024-04-17T12:48:07.510000 CVE-2024-26893,0,0,547eb928978e29d7450e4ec7a0bc4d561c68a6c3cc4baa1bf0cc2f44e81b2c80,2024-04-17T12:48:07.510000 -CVE-2024-26894,0,0,be66fe6645dacacddf87a89a0a2e96de8e32c9faf5fc4db2d80ecba37170695f,2024-06-27T12:15:22.177000 +CVE-2024-26894,0,1,e26952696ebbc603ce79e51fc62ca290fe74c2a9ed69fdd0de0954b1e9696e0f,2024-11-01T08:35:09.973000 CVE-2024-26895,0,0,b9dd891a5343b75d81278d18982d49da18e6241368343883e4b0512359c9b37f,2024-06-25T23:15:27.080000 CVE-2024-26896,0,0,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000 CVE-2024-26897,0,0,f7f0ae7a29508e7fbb0b3fdfe5757c59953f0ebfc186579cd1f494f6556c9f6d,2024-06-25T23:15:27.180000 @@ -262871,7 +262871,7 @@ CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b3851 CVE-2024-47913,0,0,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 -CVE-2024-47939,1,1,7c5e0268339806dced4a5a853811407ac862fdbc263c3cb9e688a46627070a59,2024-11-01T05:15:05.950000 +CVE-2024-47939,0,0,7c5e0268339806dced4a5a853811407ac862fdbc263c3cb9e688a46627070a59,2024-11-01T05:15:05.950000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000 CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000 @@ -262999,7 +262999,7 @@ CVE-2024-48233,0,0,5079087488de765c44b2e5efadc3adcfed6b8eb841374ab16026cf622181f CVE-2024-48234,0,0,1a8d3e559037bd1781a9cae98ca9ac055b21e9cc548e55db5056102c863a9c6e,2024-10-29T19:35:19.743000 CVE-2024-48235,0,0,34c8dce734cf6a79d3c05c66d81a06f8b97a702d18a590252918c2829053c503,2024-10-29T19:35:20.530000 CVE-2024-48236,0,0,40c021b9ab0ef0fe1121c89c55613819f1f21cd79a305756de1a8bc6502d5e11,2024-10-29T19:35:21.310000 -CVE-2024-48237,0,0,f3d3944c7915cd53a5149061b05fd23c13ecbc6a88f801480d775419cbc2f7ef,2024-10-28T13:58:09.230000 +CVE-2024-48237,0,1,7fc4be0e37579c90650795a758e344399d21643de8b932b0003e436ed9b8f848,2024-11-01T08:35:14.437000 CVE-2024-48238,0,0,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000 CVE-2024-48239,0,0,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 @@ -263437,7 +263437,7 @@ CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c646 CVE-2024-4948,0,0,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8ff8,2024-07-03T02:08:20.437000 CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000 CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000 -CVE-2024-49501,1,1,9aa848e778f60fe9db1b1fa3af8d0466b3fa6c9448f942b1edef1bd152766d5d,2024-11-01T05:15:06.280000 +CVE-2024-49501,0,0,9aa848e778f60fe9db1b1fa3af8d0466b3fa6c9448f942b1edef1bd152766d5d,2024-11-01T05:15:06.280000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 CVE-2024-49579,0,0,85b8fb1168559e66181366d5ecd0a3cbf5d9385b3a23eb2296d97e9422fe6782,2024-10-18T12:52:33.507000 @@ -266057,6 +266057,7 @@ CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc0 CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000 CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000 CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000 +CVE-2024-7424,1,1,a5be6e0eb0636ef17810581d3d0e44463aa0f37467006df96791ddc29bf14501,2024-11-01T08:15:11.647000 CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000 CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000 CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000 @@ -267618,6 +267619,7 @@ CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615 CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000 CVE-2024-9650,0,0,c785e5c8b40ec3a7d0b9a0e25f6978363c5dcc2fc6507b9c6a2c03a208ac34e9,2024-10-25T12:56:07.750000 CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93b5,2024-10-16T16:38:14.557000 +CVE-2024-9655,1,1,bd7102085fae8d08a785f742ef0c0b0c3f0acc32ec2662bdb03ce71482a86442,2024-11-01T08:15:12.047000 CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000