From 54f6035d8e8b88cba1be929cd81bfd8ec6a697b6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 23 Oct 2024 18:03:27 +0000 Subject: [PATCH] Auto-Update: 2024-10-23T18:00:25.728102+00:00 --- CVE-2023/CVE-2023-200xx/CVE-2023-20063.json | 4 +- CVE-2023/CVE-2023-251xx/CVE-2023-25195.json | 22 +- CVE-2023/CVE-2023-259xx/CVE-2023-25956.json | 22 +- CVE-2023/CVE-2023-264xx/CVE-2023-26464.json | 22 +- CVE-2023/CVE-2023-272xx/CVE-2023-27296.json | 22 +- CVE-2023/CVE-2023-275xx/CVE-2023-27522.json | 22 +- CVE-2023/CVE-2023-283xx/CVE-2023-28326.json | 22 +- CVE-2023/CVE-2023-520xx/CVE-2023-52098.json | 14 +- CVE-2023/CVE-2023-521xx/CVE-2023-52102.json | 14 +- CVE-2024/CVE-2024-101xx/CVE-2024-10193.json | 131 ++- CVE-2024/CVE-2024-101xx/CVE-2024-10194.json | 143 ++- CVE-2024/CVE-2024-102xx/CVE-2024-10291.json | 137 +++ CVE-2024/CVE-2024-102xx/CVE-2024-10292.json | 137 +++ CVE-2024/CVE-2024-102xx/CVE-2024-10293.json | 137 +++ CVE-2024/CVE-2024-102xx/CVE-2024-10296.json | 137 +++ CVE-2024/CVE-2024-202xx/CVE-2024-20260.json | 56 + CVE-2024/CVE-2024-202xx/CVE-2024-20264.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20268.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20269.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20273.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20274.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20275.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20297.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20298.json | 64 ++ CVE-2024/CVE-2024-202xx/CVE-2024-20299.json | 64 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20300.json | 64 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20329.json | 64 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20330.json | 64 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20331.json | 64 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20339.json | 64 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20340.json | 64 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20341.json | 68 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20342.json | 68 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20351.json | 68 ++ CVE-2024/CVE-2024-223xx/CVE-2024-22329.json | 4 +- CVE-2024/CVE-2024-265xx/CVE-2024-26519.json | 39 +- CVE-2024/CVE-2024-301xx/CVE-2024-30124.json | 44 + CVE-2024/CVE-2024-310xx/CVE-2024-31029.json | 39 +- CVE-2024/CVE-2024-404xx/CVE-2024-40493.json | 39 +- CVE-2024/CVE-2024-404xx/CVE-2024-40494.json | 39 +- CVE-2024/CVE-2024-468xx/CVE-2024-46871.json | 93 +- CVE-2024/CVE-2024-476xx/CVE-2024-47658.json | 81 +- CVE-2024/CVE-2024-476xx/CVE-2024-47659.json | 141 ++- CVE-2024/CVE-2024-476xx/CVE-2024-47660.json | 117 +- CVE-2024/CVE-2024-476xx/CVE-2024-47662.json | 69 +- CVE-2024/CVE-2024-476xx/CVE-2024-47663.json | 160 ++- CVE-2024/CVE-2024-476xx/CVE-2024-47664.json | 91 +- CVE-2024/CVE-2024-476xx/CVE-2024-47665.json | 105 +- CVE-2024/CVE-2024-476xx/CVE-2024-47666.json | 81 +- CVE-2024/CVE-2024-476xx/CVE-2024-47667.json | 129 ++- CVE-2024/CVE-2024-476xx/CVE-2024-47678.json | 110 +- CVE-2024/CVE-2024-477xx/CVE-2024-47730.json | 110 +- CVE-2024/CVE-2024-477xx/CVE-2024-47731.json | 110 +- CVE-2024/CVE-2024-477xx/CVE-2024-47732.json | 86 +- CVE-2024/CVE-2024-477xx/CVE-2024-47733.json | 86 +- CVE-2024/CVE-2024-477xx/CVE-2024-47734.json | 122 +- CVE-2024/CVE-2024-477xx/CVE-2024-47737.json | 134 ++- CVE-2024/CVE-2024-477xx/CVE-2024-47739.json | 134 ++- CVE-2024/CVE-2024-477xx/CVE-2024-47745.json | 97 +- CVE-2024/CVE-2024-477xx/CVE-2024-47748.json | 134 ++- CVE-2024/CVE-2024-477xx/CVE-2024-47750.json | 110 +- CVE-2024/CVE-2024-477xx/CVE-2024-47751.json | 110 +- CVE-2024/CVE-2024-480xx/CVE-2024-48049.json | 47 +- CVE-2024/CVE-2024-484xx/CVE-2024-48415.json | 39 +- CVE-2024/CVE-2024-486xx/CVE-2024-48652.json | 39 +- CVE-2024/CVE-2024-486xx/CVE-2024-48656.json | 39 +- CVE-2024/CVE-2024-486xx/CVE-2024-48657.json | 39 +- CVE-2024/CVE-2024-492xx/CVE-2024-49286.json | 47 +- CVE-2024/CVE-2024-493xx/CVE-2024-49323.json | 47 +- CVE-2024/CVE-2024-493xx/CVE-2024-49328.json | 59 +- CVE-2024/CVE-2024-493xx/CVE-2024-49334.json | 47 +- CVE-2024/CVE-2024-496xx/CVE-2024-49652.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49653.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49657.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49658.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49668.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49669.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49671.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49676.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49684.json | 56 + CVE-2024/CVE-2024-496xx/CVE-2024-49690.json | 56 + CVE-2024/CVE-2024-497xx/CVE-2024-49701.json | 56 + CVE-2024/CVE-2024-497xx/CVE-2024-49751.json | 82 ++ CVE-2024/CVE-2024-497xx/CVE-2024-49756.json | 68 ++ CVE-2024/CVE-2024-498xx/CVE-2024-49851.json | 134 ++- CVE-2024/CVE-2024-498xx/CVE-2024-49852.json | 122 +- CVE-2024/CVE-2024-498xx/CVE-2024-49853.json | 110 +- CVE-2024/CVE-2024-498xx/CVE-2024-49854.json | 122 +- CVE-2024/CVE-2024-498xx/CVE-2024-49856.json | 122 +- CVE-2024/CVE-2024-498xx/CVE-2024-49858.json | 133 ++- CVE-2024/CVE-2024-498xx/CVE-2024-49860.json | 134 ++- CVE-2024/CVE-2024-498xx/CVE-2024-49861.json | 98 +- CVE-2024/CVE-2024-498xx/CVE-2024-49862.json | 98 +- CVE-2024/CVE-2024-503xx/CVE-2024-50382.json | 33 + CVE-2024/CVE-2024-503xx/CVE-2024-50383.json | 33 + CVE-2024/CVE-2024-60xx/CVE-2024-6010.json | 14 +- README.md | 102 +- _state.csv | 1109 ++++++++++--------- 98 files changed, 7454 insertions(+), 899 deletions(-) create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10291.json create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10292.json create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10293.json create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10296.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20260.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20264.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20268.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20269.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20273.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20274.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20275.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20297.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20298.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20299.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20300.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20329.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20330.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20331.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20339.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20340.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20341.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20342.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20351.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30124.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49652.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49653.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49657.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49658.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49668.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49669.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49671.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49676.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49684.json create mode 100644 CVE-2024/CVE-2024-496xx/CVE-2024-49690.json create mode 100644 CVE-2024/CVE-2024-497xx/CVE-2024-49701.json create mode 100644 CVE-2024/CVE-2024-497xx/CVE-2024-49751.json create mode 100644 CVE-2024/CVE-2024-497xx/CVE-2024-49756.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50382.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50383.json diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json index d6c578e4873..69dff718876 100644 --- a/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20063.json @@ -2,13 +2,13 @@ "id": "CVE-2023-20063", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-11-01T18:15:08.967", - "lastModified": "2024-01-25T17:15:28.157", + "lastModified": "2024-10-23T17:15:13.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device." + "value": "A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25195.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25195.json index 8f6ba422b66..f3c26716d39 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25195.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25195.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25195", "sourceIdentifier": "security@apache.org", "published": "2023-03-28T12:15:07.280", - "lastModified": "2023-11-07T04:08:56.857", + "lastModified": "2024-10-23T16:35:02.517", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25956.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25956.json index e27b2b51b90..b304b9c9d42 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25956.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25956.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25956", "sourceIdentifier": "security@apache.org", "published": "2023-02-24T12:15:30.867", - "lastModified": "2023-11-07T04:09:16.070", + "lastModified": "2024-10-23T17:35:01.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json index d30c592fc8b..2fddcd4b902 100644 --- a/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26464", "sourceIdentifier": "security@apache.org", "published": "2023-03-10T14:15:10.453", - "lastModified": "2023-05-05T20:15:10.253", + "lastModified": "2024-10-23T17:35:02.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27296.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27296.json index 9bde8f966dd..102a1e0c6f2 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27296.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27296.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27296", "sourceIdentifier": "security@apache.org", "published": "2023-03-27T15:15:08.650", - "lastModified": "2023-11-07T04:09:53.790", + "lastModified": "2024-10-23T17:35:02.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json index 4afcfe01994..7806dd6d021 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27522.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27522", "sourceIdentifier": "security@apache.org", "published": "2023-03-07T16:15:09.613", - "lastModified": "2023-09-08T22:15:10.817", + "lastModified": "2024-10-23T17:35:02.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28326.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28326.json index c2cff5f6887..d3b8a86ff48 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28326.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28326.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28326", "sourceIdentifier": "security@apache.org", "published": "2023-03-28T13:15:07.153", - "lastModified": "2023-11-07T04:10:28.880", + "lastModified": "2024-10-23T16:35:03.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52098.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52098.json index f0107058400..d8af51ad2a9 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52098.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52098", "sourceIdentifier": "psirt@huawei.com", "published": "2024-01-16T09:15:07.610", - "lastModified": "2024-01-19T19:12:13.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-23T16:35:05.387", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -59,6 +59,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52102.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52102.json index 92b843d4aca..5a8e5f7f76a 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52102.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52102", "sourceIdentifier": "psirt@huawei.com", "published": "2024-01-16T10:15:07.693", - "lastModified": "2024-01-19T19:30:49.283", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-23T16:35:06.720", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json index e998f4e91b2..a56ac093339 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10193", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T08:15:02.300", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:16:11.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,121 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wavlink:wn530h4_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20221028", + "matchCriteriaId": "FC6EC91A-7820-4387-ACB7-3747313DBDB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EA1D9AB-9DD2-42A8-BE96-6A07CB232C48" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wavlink:wn530hg4_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20221028", + "matchCriteriaId": "80C4ED9C-1FC9-40F2-807B-5C90B69EF406" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ACAF792-450A-4C0D-81DF-CC61EBCA7305" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wavlink:wn572hg3_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20221028", + "matchCriteriaId": "4F946982-3A15-4E5D-838B-CBDC56A813A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D85484EB-22F0-4140-9B9F-AC5EB24159DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.google.com/document/d/13XWnFITW31u5J8HeQj8Zm-7oLt-M1DtQ/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280967", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280967", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.422811", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json index e09c8b112d2..9cfcfa484f2 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10194", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-20T08:15:02.710", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:16:49.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,121 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wavlink:wn530h4_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20221028", + "matchCriteriaId": "FC6EC91A-7820-4387-ACB7-3747313DBDB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EA1D9AB-9DD2-42A8-BE96-6A07CB232C48" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wavlink:wn530hg4_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20221028", + "matchCriteriaId": "80C4ED9C-1FC9-40F2-807B-5C90B69EF406" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ACAF792-450A-4C0D-81DF-CC61EBCA7305" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wavlink:wn572hg3_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20221028", + "matchCriteriaId": "4F946982-3A15-4E5D-838B-CBDC56A813A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D85484EB-22F0-4140-9B9F-AC5EB24159DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.google.com/document/d/1PodIMRe1f0Ql83jUXV5VIoc-Xsf9VC1K", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280968", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280968", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.422834", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10291.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10291.json new file mode 100644 index 00000000000..7bd01c3912c --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10291.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10291", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-23T16:15:04.597", + "lastModified": "2024-10-23T16:15:04.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in ZZCMS 2023 and classified as critical. This vulnerability affects the function Ebak_DoExecSQL/Ebak_DotranExecutSQL of the file 3/Ebak5.1/upload/phome.php. The manipulation of the argument phome leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LvZCh/zzcms2023/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.281560", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.281560", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.427101", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10292.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10292.json new file mode 100644 index 00000000000..23520361060 --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10292.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10292", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-23T16:15:04.943", + "lastModified": "2024-10-23T16:15:04.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ZZCMS 2023 and classified as critical. This issue affects some unknown processing of the file 3/Ebak5.1/upload/ChangeTable.php. The manipulation of the argument savefilename leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LvZCh/zzcms2023/issues/5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.281561", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.281561", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.427136", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10293.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10293.json new file mode 100644 index 00000000000..e3bc1c52bc6 --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10293.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10293", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-23T16:15:05.207", + "lastModified": "2024-10-23T16:15:05.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ZZCMS 2023. It has been classified as critical. Affected is the function Ebak_SetGotoPak of the file 3/Ebbak5.1/upload/class/functions.php. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LvZCh/zzcms2023/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.281562", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.281562", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.427146", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10296.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10296.json new file mode 100644 index 00000000000..9737f33e7e6 --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10296.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-10296", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-23T17:15:13.690", + "lastModified": "2024-10-23T17:15:13.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Medical Card Generation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/card-bwdates-reports-details.php of the component Report of Medical Card Page. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.281563", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.281563", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.427400", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20260.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20260.json new file mode 100644 index 00000000000..6d2ae006c34 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20260.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20260", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:13.950", + "lastModified": "2024-10-23T17:15:13.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the VPN and management web servers of the Cisco Adaptive Security Virtual Appliance (ASAv) and Cisco Secure Firewall Threat Defense Virtual (FTDv), formerly Cisco Firepower Threat Defense Virtual, platforms could allow an unauthenticated, remote attacker to cause the virtual devices to run out of system memory, which could cause SSL VPN connection processing to slow down and eventually cease all together.\r\n\r\nThis vulnerability is due to a lack of proper memory management for new incoming SSL/TLS connections on the virtual platforms. An attacker could exploit this vulnerability by sending a large number of new incoming SSL/TLS connections to the targeted virtual platform. A successful exploit could allow the attacker to deplete system memory, resulting in a denial of service (DoS) condition. The memory could be reclaimed slowly if the attack traffic is stopped, but a manual reload may be required to restore operations quickly." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-789" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftdvirtual-dos-MuenGnYR", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json new file mode 100644 index 00000000000..61f369bb44a --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20264", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:14.180", + "lastModified": "2024-10-23T17:15:14.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20268.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20268.json new file mode 100644 index 00000000000..c28e63e81b3 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20268.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20268", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:14.387", + "lastModified": "2024-10-23T17:15:14.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause an unexpected reload of the device.\r\n\r\nThis vulnerability is due to insufficient input validation of SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device using IPv4 or IPv6. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects all versions of SNMP (versions 1, 2c, and 3) and requires a valid SNMP community string or valid SNMPv3 user credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-231" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-7TcnzxTU", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json new file mode 100644 index 00000000000..4fda21c2a7b --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20269", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:14.610", + "lastModified": "2024-10-23T17:15:14.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json new file mode 100644 index 00000000000..84b0d6f33fb --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20273", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:14.813", + "lastModified": "2024-10-23T17:15:14.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20274.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20274.json new file mode 100644 index 00000000000..900c8f978cf --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20274.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20274", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:15.027", + "lastModified": "2024-10-23T17:15:15.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document.\r\n\r\nThis vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, access arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To successfully exploit this vulnerability, an attacker would need valid credentials for a user account with policy-editing permissions, such as Network Admin, Intrusion Admin, or any custom user role with the same capabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-nfJeYHxz", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20275.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20275.json new file mode 100644 index 00000000000..37bccf90734 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20275.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20275", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:15.237", + "lastModified": "2024-10-23T17:15:15.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the cluster backup feature of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.\r\n\r\nThis vulnerability is due to insufficient validation of user data that is supplied through the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary operating system commands on the affected device. To exploit this vulnerability, an attacker would need valid credentials for a user account with at least the role of Network Administrator. In addition, the attacker would need to persuade a legitimate user to initiate a cluster backup on the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-g8AOKnDP", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20297.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20297.json new file mode 100644 index 00000000000..5740ca1818c --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20297.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20297", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:15.437", + "lastModified": "2024-10-23T17:15:15.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the AnyConnect firewall for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should have been denied to flow through an affected device. This vulnerability is due to a logic error in populating group ACLs when an AnyConnect client establishes a new session toward an affected device. An attacker could exploit this vulnerability by establishing an AnyConnect connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-acl-bypass-VvnLNKqf", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json new file mode 100644 index 00000000000..71e787e6d9d --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20298", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:15.710", + "lastModified": "2024-10-23T17:15:15.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20299.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20299.json new file mode 100644 index 00000000000..52dd3f221d7 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20299.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20299", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:16.900", + "lastModified": "2024-10-23T17:15:16.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the AnyConnect firewall for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should have been denied to flow through an affected device. This vulnerability is due to a logic error in populating group ACLs when an AnyConnect client establishes a new session toward an affected device. An attacker could exploit this vulnerability by establishing an AnyConnect connection to the affected device. A successful exploit could allow the attacker to bypass configured ACL rules." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-acl-bypass-VvnLNKqf", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20300.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20300.json new file mode 100644 index 00000000000..2b7e3041fe4 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20300.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20300", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:17.253", + "lastModified": "2024-10-23T17:15:17.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20329.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20329.json new file mode 100644 index 00000000000..25977c500c5 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20329.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20329", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:17.457", + "lastModified": "2024-10-23T17:15:17.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to execute operating system commands as root.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by submitting crafted input when executing remote CLI commands over SSH. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-146" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-rce-gRAuPEUF", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20330.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20330.json new file mode 100644 index 00000000000..b907922f74f --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20330.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20330", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:17.663", + "lastModified": "2024-10-23T17:15:17.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Snort 2 and Snort 3 TCP and UDP detection engine of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause memory corruption, which could cause the Snort detection engine to restart unexpectedly.\r\n\r\nThis vulnerability is due to improper memory management when the Snort detection engine processes specific TCP or UDP packets. An attacker could exploit this vulnerability by sending crafted TCP or UDP packets through a device that is inspecting traffic using the Snort detection engine. A successful exploit could allow the attacker to restart the Snort detection engine repeatedly, which could cause a denial of service (DoS) condition. The DoS condition impacts only the traffic through the device that is examined by the Snort detection engine. The device can still be managed over the network.\r\nNote: Once a memory block is corrupted, it cannot be cleared until the Cisco Firepower 2100 Series Appliance is manually reloaded. This means that the Snort detection engine could crash repeatedly, causing traffic that is processed by the Snort detection engine to be dropped until the device is manually reloaded." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-788" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd2100-snort-dos-M9HuMt75", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20331.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20331.json new file mode 100644 index 00000000000..71d289d4a7c --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20331.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20331", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:17.870", + "lastModified": "2024-10-23T17:15:17.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the session authentication functionality of the Remote Access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to prevent users from authenticating.\r\n\r\nThis vulnerability is due to insufficient entropy in the authentication process. An attacker could exploit this vulnerability by determining the handle of an authenticating user and using it to terminate their authentication session. A successful exploit could allow the attacker to force a user to restart the authentication process, preventing a legitimate user from establishing remote access VPN sessions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-nyH3fhp", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20339.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20339.json new file mode 100644 index 00000000000..e469a2b61a8 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20339.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20339", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:18.097", + "lastModified": "2024-10-23T17:15:18.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the TLS processing feature of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to an issue that occurs when TLS traffic is processed. An attacker could exploit this vulnerability by sending certain TLS traffic over IPv4 through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition and impacting traffic to and through the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20340.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20340.json new file mode 100644 index 00000000000..d6e8e94fc79 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20340.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-20340", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:18.300", + "lastModified": "2024-10-23T17:15:18.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software, formerly Firepower Management Center Software, could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, an attacker must have a valid account on the device with the role of Security Approver, Intrusion Admin, Access Admin, or Network Admin.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to read the contents of databases on the affected device and also obtain limited read access to the underlying operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20341.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20341.json new file mode 100644 index 00000000000..1d82b157fbd --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20341.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-20341", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:18.493", + "lastModified": "2024-10-23T17:15:18.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-xss-yjj7ZjVq", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-yjj7ZjVq", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20342.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20342.json new file mode 100644 index 00000000000..c35b9163728 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20342.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-20342", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:18.703", + "lastModified": "2024-10-23T17:15:18.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter.\r\n\r\nThis vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1025" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-xss-yjj7ZjVq", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-rf-bypass-OY8f3pnM", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20351.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20351.json new file mode 100644 index 00000000000..a79120522fa --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20351.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-20351", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-23T17:15:18.913", + "lastModified": "2024-10-23T17:15:18.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-xss-yjj7ZjVq", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort-fw-BCJTZPMu", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json index 6facc3fbb30..dca5fa82fdb 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22329.json @@ -2,13 +2,13 @@ "id": "CVE-2024-22329", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-17T02:15:10.947", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-10-23T16:15:05.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nIBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 are vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, an attacker could exploit this vulnerability to conduct the SSRF attack. X-Force ID: 279951.\n\n" + "value": "IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 are vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, an attacker could exploit this vulnerability to conduct the SSRF attack. X-Force ID: 279951." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26519.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26519.json index b9cac7bf7e8..c9905cb11be 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26519.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26519.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26519", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:04.220", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T17:35:03.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un problema en Casa Systems NTC-221 versi\u00f3n 2.0.99.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el componente /www/cgi-bin/nas.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://cybercx.com.au/blog/zero-day-rce-in-netcomm-ntc-221-industrial-iot-m2m-lte-4g-router/", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30124.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30124.json new file mode 100644 index 00000000000..3b81fa407ac --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30124.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-30124", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-10-23T16:15:05.667", + "lastModified": "2024-10-23T16:15:05.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HCL Sametime is impacted by insecure services in-use on the UIM client by default. An unused legacy REST service was enabled by default using the HTTP protocol. An attacker could potentially use this service endpoint maliciously." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31029.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31029.json index 5b313977443..32de57e7195 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31029.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31029.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31029", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:04.313", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T17:35:04.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en la funci\u00f3n server_handle_regular del archivo test_coap_server.c dentro del proyecto FreeCoAP permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de paquetes especialmente manipulados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/dqp10515/41ec400b7eecfcae7578d505598ab85f", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40493.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40493.json index 20428e23b2b..709de39737b 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40493.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40493.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40493", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:04.407", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T16:35:08.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " La desreferencia de puntero nulo en la funci\u00f3n `coap_client_exchange_blockwise2` en Keith Cullen FreeCoAP 1.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio y potencialmente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete CoAP especialmente manipulado que hace que `coap_msg_get_payload(resp)` devuelva un puntero nulo, que luego se desreferencia en una llamada a `memcpy`." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/dqp10515/fe80005e2fb58ed8ada178ac017e4ad4", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40494.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40494.json index 3a4962345cc..c70c7410389 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40494.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40494.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40494", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:04.493", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T17:35:05.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " El desbordamiento de b\u00fafer en coap_msg.c en FreeCoAP permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria ) a trav\u00e9s de un paquete manipulado espec\u00edficamente para ello." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/dqp10515/e9d7d663cb89187bfe7b39bb3aeb0113", diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json index 06cae340f70..ad6411ba57c 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46871", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.533", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:10:48.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Corrija el valor definido para AMDGPU_DMUB_NOTIFICATION_MAX [Por qu\u00e9 y c\u00f3mo] En realidad, expone '6' tipos en la enumeraci\u00f3n dmub_notification_type. No 5. El uso de un n\u00famero menor para crear la matriz dmub_callback y dmub_thread_offload tiene el potencial de acceder a un elemento fuera del l\u00edmite de la matriz. Arr\u00e9glelo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.109", + "matchCriteriaId": "EFD3BACD-EA1D-4437-A135-A3E7A761F54F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.50", + "matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.9", + "matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/800a5ab673c4a61ca220cce177386723d91bdb37", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f404b0bc2df3880758fb3c3bc7496f596f347d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad28d7c3d989fc5689581664653879d664da76f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c592b6355b9b57b8e59fc5978ce1e14f64488a98", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json index 4c1754f4f75..648246cc5b9 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47658", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.603", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:14:46.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: stm32/cryp - call finalize with bh disabled La operaci\u00f3n finalize en modo de interrupci\u00f3n produce una advertencia de recursi\u00f3n de spinlock. La raz\u00f3n es que BH debe estar deshabilitado durante este proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.50", + "matchCriteriaId": "FAE86900-6239-4D0C-B6C0-70BF7C6BA610" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.9", + "matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/56ddb9aa3b324c2d9645b5a7343e46010cf3f6ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d734665cd5d93270731e0ff1dd673fec677f447", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d93a2f86b0a998aa1f0870c85a2a60a0771ef89a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json index a709c4c5aad..817bb4a45e0 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47659.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47659", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.660", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:29:14.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smack: tcp: ipv4, corregir etiquetado incorrecto Actualmente, Smack refleja la etiqueta de las conexiones entrantes tcp/ipv4: cuando una etiqueta 'foo' se conecta a una etiqueta 'bar' con tcp/ipv4, 'foo' siempre obtiene 'foo' en los paquetes ipv4 devueltos. Por lo tanto, 1) los paquetes devueltos est\u00e1n etiquetados incorrectamente ('foo' en lugar de 'bar') 2) 'bar' puede escribir en 'foo' sin estar autorizado para escribir. Aqu\u00ed hay un escenario para ver esto: * Tome dos m\u00e1quinas, llam\u00e9moslas C y S, con Smack activo en el estado predeterminado (sin configuraciones, sin reglas, sin hosts etiquetados, solo etiquetas incorporadas) * En S, agregue la regla de Smack 'foo bar w' (las etiquetas 'foo' y 'bar' est\u00e1n instanciadas en S en este momento) * En S, en la etiqueta 'bar', inicie un programa que escuche conexiones entrantes tcp/ipv4 * Desde C, en la etiqueta 'foo', con\u00e9ctese al oyente en S. (la etiqueta 'foo' est\u00e1 instanciada en C en este momento) La conexi\u00f3n es exitosa y funciona. * Env\u00ede algunos datos en ambas direcciones. * Recolecte tr\u00e1fico de red de esta conexi\u00f3n. Todos los paquetes en ambas direcciones est\u00e1n etiquetados con el CIPSO de la etiqueta 'foo'. Por lo tanto, la etiqueta 'bar' escribe en 'foo' sin estar autorizada, e incluso sin ser conocida en C. Si a alguien le importa: exactamente lo mismo sucede con DCCP. Este comportamiento se manifest\u00f3 por primera vez en la versi\u00f3n 2.6.29.4 (ver Correcciones a continuaci\u00f3n) y parece no ser intencional. Al menos, no se proporcion\u00f3 ninguna explicaci\u00f3n. Cambi\u00e9 la etiqueta de los paquetes devueltos por \"barra\" para que coincida con lo que afirma la documentaci\u00f3n de Smack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.322", + "matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.284", + "matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.226", + "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.167", + "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.109", + "matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.50", + "matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.9", + "matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0776bcf9cb6de46fdd94d10118de1cf9b05f83b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0aea09e82eafa50a373fc8a4b84c1d4734751e2c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2fe209d0ad2e2729f7e22b9b31a86cc3ff0db550", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4be9fd15c3c88775bdf6fa37acabe6de85beebff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b4b304f196c070342e32a4752e1fa2e22fc0671", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a948ec993541db4ef392b555c37a1186f4d61670", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3703fa94116fed91f64c7d1c7d284fb4369070f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3f56c653c65f170b172d3c23120bc64ada645d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json index 2dea76731fb..f125c37a47c 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47660.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47660", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T14:15:07.730", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:00:47.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fsnotify: borrar indicadores PARENT_WATCHED de forma diferida En algunas configuraciones, los directorios pueden tener muchas entradas (normalmente negativas). Por lo tanto, la funci\u00f3n __fsnotify_update_child_dentry_flags() puede tardar una cantidad significativa de tiempo. Dado que la mayor parte de esta funci\u00f3n se realiza en inode->i_lock, esto provoca una contenci\u00f3n significativa en el bloqueo cuando eliminamos la vigilancia del directorio, ya que la llamada __fsnotify_update_child_dentry_flags() desde fsnotify_recalc_mask() compite con las llamadas __fsnotify_update_child_dentry_flags() desde __fsnotify_parent() que ocurren en los hijos. Esto puede provocar informes de bloqueo suave informados por los usuarios. Solucione el problema llamando a fsnotify_update_children_dentry_flags() para establecer los indicadores PARENT_WATCHED solo cuando el padre comience a vigilar a los hijos. Cuando el padre deja de vigilar a los hijos, borra los indicadores de falsos positivos PARENT_WATCHED de forma diferida en __fsnotify_parent() para cada hijo al que acceda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.226", + "matchCriteriaId": "2C67534D-8BBC-4069-8DEA-62295B16358C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.167", + "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.109", + "matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.50", + "matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.9", + "matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/172e422ffea20a89bfdc672741c1aad6fbb5044e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f3ef1d9f66b93913ce2171120d9226b55acd41d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ef1d2e240c32b1f337a37232d037b07e3919e1a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8c42405fc3507cc43ba7e4986a773c3fc633f6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f9a48bc3dd9099935751458a5bbbea4b7c28abc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc1b1e135c3f72382f792e6c319fc088d5523ad5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json index 1bcaca1f6fe..fa62b6dc79a 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47662", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.080", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:53:12.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Eliminar registro de la recopilaci\u00f3n de diagn\u00f3sticos DMCUB de DCN35 [Por qu\u00e9] Estos registros no se deben leer desde el controlador y desencadenar la violaci\u00f3n de seguridad cuando el tiempo de trabajo de DMCUB se agota y se recopilan los diagn\u00f3sticos bloquea la entrada Z8. [C\u00f3mo] Eliminar la lectura del registro de DCN35." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.10.9", + "matchCriteriaId": "24175937-56EC-4F8D-B998-C00E8F09D4A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/466423c6dd8af23ebb3a69d43434d01aed0db356", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eba4b2a38ccdf074a053834509545703d6df1d57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json index b5d68dc5d70..d0235e71444 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47663.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47663", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.150", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:50:53.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,175 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: iio: frequency: ad9834: Validar el valor del par\u00e1metro de frecuencia En ad9834_write_frequency(), clk_get_rate() puede devolver 0. En tal caso, la llamada a ad9834_calc_freqreg() dar\u00e1 lugar a una divisi\u00f3n por cero. La comprobaci\u00f3n de 'if (fout > (clk_freq / 2))' no protege en caso de que 'fout' sea 0. ad9834_write_frequency() se llama desde ad9834_write(), donde fout se toma del b\u00fafer de texto, que puede contener cualquier valor. Comprobaci\u00f3n de modificaci\u00f3n de par\u00e1metros. Encontrado por Linux Verification Center (linuxtesting.org) con SVACE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.38", + "versionEndExcluding": "5.4.284", + "matchCriteriaId": "F2BFB68D-5C59-4390-B406-2E9CD1A5D238" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.226", + "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.167", + "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.110", + "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.51", + "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.10", + "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e727707a239d5c519fc9abc2f0fd913516a7e47", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ba9abfcaa9e16bb91ed7e0e2b42e94a157a953e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41cc91e3138fe52f8da92a81bebcd0e6cf488c53", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8961b245e8f92bccbaacfbbdf69eba60e3e7c227", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b48aa991758999d4e8f9296c5bbe388f293ef465", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8b09a5edc4a634373158c1a405491de3c52e58a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc12e49f970b08d8b007b8981b97e2eb93c0e89d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json index 1971484a490..945d940bf85 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47664.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47664", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.223", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:47:35.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,98 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: hisi-kunpeng: Agregar verificaci\u00f3n para max_frequency proporcionada por el firmware Si el valor de max_speed_hz es 0, puede causar un error de divisi\u00f3n por cero en hisi_calc_effective_speed(). El valor de max_speed_hz lo proporciona el firmware. El firmware generalmente se considera un dominio confiable. Sin embargo, como los errores de divisi\u00f3n por cero pueden causar fallas del sistema, como medida de defensa, el valor de max_speed se valida aqu\u00ed. Entonces, 0 se considera inv\u00e1lido y se devuelve un c\u00f3digo de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.51", + "matchCriteriaId": "D4954ED0-8229-4D57-B4B3-CB5154734977" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.10", + "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/16ccaf581da4fcf1e4d66086cf37263f9a656d43", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5127c42c77de18651aa9e8e0a3ced190103b449c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee73a15d4a8ce8fb02d7866f7cf78fcdd16f0fcc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json index 973f5ffdb5c..2e1c374026c 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47665", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.290", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:44:59.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,116 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: mipi-i3c-hci: Error en lugar de BUG_ON() en la configuraci\u00f3n de IBI DMA Definitivamente, la condici\u00f3n dma_get_cache_alignment * valor definido > 256 durante la inicializaci\u00f3n del controlador no es motivo para BUG_ON(). Convierta eso en un error elegante con -EINVAL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.167", + "matchCriteriaId": "11023E9B-B046-4BF0-AB48-269A0E833DDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.110", + "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.51", + "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.10", + "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2666085335bdfedf90d91f4071490ad3980be785", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a022269abb22809f2a174b90f200fc4b9526058", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a2be2f1db268ec735419e53ef04ca039fc027dc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cacb76df247a7cd842ff29755a523b1cba6c0508", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2d14bfda9eb5393f8a17008afe2aa7fe0a29815", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json index 442da0c6169..274e9c51e35 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47666.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47666", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.353", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:34:49.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: pm80xx: Establecer phy->enable_completion solo cuando lo esperamos pm8001_phy_control() rellena el puntero enable_completion con una direcci\u00f3n de pila, env\u00eda un PHY_LINK_RESET / PHY_HARD_RESET, espera 300 ms y regresa. El problema surge cuando una respuesta de control phy llega tarde. Despu\u00e9s de 300 ms, la funci\u00f3n pm8001_phy_control() regresa y la direcci\u00f3n de pila enable_completion pasada ya no es v\u00e1lida. La respuesta de control phy tard\u00eda invoca complete() en un puntero enable_completion colgante que conduce a un bloqueo del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.51", + "matchCriteriaId": "D4954ED0-8229-4D57-B4B3-CB5154734977" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.10", + "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7b1d779647afaea9185fa2f150b1721e7c1aae89", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e4f949ef1516c0d74745ee54a0f4882c1f6c7aea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f14d3e1aa613311c744af32d75125e95fc8ffb84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json index 6e2123b4b16..da460214089 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47667", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-09T15:15:15.430", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:31:43.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,144 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: keystone: Agregar workaround para Errata #i2037 (AM65x SR 1.0) Errata #i2037 en procesadores AM65x/DRA80xM Silicon Revision 1.0 (SPRZ452D_julio de 2018_revisado en diciembre de 2019 [1]) menciona que cuando un TLP PCIe entrante abarca m\u00e1s de dos r\u00e1fagas internas AXI de 128 bytes, el bus puede da\u00f1ar el payload del paquete y los datos da\u00f1ados pueden hacer que las aplicaciones asociadas o el procesador se cuelguen. El workaround para Errata #i2037 es limitar el tama\u00f1o m\u00e1ximo de solicitud de lectura y el tama\u00f1o m\u00e1ximo de payloas a 128 bytes. Agregar workaround para Errata #i2037 aqu\u00ed. La errata y el workaround a son aplicables solo a AM65x SR 1.0 y las versiones posteriores del silicio tendr\u00e1n esto corregido. [1] -> https://www.ti.com/lit/er/sprz452i/sprz452i.pdf" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.284", + "matchCriteriaId": "B1C17E9C-479F-4AE4-8344-B7A213DE3E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.226", + "matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.167", + "matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.110", + "matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.51", + "matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.10", + "matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/135843c351c08df72bdd4b4ebea53c8052a76881", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/576d0fb6f8d4bd4695e70eee173a1b9c7bae9572", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/86f271f22bbb6391410a07e08d6ca3757fda01fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af218c803fe298ddf00abef331aa526b20d7ea61", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfb006e185f64edbbdf7869eac352442bc76b8f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd47051c76c8acd8cb983f01b4d1265da29cb66a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebbdbbc580c1695dec283d0ba6448729dc993246", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json index d4a6d7574e2..69aa97f0750 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47678.json @@ -2,36 +2,130 @@ "id": "CVE-2024-47678", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:04.837", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:58:08.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: change the order of rate limits\n\nICMP messages are ratelimited :\n\nAfter the blamed commits, the two rate limiters are applied in this order:\n\n1) host wide ratelimit (icmp_global_allow())\n\n2) Per destination ratelimit (inetpeer based)\n\nIn order to avoid side-channels attacks, we need to apply\nthe per destination check first.\n\nThis patch makes the following change :\n\n1) icmp_global_allow() checks if the host wide limit is reached.\n But credits are not yet consumed. This is deferred to 3)\n\n2) The per destination limit is checked/updated.\n This might add a new node in inetpeer tree.\n\n3) icmp_global_consume() consumes tokens if prior operations succeeded.\n\nThis means that host wide ratelimit is still effective\nin keeping inetpeer tree small even under DDOS.\n\nAs a bonus, I removed icmp_global.lock as the fast path\ncan use a lock-free operation." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: icmp: cambia el orden de los l\u00edmites de velocidad Los mensajes ICMP est\u00e1n limitados por velocidad: despu\u00e9s de las confirmaciones culpables, se aplican los dos limitadores de velocidad en este orden: 1) l\u00edmite de velocidad de todo el host (icmp_global_allow()) 2) l\u00edmite de velocidad por destino (basado en inetpeer) Para evitar ataques de canales secundarios, primero debemos aplicar la comprobaci\u00f3n por destino. Este parche realiza el siguiente cambio: 1) icmp_global_allow() comprueba si se ha alcanzado el l\u00edmite de todo el host. Pero a\u00fan no se han consumido los cr\u00e9ditos. Esto se pospone a 3) 2) Se comprueba/actualiza el l\u00edmite por destino. Esto podr\u00eda agregar un nuevo nodo en el \u00e1rbol inetpeer. 3) icmp_global_consume() consume tokens si las operaciones anteriores tuvieron \u00e9xito. Esto significa que el l\u00edmite de velocidad de todo el host sigue siendo eficaz para mantener peque\u00f1o el \u00e1rbol inetpeer incluso bajo DDOS. Como beneficio adicional, elimin\u00e9 icmp_global.lock ya que la ruta r\u00e1pida puede usar una operaci\u00f3n sin bloqueo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.18", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "FBD751AA-4593-4525-B2FB-57EAC7F81608" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/483397b4ba280813e4a9c161a0a85172ddb43d19", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/662ec52260cc07b9ae53ecd3925183c29d34288b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c2bd38b95f75f3d2a08c93e35303e26d480d24e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/997ba8889611891f91e8ad83583466aeab6239a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7722921adb046e3836eb84372241f32584bdb07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json index 163f1aebc80..e7415ab03cb 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47730.json @@ -2,36 +2,130 @@ "id": "CVE-2024-47730", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.160", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:03:23.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/qm - inject error before stopping queue\n\nThe master ooo cannot be completely closed when the\naccelerator core reports memory error. Therefore, the driver\nneeds to inject the qm error to close the master ooo. Currently,\nthe qm error is injected after stopping queue, memory may be\nreleased immediately after stopping queue, causing the device to\naccess the released memory. Therefore, error is injected to close master\nooo before stopping queue to ensure that the device does not access\nthe released memory." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: hisilicon/qm - inyectar error antes de detener la cola El master ooo no se puede cerrar por completo cuando el n\u00facleo del acelerador informa un error de memoria. Por lo tanto, el controlador debe inyectar el error qm para cerrar el master ooo. Actualmente, el error qm se inyecta despu\u00e9s de detener la cola, la memoria puede liberarse inmediatamente despu\u00e9s de detener la cola, lo que hace que el dispositivo acceda a la memoria liberada. Por lo tanto, se inyecta un error para cerrar el master ooo antes de detener la cola para garantizar que el dispositivo no acceda a la memoria liberada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "DF0452F4-0785-476F-8776-1A8833B71888" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/98d3be34c9153eceadb56de50d9f9347e88d86e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa3e0db35a60002fb34ef0e4ad203aa59fd00203", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b04f06fc0243600665b3b50253869533b7938468", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c5f5b813e546f7fe133539c3d7a5086cc8dd2aa1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8024f12752e32ffbbf59e1c09d949f977ff743f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json index c01e902d3de..a5bffffaa16 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47731.json @@ -2,36 +2,130 @@ "id": "CVE-2024-47731", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.260", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:06:14.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers/perf: Fix ali_drw_pmu driver interrupt status clearing\n\nThe alibaba_uncore_pmu driver forgot to clear all interrupt status\nin the interrupt processing function. After the PMU counter overflow\ninterrupt occurred, an interrupt storm occurred, causing the system\nto hang.\n\nTherefore, clear the correct interrupt status in the interrupt handling\nfunction to fix it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers/perf: Fix ali_drw_pmu driver interval clearing El controlador alibaba_uncore_pmu olvid\u00f3 borrar todos los estados de interrupci\u00f3n en la funci\u00f3n de procesamiento de interrupciones. Despu\u00e9s de que se produjo la interrupci\u00f3n por desbordamiento del contador de PMU, se produjo una tormenta de interrupciones, lo que provoc\u00f3 que el sistema se colgara. Por lo tanto, borre el estado de interrupci\u00f3n correcto en la funci\u00f3n de manejo de interrupciones para solucionarlo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "C9833DA6-D5C8-4B44-9B42-1FF7CB895D7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/062b7176e484678b2c9072d28fbecea47846b274", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/24f30b34ff76648d26872dd4eaa002f074225058", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b839d4619042b02eecdfc986484ac6e6be6acbf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/85702fddba70d2b63f5646793d77de2ad4fc3784", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3dd920977dccc453c550260c4b7605b280b79c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json index bb7670cf6bd..1fe67ebcc4d 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47732.json @@ -2,28 +2,102 @@ "id": "CVE-2024-47732", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.363", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:31:03.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix potential use after free bug\n\nThe free_device_compression_mode(iaa_device, device_mode) function frees\n\"device_mode\" but it iss passed to iaa_compression_modes[i]->free() a few\nlines later resulting in a use after free.\n\nThe good news is that, so far as I can tell, nothing implements the\n->free() function and the use after free happens in dead code. But, with\nthis fix, when something does implement it, we'll be ready. :)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: iaa - Fix potential use after free bug La funci\u00f3n free_device_compression_mode(iaa_device, device_mode) libera \"device_mode\" pero se pasa a iaa_compression_modes[i]->free() unas l\u00edneas m\u00e1s adelante, lo que da como resultado un use after free. La buena noticia es que, hasta donde puedo decir, nada implementa la funci\u00f3n ->free() y el use after free ocurre en c\u00f3digo muerto. Pero, con esta soluci\u00f3n, cuando algo la implemente, estaremos listos. :)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "C22AF5AC-7F54-4360-A603-8A032CC9087A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/b5d534b473e2c8d3e4560be2dd6c12a8eb9d61e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c66f0be993ba52410edab06124c54ecf143b05c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e0d3b845a1b10b7b5abdad7ecc69d45b2aab3209", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json index 851742dabfb..c3d15b6c171 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47733.json @@ -2,28 +2,102 @@ "id": "CVE-2024-47733", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.450", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:11:29.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Delete subtree of 'fs/netfs' when netfs module exits\n\nIn netfs_init() or fscache_proc_init(), we create dentry under 'fs/netfs',\nbut in netfs_exit(), we only delete the proc entry of 'fs/netfs' without\ndeleting its subtree. This triggers the following WARNING:\n\n==================================================================\nremove_proc_entry: removing non-empty directory 'fs/netfs', leaking at least 'requests'\nWARNING: CPU: 4 PID: 566 at fs/proc/generic.c:717 remove_proc_entry+0x160/0x1c0\nModules linked in: netfs(-)\nCPU: 4 UID: 0 PID: 566 Comm: rmmod Not tainted 6.11.0-rc3 #860\nRIP: 0010:remove_proc_entry+0x160/0x1c0\nCall Trace:\n \n netfs_exit+0x12/0x620 [netfs]\n __do_sys_delete_module.isra.0+0x14c/0x2e0\n do_syscall_64+0x4b/0x110\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n==================================================================\n\nTherefore use remove_proc_subtree() instead of remove_proc_entry() to\nfix the above problem." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfs: Eliminar sub\u00e1rbol de 'fs/netfs' cuando el m\u00f3dulo netfs sale En netfs_init() o fscache_proc_init(), creamos una dentry bajo 'fs/netfs', pero en netfs_exit(), solo eliminamos la entrada de procedimiento de 'fs/netfs' sin eliminar su sub\u00e1rbol. Esto activa la siguiente ADVERTENCIA: == ... netfs_exit+0x12/0x620 [netfs] __do_sys_delete_module.isra.0+0x14c/0x2e0 do_syscall_64+0x4b/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e ======================================================================= Por lo tanto, utilice remove_proc_subtree() en lugar de remove_proc_entry() para solucionar el problema anterior." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "C22AF5AC-7F54-4360-A603-8A032CC9087A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3c58a9575e02c2b90a3180007d57105ceaa7c246", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/603f95cefbee06a31b03137b777f03e3c2163d72", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7a9eaf97d56625e55b31a7beb558e1ee185ca461", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json index a802f5badcb..a1975785d10 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47734.json @@ -2,40 +2,144 @@ "id": "CVE-2024-47734", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.547", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:16:13.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()\n\nsyzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce\nthis[1], one bond device (bond1) has xdpdrv, which increases\nbpf_master_redirect_enabled_key. Another bond device (bond0) which is\nunsupported by XDP but its slave (veth3) has xdpgeneric that returns\nXDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect().\nTo reduce unnecessary warnings and improve log management, we need to\ndelete the WARN_ON_ONCE() and add ratelimit to the netdev_err().\n\n[1] Steps to reproduce:\n # Needs tx_xdp with return XDP_TX;\n ip l add veth0 type veth peer veth1\n ip l add veth3 type veth peer veth4\n ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP\n ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default\n ip l set veth0 master bond1\n ip l set bond1 up\n # Increases bpf_master_redirect_enabled_key\n ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx\n ip l set veth3 master bond0\n ip l set bond0 up\n ip l set veth4 up\n # Triggers WARN_ON_ONCE() from the xdp_master_redirect()\n ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bonding: Corrija las advertencias y registros innecesarios de bond_xdp_get_xmit_slave() syzbot inform\u00f3 una ADVERTENCIA en bond_xdp_get_xmit_slave. Para reproducir esto[1], un dispositivo de enlace (bond1) tiene xdpdrv, que aumenta bpf_master_redirect_enabled_key. Otro dispositivo de enlace (bond0) que no es compatible con XDP pero su esclavo (veth3) tiene xdpgeneric que devuelve XDP_TX. Esto activa WARN_ON_ONCE() desde xdp_master_redirect(). Para reducir las advertencias innecesarias y mejorar la gesti\u00f3n de registros, debemos eliminar WARN_ON_ONCE() y agregar ratelimit a netdev_err(). [1] Pasos para reproducir: # Necesita tx_xdp con return XDP_TX; ip l add veth0 type veth peer veth1 ip l add veth3 type veth peer veth4 ip l add bond0 type bond mode 6 # BOND_MODE_ALB, no compatible con XDP ip l add bond1 type bond # BOND_MODE_ROUNDROBIN de forma predeterminada ip l set veth0 master bond1 ip l set bond1 up # Aumenta bpf_master_redirect_enabled_key ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx ip l set veth3 master bond0 ip l set bond0 up ip l set veth4 up # Activa WARN_ON_ONCE() desde xdp_master_redirect() ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "151D0F58-4482-4AA5-87D2-803A6F5164C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/57b5fba55c6f8b1d83312a34bd656166fcd95658", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b64197b4bf1a5703a8b105367baf20f1e627a75", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72e2c0825a480e19ee999cee9d018850d38c82b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1be35e774f8ed415e01209fddd963c5a74e8e9f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ccd3e6ff05e5236d1b9535f23f3e6622e0bb32b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json index d241fcf3acb..64877625c1e 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47737.json @@ -2,44 +2,158 @@ "id": "CVE-2024-47737", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:03.833", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:00:01.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: call cache_put if xdr_reserve_space returns NULL\n\nIf not enough buffer space available, but idmap_lookup has triggered\nlookup_fn which calls cache_get and returns successfully. Then we\nmissed to call cache_put here which pairs with cache_get.\n\nReviwed-by: Jeff Layton " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: llamar a cache_put si xdr_reserve_space devuelve NULL Si no hay suficiente espacio de b\u00fafer disponible, pero idmap_lookup ha activado lookup_fn que llama a cache_get y devuelve correctamente. Entonces, nos olvidamos de llamar a cache_put aqu\u00ed, que se empareja con cache_get. Revisado por: Jeff Layton " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.16", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "C0D97D0B-F854-4066-B9AF-B7EFA41FA724" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/81821617312988096f5deccf0f7da6f888e98056", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d0765f86135e27f0bb5c950c136495719b4c834", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9803ab882d565a8fb2dde5999d98866d1c499dfd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f03f0016ff797932551881c7e06ae50e9c39134", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1afbbb5276f943ad7173d0b4c626b8c75a260da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d078cbf5c38de83bc31f83c47dcd2184c04a50c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e32ee6a61041925d1a05c14d10352dcfce9ef029", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json index c207ff82951..986e116711b 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47739.json @@ -2,44 +2,158 @@ "id": "CVE-2024-47739", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.017", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:58:37.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\n\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\ncurrent sorting implementation incorrectly sorts padata objects with\noverflowed seq_nr, causing them to be placed before existing objects in\nthe reorder list. This leads to a deadlock in the serialization process\nas padata_find_next cannot match padata->seq_nr and pd->processed\nbecause the padata instance with overflowed seq_nr will be selected\nnext.\n\nTo fix this, we use an unsigned integer wrap around to correctly sort\npadata objects in scenarios with integer overflow." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: padata: usar un envoltorio de enteros para evitar un bloqueo en el desbordamiento de seq_nr Al enviar m\u00e1s de 2^32 objetos padata a padata_do_serial, la implementaci\u00f3n de clasificaci\u00f3n actual ordena incorrectamente los objetos padata con seq_nr desbordado, lo que hace que se coloquen antes de los objetos existentes en la lista de reordenamiento. Esto conduce a un bloqueo en el proceso de serializaci\u00f3n ya que padata_find_next no puede coincidir con padata->seq_nr y pd->processed porque la instancia de padata con seq_nr desbordado se seleccionar\u00e1 a continuaci\u00f3n. Para solucionar esto, usamos un envoltorio de enteros sin signo para ordenar correctamente los objetos padata en escenarios con desbordamiento de enteros." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "114E45ED-C336-4B21-B1A8-759F9542EC7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json index 4f1adc59ffb..0cc10a11454 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47745.json @@ -2,32 +2,115 @@ "id": "CVE-2024-47745", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.580", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:25:19.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: call the security_mmap_file() LSM hook in remap_file_pages()\n\nThe remap_file_pages syscall handler calls do_mmap() directly, which\ndoesn't contain the LSM security check. And if the process has called\npersonality(READ_IMPLIES_EXEC) before and remap_file_pages() is called for\nRW pages, this will actually result in remapping the pages to RWX,\nbypassing a W^X policy enforced by SELinux.\n\nSo we should check prot by security_mmap_file LSM hook in the\nremap_file_pages syscall handler before do_mmap() is called. Otherwise, it\npotentially permits an attacker to bypass a W^X policy enforced by\nSELinux.\n\nThe bypass is similar to CVE-2016-10044, which bypass the same thing via\nAIO and can be found in [1].\n\nThe PoC:\n\n$ cat > test.c\n\nint main(void) {\n\tsize_t pagesz = sysconf(_SC_PAGE_SIZE);\n\tint mfd = syscall(SYS_memfd_create, \"test\", 0);\n\tconst char *buf = mmap(NULL, 4 * pagesz, PROT_READ | PROT_WRITE,\n\t\tMAP_SHARED, mfd, 0);\n\tunsigned int old = syscall(SYS_personality, 0xffffffff);\n\tsyscall(SYS_personality, READ_IMPLIES_EXEC | old);\n\tsyscall(SYS_remap_file_pages, buf, pagesz, 0, 2, 0);\n\tsyscall(SYS_personality, old);\n\t// show the RWX page exists even if W^X policy is enforced\n\tint fd = open(\"/proc/self/maps\", O_RDONLY);\n\tunsigned char buf2[1024];\n\twhile (1) {\n\t\tint ret = read(fd, buf2, 1024);\n\t\tif (ret <= 0) break;\n\t\twrite(1, buf2, ret);\n\t}\n\tclose(fd);\n}\n\n$ gcc test.c -o test\n$ ./test | grep rwx\n7f1836c34000-7f1836c35000 rwxs 00002000 00:01 2050 /memfd:test (deleted)\n\n[PM: subject line tweaks]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: llamar al gancho LSM security_mmap_file() en remap_file_pages() El controlador de llamadas al sistema remap_file_pages llama a do_mmap() directamente, que no contiene la comprobaci\u00f3n de seguridad LSM. Y si el proceso ha llamado a personality(READ_IMPLIES_EXEC) antes y se llama a remap_file_pages() para p\u00e1ginas RW, esto realmente dar\u00e1 como resultado la reasignaci\u00f3n de las p\u00e1ginas a RWX, omitiendo una pol\u00edtica W^X aplicada por SELinux. Por lo tanto, deber\u00edamos comprobar prot mediante el gancho LSM security_mmap_file en el controlador de llamadas al sistema remap_file_pages antes de que se llame a do_mmap(). De lo contrario, potencialmente permite que un atacante omita una pol\u00edtica W^X aplicada por SELinux. La omisi\u00f3n es similar a CVE-2016-10044, que omite lo mismo a trav\u00e9s de AIO y se puede encontrar en [1]. La PoC: $ cat > test.c int main(void) { size_t pagesz = sysconf(_SC_PAGE_SIZE); int mfd = syscall(SYS_memfd_create, \"test\", 0); const char *buf = mmap(NULL, 4 * pagesz, PROT_READ | PROT_WRITE, MAP_SHARED, mfd, 0); unsigned int old = syscall(SYS_personality, 0xffffffff); syscall(SYS_personality, READ_IMPLIES_EXEC | old); syscall(SYS_remap_file_pages, buf, pagesz, 0, 2, 0); syscall(SYS_personality, old); // muestra que la p\u00e1gina RWX existe incluso si se aplica la pol\u00edtica W^X int fd = open(\"/proc/self/maps\", O_RDONLY); unsigned char buf2[1024]; while (1) { int ret = read(fd, buf2, 1024); if (ret <= 0) break; write(1, buf2, ret); } close(fd); } $ gcc test.c -o test $ ./test | grep rwx 7f1836c34000-7f1836c35000 rwxs 00002000 00:01 2050 /memfd:test (eliminado) [MP: ajustes en la l\u00ednea de asunto]" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "C071AD88-76A0-45A5-9C1C-8DA6DBF2084B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3393fddbfa947c8e1fdcc4509226905ffffd8b89", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/49d3a4ad57c57227c3b0fd6cd4188b2a5ebd6178", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce14f38d6ee9e88e37ec28427b4b93a7c33c70d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea7e2d5e49c05e5db1922387b09ca74aa40f46e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json index 0f53b98171f..56ec9ff7cd7 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47748.json @@ -2,44 +2,158 @@ "id": "CVE-2024-47748", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:04.857", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:28:00.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost_vdpa: assign irq bypass producer token correctly\n\nWe used to call irq_bypass_unregister_producer() in\nvhost_vdpa_setup_vq_irq() which is problematic as we don't know if the\ntoken pointer is still valid or not.\n\nActually, we use the eventfd_ctx as the token so the life cycle of the\ntoken should be bound to the VHOST_SET_VRING_CALL instead of\nvhost_vdpa_setup_vq_irq() which could be called by set_status().\n\nFixing this by setting up irq bypass producer's token when handling\nVHOST_SET_VRING_CALL and un-registering the producer before calling\nvhost_vring_ioctl() to prevent a possible use after free as eventfd\ncould have been released in vhost_vring_ioctl(). And such registering\nand unregistering will only be done if DRIVER_OK is set." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vhost_vdpa: asignar correctamente el token del productor de omisi\u00f3n de irq Sol\u00edamos llamar a irq_bypass_unregister_producer() en vhost_vdpa_setup_vq_irq(), lo cual es problem\u00e1tico ya que no sabemos si el puntero del token sigue siendo v\u00e1lido o no. En realidad, usamos eventfd_ctx como token, por lo que el ciclo de vida del token deber\u00eda estar vinculado a VHOST_SET_VRING_CALL en lugar de a vhost_vdpa_setup_vq_irq(), que podr\u00eda llamarse mediante set_status(). Para solucionar esto, configuramos el token del productor de omisi\u00f3n de irq al manejar VHOST_SET_VRING_CALL y anulamos el registro del productor antes de llamar a vhost_vring_ioctl() para evitar un posible use after free, ya que eventfd podr\u00eda haberse liberado en vhost_vring_ioctl(). Y dicho registro y anulaci\u00f3n de registro solo se realizar\u00e1 si DRIVER_OK est\u00e1 configurado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "C44A23B8-33E9-4DB6-8E6F-AF0B4E5CD507" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/02e9e9366fefe461719da5d173385b6685f70319", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0c170b1e918b9afac25e2bbd01eaa2bfc0ece8c0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7cf2fb51175cafe01df8c43fa15a06194a59c6e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/927a2580208e0f9b0b47b08f1c802b7233a7ba3c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca64edd7ae93402af2596a952e0d94d545e2b9c0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec5f1b54ceb23475049ada6e7a43452cf4df88d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fae9b1776f53aab93ab345bdbf653b991aed717d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json index 8c05d9174ee..6af6f2d5a25 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47750.json @@ -2,36 +2,130 @@ "id": "CVE-2024-47750", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.037", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:29:01.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix Use-After-Free of rsv_qp on HIP08\n\nCurrently rsv_qp is freed before ib_unregister_device() is called\non HIP08. During the time interval, users can still dereg MR and\nrsv_qp will be used in this process, leading to a UAF. Move the\nrelease of rsv_qp after calling ib_unregister_device() to fix it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se corrige el use after free de rsv_qp en HIP08 Actualmente, rsv_qp se libera antes de que se llame a ib_unregister_device() en HIP08. Durante el intervalo de tiempo, los usuarios a\u00fan pueden anular la regulaci\u00f3n de MR y rsv_qp se usar\u00e1 en este proceso, lo que genera un UAF. Mueva la liberaci\u00f3n de rsv_qp despu\u00e9s de llamar a ib_unregister_device() para solucionarlo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "F61A7CD6-359A-4A6B-8E7A-D0876BDC43AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/2ccf1c75d39949d8ea043d04a2e92d7100ea723d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/60595923371c2ebe7faf82536c47eb0c967e3425", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d2d9c5127122745da6e887f451dd248cfeffca33", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dac2723d8bfa9cf5333f477741e6e5fa1ed34645", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd8489294dd2beefb70f12ec4f6132aeec61a4d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json index baf42bf7c89..68bd394738f 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47751.json @@ -2,36 +2,130 @@ "id": "CVE-2024-47751", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.123", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:33:52.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()\n\nWithin kirin_pcie_parse_port(), the pcie->num_slots is compared to\npcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead\nto an overflow.\n\nThus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move\npcie->num_slots increment below the if-statement to avoid out-of-bounds\narray access.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[kwilczynski: commit log]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: kirin: Se ha corregido el desbordamiento de b\u00fafer en kirin_pcie_parse_port(). En kirin_pcie_parse_port(), el tama\u00f1o de pcie->num_slots se compara con el tama\u00f1o de pcie->gpio_id_reset (MAX_PCI_SLOTS), que es correcto y provocar\u00eda un desbordamiento. Por lo tanto, se ha corregido la condici\u00f3n a pcie->num_slots + 1 >= MAX_PCI_SLOTS y se ha movido el incremento de pcie->num_slots por debajo de la instrucci\u00f3n if para evitar el acceso a la matriz fuera de los l\u00edmites. Encontrado por Linux Verification Center (linuxtesting.org) con SVACE. [kwilczynski: registro de confirmaciones]" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/6dcc5b49d6607a741a14122bf3105f3ac50d259e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95248d7497bcbfe7deed4805469c6ff6ddd7f9d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a5f795f9412854df28e66679c5e6b68b0b79c229", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aeb0335971806e15ac91e838ca471936c8e7efd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c500a86693a126c9393e602741e348f80f1b0fc5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json index 6f1be1f7c05..f88c5d0b0cf 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48049", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.000", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:12:12.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mightyplugins:mighty_builder:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "08AB5C4B-4974-4BBD-A1EE-FF3D19E48ECF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mighty-builder/wordpress-mighty-builder-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48415.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48415.json index ba44ab4cdcc..09d17937950 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48415.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48415.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48415", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:05.890", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T16:35:09.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "itsourcecode Loan Management System v1.0 es vulnerable a cross-site scripting (XSS) a trav\u00e9s de un payload manipulado para los par\u00e1metros lastname, firstname, middlename, address, contact_no, email y tax_id en la funcionalidad de nuevos prestatarios en la p\u00e1gina Prestatarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/khaliquesX/CVE-2024-48415/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48652.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48652.json index 4050a3df6fe..2b23b775c40 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48652.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48652.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48652", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:06.057", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T16:35:10.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " La vulnerabilidad de cross-site scripting en camaleon-cms v.2.7.5 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo de group name de contenido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/paragbagul111/CVE-2024-48652/", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48656.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48656.json index e860d5740e9..debc6b63945 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48656.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48656.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48656", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:06.147", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T16:35:12.613", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de cross-site scripting en el sistema de gesti\u00f3n de estudiantes en php con c\u00f3digo fuente v.1.0.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/LeiPudd/Student-Management-System-v1.0-has-Cross-site-Scripting-XSS-", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48657.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48657.json index 6f4d8387906..09ee07e740e 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48657.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48657.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48657", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T22:15:06.233", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-23T16:35:13.890", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Vulnerabilidad de inyecci\u00f3n SQL en el sistema de gesti\u00f3n hospitalaria en php con c\u00f3digo fuente v.1.0.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/LeiPudd/Hospital-Management-System-v1.0-has-SQL-Injection-SQLDET-", diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json index c18699800d4..2a454465c98 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49286", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.233", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:13:37.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moridrin:ssv_events:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.2.7", + "matchCriteriaId": "500E1791-C34E-4C18-8707-1732E8CA5D8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ssv-events/wordpress-ssv-events-plugin-3-2-7-local-file-inclusion-to-rce-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json index 5185705f0b2..7f66f442c09 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49323.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49323", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.460", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:05:49.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sourav:all_in_one_slider:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "95D283AB-827E-411F-B192-081B2E1AD427" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/all-in-one-slider/wordpress-all-in-one-slider-plugin-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json index d85f8eb9deb..eaf4c7d37db 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49328", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.667", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T17:08:31.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vivektamrakar:wp_rest_api_fns:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "266FC67B-4447-4127-BB23-E79FE3E44A20" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/rest-api-fns/wordpress-wp-rest-api-fns-plugin-plugin-1-0-0-account-takeover-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json index a641873f215..79bbb63aee2 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49334", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-20T08:15:03.907", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:08:01.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unizoewebsolutions:jlayer_parallax_slider:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "0005017E-DBF8-4C56-B2A7-5258707DD9B8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/jlayer-parallax-slider-wp/wordpress-jlayer-parallax-slider-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49652.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49652.json new file mode 100644 index 00000000000..0b784a7ce28 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49652.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49652", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:06.027", + "lastModified": "2024-10-23T16:15:06.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in ReneeCussack 3D Work In Progress allows Upload a Web Shell to a Web Server.This issue affects 3D Work In Progress: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/renee-work-in-progress/wordpress-3d-work-in-progress-plugin-1-0-3-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49653.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49653.json new file mode 100644 index 00000000000..624b742e608 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49653.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49653", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:06.243", + "lastModified": "2024-10-23T16:15:06.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in James Eggers Portfolleo portfolleo allows Upload a Web Shell to a Web Server.This issue affects Portfolleo: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/portfolleo/wordpress-portfolleo-plugin-1-2-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49657.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49657.json new file mode 100644 index 00000000000..dcd1abae968 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49657.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49657", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:06.450", + "lastModified": "2024-10-23T16:15:06.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ReneeCussack 3D Work In Progress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 3D Work In Progress: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/renee-work-in-progress/wordpress-3d-work-in-progress-plugin-1-0-3-arbitrary-file-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49658.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49658.json new file mode 100644 index 00000000000..0dcbe5f2e78 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49658.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49658", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:06.660", + "lastModified": "2024-10-23T16:15:06.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Ecomerciar Woocommerce Custom Profile Picture allows Upload a Web Shell to a Web Server.This issue affects Woocommerce Custom Profile Picture: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woo-custom-profile-picture/wordpress-woocommerce-custom-profile-picture-plugin-1-0-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49668.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49668.json new file mode 100644 index 00000000000..a082f30e08f --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49668.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49668", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:06.970", + "lastModified": "2024-10-23T16:15:06.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Admin Verbalize WP Upload a Web Shell to a Web Server.This issue affects Verbalize WP: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/verbalize-wp/wordpress-verbalize-wp-plugin-1-0-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49669.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49669.json new file mode 100644 index 00000000000..36a50b64761 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49669.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49669", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:07.330", + "lastModified": "2024-10-23T16:15:07.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Alexander De Ridder INK Official allows Upload a Web Shell to a Web Server.This issue affects INK Official: from n/a through 4.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ink-official/wordpress-ink-official-plugin-4-1-2-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49671.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49671.json new file mode 100644 index 00000000000..9bcae274ca5 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49671.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49671", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:08.260", + "lastModified": "2024-10-23T16:15:08.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Dogu Pekgoz AI Image Generator for Your Content & Featured Images \u2013 AI Postpix allows Upload a Web Shell to a Web Server.This issue affects AI Image Generator for Your Content & Featured Images \u2013 AI Postpix: from n/a through 1.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ai-postpix/wordpress-ai-postpix-plugin-1-1-8-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49676.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49676.json new file mode 100644 index 00000000000..61a72d43f3b --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49676.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49676", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:09.040", + "lastModified": "2024-10-23T16:15:09.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Michael Bourne Custom Icons for Elementor allows Upload a Web Shell to a Web Server.This issue affects Custom Icons for Elementor: from n/a through 0.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-icons-for-elementor/wordpress-custom-icons-for-elementor-plugin-0-3-3-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49684.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49684.json new file mode 100644 index 00000000000..06815b3c0a0 --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49684.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49684", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:09.620", + "lastModified": "2024-10-23T16:15:09.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Revmakx Backup and Staging by WP Time Capsule allows Object Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-time-capsule/wordpress-backup-and-staging-by-wp-time-capsule-plugin-1-22-21-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49690.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49690.json new file mode 100644 index 00000000000..6bff271e1fa --- /dev/null +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49690.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49690", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:09.867", + "lastModified": "2024-10-23T16:15:09.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Qode Interactive Qi Blocks.This issue affects Qi Blocks: from n/a through 1.3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/qi-blocks/wordpress-qi-blocks-plugin-1-3-2-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49701.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49701.json new file mode 100644 index 00000000000..171eb83ae0e --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49701.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49701", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-23T16:15:10.097", + "lastModified": "2024-10-23T16:15:10.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Theme Horse Mags.This issue affects Mags: from n/a through 1.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mags/wordpress-mags-theme-1-1-6-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49751.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49751.json new file mode 100644 index 00000000000..eb81b10eb95 --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49751.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-49751", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-23T16:15:10.310", + "lastModified": "2024-10-23T16:15:10.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Prior to commit 5d118a902872d7941f099ad1fb918e2421e79ccd, a user could inject HTML through SaaS signup inputs. The user who injected the unsafe HTML code would only affect themselves and would not affect other users. Commit 5d118a902872d7941f099ad1fb918e2421e79ccd patches this bug." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 1.2, + "baseSeverity": "LOW" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/frappe/press/commit/5d118a902872d7941f099ad1fb918e2421e79ccd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/frappe/press/security/advisories/GHSA-rf69-h96f-rf2j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49756.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49756.json new file mode 100644 index 00000000000..e52bbe32b73 --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49756.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-49756", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-23T17:15:19.250", + "lastModified": "2024-10-23T17:15:19.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AshPostgres is the PostgreSQL data layer for Ash Framework. Starting in version 2.0.0 and prior to version 2.4.10, in certain very specific situations, it was possible for the policies of an update action to be skipped. This occurred only on \"empty\" update actions (no changing fields), and would allow their hooks (side effects) to be performed when they should not have been. Note that this does not allow reading new data that the user should not have had access to, only triggering a side effect a user should not have been able to trigger.\n\nTo be vulnerable, an affected user must have an update action that is on a resource with no attributes containing an \"update default\" (updated_at timestamp, for example); can be performed atomically; does not have `require_atomic? false`; has at least one authorizer (typically `Ash.Policy.Authorizer`); and has at least one `change` (on the resource's `changes` block or in the action itself). This is where the side-effects would be performed when they should not have been.\n\nThis problem has been patched in `2.4.10` of `ash_postgres`. Several workarounds are available. Potentially affected users may determine that none of their actions are vulnerable using a script the maintainers provide in the GitHub Security Advisory, add `require_atomic? false` to any potentially affected update action, replace any usage of `Ash.update` with `Ash.bulk_update` for an affected action, and/or add an update timestamp to their action." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://elixirforum.com/t/empty-update-action-with-policies/66954", + "source": "security-advisories@github.com" + }, + { + "url": "https://gist.github.com/zachdaniel/e49166b765978c48dfaf998d06df436e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ash-project/ash_postgres/commit/1228fcd851f29a68609e236f7d6a2622a4b5c4ba", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ash-project/ash_postgres/security/advisories/GHSA-hf59-7rwq-785m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json index 563be75d039..ae2448f819c 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49851.json @@ -2,44 +2,158 @@ "id": "CVE-2024-49851", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.883", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:00:52.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: Clean up TPM space after command failure\n\ntpm_dev_transmit prepares the TPM space before attempting command\ntransmission. However if the command fails no rollback of this\npreparation is done. This can result in transient handles being leaked\nif the device is subsequently closed with no further commands performed.\n\nFix this by flushing the space in the event of command transmission\nfailure." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tpm: Limpiar el espacio TPM despu\u00e9s de un error de comando tpm_dev_transmit prepara el espacio TPM antes de intentar la transmisi\u00f3n del comando. Sin embargo, si el comando falla, no se realiza ninguna reversi\u00f3n de esta preparaci\u00f3n. Esto puede provocar que se filtren los identificadores transitorios si el dispositivo se cierra posteriormente sin que se realicen m\u00e1s comandos. Solucione esto vaciando el espacio en caso de que falle la transmisi\u00f3n del comando." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "8E629794-ADD6-44B5-8F8E-B768F34539E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/2c9b228938e9266a1065a3f4fe5c99b7235dc439", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f9f72d843c92fb6f4ff7460d774413cde7f254c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82478cb8a23bd4f97935bbe60d64528c6d9918b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adf4ce162561222338cf2c9a2caa294527f7f721", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c84ceb546f30432fccea4891163f7050f5bee5dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3aaebcbb7c6b403416f442d1de70d437ce313a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebc4e1f4492d114f9693950621b3ea42b2f82bec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json index 90ea297f8f9..990a41b7477 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49852.json @@ -2,40 +2,144 @@ "id": "CVE-2024-49852", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:05.977", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:14:01.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()\n\nThe kref_put() function will call nport->release if the refcount drops to\nzero. The nport->release release function is _efc_nport_free() which frees\n\"nport\". But then we dereference \"nport\" on the next line which is a use\nafter free. Re-order these lines to avoid the use after free." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: elx: libefc: Se corrige el potencial use after freea nport->release si el recuento de referencias cae a cero. La funci\u00f3n de liberaci\u00f3n nport->release es _efc_nport_free() que libera \"nport\". Pero luego desreferenciamos \"nport\" en la siguiente l\u00ednea que es un use after free. Reordena estas l\u00edneas para evitar el use after free." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "5CD3CB21-008A-4AF9-9337-0FF92043AE5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/16a570f07d870a285b0c0b0d1ca4dff79e8aa5ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e4b02fad094976763af08fec2c620f4f8edd9ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c2908985e4ae0ea1b526b3916de9e5351650908", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98752fcd076a8cbc978016eae7125b4971be1eec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/abc71e89170ed32ecf0a5a29f31aa711e143e941", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/baeb8628ab7f4577740f00e439d3fdf7c876b0ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json index 61844daf948..1e1573629d7 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49853.json @@ -2,36 +2,130 @@ "id": "CVE-2024-49853", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.083", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:14:30.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Fix double free in OPTEE transport\n\nChannels can be shared between protocols, avoid freeing the same channel\ndescriptors twice when unloading the stack." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: arm_scmi: Correcci\u00f3n de doble liberaci\u00f3n en el transporte OPTEE Los canales se pueden compartir entre protocolos, evitando liberar los mismos descriptores de canal dos veces al descargar la pila." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "F61A7CD6-359A-4A6B-8E7A-D0876BDC43AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/6699567b0bbb378600a4dc0a1f929439a4e84a2c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aef6ae124bb3cc12e34430fed91fbb7efd7a444d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d7f4fc2bc101e666da649605a9ece2bd42529c7a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc9543a4f2a5498a4a12d6d2427492a6f1a28056", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e98dba934b2fc587eafb83f47ad64d9053b18ae0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json index 5ce998b7eaa..357f8f92741 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49854.json @@ -2,40 +2,144 @@ "id": "CVE-2024-49854", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.203", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:29:32.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix uaf for accessing waker_bfqq after splitting\n\nAfter commit 42c306ed7233 (\"block, bfq: don't break merge chain in\nbfq_split_bfqq()\"), if the current procress is the last holder of bfqq,\nthe bfqq can be freed after bfq_split_bfqq(). Hence recored the bfqq and\nthen access bfqq->waker_bfqq may trigger UAF. What's more, the waker_bfqq\nmay in the merge chain of bfqq, hence just recored waker_bfqq is still\nnot safe.\n\nFix the problem by adding a helper bfq_waker_bfqq() to check if\nbfqq->waker_bfqq is in the merge chain, and current procress is the only\nholder." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloqueo, bfq: arregle uaf por acceder waker_bfqq despues de separar Despu\u00e9s de el commit 42c306ed7233 (\"block, bfq: don't break merge chain in bfq_split_bfqq()\"), si el proceso actual es el \u00faltimo contenedor de bfqq, el bfqq se puede liberar despu\u00e9s de bfq_split_bfqq(). Por lo tanto, grabar el bfqq y luego acceder a bfqq->waker_bfqq puede activar UAF. Adem\u00e1s, waker_bfqq puede estar en la cadena de fusi\u00f3n de bfqq, por lo tanto, grabar solo waker_bfqq sigue sin ser seguro. Solucione el problema a\u00f1adiendo un ayudante bfq_waker_bfqq() para comprobar si bfqq->waker_bfqq est\u00e1 en la cadena de fusi\u00f3n y el proceso actual es el \u00fanico contenedor." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.227", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "A18D7AFF-3C9E-46FF-B2A9-3CEB860CD094" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0780451f03bf518bc032a7c584de8f92e2d39d7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0b8bda0ff17156cd3f60944527c9d8c9f99f1583", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ba0403ac6447f2d63914fb760c44a3b19c44eaf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/63a07379fdb6c72450cb05294461c6016b8b7726", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cae58d19121a70329cf971359e2518c93fec04fe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de0456460f2abf921e356ed2bd8da87a376680bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json index 1f4434627db..2d0ba3c9beb 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49856.json @@ -2,40 +2,144 @@ "id": "CVE-2024-49856", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.353", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:33:20.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/sgx: Fix deadlock in SGX NUMA node search\n\nWhen the current node doesn't have an EPC section configured by firmware\nand all other EPC sections are used up, CPU can get stuck inside the\nwhile loop that looks for an available EPC page from remote nodes\nindefinitely, leading to a soft lockup. Note how nid_of_current will\nnever be equal to nid in that while loop because nid_of_current is not\nset in sgx_numa_mask.\n\nAlso worth mentioning is that it's perfectly fine for the firmware not\nto setup an EPC section on a node. While setting up an EPC section on\neach node can enhance performance, it is not a requirement for\nfunctionality.\n\nRework the loop to start and end on *a* node that has SGX memory. This\navoids the deadlock looking for the current SGX-lacking node to show up\nin the loop when it never will." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/sgx: Se solucion\u00f3 el bloqueo en la b\u00fasqueda de nodos NUMA de SGX Cuando el nodo actual no tiene una secci\u00f3n EPC configurada por el firmware y todas las dem\u00e1s secciones EPC est\u00e1n agotadas, la CPU puede quedar atrapada dentro del bucle while que busca una p\u00e1gina EPC disponible de los nodos remotos de forma indefinida, lo que lleva a un bloqueo suave. Tenga en cuenta que nid_of_current nunca ser\u00e1 igual a nid en ese bucle while porque nid_of_current no est\u00e1 configurado en sgx_numa_mask. Tambi\u00e9n vale la pena mencionar que est\u00e1 perfectamente bien que el firmware no configure una secci\u00f3n EPC en un nodo. Si bien configurar una secci\u00f3n EPC en cada nodo puede mejorar el rendimiento, no es un requisito para la funcionalidad. Rehaga el bucle para que comience y termine en *un* nodo que tenga memoria SGX. Esto evita el bloqueo que busca el nodo actual que carece de SGX para que aparezca en el bucle cuando nunca lo har\u00e1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "71269D77-D25F-4909-8E7A-405593B279FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0f89fb4042c08fd143bfc28af08bf6c8a0197eea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/20c96d0aaabfe361fc2a11c173968dc67feadbbf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40fb64257dab507d86b5f1f2a62f3669ef0c91a8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8132510c915815e6b537ab937d94ed66893bc7b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c936844010466535bd46ea4ce4656ef17653644", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fb2d057539eda67ec7cfc369bf587e6518a9b99d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json index d03c91d4725..0bdb753fa2e 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49858.json @@ -2,44 +2,157 @@ "id": "CVE-2024-49858", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.543", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:35:10.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nefistub/tpm: Use ACPI reclaim memory for event log to avoid corruption\n\nThe TPM event log table is a Linux specific construct, where the data\nproduced by the GetEventLog() boot service is cached in memory, and\npassed on to the OS using an EFI configuration table.\n\nThe use of EFI_LOADER_DATA here results in the region being left\nunreserved in the E820 memory map constructed by the EFI stub, and this\nis the memory description that is passed on to the incoming kernel by\nkexec, which is therefore unaware that the region should be reserved.\n\nEven though the utility of the TPM2 event log after a kexec is\nquestionable, any corruption might send the parsing code off into the\nweeds and crash the kernel. So let's use EFI_ACPI_RECLAIM_MEMORY\ninstead, which is always treated as reserved by the E820 conversion\nlogic." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efistub/tpm: Utilizar la memoria de recuperaci\u00f3n ACPI para el registro de eventos para evitar la corrupci\u00f3n La tabla de registro de eventos TPM es una construcci\u00f3n espec\u00edfica de Linux, donde los datos producidos por el servicio de arranque GetEventLog() se almacenan en cach\u00e9 en la memoria y se pasan al sistema operativo mediante una tabla de configuraci\u00f3n EFI. El uso de EFI_LOADER_DATA aqu\u00ed da como resultado que la regi\u00f3n quede sin reservar en el mapa de memoria E820 construido por el stub EFI, y esta es la descripci\u00f3n de memoria que se pasa al kernel entrante por kexec, que por lo tanto no sabe que la regi\u00f3n debe reservarse. Aunque la utilidad del registro de eventos TPM2 despu\u00e9s de un kexec es cuestionable, cualquier corrupci\u00f3n podr\u00eda enviar el c\u00f3digo de an\u00e1lisis a la maleza y bloquear el kernel. As\u00ed que usemos EFI_ACPI_RECLAIM_MEMORY en su lugar, que siempre se trata como reservado por la l\u00f3gica de conversi\u00f3n E820." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/11690d7e76842f29b60fbb5b35bc97d206ea0e83", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/19fd2f2c5fb36b61506d3208474bfd8fdf1cada3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e6871a632a99d9b9e2ce3a7847acabe99e5a26e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/38d9b07d99b789efb6d8dda21f1aaad636c38993", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b22c038fb2757c652642933de5664da471f8cb7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77d48d39e99170b528e4f2e9fc5d1d64cdedd386", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f76b69ab9cf04358266e3cea5748c0c2791fbb08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json index 1c084a863ed..cc0ba7b3208 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49860.json @@ -2,44 +2,158 @@ "id": "CVE-2024-49860", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.723", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:44:58.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: sysfs: validate return type of _STR method\n\nOnly buffer objects are valid return values of _STR.\n\nIf something else is returned description_show() will access invalid\nmemory." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPI: sysfs: validar el tipo de retorno del m\u00e9todo _STR. Solo los objetos de b\u00fafer son valores de retorno v\u00e1lidos de _STR. Si se devuelve algo diferente, description_show() acceder\u00e1 a memoria no v\u00e1lida." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.7", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "3B73A13A-D7BE-4035-BEF2-2821D9D5CB6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0cdfb9178a3bba843c95c2117c82c15f1a64b9ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b081991c4363e072e1748efed0bbec8a77daba5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4bb1e7d027413835b086aed35bc3f0713bc0f72b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5c8d007c14aefc3f2ddf71e4c40713733dc827be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0921ecd4ddc14646bb5511f49db4d7d3b0829f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f51e5a88f2e7224858b261546cf6b3037dfb1323", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f51f711d36e61fbb87c67b524fd200e05172668d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json index f94bc9914e2..eadbd183b89 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49861.json @@ -2,32 +2,116 @@ "id": "CVE-2024-49861", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.800", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:48:47.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix helper writes to read-only maps\n\nLonial found an issue that despite user- and BPF-side frozen BPF map\n(like in case of .rodata), it was still possible to write into it from\na BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}\nas arguments.\n\nIn check_func_arg() when the argument is as mentioned, the meta->raw_mode\nis never set. Later, check_helper_mem_access(), under the case of\nPTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the\nsubsequent call to check_map_access_type() and given the BPF map is\nread-only it succeeds.\n\nThe helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT\nwhen results are written into them as opposed to read out of them. The\nlatter indicates that it's okay to pass a pointer to uninitialized memory\nas the memory is written to anyway.\n\nHowever, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM\njust with additional alignment requirement. So it is better to just get\nrid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the\nfixed size memory types. For this, add MEM_ALIGNED to additionally ensure\nalignment given these helpers write directly into the args via * = val.\nThe .arg*_size has been initialized reflecting the actual sizeof(*).\n\nMEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated\nargument types, since in !MEM_FIXED_SIZE cases the verifier does not know\nthe buffer size a priori and therefore cannot blindly write * = val." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Arregla las escrituras del ayudante en mapas de solo lectura Lonial encontr\u00f3 un problema que a pesar del mapa BPF congelado del lado del usuario y del BPF (como en el caso de .rodata), a\u00fan era posible escribir en \u00e9l desde el lado del programa BPF a trav\u00e9s de ayudantes espec\u00edficos que tienen ARG_PTR_TO_{LONG,INT} como argumentos. En check_func_arg() cuando el argumento es como se menciona, el meta->raw_mode nunca se establece. M\u00e1s tarde, check_helper_mem_access(), bajo el caso de PTR_TO_MAP_VALUE como tipo base de registro, asume BPF_READ para la llamada posterior a check_map_access_type() y dado que el mapa BPF es de solo lectura, tiene \u00e9xito. Los ayudantes realmente necesitan ser anotados como ARG_PTR_TO_{LONG,INT} | MEM_UNINIT cuando los resultados se escriben en ellos en lugar de leerse de ellos. Este \u00faltimo indica que est\u00e1 bien pasar un puntero a la memoria no inicializada, ya que la memoria se escribe de todos modos. Sin embargo, ARG_PTR_TO_{LONG,INT} es un caso especial de ARG_PTR_TO_FIXED_SIZE_MEM solo que con un requisito de alineaci\u00f3n adicional. Por lo tanto, es mejor deshacerse de los casos especiales ARG_PTR_TO_{LONG,INT} por completo y reutilizar los tipos de memoria de tama\u00f1o fijo. Para esto, agregue MEM_ALIGNED para garantizar adicionalmente la alineaci\u00f3n dado que estos ayudantes escriben directamente en los argumentos a trav\u00e9s de * = val. El .arg*_size se ha inicializado reflejando el tama\u00f1o real de (*). MEM_ALIGNED solo se puede usar en combinaci\u00f3n con los tipos de argumentos anotados MEM_FIXED_SIZE, ya que en los casos !MEM_FIXED_SIZE el verificador no conoce el tama\u00f1o del b\u00fafer a priori y, por lo tanto, no puede escribir ciegamente * = val." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "1C50745E-F1ED-43B5-A0AA-2ECE7194E14C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1e75d25133158b525e0456876e9bcfd6b2993fd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ed98ee02d1e08afee88f54baec39ea78dc8a23c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32556ce93bc45c730829083cb60f95a2728ea48b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2c8dc7e21803257e762b0bf067fd13e9c995da0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json index f1981955249..2b4e53b17c9 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49862.json @@ -2,32 +2,116 @@ "id": "CVE-2024-49862", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T13:15:06.893", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-23T16:53:51.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowercap: intel_rapl: Fix off by one in get_rpi()\n\nThe rp->priv->rpi array is either rpi_msr or rpi_tpmi which have\nNR_RAPL_PRIMITIVES number of elements. Thus the > needs to be >=\nto prevent an off by one access." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powercap: intel_rapl: Arreglo de un byte en get_rpi() La matriz rp->priv->rpi es rpi_msr o rpi_tpmi, que tienen una cantidad de elementos NR_RAPL_PRIMITIVES. Por lo tanto, el > debe ser >= para evitar un acceso de un byte." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.6.54", + "matchCriteriaId": "533A887F-F2B4-4445-8C73-11A8013D0A01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.13", + "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.2", + "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/288cbc505e2046638c615c36357cb78bc9fee1e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6a34f3b0d7f11fb6ed72da315fd2360abd9c0737", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/851e7f7f14a15f4e47b7d0f70d5c4a2b95b824d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95f6580352a7225e619551febb83595bcb77ab17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50382.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50382.json new file mode 100644 index 00000000000..2e8b9644136 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50382.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-50382", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-23T17:15:19.453", + "lastModified": "2024-10-23T17:15:19.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Botan before 3.6.0, when certain LLVM versions are used, has compiler-induced secret-dependent control flow in lib/utils/ghash/ghash.cpp in GHASH in AES-GCM. There is a branch instead of an XOR with carry. This was observed for Clang in LLVM 15 on RISC-V." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://arxiv.org/pdf/2410.13489", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/randombit/botan/commit/53b0cfde580e86b03d0d27a488b6c134f662e957", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/randombit/botan/compare/3.5.0...3.6.0", + "source": "cve@mitre.org" + }, + { + "url": "https://news.ycombinator.com/item?id=41887153", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50383.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50383.json new file mode 100644 index 00000000000..bd260342eda --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50383.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-50383", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-23T17:15:19.540", + "lastModified": "2024-10-23T17:15:19.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Botan before 3.6.0, when certain GCC versions are used, has a compiler-induced secret-dependent operation in lib/utils/donna128.h in donna128 (used in Chacha-Poly1305 and x25519). An addition can be skipped if a carry is not set. This was observed for GCC 11.3.0 with -O2 on MIPS, and GCC on x86-i386. (Only 32-bit processors can be affected.)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://arxiv.org/pdf/2410.13489", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/randombit/botan/commit/53b0cfde580e86b03d0d27a488b6c134f662e957", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/randombit/botan/compare/3.5.0...3.6.0", + "source": "cve@mitre.org" + }, + { + "url": "https://news.ycombinator.com/item?id=41887153", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6010.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6010.json index f427378ec0b..081f0f044e7 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6010.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6010.json @@ -2,13 +2,13 @@ "id": "CVE-2024-6010", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-07T12:15:12.067", - "lastModified": "2024-09-26T16:06:15.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-23T16:15:10.483", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Cost Calculator Builder PRO plugin for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.1.96. This is due to the plugin allowing the price field to be manipulated prior to processing via the 'create_cc_order' function, called from the Cost Calculator Builder plugin. This makes it possible for unauthenticated attackers to manipulate the price of orders submitted via the calculator. Note: this vulnerability was partially patched with the release of Cost Calculator Builder version 3.2.17." + "value": "The Cost Calculator Builder PRO plugin for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.2.1. This is due to the plugin allowing the price field to be manipulated prior to processing via the 'create_cc_order' function, called from the Cost Calculator Builder plugin. This makes it possible for unauthenticated attackers to manipulate the price of orders submitted via the calculator. Note: this vulnerability was partially patched with the release of Cost Calculator Builder version 3.2.17." }, { "lang": "es", @@ -80,6 +80,10 @@ } ], "references": [ + { + "url": "https://docs.stylemixthemes.com/cost-calculator-builder/changelog-1/changelog-pro-version", + "source": "security@wordfence.com" + }, { "url": "https://plugins.trac.wordpress.org/browser/cost-calculator-builder/trunk/frontend/dist/order.js", "source": "security@wordfence.com", @@ -87,6 +91,10 @@ "Issue Tracking" ] }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3172590/", + "source": "security@wordfence.com" + }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc04e676-e394-488e-a239-95af5f865613?source=cve", "source": "security@wordfence.com", diff --git a/README.md b/README.md index 5d90dd2fbb8..d39783539c5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-23T16:00:54.822569+00:00 +2024-10-23T18:00:25.728102+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-23T15:53:06.410000+00:00 +2024-10-23T17:58:08.720000+00:00 ``` ### Last Data Feed Release @@ -33,61 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -266802 +266841 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `39` -- [CVE-2024-10041](CVE-2024/CVE-2024-100xx/CVE-2024-10041.json) (`2024-10-23T14:15:03.970`) -- [CVE-2024-10250](CVE-2024/CVE-2024-102xx/CVE-2024-10250.json) (`2024-10-23T14:15:04.197`) -- [CVE-2024-10280](CVE-2024/CVE-2024-102xx/CVE-2024-10280.json) (`2024-10-23T14:15:04.500`) -- [CVE-2024-10281](CVE-2024/CVE-2024-102xx/CVE-2024-10281.json) (`2024-10-23T14:15:04.773`) -- [CVE-2024-10282](CVE-2024/CVE-2024-102xx/CVE-2024-10282.json) (`2024-10-23T15:15:29.590`) -- [CVE-2024-10283](CVE-2024/CVE-2024-102xx/CVE-2024-10283.json) (`2024-10-23T15:15:29.850`) -- [CVE-2024-10290](CVE-2024/CVE-2024-102xx/CVE-2024-10290.json) (`2024-10-23T15:15:30.110`) -- [CVE-2024-30122](CVE-2024/CVE-2024-301xx/CVE-2024-30122.json) (`2024-10-23T15:15:30.390`) -- [CVE-2024-47575](CVE-2024/CVE-2024-475xx/CVE-2024-47575.json) (`2024-10-23T15:15:30.707`) -- [CVE-2024-47901](CVE-2024/CVE-2024-479xx/CVE-2024-47901.json) (`2024-10-23T15:15:30.930`) -- [CVE-2024-47902](CVE-2024/CVE-2024-479xx/CVE-2024-47902.json) (`2024-10-23T15:15:31.163`) -- [CVE-2024-47903](CVE-2024/CVE-2024-479xx/CVE-2024-47903.json) (`2024-10-23T15:15:31.397`) -- [CVE-2024-47904](CVE-2024/CVE-2024-479xx/CVE-2024-47904.json) (`2024-10-23T15:15:31.687`) -- [CVE-2024-49370](CVE-2024/CVE-2024-493xx/CVE-2024-49370.json) (`2024-10-23T15:15:31.987`) -- [CVE-2024-49675](CVE-2024/CVE-2024-496xx/CVE-2024-49675.json) (`2024-10-23T15:15:32.120`) -- [CVE-2024-50050](CVE-2024/CVE-2024-500xx/CVE-2024-50050.json) (`2024-10-23T14:15:05.087`) -- [CVE-2024-5764](CVE-2024/CVE-2024-57xx/CVE-2024-5764.json) (`2024-10-23T15:15:32.340`) +- [CVE-2024-20300](CVE-2024/CVE-2024-203xx/CVE-2024-20300.json) (`2024-10-23T17:15:17.253`) +- [CVE-2024-20329](CVE-2024/CVE-2024-203xx/CVE-2024-20329.json) (`2024-10-23T17:15:17.457`) +- [CVE-2024-20330](CVE-2024/CVE-2024-203xx/CVE-2024-20330.json) (`2024-10-23T17:15:17.663`) +- [CVE-2024-20331](CVE-2024/CVE-2024-203xx/CVE-2024-20331.json) (`2024-10-23T17:15:17.870`) +- [CVE-2024-20339](CVE-2024/CVE-2024-203xx/CVE-2024-20339.json) (`2024-10-23T17:15:18.097`) +- [CVE-2024-20340](CVE-2024/CVE-2024-203xx/CVE-2024-20340.json) (`2024-10-23T17:15:18.300`) +- [CVE-2024-20341](CVE-2024/CVE-2024-203xx/CVE-2024-20341.json) (`2024-10-23T17:15:18.493`) +- [CVE-2024-20342](CVE-2024/CVE-2024-203xx/CVE-2024-20342.json) (`2024-10-23T17:15:18.703`) +- [CVE-2024-20351](CVE-2024/CVE-2024-203xx/CVE-2024-20351.json) (`2024-10-23T17:15:18.913`) +- [CVE-2024-30124](CVE-2024/CVE-2024-301xx/CVE-2024-30124.json) (`2024-10-23T16:15:05.667`) +- [CVE-2024-49652](CVE-2024/CVE-2024-496xx/CVE-2024-49652.json) (`2024-10-23T16:15:06.027`) +- [CVE-2024-49653](CVE-2024/CVE-2024-496xx/CVE-2024-49653.json) (`2024-10-23T16:15:06.243`) +- [CVE-2024-49657](CVE-2024/CVE-2024-496xx/CVE-2024-49657.json) (`2024-10-23T16:15:06.450`) +- [CVE-2024-49658](CVE-2024/CVE-2024-496xx/CVE-2024-49658.json) (`2024-10-23T16:15:06.660`) +- [CVE-2024-49668](CVE-2024/CVE-2024-496xx/CVE-2024-49668.json) (`2024-10-23T16:15:06.970`) +- [CVE-2024-49669](CVE-2024/CVE-2024-496xx/CVE-2024-49669.json) (`2024-10-23T16:15:07.330`) +- [CVE-2024-49671](CVE-2024/CVE-2024-496xx/CVE-2024-49671.json) (`2024-10-23T16:15:08.260`) +- [CVE-2024-49676](CVE-2024/CVE-2024-496xx/CVE-2024-49676.json) (`2024-10-23T16:15:09.040`) +- [CVE-2024-49684](CVE-2024/CVE-2024-496xx/CVE-2024-49684.json) (`2024-10-23T16:15:09.620`) +- [CVE-2024-49690](CVE-2024/CVE-2024-496xx/CVE-2024-49690.json) (`2024-10-23T16:15:09.867`) +- [CVE-2024-49701](CVE-2024/CVE-2024-497xx/CVE-2024-49701.json) (`2024-10-23T16:15:10.097`) +- [CVE-2024-49751](CVE-2024/CVE-2024-497xx/CVE-2024-49751.json) (`2024-10-23T16:15:10.310`) +- [CVE-2024-49756](CVE-2024/CVE-2024-497xx/CVE-2024-49756.json) (`2024-10-23T17:15:19.250`) +- [CVE-2024-50382](CVE-2024/CVE-2024-503xx/CVE-2024-50382.json) (`2024-10-23T17:15:19.453`) +- [CVE-2024-50383](CVE-2024/CVE-2024-503xx/CVE-2024-50383.json) (`2024-10-23T17:15:19.540`) ### CVEs modified in the last Commit -Recently modified CVEs: `469` +Recently modified CVEs: `57` -- [CVE-2024-50066](CVE-2024/CVE-2024-500xx/CVE-2024-50066.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-50311](CVE-2024/CVE-2024-503xx/CVE-2024-50311.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-7587](CVE-2024/CVE-2024-75xx/CVE-2024-7587.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-8500](CVE-2024/CVE-2024-85xx/CVE-2024-8500.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-8852](CVE-2024/CVE-2024-88xx/CVE-2024-8852.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-8901](CVE-2024/CVE-2024-89xx/CVE-2024-8901.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9050](CVE-2024/CVE-2024-90xx/CVE-2024-9050.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9129](CVE-2024/CVE-2024-91xx/CVE-2024-9129.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9231](CVE-2024/CVE-2024-92xx/CVE-2024-9231.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9530](CVE-2024/CVE-2024-95xx/CVE-2024-9530.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9541](CVE-2024/CVE-2024-95xx/CVE-2024-9541.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9583](CVE-2024/CVE-2024-95xx/CVE-2024-9583.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9588](CVE-2024/CVE-2024-95xx/CVE-2024-9588.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9589](CVE-2024/CVE-2024-95xx/CVE-2024-9589.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9590](CVE-2024/CVE-2024-95xx/CVE-2024-9590.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9591](CVE-2024/CVE-2024-95xx/CVE-2024-9591.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9627](CVE-2024/CVE-2024-96xx/CVE-2024-9627.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9677](CVE-2024/CVE-2024-96xx/CVE-2024-9677.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9829](CVE-2024/CVE-2024-98xx/CVE-2024-9829.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9927](CVE-2024/CVE-2024-99xx/CVE-2024-9927.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9947](CVE-2024/CVE-2024-99xx/CVE-2024-9947.json) (`2024-10-23T15:12:34.673`) -- [CVE-2024-9987](CVE-2024/CVE-2024-99xx/CVE-2024-9987.json) (`2024-10-23T15:12:34.673`) +- [CVE-2024-47737](CVE-2024/CVE-2024-477xx/CVE-2024-47737.json) (`2024-10-23T17:00:01.357`) +- [CVE-2024-47739](CVE-2024/CVE-2024-477xx/CVE-2024-47739.json) (`2024-10-23T16:58:37.707`) +- [CVE-2024-47745](CVE-2024/CVE-2024-477xx/CVE-2024-47745.json) (`2024-10-23T17:25:19.657`) +- [CVE-2024-47748](CVE-2024/CVE-2024-477xx/CVE-2024-47748.json) (`2024-10-23T17:28:00.460`) +- [CVE-2024-47750](CVE-2024/CVE-2024-477xx/CVE-2024-47750.json) (`2024-10-23T17:29:01.330`) +- [CVE-2024-47751](CVE-2024/CVE-2024-477xx/CVE-2024-47751.json) (`2024-10-23T17:33:52.440`) +- [CVE-2024-48049](CVE-2024/CVE-2024-480xx/CVE-2024-48049.json) (`2024-10-23T16:12:12.127`) +- [CVE-2024-48415](CVE-2024/CVE-2024-484xx/CVE-2024-48415.json) (`2024-10-23T16:35:09.317`) +- [CVE-2024-48652](CVE-2024/CVE-2024-486xx/CVE-2024-48652.json) (`2024-10-23T16:35:10.103`) +- [CVE-2024-48656](CVE-2024/CVE-2024-486xx/CVE-2024-48656.json) (`2024-10-23T16:35:12.613`) +- [CVE-2024-48657](CVE-2024/CVE-2024-486xx/CVE-2024-48657.json) (`2024-10-23T16:35:13.890`) +- [CVE-2024-49286](CVE-2024/CVE-2024-492xx/CVE-2024-49286.json) (`2024-10-23T16:13:37.823`) +- [CVE-2024-49323](CVE-2024/CVE-2024-493xx/CVE-2024-49323.json) (`2024-10-23T16:05:49.617`) +- [CVE-2024-49328](CVE-2024/CVE-2024-493xx/CVE-2024-49328.json) (`2024-10-23T17:08:31.910`) +- [CVE-2024-49334](CVE-2024/CVE-2024-493xx/CVE-2024-49334.json) (`2024-10-23T16:08:01.277`) +- [CVE-2024-49851](CVE-2024/CVE-2024-498xx/CVE-2024-49851.json) (`2024-10-23T16:00:52.597`) +- [CVE-2024-49852](CVE-2024/CVE-2024-498xx/CVE-2024-49852.json) (`2024-10-23T16:14:01.857`) +- [CVE-2024-49853](CVE-2024/CVE-2024-498xx/CVE-2024-49853.json) (`2024-10-23T16:14:30.750`) +- [CVE-2024-49854](CVE-2024/CVE-2024-498xx/CVE-2024-49854.json) (`2024-10-23T16:29:32.857`) +- [CVE-2024-49856](CVE-2024/CVE-2024-498xx/CVE-2024-49856.json) (`2024-10-23T16:33:20.857`) +- [CVE-2024-49858](CVE-2024/CVE-2024-498xx/CVE-2024-49858.json) (`2024-10-23T16:35:10.097`) +- [CVE-2024-49860](CVE-2024/CVE-2024-498xx/CVE-2024-49860.json) (`2024-10-23T16:44:58.473`) +- [CVE-2024-49861](CVE-2024/CVE-2024-498xx/CVE-2024-49861.json) (`2024-10-23T16:48:47.573`) +- [CVE-2024-49862](CVE-2024/CVE-2024-498xx/CVE-2024-49862.json) (`2024-10-23T16:53:51.050`) +- [CVE-2024-6010](CVE-2024/CVE-2024-60xx/CVE-2024-6010.json) (`2024-10-23T16:15:10.483`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a8d4424a5fb..f82116b1d80 100644 --- a/_state.csv +++ b/_state.csv @@ -114216,16 +114216,16 @@ CVE-2018-13367,0,0,2c0b190f3877d554c7c1793628ac2255a5cca3a093c589c3f0ee70977e780 CVE-2018-13368,0,0,db3621b4229003a92c4734f6155d38c9e0973d22b3108c201c69db75b3f18dae,2020-08-24T17:37:01.140000 CVE-2018-1337,0,0,ac2f74a143a89a31e641617add9054f59782e3dc278d74a4c0107d8a66e7c7ca,2023-11-07T02:55:59.343000 CVE-2018-13371,0,0,6d518c7f248715560f2fdc8eda0d045226e614f54a2220bedf3a83e9d961d6e4,2020-04-03T18:53:23.173000 -CVE-2018-13374,0,1,2ef7b2ad3f170041b4f14e419ead6d2b6bc66b247b9b28502c75161bb736f80f,2024-10-23T14:35:00.903000 +CVE-2018-13374,0,0,2ef7b2ad3f170041b4f14e419ead6d2b6bc66b247b9b28502c75161bb736f80f,2024-10-23T14:35:00.903000 CVE-2018-13375,0,0,d56d6bafd36bf4e0bb208e573685704fee8535e51d0b9a9e0de49024b4474a77,2019-05-30T15:19:19.737000 CVE-2018-13376,0,0,34379bca4498e8ec746f1a8397920cc44e22e9cefdf9bd673e27251e09c3a80a,2019-10-03T00:03:26.223000 CVE-2018-13378,0,0,9f71a7a5685934cdd46869122ec078124ae2ec66bfbc946ccbf9f49813590b58,2019-04-17T18:06:24.997000 -CVE-2018-13379,0,1,d5f3c20a15fc41dd7db172a046157d316fbf5a3bea148f7bd01a767259761602,2024-10-23T14:35:02.830000 +CVE-2018-13379,0,0,d5f3c20a15fc41dd7db172a046157d316fbf5a3bea148f7bd01a767259761602,2024-10-23T14:35:02.830000 CVE-2018-1338,0,0,d64411637977ae42c91121f0409cbf1c71d1031cb46205ab4bc91aedd4d1c053,2023-11-07T02:55:59.417000 CVE-2018-13380,0,0,480272033178ab224e15cb78036830ce2ce28e5ca27484adf0a78212d77e5330,2021-04-06T12:56:42.507000 CVE-2018-13381,0,0,c6d40fea6a34ff14b2a09585a7b5be2b92a5fed103e6436015156bf377343728,2021-03-16T02:41:08.027000 -CVE-2018-13382,0,1,d577aa48fb4909dc30a192abdb700d2f785f27bf8a82df28093deba860a43e2d,2024-10-23T14:35:03.977000 -CVE-2018-13383,0,1,3917815d0ce3fcdb5af1ee61e13e4da694426b405bf668ed33d844969a103504,2024-10-23T14:35:04.847000 +CVE-2018-13382,0,0,d577aa48fb4909dc30a192abdb700d2f785f27bf8a82df28093deba860a43e2d,2024-10-23T14:35:03.977000 +CVE-2018-13383,0,0,3917815d0ce3fcdb5af1ee61e13e4da694426b405bf668ed33d844969a103504,2024-10-23T14:35:04.847000 CVE-2018-13384,0,0,0470da54b93707468acde7194067c44388da84e74ce445a3f6794a553a854a11,2019-06-05T14:26:09.117000 CVE-2018-13385,0,0,4e701bd89560a8ee5e1216c62101d98e943a0ac12ab90ea0f01e645a62b830ae,2020-05-11T16:29:41.080000 CVE-2018-13386,0,0,ac1c92d8c2b1ce7a084b13c83da90e1d9578e1ecdf924c062b623ddcb6c13f83,2020-08-24T17:37:01.140000 @@ -140618,7 +140618,7 @@ CVE-2019-5587,0,0,36a21e1962c4b84046c708b9530a7b6739ebf9b478111ca6a2241258e54411 CVE-2019-5588,0,0,3f0b8fba42908ef2af4fee61278f32858eed24baf92642c9d5aebb509ca10bcb,2019-06-06T08:29:01.163000 CVE-2019-5589,0,0,9f67f8b6b5e2fafbf076286d8eaf684f4116be340de16ca47f21da70d196906a,2019-05-29T16:07:09.427000 CVE-2019-5590,0,0,14eacc45b17452900d49eb3790b63c5114826589aeb83b384adfdd687aec81e5,2019-09-03T17:36:09.097000 -CVE-2019-5591,0,1,fe615c20161277d1b087a9e23864acc33626fdc18fa50a9478a5ce9f3d5c195f,2024-10-23T14:35:05.617000 +CVE-2019-5591,0,0,fe615c20161277d1b087a9e23864acc33626fdc18fa50a9478a5ce9f3d5c195f,2024-10-23T14:35:05.617000 CVE-2019-5592,0,0,c65975805c53507a25362facc127ffc160832023947eeb0b3170a80c5c01a765,2020-08-24T17:37:01.140000 CVE-2019-5593,0,0,dbf1143c17c60df0e3b56b726eab8152cc476ee429e7eb8af2a630e11f7ca3d3,2021-07-21T11:39:23.747000 CVE-2019-5594,0,0,0dae2849bfddd68890ebd30c23f1e3c5e38c982981fb8adf9e75744dd0620f84,2019-08-26T14:12:55.073000 @@ -170437,7 +170437,7 @@ CVE-2021-24562,0,0,baa770ef906f0e2638525e58ffa4168e98db861c5802f86cd3820eb648030 CVE-2021-24563,0,0,eab02b7cb2e9f7d140aa33e5b2390a7888e495f7012ebf555c7637a6a70216fe,2022-02-19T04:44:04.857000 CVE-2021-24564,0,0,86e2798d0912a669dbef7859ebb29c6219e79f4c26fab3dd309f0e6794ff6854,2021-08-27T14:49:03.590000 CVE-2021-24565,0,0,327df3f009e7de626351065caf963ba05d34adf1dbda7b2b3278de78cc13f5db,2022-07-28T12:00:49.127000 -CVE-2021-24566,0,1,eae5c3d74bc0d012a26b311c7122185431a68e8d85a52398abaf51923afe7489,2024-10-23T15:35:02.310000 +CVE-2021-24566,0,0,eae5c3d74bc0d012a26b311c7122185431a68e8d85a52398abaf51923afe7489,2024-10-23T15:35:02.310000 CVE-2021-24567,0,0,cfcf994544e82803dffea3cf7bf899c943bc00598e6bdf175ce7f8d654602843,2024-08-29T20:35:03.797000 CVE-2021-24568,0,0,22cd2e0b768132cf4829cbea5eb6ab2da07a55e3161a1a04667ac3d3e42514dd,2021-09-09T21:08:04.690000 CVE-2021-24569,0,0,66259a984518a916e0ff3e18bda082d41f6b760f7ad8bef9bca336029dad4c89,2021-10-04T20:18:42.137000 @@ -185040,7 +185040,7 @@ CVE-2021-44164,0,0,3953db61df1979ca78c5c6890cacd56bf83441f46792aa34f8722e7ea8834 CVE-2021-44165,0,0,62f71e9913a1e93c2dd3cbc55bcae109ae60e1eff4af22daa5ee5a7bba761ebf,2021-12-16T22:00:44.380000 CVE-2021-44166,0,0,285e1baafdd7b0a945b677318edb20e598e58c71c58d1e1aefc0d782339dc390,2022-03-11T19:40:52.643000 CVE-2021-44167,0,0,67a9c40d00214581e04ba8f834a909476ef625c049133b03ee7ec5c2e954ae8c,2022-05-19T02:47:23.603000 -CVE-2021-44168,0,1,de9a7d9c0835b22925ed84889d98b878a6476e348c8bb46c5fc40d75ce082076,2024-10-23T15:40:23.217000 +CVE-2021-44168,0,0,de9a7d9c0835b22925ed84889d98b878a6476e348c8bb46c5fc40d75ce082076,2024-10-23T15:40:23.217000 CVE-2021-44169,0,0,759bf413da439ae2ac08624614cca5309bd4606b588abdbf63b90a4654b9fdb1,2022-04-14T13:41:34.387000 CVE-2021-4417,0,0,b22211b4a50a557cf6cc85903b3b762ddcba5f4343e219e94634e4f024887f34,2023-11-07T03:40:54.140000 CVE-2021-44170,0,0,88334b61a2437ecfc967a58e5f4352f0f9c43824393ad5ebe302e1e3e94622d7,2022-07-25T17:05:58.760000 @@ -193038,8 +193038,8 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521 CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000 CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000 CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000 -CVE-2022-23861,0,1,1b79df6ad607e321a06ffd4f1414ad54f48e3b8a61921f1d2f0a02f3a735e314,2024-10-23T15:12:34.673000 -CVE-2022-23862,0,1,2b721dae3c741fa798c190bd3375737db683c0e200456780df62dd1f1d9e42d1,2024-10-23T15:12:34.673000 +CVE-2022-23861,0,0,1b79df6ad607e321a06ffd4f1414ad54f48e3b8a61921f1d2f0a02f3a735e314,2024-10-23T15:12:34.673000 +CVE-2022-23862,0,0,2b721dae3c741fa798c190bd3375737db683c0e200456780df62dd1f1d9e42d1,2024-10-23T15:12:34.673000 CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000 CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000 CVE-2022-23868,0,0,c4621856d933568f66278364ad9aeb56e74477fa3255560a959f3a6c8b310a91,2022-04-04T19:47:02.100000 @@ -208942,7 +208942,7 @@ CVE-2022-4371,0,0,275080852b7640fb074456225f88178f9e81657356dbc5280fa489ab497596 CVE-2022-43710,0,0,8252021b200bf69a0879f2153da2a55121d0a089867a62fedaecf3856e956dba,2023-08-04T16:05:41.757000 CVE-2022-43711,0,0,75fdb24330479eec6752c493ca1c0dcce71aeb60bb9f4a3ec519941a11409ccf,2023-08-04T15:37:18.857000 CVE-2022-43712,0,0,1f3633e27afb31c08675af9ad75e88d9090a100378c1dd0bb148e9db326b39a8,2023-08-04T19:39:49.167000 -CVE-2022-43713,0,1,5d82cc52ae6118140f4aa1461ec87f6c9ace56a1e1bce40e490c21cfdd2503c3,2024-10-23T15:35:06.987000 +CVE-2022-43713,0,0,5d82cc52ae6118140f4aa1461ec87f6c9ace56a1e1bce40e490c21cfdd2503c3,2024-10-23T15:35:06.987000 CVE-2022-43716,0,0,bfbdcdd5188bd491bf22c9469dee5c2bb33e93ce8bec29584e0419dcaf894f74,2024-09-10T10:15:04.627000 CVE-2022-43717,0,0,29a13eb1c3f929491bd4890a5cb91a25d48a2fac30e9970c5e3fca2bfdb8dc2a,2023-11-07T03:54:02.080000 CVE-2022-43718,0,0,51b91014b37759fc7d6f30b773c9245370da36aee436ce0fdb04abfef0b7be6d,2023-11-07T03:54:02.147000 @@ -212556,103 +212556,103 @@ CVE-2022-48942,0,0,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0a CVE-2022-48943,0,0,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000 CVE-2022-48944,0,0,78b35f4e96175b0acbd7eb76c8fc345abc146c0623b459d55b4bfe903afbd190,2024-09-03T14:26:56.393000 CVE-2022-48945,0,0,04e7494c867d2745065a695f3c050464fcd7db6e245bb13442273deff488e24a,2024-09-26T13:32:55.343000 -CVE-2022-48946,0,1,1df7137dee6b4c4a5e3f8613084121272ab068dbfc5c217e4e46dd75cef501fa,2024-10-23T15:13:25.583000 -CVE-2022-48947,0,1,8eac4b90177e0cee64005b8271cce50edbdecd0feb9b6ba4c912157e57fa25cd,2024-10-23T15:13:25.583000 -CVE-2022-48948,0,1,0df7ff89bc20e6d14a730310fe00121f0b4c3b94433557dadb35b55179bf0d80,2024-10-23T15:13:25.583000 -CVE-2022-48949,0,1,2d06b0ddc43a1d6ceef8a0ad6d5012e53b15c9ea3ed8f9cf12049c67291c9b36,2024-10-23T15:13:25.583000 +CVE-2022-48946,0,0,1df7137dee6b4c4a5e3f8613084121272ab068dbfc5c217e4e46dd75cef501fa,2024-10-23T15:13:25.583000 +CVE-2022-48947,0,0,8eac4b90177e0cee64005b8271cce50edbdecd0feb9b6ba4c912157e57fa25cd,2024-10-23T15:13:25.583000 +CVE-2022-48948,0,0,0df7ff89bc20e6d14a730310fe00121f0b4c3b94433557dadb35b55179bf0d80,2024-10-23T15:13:25.583000 +CVE-2022-48949,0,0,2d06b0ddc43a1d6ceef8a0ad6d5012e53b15c9ea3ed8f9cf12049c67291c9b36,2024-10-23T15:13:25.583000 CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000 -CVE-2022-48950,0,1,df7cdcc43adc0fe4790bfeee6795f91b28a4c15b10566f630a78891552ade293,2024-10-23T15:13:25.583000 -CVE-2022-48951,0,1,ba9d8cef5379b0ff4a935922614acdd38174cd969734d165c8703c7601b1f6a8,2024-10-23T15:13:25.583000 -CVE-2022-48952,0,1,cf21a0255246b5b3ab6d95e6ea99d72bc42c2b56c4888d478133ad8ae4632324,2024-10-23T15:13:25.583000 -CVE-2022-48953,0,1,037e26b090bc3b5c06ab9dffbf7de850a858e5fc3604925c0be082d71471c418,2024-10-23T15:13:25.583000 -CVE-2022-48954,0,1,d03a871ace91d7fda187606652c7e051870285e499bfc0944e94d8b0548b731c,2024-10-23T15:13:25.583000 -CVE-2022-48955,0,1,adfc623e02dfe3e9e8f9ee1f86ccacf1144c3f91e445f7d71c55691d3ddd637d,2024-10-23T15:13:25.583000 -CVE-2022-48956,0,1,efc542c10b827503bb60baef12ae6363e9aaed958a02fa0171aa8b339eb477e6,2024-10-23T15:13:25.583000 -CVE-2022-48957,0,1,e75f592b46fc02f5c17b54b9d14925ac4ac550c8bec708e43fe7280bb85bded4,2024-10-23T15:13:25.583000 -CVE-2022-48958,0,1,64a1b4825cb7fe46a7f91cfb2ea852904955b0ccb818b0aff987ae8d6445afa5,2024-10-23T15:13:25.583000 -CVE-2022-48959,0,1,15542692f4371b13a09c39e6e151849b1884a96a610571abab83498557c99ba6,2024-10-23T15:13:25.583000 +CVE-2022-48950,0,0,df7cdcc43adc0fe4790bfeee6795f91b28a4c15b10566f630a78891552ade293,2024-10-23T15:13:25.583000 +CVE-2022-48951,0,0,ba9d8cef5379b0ff4a935922614acdd38174cd969734d165c8703c7601b1f6a8,2024-10-23T15:13:25.583000 +CVE-2022-48952,0,0,cf21a0255246b5b3ab6d95e6ea99d72bc42c2b56c4888d478133ad8ae4632324,2024-10-23T15:13:25.583000 +CVE-2022-48953,0,0,037e26b090bc3b5c06ab9dffbf7de850a858e5fc3604925c0be082d71471c418,2024-10-23T15:13:25.583000 +CVE-2022-48954,0,0,d03a871ace91d7fda187606652c7e051870285e499bfc0944e94d8b0548b731c,2024-10-23T15:13:25.583000 +CVE-2022-48955,0,0,adfc623e02dfe3e9e8f9ee1f86ccacf1144c3f91e445f7d71c55691d3ddd637d,2024-10-23T15:13:25.583000 +CVE-2022-48956,0,0,efc542c10b827503bb60baef12ae6363e9aaed958a02fa0171aa8b339eb477e6,2024-10-23T15:13:25.583000 +CVE-2022-48957,0,0,e75f592b46fc02f5c17b54b9d14925ac4ac550c8bec708e43fe7280bb85bded4,2024-10-23T15:13:25.583000 +CVE-2022-48958,0,0,64a1b4825cb7fe46a7f91cfb2ea852904955b0ccb818b0aff987ae8d6445afa5,2024-10-23T15:13:25.583000 +CVE-2022-48959,0,0,15542692f4371b13a09c39e6e151849b1884a96a610571abab83498557c99ba6,2024-10-23T15:13:25.583000 CVE-2022-4896,0,0,04cb60ab8732a1bfba8bf7d8a4df08b8371cdecc380fd455d1b928e8213822e1,2023-09-15T15:18:10.843000 -CVE-2022-48960,0,1,7cb8843c394326dbdacddf0f27bacd316ff597acdea2e37e285edd34a46c7da3,2024-10-23T15:13:25.583000 -CVE-2022-48961,0,1,9079782a53ac6f878f46ee5a7bd8c6d64ab25ec3e859504aac9ecda2b190e0a9,2024-10-23T15:13:25.583000 -CVE-2022-48962,0,1,1fbe44df9f14637284a2af17fc0f2951662bf83234ea5e1359c57113b94d87c0,2024-10-23T15:13:25.583000 -CVE-2022-48963,0,1,370e14d6d7de5be593d3aea44663d07232c2f99638747b44362a7976312c9d6a,2024-10-23T15:13:25.583000 -CVE-2022-48964,0,1,b433adf18e64faf47e8adedd875bbd7b9f6f61ed17ec1312cd5f64e587863cf5,2024-10-23T15:13:25.583000 -CVE-2022-48965,0,1,5c2d1d54d8b3c46630fcded2c16f38c7fffd2383699aeb72a69572ed1749a87e,2024-10-23T15:13:25.583000 -CVE-2022-48966,0,1,7b5ea2cdb27342c6837b1d63b8ed702b4c34ea924734529cc736266041c3d692,2024-10-23T15:13:25.583000 -CVE-2022-48967,0,1,9a4dff8791ae44e4087bbdddb5fbc68f8736e971375d2e967fe26661594f6b57,2024-10-23T15:13:25.583000 -CVE-2022-48968,0,1,017a1d2b13f226f7bddbc210b2bd3cf757d1f0d39cf99f216cca9b576a19e95d,2024-10-23T15:13:25.583000 -CVE-2022-48969,0,1,9d5e3023502dbcf73cf247c9ccac819ef4bcc5ebe125f185e7eeef2c89ccaf31,2024-10-23T15:13:25.583000 +CVE-2022-48960,0,0,7cb8843c394326dbdacddf0f27bacd316ff597acdea2e37e285edd34a46c7da3,2024-10-23T15:13:25.583000 +CVE-2022-48961,0,0,9079782a53ac6f878f46ee5a7bd8c6d64ab25ec3e859504aac9ecda2b190e0a9,2024-10-23T15:13:25.583000 +CVE-2022-48962,0,0,1fbe44df9f14637284a2af17fc0f2951662bf83234ea5e1359c57113b94d87c0,2024-10-23T15:13:25.583000 +CVE-2022-48963,0,0,370e14d6d7de5be593d3aea44663d07232c2f99638747b44362a7976312c9d6a,2024-10-23T15:13:25.583000 +CVE-2022-48964,0,0,b433adf18e64faf47e8adedd875bbd7b9f6f61ed17ec1312cd5f64e587863cf5,2024-10-23T15:13:25.583000 +CVE-2022-48965,0,0,5c2d1d54d8b3c46630fcded2c16f38c7fffd2383699aeb72a69572ed1749a87e,2024-10-23T15:13:25.583000 +CVE-2022-48966,0,0,7b5ea2cdb27342c6837b1d63b8ed702b4c34ea924734529cc736266041c3d692,2024-10-23T15:13:25.583000 +CVE-2022-48967,0,0,9a4dff8791ae44e4087bbdddb5fbc68f8736e971375d2e967fe26661594f6b57,2024-10-23T15:13:25.583000 +CVE-2022-48968,0,0,017a1d2b13f226f7bddbc210b2bd3cf757d1f0d39cf99f216cca9b576a19e95d,2024-10-23T15:13:25.583000 +CVE-2022-48969,0,0,9d5e3023502dbcf73cf247c9ccac819ef4bcc5ebe125f185e7eeef2c89ccaf31,2024-10-23T15:13:25.583000 CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000 -CVE-2022-48970,0,1,45c85a1af32aaabc82a280a88744dc74a183e44f43b2cbbbe39c736815048512,2024-10-23T15:13:25.583000 -CVE-2022-48971,0,1,bd54fbb0c1a1f8256ecbe84a7983dc4c347ecac0b3edefb38623b0e7f19e9ecc,2024-10-23T15:13:25.583000 -CVE-2022-48972,0,1,da53d09fee0b743c4e84c6fc45c7699f24d076dbb3308f2587610f748901c7b9,2024-10-23T15:13:25.583000 -CVE-2022-48973,0,1,6116dced52fd879b051aa3b01cef0aaa1a44c0b61123ce31efefbe7ba874b90b,2024-10-23T15:13:25.583000 -CVE-2022-48974,0,1,01ad91b6f0b9cd76af6e1848676d091c9ae53df34bdf7dcf3c4c3aa2369d9ac0,2024-10-23T15:13:25.583000 -CVE-2022-48975,0,1,5aa03611cf6147e6cbe4a65152583e0072aea2d5e51c8399c173faf09094d685,2024-10-23T15:13:25.583000 -CVE-2022-48976,0,1,a64de68b36096327ba87788e46c4482923e9b464dece26a8aba3dd90cbbbdf36,2024-10-23T15:13:25.583000 -CVE-2022-48977,0,1,22a1f9cacabe8dede59f80dc5c8e91dcb66c9e473ead5c6f5b52cff09106031d,2024-10-23T15:13:25.583000 -CVE-2022-48978,0,1,31293eb0f81829ea7af1f070d7a3df5a1790f8574ca5251e33cd7c1710ed9003,2024-10-23T15:13:25.583000 -CVE-2022-48979,0,1,d38e0f35f5b0051b12afc3385f777364a73a3b1754aa2556c22567d7fd4543a8,2024-10-23T15:13:25.583000 +CVE-2022-48970,0,0,45c85a1af32aaabc82a280a88744dc74a183e44f43b2cbbbe39c736815048512,2024-10-23T15:13:25.583000 +CVE-2022-48971,0,0,bd54fbb0c1a1f8256ecbe84a7983dc4c347ecac0b3edefb38623b0e7f19e9ecc,2024-10-23T15:13:25.583000 +CVE-2022-48972,0,0,da53d09fee0b743c4e84c6fc45c7699f24d076dbb3308f2587610f748901c7b9,2024-10-23T15:13:25.583000 +CVE-2022-48973,0,0,6116dced52fd879b051aa3b01cef0aaa1a44c0b61123ce31efefbe7ba874b90b,2024-10-23T15:13:25.583000 +CVE-2022-48974,0,0,01ad91b6f0b9cd76af6e1848676d091c9ae53df34bdf7dcf3c4c3aa2369d9ac0,2024-10-23T15:13:25.583000 +CVE-2022-48975,0,0,5aa03611cf6147e6cbe4a65152583e0072aea2d5e51c8399c173faf09094d685,2024-10-23T15:13:25.583000 +CVE-2022-48976,0,0,a64de68b36096327ba87788e46c4482923e9b464dece26a8aba3dd90cbbbdf36,2024-10-23T15:13:25.583000 +CVE-2022-48977,0,0,22a1f9cacabe8dede59f80dc5c8e91dcb66c9e473ead5c6f5b52cff09106031d,2024-10-23T15:13:25.583000 +CVE-2022-48978,0,0,31293eb0f81829ea7af1f070d7a3df5a1790f8574ca5251e33cd7c1710ed9003,2024-10-23T15:13:25.583000 +CVE-2022-48979,0,0,d38e0f35f5b0051b12afc3385f777364a73a3b1754aa2556c22567d7fd4543a8,2024-10-23T15:13:25.583000 CVE-2022-4898,0,0,45b8fe73140eae686f75256e6a033fa7f76a1c506314cc4b83a596aba96b02bc,2023-02-21T15:15:12.023000 -CVE-2022-48980,0,1,8d526640cbdfc2eac896bd10a04a158881a6eaf9b8c038323a974e23d54cd968,2024-10-23T15:13:25.583000 -CVE-2022-48981,0,1,964b5764196aa475d717a98d105807ba1ba56de8f543da7fb2f4d00ef08bab19,2024-10-23T15:13:25.583000 -CVE-2022-48982,0,1,2b231419453512dd11ff8c1000c255778689437792243f66ab1524a71b12fbdf,2024-10-23T15:13:25.583000 -CVE-2022-48983,0,1,89c99eb008e4543f59ffb9b8f97206fd39b58250924e143ecfa056eefd701519,2024-10-23T15:13:25.583000 -CVE-2022-48984,0,1,c9c64f59c6e0ae126ed5ccdad9f415b181e68b350fc343ea20dafa489e069d0e,2024-10-23T15:13:25.583000 -CVE-2022-48985,0,1,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000 -CVE-2022-48986,0,1,6c9de2cdc1f05896064512205d6a856f3488acd470650f11d2c15464c4a320e4,2024-10-23T15:13:25.583000 -CVE-2022-48987,0,1,7e41a00ba39093b717c7e7821e300a97872c374b14c3fe63fb5c52c9819075bf,2024-10-23T15:13:25.583000 -CVE-2022-48988,0,1,13aee4cb90261ef632b8011d536d4f4d81a59bc5186a33e9a1bb37d07ce9e2c4,2024-10-23T15:13:25.583000 -CVE-2022-48989,0,1,ec3acefd81e80f8987880bd73f4eb6f75823cd54c45158afed0c4749ffd0f34c,2024-10-23T15:13:25.583000 +CVE-2022-48980,0,0,8d526640cbdfc2eac896bd10a04a158881a6eaf9b8c038323a974e23d54cd968,2024-10-23T15:13:25.583000 +CVE-2022-48981,0,0,964b5764196aa475d717a98d105807ba1ba56de8f543da7fb2f4d00ef08bab19,2024-10-23T15:13:25.583000 +CVE-2022-48982,0,0,2b231419453512dd11ff8c1000c255778689437792243f66ab1524a71b12fbdf,2024-10-23T15:13:25.583000 +CVE-2022-48983,0,0,89c99eb008e4543f59ffb9b8f97206fd39b58250924e143ecfa056eefd701519,2024-10-23T15:13:25.583000 +CVE-2022-48984,0,0,c9c64f59c6e0ae126ed5ccdad9f415b181e68b350fc343ea20dafa489e069d0e,2024-10-23T15:13:25.583000 +CVE-2022-48985,0,0,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000 +CVE-2022-48986,0,0,6c9de2cdc1f05896064512205d6a856f3488acd470650f11d2c15464c4a320e4,2024-10-23T15:13:25.583000 +CVE-2022-48987,0,0,7e41a00ba39093b717c7e7821e300a97872c374b14c3fe63fb5c52c9819075bf,2024-10-23T15:13:25.583000 +CVE-2022-48988,0,0,13aee4cb90261ef632b8011d536d4f4d81a59bc5186a33e9a1bb37d07ce9e2c4,2024-10-23T15:13:25.583000 +CVE-2022-48989,0,0,ec3acefd81e80f8987880bd73f4eb6f75823cd54c45158afed0c4749ffd0f34c,2024-10-23T15:13:25.583000 CVE-2022-4899,0,0,64070b82b08d57aace9b84f3711bc30a23fda3b7a68f2b187d0af07aa5382f53,2023-11-07T03:59:16.090000 -CVE-2022-48990,0,1,76b3abca04cda73be5b91a655a68e9ea48b8941272ce2e5ded70924fe2f52256,2024-10-23T15:13:25.583000 -CVE-2022-48991,0,1,6a7cb21a3ac184136cd0ab4a861f7301f05b1785725a9d2367d58cd519d1b08f,2024-10-23T15:13:25.583000 -CVE-2022-48992,0,1,d92c8ca8a95948e1be7457194a40c222a8e8302589496e8a10d5354e69202cbf,2024-10-23T15:13:25.583000 +CVE-2022-48990,0,0,76b3abca04cda73be5b91a655a68e9ea48b8941272ce2e5ded70924fe2f52256,2024-10-23T15:13:25.583000 +CVE-2022-48991,0,0,6a7cb21a3ac184136cd0ab4a861f7301f05b1785725a9d2367d58cd519d1b08f,2024-10-23T15:13:25.583000 +CVE-2022-48992,0,0,d92c8ca8a95948e1be7457194a40c222a8e8302589496e8a10d5354e69202cbf,2024-10-23T15:13:25.583000 CVE-2022-48993,0,0,ef216d3e2a04a71a8d804734065ba340ce4d331bb10df8d692bb266c02e77712,2024-10-23T09:15:02.593000 -CVE-2022-48994,0,1,b4a7042332d16d435ad130f7c8d429b85afe54d674c86946aa6b2b6c75399002,2024-10-23T15:13:25.583000 -CVE-2022-48995,0,1,e54f5dd18ba65c44008367d91a18d6310df7d1e2fbae548bd76ee6f2ab064a75,2024-10-23T15:13:25.583000 -CVE-2022-48996,0,1,0f669c5d177a55ab1de24ef7aebf7206e81a91803f760e8aa9a6146660e8c4e1,2024-10-23T15:13:25.583000 -CVE-2022-48997,0,1,b7b9d54e465f5a467cd4544e1b3ea1f9aa1fa07b25224a4e924ef74e6000999e,2024-10-23T15:13:25.583000 -CVE-2022-48998,0,1,b57fd57be2b9c4c0639652b977cb6f002cc2a4810b1a8b3ec1079b25ac9d83fc,2024-10-23T15:13:25.583000 -CVE-2022-48999,0,1,ec5be2b03e3b5b7d38590253ae9fa2814424968d957fec2c8bd6f9455405047f,2024-10-23T15:13:25.583000 +CVE-2022-48994,0,0,b4a7042332d16d435ad130f7c8d429b85afe54d674c86946aa6b2b6c75399002,2024-10-23T15:13:25.583000 +CVE-2022-48995,0,0,e54f5dd18ba65c44008367d91a18d6310df7d1e2fbae548bd76ee6f2ab064a75,2024-10-23T15:13:25.583000 +CVE-2022-48996,0,0,0f669c5d177a55ab1de24ef7aebf7206e81a91803f760e8aa9a6146660e8c4e1,2024-10-23T15:13:25.583000 +CVE-2022-48997,0,0,b7b9d54e465f5a467cd4544e1b3ea1f9aa1fa07b25224a4e924ef74e6000999e,2024-10-23T15:13:25.583000 +CVE-2022-48998,0,0,b57fd57be2b9c4c0639652b977cb6f002cc2a4810b1a8b3ec1079b25ac9d83fc,2024-10-23T15:13:25.583000 +CVE-2022-48999,0,0,ec5be2b03e3b5b7d38590253ae9fa2814424968d957fec2c8bd6f9455405047f,2024-10-23T15:13:25.583000 CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075c4,2023-11-30T22:15:07.600000 -CVE-2022-49000,0,1,66fc4f4f03879d9d446108a6269b018e290959a61a92a2a2ba3fb133109a0b85,2024-10-23T15:13:25.583000 -CVE-2022-49001,0,1,a7ebb50038c6320990b6a4272aa8a293aee28015fce836d5217b5b7746259999,2024-10-23T15:13:25.583000 -CVE-2022-49002,0,1,22bdfc71018f2426b9a8955e420dc9e9d9e78e107e21c022489ca86ca6e9e407,2024-10-23T15:13:25.583000 -CVE-2022-49003,0,1,3c41ee1b6f67935f3dbaee5c17ff067b795e8a1dade147c4e4670edf7dacf33a,2024-10-23T15:13:25.583000 -CVE-2022-49004,0,1,ef8f6c91fd2e0c960e79d053b02a1200e69708a26daae4e65a75c0ee555da105,2024-10-23T15:13:25.583000 -CVE-2022-49005,0,1,996bcc00649f5f4d6806dab3ae223e12d9b68c5372e06c85334c63daf1a1a662,2024-10-23T15:13:25.583000 -CVE-2022-49006,0,1,11e74bb0eed70588405216f8164bddc6145e3f7d92995a8a649678fb341b062c,2024-10-23T15:13:25.583000 -CVE-2022-49007,0,1,d8181ccdf2d774c95472fe77412f5c5f6b4c10d6c0a508bc04c802e0d59cc425,2024-10-23T15:13:25.583000 -CVE-2022-49008,0,1,858dc4a8a05732b95c403be0591a3fe4ca899c97593a1ac4eca126dfe89df3b4,2024-10-23T15:13:25.583000 -CVE-2022-49009,0,1,1aec1b3dbbd754481a9895696d1234016e9a1841a8ac88e2c3e799ed40d012bd,2024-10-23T15:13:25.583000 +CVE-2022-49000,0,0,66fc4f4f03879d9d446108a6269b018e290959a61a92a2a2ba3fb133109a0b85,2024-10-23T15:13:25.583000 +CVE-2022-49001,0,0,a7ebb50038c6320990b6a4272aa8a293aee28015fce836d5217b5b7746259999,2024-10-23T15:13:25.583000 +CVE-2022-49002,0,0,22bdfc71018f2426b9a8955e420dc9e9d9e78e107e21c022489ca86ca6e9e407,2024-10-23T15:13:25.583000 +CVE-2022-49003,0,0,3c41ee1b6f67935f3dbaee5c17ff067b795e8a1dade147c4e4670edf7dacf33a,2024-10-23T15:13:25.583000 +CVE-2022-49004,0,0,ef8f6c91fd2e0c960e79d053b02a1200e69708a26daae4e65a75c0ee555da105,2024-10-23T15:13:25.583000 +CVE-2022-49005,0,0,996bcc00649f5f4d6806dab3ae223e12d9b68c5372e06c85334c63daf1a1a662,2024-10-23T15:13:25.583000 +CVE-2022-49006,0,0,11e74bb0eed70588405216f8164bddc6145e3f7d92995a8a649678fb341b062c,2024-10-23T15:13:25.583000 +CVE-2022-49007,0,0,d8181ccdf2d774c95472fe77412f5c5f6b4c10d6c0a508bc04c802e0d59cc425,2024-10-23T15:13:25.583000 +CVE-2022-49008,0,0,858dc4a8a05732b95c403be0591a3fe4ca899c97593a1ac4eca126dfe89df3b4,2024-10-23T15:13:25.583000 +CVE-2022-49009,0,0,1aec1b3dbbd754481a9895696d1234016e9a1841a8ac88e2c3e799ed40d012bd,2024-10-23T15:13:25.583000 CVE-2022-4901,0,0,b216b364f33ab0ef7a0c7606c08559e2c099c064cab5e2ac5756fa24252b7a04,2023-03-09T01:06:23.703000 -CVE-2022-49010,0,1,49975f5b867403a17732cbfe6a5dee552c26356798f44f784cdba98c23cd8df4,2024-10-23T15:13:25.583000 -CVE-2022-49011,0,1,dd8bd533bcadf678b7a0db8e543d4ef16f0eea5bec6feba6fc7a987b91b9fa0c,2024-10-23T15:13:25.583000 -CVE-2022-49012,0,1,8a07c2182c08c1ad1a1e47bc11287bb605967cbbc6cf7f351e157a0d363b7429,2024-10-23T15:13:25.583000 -CVE-2022-49013,0,1,36e914fc82151133b00c14fc0dd6d2d180769b97ee8e5432bf641487fa8d4e47,2024-10-23T15:13:25.583000 -CVE-2022-49014,0,1,c95ecff56e0869fae06846154373eae8fdf97512991cb1140fbb3620e800e126,2024-10-23T15:12:34.673000 -CVE-2022-49015,0,1,d620d6c287c474533517dfcedb468be84f4e45ba759170841969d0058958d06a,2024-10-23T15:12:34.673000 -CVE-2022-49016,0,1,40181a51cb7f8d3d385284bf52759235ad6ab4c0905c1e0bc5c375445a969030,2024-10-23T15:12:34.673000 -CVE-2022-49017,0,1,0c85b099df4275fc59772759a2c7d8c7b3e6d34ed68e2b25de3128c16b275f11,2024-10-23T15:12:34.673000 -CVE-2022-49018,0,1,8b91d14699188a6466e9b66054c2b091a5111a7978d2fc3244b03468cd297966,2024-10-23T15:12:34.673000 -CVE-2022-49019,0,1,b406e6800cc70a1fc2a15f69819be72708afd5adefec73d3ca91358360130730,2024-10-23T15:12:34.673000 +CVE-2022-49010,0,0,49975f5b867403a17732cbfe6a5dee552c26356798f44f784cdba98c23cd8df4,2024-10-23T15:13:25.583000 +CVE-2022-49011,0,0,dd8bd533bcadf678b7a0db8e543d4ef16f0eea5bec6feba6fc7a987b91b9fa0c,2024-10-23T15:13:25.583000 +CVE-2022-49012,0,0,8a07c2182c08c1ad1a1e47bc11287bb605967cbbc6cf7f351e157a0d363b7429,2024-10-23T15:13:25.583000 +CVE-2022-49013,0,0,36e914fc82151133b00c14fc0dd6d2d180769b97ee8e5432bf641487fa8d4e47,2024-10-23T15:13:25.583000 +CVE-2022-49014,0,0,c95ecff56e0869fae06846154373eae8fdf97512991cb1140fbb3620e800e126,2024-10-23T15:12:34.673000 +CVE-2022-49015,0,0,d620d6c287c474533517dfcedb468be84f4e45ba759170841969d0058958d06a,2024-10-23T15:12:34.673000 +CVE-2022-49016,0,0,40181a51cb7f8d3d385284bf52759235ad6ab4c0905c1e0bc5c375445a969030,2024-10-23T15:12:34.673000 +CVE-2022-49017,0,0,0c85b099df4275fc59772759a2c7d8c7b3e6d34ed68e2b25de3128c16b275f11,2024-10-23T15:12:34.673000 +CVE-2022-49018,0,0,8b91d14699188a6466e9b66054c2b091a5111a7978d2fc3244b03468cd297966,2024-10-23T15:12:34.673000 +CVE-2022-49019,0,0,b406e6800cc70a1fc2a15f69819be72708afd5adefec73d3ca91358360130730,2024-10-23T15:12:34.673000 CVE-2022-4902,0,0,287e358bd6e692608595d8f35e480fa1fc0a17dda86b7a57dcb446074ab1fd22,2024-05-17T02:17:02.280000 -CVE-2022-49020,0,1,8b25c362578c653f15013748f84ab47d07734b1a9ed889e7947a86ddd913892d,2024-10-23T15:12:34.673000 -CVE-2022-49021,0,1,c13080553f6c3a29a539f0228afee28b33a32fbcd7514148f0639e4b5bcab60e,2024-10-23T15:12:34.673000 -CVE-2022-49022,0,1,375c2c1f5bbfb9be9e7fe5a0f98ed056cada3390d8b8188c759d343f8dc611ad,2024-10-23T15:12:34.673000 -CVE-2022-49023,0,1,886f28047e51b0d5cbd020df4cc655cdd458a7911b25cd4951f4b4242a4b892c,2024-10-23T15:12:34.673000 -CVE-2022-49024,0,1,c00893c59a165d1c170d9a317bfb43056081887f830fc21e0891bc4d8c47c79d,2024-10-23T15:12:34.673000 -CVE-2022-49025,0,1,91a35a24f6d258ae9c91b9eae293a385299b9bf04797f3ff4cd189ffe97b5beb,2024-10-23T15:12:34.673000 -CVE-2022-49026,0,1,9d023d745e62a45d98a366113e9be9e14ee982d178ba42d16b41e438d20cad55,2024-10-23T15:12:34.673000 -CVE-2022-49027,0,1,42fa0c700e5307e968a3969af2d092b0f75d1095174ef837ce5312d1711e198e,2024-10-23T15:12:34.673000 -CVE-2022-49028,0,1,feac20437bb7da1f124a8fd07fbdf5c8a01c1dfc3a8fe17089fe43ba3203fed8,2024-10-23T15:12:34.673000 -CVE-2022-49029,0,1,e9f2fdd5a911ae13fff2c73a1d3fa9d99016d5a0884f3d9f5ef330bccd743b65,2024-10-23T15:12:34.673000 +CVE-2022-49020,0,0,8b25c362578c653f15013748f84ab47d07734b1a9ed889e7947a86ddd913892d,2024-10-23T15:12:34.673000 +CVE-2022-49021,0,0,c13080553f6c3a29a539f0228afee28b33a32fbcd7514148f0639e4b5bcab60e,2024-10-23T15:12:34.673000 +CVE-2022-49022,0,0,375c2c1f5bbfb9be9e7fe5a0f98ed056cada3390d8b8188c759d343f8dc611ad,2024-10-23T15:12:34.673000 +CVE-2022-49023,0,0,886f28047e51b0d5cbd020df4cc655cdd458a7911b25cd4951f4b4242a4b892c,2024-10-23T15:12:34.673000 +CVE-2022-49024,0,0,c00893c59a165d1c170d9a317bfb43056081887f830fc21e0891bc4d8c47c79d,2024-10-23T15:12:34.673000 +CVE-2022-49025,0,0,91a35a24f6d258ae9c91b9eae293a385299b9bf04797f3ff4cd189ffe97b5beb,2024-10-23T15:12:34.673000 +CVE-2022-49026,0,0,9d023d745e62a45d98a366113e9be9e14ee982d178ba42d16b41e438d20cad55,2024-10-23T15:12:34.673000 +CVE-2022-49027,0,0,42fa0c700e5307e968a3969af2d092b0f75d1095174ef837ce5312d1711e198e,2024-10-23T15:12:34.673000 +CVE-2022-49028,0,0,feac20437bb7da1f124a8fd07fbdf5c8a01c1dfc3a8fe17089fe43ba3203fed8,2024-10-23T15:12:34.673000 +CVE-2022-49029,0,0,e9f2fdd5a911ae13fff2c73a1d3fa9d99016d5a0884f3d9f5ef330bccd743b65,2024-10-23T15:12:34.673000 CVE-2022-4903,0,0,cf9430f75554b10fc3063c2d4e895e2575b24650a7af1dc91ee51937fe80926d,2024-05-17T02:17:02.397000 -CVE-2022-49030,0,1,8b08791e22bd0db2cd2447524ac51c27e6a5d22f5626359a796fc03cac974990,2024-10-23T15:12:34.673000 -CVE-2022-49031,0,1,fda1b563d41f60673577f402073e67bd27d4683f91bb9eceb6214101f7e415a1,2024-10-23T15:12:34.673000 -CVE-2022-49032,0,1,075def20ae5c9133ccffd27b7227f76cca0accf4e692dd96d8ef8328dfaaa090,2024-10-23T15:12:34.673000 -CVE-2022-49033,0,1,f1525e73208fdc16ccb4e511516019213374c129e7ea61503d159b482ea92060,2024-10-23T15:12:34.673000 +CVE-2022-49030,0,0,8b08791e22bd0db2cd2447524ac51c27e6a5d22f5626359a796fc03cac974990,2024-10-23T15:12:34.673000 +CVE-2022-49031,0,0,fda1b563d41f60673577f402073e67bd27d4683f91bb9eceb6214101f7e415a1,2024-10-23T15:12:34.673000 +CVE-2022-49032,0,0,075def20ae5c9133ccffd27b7227f76cca0accf4e692dd96d8ef8328dfaaa090,2024-10-23T15:12:34.673000 +CVE-2022-49033,0,0,f1525e73208fdc16ccb4e511516019213374c129e7ea61503d159b482ea92060,2024-10-23T15:12:34.673000 CVE-2022-49037,0,0,d1881b67cff6ffd1cd4a44c62a3eeff49dad87129228607de02747a08dc9d03b,2024-10-08T16:08:55.390000 CVE-2022-49038,0,0,26bf80583e02462755629eb75d32d3c2894b1263d5b99e87b4bfae13ac56c00a,2024-10-08T16:08:35.743000 CVE-2022-49039,0,0,3fa8a10f3d81d2265a7106534dc05a400de9995334e02e08b86692ec188f1511,2024-10-08T16:08:08.507000 @@ -214692,7 +214692,7 @@ CVE-2023-20059,0,0,b99d0f72dcc000eb953ace65e13282c926b8d14b4c6816adcddee8cc0dd72 CVE-2023-2006,0,0,576ccd01f75cc25728924f4ed5e26d8b930bd4477bce9be56dd71bf07e1c6057,2023-08-25T15:23:55.877000 CVE-2023-20061,0,0,2ec24e7f0c8bcf98f0de0b7378a7de0b9009080959b3f6e60b70d985f8c0253b,2023-11-07T04:05:54.383000 CVE-2023-20062,0,0,74adefadccfa785110e4e05f634c8688933a1b2a514cb692712de49e45b87ba6,2023-11-07T04:05:54.797000 -CVE-2023-20063,0,0,eda6141716384bb1a4510e6303470d48cb2ee7f1e13df4ec5bb5a423ad3366b7,2024-01-25T17:15:28.157000 +CVE-2023-20063,0,1,ab9aa4a035ed2a1055c8eae268aa7b6b803ad113e479a4dca4e69fb32738c3a9,2024-10-23T17:15:13.320000 CVE-2023-20064,0,0,4fb6eea994847593a5691428054af43a79d6c56e373019f0486f9d00b0b02026,2023-11-07T04:05:55.203000 CVE-2023-20065,0,0,81430541a93df410494722673f12792a2634008c9260d929b5c39744df124b03,2024-01-25T17:15:28.263000 CVE-2023-20066,0,0,73655ff4f10fb72e4c703f3b9b74de3d4367fbe1790c14663ffdcd68bf01e548,2023-11-07T04:05:55.540000 @@ -215070,7 +215070,7 @@ CVE-2023-20673,0,0,affffacc533aba2532557f2de98bce06e1b80275a3e11547ad12ab6f33b2d CVE-2023-20674,0,0,9be4445dabd4c6d48c4f99bbee4861b6107ed4633c1e2064088a971b13de6bab,2023-04-12T19:40:21.857000 CVE-2023-20675,0,0,8686574aa3fe42a29190a79f2553f0d18fd42908a7c39129807f91238bf8013f,2023-04-12T19:41:02.040000 CVE-2023-20676,0,0,5cbc4ed001ded84befc11e7c5e3ef5d055fd73f8bee9ca479930898e22eec6fd,2023-04-12T19:41:16.217000 -CVE-2023-20677,0,1,6d0eebacb15538ea38741c0fe05c2823022dee23735339bc3fee8bd85b50e08f,2024-10-23T15:35:08.200000 +CVE-2023-20677,0,0,6d0eebacb15538ea38741c0fe05c2823022dee23735339bc3fee8bd85b50e08f,2024-10-23T15:35:08.200000 CVE-2023-20679,0,0,aee7d2a1e541be59a960cd8a54aca41d8c73bacb329512b283a720420e358619,2023-04-12T19:41:39.267000 CVE-2023-2068,0,0,fe831fe47f5d7751675b34e60b3c0abb0c83b794f1735576522318c3dfdec56f,2023-11-07T04:11:51.603000 CVE-2023-20680,0,0,6c0bcbaa503843604f20546a999dd257cb042167eb5cb47892a9e8493eee21e8,2023-04-12T19:42:24.927000 @@ -218995,7 +218995,7 @@ CVE-2023-25191,0,0,85db906bc04b5d6fc3bb6f91c549d5e5b7ee59e11d5b5bb8995020c923f11 CVE-2023-25192,0,0,408ab00a0fee17449a1dde61e3baf17726d13732731f80e617385e1174ac9859,2023-02-24T18:02:49.487000 CVE-2023-25193,0,0,bb13e9cc83390a370c88c7378b81fba62155a53b53b0c63c1f904971087b2319,2023-11-07T04:08:55.837000 CVE-2023-25194,0,0,627f7e679a8ddc56f21a88dfb8c6aecb60a2d17e15408a6ee303eea4dd09669d,2023-07-21T12:15:09.957000 -CVE-2023-25195,0,0,92e23926cb61a0252b0bc852fb20756e82a0fe6fd79cd697b14cf80eded22d7b,2023-11-07T04:08:56.857000 +CVE-2023-25195,0,1,a8806b01cd80fa4dd2e673896870ae2b778e6441ccc22f4a0c2ef09a93c3e2e5,2024-10-23T16:35:02.517000 CVE-2023-25196,0,0,b27797dea60d6f1ca75aaefa8c45cfe08f534c8a44f054fa68a519e6b580f255,2023-11-07T04:08:56.920000 CVE-2023-25197,0,0,36632fb9114380ab53315f939856a7cb749e1ad04cfdad6bf03eefa5abd06e25,2023-11-07T04:08:56.980000 CVE-2023-25199,0,0,d81c21d02b584034420981193f7edaddf04af66a9a34943af59142dee29ed9d2,2024-04-04T12:48:41.700000 @@ -219602,7 +219602,7 @@ CVE-2023-25952,0,0,463ec8e960958d9e12aae14faa2213415ac314b7ce1af5d976a9825591309 CVE-2023-25953,0,0,5abb1a478f3e66cc9afa5420123d11a3200a4e70c29330cde9432b4b3f700576,2023-05-30T22:18:54.947000 CVE-2023-25954,0,0,a22ef5203d50fc0480af4dc4db46497b5ccc4201f195b9b49e98a817b6f6f318,2023-04-21T17:54:46.243000 CVE-2023-25955,0,0,80d69d36b96029d7d809d5f273a6bc50c18c854c06dfff1234fe75f72986346f,2023-04-18T17:27:26.637000 -CVE-2023-25956,0,0,2c326cb9ddc98773a20a6fbc8ea1f8590f8c3d91294b9eae9b0b4bcb82a21372,2023-11-07T04:09:16.070000 +CVE-2023-25956,0,1,7cbec8d3007e3a7786f170ed42aca5b21d56e362307f600b262f49b4c63cff18,2024-10-23T17:35:01.983000 CVE-2023-25957,0,0,0ca1e6df774e8912df15e291f60f0dd14b565090b52716e56259ed009dc52219,2023-08-08T10:15:14.060000 CVE-2023-25958,0,0,aae7f1aa655cad32a978f018b3f1f52414803acae6045171f96d970d8d4025af,2023-05-19T18:33:11.257000 CVE-2023-2596,0,0,015265e2b8bad821041964cc8c18c77c829d110dea5f84cd58ae34ff26d6006d,2024-05-17T02:23:04.757000 @@ -219846,7 +219846,7 @@ CVE-2023-26265,0,0,a5a96bf4a479000dcaf17d180456468d1f58e3b8cfc40b1cb5ae0d097e5bf CVE-2023-26266,0,0,48db5ce845c1a283a9e2d6356dbc1b316f83bb3f1c498b5aaf283d61acad5b0c,2024-08-27T19:40:05.087000 CVE-2023-26267,0,0,4ee62ec08f811c303cf14885467b575d838f218d3495de5ceccf08eb40bc5c42,2023-03-02T16:01:23.653000 CVE-2023-26268,0,0,acba0f9f3727dac791768c3b96e68b01dd35481cb8eeba7a893714f55c71e756,2023-05-10T16:08:34.207000 -CVE-2023-26269,0,1,6134a35a3f21701cf58b5b56f762d321446deb0c2a25160fbd0a26b8cf05970b,2024-10-23T15:35:10.417000 +CVE-2023-26269,0,0,6134a35a3f21701cf58b5b56f762d321446deb0c2a25160fbd0a26b8cf05970b,2024-10-23T15:35:10.417000 CVE-2023-2627,0,0,4fb4aa107c37922d01e99c08864a3afc15dca464855f60f61291bf654eac3242,2023-11-07T04:12:59.243000 CVE-2023-26270,0,0,295826a23efaae3e03ca3b4c009c12b0316d0a2482856b224f82f4e081806be1,2023-08-29T05:02:40.407000 CVE-2023-26271,0,0,28c743460f4df6973ed5b291ceeef0df5dee2faa56d66a7e924f7f89ee784f21,2023-08-29T05:04:27.877000 @@ -220045,7 +220045,7 @@ CVE-2023-26460,0,0,09bcce303e158ae83d1cec712076aaab9640ff1eeb2f35c534cde3cb3bc0a CVE-2023-26461,0,0,1be0a9324f43155f2bc84f4b47acd382de189386f8c26789ea0fc9d0dba2ef61,2023-04-11T21:15:21.523000 CVE-2023-26462,0,0,2cf2f1856afdd0ec18a1efa4bdd036897dfc66a127a8884fc6db1913a4dbd3c2,2023-08-29T20:18:02.617000 CVE-2023-26463,0,0,f42b00e49c23551a5e7f8c420dd115c4bfcd030b1ba9301912753c51c391eba5,2023-05-17T20:15:09.867000 -CVE-2023-26464,0,0,c3a10ced116a9686fc0e8eb1a02ea9d8b3071beb79a217b6f7b66797540797f5,2023-05-05T20:15:10.253000 +CVE-2023-26464,0,1,e3fb2c4b488f34926b4726d6a9388d77f363c6411723dd94fbd4b633dac9b84e,2024-10-23T17:35:02.213000 CVE-2023-26465,0,0,b1026679d3f1fd253202bc23565c0be069807ba2b2d1db930af089cd44f34373,2023-06-16T03:45:07.707000 CVE-2023-26466,0,0,c62f799fb6efefc9c0895a060aab3bb858acc96d0dd9ee89e9e9aa43e06b014f,2023-04-14T22:48:29.043000 CVE-2023-26467,0,0,c4a14535c41306a19a06219c1d340a2974d1f8aa6b01ef56dac17132a33d1407,2023-04-21T15:50:56.567000 @@ -220553,7 +220553,7 @@ CVE-2023-27292,0,0,4b71dae87596b4225f5f80cb93749df5f440f54ccd36705b374d9d1a03a1d CVE-2023-27293,0,0,22bf65abc3378a579cff7f5d98aa48c50981bcf4420ad0fbf693ea2aba4268df,2023-03-09T23:57:51.313000 CVE-2023-27294,0,0,77fa6c3837d4dc373bd3a6be9aa46cb2ef8cacbae5d14d5be618c3e50d4abae3,2023-03-10T00:10:31.677000 CVE-2023-27295,0,0,2b35ba9c23ec3dc889df00063b1455884aad22232738faa01bb0bf18541951d3,2023-03-04T04:02:33.297000 -CVE-2023-27296,0,0,65e6521a95e84cdf103e2a85baf1c64de8cc6d432144f2229f3d951a61ea39ca,2023-11-07T04:09:53.790000 +CVE-2023-27296,0,1,ac526d965cc9c628083bee965fb00658a7cd5ea35aeceefe70ab20d36985c2a5,2024-10-23T17:35:02.430000 CVE-2023-27298,0,0,8bddc45578699197351b23ab0fdfb8ded3b03ac7d83cd4217eac4097302905ee,2023-11-07T04:09:53.857000 CVE-2023-2730,0,0,dd1d0188c4d0b52d9edc97402eec83c6293a8bdf8db32c0db8927e99022b2050,2023-05-22T17:20:52.117000 CVE-2023-27300,0,0,99f876ece91964344f0eebd6d8c2cb263e6e1b21447c6d7d46fcd9bc2f97ebc6,2024-10-10T21:25:40.267000 @@ -220783,7 +220783,7 @@ CVE-2023-27519,0,0,a391ebab6444406e7a3b8b418ece9eed27e3ed5b38569a1f2acc3c7e30c15 CVE-2023-2752,0,0,70c18716b0ce17d99cdd18556a1bb6fc4f3b8c301b80b04f13ae0f7949ffb99a,2023-05-24T15:18:32.437000 CVE-2023-27520,0,0,88918e8309839a6b2865808731f25e8498979e76ae5bf152ea538c4d760e6f7d,2023-08-24T13:33:15.207000 CVE-2023-27521,0,0,c3df7ba417ea69981a00d0cb4344f4b4fa7ad8cd4322b50b49e89e02b97e4d6c,2023-05-30T15:40:34.467000 -CVE-2023-27522,0,0,ccf833d5be63bfb9cebbb4e4817a3ff00442fd9a71cb5866135ddc71833fb9a4,2023-09-08T22:15:10.817000 +CVE-2023-27522,0,1,dd8d83015b05e5fd11015771b9afe5322debc065b0fc4b5cddee23f7b97b302e,2024-10-23T17:35:02.630000 CVE-2023-27523,0,0,54a991d48921934c3a11334d86af3c71d0bb746326f91a9928585be9374afa20,2023-09-11T13:46:08.797000 CVE-2023-27524,0,0,9481033c2b05e6b4fc5490841b164d05ee8c3ac345de5a070de0a8b4f8a5800f,2024-06-10T16:22:22.223000 CVE-2023-27525,0,0,7c240a2f08571daddd8713ec5aa1af9fc0e566fe02bb68bc2d7ea66a936e76a1,2023-04-27T19:54:20.913000 @@ -221477,7 +221477,7 @@ CVE-2023-28322,0,0,e6f8a76dbfdaa1843cff4928586c0e102202ae87109018408c12011fd0e73 CVE-2023-28323,0,0,45a7580f5caaf370f52fa79201231573e457be28510d4650ecf80ae2fe96b361,2023-07-10T15:55:23.607000 CVE-2023-28324,0,0,9aea6ad31e5715b0a7ecba6b2b0f7468ba0870be2dca0f7bc052bb6544030f3e,2024-09-25T13:35:00.443000 CVE-2023-28325,0,0,4fd6e0b0b7c505c2fd43504d4b63a966dc708437fb5467ce1e281a243ba9f9bf,2023-05-22T14:29:00.840000 -CVE-2023-28326,0,0,0c7b7956b8940c0928a48d68076b8f428679c68ea4c7d44789f578c2e29f73c0,2023-11-07T04:10:28.880000 +CVE-2023-28326,0,1,a35bf3ccc9f67bc30f35b153c5d63934f968a1f7a9dac978ba51db6caba9e811,2024-10-23T16:35:03.653000 CVE-2023-28327,0,0,b6f0484e5b7bfca56361e43c7bf8608f46ecfd24e3583be1082bf3cc2207865b,2023-04-29T03:12:41.973000 CVE-2023-28328,0,0,6eb97773227e91e84c59492ab717b39c114153827c4b434985b4820421f15e17,2023-05-03T14:15:33.387000 CVE-2023-28329,0,0,14bd1237be8c834d2b6903d2022400762656c030012fd364a4d4901ffcc904ce,2024-07-03T01:39:49.640000 @@ -221855,7 +221855,7 @@ CVE-2023-28703,0,0,0f0cebf3a82254d0f256f8ee7ad05786e89f280679305fc77b9a10a202724 CVE-2023-28704,0,0,0ea96abeac4099eb6f8aeff445b717c3ff853eb5b66e71b0c3097300ad8383c5,2024-10-14T04:15:04.400000 CVE-2023-28705,0,0,875ee5eeedcbaf87184e53272462439379c1e8baf901ebbbb714e99fd79f0ba9,2023-06-09T18:14:13.487000 CVE-2023-28706,0,0,50e6020734b1331e0a1f6818c44fa8ed0422882143ec83bad7c87bb811eda5e9,2024-10-22T16:35:10.210000 -CVE-2023-28707,0,1,f40a2ff5e66594df42d634a3d6168c2c06b168e74d7ebca3a2ead6ed438e5a5a,2024-10-23T15:35:10.927000 +CVE-2023-28707,0,0,f40a2ff5e66594df42d634a3d6168c2c06b168e74d7ebca3a2ead6ed438e5a5a,2024-10-23T15:35:10.927000 CVE-2023-28708,0,0,3676b37bd572d293623b1d4d6062d80511a32f4ec94735432036b13d40cac96c,2023-11-07T04:10:49.370000 CVE-2023-28709,0,0,4a374603268a75183fc4d8867975e646438b75b17cc4c5fec221f049409c16f9,2024-02-16T18:20:07.610000 CVE-2023-2871,0,0,c547a7e85685136989871db883e9d8714fc66f889d110c2bfa95d6061d7e85d5,2024-05-17T02:23:19.727000 @@ -222051,7 +222051,7 @@ CVE-2023-28931,0,0,cebc1ae4abad705bd1597c946be8385381dab3e8c8b806c79b20dc3e1e12e CVE-2023-28932,0,0,c27edb7177ffb1e28b222f4c9bea001b1ab4e7dabfe7ec30c9d9613d07224d94,2023-05-16T21:23:45.097000 CVE-2023-28933,0,0,5ce46109e79bea8882816ddff82fb199f9ef887c387f06ca945e17126aa66f4e,2023-06-16T03:57:30.010000 CVE-2023-28934,0,0,4eab8436dac264b2200990ccb31618c962abf371fe7021d35f56b20df7a84412,2023-08-10T03:49:58.650000 -CVE-2023-28935,0,1,29a6ac02bfd73cba8d479a2587c32eca5134447dbcf58b68dae5f8800563a3c7,2024-10-23T15:35:11.167000 +CVE-2023-28935,0,0,29a6ac02bfd73cba8d479a2587c32eca5134447dbcf58b68dae5f8800563a3c7,2024-10-23T15:35:11.167000 CVE-2023-28936,0,0,999ac9569f4890af2f8cee442eed571b392d2129167cc54e6520c79e6509ca4b,2024-10-11T21:35:47.317000 CVE-2023-28937,0,0,49df2c40f793aeab1c1d58cb1954b3d606331d90ad9ced192296130e2c071e4d,2023-06-13T10:15:10.047000 CVE-2023-28938,0,0,92210f1f66544f8435cbf427094b0b1ab5ebdd85d822693044e20f1239f1b230,2023-11-07T04:10:58.907000 @@ -224611,7 +224611,7 @@ CVE-2023-32414,0,0,fa6525bb7681c459cfe2e33a6ea7cf815e79ab0e62287a71a94539dde9ede CVE-2023-32415,0,0,96fa6eae8f221b9a47a59ca4cc9351dc0fa58ca6ba14b14a15a5171433a1b47f,2023-07-27T04:15:35.437000 CVE-2023-32416,0,0,1a8e3b833f50b96b700f5f81732ab547e243a4c27b5f823ddd2ff9401c65654f,2023-08-01T19:33:14.997000 CVE-2023-32417,0,0,04ec232bce9741055ca69819059af5b7140710ba2d9767584d63e128e1cad6da,2023-09-06T08:15:43.720000 -CVE-2023-32418,0,1,a38d997bb881cacc97126bc5819582142f57b1cec9acd3ac92e393cda146f1d7,2024-10-23T14:35:07.963000 +CVE-2023-32418,0,0,a38d997bb881cacc97126bc5819582142f57b1cec9acd3ac92e393cda146f1d7,2024-10-23T14:35:07.963000 CVE-2023-32419,0,0,6296553ba91c9725c627256011708d68cad49a3746bc10be80ee459f89ebeaa5,2023-07-27T04:15:36.913000 CVE-2023-3242,0,0,d7affedfb69954780396c3429a656a47fdced696ab2dd3f46b339a768bebd028,2024-05-27T08:15:08.863000 CVE-2023-32420,0,0,d567dafb9d7301282afcbb0069471d86449f9b82e4e4758e9161816afa0a4d04,2023-07-27T04:15:37.297000 @@ -225679,7 +225679,7 @@ CVE-2023-33741,0,0,d03d65bb59627ecf26b98087902f2763f51ae7c70e2636b43306517b6cca6 CVE-2023-33742,0,0,6485a5013edc9e09d658fca1f3088f75e18d8c77dc48a442e117991c6544d7ab,2023-08-03T14:00:39.710000 CVE-2023-33743,0,0,beb1b1276fa767cb5b209990f5c92ad44058e106fed322586e67c35d8893398c,2023-08-03T14:01:07.043000 CVE-2023-33744,0,0,accbaa15b4efd4214e2e8c5fd26f92959d98fbad1a13180ecec22a567c1abf63,2023-08-03T14:01:25.300000 -CVE-2023-33745,0,1,4837802ec2efeb13f3b08f74d2ae9e9b5b4db1bb71dadb95dcd26413bb12f639,2024-10-23T15:35:12.013000 +CVE-2023-33745,0,0,4837802ec2efeb13f3b08f74d2ae9e9b5b4db1bb71dadb95dcd26413bb12f639,2024-10-23T15:35:12.013000 CVE-2023-33747,0,0,fe3dfa695643204bca06b77658062f64e4d2a377c0c028c88f0feec46b613851,2023-06-12T16:59:41.887000 CVE-2023-3375,0,0,442ec51f6cbe0d0d89e0d22483f6ffb1a7729d6080ae906cca355f6418781daa,2023-11-02T01:45:00.120000 CVE-2023-33750,0,0,4872e4d9b899a3b702af8eef463bb588860c07eb3ad9706f52b3de9904c6da7e,2023-05-31T13:59:37.380000 @@ -229138,7 +229138,7 @@ CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f83 CVE-2023-38408,0,0,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000 CVE-2023-38409,0,0,838e08b6ac7468e45b0e0743452ec8eac55d08ae6cebd5146f7b96ce40e80d8e,2023-07-27T03:49:09.943000 CVE-2023-3841,0,0,d2f5ee23f09965afeb5d36623db7f402f898f5d6074e3d1a8c3e15639396c726,2024-05-17T02:27:52.550000 -CVE-2023-38410,0,1,6c048eb455397479418bb47030b11f6e590486d07d435d761a9e48d83acfb861,2024-10-23T15:35:13.280000 +CVE-2023-38410,0,0,6c048eb455397479418bb47030b11f6e590486d07d435d761a9e48d83acfb861,2024-10-23T15:35:13.280000 CVE-2023-38411,0,0,878de725f745853626d009447a072e4f76f5e67940f796a7c936cf666df69e06,2023-11-21T18:44:14.920000 CVE-2023-38412,0,0,df0002f82b102587c36ce4bd4dcaf5471240c902dec1e7d84fcc0e875e6105c4,2023-08-09T18:02:31.297000 CVE-2023-38417,0,0,583658d5bba65e8993776b94ca73c204115dabb313a5d853d66ca313b1a68943,2024-05-17T18:36:31.297000 @@ -230501,14 +230501,14 @@ CVE-2023-40150,0,0,773192d4bcd37aa399744bee15f3fadad298ede88c91b4752c2dd3564a1d3 CVE-2023-40151,0,0,3d0f6c1c57a0aac699bed2599ed1fedb8fc6cf053d7b8ad9097726b21da7eb53,2023-11-29T17:28:12.413000 CVE-2023-40152,0,0,dcacc5b44050cb59d212435fbba4b589e052e87e87f7f380cddbb6affa05eb08,2023-11-30T17:28:53.117000 CVE-2023-40153,0,0,68082b8d0b1cd673ce13fc831779593073884ad14dff8278795b2977ab85be34,2023-10-25T13:39:43.797000 -CVE-2023-40154,0,1,0c21ee8c4fe867d7637a5b5eae7ca984d29457115dd9276ce93b2b7de45045a8,2024-10-23T14:07:44.730000 +CVE-2023-40154,0,0,0c21ee8c4fe867d7637a5b5eae7ca984d29457115dd9276ce93b2b7de45045a8,2024-10-23T14:07:44.730000 CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000 CVE-2023-40158,0,0,f5c33dd671eaea6944f90c9c2dcc1f233b63eb3f3d167e9fce8fa1f154c769a3,2024-10-11T22:35:00.770000 CVE-2023-40159,0,0,f23653787b2c8d1c7ab49dff62eab2cb6aa12e31e549c1c4d79a1506883bf305,2024-09-05T20:41:09.723000 CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000 CVE-2023-40160,0,0,de8c32a875ccf6f89392dafa209d66eda2b9b820e48facccb8082fc450366841,2024-03-18T01:53:02.353000 -CVE-2023-40161,0,1,bfefc6bca59c3bdd335a902ec0f86c7481186e139782caa90012e0df1fd7de97,2024-10-23T15:39:39.910000 +CVE-2023-40161,0,0,bfefc6bca59c3bdd335a902ec0f86c7481186e139782caa90012e0df1fd7de97,2024-10-23T15:39:39.910000 CVE-2023-40163,0,0,a1d4f004ccc01bbcc21d67692937b814d051c9d1fb07226eb632321baf4161a6,2023-09-25T18:46:35.360000 CVE-2023-40164,0,0,e1710c55401fbfdfd3997c2f9c7ef468d49e2cc76ffd081700ba8a98b5b4edc0,2023-08-31T17:33:09.500000 CVE-2023-40165,0,0,7d78c7e3b5d175b99b5f1acc7ea6fa32c99fab50f6128a450f7da006b5e3a8ad,2023-08-24T20:50:00.990000 @@ -231254,7 +231254,7 @@ CVE-2023-41086,0,0,724cf5c12c1eb7fc440cb764ba907bebb79c6f0371ce0a8b6c0e30c8bd6f0 CVE-2023-41088,0,0,49329b5d67d4cd3940fce7a9adab0d791c43fb70872ff5ce3deb4e26e23e1a13,2023-10-25T13:39:31.207000 CVE-2023-41089,0,0,330c83575a9976e5107ccd3bae1c646ffa2e4fef50c0897f1ccd9bee7e5907f8,2023-10-25T13:38:19.127000 CVE-2023-4109,0,0,8baa8250e57f9070f1588ee57a6aaa5e217a410144b639ec04878717d28bc67a,2023-11-07T04:22:05.817000 -CVE-2023-41090,0,1,854b0d414b7b6c0e11cc9e6219a438b183a76dbd03346da869904dfb3e0d1bf5,2024-10-23T15:36:17.703000 +CVE-2023-41090,0,0,854b0d414b7b6c0e11cc9e6219a438b183a76dbd03346da869904dfb3e0d1bf5,2024-10-23T15:36:17.703000 CVE-2023-41091,0,0,ca1acbfbb48698a0030abb208f0760a15256e3fda004078e03e1a216b077f0fa,2024-02-14T15:01:46.050000 CVE-2023-41092,0,0,4e8e931d3ededed79b2045da3cc968b68e4b0145dbe88e1d7c336f100fc82182,2024-05-17T18:36:05.263000 CVE-2023-41093,0,0,e2ec8ffe14945965701d15ef17979727c54dc987034806d91272b18047967a11,2024-09-10T16:19:41.973000 @@ -234741,7 +234741,7 @@ CVE-2023-46179,0,0,7df6f632e5ebdfe2ac0791e3008fa37e3348cf878b1be369c5905228f1b85 CVE-2023-46181,0,0,038edae82fd3b29b4665e2dd7a541552b57d69c4eb93e555d2c27521b1d1606f,2024-03-19T17:31:14.200000 CVE-2023-46182,0,0,a131684040f99aabdb48e021ffb20262c419eaec6603cd7cc3b87ba980f4037d,2024-03-19T17:27:44.057000 CVE-2023-46183,0,0,b55245b3556ad42e6bcac7893abcb8f941685faf078fa0291da58ea3bd448492,2024-02-15T14:21:14.870000 -CVE-2023-46186,0,1,7f936d2f68468cf73e1affeac13507832eba4f5b3da2c17a088195f829e5ac5c,2024-10-23T15:43:32.647000 +CVE-2023-46186,0,0,7f936d2f68468cf73e1affeac13507832eba4f5b3da2c17a088195f829e5ac5c,2024-10-23T15:43:32.647000 CVE-2023-46189,0,0,6494194b53848ef556f9ddb4369bb9959100a07b09ff8d867e6845bf7828d5f7,2023-11-01T17:00:55.353000 CVE-2023-46190,0,0,cc76a6da5e2fc44203b9aab6dcf5cc888a32032806269f07a5da7c62a6bb3b63,2023-11-01T17:05:29.030000 CVE-2023-46191,0,0,fd069b670a5c6976b6cb0486e6e32e8b75ff367f0c7123be83f0564f3abfe920,2023-11-01T17:41:06.707000 @@ -237719,7 +237719,7 @@ CVE-2023-50306,0,0,4f1d3b091421856e56dbbaaa9ee4678a885aa3ffdce75c9d83e590ccb0be3 CVE-2023-50307,0,0,ea0b023cdac8ed9cf01745c0fa57889642f00eb899be12d40ee0b2d23a79439b,2024-04-12T12:43:57.400000 CVE-2023-50308,0,0,88cf45fc4dfce771184291626ea0bb427caba5d11fd1214d84bc00f3ae89061f,2024-03-07T17:15:11.473000 CVE-2023-5031,0,0,04bef1332046fe66f966e350e278e31343a5f3babd618b80f6a69200c058ebc1,2024-05-17T02:32:47.910000 -CVE-2023-50310,0,1,a06e937bdb97f52f1a36b7dc4dcac9085491c4cd68dbc30f643d5c64cd0d68ba,2024-10-23T15:12:34.673000 +CVE-2023-50310,0,0,a06e937bdb97f52f1a36b7dc4dcac9085491c4cd68dbc30f643d5c64cd0d68ba,2024-10-23T15:12:34.673000 CVE-2023-50311,0,0,790ed7dc3382e6e4bbd385f74753a917a8942a525c8d1570018413938ec95ac4,2024-10-23T11:15:12.873000 CVE-2023-50312,0,0,2bad74315adc5a15838005e613036a33cb3767df680b81a37071695206496d89,2024-03-01T14:04:26.010000 CVE-2023-50313,0,0,0ff1dc09ff0045844fa80710a45c5539f6e888446fbdc5db21cb236b97018b79,2024-04-08T22:48:41.757000 @@ -238224,7 +238224,7 @@ CVE-2023-5121,0,0,46287db8a217d3d5ab4deb4dee376afdccc5bbf3df6e7937e02f24621bb626 CVE-2023-51210,0,0,408d109f353125fcbc9e4024f5c91829754158e94898530652d1462aff8aabd9,2024-01-29T19:38:28.213000 CVE-2023-51217,0,0,804003af226f05ce2da0aae9a1b2b53a296e5ba5852a1145267b45b6e8b01d07,2024-01-26T14:40:49.700000 CVE-2023-51219,0,0,224214ec43f7edf7652e340261967af4873d7012cd198464ea752949f8fc6847,2024-06-25T20:15:11.020000 -CVE-2023-5122,0,1,fe76f2610a8efa1fcfd693c92d5281a39b05e8b633407f90e66c7dcbc7e04923,2024-10-23T15:50:43.897000 +CVE-2023-5122,0,0,fe76f2610a8efa1fcfd693c92d5281a39b05e8b633407f90e66c7dcbc7e04923,2024-10-23T15:50:43.897000 CVE-2023-5123,0,0,cca3c3f4fbb21f5c6a6d6265e33aa2e87141d3923657e91283715ae631af137b,2024-06-18T10:15:09.937000 CVE-2023-5124,0,0,0483628dd0304bc2218edc0adec9562db891718cb630f07e9b08db9d21711017,2024-02-05T16:48:58.247000 CVE-2023-51246,0,0,c5deb4836b81108d26041aec440adcac0a21f3ce584950acde90a7aa10cb1e96,2024-01-12T16:31:28.787000 @@ -238824,12 +238824,12 @@ CVE-2023-52093,0,0,e5c1a7d2899634e3dd74877448ad2935c810be4b7cfdaa86d6e3986efd5b9 CVE-2023-52094,0,0,4fe35d686e9aaa16917fcb4e8908de19501ec3c5e058a7dadbf997f9265ab5a9,2024-01-30T17:37:53.377000 CVE-2023-52096,0,0,3cd682d37ba49f631e741015a80f522eb53ddb54c07bc448922d28093bd106ba,2024-01-04T03:38:49.740000 CVE-2023-52097,0,0,9cf324ea5c75bb0be2decd65d2aa19c1775b4f9769bf145c7f2d8323de59cc16,2024-02-20T19:50:53.960000 -CVE-2023-52098,0,0,de4a2bb4c902451cf6e721b9ecc172f64fd3e6a5582650446c91686632604773,2024-01-19T19:12:13.717000 +CVE-2023-52098,0,1,f9442dba6c2846d8e7393dfe00ce50b8971e81576d24e3dc9687ebb2827a1487,2024-10-23T16:35:05.387000 CVE-2023-52099,0,0,bfc9bdb68b0c7e52d9873971478dde8043179287a290b1bd09e3860d962c8154,2024-01-19T18:49:15.680000 CVE-2023-5210,0,0,e89d379a123909cad07e8ff7fc6db33d4ca483dfc688b56aafd4c18e04eafc1a,2023-12-07T20:19:07.767000 CVE-2023-52100,0,0,b6faf61b52a98fa8dbb7a75d5211da9571935ad01301b317833f2f39d7d429cf,2024-01-19T19:19:43.283000 CVE-2023-52101,0,0,3c9ff6a037b24ee13732ed793e4e2445283898e3d6528f27e79396841748398a,2024-01-19T19:29:35.453000 -CVE-2023-52102,0,0,56d96f80f7a616015abfd0c89b86c846d05ab3920ecd70af77dd2284e6faa7c3,2024-01-19T19:30:49.283000 +CVE-2023-52102,0,1,f4a47ae73fb72cdf024cc543d0248b657487918ac0d4c86190121e03d4e2e033,2024-10-23T16:35:06.720000 CVE-2023-52103,0,0,3f7edfcad72344ac9f16b265ed4d2f9946bebd5ea8149345431fb35863c0e6ca,2024-08-29T20:35:45.027000 CVE-2023-52104,0,0,f049ca940874eb58ba54cef68934d63a04e4b3378dc9ae1bb4954f25a44ee8d5,2024-01-19T19:45:11.830000 CVE-2023-52105,0,0,7fca37ca631a27b8dc8fe3b9940e54b91efedf447c5fd0587d260b590112a217,2024-08-27T16:35:04.960000 @@ -239622,8 +239622,8 @@ CVE-2023-52914,0,0,3e2f63e6fcc2429a7a056b2f17033ece733c3917a2a011b1363b92bf8c84e CVE-2023-52915,0,0,ce3c89a4bf7cab80e859d29c06c18dc19c9bdeb973ab832dffae6eeb3861fdf4,2024-09-10T17:12:41.607000 CVE-2023-52916,0,0,bebcac5d0a36cd875bff11f8b42fd7bc5076a3c1c94e9b8c44be74509c12a53b,2024-09-06T12:08:04.550000 CVE-2023-52917,0,0,fadae4ec5e5aee737480721d0991bf811403c3e8c62826f0e019ee2079cb11e4,2024-10-21T17:09:45.417000 -CVE-2023-52918,0,1,74e5b6d470115d5c7c46eee1c8402d2d07b899f7917593c4bd37bfc869efab98,2024-10-23T15:12:34.673000 -CVE-2023-52919,0,1,2044b462f20869d97200941fa3130944522a0590324b18030f1d24ff105039aa,2024-10-23T15:12:34.673000 +CVE-2023-52918,0,0,74e5b6d470115d5c7c46eee1c8402d2d07b899f7917593c4bd37bfc869efab98,2024-10-23T15:12:34.673000 +CVE-2023-52919,0,0,2044b462f20869d97200941fa3130944522a0590324b18030f1d24ff105039aa,2024-10-23T15:12:34.673000 CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 @@ -242318,8 +242318,8 @@ CVE-2024-0997,0,0,40cbe7d07647cf304a8bc3bc11787b58a8f50582e3e8b65316a7ae7fa59c2b CVE-2024-0998,0,0,f7933578d5dbeb3f77563ebf1f5420d4cf36180b38c1c7cf760eedcdac974d39,2024-05-17T02:35:08.490000 CVE-2024-0999,0,0,84034800a287889c8e66f3ba01c1d930a06538aadfe1b375cfd8893390aed6f7,2024-05-17T02:35:08.593000 CVE-2024-1000,0,0,60c836cbd4d96144c97b06caa16452d33dc82172b5cc2c653a7406010f53b5df,2024-05-17T02:35:08.790000 -CVE-2024-10002,0,1,5edc9992c96bddffc59b658ba4018e947312c70ae5ecd37f00776e6aca84fcbd,2024-10-23T15:12:34.673000 -CVE-2024-10003,0,1,7ac769c9b6f213d999f9907a6b5f6a438cde86170274ef0088cef2f9496da509,2024-10-23T15:12:34.673000 +CVE-2024-10002,0,0,5edc9992c96bddffc59b658ba4018e947312c70ae5ecd37f00776e6aca84fcbd,2024-10-23T15:12:34.673000 +CVE-2024-10003,0,0,7ac769c9b6f213d999f9907a6b5f6a438cde86170274ef0088cef2f9496da509,2024-10-23T15:12:34.673000 CVE-2024-10004,0,0,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530ed3,2024-10-16T20:35:08.850000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10014,0,0,1395463dc1e29fd6db71d83f72260a8cd3462c205364f301260cc7f7b129af31,2024-10-18T12:52:33.507000 @@ -242334,8 +242334,8 @@ CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3f CVE-2024-10033,0,0,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524766,2024-10-18T12:53:04.627000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 -CVE-2024-10041,1,1,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 -CVE-2024-10045,0,1,df53331c9b7607363b5960cd2fb00b418f72be4924f4b02eb17d04eadab916e2,2024-10-23T15:12:34.673000 +CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 +CVE-2024-10045,0,0,df53331c9b7607363b5960cd2fb00b418f72be4924f4b02eb17d04eadab916e2,2024-10-23T15:12:34.673000 CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 CVE-2024-10055,0,0,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000 @@ -242367,7 +242367,7 @@ CVE-2024-10120,0,0,c466bf566e1f967eaf89709a18be2244947274563a08f6d81f9be121740d5 CVE-2024-10121,0,0,027182529cfee940508ffb4070951b9c88b4b8cda22059e126804038d2c848e4,2024-10-21T17:10:22.857000 CVE-2024-10122,0,0,153862f3f9eb72281b1c72dbca34e4eb5ada0e8c96788af32355e9b86fecda30,2024-10-21T17:10:22.857000 CVE-2024-10123,0,0,325a6a57a5064913151c5985ffe615d4882dfebfa3dba79aced7ca6e42d126e2,2024-10-21T17:10:22.857000 -CVE-2024-10125,0,1,f4c120fab70482ccb83c9dab18998f050be65f8640635deee9e5476e3051b2ad,2024-10-23T15:12:34.673000 +CVE-2024-10125,0,0,f4c120fab70482ccb83c9dab18998f050be65f8640635deee9e5476e3051b2ad,2024-10-23T15:12:34.673000 CVE-2024-10128,0,0,88b9e310a7215917b3c3eb4a7cebbad5131b0eb240c8e3b152a59db372aef3f9,2024-10-21T17:10:22.857000 CVE-2024-10129,0,0,ec801a1f21eba257d935123cd915f870568d53f742fe5aad47c455a4df207feb,2024-10-21T17:10:22.857000 CVE-2024-1013,0,0,0ecf415fc1e3c9674ce36da20d6e67872f02747822a72b780ad0899083ff5765,2024-03-18T12:38:25.490000 @@ -242400,22 +242400,22 @@ CVE-2024-10163,0,0,26289a38ca28d6fbf3697cebc7b8e78d717fbaa250d69c3062759b06a1925 CVE-2024-10165,0,0,5e96b8bac045d76007a8a1ccaf66b23094bbe577806718f5c39b95850bfcb648,2024-10-21T21:35:06.987000 CVE-2024-10166,0,0,d38e0eaedffd343f532bd4c1abf13dec4f7eece79809104c00c35d23c5bd77f6,2024-10-21T21:34:52.430000 CVE-2024-10167,0,0,e7ee4350c0d87b98f4009c350ce488d1222a8473f5eed0163be4fcf02375526f,2024-10-21T21:34:25.810000 -CVE-2024-10169,0,1,1db0b82161d097e04e0d9142501d34c98067446995af0ad4d8dda4cff4f3006d,2024-10-23T15:01:58.987000 +CVE-2024-10169,0,0,1db0b82161d097e04e0d9142501d34c98067446995af0ad4d8dda4cff4f3006d,2024-10-23T15:01:58.987000 CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc058119760,2024-05-17T02:35:10.627000 CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289e84,2024-10-21T21:33:49.663000 CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000 CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 -CVE-2024-10183,0,1,120f83031d6b056b9464662cc23a397a8370d5b6b85b4ebf16896e12042e7ae6,2024-10-23T15:12:34.673000 -CVE-2024-10189,0,1,c7e7e9c9433451acc4ead77e2398a65c092c06680c0a336db7286291fd8ac494,2024-10-23T15:12:34.673000 +CVE-2024-10183,0,0,120f83031d6b056b9464662cc23a397a8370d5b6b85b4ebf16896e12042e7ae6,2024-10-23T15:12:34.673000 +CVE-2024-10189,0,0,c7e7e9c9433451acc4ead77e2398a65c092c06680c0a336db7286291fd8ac494,2024-10-23T15:12:34.673000 CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000 CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000 CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000 -CVE-2024-10193,0,0,1edc42ac3209c75585ec8c6b26eafba6b0b9f2d61f9e6b3760f20c0ded29aa99,2024-10-21T17:09:45.417000 -CVE-2024-10194,0,0,2306506683b8321312c529c12d5538fdae946fec3d958eb6a86af3539ec3be4d,2024-10-21T17:09:45.417000 +CVE-2024-10193,0,1,b44a42fd354bbacf77f6767c189a0eddd1a8f11ea5e00dc8bb5624fa68c91f85,2024-10-23T16:16:11.837000 +CVE-2024-10194,0,1,beb4695ee0759be44b5390e88d9177fecdddb4f13d71de2f923c2908ef946665,2024-10-23T16:16:49.703000 CVE-2024-10195,0,0,433002dc4be76148bf0f1e8e85e5de7bd9f18de30e21fefcd1f30061067a4930,2024-10-21T17:09:45.417000 -CVE-2024-10196,0,1,90b9a4c8c1bbc9cc12d3c54632ebd3a76326bf6f32219a9f3d2039a7242e607d,2024-10-23T14:15:16.843000 -CVE-2024-10197,0,1,7718b3c8726b69a6cc1d39e0b2a3a9b59c3c49ee29e6d3bc5c07a1b64761daac,2024-10-23T14:14:52.420000 +CVE-2024-10196,0,0,90b9a4c8c1bbc9cc12d3c54632ebd3a76326bf6f32219a9f3d2039a7242e607d,2024-10-23T14:15:16.843000 +CVE-2024-10197,0,0,7718b3c8726b69a6cc1d39e0b2a3a9b59c3c49ee29e6d3bc5c07a1b64761daac,2024-10-23T14:14:52.420000 CVE-2024-10198,0,0,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000 CVE-2024-10199,0,0,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000 CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000 @@ -242424,30 +242424,34 @@ CVE-2024-10201,0,0,fdd706f65f7aa0e194f575c5a7304653f1f8e37bb0097e52a009edadbfcb9 CVE-2024-10202,0,0,3a01bc3efcbe4e17c6fdc2e9102f4cbe8dd4afeaccd594b0d2eceea29302f820,2024-10-21T17:09:45.417000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 -CVE-2024-10229,0,1,3c4fb9ca956b215d6891f05cec1bb6664ae35049ccd9a8e1dad507ca063ff01a,2024-10-23T15:12:34.673000 +CVE-2024-10229,0,0,3c4fb9ca956b215d6891f05cec1bb6664ae35049ccd9a8e1dad507ca063ff01a,2024-10-23T15:12:34.673000 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 -CVE-2024-10230,0,1,071efdf8dbe6f43ad8bdfc5cb0324a8f9b14590d6803d3d3f568746922ac2f52,2024-10-23T15:12:34.673000 -CVE-2024-10231,0,1,c15e7dbf37700d38c3e757762d5346b89ebfa63b0f9c77dbe606c20e045e3b74,2024-10-23T15:35:19.003000 -CVE-2024-10234,0,1,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000 +CVE-2024-10230,0,0,071efdf8dbe6f43ad8bdfc5cb0324a8f9b14590d6803d3d3f568746922ac2f52,2024-10-23T15:12:34.673000 +CVE-2024-10231,0,0,c15e7dbf37700d38c3e757762d5346b89ebfa63b0f9c77dbe606c20e045e3b74,2024-10-23T15:35:19.003000 +CVE-2024-10234,0,0,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 -CVE-2024-10250,1,1,49bdf987ce58c47efa88fef4edc3537a24e3f1da0e14345bbc53b304e24c9e72,2024-10-23T15:12:34.673000 +CVE-2024-10250,0,0,49bdf987ce58c47efa88fef4edc3537a24e3f1da0e14345bbc53b304e24c9e72,2024-10-23T15:12:34.673000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 -CVE-2024-10276,0,1,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000 -CVE-2024-10277,0,1,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000 -CVE-2024-10278,0,1,56ee6a4da4de5c0e9a8258a03df3a3a9b6b90c37d9c7631850f400938a22db00,2024-10-23T15:12:34.673000 -CVE-2024-10279,0,1,e64edd41252858e04d752ad843858b5ee1ffab4901d78e52b3de9d4b7b86a8b2,2024-10-23T15:12:34.673000 +CVE-2024-10276,0,0,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000 +CVE-2024-10277,0,0,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000 +CVE-2024-10278,0,0,56ee6a4da4de5c0e9a8258a03df3a3a9b6b90c37d9c7631850f400938a22db00,2024-10-23T15:12:34.673000 +CVE-2024-10279,0,0,e64edd41252858e04d752ad843858b5ee1ffab4901d78e52b3de9d4b7b86a8b2,2024-10-23T15:12:34.673000 CVE-2024-1028,0,0,e7c94049b8605ccb1520e715a47348e2114f12f58dfbf02bb50626d7afd3f607,2024-05-17T02:35:11.530000 -CVE-2024-10280,1,1,5929b917545d8ac9a5712190601c52463c1c49843096ab22a3ee3e511638c603,2024-10-23T15:12:34.673000 -CVE-2024-10281,1,1,9a36c44d0eeb7437ca773f59beacf73fd89778a77f7f1816f560992a33fce085,2024-10-23T15:12:34.673000 -CVE-2024-10282,1,1,502f13ab11591f902fdee413a1b458cbf17ac0e902dcb767bc7c74b4896284ae,2024-10-23T15:15:29.590000 -CVE-2024-10283,1,1,4218091fe17f678b6c5995fd76360b7bb48740fb8bde0144c6a1a41fe06176ce,2024-10-23T15:15:29.850000 -CVE-2024-10286,0,1,a0511f2126e99f632f63a841019ce0b7a5cd5bfa44467292eeedb9e9fc25a9f2,2024-10-23T15:12:34.673000 -CVE-2024-10287,0,1,444bb1834d04ae58067e6ed11a40e3b8d4dd30b41b8c8998e1ac4776418320ab,2024-10-23T15:12:34.673000 -CVE-2024-10288,0,1,62632d8190e731a41f6f6f95077008cfc723ce3872e777e1665c799e13844f1a,2024-10-23T15:12:34.673000 -CVE-2024-10289,0,1,70e6b8f04ff845fceee5b0c76d2707d88bce3ae7973ab8343d2bcc50274f9bd6,2024-10-23T15:12:34.673000 +CVE-2024-10280,0,0,5929b917545d8ac9a5712190601c52463c1c49843096ab22a3ee3e511638c603,2024-10-23T15:12:34.673000 +CVE-2024-10281,0,0,9a36c44d0eeb7437ca773f59beacf73fd89778a77f7f1816f560992a33fce085,2024-10-23T15:12:34.673000 +CVE-2024-10282,0,0,502f13ab11591f902fdee413a1b458cbf17ac0e902dcb767bc7c74b4896284ae,2024-10-23T15:15:29.590000 +CVE-2024-10283,0,0,4218091fe17f678b6c5995fd76360b7bb48740fb8bde0144c6a1a41fe06176ce,2024-10-23T15:15:29.850000 +CVE-2024-10286,0,0,a0511f2126e99f632f63a841019ce0b7a5cd5bfa44467292eeedb9e9fc25a9f2,2024-10-23T15:12:34.673000 +CVE-2024-10287,0,0,444bb1834d04ae58067e6ed11a40e3b8d4dd30b41b8c8998e1ac4776418320ab,2024-10-23T15:12:34.673000 +CVE-2024-10288,0,0,62632d8190e731a41f6f6f95077008cfc723ce3872e777e1665c799e13844f1a,2024-10-23T15:12:34.673000 +CVE-2024-10289,0,0,70e6b8f04ff845fceee5b0c76d2707d88bce3ae7973ab8343d2bcc50274f9bd6,2024-10-23T15:12:34.673000 CVE-2024-1029,0,0,0f58435c5c731694bc563330e2e0cc48091c7d28b092c9a25a6684c410525166,2024-05-17T02:35:11.633000 -CVE-2024-10290,1,1,d3e172c9c7b7b0403c392ffa2d79ecaff1aea477f009179997ba8147d4bbe88f,2024-10-23T15:15:30.110000 +CVE-2024-10290,0,0,d3e172c9c7b7b0403c392ffa2d79ecaff1aea477f009179997ba8147d4bbe88f,2024-10-23T15:15:30.110000 +CVE-2024-10291,1,1,4221f9dc258e6d84993fa0f34bdeaf5dfcbfbf20fdb69558d099a0b3635f00b4,2024-10-23T16:15:04.597000 +CVE-2024-10292,1,1,8f4c4ab580d9e369d7e7dd331e4604716d13ad341c8b824d3d76d119c02d65de,2024-10-23T16:15:04.943000 +CVE-2024-10293,1,1,a923f6e085338d69ea2111da01f3e4f9e0b9ff921e35106d46ce0e7cea63eda3,2024-10-23T16:15:05.207000 +CVE-2024-10296,1,1,6780536acb419474ab08f42f0ff74d0f3d24a7a6b50377aafc4dcdaecc7d294f,2024-10-23T17:15:13.690000 CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884fe0,2024-05-17T02:35:11.737000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 @@ -243491,16 +243495,23 @@ CVE-2024-20257,0,0,94e6f725ee467caadda6c4f11d4a2013bcc777b9457d0e9c013d22aaa9d3e CVE-2024-20258,0,0,dd86e76a96b4e6a893c0c6ec61ba16ebd8778c22b6c500e3943b86dcf8fd547a,2024-07-03T01:46:01.017000 CVE-2024-20259,0,0,b030aa6453db8e20f0a04d40b0f287f88d896d1fac7ce9dc4574fc3152667686,2024-03-27T17:48:21.140000 CVE-2024-2026,0,0,ab8e0446e355058e8d457eece1c7755ea02ace0a1b5891450eaff276723ece15,2024-04-10T13:23:38.787000 +CVE-2024-20260,1,1,fcb37f0d67e48ad13fc96d997ac1d8b667ae611f0f59c5f8257fc6e86d51195d,2024-10-23T17:15:13.950000 CVE-2024-20261,0,0,5c65061910678ae58b328f6a0e37c321fe1bf57a9d47085baeb418960297a3d6,2024-05-22T18:59:20.240000 CVE-2024-20262,0,0,d20e355bf64045bb726321c22659f6c213d6a34b5f8360db4262a3c1acced6db,2024-03-13T18:15:58.530000 CVE-2024-20263,0,0,a03c106a8ca3bb4647e4caa99728a3814edbbe0073eadd982e4b8d15f1108007,2024-02-06T19:23:20.600000 +CVE-2024-20264,1,1,2357b3e75809a39eb05bab14c62f333818398d9d74eabad38f9ac1e13b2fce41,2024-10-23T17:15:14.180000 CVE-2024-20265,0,0,405f08c8e7e8849163f2eb6a8e5eb3eed5d428c9d5f1700fe4a57c86124fbf2c,2024-03-27T17:48:21.140000 CVE-2024-20266,0,0,6dbb5ce45980d47bf7eb6b4f22011bf963dd46d368a6ae781e4da8879de7a610,2024-03-13T18:15:58.530000 CVE-2024-20267,0,0,49082794ba6fffb4cd0ccafc96537e8303023b31c83143a02b2c16e741876cc2,2024-03-04T22:45:43.893000 +CVE-2024-20268,1,1,610169357ed86c852511ce766370727b0a7a207ecc013cac31b7a963b6e3776f,2024-10-23T17:15:14.387000 +CVE-2024-20269,1,1,b47b048d7ad3d42f0af7353e5a6ae69e2eab255702995fd07ddeb4a1f8fdcf82,2024-10-23T17:15:14.610000 CVE-2024-2027,0,0,8a6da780f00ef83adadf5b93e79e41584ae4ce15f32aba2548f6552eaa755565,2024-04-10T13:23:38.787000 CVE-2024-20270,0,0,eb515a12dde6cc2ab0dfdeee187efe297a3536ebbda30c8e847c7138ffa84d0d,2024-02-02T16:15:54.227000 CVE-2024-20271,0,0,9bce8a64e9296ad22ee19fd2c64f9f191014f0d9052b00608129f7da079ff720,2024-03-27T17:48:21.140000 CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bbea6,2024-02-02T16:15:54.683000 +CVE-2024-20273,1,1,0c64215bfe4eb31c9abc66e58dd871fd28fdf487b8b306b926a80421597ddba4,2024-10-23T17:15:14.813000 +CVE-2024-20274,1,1,950d0b96fbece1c2f3bfef05d6c4375775cf3ee452aef336c926a8d179f4d16b,2024-10-23T17:15:15.027000 +CVE-2024-20275,1,1,578779891302f0f473b3773444d314502c72a840f36622f8905e8ac2188d0668,2024-10-23T17:15:15.237000 CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000 CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462f58,2024-02-02T16:15:54.787000 CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000 @@ -243523,7 +243534,11 @@ CVE-2024-20293,0,0,616028e08a52b8ee6918b00b66aa203f272bb9f0716f3e2ece06ab3be6eda CVE-2024-20294,0,0,742861094e87571e845203e831bfb7a087118860ed05792647beba51da9e1c54,2024-02-29T13:49:29.390000 CVE-2024-20295,0,0,440a3fe735baf91af4ba8e7f15eaba3890b664a180f3cc6b1b84c3c2ae93a20b,2024-04-25T13:18:20.370000 CVE-2024-20296,0,0,40bbd38e07d81658299d895ad9afa6a2a8c553e04b04f72d9f3dda0ddd6b036f,2024-07-18T12:28:43.707000 +CVE-2024-20297,1,1,0f0053be912b3664236ccc4bcda1386d1d47c742dd4a43a94a18427636e68e14,2024-10-23T17:15:15.437000 +CVE-2024-20298,1,1,b97ac8aee03a2d8cdf5fb245fd223b7d29c21670cb9f893c39b27fbcfd9716e4,2024-10-23T17:15:15.710000 +CVE-2024-20299,1,1,24900ce21bdd8f93191cf6fa90d837336fa7d1b15b835ef84f42e28122f35de7,2024-10-23T17:15:16.900000 CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bbc1,2024-03-13T18:15:58.530000 +CVE-2024-20300,1,1,c66314da7d9b6a86aad3725cb29f811511b90e46cad89ddd9b0064e7de385fa2,2024-10-23T17:15:17.253000 CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000 CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000 CVE-2024-20303,0,0,393665d251452d2f76b8a508b1c314e9e2878d06110c2d34091d44dcf2cc0a6d,2024-03-27T17:48:21.140000 @@ -243554,7 +243569,10 @@ CVE-2024-20325,0,0,54ea99e12b48a3199864bbc6b8e057b2420390f797e4ed26add8a6233c894 CVE-2024-20326,0,0,fc15c10256dd5a166a1027ec5ae4c1e91a980e0789f9cd1c71ded8bffcb2bc99,2024-07-03T01:46:03.803000 CVE-2024-20327,0,0,2a507e36cc296b47cc299425ea02720eb37cb46ee21e1b819fdbd44ab608c928,2024-03-13T18:15:58.530000 CVE-2024-20328,0,0,e64c0687495a40f9ecee0bb3a778a786de8f7c2c3bc47f7e8f9d7cb2e2feaa92,2024-03-01T22:22:25.913000 +CVE-2024-20329,1,1,ef5df26e7e4b9742ae0cf4cf5c97eb40260f80cf774a90d4fa3092d9f3cec47c,2024-10-23T17:15:17.457000 CVE-2024-2033,0,0,892e4525fdc9a24c67717f6bae7974a0431189616f9c08a3ecfab5a122c6fa8c,2024-04-10T13:23:38.787000 +CVE-2024-20330,1,1,2d3b2922aec6a9959bea7dabaf3ff76b0b64f3efe31df18e8de347255df5714c,2024-10-23T17:15:17.663000 +CVE-2024-20331,1,1,18751d407b8dd996f1299d2719f669982b9bb52ce42afbfe58a6411d8fa9338b,2024-10-23T17:15:17.870000 CVE-2024-20332,0,0,26f138359eebae9b93dd534c37bd2e0eadd8f2090b9372a1604e6dbd4d4b38f8,2024-04-03T17:24:18.150000 CVE-2024-20333,0,0,a9cf37f279014aaeb1b44ced238e2455395f4982508f682aac206cd9791404fd,2024-03-27T17:48:21.140000 CVE-2024-20334,0,0,e33ad74f302c1a5c76e2802518dc9baee72b2876d58eb107a37b467217796798,2024-04-03T17:24:18.150000 @@ -243562,6 +243580,10 @@ CVE-2024-20335,0,0,3ae82e4e51ce7dc67e890bbf3242dddc369bcec5a9c67ccb96545dde173de CVE-2024-20336,0,0,7da9174c756054acc761610c3354924a4d132dd65f90fcdc8e0995c2dbe104c8,2024-03-07T13:52:27.110000 CVE-2024-20337,0,0,a7c8d58b2276bc115bd59fc582b798a8fadaf5ed39ee4effba6490a0740366a8,2024-03-07T13:52:27.110000 CVE-2024-20338,0,0,510c65881ff77bd5a9b4264c80e30939b8e2e91bda87ae599bea8187a8352e74,2024-03-07T13:52:27.110000 +CVE-2024-20339,1,1,f12c9cf009910af4d0bf2f5be029740c4563e5a469e2dc2f4d11d5aee3aea487,2024-10-23T17:15:18.097000 +CVE-2024-20340,1,1,d3781a696f0c0fdc55b72c9908f8b4d0dd4e40f8816b825663f4c84408114855,2024-10-23T17:15:18.300000 +CVE-2024-20341,1,1,4ad595ee4427ba9567e3ee88bb4614efb5f062252ceb15c8768aa4e7dda27877,2024-10-23T17:15:18.493000 +CVE-2024-20342,1,1,5b1f544948e8a6e10625a4bcf7d61eb4b8bd5d1f17dcaed02adeefa8d3bda791,2024-10-23T17:15:18.703000 CVE-2024-20343,0,0,7c9d164f9ec94ab3681a2158dfc37a563399321d4ad394ceb86611456e6f03d7,2024-10-07T17:42:40.777000 CVE-2024-20344,0,0,0c95d8c456a266581d87105f2300bfe021552d9f4a6b780624736cdaf9bbf776,2024-02-29T13:49:29.390000 CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237eeb39,2024-03-07T13:52:27.110000 @@ -243570,6 +243592,7 @@ CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5 CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000 CVE-2024-2035,0,0,216279b16f620c2ff4b0a8961dd1dd14e0bafebc256a395c018effc533e0c28d,2024-10-11T14:20:05.590000 CVE-2024-20350,0,0,a12c7038f7859e98d5699951ee7006a12ff1675d76aabb6f00e8b49b9f735c1a,2024-09-26T13:32:02.803000 +CVE-2024-20351,1,1,49340f90a7e434ea63384eaa71854418893ac3bbb77be8f8ccb27d63b516bbf3,2024-10-23T17:15:18.913000 CVE-2024-20352,0,0,b6df069392724fdc834a80403afd09f590785680a76232df596c3f6fea90f0b6,2024-04-03T17:24:18.150000 CVE-2024-20353,0,0,e2f72ffa3936c97cc6267050a0bce7d53259a8a25c98d8322d782dc399b18d7e,2024-04-26T15:22:27.803000 CVE-2024-20354,0,0,2b17296c0b4719e35a35904483c6c06073bfa6005008b3509f848c7bb9f4faf5,2024-03-27T17:48:21.140000 @@ -245235,7 +245258,7 @@ CVE-2024-2232,0,0,eb55e6d1211c43c7498854b3b8820fe2f01b88d448661718d29c577fdabad9 CVE-2024-22320,0,0,ec85534fc104e628cf2f58dee5a98a0a436bfe75ddbc94f8841f4752e5e01ce2,2024-03-21T02:52:02.607000 CVE-2024-22326,0,0,0b9083c74a3b6261928ae256538efe0ffc9696087bfcb2cd57b40a111b96cf5d,2024-10-15T19:51:10.393000 CVE-2024-22328,0,0,a39f02e34baf95d793f8f0fc19cf685bee17730011f4e69feb7fe01d897a8992,2024-04-08T18:48:40.217000 -CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e28989d,2024-04-17T12:48:07.510000 +CVE-2024-22329,0,1,a26fcaebd7c684f01199e2a26d0c180c47a076077aaf7657b6c0685c38639e05,2024-10-23T16:15:05.493000 CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000 CVE-2024-22331,0,0,d490fba89e7f88683c136dfcfc87c9cff8ad31b547c7cdf5425991357b2dcb7b,2024-02-13T20:26:23.780000 CVE-2024-22332,0,0,638d06450f89d191258df8fe36d1620abd0564acdb0d8f1f383caf127d6d43b9,2024-04-03T02:15:07.973000 @@ -247899,9 +247922,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000 CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000 CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000 -CVE-2024-26271,0,1,94d22f604a985174d42111d64e0b23a56810ed5aec83eeffb7fda2be0e45ea7c,2024-10-23T15:12:34.673000 -CVE-2024-26272,0,1,2cafd8fc22129f3b590189152a9df5b093c77bb6590e2fe2c8ad7ef6db6cc619,2024-10-23T15:12:34.673000 -CVE-2024-26273,0,1,1c558983e69a364df8a14cb27906a600a4f6ce5ee29c8d95d118d25203c55b4a,2024-10-23T15:12:34.673000 +CVE-2024-26271,0,0,94d22f604a985174d42111d64e0b23a56810ed5aec83eeffb7fda2be0e45ea7c,2024-10-23T15:12:34.673000 +CVE-2024-26272,0,0,2cafd8fc22129f3b590189152a9df5b093c77bb6590e2fe2c8ad7ef6db6cc619,2024-10-23T15:12:34.673000 +CVE-2024-26273,0,0,1c558983e69a364df8a14cb27906a600a4f6ce5ee29c8d95d118d25203c55b4a,2024-10-23T15:12:34.673000 CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000 CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000 CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000 @@ -248009,7 +248032,7 @@ CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba007956 CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000 CVE-2024-2651,0,0,deae8674d69402627d10f964604ef39b1dc02d308e0346f206cd12e33908ca51,2024-10-03T07:15:30.030000 CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000 -CVE-2024-26519,0,1,c49b389d9c60c72251fa877dfe3f4b8b9b5b4dd9f0edbaa0f4cf33cb749870a2,2024-10-23T15:12:34.673000 +CVE-2024-26519,0,1,d399f89cf16e716d8efdce5dcb6cfd10331360e5248d0edfbf32c2b0f97facf1,2024-10-23T17:35:03.570000 CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000 CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000 CVE-2024-26529,0,0,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000 @@ -250726,7 +250749,8 @@ CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 -CVE-2024-30122,1,1,7f99b857c9a2e4fa501efea0d5e828571448ebeb675ef96bce92bb002f2beb46,2024-10-23T15:15:30.390000 +CVE-2024-30122,0,0,7f99b857c9a2e4fa501efea0d5e828571448ebeb675ef96bce92bb002f2beb46,2024-10-23T15:15:30.390000 +CVE-2024-30124,1,1,3e72aa8cd82102d3f19d5510f084e3089df5e840b24de40000f61cfaecb728ff,2024-10-23T16:15:05.667000 CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000 CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e7b5,2024-09-26T13:32:02.803000 @@ -250738,11 +250762,11 @@ CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919ae CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000 -CVE-2024-30157,0,1,c1aa337642ad458cf39faaffb9afaab333b10ba0a44ac5220fb5b0de7c571a0e,2024-10-23T15:12:34.673000 -CVE-2024-30158,0,1,5c31840124042c7dc8c794a9fc04b120cc40b06bb57135fe8916eaa30c0fb643,2024-10-23T15:12:34.673000 -CVE-2024-30159,0,1,1b615975b979bc10b11a069b75bf0572c70c3d456f45ef1f417ec22ee73e229b,2024-10-23T15:12:34.673000 +CVE-2024-30157,0,0,c1aa337642ad458cf39faaffb9afaab333b10ba0a44ac5220fb5b0de7c571a0e,2024-10-23T15:12:34.673000 +CVE-2024-30158,0,0,5c31840124042c7dc8c794a9fc04b120cc40b06bb57135fe8916eaa30c0fb643,2024-10-23T15:12:34.673000 +CVE-2024-30159,0,0,1b615975b979bc10b11a069b75bf0572c70c3d456f45ef1f417ec22ee73e229b,2024-10-23T15:12:34.673000 CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000 -CVE-2024-30160,0,1,1967d448aba9f951666052c9439ee52aac0084b8b4b6dda5bce07b851a006f2b,2024-10-23T15:12:34.673000 +CVE-2024-30160,0,0,1967d448aba9f951666052c9439ee52aac0084b8b4b6dda5bce07b851a006f2b,2024-10-23T15:12:34.673000 CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000 CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000 CVE-2024-30163,0,0,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000 @@ -251385,7 +251409,7 @@ CVE-2024-31002,0,0,91060d363efbbd57c96984ebcb08d042f61fbe28b157d9f0ed5ab606981c6 CVE-2024-31003,0,0,4468ff6139dffd902d54dba282442b03643ad92e636b3ecc84e56f5157573f49,2024-08-01T13:50:37.813000 CVE-2024-31004,0,0,4704ee13f9f534d8c7bace10a79d7d4280ca43ae0178f7a716eda9d0db56ea6c,2024-04-02T12:50:42.233000 CVE-2024-31005,0,0,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 -CVE-2024-31007,0,1,232b72c392999620650ad8aa95313b13b8fd469ccc397a85cabbe2c8678e3ccd,2024-10-23T15:12:34.673000 +CVE-2024-31007,0,0,232b72c392999620650ad8aa95313b13b8fd469ccc397a85cabbe2c8678e3ccd,2024-10-23T15:12:34.673000 CVE-2024-31008,0,0,a974f67fc051176587797d68bd7b8f7fe117012e84496a743cd76182b8fe18e1,2024-08-01T13:50:38.620000 CVE-2024-31009,0,0,3077bfb383403641b21b3b69eff09950c4c56bae68058cba13568ddd6189034f,2024-08-01T13:50:39.423000 CVE-2024-3101,0,0,437dbb9fcac4bacba400f2fa9de8c79fbcdd2c0866383f4a0cb42b039afb8d76,2024-04-10T19:49:51.183000 @@ -251396,7 +251420,7 @@ CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca CVE-2024-3102,0,0,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000 CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000 CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000 -CVE-2024-31029,0,1,10aa801b85c04da0fa1b2dbaf5c05ed163510ca153c727e998047a1ac61ca689,2024-10-23T15:12:34.673000 +CVE-2024-31029,0,1,f794c293631261937654515790ec5ca976aef60dadef09c8a4b3cafec33b0ea9,2024-10-23T17:35:04.327000 CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 @@ -251901,7 +251925,7 @@ CVE-2024-3165,0,0,0646edb30e52b9cd1d5dc09ce07b22c68fadd9067d31e951e14a2e77fb715a CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdace05,2024-08-20T16:35:08.810000 CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000 -CVE-2024-3166,0,1,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000 +CVE-2024-3166,0,0,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000 CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000 @@ -252009,7 +252033,7 @@ CVE-2024-31874,0,0,2aaf0dfaa6414e1f138855d0f6d75787313d073eca635397ca103ff7f6449 CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000 CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000 CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 -CVE-2024-31880,0,1,9cd4a3c2ca2ab2398c30b80db0ad6fc73ea86f35e60508c7ffaeb96dc29b834a,2024-10-23T15:12:34.673000 +CVE-2024-31880,0,0,9cd4a3c2ca2ab2398c30b80db0ad6fc73ea86f35e60508c7ffaeb96dc29b834a,2024-10-23T15:12:34.673000 CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000 CVE-2024-31882,0,0,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000 CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000 @@ -254451,9 +254475,9 @@ CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7d CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000 CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000 -CVE-2024-35285,0,1,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000 -CVE-2024-35286,0,1,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000 -CVE-2024-35287,0,1,d23ccc5a63d0f8204e6f73a8496c2a32e71c084f7ddffea488a7aac29721d836,2024-10-23T15:12:34.673000 +CVE-2024-35285,0,0,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000 +CVE-2024-35286,0,0,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000 +CVE-2024-35287,0,0,d23ccc5a63d0f8204e6f73a8496c2a32e71c084f7ddffea488a7aac29721d836,2024-10-23T15:12:34.673000 CVE-2024-35288,0,0,5a7e419c5723f5855a10246582e4e92910b876efa85bd2048c10c45e071584c8,2024-10-10T12:51:56.987000 CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000 CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000 @@ -254473,13 +254497,13 @@ CVE-2024-35304,0,0,6034918ad52f93d1da2bc26a38d2a41af1cec6e4b2633afd9a4c11faed3e6 CVE-2024-35305,0,0,e31f5a2153df0748351b63d3b29145f978c7628ebc2659ea3282a1f078dca5e0,2024-06-10T18:06:22.600000 CVE-2024-35306,0,0,ad90645c7ad3fc3d00a11af0348fe264fd3520d218ef28c934a8abfa42cbedb9,2024-06-10T18:06:22.600000 CVE-2024-35307,0,0,b73247d3e5b323866c011ccf7e1f39f41293535811b1ef82260b19c7e0a4c21f,2024-06-10T18:06:22.600000 -CVE-2024-35308,0,1,79e7327977df0aea45e2e6e1fe499b2de02adb1ea26d766fd37180400d1b0cfe,2024-10-23T15:12:34.673000 +CVE-2024-35308,0,0,79e7327977df0aea45e2e6e1fe499b2de02adb1ea26d766fd37180400d1b0cfe,2024-10-23T15:12:34.673000 CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb071134,2024-05-17T02:39:59.430000 CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000 CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b3e3,2024-05-20T13:00:34.807000 CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000 -CVE-2024-35314,0,1,dd6af0f66de20db386ca5e2b413231717b44ab4a64aa857fe87b8a5b714ae4c5,2024-10-23T15:12:34.673000 -CVE-2024-35315,0,1,289cfa0e1db3df642660f595c400326d64d272ac3fb0d9faaa1a93e0a8059cef,2024-10-23T15:12:34.673000 +CVE-2024-35314,0,0,dd6af0f66de20db386ca5e2b413231717b44ab4a64aa857fe87b8a5b714ae4c5,2024-10-23T15:12:34.673000 +CVE-2024-35315,0,0,289cfa0e1db3df642660f595c400326d64d272ac3fb0d9faaa1a93e0a8059cef,2024-10-23T15:12:34.673000 CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000 CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000 CVE-2024-35325,0,0,073df6c9b920e39e00ae6bf411b4ce7fcbfdedf8b124ea4a78741a586d12ac92,2024-08-28T16:15:08.417000 @@ -256363,7 +256387,7 @@ CVE-2024-37997,0,0,10214765491aa29b8c34faf22f5e8238fda623005890c9342516743753b6c CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000 CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 -CVE-2024-38002,0,1,3f1776652bfff47ad9ae67348d05ac12be781d94e135045e1da706f908eaf048,2024-10-23T15:12:34.673000 +CVE-2024-38002,0,0,3f1776652bfff47ad9ae67348d05ac12be781d94e135045e1da706f908eaf048,2024-10-23T15:12:34.673000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000 CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000 @@ -257676,7 +257700,7 @@ CVE-2024-39745,0,0,76dcbb05d353e026eccc967feaecdea5409270418987883e30491009b8479 CVE-2024-39746,0,0,6375fbb4b5bb9c905c41c7f4d0b9ebb7e249deb4532114f1d7954e0a6335ab2c,2024-08-23T15:25:02.123000 CVE-2024-39747,0,0,a2161f167ae95389c72b0c031bdb90fe73f7e348a5f87dbcba6e48e76545660a,2024-09-16T17:13:47.497000 CVE-2024-39751,0,0,a868bf4be3dd2b51f3b58089c18a834cccac125c90e59de11837fcfc432cb518,2024-08-29T16:56:32.053000 -CVE-2024-39753,0,1,6bcbf6ac96b06d4d219adf124dd62c559d3dd840ef1bf69100476577424fbd3d,2024-10-23T15:12:34.673000 +CVE-2024-39753,0,0,6bcbf6ac96b06d4d219adf124dd62c559d3dd840ef1bf69100476577424fbd3d,2024-10-23T15:12:34.673000 CVE-2024-39755,0,0,dfcf10f6b8600deddb49177d38227bb50ccc0bc92a697b205718d374dfc6c532,2024-10-04T13:50:43.727000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 @@ -257835,16 +257859,16 @@ CVE-2024-40060,0,0,8684e047d9ba2e6cc4bcc7c4afd5cb58b4b20c732a4bb0dd43020155d17e1 CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000 CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000 CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000 -CVE-2024-40083,0,1,002189cbf2bb61a03947d60ab203b9b2c05b38f7fa5f102a2294b4e285e5aee3,2024-10-23T15:12:34.673000 -CVE-2024-40084,0,1,4bfdc024cb91df5bb8d17d66cec084fec7d97ef49264d00142fadf94256b75f9,2024-10-23T15:12:34.673000 -CVE-2024-40085,0,1,3cf29d3877975d85dc2f58ccd88d84c561c4c037e65f012ecaaa33ce0aecf4df,2024-10-23T15:12:34.673000 -CVE-2024-40086,0,1,d48e42a43404190ca166b9932a7078d2b34c0c46c84e8965be0e224b8d0ed30a,2024-10-23T15:12:34.673000 -CVE-2024-40087,0,1,069bd30cb7311578e696d9fee7e028d0371e9001ffe2cc17bdb58d3d13deb7e1,2024-10-23T15:12:34.673000 -CVE-2024-40088,0,1,72ba12c599e26ff1b44dab56ef787f8bcbf580b714c1bc768d0d3bee85db9dbd,2024-10-23T15:12:34.673000 -CVE-2024-40089,0,1,b1296f356928edbe2d82de24d12a2612dcf7abb5bc99192c31c010ef4cd651ae,2024-10-23T15:12:34.673000 +CVE-2024-40083,0,0,002189cbf2bb61a03947d60ab203b9b2c05b38f7fa5f102a2294b4e285e5aee3,2024-10-23T15:12:34.673000 +CVE-2024-40084,0,0,4bfdc024cb91df5bb8d17d66cec084fec7d97ef49264d00142fadf94256b75f9,2024-10-23T15:12:34.673000 +CVE-2024-40085,0,0,3cf29d3877975d85dc2f58ccd88d84c561c4c037e65f012ecaaa33ce0aecf4df,2024-10-23T15:12:34.673000 +CVE-2024-40086,0,0,d48e42a43404190ca166b9932a7078d2b34c0c46c84e8965be0e224b8d0ed30a,2024-10-23T15:12:34.673000 +CVE-2024-40087,0,0,069bd30cb7311578e696d9fee7e028d0371e9001ffe2cc17bdb58d3d13deb7e1,2024-10-23T15:12:34.673000 +CVE-2024-40088,0,0,72ba12c599e26ff1b44dab56ef787f8bcbf580b714c1bc768d0d3bee85db9dbd,2024-10-23T15:12:34.673000 +CVE-2024-40089,0,0,b1296f356928edbe2d82de24d12a2612dcf7abb5bc99192c31c010ef4cd651ae,2024-10-23T15:12:34.673000 CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000 -CVE-2024-40090,0,1,347dd27ebbf31715e7f48da6e45c004c4edc67f8f00f4ee0ba1241437c194a3d,2024-10-23T15:12:34.673000 -CVE-2024-40091,0,1,914838b957c0a5806f707d139284bac967ba497b38be1d8b22756333f89af5d0,2024-10-23T15:12:34.673000 +CVE-2024-40090,0,0,347dd27ebbf31715e7f48da6e45c004c4edc67f8f00f4ee0ba1241437c194a3d,2024-10-23T15:12:34.673000 +CVE-2024-40091,0,0,914838b957c0a5806f707d139284bac967ba497b38be1d8b22756333f89af5d0,2024-10-23T15:12:34.673000 CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000 CVE-2024-40096,0,0,7067973a4296a7a70beea7b209cd71d2a86d44a9bdfd60035b86d8848d99631b,2024-08-30T16:14:41.957000 CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000 @@ -257939,8 +257963,8 @@ CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000 CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 -CVE-2024-40493,0,1,e7c2247b6a9d9e43b39aad441a089b9e828d1dc246583482a98b7db45286e327,2024-10-23T15:12:34.673000 -CVE-2024-40494,0,1,207904db8b2cab4f6aedc3753b5b3056ba5292a248e00138ac49d9292ee79d31,2024-10-23T15:12:34.673000 +CVE-2024-40493,0,1,3bc280cc490a2ad40b207182dbb218bcfe50ed3c364fef5a0b9179bdf888cd2f,2024-10-23T16:35:08.327000 +CVE-2024-40494,0,1,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000 CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d9db,2024-08-21T16:05:32.603000 @@ -258093,7 +258117,7 @@ CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000 -CVE-2024-40746,0,1,1162e1a27685b6cdb9477d6e763b56da4eadb8ca126f0caef412a4e4575d8849,2024-10-23T15:13:58.783000 +CVE-2024-40746,0,0,1162e1a27685b6cdb9477d6e763b56da4eadb8ca126f0caef412a4e4575d8849,2024-10-23T15:13:58.783000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-40754,0,0,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000 @@ -258477,7 +258501,7 @@ CVE-2024-41175,0,0,35e860a2d31eb21e3779e1686be69664a02d6ab1bab83d6168914f472f9b9 CVE-2024-41176,0,0,54a27b7d242a59ee004d70d03c3c2f94f53556ca2727d85ff4c509bc25fb8e36,2024-10-01T07:15:03.147000 CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000 CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000 -CVE-2024-41183,0,1,3479ba65af33a4ecdf34a2b32a3a48b477cb0cb181461bc97db0c932130f792d,2024-10-23T15:12:34.673000 +CVE-2024-41183,0,0,3479ba65af33a4ecdf34a2b32a3a48b477cb0cb181461bc97db0c932130f792d,2024-10-23T15:12:34.673000 CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b249634fe,2024-08-02T05:15:47.217000 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000 @@ -258739,12 +258763,12 @@ CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000 CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000 -CVE-2024-41712,0,1,8c4bb48b748182bd628e14f15afed97c64418398e71d45ef945a735ca0cfa2e3,2024-10-23T15:12:34.673000 -CVE-2024-41713,0,1,8f0d6ce2b16af2d5fa9efbd57c386308e27393dc3408acba0a4aabd0d256c1a6,2024-10-23T15:12:34.673000 -CVE-2024-41714,0,1,5c1b3ca0f3768b3facc3c2a64b0fa3bb9a4fa7a97e0d9eefaa64355f631be3eb,2024-10-23T15:12:34.673000 +CVE-2024-41712,0,0,8c4bb48b748182bd628e14f15afed97c64418398e71d45ef945a735ca0cfa2e3,2024-10-23T15:12:34.673000 +CVE-2024-41713,0,0,8f0d6ce2b16af2d5fa9efbd57c386308e27393dc3408acba0a4aabd0d256c1a6,2024-10-23T15:12:34.673000 +CVE-2024-41714,0,0,5c1b3ca0f3768b3facc3c2a64b0fa3bb9a4fa7a97e0d9eefaa64355f631be3eb,2024-10-23T15:12:34.673000 CVE-2024-41715,0,0,35d1e19982d6029b0a8b7671c2382ff20d85aa479fa52b1ecc90bc4ca8088cf0,2024-10-17T17:15:11.530000 CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000 -CVE-2024-41717,0,1,16ee40a4b40390a82df115ffc0e464522b2b6abcbb2b0ee1a062ff90a2d4b7fd,2024-10-23T15:12:34.673000 +CVE-2024-41717,0,0,16ee40a4b40390a82df115ffc0e464522b2b6abcbb2b0ee1a062ff90a2d4b7fd,2024-10-23T15:12:34.673000 CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000 CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 @@ -258863,7 +258887,7 @@ CVE-2024-41889,0,0,c2f8146a4c074f06a28a6e2235a6e3d92ccee3a8823a7bd377c0c9b959c16 CVE-2024-4189,0,0,b15b5d19a4afbfbc333cece3d1c3d72ee722494b6d9c37e3d6f01c5f9d0416f9,2024-10-21T14:08:57.430000 CVE-2024-41890,0,0,a90af16c8c7558e5227ebbc511a4c71519b3a4532e07b0a451c0d8da1663fee0,2024-08-29T12:56:47.413000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 -CVE-2024-41902,0,1,e87c1010573bd18d423025e1a23cf803d55a5fd5b55efe454863d924e6d0a103,2024-10-23T14:16:24.277000 +CVE-2024-41902,0,0,e87c1010573bd18d423025e1a23cf803d55a5fd5b55efe454863d924e6d0a103,2024-10-23T14:16:24.277000 CVE-2024-41903,0,0,67dddda11208425a9dbc345fc58604fc5d7cb0caf7e9b81aadfd0fc331e40c63,2024-08-14T18:39:21.207000 CVE-2024-41904,0,0,2a16ff348e5db01cbd9004bb6da7c38aafbed87ec5d8a582eda1208aebd9a27c,2024-08-14T18:39:32.883000 CVE-2024-41905,0,0,ac139d9e01d82a616a25e6137ffc628fc7fb451519deab8e50230ba67daa3137,2024-08-14T18:03:07.660000 @@ -259454,7 +259478,7 @@ CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c3 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 CVE-2024-42640,0,0,aa9fdc0f8db2e7e48ae8090075d403a2f9c88e4c7abd16509bc27a944cdc3dcd,2024-10-15T17:35:04.623000 CVE-2024-42642,0,0,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000 -CVE-2024-42643,0,1,021d70a76409d4143f9037f029c526c4fb401b0dda4433b26f06d4a6991e3f9e,2024-10-23T15:12:34.673000 +CVE-2024-42643,0,0,021d70a76409d4143f9037f029c526c4fb401b0dda4433b26f06d4a6991e3f9e,2024-10-23T15:12:34.673000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000 CVE-2024-42658,0,0,54060235edd9bcf5ce68f6b48efde0940a62552fb8b9f2dcc8d06d163b4ded88,2024-08-20T16:12:50.290000 @@ -259701,8 +259725,8 @@ CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9 CVE-2024-43167,0,0,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980273,2024-10-21T12:15:03.837000 CVE-2024-43168,0,0,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 -CVE-2024-43173,0,1,65f29b0905efb6c9d226bbe87834898e91f17362e5d152e0d961ca7ade84631d,2024-10-23T15:12:34.673000 -CVE-2024-43177,0,1,3abc399faf2c0e72d4b29b578a8f0efca5fbe594cb17b0e330c46da3d5d7f655,2024-10-23T15:12:34.673000 +CVE-2024-43173,0,0,65f29b0905efb6c9d226bbe87834898e91f17362e5d152e0d961ca7ade84631d,2024-10-23T15:12:34.673000 +CVE-2024-43177,0,0,3abc399faf2c0e72d4b29b578a8f0efca5fbe594cb17b0e330c46da3d5d7f655,2024-10-23T15:12:34.673000 CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000 @@ -260075,7 +260099,7 @@ CVE-2024-43693,0,0,86a2418e4d1748f5ff1d2c010cf8ecb2f43f15c3955c5a628ff84ac9fa94c CVE-2024-43694,0,0,1f38ed43c98bb35b4ccdf138bc4e0fc802b17a5cb43658b2fe1564d43a70cd61,2024-10-07T19:40:04.147000 CVE-2024-43696,0,0,b6d21f30f715b52776ec1b781c5995bbebea0d00d95a94042a058b4d46e17c62,2024-10-16T17:38:48.517000 CVE-2024-43697,0,0,aafe4540255caf8b19befcf934243317e12360bb6a3de5ba411c529a9341265a,2024-10-16T17:42:54.640000 -CVE-2024-43698,0,1,9b448123aeeb7ed29d501dfc299ad522a922eb920dddeed66edfa1a9523d2df8,2024-10-23T15:12:34.673000 +CVE-2024-43698,0,0,9b448123aeeb7ed29d501dfc299ad522a922eb920dddeed66edfa1a9523d2df8,2024-10-23T15:12:34.673000 CVE-2024-43699,0,0,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c52e4,2024-10-08T15:44:29.183000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-43700,0,0,0a06b833e6fd1b1e874ef27bf2dcddebe6eeed2fb3b70101d743561cb29959e0,2024-10-15T14:35:01.987000 @@ -260129,7 +260153,7 @@ CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3 CVE-2024-43809,0,0,83732ae5b37d299f4c52d51b00d231c62060b5df8f6e1ebed9668263f47472ea,2024-08-19T21:11:28.327000 CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000 CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9221,2024-08-19T21:11:45.823000 -CVE-2024-43812,0,1,8445c0bb98fe421a145baa8e4fefb35001079c5ee434022c7741c5503def09e8,2024-10-23T15:12:34.673000 +CVE-2024-43812,0,0,8445c0bb98fe421a145baa8e4fefb35001079c5ee434022c7741c5503def09e8,2024-10-23T15:12:34.673000 CVE-2024-43813,0,0,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000 CVE-2024-43814,0,0,b022b6b7d9befe8326620161e5277981bd50c9c9b0cb53fa808760ab38d38b85,2024-10-17T18:15:04.773000 CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000 @@ -260250,7 +260274,7 @@ CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000 CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000 CVE-2024-43922,0,0,1bda9e09eeb9cf761058baff2572a8d05071b30f4dbb7675f13cebb74973fb9f,2024-09-19T21:44:49.453000 -CVE-2024-43924,0,1,bb2efaa4f19a90f6ad938fb6ac6c2fcde87a4755a2a040a9391dc5aa61d478fc,2024-10-23T15:12:34.673000 +CVE-2024-43924,0,0,bb2efaa4f19a90f6ad938fb6ac6c2fcde87a4755a2a040a9391dc5aa61d478fc,2024-10-23T15:12:34.673000 CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000 CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000 CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000 @@ -260313,7 +260337,7 @@ CVE-2024-43996,0,0,4ab5e67e8284ceee786b93aed8adbdd80e1748d0425e228e0426548655b0c CVE-2024-43997,0,0,6c8f403711524a70f603385ceb669667a4c46d7aa3512bb8c48c49bc3e88de15,2024-10-18T12:52:33.507000 CVE-2024-43999,0,0,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000 CVE-2024-4400,0,0,5b653bf54f7bd4284ff54a803a56c0860c5d3b2bf58a6f974ce1eac832bfafb8,2024-05-16T13:03:05.353000 -CVE-2024-44000,0,1,b24fdcea75f52b7f51a8a830efae5bfbeda44ea801c35a203330e5525875206c,2024-10-23T14:16:02.973000 +CVE-2024-44000,0,0,b24fdcea75f52b7f51a8a830efae5bfbeda44ea801c35a203330e5525875206c,2024-10-23T14:16:02.973000 CVE-2024-44001,0,0,346ae8bf0c871825527e18434529b8ae58c66d1360bf3ccc9a5ea96d6edee082,2024-09-25T20:13:04.160000 CVE-2024-44002,0,0,a9ee9907ad6f165092347fc84904c323e2fe7244eb403d6a142135718b9384c1,2024-09-25T20:06:13.100000 CVE-2024-44003,0,0,5349233fccc3b861a24f3e5f6be5454244be5973fb6ae966dc1e7b789f2be81b,2024-09-25T20:03:29.867000 @@ -260477,7 +260501,7 @@ CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c7109 CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000 CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 -CVE-2024-44331,0,1,598c01d980cf0f1c91e7287a2a8238a45c252270701e9a14115ae5190303492a,2024-10-23T15:12:34.673000 +CVE-2024-44331,0,0,598c01d980cf0f1c91e7287a2a8238a45c252270701e9a14115ae5190303492a,2024-10-23T15:12:34.673000 CVE-2024-44333,0,0,d4fac21295587aa2979fd79e1578e51567e5183cd9197e256154e36309cd2381,2024-09-09T21:35:11.347000 CVE-2024-44334,0,0,27220524666d063359048a7f3de8a9bf531c5b74b035bcd3d68284cc277b9a46,2024-09-09T20:35:12.473000 CVE-2024-44335,0,0,bea255eb7004ca14c44e24d39ca0678896b2d706dfe75c727ca75c52a4a40bff,2024-09-09T20:35:17.330000 @@ -260619,7 +260643,7 @@ CVE-2024-44807,0,0,62c2b8a7567d7a7c61c3dd691038c78c799cdde1b88696256483cc85f3e66 CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000 CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 -CVE-2024-44812,0,1,58c5cf9640d27aaeb5d501aec11caa42847374dbca17391372c1e2e207ac31c0,2024-10-23T15:35:20.023000 +CVE-2024-44812,0,0,58c5cf9640d27aaeb5d501aec11caa42847374dbca17391372c1e2e207ac31c0,2024-10-23T15:35:20.023000 CVE-2024-44815,0,0,b542c0b8057471e724100a6582edd807f2b604eab9a88d4411aa24f995571f97,2024-09-25T19:17:02.237000 CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000 CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000 @@ -261005,8 +261029,8 @@ CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-45330,0,0,44d2ce461eeddbf3a7a44fe92b128e09d8c56d9b0bb9a6c4f9c38a59d262f5be,2024-10-19T00:41:09.717000 -CVE-2024-45334,0,1,f6c05fece0cc4f139720ac1531928b166644d7d7b1188b541048e9127de13916,2024-10-23T15:12:34.673000 -CVE-2024-45335,0,1,8cf8dfa389d5ec74510eaa5b51d5c7cfd76807a8704cd642571f3a839f1a8528,2024-10-23T15:12:34.673000 +CVE-2024-45334,0,0,f6c05fece0cc4f139720ac1531928b166644d7d7b1188b541048e9127de13916,2024-10-23T15:12:34.673000 +CVE-2024-45335,0,0,8cf8dfa389d5ec74510eaa5b51d5c7cfd76807a8704cd642571f3a839f1a8528,2024-10-23T15:12:34.673000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 CVE-2024-45348,0,0,f8397568e636cad274a96a56fcdbc01af3feb6775d5986faa9442985588b0658,2024-09-26T13:32:55.343000 @@ -261116,12 +261140,12 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000 CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000 -CVE-2024-45518,0,1,eee8786565a710073f7e13550b53b8d012490e096745a44063dca7a05d578266,2024-10-23T15:12:34.673000 -CVE-2024-45519,0,1,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000 +CVE-2024-45518,0,0,eee8786565a710073f7e13550b53b8d012490e096745a44063dca7a05d578266,2024-10-23T15:12:34.673000 +CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000 CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000 CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000 CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000 -CVE-2024-45526,0,1,d4628a03fc7d8a7cfb2442f76a34dac3190b6a61bb43d7edb2d6687c9af7ff5e,2024-10-23T15:12:34.673000 +CVE-2024-45526,0,0,d4628a03fc7d8a7cfb2442f76a34dac3190b6a61bb43d7edb2d6687c9af7ff5e,2024-10-23T15:12:34.673000 CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000 CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000 CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000 @@ -261377,12 +261401,12 @@ CVE-2024-46213,0,0,27e374a93d05489cae0dc7b637416d222349a9ff3127ca1d693830a2cb84a CVE-2024-46215,0,0,d9c9b41b37ebb8d2c46b9303b2f662f08cd28b45185e47d3a9c15d51a3370a31,2024-10-15T21:35:30.590000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 -CVE-2024-46236,0,1,693e91f44f55c7044362f804878b8ff20da28bfa4640d789283be09f8a229082,2024-10-23T15:13:25.583000 +CVE-2024-46236,0,0,693e91f44f55c7044362f804878b8ff20da28bfa4640d789283be09f8a229082,2024-10-23T15:13:25.583000 CVE-2024-46237,0,0,89c70f938f955e8f8794daf2309e374bb81a18bcff912f949189945353ae1bfc,2024-10-22T18:35:05.180000 -CVE-2024-46238,0,1,c0b3aa1e64f4a91b9c4da7e2401f4fe18d33534691ef378a47cfa822f9a55266,2024-10-23T15:13:25.583000 -CVE-2024-46239,0,1,725c4cefa2ca2647a32f2bf2b322ce53dedacf1976287dda499bc36c65d5a603,2024-10-23T15:13:25.583000 +CVE-2024-46238,0,0,c0b3aa1e64f4a91b9c4da7e2401f4fe18d33534691ef378a47cfa822f9a55266,2024-10-23T15:13:25.583000 +CVE-2024-46239,0,0,725c4cefa2ca2647a32f2bf2b322ce53dedacf1976287dda499bc36c65d5a603,2024-10-23T15:13:25.583000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 -CVE-2024-46240,0,1,e1fabb07f498fd1cd5336ee19dd4a0cded9959b31a2fc1d149406578714fa211,2024-10-23T15:12:34.673000 +CVE-2024-46240,0,0,e1fabb07f498fd1cd5336ee19dd4a0cded9959b31a2fc1d149406578714fa211,2024-10-23T15:12:34.673000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000 CVE-2024-46257,0,0,9ea0ad0f2e6865da2b0362a090cb21ce2a440cd52edf95f9a53e87e2d7fb967d,2024-10-03T16:35:05.240000 @@ -261410,7 +261434,7 @@ CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2 CVE-2024-46316,0,0,54b9c1fe9acfe98423855e0709c0cdd187e74f76088027a762e1c19f14357911,2024-10-10T12:51:56.987000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 CVE-2024-46325,0,0,2552c217f6f2bafd1ae497da9a6104efc7773541d10c748bee2c01ded062ab22,2024-10-08T19:35:19.850000 -CVE-2024-46326,0,1,f0578270eab46bab4492a6b2c704cfe94c3e0445c11c1280b1ace56f9af506a9,2024-10-23T15:12:34.673000 +CVE-2024-46326,0,0,f0578270eab46bab4492a6b2c704cfe94c3e0445c11c1280b1ace56f9af506a9,2024-10-23T15:12:34.673000 CVE-2024-46327,0,0,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000 CVE-2024-46328,0,0,150e1d7b5fcc22f852cb919b13410447bdf1e8cb19cb878b6bbbd7be01f4269b,2024-09-30T12:46:20.237000 CVE-2024-46329,0,0,8c93b211ce727ef89bff0e17a07fc114c301812ff446c3d9b747d9a6ed124748,2024-09-30T12:46:20.237000 @@ -261457,8 +261481,8 @@ CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a0 CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000 CVE-2024-46475,0,0,6dd32d21b34d5ed62fc4d47e4e31b7806525d2f693fc3da0c33e5fca3fe88762,2024-10-04T13:51:25.567000 CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000 -CVE-2024-46482,0,1,4c7cc9f8abefdf394d703170cab2c1d0f6815a856ba8a2a17cbdc610ce072993,2024-10-23T15:12:34.673000 -CVE-2024-46483,0,1,75ffc445ccb8ac003ecbb6c3c08c1b221eff0be1f110f3f40bfdb9fa10891b03,2024-10-23T15:12:34.673000 +CVE-2024-46482,0,0,4c7cc9f8abefdf394d703170cab2c1d0f6815a856ba8a2a17cbdc610ce072993,2024-10-23T15:12:34.673000 +CVE-2024-46483,0,0,75ffc445ccb8ac003ecbb6c3c08c1b221eff0be1f110f3f40bfdb9fa10891b03,2024-10-23T15:12:34.673000 CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000 CVE-2024-46486,0,0,6fe755bff404a9260861863774df3deb9fd23fe20cfc4f9cee682ab32adf5d48,2024-10-07T19:37:29.423000 CVE-2024-46488,0,0,41c2092a15aede67b224d6f9481dd8740d600089d5047373dfa98024a8d780a7,2024-10-02T16:21:36.507000 @@ -261474,7 +261498,7 @@ CVE-2024-46528,0,0,81f8583f4022a65d1ad9471b4717d45f3c83d5a174d4df1514139f8d90b90 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000 CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000 -CVE-2024-46538,0,1,ac6dc223b2fc042fc585a7b373eda5b9790406c41b719a2a6d8f11009722bde3,2024-10-23T15:12:34.673000 +CVE-2024-46538,0,0,ac6dc223b2fc042fc585a7b373eda5b9790406c41b719a2a6d8f11009722bde3,2024-10-23T15:12:34.673000 CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000 @@ -261770,8 +261794,8 @@ CVE-2024-46867,0,0,8316d7997f273d3e067642701a8234592f3f2c26a3648af1f12dc5cbdd0c2 CVE-2024-46868,0,0,f9213706fab3b425fd6d7b9c70ceaf5cede666ff7057d8fa56ee82d754aa07ed,2024-10-01T17:09:12.247000 CVE-2024-46869,0,0,9ed81572871432f968131373b48d9116fc414e30c1ec7495d6906513924c285a,2024-10-04T13:51:25.567000 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 -CVE-2024-46870,0,1,652ca601a7652d849ccf9f3fa227a6384ea9072535f4139d45e923bcd7c9f15f,2024-10-23T14:26:28.690000 -CVE-2024-46871,0,0,42cba4af988a3361fdd6b06fd16c88b02566969c525ca337e5a0e24979f190e2,2024-10-10T12:51:56.987000 +CVE-2024-46870,0,0,652ca601a7652d849ccf9f3fa227a6384ea9072535f4139d45e923bcd7c9f15f,2024-10-23T14:26:28.690000 +CVE-2024-46871,0,1,4bbafc222a5b983e7eee48edc0ec35209cfa7a3a04fb16a3dfef1b1e5b5df95d,2024-10-23T16:10:48.077000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 @@ -261779,8 +261803,8 @@ CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113 CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000 CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000 CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 -CVE-2024-46902,0,1,7bfdb6b1b77fa1ead7ed4d641aa345dc6ec5d04ee00fc4bcb25d3fbda58dd5f2,2024-10-23T15:12:34.673000 -CVE-2024-46903,0,1,3b3917d8b7bb5ba2b9b2429e0545b7ed1791a9c11c0420bbf83786e19e1abf95,2024-10-23T15:12:34.673000 +CVE-2024-46902,0,0,7bfdb6b1b77fa1ead7ed4d641aa345dc6ec5d04ee00fc4bcb25d3fbda58dd5f2,2024-10-23T15:12:34.673000 +CVE-2024-46903,0,0,3b3917d8b7bb5ba2b9b2429e0545b7ed1791a9c11c0420bbf83786e19e1abf95,2024-10-23T15:12:34.673000 CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000 CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000 CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000 @@ -261923,7 +261947,7 @@ CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 CVE-2024-47187,0,0,817b13d1e8de6a39f3ef47c843dc5a93e7afef448e0409c2b2ed1c1bad0aac52,2024-10-22T13:48:59.893000 CVE-2024-47188,0,0,121b1d8543a839662e5f78a404dc83b47db88a564ef1132d3f948fc248118eb7,2024-10-22T13:50:17.493000 -CVE-2024-47189,0,1,7ecc2a6d7651786fe3ca88fc21700c3aba959abbfb427b593201d67fe273baa5,2024-10-23T15:12:34.673000 +CVE-2024-47189,0,0,7ecc2a6d7651786fe3ca88fc21700c3aba959abbfb427b593201d67fe273baa5,2024-10-23T15:12:34.673000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47191,0,0,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000 CVE-2024-47194,0,0,0afa0b09ca6b7bbd6bd860b01b5c9153eec47be962883f1807d6c455d470088c,2024-10-16T18:15:04.043000 @@ -261940,8 +261964,8 @@ CVE-2024-4722,0,0,d0eb70616d7559be2944527d8cacda4cb03faa787985cf2ceace067dd7c5ef CVE-2024-47220,0,0,ec1088c10a16b1d5d48c36f52f549a9f66295221614c4c2acd2563482d5ed68e,2024-09-26T13:32:55.343000 CVE-2024-47221,0,0,cc80d5b45c9b68b206ee1a2dbfe9f9a68f652cad6fbd63e536e536e628b771d4,2024-09-29T00:45:21.857000 CVE-2024-47222,0,0,c74f6ce55a0f72a72d3d22a82ae52356e74326f3e21780a319e444b828ec8b8d,2024-09-30T14:02:23.007000 -CVE-2024-47223,0,1,6ced9d5d48193f0dcb61cb33f661af77d821be6912a7f6c6cd03b3c2f8883f5b,2024-10-23T15:12:34.673000 -CVE-2024-47224,0,1,faa7dbf755c9b0e2007ed5828e4d43ecbba4d3b7ed25e8dbea00a981d37cf6b3,2024-10-23T15:12:34.673000 +CVE-2024-47223,0,0,6ced9d5d48193f0dcb61cb33f661af77d821be6912a7f6c6cd03b3c2f8883f5b,2024-10-23T15:12:34.673000 +CVE-2024-47224,0,0,faa7dbf755c9b0e2007ed5828e4d43ecbba4d3b7ed25e8dbea00a981d37cf6b3,2024-10-23T15:12:34.673000 CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c82e3,2024-09-26T13:32:55.343000 CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000 CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000 @@ -262079,7 +262103,7 @@ CVE-2024-47425,0,0,e832dc60d6b0a911f7b82219c1b7e7050a04085decdafb9accbb9c4ea24ed CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 -CVE-2024-47459,0,1,dc476e38be60b6a1efda7726261f4c9f051d293bb6f4f7193aea3c1108a67e3c,2024-10-23T14:17:23.557000 +CVE-2024-47459,0,0,dc476e38be60b6a1efda7726261f4c9f051d293bb6f4f7193aea3c1108a67e3c,2024-10-23T14:17:23.557000 CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000 CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000 CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000 @@ -262139,7 +262163,7 @@ CVE-2024-47562,0,0,f948ab473eac72b74771d65275c3bce022b2870f6200aad718c4a235ef7a7 CVE-2024-47563,0,0,8e14a8aeeab89240dc7f71203e62b9d2c2b2c697ebcb095329938e996837371a,2024-10-11T20:05:05.143000 CVE-2024-47565,0,0,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29d8c,2024-10-11T20:05:59.237000 CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000 -CVE-2024-47575,1,1,a0d437913509dbdce400ee44446375e68a770ae7ac86a11ab02595b3e83f8bb4,2024-10-23T15:15:30.707000 +CVE-2024-47575,0,0,a0d437913509dbdce400ee44446375e68a770ae7ac86a11ab02595b3e83f8bb4,2024-10-23T15:15:30.707000 CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000 CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000 @@ -262194,18 +262218,18 @@ CVE-2024-47654,0,0,78d80ab92ea0ad6076e47a7f8ed2f44135bb23a3e7682564585e92d9487a7 CVE-2024-47655,0,0,41934f94579191292376f845dc30fc7330cbde82071ca41f41ba8eb2594186d2,2024-10-16T15:26:15.350000 CVE-2024-47656,0,0,4a7b40727fe0bc16fd3cab3d10ee814920e8818b1c83af2c468f34cc9e39f8a6,2024-10-16T15:32:01.460000 CVE-2024-47657,0,0,708576a218ada67737fc2a655868a1f777fbac283ee172e5336c76140e63933f,2024-10-16T15:44:16.807000 -CVE-2024-47658,0,0,7d83d41550ee4896fe2089957fc970e4ffb8e6c30451f535c67b0cffeb69f047,2024-10-10T12:51:56.987000 -CVE-2024-47659,0,0,b7c74157edbbfcf6cc191fb9eb6c2e328a941e3c74433eed8f44bf21a8a12312,2024-10-10T12:51:56.987000 +CVE-2024-47658,0,1,947a688b2a86da9457477de88fb5bff9df9a2e5d87371477ab4988d2ebf34f8c,2024-10-23T16:14:46.213000 +CVE-2024-47659,0,1,731051564fdd9abc181845d3e50137cbdca7b1a84c7236a873f8e213b5f1af37,2024-10-23T16:29:14.800000 CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000 -CVE-2024-47660,0,0,accf7b6bc163d236ec224793cf44bab1e91316de88fa320bb4708923ce43fb79,2024-10-10T12:51:56.987000 +CVE-2024-47660,0,1,e2ac446e9523902ead466409c8feba83110dd39b410ed7aaabcc96633073d26b,2024-10-23T17:00:47.747000 CVE-2024-47661,0,0,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000 -CVE-2024-47662,0,0,9592ff301142fec228feda5f28aa5220c1e0fdd0719eedaab776fcd353ec2534,2024-10-10T12:51:56.987000 -CVE-2024-47663,0,0,38c847c85cb58f1bdc14b2643d340f12f21f2abeb9d0471d3efb10c92740f7a5,2024-10-10T12:51:56.987000 -CVE-2024-47664,0,0,1c2309f9d69bf8bb4cc3d6eb245972d5a50bf2b31179b3921c4437d37dadd6e5,2024-10-10T12:51:56.987000 -CVE-2024-47665,0,0,e8a6fa909a361ab6d7cc78d96e16742c4b3f809215ea5c8834927031949bb7a0,2024-10-10T12:51:56.987000 -CVE-2024-47666,0,0,a5a9f51120f3c9ddd4e33149f72ef447bc4c927097f5851c64b003de19643664,2024-10-10T12:51:56.987000 -CVE-2024-47667,0,0,38ec78121e570b51d421eb5ff7db3ba1ac7cdc0e7f949923732012891a8b3d78,2024-10-10T12:51:56.987000 -CVE-2024-47668,0,1,cf94068f0e7f8e5e7d64a7e8a1d91fb4c9f70ff81ce5d918148c4e18a53dc56f,2024-10-23T15:30:00.057000 +CVE-2024-47662,0,1,920f325626eb85508758136f5394582e182e91aad17f6b7b72068d65db6d25e8,2024-10-23T16:53:12.973000 +CVE-2024-47663,0,1,0520ca5d6812be23092506a46bd53a6f2ab6e887252710a210ce4d11a4df1647,2024-10-23T16:50:53.183000 +CVE-2024-47664,0,1,ed8a7e5e5d422df82ea173458af2fecf23bb2712b244089e51a1d9602304a958,2024-10-23T16:47:35.643000 +CVE-2024-47665,0,1,44c24759c1101f90cf6a5dd5fef1f257134e85f7779de40d7338a9657664b646,2024-10-23T16:44:59.270000 +CVE-2024-47666,0,1,24c02ab2ebe5713940a0fb6d9b5be80231f00e1b1a92eb5ee8c0e6e7e5de0a9d,2024-10-23T16:34:49.307000 +CVE-2024-47667,0,1,0d67103013a699588d2c658822c71f03525e987820a1f237d10bb2d28261a600,2024-10-23T16:31:43.003000 +CVE-2024-47668,0,0,cf94068f0e7f8e5e7d64a7e8a1d91fb4c9f70ff81ce5d918148c4e18a53dc56f,2024-10-23T15:30:00.057000 CVE-2024-47669,0,0,cc07106cf0c3934e18c2295dc4d9599646844641786bb44db10c2dc10f6e6435,2024-10-21T13:28:34.330000 CVE-2024-4767,0,0,ac8fd08be8bf5dfebff2c5bd3958a6b91cd60ea11215d2f819ca56e82a8bdf8b,2024-07-03T02:08:05.290000 CVE-2024-47670,0,0,47fba4dee4b00f21dbff6c6decd1bc6ab83cdd30571ca10600e97efb139e20ef,2024-10-17T14:15:13.560000 @@ -262216,19 +262240,19 @@ CVE-2024-47674,0,0,9273dcf5991b9b8c8433130a4938740f9721051fe1fcb6d45b5c4bc462515 CVE-2024-47675,0,0,624f315494e47c95b1269b56800071e724c94a3629173e26cf42531c4b63e4de,2024-10-23T13:39:38.647000 CVE-2024-47676,0,0,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000 CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000 -CVE-2024-47678,0,0,0599171199c0933ac90dc22e0c718002df8dc875ff64d0f6cfd466c664eca6eb,2024-10-21T17:09:45.417000 -CVE-2024-47679,0,1,ff4453f27f8106322d7b03df5908d00952b689ca70903c4a49e7a2270442cdd5,2024-10-23T14:49:48.763000 +CVE-2024-47678,0,1,15331914c6780ab092c41bd83df4ddc0c2577572736b4bdeb76d32ddb58569bc,2024-10-23T17:58:08.720000 +CVE-2024-47679,0,0,ff4453f27f8106322d7b03df5908d00952b689ca70903c4a49e7a2270442cdd5,2024-10-23T14:49:48.763000 CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000 CVE-2024-47680,0,0,779185d87101541924dc45d047ca1b9e685cb152836bf7742a8884724035e45e,2024-10-21T17:09:45.417000 CVE-2024-47681,0,0,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000 -CVE-2024-47682,0,1,46fa66ba51047277cbea09ed5154dc9b7e2d2f32e222256eb9a1726a2684da5f,2024-10-23T14:57:12.700000 -CVE-2024-47683,0,1,7ec7028bb740304f208393a68c6cce367ef86fe45c0c6df398de986d9b0bace8,2024-10-23T15:02:12.800000 +CVE-2024-47682,0,0,46fa66ba51047277cbea09ed5154dc9b7e2d2f32e222256eb9a1726a2684da5f,2024-10-23T14:57:12.700000 +CVE-2024-47683,0,0,7ec7028bb740304f208393a68c6cce367ef86fe45c0c6df398de986d9b0bace8,2024-10-23T15:02:12.800000 CVE-2024-47684,0,0,c39612721e855a6bfd73c21cef099cc4455986cccfb2ea78b2c09a72e7deb582,2024-10-22T14:59:31.340000 -CVE-2024-47685,0,1,99ab178208101c31a4fdbe9ddced16aaacce89958f6ac3fde572093fdd022e25,2024-10-23T15:19:05.983000 -CVE-2024-47686,0,1,37864736ad2a4d49ad32a2bfd5d9c20ac88219311e144b89fc2decc05f6ba031,2024-10-23T15:34:50.460000 -CVE-2024-47687,0,1,8395d2f1197b10b881cfc99c8cbe4e99a9a7142c9f350fac2e5252f27d32099a,2024-10-23T15:22:45.867000 -CVE-2024-47688,0,1,e342f1a85a423eeb25e5887c6a7e3ca064156a5f85774a6b7da8769bd9bb7428,2024-10-23T15:36:21.977000 -CVE-2024-47689,0,1,3f75c6785b241c3eacb9ccaf62f165a533348a414404d2e40f2e1dab85da5dde,2024-10-23T15:53:06.410000 +CVE-2024-47685,0,0,99ab178208101c31a4fdbe9ddced16aaacce89958f6ac3fde572093fdd022e25,2024-10-23T15:19:05.983000 +CVE-2024-47686,0,0,37864736ad2a4d49ad32a2bfd5d9c20ac88219311e144b89fc2decc05f6ba031,2024-10-23T15:34:50.460000 +CVE-2024-47687,0,0,8395d2f1197b10b881cfc99c8cbe4e99a9a7142c9f350fac2e5252f27d32099a,2024-10-23T15:22:45.867000 +CVE-2024-47688,0,0,e342f1a85a423eeb25e5887c6a7e3ca064156a5f85774a6b7da8769bd9bb7428,2024-10-23T15:36:21.977000 +CVE-2024-47689,0,0,3f75c6785b241c3eacb9ccaf62f165a533348a414404d2e40f2e1dab85da5dde,2024-10-23T15:53:06.410000 CVE-2024-4769,0,0,27e569a8d015b1733830e438c3e7532f74e5dc1a595d9d72a9cda524aaf6545e,2024-07-03T02:08:05.617000 CVE-2024-47690,0,0,448d7fd9a4748a1d25367ec5280b83293a5830a569687c37d4d84e0edb81fe89,2024-10-21T17:09:45.417000 CVE-2024-47691,0,0,3fdc4f49a381b730d9addaf6deb128b8a633a5acbe8c6f6cd5c757255fd2b7cd,2024-10-21T17:09:45.417000 @@ -262274,30 +262298,30 @@ CVE-2024-47727,0,0,b4841d049fe7977d7ae76ed99e0c8291d4ff9401863cf2613bdea9ae7e9a1 CVE-2024-47728,0,0,20d7130b4cb2af3704697b2735b8691238f821693df5a91fa37a4e7099218c8a,2024-10-21T17:09:45.417000 CVE-2024-47729,0,0,7d1f6f34e39d97ae406ce74219e7048254356610a727b3668c7c3f2cd0d70ad2,2024-10-21T17:09:45.417000 CVE-2024-4773,0,0,451efafbcecc3ef1a9913dd6e3fbbf39d79f9aa10bbe1841409a244ef36a044e,2024-08-01T13:59:35.080000 -CVE-2024-47730,0,0,c3f5f93c52ec9e2a2a3e43460027bfc21365178115f159c06fdea3245e28167d,2024-10-21T17:09:45.417000 -CVE-2024-47731,0,0,6248433178551df21e3cfb6bc6acc0af27e1ef9f0f681f44c992921ffccd980f,2024-10-21T17:09:45.417000 -CVE-2024-47732,0,0,3b7c5ecca23afedd48d94fd6764c6140af64284a7a533492a808d77f3064a941,2024-10-21T17:09:45.417000 -CVE-2024-47733,0,0,77e82f0d28a8ba47940fb2bd9a24af18b530601f804b8a4d3e8174e8e8fd528c,2024-10-21T17:09:45.417000 -CVE-2024-47734,0,0,79ca143553841e51e16d268c9dbbe489d1be92d485bdb1f9f32c766520faa09c,2024-10-21T17:09:45.417000 +CVE-2024-47730,0,1,c0a5c91cff9686d35e7d5bba835997d9b023fdf179e028f8bc2ed84a7532d3a2,2024-10-23T17:03:23.140000 +CVE-2024-47731,0,1,638886df73f40aa07e5281bd61c3b7b99724fd1016f0d993a184b6b88ee52510,2024-10-23T17:06:14.323000 +CVE-2024-47732,0,1,9bc62d67d7f143b6014d17a7ed2de2f0043ff2b794c0d08b7eea0116f4ed29c9,2024-10-23T16:31:03.873000 +CVE-2024-47733,0,1,1c9459511d59622fe23ef7946b3f574a7492e174f9c27d9f4ffcf7cfc5787cac,2024-10-23T17:11:29.537000 +CVE-2024-47734,0,1,e239ae2a9be9c00fbcd9a4d42a9a7fa3b7a748dc8899bc352b365478d6153c50,2024-10-23T17:16:13.457000 CVE-2024-47735,0,0,918ed1ed6ba7267950dd2758ef51888a5f5662ceef4cc5d4887e675b3769fc56,2024-10-21T17:09:45.417000 CVE-2024-47736,0,0,80e1bfd6b5ee20de3403a27bfa1c47b54d41ea5fc193ba9fd9ef66cf274c64f3,2024-10-21T17:09:45.417000 -CVE-2024-47737,0,0,ac87e3b2308277816910c98c2b290774c3ffffc3d2a1d12f6df7ede6b6fec94c,2024-10-21T17:09:45.417000 +CVE-2024-47737,0,1,7ecc6ae6c1b7ceace54d63a73c9f7205b0dc762c4dd0ff8f399efa15e9e49515,2024-10-23T17:00:01.357000 CVE-2024-47738,0,0,df8a42001823c1e7a29c78a2dc7b7b033a870108f55c2c690b931c943d1f277c,2024-10-21T17:09:45.417000 -CVE-2024-47739,0,0,0c3874db11349c247df1edc5f4817cb0fb3b45ec26a3c74705ff1f5a7791bba7,2024-10-21T17:09:45.417000 +CVE-2024-47739,0,1,e6e0a492029d3fb19a9a4e9cd0586875e46e9d018e544231fa7b5cba2e661da0,2024-10-23T16:58:37.707000 CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f70a,2024-05-14T19:17:55.627000 CVE-2024-47740,0,0,768c60cc2aa6353990ba6be4a715ba73240d08f7aa920e59da8dba820cceb126,2024-10-21T17:09:45.417000 CVE-2024-47741,0,0,16de1929b973495fab2b76c1e0c3aec13d1144f771036e4c19ce75034196e012,2024-10-21T17:09:45.417000 CVE-2024-47742,0,0,d4bdf050ad676b843a45f07aa46808bebd66cb4930bdf4a3846418b0470ff5e9,2024-10-21T17:09:45.417000 CVE-2024-47743,0,0,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000 CVE-2024-47744,0,0,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000 -CVE-2024-47745,0,0,bf9d70a37cd5327dcc2d07c3fdd8b5c36de5c72622dd6659e050773378799961,2024-10-21T17:09:45.417000 +CVE-2024-47745,0,1,c7b92baa4d45cc2fb4fb2eb6cde3f0f6e977a7a8941cf2bba229f794ae1dde12,2024-10-23T17:25:19.657000 CVE-2024-47746,0,0,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000 CVE-2024-47747,0,0,bf426d12e6fede872474432e7d03578fd050f7aed12c854ab7dc6720315913fd,2024-10-22T16:11:40.627000 -CVE-2024-47748,0,0,647817335e913f39ba0f188b7f0dda0acdc5eefa8874404f39f4072aced2a2c5,2024-10-21T17:09:45.417000 +CVE-2024-47748,0,1,065bb81a1af9cae33c8bbb049306a2511d1bd3c734e3a21bbb094fdde6daea3a,2024-10-23T17:28:00.460000 CVE-2024-47749,0,0,6fb6c09686d727b440ebbd021d0a7a92d2bb1c2a12c6f5547a255465abc8b3b4,2024-10-22T16:08:31.637000 CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000 -CVE-2024-47750,0,0,fcb30e866c3d64f885fc63b0fbe18064c59e15239984a0057b4922de3e3cda47,2024-10-21T17:09:45.417000 -CVE-2024-47751,0,0,dbbb46f679c8ef6d582034b10e0fc5133e1862d2b7e7523462d867f3e651a7ba,2024-10-21T17:09:45.417000 +CVE-2024-47750,0,1,fa7a14e74b9f1e80df8f1d89d43346c3a6cf2cfe42e44d3f1a6e0969f54d1af8,2024-10-23T17:29:01.330000 +CVE-2024-47751,0,1,2d23262a1d1ea4d966272387ed728208ab7be5eeef12fc5f93786009ecea54bc,2024-10-23T17:33:52.440000 CVE-2024-47752,0,0,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000 CVE-2024-47753,0,0,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000 CVE-2024-47754,0,0,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000 @@ -262340,12 +262364,12 @@ CVE-2024-47815,0,0,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670 CVE-2024-47816,0,0,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000 CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000 CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000 -CVE-2024-47819,0,1,a201b17d1277f48bd2a8213c81a510d8fc617942b304ecc358a5d34098e66f28,2024-10-23T15:12:34.673000 +CVE-2024-47819,0,0,a201b17d1277f48bd2a8213c81a510d8fc617942b304ecc358a5d34098e66f28,2024-10-23T15:12:34.673000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000 CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000 CVE-2024-47824,0,0,60e3e0b82e04fc3016ce5ff7f0485ad8429207cb4be5065515079214bfa51129,2024-10-16T16:38:43.170000 -CVE-2024-47825,0,1,e319259d9b937a2cf2775125b51ccc3a135e4cd0dcfdc35845c8f95f676fc6af,2024-10-23T15:13:25.583000 +CVE-2024-47825,0,0,e319259d9b937a2cf2775125b51ccc3a135e4cd0dcfdc35845c8f95f676fc6af,2024-10-23T15:13:25.583000 CVE-2024-47826,0,0,e0e92319bd7ff9f0b6142ef26fd12487604c5bd0a7b38d2c0ea52634274a8fe7,2024-10-15T12:57:46.880000 CVE-2024-47828,0,0,a6b81ff1073f19581e05e8c790863d706cba88272fb227df996495bf444dca26,2024-10-17T13:55:23.577000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 @@ -262357,7 +262381,7 @@ CVE-2024-47836,0,0,9820902057ffe0b868812f79151bb5dbded2f7cf0e121917a52aed0157f4d CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 CVE-2024-47840,0,0,c2ff7b850c32ab1f0cd524b652cd23069ad0261af0dda33ffcd5ed7e8a17367a,2024-10-16T16:44:54.440000 CVE-2024-47841,0,0,5965eb4de1da8f2a0dd0895a3f88b849e9e6237b2cba12893d6c98b9d53e6e0f,2024-10-16T16:34:31.173000 -CVE-2024-47845,0,1,fba2bd4658014e4d6aa7611c4102700faa491de5557f836f104a3695e65a150f,2024-10-23T15:00:11.853000 +CVE-2024-47845,0,0,fba2bd4658014e4d6aa7611c4102700faa491de5557f836f104a3695e65a150f,2024-10-23T15:00:11.853000 CVE-2024-47846,0,0,5053ec96b1964ec4cf07752f40f0383acb21d284ff73eb672d6eb88ec2b7aeb5,2024-10-16T16:42:58.513000 CVE-2024-47847,0,0,2c1e2e1c851a4a516d6696b28107e81902c0df1fd1f8d5a493124b40cda48e2d,2024-10-16T16:42:05.567000 CVE-2024-47848,0,0,dc9eb429b1aadadb7717ca6bfd0505a99cdb374dc0fa769de0a8c407aae9a86d,2024-10-07T17:48:28.117000 @@ -262386,14 +262410,14 @@ CVE-2024-47888,0,0,1ed854ade470bc163ad8c76031be0255e632797f8163938f76c7a31de7a78 CVE-2024-47889,0,0,661bf5d3df9343f9d9841050fa7811eba61ad27c7b6cfb90f97b1fd9293eaac0,2024-10-18T12:53:04.627000 CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000 -CVE-2024-47901,1,1,8f1f29394b5c16bfe6b0e83f3a08018ca330312f43293f4c2d16d7d1553a7881,2024-10-23T15:15:30.930000 -CVE-2024-47902,1,1,3d206f3d88e4f05605962b415c9503f50b5196bbc29c18031c309784ce4c3964,2024-10-23T15:15:31.163000 -CVE-2024-47903,1,1,943046cf1629de7f7f7d825ad9a50768ed7ad1b6063e1c7aebe621842ecd5be0,2024-10-23T15:15:31.397000 -CVE-2024-47904,1,1,8f656980cd3f6bcd083478657c1093f935cc902e5c67f7685eb07f658db8e4a0,2024-10-23T15:15:31.687000 +CVE-2024-47901,0,0,8f1f29394b5c16bfe6b0e83f3a08018ca330312f43293f4c2d16d7d1553a7881,2024-10-23T15:15:30.930000 +CVE-2024-47902,0,0,3d206f3d88e4f05605962b415c9503f50b5196bbc29c18031c309784ce4c3964,2024-10-23T15:15:31.163000 +CVE-2024-47903,0,0,943046cf1629de7f7f7d825ad9a50768ed7ad1b6063e1c7aebe621842ecd5be0,2024-10-23T15:15:31.397000 +CVE-2024-47904,0,0,8f656980cd3f6bcd083478657c1093f935cc902e5c67f7685eb07f658db8e4a0,2024-10-23T15:15:31.687000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 -CVE-2024-47912,0,1,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b38510fd,2024-10-23T15:12:34.673000 +CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b38510fd,2024-10-23T15:12:34.673000 CVE-2024-47913,0,0,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 @@ -262456,7 +262480,7 @@ CVE-2024-48043,0,0,d7022e96ce1ce67c4f59e004a095bf6b87f052300567a30fb9f9fb2d5938d CVE-2024-48046,0,0,423091e4b5e8d6a105e8bdc778f5cf951b1df2d4a2635710b325a5130f1d15ea,2024-10-18T12:52:33.507000 CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c081f8,2024-10-18T12:52:33.507000 CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000 -CVE-2024-48049,0,0,148df9ad31ecc0545e683b32bec8a0373210f0d3ec41d70a8b1226d9859ffdca,2024-10-21T17:09:45.417000 +CVE-2024-48049,0,1,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 @@ -262507,7 +262531,7 @@ CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000 CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000 -CVE-2024-48415,0,1,c10186924aa2f07960783e2fd15a8f4fa4a9a66e80dda97c9071e00f746fc7e7,2024-10-23T15:12:34.673000 +CVE-2024-48415,0,1,f0924ee00bd27af7c2e3b4df709006fd2e622c007a3785ddb6461472428a80bb,2024-10-23T16:35:09.317000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000 CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000 @@ -262516,19 +262540,19 @@ CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0f CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000 -CVE-2024-48509,0,1,c6a322b44f1b5c48c99b4ab0a24ca78577b459bf4c9409e8862d334d073306ba,2024-10-23T15:12:34.673000 +CVE-2024-48509,0,0,c6a322b44f1b5c48c99b4ab0a24ca78577b459bf4c9409e8862d334d073306ba,2024-10-23T15:12:34.673000 CVE-2024-4851,0,0,444f4e959fbd50fab42bb9cd6f5b1019a6d50ea56a5371bcf4f4fa6566e3e360,2024-10-17T18:45:13.093000 CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000 CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000 CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 -CVE-2024-48570,0,1,a07030a76cd88cf2d077be21611e593db567eb3ed2799d5f3776bbda7ecbaf36,2024-10-23T15:12:34.673000 +CVE-2024-48570,0,0,a07030a76cd88cf2d077be21611e593db567eb3ed2799d5f3776bbda7ecbaf36,2024-10-23T15:12:34.673000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 -CVE-2024-48597,0,1,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000 +CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 -CVE-2024-48605,0,1,c6fe6d7786e01bf3c07bbcc6dab9ca443b7f4a840bac8f1d3880bbfc76bd164d,2024-10-23T15:12:34.673000 +CVE-2024-48605,0,0,c6fe6d7786e01bf3c07bbcc6dab9ca443b7f4a840bac8f1d3880bbfc76bd164d,2024-10-23T15:12:34.673000 CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000 CVE-2024-48622,0,0,4cd7a4b67551e1c7266b414b834e1956aa3a51a75d895e45be98bc89b06ddf81,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,d049076f927dcf309023eb7c4a1c5680d5c48a2a4bd2097c596ebfe8af0f8628,2024-10-16T16:38:43.170000 @@ -262544,21 +262568,21 @@ CVE-2024-48635,0,0,70acc62db2773972323caa582098c14d2ba0630ccd28542fd3671e2f06f9a CVE-2024-48636,0,0,a1b3046a0d6b06507f3010f4369f5a0d6853a8c7798cca6c53bc4bbbc77e9757,2024-10-18T12:52:33.507000 CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07e4e,2024-10-18T12:52:33.507000 CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000 -CVE-2024-48644,0,1,714259621a93750b61183872589245a3305e917af92df87963fd7418c19665a3,2024-10-23T15:12:34.673000 -CVE-2024-48645,0,1,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000 +CVE-2024-48644,0,0,714259621a93750b61183872589245a3305e917af92df87963fd7418c19665a3,2024-10-23T15:12:34.673000 +CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 -CVE-2024-48652,0,1,96c02e8d4c75f1bf63462842142fe98f41b6dc4da927ad34ea96e15f61f7ea58,2024-10-23T15:12:34.673000 -CVE-2024-48656,0,1,ad863fd78a40b8c92b425115b21a49889969a7ecfd85e7d47aa0814d4ed5e379,2024-10-23T15:12:34.673000 -CVE-2024-48657,0,1,62e751e359be22ac1cbdfa47cdea066e280077f08a29a781e1ee4c08a9e3e4f0,2024-10-23T15:12:34.673000 -CVE-2024-48659,0,1,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000 +CVE-2024-48652,0,1,49154ba7497ef192453221e4060c2b6cb066a0169e9fec9edb64b7bf9a759b2f,2024-10-23T16:35:10.103000 +CVE-2024-48656,0,1,06911636ae175250e7eba9c033b0f62399c743c3b4db83015eb8e3feed388fa8,2024-10-23T16:35:12.613000 +CVE-2024-48657,0,1,afc12b03b1c15f2615796b8fbdf85df41d5ecd218f5d5af67be92a52fc07a084,2024-10-23T16:35:13.890000 +CVE-2024-48659,0,0,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000 CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 -CVE-2024-48706,0,1,f713530be88e39bc26678bb907cef38003dcec08f4e06d8324296c8e4ff23ce3,2024-10-23T15:12:34.673000 -CVE-2024-48707,0,1,11d7dda87282e1f93592f9ed17a7b792c848338d8fc8576caa83ed8e9a59d7c5,2024-10-23T15:12:34.673000 -CVE-2024-48708,0,1,a3d087492c40739451e8f1e17f6bd6f3fe16ba5866242fef2c3de1daa457a1c3,2024-10-23T15:12:34.673000 -CVE-2024-48709,0,1,09a0506fcee26889d94982710596f7bcc50ff18fa38b0b5a0230c066edc673cb,2024-10-23T15:13:25.583000 +CVE-2024-48706,0,0,f713530be88e39bc26678bb907cef38003dcec08f4e06d8324296c8e4ff23ce3,2024-10-23T15:12:34.673000 +CVE-2024-48707,0,0,11d7dda87282e1f93592f9ed17a7b792c848338d8fc8576caa83ed8e9a59d7c5,2024-10-23T15:12:34.673000 +CVE-2024-48708,0,0,a3d087492c40739451e8f1e17f6bd6f3fe16ba5866242fef2c3de1daa457a1c3,2024-10-23T15:12:34.673000 +CVE-2024-48709,0,0,09a0506fcee26889d94982710596f7bcc50ff18fa38b0b5a0230c066edc673cb,2024-10-23T15:13:25.583000 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000 CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000 CVE-2024-48712,0,0,26c5ef0ec7563b7eb021e1452100a4e706852158c36c374f8078b72afb6523b7,2024-10-16T17:35:04.483000 @@ -262618,8 +262642,8 @@ CVE-2024-4888,0,0,3f4c58ee217cc87037d385e3cb53da7d318e33e3629509fa30ad3e92203777 CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000 CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000 CVE-2024-48902,0,0,fed2bf5b719b321f64381a649376d7e0618bda5baab6f732c38dcd1211106c26,2024-10-16T16:57:23.463000 -CVE-2024-48903,0,1,af1ee698040ee7f8c19b83dd0eb3404cde07c42231b0e3832a1aa5561c10194f,2024-10-23T15:12:34.673000 -CVE-2024-48904,0,1,56bc56ed1722c08287266703a07bddbd88211e3eebee5fa1d299ad65c198bf37,2024-10-23T15:12:34.673000 +CVE-2024-48903,0,0,af1ee698040ee7f8c19b83dd0eb3404cde07c42231b0e3832a1aa5561c10194f,2024-10-23T15:12:34.673000 +CVE-2024-48904,0,0,56bc56ed1722c08287266703a07bddbd88211e3eebee5fa1d299ad65c198bf37,2024-10-23T15:12:34.673000 CVE-2024-48909,0,0,67804b300a72fc34a54a9327f0b3a7a8082afb16b0051c28b942604285939f48,2024-10-17T17:56:11.130000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 CVE-2024-48911,0,0,f147f0790cf653449e8f662255582c7c922d3f40a3d15e4b98d08b1e5fd9c969,2024-10-17T21:13:37.147000 @@ -262627,14 +262651,14 @@ CVE-2024-48913,0,0,06d6a212c655b7ac1bbc6f5a3509e81cf89d4f1d83017b87d6e9303af3084 CVE-2024-48914,0,0,8775ce8f63d45f4e21be0399438c25117df9f166b6335c0adfec50056398fb57,2024-10-16T16:38:43.170000 CVE-2024-48915,0,0,53434c02f8cd9e61d046160183bd56a99da2a89b0bd423c79e06c9bddd2f90b1,2024-10-16T16:38:43.170000 CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923776,2024-10-18T12:53:04.627000 -CVE-2024-48919,0,1,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000 +CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 -CVE-2024-48925,0,1,3a078bcb4a89f0f86dd16bcf4b7d66e72e3ba5854d913637ee75a010ccd70548,2024-10-23T15:12:34.673000 -CVE-2024-48926,0,1,85f39ac2dcd7739b6ccfb6e70db444f1e5bc7351c40aca02df38e0890edc7565,2024-10-23T15:12:34.673000 -CVE-2024-48927,0,1,01a9606e87c9d0fe295b7af78c12d3892f336c8d52386afeb159eacf9a03d0c7,2024-10-23T15:12:34.673000 -CVE-2024-48929,0,1,8f42514e5e40293361141ad0a32c5cc2c18cee04cb42f38abe2f83b6fba170dd,2024-10-23T15:12:34.673000 +CVE-2024-48925,0,0,3a078bcb4a89f0f86dd16bcf4b7d66e72e3ba5854d913637ee75a010ccd70548,2024-10-23T15:12:34.673000 +CVE-2024-48926,0,0,85f39ac2dcd7739b6ccfb6e70db444f1e5bc7351c40aca02df38e0890edc7565,2024-10-23T15:12:34.673000 +CVE-2024-48927,0,0,01a9606e87c9d0fe295b7af78c12d3892f336c8d52386afeb159eacf9a03d0c7,2024-10-23T15:12:34.673000 +CVE-2024-48929,0,0,8f42514e5e40293361141ad0a32c5cc2c18cee04cb42f38abe2f83b6fba170dd,2024-10-23T15:12:34.673000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000 CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 @@ -262677,11 +262701,11 @@ CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d8 CVE-2024-49193,0,0,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000 CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714d45,2024-10-17T18:35:13.253000 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 -CVE-2024-49208,0,1,28d2e992b35e2e1ef94ebf877a0d80afe91b36d68188c2e8154f71c6c78a8978,2024-10-23T15:12:34.673000 -CVE-2024-49209,0,1,ab6c3083b5b8fa47a4348dad42de9ce31362f8f34855825cd8b57b8bf5b7437d,2024-10-23T15:12:34.673000 +CVE-2024-49208,0,0,28d2e992b35e2e1ef94ebf877a0d80afe91b36d68188c2e8154f71c6c78a8978,2024-10-23T15:12:34.673000 +CVE-2024-49209,0,0,ab6c3083b5b8fa47a4348dad42de9ce31362f8f34855825cd8b57b8bf5b7437d,2024-10-23T15:12:34.673000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 -CVE-2024-49210,0,1,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000 -CVE-2024-49211,0,1,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000 +CVE-2024-49210,0,0,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000 +CVE-2024-49211,0,0,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000 CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 CVE-2024-49215,0,0,76e95c9c81da96c4e5c4682f2ccc1a4d158465abcbc19e7e07b19566ffff8023,2024-10-22T20:35:12.140000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 @@ -262757,7 +262781,7 @@ CVE-2024-49282,0,0,3a6f5cd82ec68a1bfbe1f4f156ef6268706ea2c2772c6f37ca60ccaad2879 CVE-2024-49283,0,0,261a1f8cfe011441b757e2549150d49caf0cbd82863bcb1702fead1f8711ada8,2024-10-18T12:52:33.507000 CVE-2024-49284,0,0,bec1f0da1bcb0850e4841345e95550bca16d99530b59e5207d183ff1f4e1c3e0,2024-10-18T12:52:33.507000 CVE-2024-49285,0,0,6f46c329c3d1526d526943e0333d6d72992c68afd2913a4ef362b73e606f2e17,2024-10-18T12:52:33.507000 -CVE-2024-49286,0,0,108055b32dbabbf87208ba9b1a3515f81d2816f4819990e07d500b22b78f7766,2024-10-21T17:09:45.417000 +CVE-2024-49286,0,1,8c28a82bd9391036ea30ce185d824d073b6f340cb9bbf2f8121b077632895379,2024-10-23T16:13:37.823000 CVE-2024-49287,0,0,0066d2fce1ed85532c90a9906dc911278ca46d873038b8dcfb2d0c4b3b95c685,2024-10-18T12:52:33.507000 CVE-2024-49288,0,0,9794858fdab905561c3b5d43269f1d3f1bacba7fba1bb0436d9d456534b0053f,2024-10-18T12:52:33.507000 CVE-2024-49289,0,0,1007ec713acd15fdb5c2262f73a22207aad725968297cd9b79b0f4fcd3d741cb,2024-10-18T12:52:33.507000 @@ -262795,28 +262819,28 @@ CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b CVE-2024-49320,0,0,f646a0aed9b94f9c2a4b6085270ae6d0667dce332670da7784078783e12bfcb6,2024-10-18T12:52:33.507000 CVE-2024-49321,0,0,6ce68241db10c7838e4a51d2227fb9952bea2f4d972829a40692939256bd9db9,2024-10-21T17:09:45.417000 CVE-2024-49322,0,0,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000 -CVE-2024-49323,0,0,31588edf5efb1fb6420266f9d6a5ac9fb72acad257ee1a3b124e17a5d1cdca71,2024-10-21T17:09:45.417000 +CVE-2024-49323,0,1,2f124cdc22e81391d598884667e36f6fa2d8c8661fccd4b5b6bdeb72951248d2,2024-10-23T16:05:49.617000 CVE-2024-49324,0,0,6a0da56f8b241aa139bafdc8a7cea36b225bb8abdef936740223bb227ab67ca9,2024-10-21T17:09:45.417000 CVE-2024-49325,0,0,6361ff0a5fd3247f3dfc42142e1769d0dcf00cbc296a4736c789a8d3defd83f8,2024-10-22T18:33:59.793000 CVE-2024-49326,0,0,fda910b2c7a76bbf2c72386ba089c287f84555f7530f28eb58f294531de1ce7e,2024-10-21T17:09:45.417000 CVE-2024-49327,0,0,8b6c9aef8923e1de12a4d100640ad37448b7c34f1bbdc4fa10821a94ae1473e5,2024-10-21T17:09:45.417000 -CVE-2024-49328,0,0,e4f0eb619105a2fb9096e959f1de7a194eb985b50f07943c58f8f1beea5b5c79,2024-10-21T17:09:45.417000 +CVE-2024-49328,0,1,e330b5e89660f19abf213bec586eeaebe3d605cff140381953fa50ab8b0d1168,2024-10-23T17:08:31.910000 CVE-2024-49329,0,0,f70bf73589c931aa9ccbd5a8a6c329a32fe219888977f917a6e7137433e9c5b9,2024-10-21T17:09:45.417000 CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d17,2024-06-04T19:20:54.643000 CVE-2024-49330,0,0,7accf1e781f0aa61906365473fdf4af87b4754ed339a7ad495b0c4ebeff22d13,2024-10-21T17:09:45.417000 CVE-2024-49331,0,0,9ec402693291c894424e66eebc985f7e7ba3ce5bb7349cf58ad68284e18ecc68,2024-10-21T17:09:45.417000 CVE-2024-49332,0,0,a9ab39a4ab9de09d13501701addd6e3ccdaf63be93c7bf933ca946939905c6cb,2024-10-21T17:09:45.417000 -CVE-2024-49334,0,0,df99f33d90832b7913746eaa7f8520eb2745d74922012cf53ed47a6cdfd3843c,2024-10-21T17:09:45.417000 +CVE-2024-49334,0,1,bcc2db18f40dffe6c4f8472b0ef26870ffad9612f58222d9017252998c6947e3,2024-10-23T16:08:01.277000 CVE-2024-49335,0,0,e0582084d760a7c1b5edb6582a5c201af75fdc2362c78425525e3f7ed66f6ebc,2024-10-21T17:09:45.417000 CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000 CVE-2024-49340,0,0,37285f025630fd9eb79c4269f84ef859e190bfac2e34728b5f3d3dbad2273eb0,2024-10-16T16:38:14.557000 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e281007d,2024-10-21T17:10:22.857000 -CVE-2024-49366,0,1,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000 -CVE-2024-49367,0,1,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000 -CVE-2024-49368,0,1,7653bacc44e12cb471d1297a98c3c2ed197407d61a2b90effa86f38f0c320729,2024-10-23T15:13:58.783000 -CVE-2024-49370,1,1,b89a2e2ab1386e04b12ace31fb73f652b5a68972249f3ac22d026cdf90ce38d9,2024-10-23T15:15:31.987000 -CVE-2024-49373,0,1,d6a9e6f6c722f791a40f83e3b6a0acb632418ab99ccc19489aebf72e45099e53,2024-10-23T15:12:34.673000 +CVE-2024-49366,0,0,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000 +CVE-2024-49367,0,0,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000 +CVE-2024-49368,0,0,7653bacc44e12cb471d1297a98c3c2ed197407d61a2b90effa86f38f0c320729,2024-10-23T15:13:58.783000 +CVE-2024-49370,0,0,b89a2e2ab1386e04b12ace31fb73f652b5a68972249f3ac22d026cdf90ce38d9,2024-10-23T15:15:31.987000 +CVE-2024-49373,0,0,d6a9e6f6c722f791a40f83e3b6a0acb632418ab99ccc19489aebf72e45099e53,2024-10-23T15:12:34.673000 CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 @@ -262852,15 +262876,15 @@ CVE-2024-49580,0,0,2a4b2f9ee960712197ef0f3776cc1a15f015ed4f9adbe3a24755a9ff67152 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000 CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000 -CVE-2024-49604,0,1,4130a6c1f975a0d07098374dd7fb4ff2ab97718728858633e395173b92657205,2024-10-23T15:49:25.567000 +CVE-2024-49604,0,0,4130a6c1f975a0d07098374dd7fb4ff2ab97718728858633e395173b92657205,2024-10-23T15:49:25.567000 CVE-2024-49605,0,0,60247b99368f7bfa4039a3fcf801765c9601ec753a06227ddc6351d1c84fa963,2024-10-21T17:09:45.417000 -CVE-2024-49606,0,1,482f7b3a4b3cd8858d21ac066cc90df27186c596756677b41d202355300674a8,2024-10-23T15:49:41.503000 +CVE-2024-49606,0,0,482f7b3a4b3cd8858d21ac066cc90df27186c596756677b41d202355300674a8,2024-10-23T15:49:41.503000 CVE-2024-49607,0,0,65d4fe3b1dba2addf1a61a3c95e064bb0d23c04de7591f7f59b2b0d73eaf55e6,2024-10-21T17:09:45.417000 CVE-2024-49608,0,0,5d356ee42b416b0e34ac84baa67290c9c17b7c79aeab97e7f4d0a4ee1a8d45f5,2024-10-21T17:09:45.417000 CVE-2024-49609,0,0,58b5c9be468b513e3488cad4f69b335640bd2a9cfa84d94939a2898ec9a3cd0c,2024-10-21T17:09:45.417000 CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a111,2024-08-01T21:15:53.893000 CVE-2024-49610,0,0,4f883c779c7b80912a16a7cdc0e52ccc8dd24129efdfa293f6a1ccc1bf1526fe,2024-10-21T17:09:45.417000 -CVE-2024-49611,0,1,3c617deda14cf120c8b3fd2e3cd2ebc0e7d04f3285c76c5dbf7a0c701a6f6996,2024-10-23T15:49:58.247000 +CVE-2024-49611,0,0,3c617deda14cf120c8b3fd2e3cd2ebc0e7d04f3285c76c5dbf7a0c701a6f6996,2024-10-23T15:49:58.247000 CVE-2024-49612,0,0,acd6c0707ff81a9cd91d7e43f1e50373957b69b17c638b1ca230b26e66d303b8,2024-10-21T17:09:45.417000 CVE-2024-49613,0,0,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000 CVE-2024-49614,0,0,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000 @@ -262885,17 +262909,30 @@ CVE-2024-49630,0,0,fc02361dbe836b234c4f2baea1ce95c4f8783a553a50fe9d797af011750ca CVE-2024-49631,0,0,90e84d249ffc88bac8ba7984e2725c172d8e09dd6e795888b9ed719f758a8be8,2024-10-21T17:09:45.417000 CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000 CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000 +CVE-2024-49652,1,1,63a1a77d9344722b7ce84f9fce0c71bf466cdf71caf35501c4157d9f95e6cfbf,2024-10-23T16:15:06.027000 +CVE-2024-49653,1,1,cabe94aabbc3a6e987c199051f500173dd52ffdb4dbbdef8a887fba79c58778b,2024-10-23T16:15:06.243000 +CVE-2024-49657,1,1,3feb892112d8785b4c19043c1227d7402f03b3f28a246c01acca5e2956c4e377,2024-10-23T16:15:06.450000 +CVE-2024-49658,1,1,90534555efd21189e17c22b880e2e99c65c75f0f31d240c0ff09a4123d7d78d3,2024-10-23T16:15:06.660000 CVE-2024-4966,0,0,ca96dc16e6a41cb4de3af3c10d7787996b0688fd8eb0522e09efb3ad5052b418,2024-05-17T02:40:44.507000 +CVE-2024-49668,1,1,e7710d4d8726731abeedb04cd2c8fa120d9516d436d26fdf07c9c7b29dfa653b,2024-10-23T16:15:06.970000 +CVE-2024-49669,1,1,4278a1e99ad7b1ff3b1103fc15d0864ba47dbf49f079ddc29464646c7c69caeb,2024-10-23T16:15:07.330000 CVE-2024-4967,0,0,8025a234fc289bdab04f9acbdc2478b7155048b60320bc8b6b7a0758b314e3b9,2024-06-04T19:20:55.777000 -CVE-2024-49675,1,1,d445661173420aa7e4b075685c6d095d96fc1d203415958069ae9105144d20f8,2024-10-23T15:15:32.120000 +CVE-2024-49671,1,1,30b08b28f4cc7c0157ee303caff1fae3d001b3a4c48216094155b6a394653137,2024-10-23T16:15:08.260000 +CVE-2024-49675,0,0,d445661173420aa7e4b075685c6d095d96fc1d203415958069ae9105144d20f8,2024-10-23T15:15:32.120000 +CVE-2024-49676,1,1,adf778c2fd477e7e5057e7ea2756d44a60f9c4d6de9942b4e924dd314069dd4a,2024-10-23T16:15:09.040000 CVE-2024-4968,0,0,e5876599ebc72fb366518fd24786abd136bd58674cfc6b7ffb1fde29b7dfc2f8,2024-06-04T19:20:55.910000 +CVE-2024-49684,1,1,0df1aa091650d29739ebe68aedddc0d10b21c75ea4cfcefd1bc46ae636e494bc,2024-10-23T16:15:09.620000 CVE-2024-4969,0,0,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000 +CVE-2024-49690,1,1,44993f6e8c674969fbf7136b33117e24dfafbe9c462e5988b6e20da9e8be1fcd,2024-10-23T16:15:09.867000 CVE-2024-4970,0,0,57238e39937dd97cbba063724432adc0a3a93bd80ba7688359158539986e4d98,2024-06-24T19:30:39.397000 +CVE-2024-49701,1,1,0b801911bc5bb1d26c90e4cce5c7fd481c7a0370220cb9fd23885463c1ee1cf1,2024-10-23T16:15:10.097000 CVE-2024-4971,0,0,e1212bde7e83cc3c65186cf7cb8fd594e3ac7122768fa3e856e479fe91aac874,2024-05-22T12:46:53.887000 CVE-2024-4972,0,0,aca3b401df5f0f8efa87796dd64789aa2cecbea8af4c356f93adc161f1e5b552,2024-06-04T19:20:56.040000 CVE-2024-4973,0,0,c8cb9b832f42f8b36963a1241c53cb5d648196ebedc5ede632c88d17792d2e61,2024-06-04T19:20:56.140000 CVE-2024-4974,0,0,29381f582adec4042105cf6b841ea7b6d4575f99995b9ea6ba695d777207b6ba,2024-06-04T19:20:56.237000 CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c152070c,2024-06-04T19:20:56.337000 +CVE-2024-49751,1,1,f0da03eaf0fa0fe5013cf4c58e8a204e1366d4d59799530ff958dfe564a83247,2024-10-23T16:15:10.310000 +CVE-2024-49756,1,1,b5655066b00149d769468b534f1e69f5727939d90ec20aa7133e99682c961f40,2024-10-23T17:15:19.250000 CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000 CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 @@ -262904,232 +262941,232 @@ CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec5 CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000 CVE-2024-49850,0,0,2b33649e908446d8844acedbede0997555f012b73f46f17eddbc04e11a5ff156,2024-10-22T16:12:14.193000 -CVE-2024-49851,0,0,3d484e6abda4a4ce29d99f10316c857626eb63bf2eefc7621c465c7b13c23949,2024-10-21T17:09:45.417000 -CVE-2024-49852,0,0,262ffe2d9e462bcad9f414c5114ff048fe0027922ed23ed53a0208a484284b67,2024-10-21T17:09:45.417000 -CVE-2024-49853,0,0,c217dd9272b2cd4fab6ae4f4c0fffed7f5095340c59c640aa7cae9145dfe0c13,2024-10-21T17:09:45.417000 -CVE-2024-49854,0,0,94138472b5f74b096a6e54fd3e7d9e10ac0cdb3bdf0c5b3ece24fbd6184cc9bd,2024-10-21T17:09:45.417000 +CVE-2024-49851,0,1,fcbc0505724ce298c5cfc13db02dd0293eea0e5cdca10e81e7b2a1c3986ebf99,2024-10-23T16:00:52.597000 +CVE-2024-49852,0,1,baf4b17f13640a7cf91950497a6b1fb74fa9a8d9c08705e407866e197e0d2023,2024-10-23T16:14:01.857000 +CVE-2024-49853,0,1,0026350dbad28ce8ce15e61671659dd8168eb5ed41060a25109bce22f2cd20c8,2024-10-23T16:14:30.750000 +CVE-2024-49854,0,1,064537b2a77087bfea8dde0af1eed478f7eb8b6368bfcaef369e42fd6ea7a842,2024-10-23T16:29:32.857000 CVE-2024-49855,0,0,1c10554d37ca1638fe05ddaa09d6ac939fe9e21d5da77a220a4fa3ba8205886d,2024-10-22T16:12:27.030000 -CVE-2024-49856,0,0,69c6d5b77115b2740f272ad46ab48ff11264f8cb25014c56c24110ee5f0eca13,2024-10-21T17:09:45.417000 +CVE-2024-49856,0,1,e0709b06032173417a793b4a49a19eb6d6f50234f60b695d882b6319e269d48f,2024-10-23T16:33:20.857000 CVE-2024-49857,0,0,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000 -CVE-2024-49858,0,0,189a38e2e1729e4f650f5ed2d9949d8780bddccdc0a5c8eca5c522d45db87500,2024-10-21T17:09:45.417000 +CVE-2024-49858,0,1,d9505cdd63109929bf980b473026fdbc1d1592f1f84cad909d28ca3de57c6cff,2024-10-23T16:35:10.097000 CVE-2024-49859,0,0,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99aaa1,2024-10-22T16:13:03.267000 -CVE-2024-49860,0,0,f5150f7cf3bb2d2d0ca50e9d424c876fd9c84254fcf7bd6f2627024294f5ef2f,2024-10-21T17:09:45.417000 -CVE-2024-49861,0,0,f8d823d453896bd63aeb95297d35b7ca2209aad13429ece51e5e583706dfbad3,2024-10-21T17:09:45.417000 -CVE-2024-49862,0,0,0c94aa307fd6d2aeab9692641051191e71a94c4443ed0051d87097b98891acf2,2024-10-21T17:09:45.417000 -CVE-2024-49863,0,1,6b95c286ba526eda8fe740b407a6bfc7f237461b3b2da1ccf712f97bca3266df,2024-10-23T15:13:58.783000 -CVE-2024-49864,0,1,11ee8b000b9a62890a75dd63920e4a33890ab9d058f73a94a2fe3382caeb81d2,2024-10-23T15:13:58.783000 -CVE-2024-49865,0,1,7d0d3bc3b58e3a73b342518618670e0b0da74132af9460999190836dd7383f64,2024-10-23T15:13:58.783000 -CVE-2024-49866,0,1,64fdfad45770d631f65ff417b8e0b441a9ced54aafec781f55abff0506219420,2024-10-23T15:13:58.783000 -CVE-2024-49867,0,1,11525928326247994afa37f5f74290d14e35f5766721fa984acf8b349134099f,2024-10-23T15:13:58.783000 -CVE-2024-49868,0,1,6609c1a314b5164f8a7adeabef80c2a74cbb80bc7c2a2e5c84963dbc51c9cd4a,2024-10-23T15:13:58.783000 -CVE-2024-49869,0,1,d690b4f2f8651d319485a5bc5cca48765c250e0f74f356167c1a1d3ed44b7fd9,2024-10-23T15:13:58.783000 -CVE-2024-49870,0,1,bd25832bdab748cbefddb0beafc59ded25cc04cad6fd191b9be1b37f3e63d060,2024-10-23T15:13:58.783000 -CVE-2024-49871,0,1,ff3a0400aee2237325121a8977f8f422a8adc0802dd41c581f84b4b2b95f7591,2024-10-23T15:13:58.783000 -CVE-2024-49872,0,1,f6cbcd97baebde3f8280c71cb6b25b64732424c878389d8a2470cbdc55168647,2024-10-23T15:13:58.783000 -CVE-2024-49873,0,1,c6b069511598e461d2e296ba6e220ac16e5f671f4d49f2f2af9d3aa6afc61d05,2024-10-23T15:13:58.783000 -CVE-2024-49874,0,1,4f4502a656a6919bb0fc2df63ac79790c27837d9594594fa2f35c7d172253253,2024-10-23T15:13:58.783000 -CVE-2024-49875,0,1,82bafbcf170d072fa3aabc0828e31168f5d6064939d809bc95477f24f2a13491,2024-10-23T15:13:58.783000 -CVE-2024-49876,0,1,8b0326ebf02fdb04378f224329264d3e4924f0d6c498aeb91040e23ce7c118f6,2024-10-23T15:13:58.783000 -CVE-2024-49877,0,1,4d2cf7b07452ecc1c5625b6711f0af4f5f0d37ad629f5ad2378b696713e57584,2024-10-23T15:13:58.783000 -CVE-2024-49878,0,1,b8c9bc38c52857d113170f626183012a77e29f98422a41470a6d55d4836a25af,2024-10-23T15:13:58.783000 -CVE-2024-49879,0,1,a056ace805473862267f59e7ccc7d6e891ba0cc947c4146e51cc5d6a49e971c1,2024-10-23T15:13:58.783000 +CVE-2024-49860,0,1,58465836429dbe2e6aaf835a73a59e39240a71d370ac212d7b09986db7503b3c,2024-10-23T16:44:58.473000 +CVE-2024-49861,0,1,1653e7df85a45b515fcdc441f9cb9f122cb6f11d500f6cbca9f4d9d62723f07c,2024-10-23T16:48:47.573000 +CVE-2024-49862,0,1,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c511,2024-10-23T16:53:51.050000 +CVE-2024-49863,0,0,6b95c286ba526eda8fe740b407a6bfc7f237461b3b2da1ccf712f97bca3266df,2024-10-23T15:13:58.783000 +CVE-2024-49864,0,0,11ee8b000b9a62890a75dd63920e4a33890ab9d058f73a94a2fe3382caeb81d2,2024-10-23T15:13:58.783000 +CVE-2024-49865,0,0,7d0d3bc3b58e3a73b342518618670e0b0da74132af9460999190836dd7383f64,2024-10-23T15:13:58.783000 +CVE-2024-49866,0,0,64fdfad45770d631f65ff417b8e0b441a9ced54aafec781f55abff0506219420,2024-10-23T15:13:58.783000 +CVE-2024-49867,0,0,11525928326247994afa37f5f74290d14e35f5766721fa984acf8b349134099f,2024-10-23T15:13:58.783000 +CVE-2024-49868,0,0,6609c1a314b5164f8a7adeabef80c2a74cbb80bc7c2a2e5c84963dbc51c9cd4a,2024-10-23T15:13:58.783000 +CVE-2024-49869,0,0,d690b4f2f8651d319485a5bc5cca48765c250e0f74f356167c1a1d3ed44b7fd9,2024-10-23T15:13:58.783000 +CVE-2024-49870,0,0,bd25832bdab748cbefddb0beafc59ded25cc04cad6fd191b9be1b37f3e63d060,2024-10-23T15:13:58.783000 +CVE-2024-49871,0,0,ff3a0400aee2237325121a8977f8f422a8adc0802dd41c581f84b4b2b95f7591,2024-10-23T15:13:58.783000 +CVE-2024-49872,0,0,f6cbcd97baebde3f8280c71cb6b25b64732424c878389d8a2470cbdc55168647,2024-10-23T15:13:58.783000 +CVE-2024-49873,0,0,c6b069511598e461d2e296ba6e220ac16e5f671f4d49f2f2af9d3aa6afc61d05,2024-10-23T15:13:58.783000 +CVE-2024-49874,0,0,4f4502a656a6919bb0fc2df63ac79790c27837d9594594fa2f35c7d172253253,2024-10-23T15:13:58.783000 +CVE-2024-49875,0,0,82bafbcf170d072fa3aabc0828e31168f5d6064939d809bc95477f24f2a13491,2024-10-23T15:13:58.783000 +CVE-2024-49876,0,0,8b0326ebf02fdb04378f224329264d3e4924f0d6c498aeb91040e23ce7c118f6,2024-10-23T15:13:58.783000 +CVE-2024-49877,0,0,4d2cf7b07452ecc1c5625b6711f0af4f5f0d37ad629f5ad2378b696713e57584,2024-10-23T15:13:58.783000 +CVE-2024-49878,0,0,b8c9bc38c52857d113170f626183012a77e29f98422a41470a6d55d4836a25af,2024-10-23T15:13:58.783000 +CVE-2024-49879,0,0,a056ace805473862267f59e7ccc7d6e891ba0cc947c4146e51cc5d6a49e971c1,2024-10-23T15:13:58.783000 CVE-2024-4988,0,0,ff557f66f633c813e65ed42f6b56820b4233d3efc23d00548e6797ba166f3d35,2024-08-21T03:15:05.460000 -CVE-2024-49880,0,1,451749fefd67e74bbeb3c0f709643bae60f2a71eb71ec77d830a94e7a1231b73,2024-10-23T15:13:58.783000 -CVE-2024-49881,0,1,a457e708f151afe70f4353ab787a197eced712e7eb008a4ae460560f613817df,2024-10-23T15:13:58.783000 -CVE-2024-49882,0,1,e28c808ad906fdf2d8b42e0337e716f32ce905464511139ffb16f8cabedad72e,2024-10-23T15:13:58.783000 -CVE-2024-49883,0,1,9716a4fde73a53061a7723088c0d40d3adc026fa1e880e0f5c5a85406e7e81a1,2024-10-23T15:13:58.783000 -CVE-2024-49884,0,1,4253c12c5a9400a34fd27d4f356e84e2304acbdab19f2414b5baae55a96e79dd,2024-10-23T15:13:58.783000 -CVE-2024-49885,0,1,7454dd4079942ea8aa368264550142902e9d91264028a0091b5e06c3e31015df,2024-10-23T15:13:58.783000 -CVE-2024-49886,0,1,d058b0110cc7ae718a3f90fe7bd717654f8b8374ccdac41e3166fd761799644f,2024-10-23T15:13:58.783000 -CVE-2024-49887,0,1,e6db44b39cc00cffa6a621a85bfcf2139e4599af1b439fcb766e3952fb2c09b3,2024-10-23T15:13:58.783000 -CVE-2024-49888,0,1,3f840da09cb58e8af69d24768fab0f04d52756c1cab879ffca1acbd8ff14327a,2024-10-23T15:13:58.783000 -CVE-2024-49889,0,1,190f37570d0338921a636ba2218dc229dabb2e2bb6c7df0fb584b720e7afefb2,2024-10-23T15:13:58.783000 -CVE-2024-49890,0,1,0344bb4b2e74084bb110984cd7cb15fc17a111b45e887522ce53a453cda58527,2024-10-23T15:13:58.783000 -CVE-2024-49891,0,1,1525f71483987227d889f020192eb4227580ac422200b0b0c58dfa345d498522,2024-10-23T15:13:25.583000 -CVE-2024-49892,0,1,c1416ac252f04fdab07ec36316b59cdae9170438e2419997d80c63c42701d4fa,2024-10-23T15:13:25.583000 -CVE-2024-49893,0,1,9831c49185790cfdd9ccaad9659921768e47b7538b2b05ea48dd7276a3d1ca93,2024-10-23T15:13:25.583000 -CVE-2024-49894,0,1,9e36c91fccd71a8140e4661b6b035e0f2c06854597fe9bb3fc036e42471579cc,2024-10-23T15:13:25.583000 -CVE-2024-49895,0,1,41e5b854547bb803be9c30afa2de7e0107599d5fa73a1d8d46241692e713844c,2024-10-23T15:13:25.583000 -CVE-2024-49896,0,1,26c40820c78e7fc7ea4e6ce4517b7b5452a352e0b3fb1d66ca7b2a91957182b4,2024-10-23T15:13:25.583000 -CVE-2024-49897,0,1,f31524e1efc8ee5a9e73df951a18e06d10291aa5962ae940870f2cbc30aa66d4,2024-10-23T15:13:25.583000 -CVE-2024-49898,0,1,247f23f060bca110c174aebd26a3ab42b9046378866bc7395686d566934c61e2,2024-10-23T15:13:25.583000 -CVE-2024-49899,0,1,a5f0145e815e0fee4eb42b4cfc98f9b8063718c43f49bd73f572e98a3301f0b7,2024-10-23T15:13:25.583000 -CVE-2024-49900,0,1,27f48280c2f7cf39a5eb5145a0ea91dee32362c0db93202141cc5370b19a9f59,2024-10-23T15:13:25.583000 -CVE-2024-49901,0,1,4c85a2a78714f180373a34b94a0c3030c446af18abe94b8c49f4841c023b7714,2024-10-23T15:13:25.583000 -CVE-2024-49902,0,1,3fe235ed65651ec18a8b1f6f0acf83e71c546f542c12b0c09828768c24b587f6,2024-10-23T15:13:25.583000 -CVE-2024-49903,0,1,a24491d4460f7ff8c66718aba9a1813db830200c28e5f8ebbb1c5bef43c89198,2024-10-23T15:13:25.583000 -CVE-2024-49904,0,1,7493ac321f6503f4e18c67ad0882fc55725cebe44088b8d8d961e60946b59037,2024-10-23T15:13:25.583000 -CVE-2024-49905,0,1,f6d4bb38e504751abeb99921fa33f9b63c9d21977e49e0abf71389cfa4bfcb0c,2024-10-23T15:13:25.583000 -CVE-2024-49906,0,1,bc02a06059d7e4bf8cbdfa4a2b2ddf9d92454391d6584e67442bcc71973f4a1f,2024-10-23T15:13:25.583000 -CVE-2024-49907,0,1,9e990f0f6953b779a61ff9676576cfcc4256084e049815996b638d91cdbb48ea,2024-10-23T15:13:25.583000 -CVE-2024-49908,0,1,95ed439126a8afb52b0e6701669df52ce978a27865e9d4db0a44d2d2e924da6a,2024-10-23T15:13:25.583000 -CVE-2024-49909,0,1,13d040a3084d823f842eaafac8b778407821ff1f80eb4e8c0b4fdcc1a0fa17c6,2024-10-23T15:13:25.583000 +CVE-2024-49880,0,0,451749fefd67e74bbeb3c0f709643bae60f2a71eb71ec77d830a94e7a1231b73,2024-10-23T15:13:58.783000 +CVE-2024-49881,0,0,a457e708f151afe70f4353ab787a197eced712e7eb008a4ae460560f613817df,2024-10-23T15:13:58.783000 +CVE-2024-49882,0,0,e28c808ad906fdf2d8b42e0337e716f32ce905464511139ffb16f8cabedad72e,2024-10-23T15:13:58.783000 +CVE-2024-49883,0,0,9716a4fde73a53061a7723088c0d40d3adc026fa1e880e0f5c5a85406e7e81a1,2024-10-23T15:13:58.783000 +CVE-2024-49884,0,0,4253c12c5a9400a34fd27d4f356e84e2304acbdab19f2414b5baae55a96e79dd,2024-10-23T15:13:58.783000 +CVE-2024-49885,0,0,7454dd4079942ea8aa368264550142902e9d91264028a0091b5e06c3e31015df,2024-10-23T15:13:58.783000 +CVE-2024-49886,0,0,d058b0110cc7ae718a3f90fe7bd717654f8b8374ccdac41e3166fd761799644f,2024-10-23T15:13:58.783000 +CVE-2024-49887,0,0,e6db44b39cc00cffa6a621a85bfcf2139e4599af1b439fcb766e3952fb2c09b3,2024-10-23T15:13:58.783000 +CVE-2024-49888,0,0,3f840da09cb58e8af69d24768fab0f04d52756c1cab879ffca1acbd8ff14327a,2024-10-23T15:13:58.783000 +CVE-2024-49889,0,0,190f37570d0338921a636ba2218dc229dabb2e2bb6c7df0fb584b720e7afefb2,2024-10-23T15:13:58.783000 +CVE-2024-49890,0,0,0344bb4b2e74084bb110984cd7cb15fc17a111b45e887522ce53a453cda58527,2024-10-23T15:13:58.783000 +CVE-2024-49891,0,0,1525f71483987227d889f020192eb4227580ac422200b0b0c58dfa345d498522,2024-10-23T15:13:25.583000 +CVE-2024-49892,0,0,c1416ac252f04fdab07ec36316b59cdae9170438e2419997d80c63c42701d4fa,2024-10-23T15:13:25.583000 +CVE-2024-49893,0,0,9831c49185790cfdd9ccaad9659921768e47b7538b2b05ea48dd7276a3d1ca93,2024-10-23T15:13:25.583000 +CVE-2024-49894,0,0,9e36c91fccd71a8140e4661b6b035e0f2c06854597fe9bb3fc036e42471579cc,2024-10-23T15:13:25.583000 +CVE-2024-49895,0,0,41e5b854547bb803be9c30afa2de7e0107599d5fa73a1d8d46241692e713844c,2024-10-23T15:13:25.583000 +CVE-2024-49896,0,0,26c40820c78e7fc7ea4e6ce4517b7b5452a352e0b3fb1d66ca7b2a91957182b4,2024-10-23T15:13:25.583000 +CVE-2024-49897,0,0,f31524e1efc8ee5a9e73df951a18e06d10291aa5962ae940870f2cbc30aa66d4,2024-10-23T15:13:25.583000 +CVE-2024-49898,0,0,247f23f060bca110c174aebd26a3ab42b9046378866bc7395686d566934c61e2,2024-10-23T15:13:25.583000 +CVE-2024-49899,0,0,a5f0145e815e0fee4eb42b4cfc98f9b8063718c43f49bd73f572e98a3301f0b7,2024-10-23T15:13:25.583000 +CVE-2024-49900,0,0,27f48280c2f7cf39a5eb5145a0ea91dee32362c0db93202141cc5370b19a9f59,2024-10-23T15:13:25.583000 +CVE-2024-49901,0,0,4c85a2a78714f180373a34b94a0c3030c446af18abe94b8c49f4841c023b7714,2024-10-23T15:13:25.583000 +CVE-2024-49902,0,0,3fe235ed65651ec18a8b1f6f0acf83e71c546f542c12b0c09828768c24b587f6,2024-10-23T15:13:25.583000 +CVE-2024-49903,0,0,a24491d4460f7ff8c66718aba9a1813db830200c28e5f8ebbb1c5bef43c89198,2024-10-23T15:13:25.583000 +CVE-2024-49904,0,0,7493ac321f6503f4e18c67ad0882fc55725cebe44088b8d8d961e60946b59037,2024-10-23T15:13:25.583000 +CVE-2024-49905,0,0,f6d4bb38e504751abeb99921fa33f9b63c9d21977e49e0abf71389cfa4bfcb0c,2024-10-23T15:13:25.583000 +CVE-2024-49906,0,0,bc02a06059d7e4bf8cbdfa4a2b2ddf9d92454391d6584e67442bcc71973f4a1f,2024-10-23T15:13:25.583000 +CVE-2024-49907,0,0,9e990f0f6953b779a61ff9676576cfcc4256084e049815996b638d91cdbb48ea,2024-10-23T15:13:25.583000 +CVE-2024-49908,0,0,95ed439126a8afb52b0e6701669df52ce978a27865e9d4db0a44d2d2e924da6a,2024-10-23T15:13:25.583000 +CVE-2024-49909,0,0,13d040a3084d823f842eaafac8b778407821ff1f80eb4e8c0b4fdcc1a0fa17c6,2024-10-23T15:13:25.583000 CVE-2024-4991,0,0,3aef226cc1578adb6c75565d63e7f13bcda4a2e79607b48e5e73e305c3d938d8,2024-05-16T13:03:05.353000 -CVE-2024-49910,0,1,b4793afbd16ac7d4c0ce6e02119fadb79a120fa3376253eea321deeba57dc3dc,2024-10-23T15:13:25.583000 -CVE-2024-49911,0,1,4c2e0d573fea405ea2c1c28152a61bcc3051d0dd20cdb1f4dc086260ef4915bb,2024-10-23T15:13:25.583000 -CVE-2024-49912,0,1,5da3367789660570545892ef5eb1d06667f7f99b79f4999ae93a29d70eb8a6c3,2024-10-23T15:13:25.583000 -CVE-2024-49913,0,1,4a98967135c5998583dcc023672d8cebacab77d81b6764139e1fada1735c9c58,2024-10-23T15:13:25.583000 -CVE-2024-49914,0,1,6a6ae0984b6035b98733c78ccfd6d55ea4ecb9a2278e19dfbdc74ea925b0473c,2024-10-23T15:13:25.583000 -CVE-2024-49915,0,1,924f95aafb8601287a9689be42f161d3a7a7996d863f6de5cd4d353d0e11181c,2024-10-23T15:13:25.583000 -CVE-2024-49916,0,1,9c2aa99f8c03bd69d3fc4d4410e9e5fade85121470316deb114da79bbfa59b69,2024-10-23T15:13:25.583000 -CVE-2024-49917,0,1,a31e5012c070bbb68388b874fb6d7a930adf3546f34285c7bc9b062f7af47265,2024-10-23T15:13:25.583000 -CVE-2024-49918,0,1,81556e5177362c0cfcd74094ef34e5a7eeeeafca1c79215b0376843de610fc09,2024-10-23T15:13:25.583000 -CVE-2024-49919,0,1,b8220512b2f54a750ee311dbfda4f6730f8465019395efefcd7cd5e904006c7e,2024-10-23T15:13:25.583000 +CVE-2024-49910,0,0,b4793afbd16ac7d4c0ce6e02119fadb79a120fa3376253eea321deeba57dc3dc,2024-10-23T15:13:25.583000 +CVE-2024-49911,0,0,4c2e0d573fea405ea2c1c28152a61bcc3051d0dd20cdb1f4dc086260ef4915bb,2024-10-23T15:13:25.583000 +CVE-2024-49912,0,0,5da3367789660570545892ef5eb1d06667f7f99b79f4999ae93a29d70eb8a6c3,2024-10-23T15:13:25.583000 +CVE-2024-49913,0,0,4a98967135c5998583dcc023672d8cebacab77d81b6764139e1fada1735c9c58,2024-10-23T15:13:25.583000 +CVE-2024-49914,0,0,6a6ae0984b6035b98733c78ccfd6d55ea4ecb9a2278e19dfbdc74ea925b0473c,2024-10-23T15:13:25.583000 +CVE-2024-49915,0,0,924f95aafb8601287a9689be42f161d3a7a7996d863f6de5cd4d353d0e11181c,2024-10-23T15:13:25.583000 +CVE-2024-49916,0,0,9c2aa99f8c03bd69d3fc4d4410e9e5fade85121470316deb114da79bbfa59b69,2024-10-23T15:13:25.583000 +CVE-2024-49917,0,0,a31e5012c070bbb68388b874fb6d7a930adf3546f34285c7bc9b062f7af47265,2024-10-23T15:13:25.583000 +CVE-2024-49918,0,0,81556e5177362c0cfcd74094ef34e5a7eeeeafca1c79215b0376843de610fc09,2024-10-23T15:13:25.583000 +CVE-2024-49919,0,0,b8220512b2f54a750ee311dbfda4f6730f8465019395efefcd7cd5e904006c7e,2024-10-23T15:13:25.583000 CVE-2024-4992,0,0,e061228a83f2d41e21e64f404fd50aefb3a354b638438e4cf4870e41885d01e3,2024-05-16T13:03:05.353000 -CVE-2024-49920,0,1,1be42ef77ee9fc1c65ad81ab0dcd66fba1641a6fdde817094ddeecfb3f06d5d0,2024-10-23T15:13:25.583000 -CVE-2024-49921,0,1,6967ef728c2f67d4bb212d10da40edb6fbaf0fe7acdb581bbe0d307f401b8b13,2024-10-23T15:13:25.583000 -CVE-2024-49922,0,1,ca91ba7162cc32dc4e2cf14fb163208d854cd671aa75638cf4d3976a29621ea0,2024-10-23T15:13:25.583000 -CVE-2024-49923,0,1,82332cfea17dbcccff91a9f356a4aa30d314d8e49cbe8e60b1cf1638309ed2f5,2024-10-23T15:13:25.583000 -CVE-2024-49924,0,1,e3e9d77dac8e6a933e59737e42ece4edc4793234e163acb67d340babaa85575b,2024-10-23T15:13:25.583000 -CVE-2024-49925,0,1,6717452f4abf1a8f70ff5a0320447c3ada5e06f5537ce54743f004253e0476ee,2024-10-23T15:13:25.583000 -CVE-2024-49926,0,1,c340907a54f3f82bc1267ccf326bdc9da10ebc5c7cb46a2ab73c0d413d3ff7bf,2024-10-23T15:13:25.583000 -CVE-2024-49927,0,1,80092bd69a60e7db046e7721161bd2b361d15ecd0245c57dbfc59dd407a5dd94,2024-10-23T15:13:25.583000 -CVE-2024-49928,0,1,544457369adc751d5efb140eeaeee10b79f7211aecea480971d43213fefd498a,2024-10-23T15:13:25.583000 -CVE-2024-49929,0,1,9b521152d38f4615a7b12d9d048aaaff3ebdad923ec3ab76ad4d1026438745e1,2024-10-23T15:13:25.583000 +CVE-2024-49920,0,0,1be42ef77ee9fc1c65ad81ab0dcd66fba1641a6fdde817094ddeecfb3f06d5d0,2024-10-23T15:13:25.583000 +CVE-2024-49921,0,0,6967ef728c2f67d4bb212d10da40edb6fbaf0fe7acdb581bbe0d307f401b8b13,2024-10-23T15:13:25.583000 +CVE-2024-49922,0,0,ca91ba7162cc32dc4e2cf14fb163208d854cd671aa75638cf4d3976a29621ea0,2024-10-23T15:13:25.583000 +CVE-2024-49923,0,0,82332cfea17dbcccff91a9f356a4aa30d314d8e49cbe8e60b1cf1638309ed2f5,2024-10-23T15:13:25.583000 +CVE-2024-49924,0,0,e3e9d77dac8e6a933e59737e42ece4edc4793234e163acb67d340babaa85575b,2024-10-23T15:13:25.583000 +CVE-2024-49925,0,0,6717452f4abf1a8f70ff5a0320447c3ada5e06f5537ce54743f004253e0476ee,2024-10-23T15:13:25.583000 +CVE-2024-49926,0,0,c340907a54f3f82bc1267ccf326bdc9da10ebc5c7cb46a2ab73c0d413d3ff7bf,2024-10-23T15:13:25.583000 +CVE-2024-49927,0,0,80092bd69a60e7db046e7721161bd2b361d15ecd0245c57dbfc59dd407a5dd94,2024-10-23T15:13:25.583000 +CVE-2024-49928,0,0,544457369adc751d5efb140eeaeee10b79f7211aecea480971d43213fefd498a,2024-10-23T15:13:25.583000 +CVE-2024-49929,0,0,9b521152d38f4615a7b12d9d048aaaff3ebdad923ec3ab76ad4d1026438745e1,2024-10-23T15:13:25.583000 CVE-2024-4993,0,0,e0839a9575413089a3f10a1147258f2a987a3e24cb291a41fcab67561670893d,2024-05-16T13:03:05.353000 -CVE-2024-49930,0,1,e33a0f89b739a01814f632ae6fd71a4506b382062bc41fa4ca5b8f786929c03f,2024-10-23T15:13:25.583000 -CVE-2024-49931,0,1,0bf7cec4bcf233bcc5e67b03d626cf21e54f2688e5aa67100f6fa5b5cc24583e,2024-10-23T15:13:25.583000 -CVE-2024-49932,0,1,e5188c7ee1c1972b05d3687d2846a4c04fb0ddad3d4fdc696a14fd6fd5b3f9da,2024-10-23T15:13:25.583000 -CVE-2024-49933,0,1,19c189adea2c51f30368218900eaf8147078b0b49ef8fa469c43040d096ea648,2024-10-23T15:13:25.583000 -CVE-2024-49934,0,1,e37c6ce2db6489d7950418452ae8950ea036544ab18fb721f3040d7c2ecacadd,2024-10-23T15:13:25.583000 -CVE-2024-49935,0,1,47ec8d85e946423f2b5a7d6f760f5940e7dec7c60deca4cdde6ceadd824a68c0,2024-10-23T15:13:25.583000 -CVE-2024-49936,0,1,d7807b7818c4bb2d8ce0ec04aabb1f3544d5a8d9419132d6f08684cc8424e45d,2024-10-23T15:13:25.583000 -CVE-2024-49937,0,1,fbe6451c8c5411e80e94bbe8a5b20cc7de2c60b897db9c68851607b7663313dd,2024-10-23T15:13:25.583000 -CVE-2024-49938,0,1,b09fdb8ffc6d5bd9de59db6069511d5913a2762d8b413226026de2322576dd21,2024-10-23T15:13:25.583000 -CVE-2024-49939,0,1,402d43d358a15010064d110767edefebd01db49ff6b25ef8d93e0a2b850281ad,2024-10-23T15:13:25.583000 -CVE-2024-49940,0,1,2e190a7774264c10f5b4bfb57ed4ea08bed9643d1920281d3d935207593158d9,2024-10-23T15:13:25.583000 -CVE-2024-49941,0,1,c50bd07219a1423cc59298255706fb1962f26493f4a2a3e0fd35cb9777b6459b,2024-10-23T15:13:25.583000 -CVE-2024-49942,0,1,b98fb0b0c98b42d695c4c1ad854b813801232df1e1dddfded32eb0450b2fe18a,2024-10-23T15:13:25.583000 -CVE-2024-49943,0,1,c3614511322770c16ab293e578f901ae8604118536f12a561f6871b2e4e64082,2024-10-23T15:13:25.583000 -CVE-2024-49944,0,1,a5c39556d594e40e637b5d4bce6dabeb8fc6b6740ae1330c7d32ed8079defca7,2024-10-23T15:13:25.583000 -CVE-2024-49945,0,1,8830ebf94239bc1c89548ddf5790035646bb82b6726d019b6557ea104bc21136,2024-10-23T15:13:25.583000 -CVE-2024-49946,0,1,13a5d5811bf383f61044a773b4a572cf961b77975d398bb5002b0e276f496ca5,2024-10-23T15:13:25.583000 -CVE-2024-49947,0,1,5b75f252b800589f5cd5dfe41ee5a2f61df4165d1873b84f7f83f4b0ed7467aa,2024-10-23T15:13:25.583000 -CVE-2024-49948,0,1,95031996de193f661130830207de2692bfa108ccf827c14427716876b420acb6,2024-10-23T15:13:25.583000 -CVE-2024-49949,0,1,4b7cc6ad46e6fb02c30d561a1abf4d685b4716c9a9a63cb194665a262ed01dde,2024-10-23T15:13:25.583000 -CVE-2024-49950,0,1,b937b62baf2afe705487c80997d4737e2300cdf45c170203d8e2c83d4e18bd10,2024-10-23T15:13:25.583000 -CVE-2024-49951,0,1,b8f60d5ef8bd84dfe50bdc427eded9132dc5d0565199c187e518a0aa431c0f98,2024-10-23T15:13:25.583000 -CVE-2024-49952,0,1,eacfa13d5e4b6dd3f3d20e28896adb1fddd3533c2dd67578249a8ef8b4ca45d2,2024-10-23T15:13:25.583000 -CVE-2024-49953,0,1,b8a9bc733c66046dd903f078e23eb8ac6d568842a124d95c6b358ada4288e837,2024-10-23T15:13:25.583000 -CVE-2024-49954,0,1,2156082b776c1c996298ae4f0db53d4824ef35b37e49b72d874b5564fde8e048,2024-10-23T15:13:25.583000 -CVE-2024-49955,0,1,e7695a88ff3679ba8db0d0bea7fd9d2715977aa81cbfabae58d29cb095db5eec,2024-10-23T15:13:25.583000 -CVE-2024-49956,0,1,9a80f892654454ec2ae37af584ff200e3b3b49220884690e6cec1a0bebb68cfb,2024-10-23T15:13:25.583000 -CVE-2024-49957,0,1,ccf2bebe8f2fea0e2b1ffc0a1a86d722a1f4c92c0c11a254cc2af4563b239dbf,2024-10-23T15:13:25.583000 -CVE-2024-49958,0,1,b1ebc1ff3bae20b247885077e84e11d90e86e4e6cc4663e7a20bce8cb785db87,2024-10-23T15:13:25.583000 -CVE-2024-49959,0,1,fe4ecd654bcbd844d5c5f2f62134e451f680e3336be4294ef8d3e7baf3f259c4,2024-10-23T15:13:25.583000 -CVE-2024-49960,0,1,aa6bc327a0e56520d8d77885b3b337f7c9659310340931919f27ebac852153d1,2024-10-23T15:13:25.583000 -CVE-2024-49961,0,1,3670d75402fdb83bcd4895876fbf8a79a88caabf5691d9ccca791e5627785c19,2024-10-23T15:13:25.583000 -CVE-2024-49962,0,1,a204a5208aacb55b29013c53cf74adaad4bda721e3427e33373c6e53bdcab1c1,2024-10-23T15:13:25.583000 -CVE-2024-49963,0,1,2b2f3924927237848da0ce4db39b07cfa23ea57811f60b13338146ece598c290,2024-10-23T15:13:25.583000 -CVE-2024-49964,0,1,a3daf32d816def969df47ee2e8de5196da8c32fcc51b4fa6e88980ee02b891ef,2024-10-23T15:13:25.583000 -CVE-2024-49965,0,1,5017e4bbea441f34bb1695a3b7704c83c90f6308e3baa7512dac279c00198861,2024-10-23T15:13:25.583000 -CVE-2024-49966,0,1,3dd9d402aa195283567134637b94ebf05fd7aa88c1f417600ffa5b4bb2fa6e42,2024-10-23T15:13:25.583000 -CVE-2024-49967,0,1,f92f6192704c8d30fb1b877d6399c880863ff64783a228d60dfdd51b9d90f359,2024-10-23T15:13:25.583000 -CVE-2024-49968,0,1,19a93f4a6384a37e0e479ce1fc4610aee20a39bc275896118b96ca5904112124,2024-10-23T15:13:25.583000 -CVE-2024-49969,0,1,3f4b1951d217c2369704bd79d60ccf2c9671a1780f98d22e3235419fbb3c673d,2024-10-23T15:13:25.583000 +CVE-2024-49930,0,0,e33a0f89b739a01814f632ae6fd71a4506b382062bc41fa4ca5b8f786929c03f,2024-10-23T15:13:25.583000 +CVE-2024-49931,0,0,0bf7cec4bcf233bcc5e67b03d626cf21e54f2688e5aa67100f6fa5b5cc24583e,2024-10-23T15:13:25.583000 +CVE-2024-49932,0,0,e5188c7ee1c1972b05d3687d2846a4c04fb0ddad3d4fdc696a14fd6fd5b3f9da,2024-10-23T15:13:25.583000 +CVE-2024-49933,0,0,19c189adea2c51f30368218900eaf8147078b0b49ef8fa469c43040d096ea648,2024-10-23T15:13:25.583000 +CVE-2024-49934,0,0,e37c6ce2db6489d7950418452ae8950ea036544ab18fb721f3040d7c2ecacadd,2024-10-23T15:13:25.583000 +CVE-2024-49935,0,0,47ec8d85e946423f2b5a7d6f760f5940e7dec7c60deca4cdde6ceadd824a68c0,2024-10-23T15:13:25.583000 +CVE-2024-49936,0,0,d7807b7818c4bb2d8ce0ec04aabb1f3544d5a8d9419132d6f08684cc8424e45d,2024-10-23T15:13:25.583000 +CVE-2024-49937,0,0,fbe6451c8c5411e80e94bbe8a5b20cc7de2c60b897db9c68851607b7663313dd,2024-10-23T15:13:25.583000 +CVE-2024-49938,0,0,b09fdb8ffc6d5bd9de59db6069511d5913a2762d8b413226026de2322576dd21,2024-10-23T15:13:25.583000 +CVE-2024-49939,0,0,402d43d358a15010064d110767edefebd01db49ff6b25ef8d93e0a2b850281ad,2024-10-23T15:13:25.583000 +CVE-2024-49940,0,0,2e190a7774264c10f5b4bfb57ed4ea08bed9643d1920281d3d935207593158d9,2024-10-23T15:13:25.583000 +CVE-2024-49941,0,0,c50bd07219a1423cc59298255706fb1962f26493f4a2a3e0fd35cb9777b6459b,2024-10-23T15:13:25.583000 +CVE-2024-49942,0,0,b98fb0b0c98b42d695c4c1ad854b813801232df1e1dddfded32eb0450b2fe18a,2024-10-23T15:13:25.583000 +CVE-2024-49943,0,0,c3614511322770c16ab293e578f901ae8604118536f12a561f6871b2e4e64082,2024-10-23T15:13:25.583000 +CVE-2024-49944,0,0,a5c39556d594e40e637b5d4bce6dabeb8fc6b6740ae1330c7d32ed8079defca7,2024-10-23T15:13:25.583000 +CVE-2024-49945,0,0,8830ebf94239bc1c89548ddf5790035646bb82b6726d019b6557ea104bc21136,2024-10-23T15:13:25.583000 +CVE-2024-49946,0,0,13a5d5811bf383f61044a773b4a572cf961b77975d398bb5002b0e276f496ca5,2024-10-23T15:13:25.583000 +CVE-2024-49947,0,0,5b75f252b800589f5cd5dfe41ee5a2f61df4165d1873b84f7f83f4b0ed7467aa,2024-10-23T15:13:25.583000 +CVE-2024-49948,0,0,95031996de193f661130830207de2692bfa108ccf827c14427716876b420acb6,2024-10-23T15:13:25.583000 +CVE-2024-49949,0,0,4b7cc6ad46e6fb02c30d561a1abf4d685b4716c9a9a63cb194665a262ed01dde,2024-10-23T15:13:25.583000 +CVE-2024-49950,0,0,b937b62baf2afe705487c80997d4737e2300cdf45c170203d8e2c83d4e18bd10,2024-10-23T15:13:25.583000 +CVE-2024-49951,0,0,b8f60d5ef8bd84dfe50bdc427eded9132dc5d0565199c187e518a0aa431c0f98,2024-10-23T15:13:25.583000 +CVE-2024-49952,0,0,eacfa13d5e4b6dd3f3d20e28896adb1fddd3533c2dd67578249a8ef8b4ca45d2,2024-10-23T15:13:25.583000 +CVE-2024-49953,0,0,b8a9bc733c66046dd903f078e23eb8ac6d568842a124d95c6b358ada4288e837,2024-10-23T15:13:25.583000 +CVE-2024-49954,0,0,2156082b776c1c996298ae4f0db53d4824ef35b37e49b72d874b5564fde8e048,2024-10-23T15:13:25.583000 +CVE-2024-49955,0,0,e7695a88ff3679ba8db0d0bea7fd9d2715977aa81cbfabae58d29cb095db5eec,2024-10-23T15:13:25.583000 +CVE-2024-49956,0,0,9a80f892654454ec2ae37af584ff200e3b3b49220884690e6cec1a0bebb68cfb,2024-10-23T15:13:25.583000 +CVE-2024-49957,0,0,ccf2bebe8f2fea0e2b1ffc0a1a86d722a1f4c92c0c11a254cc2af4563b239dbf,2024-10-23T15:13:25.583000 +CVE-2024-49958,0,0,b1ebc1ff3bae20b247885077e84e11d90e86e4e6cc4663e7a20bce8cb785db87,2024-10-23T15:13:25.583000 +CVE-2024-49959,0,0,fe4ecd654bcbd844d5c5f2f62134e451f680e3336be4294ef8d3e7baf3f259c4,2024-10-23T15:13:25.583000 +CVE-2024-49960,0,0,aa6bc327a0e56520d8d77885b3b337f7c9659310340931919f27ebac852153d1,2024-10-23T15:13:25.583000 +CVE-2024-49961,0,0,3670d75402fdb83bcd4895876fbf8a79a88caabf5691d9ccca791e5627785c19,2024-10-23T15:13:25.583000 +CVE-2024-49962,0,0,a204a5208aacb55b29013c53cf74adaad4bda721e3427e33373c6e53bdcab1c1,2024-10-23T15:13:25.583000 +CVE-2024-49963,0,0,2b2f3924927237848da0ce4db39b07cfa23ea57811f60b13338146ece598c290,2024-10-23T15:13:25.583000 +CVE-2024-49964,0,0,a3daf32d816def969df47ee2e8de5196da8c32fcc51b4fa6e88980ee02b891ef,2024-10-23T15:13:25.583000 +CVE-2024-49965,0,0,5017e4bbea441f34bb1695a3b7704c83c90f6308e3baa7512dac279c00198861,2024-10-23T15:13:25.583000 +CVE-2024-49966,0,0,3dd9d402aa195283567134637b94ebf05fd7aa88c1f417600ffa5b4bb2fa6e42,2024-10-23T15:13:25.583000 +CVE-2024-49967,0,0,f92f6192704c8d30fb1b877d6399c880863ff64783a228d60dfdd51b9d90f359,2024-10-23T15:13:25.583000 +CVE-2024-49968,0,0,19a93f4a6384a37e0e479ce1fc4610aee20a39bc275896118b96ca5904112124,2024-10-23T15:13:25.583000 +CVE-2024-49969,0,0,3f4b1951d217c2369704bd79d60ccf2c9671a1780f98d22e3235419fbb3c673d,2024-10-23T15:13:25.583000 CVE-2024-4997,0,0,8869d8cee41a7f38be4f03ad1383841d0fd18dd2f92c0e8b0f0fd7c6f2096580,2024-06-04T16:57:41.053000 -CVE-2024-49970,0,1,05aca179b29c638548a8f21052c8ccbafdc943e81b23beda746307887e7bcbaf,2024-10-23T15:13:25.583000 -CVE-2024-49971,0,1,60c83f32ab70eca3cd14f38dc4040565edae34a7c11d6016f53aaf212ad0bc15,2024-10-23T15:13:25.583000 -CVE-2024-49972,0,1,985809352bdfeb655e911cb32258e8e8a65029ce7fe386242f6e0bc275afc60f,2024-10-23T15:13:25.583000 -CVE-2024-49973,0,1,cbc8317e69e991b61b33286118a69f0b5499d236a65e0770daff1dbdf352cd5d,2024-10-23T15:13:25.583000 -CVE-2024-49974,0,1,4d1ad9e69552c2546e3ebc37028a81d020f8c81c7e81067843bb3e0268b54a37,2024-10-23T15:13:25.583000 -CVE-2024-49975,0,1,77496d71dbdb1011dc9ff94c3d0cd336344267f57fcfac6b98755dbc72bb5eee,2024-10-23T15:13:25.583000 -CVE-2024-49976,0,1,13e58887358e60c5ecd8c88e2ec609c29a2b4dfca716f3d2e2465eaccc20989f,2024-10-23T15:13:25.583000 -CVE-2024-49977,0,1,d404101d9ba30145a428525398d400ce54caae55b8fe029e10181362c4f21c12,2024-10-23T15:13:25.583000 -CVE-2024-49978,0,1,d1d022627966490e425b664f8063a108568b0f5033ee2065467ad5efe1a2a3e8,2024-10-23T15:13:25.583000 -CVE-2024-49979,0,1,af031dedc92de72c54d427a92e62fc2853294f38d0fdf026f9d854688a1c6e3a,2024-10-23T15:13:25.583000 +CVE-2024-49970,0,0,05aca179b29c638548a8f21052c8ccbafdc943e81b23beda746307887e7bcbaf,2024-10-23T15:13:25.583000 +CVE-2024-49971,0,0,60c83f32ab70eca3cd14f38dc4040565edae34a7c11d6016f53aaf212ad0bc15,2024-10-23T15:13:25.583000 +CVE-2024-49972,0,0,985809352bdfeb655e911cb32258e8e8a65029ce7fe386242f6e0bc275afc60f,2024-10-23T15:13:25.583000 +CVE-2024-49973,0,0,cbc8317e69e991b61b33286118a69f0b5499d236a65e0770daff1dbdf352cd5d,2024-10-23T15:13:25.583000 +CVE-2024-49974,0,0,4d1ad9e69552c2546e3ebc37028a81d020f8c81c7e81067843bb3e0268b54a37,2024-10-23T15:13:25.583000 +CVE-2024-49975,0,0,77496d71dbdb1011dc9ff94c3d0cd336344267f57fcfac6b98755dbc72bb5eee,2024-10-23T15:13:25.583000 +CVE-2024-49976,0,0,13e58887358e60c5ecd8c88e2ec609c29a2b4dfca716f3d2e2465eaccc20989f,2024-10-23T15:13:25.583000 +CVE-2024-49977,0,0,d404101d9ba30145a428525398d400ce54caae55b8fe029e10181362c4f21c12,2024-10-23T15:13:25.583000 +CVE-2024-49978,0,0,d1d022627966490e425b664f8063a108568b0f5033ee2065467ad5efe1a2a3e8,2024-10-23T15:13:25.583000 +CVE-2024-49979,0,0,af031dedc92de72c54d427a92e62fc2853294f38d0fdf026f9d854688a1c6e3a,2024-10-23T15:13:25.583000 CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000 -CVE-2024-49980,0,1,1b7f876e1e74006c4cbc36f26a364fbc1043d115c2b25809299afdde070e9fbd,2024-10-23T15:13:25.583000 -CVE-2024-49981,0,1,abf3d30af0b7da12daa86f749619a258de3be687f035ffbcb225c27748b23822,2024-10-23T15:13:25.583000 -CVE-2024-49982,0,1,9677db1ad3aaa145e208c49ddeb7ec3d7018fb102c140cc722b06c22f2e07fa8,2024-10-23T15:13:25.583000 -CVE-2024-49983,0,1,a8ab82f4196f5cdde113b23acc0e392f7ce69758223b37afd8356b634ec56e89,2024-10-23T15:13:25.583000 -CVE-2024-49984,0,1,52132884d98254bcf3670a6c5035fab9415ac6c1e9ca87fbf0878fa15bfb5d0a,2024-10-23T15:13:25.583000 -CVE-2024-49985,0,1,6505f687f4eb9245242570ba51d30471acb035977a44ab969f22173c754f5a44,2024-10-23T15:13:25.583000 -CVE-2024-49986,0,1,6b9117399ead2b415f726daa5f92aa72211afcf4379d55baefe074f1577e4e88,2024-10-23T15:13:25.583000 -CVE-2024-49987,0,1,83561d5aa41b3c98ac3da73906c8dc7e2c585f0470372fd90d93ee13a1235673,2024-10-23T15:13:25.583000 -CVE-2024-49988,0,1,c7a60174b0a2907e13494050fdcc3cf96f4fcf64b06f52d88c7b2176f07fad68,2024-10-23T15:13:25.583000 -CVE-2024-49989,0,1,b0266992e9e68cde51259a4c15d0630c79796c1acece427b6a30c5a2dc4e9d03,2024-10-23T15:13:25.583000 +CVE-2024-49980,0,0,1b7f876e1e74006c4cbc36f26a364fbc1043d115c2b25809299afdde070e9fbd,2024-10-23T15:13:25.583000 +CVE-2024-49981,0,0,abf3d30af0b7da12daa86f749619a258de3be687f035ffbcb225c27748b23822,2024-10-23T15:13:25.583000 +CVE-2024-49982,0,0,9677db1ad3aaa145e208c49ddeb7ec3d7018fb102c140cc722b06c22f2e07fa8,2024-10-23T15:13:25.583000 +CVE-2024-49983,0,0,a8ab82f4196f5cdde113b23acc0e392f7ce69758223b37afd8356b634ec56e89,2024-10-23T15:13:25.583000 +CVE-2024-49984,0,0,52132884d98254bcf3670a6c5035fab9415ac6c1e9ca87fbf0878fa15bfb5d0a,2024-10-23T15:13:25.583000 +CVE-2024-49985,0,0,6505f687f4eb9245242570ba51d30471acb035977a44ab969f22173c754f5a44,2024-10-23T15:13:25.583000 +CVE-2024-49986,0,0,6b9117399ead2b415f726daa5f92aa72211afcf4379d55baefe074f1577e4e88,2024-10-23T15:13:25.583000 +CVE-2024-49987,0,0,83561d5aa41b3c98ac3da73906c8dc7e2c585f0470372fd90d93ee13a1235673,2024-10-23T15:13:25.583000 +CVE-2024-49988,0,0,c7a60174b0a2907e13494050fdcc3cf96f4fcf64b06f52d88c7b2176f07fad68,2024-10-23T15:13:25.583000 +CVE-2024-49989,0,0,b0266992e9e68cde51259a4c15d0630c79796c1acece427b6a30c5a2dc4e9d03,2024-10-23T15:13:25.583000 CVE-2024-4999,0,0,aeea1ad154336e8cbd739fb19642e978908300b067641ea9bc4ea587cb0b31ba,2024-05-16T15:44:44.683000 -CVE-2024-49990,0,1,e1d70beb5c3ac0c9d76d00adce179924ec0e97ef68d2e89f39fbefb01b11d6b7,2024-10-23T15:13:25.583000 -CVE-2024-49991,0,1,2fb930d0a7a3c2773f0499a4ac914a761eade3a99dfddc4271f3a9d058939c0f,2024-10-23T15:13:25.583000 -CVE-2024-49992,0,1,f0614aa14cd4a2b6ccac57cac86d4616d97c178a368e730c80c96253894fc745,2024-10-23T15:13:25.583000 -CVE-2024-49993,0,1,431e09872aad235bfcce9475c34ad382bc8db37c02902a317629c2ff678fa4dc,2024-10-23T15:13:25.583000 -CVE-2024-49994,0,1,0ec99d0f3759788296e81b13c827a29b7ece490ae9136187cd8cbf4199412c39,2024-10-23T15:13:25.583000 -CVE-2024-49995,0,1,b14274080bc6cde5e18285c4271101e0fd75dd4ad1b68ac92642bd34920a24f9,2024-10-23T15:13:25.583000 -CVE-2024-49996,0,1,09919f5bd92b6ffa4ceeb00f48af54ba697342e221271cbab43696a2c7a40ce0,2024-10-23T15:13:25.583000 -CVE-2024-49997,0,1,4f0d5cbc938668da4cca12e8619053d4fe51e93b90646e0ffb3c7559200d809e,2024-10-23T15:13:25.583000 -CVE-2024-49998,0,1,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000 -CVE-2024-49999,0,1,78b6148f41a15652bfa26256a49a5e5917d5dbd35564ac4e51ba7d691f423879,2024-10-23T15:13:25.583000 +CVE-2024-49990,0,0,e1d70beb5c3ac0c9d76d00adce179924ec0e97ef68d2e89f39fbefb01b11d6b7,2024-10-23T15:13:25.583000 +CVE-2024-49991,0,0,2fb930d0a7a3c2773f0499a4ac914a761eade3a99dfddc4271f3a9d058939c0f,2024-10-23T15:13:25.583000 +CVE-2024-49992,0,0,f0614aa14cd4a2b6ccac57cac86d4616d97c178a368e730c80c96253894fc745,2024-10-23T15:13:25.583000 +CVE-2024-49993,0,0,431e09872aad235bfcce9475c34ad382bc8db37c02902a317629c2ff678fa4dc,2024-10-23T15:13:25.583000 +CVE-2024-49994,0,0,0ec99d0f3759788296e81b13c827a29b7ece490ae9136187cd8cbf4199412c39,2024-10-23T15:13:25.583000 +CVE-2024-49995,0,0,b14274080bc6cde5e18285c4271101e0fd75dd4ad1b68ac92642bd34920a24f9,2024-10-23T15:13:25.583000 +CVE-2024-49996,0,0,09919f5bd92b6ffa4ceeb00f48af54ba697342e221271cbab43696a2c7a40ce0,2024-10-23T15:13:25.583000 +CVE-2024-49997,0,0,4f0d5cbc938668da4cca12e8619053d4fe51e93b90646e0ffb3c7559200d809e,2024-10-23T15:13:25.583000 +CVE-2024-49998,0,0,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000 +CVE-2024-49999,0,0,78b6148f41a15652bfa26256a49a5e5917d5dbd35564ac4e51ba7d691f423879,2024-10-23T15:13:25.583000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 -CVE-2024-50000,0,1,cec02897eadd69642a8478330d38fa15edaf3633d0d107bb46ad0cb4bf889d34,2024-10-23T15:13:25.583000 -CVE-2024-50001,0,1,886b8a582aeed728b3b4fd74e088fd22423f5fc4d8231c2d820afabe46d603d5,2024-10-23T15:13:25.583000 -CVE-2024-50002,0,1,7e826e0b3de3d65693e9dcc09edb35c05892be528b111a68d82dd8a04b1f2994,2024-10-23T15:13:25.583000 -CVE-2024-50003,0,1,318b4134c29bf882eea2c3b90b36a6f001c79495854be1fa1cd17567830c7826,2024-10-23T15:13:25.583000 -CVE-2024-50004,0,1,fe596401aaf26a0bb4fc90f2562faa93ddcac118926c98a71e59d59cbb14fac7,2024-10-23T15:13:25.583000 -CVE-2024-50005,0,1,71785d188823b2f1a674a1d58fa9bf202e420b9fbc567aaf86f41c900cbed7a5,2024-10-23T15:13:25.583000 -CVE-2024-50006,0,1,174a49f9baeb76f5d648cc15e7a84ec57785d5c83c45a196962bd5065ca2a699,2024-10-23T15:13:25.583000 -CVE-2024-50007,0,1,006f42f97bcdeb5fc8a89a08e9722f5109d1edf1bac5f56ec00ec3aca086f462,2024-10-23T15:13:25.583000 -CVE-2024-50008,0,1,cf18884f6df3df5c9ce0073b5f01db383272d1fb920974501c4f54c76c821365,2024-10-23T15:13:25.583000 -CVE-2024-50009,0,1,b25c89b587ef8f767a118a888203f26c1813b03ccfac66d7b88c177a8b952f96,2024-10-23T15:13:25.583000 +CVE-2024-50000,0,0,cec02897eadd69642a8478330d38fa15edaf3633d0d107bb46ad0cb4bf889d34,2024-10-23T15:13:25.583000 +CVE-2024-50001,0,0,886b8a582aeed728b3b4fd74e088fd22423f5fc4d8231c2d820afabe46d603d5,2024-10-23T15:13:25.583000 +CVE-2024-50002,0,0,7e826e0b3de3d65693e9dcc09edb35c05892be528b111a68d82dd8a04b1f2994,2024-10-23T15:13:25.583000 +CVE-2024-50003,0,0,318b4134c29bf882eea2c3b90b36a6f001c79495854be1fa1cd17567830c7826,2024-10-23T15:13:25.583000 +CVE-2024-50004,0,0,fe596401aaf26a0bb4fc90f2562faa93ddcac118926c98a71e59d59cbb14fac7,2024-10-23T15:13:25.583000 +CVE-2024-50005,0,0,71785d188823b2f1a674a1d58fa9bf202e420b9fbc567aaf86f41c900cbed7a5,2024-10-23T15:13:25.583000 +CVE-2024-50006,0,0,174a49f9baeb76f5d648cc15e7a84ec57785d5c83c45a196962bd5065ca2a699,2024-10-23T15:13:25.583000 +CVE-2024-50007,0,0,006f42f97bcdeb5fc8a89a08e9722f5109d1edf1bac5f56ec00ec3aca086f462,2024-10-23T15:13:25.583000 +CVE-2024-50008,0,0,cf18884f6df3df5c9ce0073b5f01db383272d1fb920974501c4f54c76c821365,2024-10-23T15:13:25.583000 +CVE-2024-50009,0,0,b25c89b587ef8f767a118a888203f26c1813b03ccfac66d7b88c177a8b952f96,2024-10-23T15:13:25.583000 CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000 -CVE-2024-50010,0,1,719c9dfbef8438b722e214bb4144425701839515de68fd900ca2439cbf367998,2024-10-23T15:13:25.583000 -CVE-2024-50011,0,1,980130793609ba85d978ac3897743b36e06d03e5578449cd8463c6a50ef6140e,2024-10-23T15:13:25.583000 -CVE-2024-50012,0,1,6824ea7cd046916e5a46602bc6bf106039cd8c4524a0aa5c1d68ccb97cc90580,2024-10-23T15:13:25.583000 -CVE-2024-50013,0,1,e7dcb33b5a8b3baabdc44a24528c311c52a525f369b10c0876273d89b7dc19b8,2024-10-23T15:13:25.583000 -CVE-2024-50014,0,1,1b9d9129c629d7a256ee3df690e7fe663397d99e76b77d5144d84fc7840136c0,2024-10-23T15:13:25.583000 -CVE-2024-50015,0,1,6d4bf18cde3e91eef710a5b6ca23cc98ba4179d8758cab4bc07f83164bcd0fab,2024-10-23T15:13:25.583000 -CVE-2024-50016,0,1,150cc155a5101207172a6ab21de9b50c216ceecbad4a50f73bb2b1561ac16362,2024-10-23T15:13:25.583000 -CVE-2024-50017,0,1,4fcef121f58bca52e096970b6b422944c415a23596af63574c5ac44a02eb4de0,2024-10-23T15:13:25.583000 -CVE-2024-50018,0,1,0ab552b7de0854c620630fdbc4c5dd46fd08e7915ae706c165d1b10fd64bea68,2024-10-23T15:13:25.583000 -CVE-2024-50019,0,1,99e77dd699dbe9a522853392f88ef6266dc3d0a01734496b75cba5bdb8aef72f,2024-10-23T15:12:34.673000 +CVE-2024-50010,0,0,719c9dfbef8438b722e214bb4144425701839515de68fd900ca2439cbf367998,2024-10-23T15:13:25.583000 +CVE-2024-50011,0,0,980130793609ba85d978ac3897743b36e06d03e5578449cd8463c6a50ef6140e,2024-10-23T15:13:25.583000 +CVE-2024-50012,0,0,6824ea7cd046916e5a46602bc6bf106039cd8c4524a0aa5c1d68ccb97cc90580,2024-10-23T15:13:25.583000 +CVE-2024-50013,0,0,e7dcb33b5a8b3baabdc44a24528c311c52a525f369b10c0876273d89b7dc19b8,2024-10-23T15:13:25.583000 +CVE-2024-50014,0,0,1b9d9129c629d7a256ee3df690e7fe663397d99e76b77d5144d84fc7840136c0,2024-10-23T15:13:25.583000 +CVE-2024-50015,0,0,6d4bf18cde3e91eef710a5b6ca23cc98ba4179d8758cab4bc07f83164bcd0fab,2024-10-23T15:13:25.583000 +CVE-2024-50016,0,0,150cc155a5101207172a6ab21de9b50c216ceecbad4a50f73bb2b1561ac16362,2024-10-23T15:13:25.583000 +CVE-2024-50017,0,0,4fcef121f58bca52e096970b6b422944c415a23596af63574c5ac44a02eb4de0,2024-10-23T15:13:25.583000 +CVE-2024-50018,0,0,0ab552b7de0854c620630fdbc4c5dd46fd08e7915ae706c165d1b10fd64bea68,2024-10-23T15:13:25.583000 +CVE-2024-50019,0,0,99e77dd699dbe9a522853392f88ef6266dc3d0a01734496b75cba5bdb8aef72f,2024-10-23T15:12:34.673000 CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf875190207207,2024-08-01T13:59:37.720000 -CVE-2024-50020,0,1,411f12f61c92a528485eff6d7c3ae3c74ad69154b48f54563f0b8203992999de,2024-10-23T15:12:34.673000 -CVE-2024-50021,0,1,ff4b3176fa12cf909811c80c853a89d71c3fe0bbbbefcbf82bbfff4512213e7e,2024-10-23T15:12:34.673000 -CVE-2024-50022,0,1,ea418e48f6505f27f5db2025c81734733949c8de5ba46fcbcb6d0ffa98a3cc17,2024-10-23T15:12:34.673000 -CVE-2024-50023,0,1,439a0fe98f12f9d7d705bbe6bc5fced5ee3b2f50f863bc6f6833062fce3be5c0,2024-10-23T15:12:34.673000 -CVE-2024-50024,0,1,48c5c81407c92e4819c5004b2f1a0f924c1171ce728f5887bef940da75b05309,2024-10-23T15:12:34.673000 -CVE-2024-50025,0,1,c18eec9799463d58747187173a379279804fb3bd44cdd70ace4fc4c67cf8994a,2024-10-23T15:12:34.673000 -CVE-2024-50026,0,1,8c359b43a83ed1f500f190e5655944e29d49cfecebb7baaf0d603b29102f3148,2024-10-23T15:12:34.673000 -CVE-2024-50027,0,1,f3793817d49adb3d8a1f6f18c6ee3a297e09900f04a0e68dca6150f747a239d3,2024-10-23T15:12:34.673000 -CVE-2024-50028,0,1,4dca9dda6427e2b77ea004dac42687b499391510225f390364dba3406e2be0a1,2024-10-23T15:12:34.673000 -CVE-2024-50029,0,1,5f6107d7d4831614ddc9053b9e55e8540424e84fb4dc9d79b8ce0bbe1b1d84d6,2024-10-23T15:12:34.673000 +CVE-2024-50020,0,0,411f12f61c92a528485eff6d7c3ae3c74ad69154b48f54563f0b8203992999de,2024-10-23T15:12:34.673000 +CVE-2024-50021,0,0,ff4b3176fa12cf909811c80c853a89d71c3fe0bbbbefcbf82bbfff4512213e7e,2024-10-23T15:12:34.673000 +CVE-2024-50022,0,0,ea418e48f6505f27f5db2025c81734733949c8de5ba46fcbcb6d0ffa98a3cc17,2024-10-23T15:12:34.673000 +CVE-2024-50023,0,0,439a0fe98f12f9d7d705bbe6bc5fced5ee3b2f50f863bc6f6833062fce3be5c0,2024-10-23T15:12:34.673000 +CVE-2024-50024,0,0,48c5c81407c92e4819c5004b2f1a0f924c1171ce728f5887bef940da75b05309,2024-10-23T15:12:34.673000 +CVE-2024-50025,0,0,c18eec9799463d58747187173a379279804fb3bd44cdd70ace4fc4c67cf8994a,2024-10-23T15:12:34.673000 +CVE-2024-50026,0,0,8c359b43a83ed1f500f190e5655944e29d49cfecebb7baaf0d603b29102f3148,2024-10-23T15:12:34.673000 +CVE-2024-50027,0,0,f3793817d49adb3d8a1f6f18c6ee3a297e09900f04a0e68dca6150f747a239d3,2024-10-23T15:12:34.673000 +CVE-2024-50028,0,0,4dca9dda6427e2b77ea004dac42687b499391510225f390364dba3406e2be0a1,2024-10-23T15:12:34.673000 +CVE-2024-50029,0,0,5f6107d7d4831614ddc9053b9e55e8540424e84fb4dc9d79b8ce0bbe1b1d84d6,2024-10-23T15:12:34.673000 CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000 -CVE-2024-50030,0,1,0347086f25dca26915e1436dcfd2de7f4b8fab3635e9fbe7eb8d2175af5dab95,2024-10-23T15:12:34.673000 -CVE-2024-50031,0,1,cc20af791cbec3a7c1c3bd59071b20e2915a6a03702994dd9f9650b8797df511,2024-10-23T15:12:34.673000 -CVE-2024-50032,0,1,9431344800434d7ee15e18d71c026f970a422c249ecc1b3c7c4159bc2d6ab597,2024-10-23T15:12:34.673000 -CVE-2024-50033,0,1,c4783e4124030a679795d5a36f640033093e5797281cfae939df4742960d09ed,2024-10-23T15:12:34.673000 -CVE-2024-50034,0,1,36b290bc69fb0970f5239d91ff72d9a2ae2fe9bece8fba61d1e7bb3293756060,2024-10-23T15:12:34.673000 -CVE-2024-50035,0,1,627272532496610a9cf027bbba85665ddf6863f7df3ac770ae831e28bf6db798,2024-10-23T15:12:34.673000 -CVE-2024-50036,0,1,28901e0166f56dd1988eca00f958e5283f611146fde3cc7b000114e6ee533ed9,2024-10-23T15:12:34.673000 -CVE-2024-50037,0,1,4ee031bfddc4e8f99ddb949f282f6ad1a356c779ae1c3537126fd37e56dbeca8,2024-10-23T15:12:34.673000 -CVE-2024-50038,0,1,13f261ea139b7c77c532175eab38c9e4be7c3afe3db507ae1ed5105376d28292,2024-10-23T15:12:34.673000 -CVE-2024-50039,0,1,75801edb89c7be222bf7c69a5ad76563c04d4f50df342fe887cbc18b83b75ff9,2024-10-23T15:12:34.673000 +CVE-2024-50030,0,0,0347086f25dca26915e1436dcfd2de7f4b8fab3635e9fbe7eb8d2175af5dab95,2024-10-23T15:12:34.673000 +CVE-2024-50031,0,0,cc20af791cbec3a7c1c3bd59071b20e2915a6a03702994dd9f9650b8797df511,2024-10-23T15:12:34.673000 +CVE-2024-50032,0,0,9431344800434d7ee15e18d71c026f970a422c249ecc1b3c7c4159bc2d6ab597,2024-10-23T15:12:34.673000 +CVE-2024-50033,0,0,c4783e4124030a679795d5a36f640033093e5797281cfae939df4742960d09ed,2024-10-23T15:12:34.673000 +CVE-2024-50034,0,0,36b290bc69fb0970f5239d91ff72d9a2ae2fe9bece8fba61d1e7bb3293756060,2024-10-23T15:12:34.673000 +CVE-2024-50035,0,0,627272532496610a9cf027bbba85665ddf6863f7df3ac770ae831e28bf6db798,2024-10-23T15:12:34.673000 +CVE-2024-50036,0,0,28901e0166f56dd1988eca00f958e5283f611146fde3cc7b000114e6ee533ed9,2024-10-23T15:12:34.673000 +CVE-2024-50037,0,0,4ee031bfddc4e8f99ddb949f282f6ad1a356c779ae1c3537126fd37e56dbeca8,2024-10-23T15:12:34.673000 +CVE-2024-50038,0,0,13f261ea139b7c77c532175eab38c9e4be7c3afe3db507ae1ed5105376d28292,2024-10-23T15:12:34.673000 +CVE-2024-50039,0,0,75801edb89c7be222bf7c69a5ad76563c04d4f50df342fe887cbc18b83b75ff9,2024-10-23T15:12:34.673000 CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000 -CVE-2024-50040,0,1,981131558689eff63e7408bc26260009c579c8ae379b09b9fc858d45385e4ec1,2024-10-23T15:12:34.673000 -CVE-2024-50041,0,1,fef3c0699535cb60d05a11827c9c4db8904e57356336ade90447872a123f9f27,2024-10-23T15:12:34.673000 -CVE-2024-50042,0,1,47d7a84ed9d469b00f4e210ab7562f73a18e6669a1c07a4576676ffef293e83f,2024-10-23T15:12:34.673000 -CVE-2024-50043,0,1,6fa8e9fd6b09a93abfe49cae2c2b3b9e1564d5e68284b44e286cd6f9b0d9f6f1,2024-10-23T15:12:34.673000 -CVE-2024-50044,0,1,99adc3b386d7b0b967167aa7a713bc7f801d66056d94b4526b6f57fba90cb805,2024-10-23T15:12:34.673000 -CVE-2024-50045,0,1,fe55a30d3128e36327b37c82ba94a1ff0132cabb54f3adbbcc568b84d8fc966e,2024-10-23T15:12:34.673000 -CVE-2024-50046,0,1,4e255f676ca189e5e9e50101b26a65e95afe2fd8c7d6b981181f54054bdf130d,2024-10-23T15:12:34.673000 -CVE-2024-50047,0,1,2b207a2a293c77a5b4c3a31569dc164f8277d0179d455cd9b507078393309111,2024-10-23T15:12:34.673000 -CVE-2024-50048,0,1,bbd23138e80805a57e396cc9887dad63617290c67454d76acda269e557ea2f54,2024-10-23T15:12:34.673000 -CVE-2024-50049,0,1,09afa0a2be58ba607560df205b0898b8b28ee2e6ee587a6115c8699c00e8bc60,2024-10-23T15:12:34.673000 +CVE-2024-50040,0,0,981131558689eff63e7408bc26260009c579c8ae379b09b9fc858d45385e4ec1,2024-10-23T15:12:34.673000 +CVE-2024-50041,0,0,fef3c0699535cb60d05a11827c9c4db8904e57356336ade90447872a123f9f27,2024-10-23T15:12:34.673000 +CVE-2024-50042,0,0,47d7a84ed9d469b00f4e210ab7562f73a18e6669a1c07a4576676ffef293e83f,2024-10-23T15:12:34.673000 +CVE-2024-50043,0,0,6fa8e9fd6b09a93abfe49cae2c2b3b9e1564d5e68284b44e286cd6f9b0d9f6f1,2024-10-23T15:12:34.673000 +CVE-2024-50044,0,0,99adc3b386d7b0b967167aa7a713bc7f801d66056d94b4526b6f57fba90cb805,2024-10-23T15:12:34.673000 +CVE-2024-50045,0,0,fe55a30d3128e36327b37c82ba94a1ff0132cabb54f3adbbcc568b84d8fc966e,2024-10-23T15:12:34.673000 +CVE-2024-50046,0,0,4e255f676ca189e5e9e50101b26a65e95afe2fd8c7d6b981181f54054bdf130d,2024-10-23T15:12:34.673000 +CVE-2024-50047,0,0,2b207a2a293c77a5b4c3a31569dc164f8277d0179d455cd9b507078393309111,2024-10-23T15:12:34.673000 +CVE-2024-50048,0,0,bbd23138e80805a57e396cc9887dad63617290c67454d76acda269e557ea2f54,2024-10-23T15:12:34.673000 +CVE-2024-50049,0,0,09afa0a2be58ba607560df205b0898b8b28ee2e6ee587a6115c8699c00e8bc60,2024-10-23T15:12:34.673000 CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506ca,2024-10-15T12:58:51.050000 -CVE-2024-50050,1,1,75d86e88f7994c1f3b20bb87cac7d396514a1e4ee924d9d29743f3bd699759ce,2024-10-23T15:12:34.673000 -CVE-2024-50055,0,1,10b598d3a0269b0f307eaabbc2b716f722fcf5535b65c85d86a0eaf85ce88670,2024-10-23T15:12:34.673000 -CVE-2024-50056,0,1,67d5758c0ace6615570a11511305d2b63ab44abb1709d3f0417dc90e404e22ad,2024-10-23T15:12:34.673000 -CVE-2024-50057,0,1,f555ac9c828db06432a047b9e7eb871f60ff001319e6c1d4d6ade5425ae58ba9,2024-10-23T15:12:34.673000 -CVE-2024-50058,0,1,c4f2f522ded53fa0475123933c29f621ce5dd5483ec6a179037df3352956be04,2024-10-23T15:12:34.673000 -CVE-2024-50059,0,1,1a780b20170c340af075dbf31665516511f24a1a8d6b1513298259637be6503b,2024-10-23T15:12:34.673000 +CVE-2024-50050,0,0,75d86e88f7994c1f3b20bb87cac7d396514a1e4ee924d9d29743f3bd699759ce,2024-10-23T15:12:34.673000 +CVE-2024-50055,0,0,10b598d3a0269b0f307eaabbc2b716f722fcf5535b65c85d86a0eaf85ce88670,2024-10-23T15:12:34.673000 +CVE-2024-50056,0,0,67d5758c0ace6615570a11511305d2b63ab44abb1709d3f0417dc90e404e22ad,2024-10-23T15:12:34.673000 +CVE-2024-50057,0,0,f555ac9c828db06432a047b9e7eb871f60ff001319e6c1d4d6ade5425ae58ba9,2024-10-23T15:12:34.673000 +CVE-2024-50058,0,0,c4f2f522ded53fa0475123933c29f621ce5dd5483ec6a179037df3352956be04,2024-10-23T15:12:34.673000 +CVE-2024-50059,0,0,1a780b20170c340af075dbf31665516511f24a1a8d6b1513298259637be6503b,2024-10-23T15:12:34.673000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 -CVE-2024-50060,0,1,01f3d5625dc49ef407dd1399459de4e55c9dc18499ec441f495a2f6b728ede8c,2024-10-23T15:12:34.673000 -CVE-2024-50061,0,1,bc3a7751cc02130d6e355a5fd87d288a623ee842a3c5388e63bd720da58709ae,2024-10-23T15:12:34.673000 -CVE-2024-50062,0,1,1537eaa0ebc19268aec1be9df183deb52cc4159c434eceb6998e096f5503bcf3,2024-10-23T15:12:34.673000 -CVE-2024-50063,0,1,1d1881a47d554fc29d203efb6c8521669e1b28611f2bbf99ab231399dab599e1,2024-10-23T15:12:34.673000 -CVE-2024-50064,0,1,c980eae6fee1a420ecee8691838857535f4e51105a3766ff7633430adb0de9f6,2024-10-23T15:12:34.673000 -CVE-2024-50065,0,1,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 -CVE-2024-50066,0,1,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 +CVE-2024-50060,0,0,01f3d5625dc49ef407dd1399459de4e55c9dc18499ec441f495a2f6b728ede8c,2024-10-23T15:12:34.673000 +CVE-2024-50061,0,0,bc3a7751cc02130d6e355a5fd87d288a623ee842a3c5388e63bd720da58709ae,2024-10-23T15:12:34.673000 +CVE-2024-50062,0,0,1537eaa0ebc19268aec1be9df183deb52cc4159c434eceb6998e096f5503bcf3,2024-10-23T15:12:34.673000 +CVE-2024-50063,0,0,1d1881a47d554fc29d203efb6c8521669e1b28611f2bbf99ab231399dab599e1,2024-10-23T15:12:34.673000 +CVE-2024-50064,0,0,c980eae6fee1a420ecee8691838857535f4e51105a3766ff7633430adb0de9f6,2024-10-23T15:12:34.673000 +CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 +CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000 CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000 CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 @@ -263149,8 +263186,8 @@ CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 -CVE-2024-50311,0,1,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c644,2024-10-23T15:12:34.673000 -CVE-2024-50312,0,1,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000 +CVE-2024-50311,0,0,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c644,2024-10-23T15:12:34.673000 +CVE-2024-50312,0,0,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 @@ -263158,6 +263195,8 @@ CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a8 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 +CVE-2024-50382,1,1,ef507e79e3a47cb5db46886c833025ed9d096f55ed6dede99fee1d7a588181b0,2024-10-23T17:15:19.453000 +CVE-2024-50383,1,1,b31f839fb6680eaf55759b6413c371459ae54edfc8f56e29ccc0f46b2b3bc113,2024-10-23T17:15:19.540000 CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000 CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000 @@ -263804,7 +263843,7 @@ CVE-2024-5760,0,0,84cde3c23d2d2e368735b1ee1e1e7d1f39f88e3f7859decf6fc372d134ed6f CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-5762,0,0,d5bc2d8a653cdaa83874769146506405c53a3f453aeae45d89ba66c89c40de90,2024-08-23T16:43:19.497000 CVE-2024-5763,0,0,d5febd3ba0b5169f42bc622129fe03814ec411b220c3b4a777b37231365ea7a6,2024-09-03T20:31:30.480000 -CVE-2024-5764,1,1,31e3298afdc9cd74c2730b21de915c71c5c8497c7f903dd9b130cd3900e69e30,2024-10-23T15:15:32.340000 +CVE-2024-5764,0,0,31e3298afdc9cd74c2730b21de915c71c5c8497c7f903dd9b130cd3900e69e30,2024-10-23T15:15:32.340000 CVE-2024-5765,0,0,79117abfade54ce3ab13d72bbbbedb2fc58ed3797b29d0ebf953e2abb4b24073,2024-08-01T13:59:59.193000 CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000 CVE-2024-5767,0,0,8d9d357fa8f1e1cae5533e88ea0736375963b6a4fbe13fa9a151a36ba280f19a,2024-07-09T16:23:07.280000 @@ -264016,7 +264055,7 @@ CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000 CVE-2024-6008,0,0,e339bd5f37f67074a3982bb584c73bf8dda0cb7cd7304fe99aa6ea6d9b2ef2e4,2024-07-19T14:52:08.110000 CVE-2024-6009,0,0,e0a24374cca31358971f963f7084d5ca791c42b65310b9cca023d09b825a9a06,2024-07-19T14:24:41.657000 -CVE-2024-6010,0,0,9104535df21a1431ad42e6d9e59129c501fb935838444267e4a5cb842fd77f25,2024-09-26T16:06:15.677000 +CVE-2024-6010,0,1,f082d782a73125c90d5c3919967d1d860f24e2a0398351b6dc15b1f6cc88a3c4,2024-10-23T16:15:10.483000 CVE-2024-6011,0,0,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000 CVE-2024-6012,0,0,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000 CVE-2024-6013,0,0,dd5aadcad9485c7b63e2c76668a62eba788e1248615fab9fd06bf5aaf41af2a9,2024-07-19T14:20:07.337000 @@ -265312,7 +265351,7 @@ CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b107435220335 CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cda6,2024-08-08T20:54:35.117000 CVE-2024-7584,0,0,58c542dacfa48ee04742b2465e6c98b02792727755b744f4b1b1705eb4a002a6,2024-09-11T19:25:04.143000 CVE-2024-7585,0,0,c8cbc83b6349dead88df56624342a371a1668d621fa6cda31e8fc0e9835fc3d7,2024-09-11T19:32:34.007000 -CVE-2024-7587,0,1,b086df9ba9c9e35cb68175a78444a97a0037f8982487b6f9056de9a978eca195,2024-10-23T15:12:34.673000 +CVE-2024-7587,0,0,b086df9ba9c9e35cb68175a78444a97a0037f8982487b6f9056de9a978eca195,2024-10-23T15:12:34.673000 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 @@ -265994,7 +266033,7 @@ CVE-2024-8488,0,0,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f99 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8499,0,0,a066f12eb0db45b577c1044e88855b3e531b0d4e8e1575f5845b6487effebb39,2024-10-04T13:50:43.727000 -CVE-2024-8500,0,1,b9ac05910a5b7e1a6e51770e5450f02754b11b55ccc3b4b83d62180b3722d198,2024-10-23T15:12:34.673000 +CVE-2024-8500,0,0,b9ac05910a5b7e1a6e51770e5450f02754b11b55ccc3b4b83d62180b3722d198,2024-10-23T15:12:34.673000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000 CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53 @@ -266202,7 +266241,7 @@ CVE-2024-8802,0,0,8bf5ff4db31e0529cbd08652ac36154d0a1e65a032bdeeb095aa4e8638ac05 CVE-2024-8803,0,0,1e0c20c4da3042f287bedde6aa980588230b643699023347d741bb81db132ef8,2024-10-02T17:15:12.677000 CVE-2024-8804,0,0,08d968e195b0f36220a0a723a12b9b939996510ce1ddcb52b8152a63b9728d80,2024-10-10T20:56:49.403000 CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000 -CVE-2024-8852,0,1,6e707f169e582bf83d369eb398c611abfab4370a43b37b2dee2a472eac3455de,2024-10-23T15:12:34.673000 +CVE-2024-8852,0,0,6e707f169e582bf83d369eb398c611abfab4370a43b37b2dee2a472eac3455de,2024-10-23T15:12:34.673000 CVE-2024-8853,0,0,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000 CVE-2024-8858,0,0,a55a2b45b2b7a3f3c60e0d8077307a88defc4d63f2b498893a25b1463c90c22f,2024-10-02T18:41:29.067000 CVE-2024-8861,0,0,d76e122800aa09ccce1d9be4ecd54fe7a1857f12f95213a173e1ba2fbaa723db,2024-10-01T13:41:27.213000 @@ -266231,7 +266270,7 @@ CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775b CVE-2024-8892,0,0,b5404a9c6df12d8f66b57eddda13f138d35d7b48bdd71ae1e8b3a805c49716e0,2024-10-07T17:10:26.673000 CVE-2024-8897,0,0,73bf9affb964d11dd95d3adbb34f86a16b9ae0fd786e64b4bbd48b1e4387bb49,2024-09-25T19:49:02.493000 CVE-2024-8900,0,0,7e1ef63767445d80c050e52e96753e1c9a46fb23d2b1e0137f2a2c5bdcba53e3,2024-10-01T16:15:10.293000 -CVE-2024-8901,0,1,5296fd97c17e19a2d9fe2e0dab7936fdd9516207bfc538f5a85aa6e6692205b3,2024-10-23T15:12:34.673000 +CVE-2024-8901,0,0,5296fd97c17e19a2d9fe2e0dab7936fdd9516207bfc538f5a85aa6e6692205b3,2024-10-23T15:12:34.673000 CVE-2024-8902,0,0,e5dace8ff5577040ad4e028bf354543120981f772810138844b5cb4413778526,2024-10-15T12:57:46.880000 CVE-2024-8903,0,0,2ce54562e46551a15b98a64a6437d41656e447939ac76ef855f5d59decf764b8,2024-09-26T13:32:55.343000 CVE-2024-8904,0,0,d8dcf25b3cbae62dbf75fa5380e6989346805c7240b139b8d28c46adffd353f1,2024-09-20T12:30:51.220000 @@ -266279,7 +266318,7 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000 -CVE-2024-8980,0,1,894cfd0b1733edb37c8d2e45f12b2b4473bfabbb5f8f90f6649787e6fa72a1d3,2024-10-23T15:12:34.673000 +CVE-2024-8980,0,0,894cfd0b1733edb37c8d2e45f12b2b4473bfabbb5f8f90f6649787e6fa72a1d3,2024-10-23T15:12:34.673000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 @@ -266326,7 +266365,7 @@ CVE-2024-9046,0,0,8656f1201ca0039377fd822b96252cedb47d7d532a98f822fda06fa6ad4421 CVE-2024-9047,0,0,4ea7d0b1b11f6de8ec31e11947f5e76892006c92ffae382a37fca981e56bba3b,2024-10-15T12:57:46.880000 CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000 CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000 -CVE-2024-9050,0,1,8ac1b90da19d750d070a32f9119a6a0ab35aa6b65dec91c9f80b3bbab527b059,2024-10-23T15:12:34.673000 +CVE-2024-9050,0,0,8ac1b90da19d750d070a32f9119a6a0ab35aa6b65dec91c9f80b3bbab527b059,2024-10-23T15:12:34.673000 CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000 CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000 CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000 @@ -266379,7 +266418,7 @@ CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c6 CVE-2024-9124,0,0,ed784b79f60c57333454c5582ccee1e6855416a99a054b161105f40c65181fb5,2024-10-10T12:56:30.817000 CVE-2024-9125,0,0,178fee32dc964661b9c65fa72adfd723833bc712092eacf5141ac942799ac520,2024-10-01T14:00:52.460000 CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a8a,2024-10-01T14:09:26.017000 -CVE-2024-9129,0,1,156eaf7bc9b578e645b2cd31b998e3c79292935e3b301a3570b23f38eb7c94cd,2024-10-23T15:12:34.673000 +CVE-2024-9129,0,0,156eaf7bc9b578e645b2cd31b998e3c79292935e3b301a3570b23f38eb7c94cd,2024-10-23T15:12:34.673000 CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000 CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a1f,2024-10-01T14:28:31.027000 CVE-2024-9137,0,0,264d67370ab0f50b8c3f1048814084fcd11d0d542a946dd3f8623532739c7355,2024-10-15T12:57:46.880000 @@ -266431,7 +266470,7 @@ CVE-2024-9222,0,0,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931 CVE-2024-9224,0,0,1efb870d30ff5afb9078703fdeff1bc29463ebfa0c91ad435c25d902219ffec9,2024-10-07T19:19:38.157000 CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409ea,2024-10-07T20:24:41.420000 CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000 -CVE-2024-9231,0,1,d9b97ab1a46e2ec8ce00428658a043128c841292d1f959cb3918d04f7f0f3dde,2024-10-23T15:12:34.673000 +CVE-2024-9231,0,0,d9b97ab1a46e2ec8ce00428658a043128c841292d1f959cb3918d04f7f0f3dde,2024-10-23T15:12:34.673000 CVE-2024-9232,0,0,a07f526496bb68b184ee001c7d6cd9744d3cb563b91260e8d60bd9b70cac4bda,2024-10-15T12:58:51.050000 CVE-2024-9234,0,0,304bee6ceb91eca0cdc00d7cdc49b4c339c82fe3a2287348525c06a570d629da,2024-10-15T12:58:51.050000 CVE-2024-9237,0,0,fb69e6f6fcfba2cfafb660a24001833586540d01b0ed897e2ee22df678729e15,2024-10-16T15:10:08.390000 @@ -266460,7 +266499,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000 -CVE-2024-9287,0,1,01199c404d57b1e8eecbc65367d66af6a025095a110abc1f609ce03c8e993fb9,2024-10-23T15:12:34.673000 +CVE-2024-9287,0,0,01199c404d57b1e8eecbc65367d66af6a025095a110abc1f609ce03c8e993fb9,2024-10-23T15:12:34.673000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000 @@ -266589,7 +266628,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296 CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000 CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000 -CVE-2024-9530,0,1,c8501e0bb039e166d52c4ac8c3106fb221a4406a702b0c3915afb70bff44dc96,2024-10-23T15:12:34.673000 +CVE-2024-9530,0,0,c8501e0bb039e166d52c4ac8c3106fb221a4406a702b0c3915afb70bff44dc96,2024-10-23T15:12:34.673000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000 CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 @@ -266599,7 +266638,7 @@ CVE-2024-9537,0,0,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794a CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000 CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000 CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000 -CVE-2024-9541,0,1,fbfc6bf257239e94a920ef8216e53bcd44e7b1a868cd0ef0ec6d341767434436,2024-10-23T15:12:34.673000 +CVE-2024-9541,0,0,fbfc6bf257239e94a920ef8216e53bcd44e7b1a868cd0ef0ec6d341767434436,2024-10-23T15:12:34.673000 CVE-2024-9543,0,0,2a7de8e1e43a15761699f58c8b8bbb57c7e560a2fb555c13127ead0f3f3c7fd9,2024-10-15T12:58:51.050000 CVE-2024-9546,0,0,ea5318b51e997216e9c0b4c2992b7385f781b09c9935f9fcf746ecd59aedacb8,2024-10-17T13:34:27.890000 CVE-2024-9548,0,0,23f20b2ca80b43ded081582273555d31a6ef11043d80544e9c344a73e21ef886,2024-10-17T13:46:07.997000 @@ -266633,13 +266672,13 @@ CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5 CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000 CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000 CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000 -CVE-2024-9583,0,1,96a827cbc19af74fe76ad020e867993041c429a8306e57b84a2f78dbfd5710d1,2024-10-23T15:12:34.673000 +CVE-2024-9583,0,0,96a827cbc19af74fe76ad020e867993041c429a8306e57b84a2f78dbfd5710d1,2024-10-23T15:12:34.673000 CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000 -CVE-2024-9588,0,1,65aff2b1cd3b1280d8083f78d790697b85257a07a6c6e6516ccebd73625a92dc,2024-10-23T15:12:34.673000 -CVE-2024-9589,0,1,12420b2f38d2c93f0b54cb162fd986b1e3bc035cb82aa25afa709b3dca72935b,2024-10-23T15:12:34.673000 -CVE-2024-9590,0,1,f04908a66c8eee122a17cc23cd10db8f2eac72ab6acc6c9d623f58ed2f5d06ed,2024-10-23T15:12:34.673000 -CVE-2024-9591,0,1,18f850846f634f78ac97108e7dec46e1c5c5e29d9be70684269dc0702592824d,2024-10-23T15:12:34.673000 +CVE-2024-9588,0,0,65aff2b1cd3b1280d8083f78d790697b85257a07a6c6e6516ccebd73625a92dc,2024-10-23T15:12:34.673000 +CVE-2024-9589,0,0,12420b2f38d2c93f0b54cb162fd986b1e3bc035cb82aa25afa709b3dca72935b,2024-10-23T15:12:34.673000 +CVE-2024-9590,0,0,f04908a66c8eee122a17cc23cd10db8f2eac72ab6acc6c9d623f58ed2f5d06ed,2024-10-23T15:12:34.673000 +CVE-2024-9591,0,0,18f850846f634f78ac97108e7dec46e1c5c5e29d9be70684269dc0702592824d,2024-10-23T15:12:34.673000 CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000 CVE-2024-9593,0,0,cce5b3ee491d6630c052fcb33edfbddbd5dba3d44ec1ac1a1bc92ad9d40ee350,2024-10-21T17:10:22.857000 CVE-2024-9594,0,0,76152af657dea527c4e562a1c5799c4834f4bf18cf4ca885159373bfd78ad4ca,2024-10-16T16:38:14.557000 @@ -266654,7 +266693,7 @@ CVE-2024-9620,0,0,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf7 CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000 CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000 CVE-2024-9623,0,0,86dd85464498f6d194e548538328537f5fc627208085718de66c1a06e69de686,2024-10-16T16:59:36.817000 -CVE-2024-9627,0,1,ab5726be759a332c53fc28be3ad1e688481f8077248af16a587354d8ff7a5b98,2024-10-23T15:12:34.673000 +CVE-2024-9627,0,0,ab5726be759a332c53fc28be3ad1e688481f8077248af16a587354d8ff7a5b98,2024-10-23T15:12:34.673000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615f9,2024-10-16T16:38:14.557000 CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000 @@ -266665,7 +266704,7 @@ CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 CVE-2024-9676,0,0,d31717e3bcb8586d94edf5a821882c847af5c510cf5d1e8e5ea8ab53ee1286ab,2024-10-16T16:38:43.170000 -CVE-2024-9677,0,1,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 +CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000 CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f185407,2024-10-18T12:52:33.507000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 @@ -266717,7 +266756,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47 CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000 CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 -CVE-2024-9829,0,1,29ca684ca29e3e308110c39b518fe6192e70d69bdef130a555a51f12503b47bb,2024-10-23T15:12:34.673000 +CVE-2024-9829,0,0,29ca684ca29e3e308110c39b518fe6192e70d69bdef130a555a51f12503b47bb,2024-10-23T15:12:34.673000 CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 @@ -266760,12 +266799,12 @@ CVE-2024-9922,0,0,88ad74a9a80ef6250cad160a6da905c26f5539449069265fbdbc38c65f6e69 CVE-2024-9923,0,0,1744d806aab87c1cbef5524d43cf9cad10cdae75dc6a2cfd8b34f2d3877dca94,2024-10-15T12:57:46.880000 CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000 CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000 -CVE-2024-9927,0,1,96920f248127734453deaf748492c280118aa5ea5b9c599a9138ad17f83910cb,2024-10-23T15:12:34.673000 +CVE-2024-9927,0,0,96920f248127734453deaf748492c280118aa5ea5b9c599a9138ad17f83910cb,2024-10-23T15:12:34.673000 CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000 CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000 CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000 CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000 -CVE-2024-9947,0,1,6d7ad994cc9a7fac36825c8cc7c424fb9dcf9e1f8fd3a9311a9b488ef62fd2d0,2024-10-23T15:12:34.673000 +CVE-2024-9947,0,0,6d7ad994cc9a7fac36825c8cc7c424fb9dcf9e1f8fd3a9311a9b488ef62fd2d0,2024-10-23T15:12:34.673000 CVE-2024-9951,0,0,5d941c75af8c4072e469beaa1d6ae2855b0ca23ecdce87314ecd326f6a54014a,2024-10-18T12:52:33.507000 CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000 CVE-2024-9953,0,0,d45e8bc6b31e34e84fbff0a12af100dea5cf3de9adda836e3ebc3a7410262455,2024-10-17T20:59:01.940000 @@ -266800,4 +266839,4 @@ CVE-2024-9983,0,0,05b40e9cfe77e2a0c57e66e13edd76f3cb7232b22c3913645dde67dce84859 CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539a9,2024-10-16T22:03:23.407000 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000 -CVE-2024-9987,0,1,2fc9d3fa3d6f4a94d8c02299e2f4be1487dde9c0790750bfc65dc5695ac94c18,2024-10-23T15:12:34.673000 +CVE-2024-9987,0,0,2fc9d3fa3d6f4a94d8c02299e2f4be1487dde9c0790750bfc65dc5695ac94c18,2024-10-23T15:12:34.673000