mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-11-01T09:00:19.760358+00:00
This commit is contained in:
parent
1dfef46495
commit
542f1198f5
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-47078",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-01T22:15:47.333",
|
||||
"lastModified": "2024-03-01T22:22:25.913",
|
||||
"lastModified": "2024-11-01T08:35:01.573",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/rxe: borra todos los campos QP si la creaci\u00f3n falla. rxe_qp_do_cleanup() se basa en valores de puntero v\u00e1lidos en QP para los creados correctamente, pero en caso de que rxe_qp_from_init() fallara, se llen\u00f3 con basura y provoc\u00f3 el siguiente error. refcount_t: desbordamiento insuficiente; Use After Free. ADVERTENCIA: CPU: 1 PID: 12560 en lib/refcount.c:28 refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28 M\u00f3dulos vinculados en: CPU: 1 PID: 12560 Comm: syz-executor.4 No contaminado 5.12.0 -syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28 C\u00f3digo: e9 db fe ff ff 48 89 df e8 2c c2 ea fd e9 8a fe ff ff e8 72 6a a7 fd 48 c7 c7 e0 b2 c1 89 c6 05 dc 3a e6 09 01 e8 ee 74 fb 04 <0f> 0b e9 af fe ff ff 0f 1f 84 00 00 00 00 00 41 56 41 55 41 54 55 RSP: 0018:ffffc900097ceba8 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 00000000000000000 RCX: 0000000000000000 RDX: 00 00000000040000 RSI: ffffffff815bb075 RDI: fffff520012f9d67 RBP: 0000000000000003 R08: 00000000000000000 R09: 00000000000000000 R10: ffffffff815b4eae R 11: 0000000000000000 R12: ffff8880322a4800 R13: ffff8880322a4940 R14: ffff888033044e00 R15: 0000000000000000 FS: 00007f6eb2be3700(0000) GS:ffff8880b9d00000(0000) knlGS :0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fdbe5d41000 CR3: 000000001d181000 CR4: 00000000001506e0 DR0: 0000 000000000000 DR1 : 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: __refcount_sub_and_test include/linux/refcount.h:283 [ en l\u00ednea] __refcount_dec_and_test include/linux/refcount.h:315 [en l\u00ednea] refcount_dec_and_test include/linux/refcount. h:333 [en l\u00ednea] kref_put include/linux/kref.h:64 [en l\u00ednea] rxe_qp_do_cleanup+0x96f/0xaf0 drivers/infiniband/sw/rxe/rxe_qp.c:805 ejecutar_in_process_context+0x37/0x150 kernel/workqueue.c:3327 rxe_elem_release +0x9f/0x180 controladores/infiniband/sw/rxe/rxe_pool.c:391 kref_put include/linux/kref.h:65 [en l\u00ednea] rxe_create_qp+0x2cd/0x310 controladores/infiniband/sw/rxe/rxe_verbs.c:425 controladores _ib_create_qp /infiniband/core/core_priv.h:331 [en l\u00ednea] ib_create_named_qp+0x2ad/0x1370 controladores/infiniband/core/verbs.c:1231 ib_create_qp include/rdma/ib_verbs.h:3644 [en l\u00ednea] create_mad_qp+0x177/0x2d0 controladores/infiniband /core/mad.c:2920 ib_mad_port_open drivers/infiniband/core/mad.c:3001 [en l\u00ednea] ib_mad_init_device+0xd6f/0x1400 drivers/infiniband/core/mad.c:3092 add_client_context+0x405/0x5e0 drivers/infiniband/core/ device.c:717 enable_device_and_get+0x1cd/0x3b0 drivers/infiniband/core/device.c:1331 ib_register_device drivers/infiniband/core/device.c:1413 [en l\u00ednea] ib_register_device+0x7c7/0xa50 drivers/infiniband/core/device.c :1365 rxe_register_device+0x3d5/0x4a0 controladores/infiniband/sw/rxe/rxe_verbs.c:1147 rxe_add+0x12fe/0x16d0 controladores/infiniband/sw/rxe/rxe.c:247 rxe_net_add+0x8c/0xe0 controladores/infiniband/sw/r xe /rxe_net.c:503 controladores rxe_newlink/infiniband/sw/rxe/rxe.c:269 [en l\u00ednea] controladores rxe_newlink+0xb7/0xe0/infiniband/sw/rxe/rxe.c:250 controladores nldev_newlink+0x30e/0x550/infiniband/ core/nldev.c:1555 rdma_nl_rcv_msg+0x36d/0x690 controladores/infiniband/core/netlink.c:195 rdma_nl_rcv_skb controladores/infiniband/core/netlink.c:239 [en l\u00ednea] rdma_nl_rcv+0x2ee/0x430 controladores/infiniband/core/netlink .c:259 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [en l\u00ednea] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927 sock_sendmsg_nosec net/socket. c:654 [en l\u00ednea] sock_sendmsg+0xcf/0x120 net/socket.c:674 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350 ___sys_sendmsg+0xf3/0x170 net/socket.c:2404 __sys_sendmsg+0xe5/0x1b 0 red/toma .c:2433 do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47 Entry_SYSCALL_64_after_hwframe+0 ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45896",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-28T05:15:13.657",
|
||||
"lastModified": "2024-09-04T15:15:13.160",
|
||||
"lastModified": "2024-11-01T08:35:03.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "ntfs3 en el kernel de Linux anterior a 6.5.11 permite a un atacante f\u00edsicamente pr\u00f3ximo leer la memoria del kernel montando un sistema de archivos (por ejemplo, si una distribuci\u00f3n de Linux est\u00e1 configurada para permitir montajes sin privilegios de medios extra\u00edbles) y luego aprovechar el acceso local para activar una lectura fuera de los l\u00edmites. Un valor de longitud puede ser mayor que la cantidad de memoria asignada. NOTA: la perspectiva del proveedor es que no hay vulnerabilidad cuando un ataque requiere una imagen del sistema de archivos modificada por el atacante."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.11",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26894",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-17T11:15:10.630",
|
||||
"lastModified": "2024-06-27T12:15:22.177",
|
||||
"lastModified": "2024-11-01T08:35:09.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPI: procesador_idle: corrige la p\u00e9rdida de memoria en acpi_processor_power_exit() Despu\u00e9s de cancelar el registro del dispositivo de CPU inactivo, la memoria asociada con \u00e9l no se libera, lo que genera una p\u00e9rdida de memoria: objeto sin referencia 0xffff896282f6c000 (tama\u00f1o 1024): comunicaci\u00f3n \"swapper/0\", pid 1, santiam\u00e9n 4294893170 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ........... ..... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ retroceso (crc 8836a742): [] kmalloc_trace+ 0x29d/0x340 [] acpi_processor_power_init+0xf3/0x1c0 [] __acpi_processor_start+0xd3/0xf0 [] acpi_processor_start+0x2c/0x50 [] realmente_probe+0xe2/0x480 [] __driver_probe_device+ 0x78/0x160 [] driver_probe_device+0x1f/0x90 [] __driver_attach+0xce/0x1c0 [] bus_for_each_dev+0x70/0xc0 [] bus_add_driver+0x112/0x210 [] driver_register+ 0x55/0x100 [] acpi_processor_driver_init+0x3b/0xc0 [] do_one_initcall+0x41/0x300 [] kernel_init_freeable+0x320/0x470 [] kernel_init+0x16/0x1b0 [] ret_from_fork+ 0x2d/0x50 Solucione este problema liberando el dispositivo de CPU inactivo despu\u00e9s de cancelar su registro."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-25T22:15:02.653",
|
||||
"lastModified": "2024-10-28T13:58:09.230",
|
||||
"lastModified": "2024-11-01T08:35:14.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "WTCMS 1.0 es vulnerable a un control de acceso incorrecto en \\Common\\Controller\\HomebaseController.class.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/taosir/wtcms/issues/15",
|
||||
|
76
CVE-2024/CVE-2024-74xx/CVE-2024-7424.json
Normal file
76
CVE-2024/CVE-2024-74xx/CVE-2024-7424.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-7424",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-01T08:15:11.647",
|
||||
"lastModified": "2024-11-01T08:15:11.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Multiple Page Generator Plugin \u2013 MPG plugin for WordPress is vulnerable to unauthorized modification of and access to data due to a missing capability check on several functions in all versions up to, and including, 4.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those functions intended for admin use resulting in subscribers being able to upload csv files and view the contents of MPG projects."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/trunk/controllers/DatasetController.php#L261",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/trunk/models/ProjectModel.php#L286",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3174918/multiple-pages-generator-by-porthas/trunk/controllers/DatasetController.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3174918/multiple-pages-generator-by-porthas/trunk/models/ProjectModel.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3178830%40multiple-pages-generator-by-porthas%2Ftrunk&old=3174918%40multiple-pages-generator-by-porthas%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/860848c1-dd67-4baf-a571-bc866c5f12f8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-96xx/CVE-2024-9655.json
Normal file
72
CVE-2024/CVE-2024-96xx/CVE-2024-9655.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-9655",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-01T08:15:12.047",
|
||||
"lastModified": "2024-11-01T08:15:12.047",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Icon widget in all versions up to, and including, 6.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/trunk/includes/assets/js/kb-tippy.min.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fkadence-blocks&old=3162912&new_path=%2Fkadence-blocks&new=3170375&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/kadence-blocks/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kadencewp.com/kadence-blocks/changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4027138-9a8a-4602-90fd-19e9f7c45bb4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-01T07:00:32.139590+00:00
|
||||
2024-11-01T09:00:19.760358+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-01T06:15:12.883000+00:00
|
||||
2024-11-01T08:35:14.437000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
267791
|
||||
267793
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-0105](CVE-2024/CVE-2024-01xx/CVE-2024-0105.json) (`2024-11-01T06:15:12.397`)
|
||||
- [CVE-2024-0106](CVE-2024/CVE-2024-01xx/CVE-2024-0106.json) (`2024-11-01T06:15:12.883`)
|
||||
- [CVE-2024-10620](CVE-2024/CVE-2024-106xx/CVE-2024-10620.json) (`2024-11-01T05:15:05.167`)
|
||||
- [CVE-2024-21510](CVE-2024/CVE-2024-215xx/CVE-2024-21510.json) (`2024-11-01T05:15:05.640`)
|
||||
- [CVE-2024-47939](CVE-2024/CVE-2024-479xx/CVE-2024-47939.json) (`2024-11-01T05:15:05.950`)
|
||||
- [CVE-2024-49501](CVE-2024/CVE-2024-495xx/CVE-2024-49501.json) (`2024-11-01T05:15:06.280`)
|
||||
- [CVE-2024-7424](CVE-2024/CVE-2024-74xx/CVE-2024-7424.json) (`2024-11-01T08:15:11.647`)
|
||||
- [CVE-2024-9655](CVE-2024/CVE-2024-96xx/CVE-2024-9655.json) (`2024-11-01T08:15:12.047`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2021-47078](CVE-2021/CVE-2021-470xx/CVE-2021-47078.json) (`2024-11-01T08:35:01.573`)
|
||||
- [CVE-2023-45896](CVE-2023/CVE-2023-458xx/CVE-2023-45896.json) (`2024-11-01T08:35:03.997`)
|
||||
- [CVE-2024-26894](CVE-2024/CVE-2024-268xx/CVE-2024-26894.json) (`2024-11-01T08:35:09.973`)
|
||||
- [CVE-2024-48237](CVE-2024/CVE-2024-482xx/CVE-2024-48237.json) (`2024-11-01T08:35:14.437`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
22
_state.csv
22
_state.csv
@ -187000,7 +187000,7 @@ CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece78
|
||||
CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47078,0,0,c542ef22d3de681d52aa777c9a245a2dbc0717f17878f713ae50dab60ff5c6b7,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47078,0,1,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
|
||||
CVE-2021-47079,0,0,0fdf09d917088dbab8085d0fa49a84cd4b4756a3cecc44c63f7f393d13877289,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47080,0,0,37f5be84057b2b7143e8efca1bf959654367bf74dea826635ad8969b16f72a22,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47081,0,0,fa9e53fcea8371f1d81146e970b4908deb3f6d5f71952985438c27e9598afcd2,2024-03-01T22:22:25.913000
|
||||
@ -234561,7 +234561,7 @@ CVE-2023-4589,0,0,5823a1bbdcd3fd3dad6a9d361ad6771c5169f34ce23ef9e39b305d1aaf66a9
|
||||
CVE-2023-45892,0,0,31ea99a81b63e5dc5404654e4231556ec48f5c4f723835f37c58ea694f43c518,2024-01-08T19:31:03.043000
|
||||
CVE-2023-45893,0,0,8d1a5a8422c61644ae8727f2e16c55cf2cebb8170e0670e9c625ddf903cfff6b,2024-09-06T18:35:05.837000
|
||||
CVE-2023-45894,0,0,acbbd0369c677d90271e9d43ae921ffda1b227f19a0c24cf767e01f00c88765f,2023-12-20T16:44:29.960000
|
||||
CVE-2023-45896,0,0,219c348b3e14417d281e67cea4b9228bbfb7da477408d782c62f097d03c0428d,2024-09-04T15:15:13.160000
|
||||
CVE-2023-45896,0,1,574edb4c4981d990f2925fa7a7bc3ce022e38048f9e267255e3b9d1b20597db1,2024-11-01T08:35:03.997000
|
||||
CVE-2023-45897,0,0,734daadcbcf83a77d0375bea2b59862190723c5d109c64b97c90f46f832ac6a4,2023-11-21T16:33:02.183000
|
||||
CVE-2023-45898,0,0,f3261a8736c0c34cdaa65c9211bd18854b9e3c8fbb8c9c8e0fd98bdbf7fab3eb,2024-08-26T16:07:21.753000
|
||||
CVE-2023-45899,0,0,8ea5b9ddd2874024b78e9d2dcda12439e81d1dbfe77d0f8413dab38e7cc66b6f,2023-11-08T16:54:12.307000
|
||||
@ -241543,8 +241543,8 @@ CVE-2024-0101,0,0,6c543091c34f4a748deb2ce2cce2816a258ea3dcb0e0560ed0bed55e86ee09
|
||||
CVE-2024-0102,0,0,aac583927adc7db5e6a95a28a1f19367ab609db53a34bc65219a25c1bce42b64,2024-09-16T19:37:37.487000
|
||||
CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0104,0,0,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000
|
||||
CVE-2024-0105,1,1,60fd17b4603518f02d825b743a7f2e8102175b79226f47cc38be34ef2d2a380e,2024-11-01T06:15:12.397000
|
||||
CVE-2024-0106,1,1,9729fc8649cbf920c9730e34e1ceb5586c73e24a7b31152ef501cc9836de7ac5,2024-11-01T06:15:12.883000
|
||||
CVE-2024-0105,0,0,60fd17b4603518f02d825b743a7f2e8102175b79226f47cc38be34ef2d2a380e,2024-11-01T06:15:12.397000
|
||||
CVE-2024-0106,0,0,9729fc8649cbf920c9730e34e1ceb5586c73e24a7b31152ef501cc9836de7ac5,2024-11-01T06:15:12.883000
|
||||
CVE-2024-0107,0,0,825deb4e82dfaf0b98f1fe2772df92223b06ae0e932511c6a748f272f8b997c9,2024-09-17T12:10:22.063000
|
||||
CVE-2024-0108,0,0,66f975a41bb5f0143618b7229f9a8d90fdad314725e86f6c633b765a762e46f3,2024-09-16T19:27:19.833000
|
||||
CVE-2024-0109,0,0,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000
|
||||
@ -242693,7 +242693,7 @@ CVE-2024-10617,0,0,c115ebd9184b04fc7c1cf06aa9e26acdfffe6db202fbc33d47a11aa0aee63
|
||||
CVE-2024-10618,0,0,a0ee98e6f2a3bb5f39d4ca6b901dbbe1976515e97aa421510e0aab57a1e74106,2024-11-01T04:15:09.513000
|
||||
CVE-2024-10619,0,0,5bf4086f57746e212e6ba5450810be6502ee6bcc7a030b63851d5cf33f5cbe7a,2024-11-01T04:15:10.897000
|
||||
CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000
|
||||
CVE-2024-10620,1,1,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b77774f3,2024-11-01T05:15:05.167000
|
||||
CVE-2024-10620,0,0,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b77774f3,2024-11-01T05:15:05.167000
|
||||
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
|
||||
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
|
||||
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
|
||||
@ -244861,7 +244861,7 @@ CVE-2024-21507,0,0,8947ae846b77ababc3f73b93eb86705240bc1e66f68d9ab3cc4c15c2d2f15
|
||||
CVE-2024-21508,0,0,91d3f4fd811265c7ae6cfbde19cc50f2a3032a6b0f431ed4f4fe4fe4037296ca,2024-04-11T12:47:44.137000
|
||||
CVE-2024-21509,0,0,c5c0f08bda5d62b0c47ab11da03ee29bc34441dcd1d184acfac375982cd1fb7e,2024-08-22T13:35:00.907000
|
||||
CVE-2024-2151,0,0,567e14a5be97fe288f7c22c1f514dc3379a49ed0781c50046999a25212abd777,2024-05-17T02:38:04.663000
|
||||
CVE-2024-21510,1,1,9e00d286caa4b89f7c2914a724fdce91b68b92573be43bba3e8dc44b44508504,2024-11-01T05:15:05.640000
|
||||
CVE-2024-21510,0,0,9e00d286caa4b89f7c2914a724fdce91b68b92573be43bba3e8dc44b44508504,2024-11-01T05:15:05.640000
|
||||
CVE-2024-21511,0,0,034219c7f11132d003e7f8ae540b3244138c125a352f628cb71b799c63f5d2cc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-21512,0,0,9cbfb13f3fd71c5173001386cf9b3561f71a4fbd60ae5c210558dde9343c193b,2024-06-06T13:15:31.390000
|
||||
CVE-2024-21513,0,0,2cc4921b2e7cf735a4c6ffcd0f834de9cbd6a82ef6ed4bcebed2a92ed1ba3df5,2024-08-01T13:46:45.590000
|
||||
@ -248647,7 +248647,7 @@ CVE-2024-26890,0,0,442ddef52e9c264bc395f1d392f8e749c4361ea4cfc6bd82e29e835d19500
|
||||
CVE-2024-26891,0,0,e75c6313f07c138ae9c36d0ab38fdf2f3dec2472492fc6c7e58e9f5d631654b1,2024-06-25T22:15:25.327000
|
||||
CVE-2024-26892,0,0,806d8c2f00888544d8f546c55fd045afd90c70f07a594d3bdbeb1d45feddd5ff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26893,0,0,547eb928978e29d7450e4ec7a0bc4d561c68a6c3cc4baa1bf0cc2f44e81b2c80,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26894,0,0,be66fe6645dacacddf87a89a0a2e96de8e32c9faf5fc4db2d80ecba37170695f,2024-06-27T12:15:22.177000
|
||||
CVE-2024-26894,0,1,e26952696ebbc603ce79e51fc62ca290fe74c2a9ed69fdd0de0954b1e9696e0f,2024-11-01T08:35:09.973000
|
||||
CVE-2024-26895,0,0,b9dd891a5343b75d81278d18982d49da18e6241368343883e4b0512359c9b37f,2024-06-25T23:15:27.080000
|
||||
CVE-2024-26896,0,0,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000
|
||||
CVE-2024-26897,0,0,f7f0ae7a29508e7fbb0b3fdfe5757c59953f0ebfc186579cd1f494f6556c9f6d,2024-06-25T23:15:27.180000
|
||||
@ -262871,7 +262871,7 @@ CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b3851
|
||||
CVE-2024-47913,0,0,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000
|
||||
CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000
|
||||
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
|
||||
CVE-2024-47939,1,1,7c5e0268339806dced4a5a853811407ac862fdbc263c3cb9e688a46627070a59,2024-11-01T05:15:05.950000
|
||||
CVE-2024-47939,0,0,7c5e0268339806dced4a5a853811407ac862fdbc263c3cb9e688a46627070a59,2024-11-01T05:15:05.950000
|
||||
CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000
|
||||
CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000
|
||||
@ -262999,7 +262999,7 @@ CVE-2024-48233,0,0,5079087488de765c44b2e5efadc3adcfed6b8eb841374ab16026cf622181f
|
||||
CVE-2024-48234,0,0,1a8d3e559037bd1781a9cae98ca9ac055b21e9cc548e55db5056102c863a9c6e,2024-10-29T19:35:19.743000
|
||||
CVE-2024-48235,0,0,34c8dce734cf6a79d3c05c66d81a06f8b97a702d18a590252918c2829053c503,2024-10-29T19:35:20.530000
|
||||
CVE-2024-48236,0,0,40c021b9ab0ef0fe1121c89c55613819f1f21cd79a305756de1a8bc6502d5e11,2024-10-29T19:35:21.310000
|
||||
CVE-2024-48237,0,0,f3d3944c7915cd53a5149061b05fd23c13ecbc6a88f801480d775419cbc2f7ef,2024-10-28T13:58:09.230000
|
||||
CVE-2024-48237,0,1,7fc4be0e37579c90650795a758e344399d21643de8b932b0003e436ed9b8f848,2024-11-01T08:35:14.437000
|
||||
CVE-2024-48238,0,0,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000
|
||||
CVE-2024-48239,0,0,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000
|
||||
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
|
||||
@ -263437,7 +263437,7 @@ CVE-2024-4947,0,0,3635839d47ca4be777d1000c77c519be36c42f5d72cb0c679b358b9a41c646
|
||||
CVE-2024-4948,0,0,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8ff8,2024-07-03T02:08:20.437000
|
||||
CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000
|
||||
CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000
|
||||
CVE-2024-49501,1,1,9aa848e778f60fe9db1b1fa3af8d0466b3fa6c9448f942b1edef1bd152766d5d,2024-11-01T05:15:06.280000
|
||||
CVE-2024-49501,0,0,9aa848e778f60fe9db1b1fa3af8d0466b3fa6c9448f942b1edef1bd152766d5d,2024-11-01T05:15:06.280000
|
||||
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
|
||||
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
|
||||
CVE-2024-49579,0,0,85b8fb1168559e66181366d5ecd0a3cbf5d9385b3a23eb2296d97e9422fe6782,2024-10-18T12:52:33.507000
|
||||
@ -266057,6 +266057,7 @@ CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc0
|
||||
CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000
|
||||
CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000
|
||||
CVE-2024-7424,1,1,a5be6e0eb0636ef17810581d3d0e44463aa0f37467006df96791ddc29bf14501,2024-11-01T08:15:11.647000
|
||||
CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000
|
||||
CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000
|
||||
CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000
|
||||
@ -267618,6 +267619,7 @@ CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615
|
||||
CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9650,0,0,c785e5c8b40ec3a7d0b9a0e25f6978363c5dcc2fc6507b9c6a2c03a208ac34e9,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93b5,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9655,1,1,bd7102085fae8d08a785f742ef0c0b0c3f0acc32ec2662bdb03ce71482a86442,2024-11-01T08:15:12.047000
|
||||
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user