From 57510cfd466265993d917cd4949cf3367825094e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 31 Oct 2024 17:03:21 +0000 Subject: [PATCH] Auto-Update: 2024-10-31T17:00:20.597318+00:00 --- CVE-2021/CVE-2021-470xx/CVE-2021-47034.json | 27 +- CVE-2021/CVE-2021-470xx/CVE-2021-47099.json | 27 +- CVE-2021/CVE-2021-471xx/CVE-2021-47147.json | 27 +- CVE-2021/CVE-2021-472xx/CVE-2021-47228.json | 27 +- CVE-2021/CVE-2021-473xx/CVE-2021-47333.json | 27 +- CVE-2021/CVE-2021-474xx/CVE-2021-47432.json | 27 +- CVE-2021/CVE-2021-474xx/CVE-2021-47471.json | 39 +- CVE-2022/CVE-2022-303xx/CVE-2022-30356.json | 58 ++- CVE-2022/CVE-2022-303xx/CVE-2022-30357.json | 58 ++- CVE-2022/CVE-2022-303xx/CVE-2022-30358.json | 58 ++- CVE-2022/CVE-2022-303xx/CVE-2022-30359.json | 58 ++- CVE-2022/CVE-2022-303xx/CVE-2022-30360.json | 58 ++- CVE-2022/CVE-2022-303xx/CVE-2022-30361.json | 58 ++- CVE-2023/CVE-2023-242xx/CVE-2023-24204.json | 39 +- CVE-2023/CVE-2023-252xx/CVE-2023-25200.json | 39 +- CVE-2023/CVE-2023-313xx/CVE-2023-31310.json | 14 +- CVE-2023/CVE-2023-346xx/CVE-2023-34669.json | 14 +- CVE-2023/CVE-2023-356xx/CVE-2023-35692.json | 14 +- CVE-2023/CVE-2023-382xx/CVE-2023-38299.json | 27 +- CVE-2023/CVE-2023-384xx/CVE-2023-38405.json | 14 +- CVE-2023/CVE-2023-503xx/CVE-2023-50355.json | 62 +++- CVE-2023/CVE-2023-525xx/CVE-2023-52508.json | 39 +- CVE-2023/CVE-2023-525xx/CVE-2023-52541.json | 39 +- CVE-2023/CVE-2023-526xx/CVE-2023-52617.json | 27 +- CVE-2023/CVE-2023-526xx/CVE-2023-52631.json | 39 +- CVE-2023/CVE-2023-527xx/CVE-2023-52776.json | 27 +- CVE-2023/CVE-2023-528xx/CVE-2023-52811.json | 27 +- CVE-2024/CVE-2024-00xx/CVE-2024-0016.json | 39 +- CVE-2024/CVE-2024-05xx/CVE-2024-0561.json | 39 +- CVE-2024/CVE-2024-08xx/CVE-2024-0881.json | 27 +- CVE-2024/CVE-2024-102xx/CVE-2024-10226.json | 64 +++- CVE-2024/CVE-2024-104xx/CVE-2024-10458.json | 119 ++++++- CVE-2024/CVE-2024-104xx/CVE-2024-10459.json | 119 ++++++- CVE-2024/CVE-2024-11xx/CVE-2024-1137.json | 14 +- CVE-2024/CVE-2024-12xx/CVE-2024-1292.json | 27 +- CVE-2024/CVE-2024-13xx/CVE-2024-1310.json | 27 +- CVE-2024/CVE-2024-16xx/CVE-2024-1669.json | 39 +- CVE-2024/CVE-2024-202xx/CVE-2024-20280.json | 12 +- CVE-2024/CVE-2024-210xx/CVE-2024-21002.json | 14 +- CVE-2024/CVE-2024-210xx/CVE-2024-21004.json | 14 +- CVE-2024/CVE-2024-210xx/CVE-2024-21023.json | 14 +- CVE-2024/CVE-2024-210xx/CVE-2024-21041.json | 14 +- CVE-2024/CVE-2024-210xx/CVE-2024-21060.json | 14 +- CVE-2024/CVE-2024-212xx/CVE-2024-21249.json | 14 +- CVE-2024/CVE-2024-216xx/CVE-2024-21678.json | 14 +- CVE-2024/CVE-2024-222xx/CVE-2024-22276.json | 14 +- CVE-2024/CVE-2024-230xx/CVE-2024-23079.json | 39 +- CVE-2024/CVE-2024-232xx/CVE-2024-23230.json | 39 +- CVE-2024/CVE-2024-234xx/CVE-2024-23445.json | 14 +- CVE-2024/CVE-2024-237xx/CVE-2024-23734.json | 39 +- CVE-2024/CVE-2024-23xx/CVE-2024-2369.json | 27 +- CVE-2024/CVE-2024-264xx/CVE-2024-26467.json | 39 +- CVE-2024/CVE-2024-264xx/CVE-2024-26472.json | 39 +- CVE-2024/CVE-2024-264xx/CVE-2024-26490.json | 39 +- CVE-2024/CVE-2024-266xx/CVE-2024-26627.json | 27 +- CVE-2024/CVE-2024-266xx/CVE-2024-26638.json | 27 +- CVE-2024/CVE-2024-268xx/CVE-2024-26889.json | 39 +- CVE-2024/CVE-2024-269xx/CVE-2024-26977.json | 27 +- CVE-2024/CVE-2024-280xx/CVE-2024-28092.json | 39 +- CVE-2024/CVE-2024-281xx/CVE-2024-28151.json | 39 +- CVE-2024/CVE-2024-299xx/CVE-2024-29947.json | 14 +- CVE-2024/CVE-2024-308xx/CVE-2024-30808.json | 39 +- CVE-2024/CVE-2024-313xx/CVE-2024-31312.json | 39 +- CVE-2024/CVE-2024-313xx/CVE-2024-31395.json | 39 +- CVE-2024/CVE-2024-319xx/CVE-2024-31972.json | 43 ++- CVE-2024/CVE-2024-319xx/CVE-2024-31973.json | 43 ++- CVE-2024/CVE-2024-319xx/CVE-2024-31975.json | 43 ++- CVE-2024/CVE-2024-344xx/CVE-2024-34401.json | 39 +- CVE-2024/CVE-2024-358xx/CVE-2024-35877.json | 27 +- CVE-2024/CVE-2024-360xx/CVE-2024-36036.json | 14 +- CVE-2024/CVE-2024-360xx/CVE-2024-36060.json | 43 ++- CVE-2024/CVE-2024-375xx/CVE-2024-37573.json | 31 +- CVE-2024/CVE-2024-420xx/CVE-2024-42041.json | 43 ++- CVE-2024/CVE-2024-433xx/CVE-2024-43382.json | 43 ++- CVE-2024/CVE-2024-45xx/CVE-2024-4530.json | 27 +- CVE-2024/CVE-2024-465xx/CVE-2024-46531.json | 43 ++- CVE-2024/CVE-2024-480xx/CVE-2024-48093.json | 43 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48202.json | 43 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48213.json | 63 +++- CVE-2024/CVE-2024-482xx/CVE-2024-48214.json | 43 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48218.json | 57 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48222.json | 57 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48223.json | 57 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48224.json | 57 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48225.json | 59 +++- CVE-2024/CVE-2024-482xx/CVE-2024-48226.json | 57 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48227.json | 59 +++- CVE-2024/CVE-2024-482xx/CVE-2024-48229.json | 56 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48230.json | 58 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48241.json | 43 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48271.json | 43 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48272.json | 43 ++- CVE-2024/CVE-2024-483xx/CVE-2024-48311.json | 43 ++- CVE-2024/CVE-2024-488xx/CVE-2024-48807.json | 43 ++- CVE-2024/CVE-2024-489xx/CVE-2024-48910.json | 60 ++++ CVE-2024/CVE-2024-496xx/CVE-2024-49632.json | 51 ++- CVE-2024/CVE-2024-496xx/CVE-2024-49634.json | 61 +++- CVE-2024/CVE-2024-496xx/CVE-2024-49635.json | 61 +++- CVE-2024/CVE-2024-496xx/CVE-2024-49638.json | 51 ++- CVE-2024/CVE-2024-496xx/CVE-2024-49639.json | 51 ++- CVE-2024/CVE-2024-496xx/CVE-2024-49640.json | 51 ++- CVE-2024/CVE-2024-496xx/CVE-2024-49641.json | 51 ++- CVE-2024/CVE-2024-503xx/CVE-2024-50354.json | 64 ++++ CVE-2024/CVE-2024-512xx/CVE-2024-51242.json | 43 ++- CVE-2024/CVE-2024-512xx/CVE-2024-51243.json | 43 ++- CVE-2024/CVE-2024-512xx/CVE-2024-51254.json | 39 +- CVE-2024/CVE-2024-512xx/CVE-2024-51255.json | 21 ++ CVE-2024/CVE-2024-512xx/CVE-2024-51260.json | 21 ++ CVE-2024/CVE-2024-514xx/CVE-2024-51419.json | 43 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51424.json | 43 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51425.json | 43 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51426.json | 43 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51427.json | 43 ++- CVE-2024/CVE-2024-51xx/CVE-2024-5143.json | 39 +- CVE-2024/CVE-2024-54xx/CVE-2024-5498.json | 39 +- CVE-2024/CVE-2024-74xx/CVE-2024-7473.json | 70 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7774.json | 70 +++- CVE-2024/CVE-2024-77xx/CVE-2024-7783.json | 60 +++- CVE-2024/CVE-2024-79xx/CVE-2024-7962.json | 68 +++- CVE-2024/CVE-2024-81xx/CVE-2024-8143.json | 70 +++- CVE-2024/CVE-2024-81xx/CVE-2024-8185.json | 56 +++ CVE-2024/CVE-2024-85xx/CVE-2024-8553.json | 60 ++++ CVE-2024/CVE-2024-95xx/CVE-2024-9505.json | 70 +++- README.md | 71 ++-- _state.csv | 372 ++++++++++---------- 125 files changed, 5004 insertions(+), 499 deletions(-) create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48910.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50354.json create mode 100644 CVE-2024/CVE-2024-512xx/CVE-2024-51255.json create mode 100644 CVE-2024/CVE-2024-512xx/CVE-2024-51260.json create mode 100644 CVE-2024/CVE-2024-81xx/CVE-2024-8185.json create mode 100644 CVE-2024/CVE-2024-85xx/CVE-2024-8553.json diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47034.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47034.json index 44ae449bdc2..e742182fd90 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47034.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47034.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47034", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.707", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-10-31T15:35:02.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s: Fix pte update for kernel memory on radix\n\nWhen adding a PTE a ptesync is needed to order the update of the PTE\nwith subsequent accesses otherwise a spurious fault may be raised.\n\nradix__set_pte_at() does not do this for performance gains. For\nnon-kernel memory this is not an issue as any faults of this kind are\ncorrected by the page fault handler. For kernel memory these faults\nare not handled. The current solution is that there is a ptesync in\nflush_cache_vmap() which should be called when mapping from the\nvmalloc region.\n\nHowever, map_kernel_page() does not call flush_cache_vmap(). This is\ntroublesome in particular for code patching with Strict RWX on radix.\nIn do_patch_instruction() the page frame that contains the instruction\nto be patched is mapped and then immediately patched. With no ordering\nor synchronization between setting up the PTE and writing to the page\nit is possible for faults.\n\nAs the code patching is done using __put_user_asm_goto() the resulting\nfault is obscured - but using a normal store instead it can be seen:\n\n BUG: Unable to handle kernel data access on write at 0xc008000008f24a3c\n Faulting instruction address: 0xc00000000008bd74\n Oops: Kernel access of bad area, sig: 11 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV\n Modules linked in: nop_module(PO+) [last unloaded: nop_module]\n CPU: 4 PID: 757 Comm: sh Tainted: P O 5.10.0-rc5-01361-ge3c1b78c8440-dirty #43\n NIP: c00000000008bd74 LR: c00000000008bd50 CTR: c000000000025810\n REGS: c000000016f634a0 TRAP: 0300 Tainted: P O (5.10.0-rc5-01361-ge3c1b78c8440-dirty)\n MSR: 9000000000009033 CR: 44002884 XER: 00000000\n CFAR: c00000000007c68c DAR: c008000008f24a3c DSISR: 42000000 IRQMASK: 1\n\nThis results in the kind of issue reported here:\n https://lore.kernel.org/linuxppc-dev/15AC5B0E-A221-4B8C-9039-FA96B8EF7C88@lca.pw/\n\nChris Riedl suggested a reliable way to reproduce the issue:\n $ mount -t debugfs none /sys/kernel/debug\n $ (while true; do echo function > /sys/kernel/debug/tracing/current_tracer ; echo nop > /sys/kernel/debug/tracing/current_tracer ; done) &\n\nTurning ftrace on and off does a large amount of code patching which\nin usually less then 5min will crash giving a trace like:\n\n ftrace-powerpc: (____ptrval____): replaced (4b473b11) != old (60000000)\n ------------[ ftrace bug ]------------\n ftrace failed to modify\n [] napi_busy_loop+0xc/0x390\n actual: 11:3b:47:4b\n Setting ftrace call site to call ftrace function\n ftrace record flags: 80000001\n (1)\n expected tramp: c00000000006c96c\n ------------[ cut here ]------------\n WARNING: CPU: 4 PID: 809 at kernel/trace/ftrace.c:2065 ftrace_bug+0x28c/0x2e8\n Modules linked in: nop_module(PO-) [last unloaded: nop_module]\n CPU: 4 PID: 809 Comm: sh Tainted: P O 5.10.0-rc5-01360-gf878ccaf250a #1\n NIP: c00000000024f334 LR: c00000000024f330 CTR: c0000000001a5af0\n REGS: c000000004c8b760 TRAP: 0700 Tainted: P O (5.10.0-rc5-01360-gf878ccaf250a)\n MSR: 900000000282b033 CR: 28008848 XER: 20040000\n CFAR: c0000000001a9c98 IRQMASK: 0\n GPR00: c00000000024f330 c000000004c8b9f0 c000000002770600 0000000000000022\n GPR04: 00000000ffff7fff c000000004c8b6d0 0000000000000027 c0000007fe9bcdd8\n GPR08: 0000000000000023 ffffffffffffffd8 0000000000000027 c000000002613118\n GPR12: 0000000000008000 c0000007fffdca00 0000000000000000 0000000000000000\n GPR16: 0000000023ec37c5 0000000000000000 0000000000000000 0000000000000008\n GPR20: c000000004c8bc90 c0000000027a2d20 c000000004c8bcd0 c000000002612fe8\n GPR24: 0000000000000038 0000000000000030 0000000000000028 0000000000000020\n GPR28: c000000000ff1b68 c000000000bf8e5c c00000000312f700 c000000000fbb9b0\n NIP ftrace_bug+0x28c/0x2e8\n LR ftrace_bug+0x288/0x2e8\n Call T\n---truncated---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/01ac203e2119d8922126886ddea309fb676f955f", diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47099.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47099.json index bbb477310e4..d62555bbb95 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47099.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47099.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47099", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:08.153", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-10-31T15:35:02.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: veth: aseg\u00farese de que los skb que ingresan a GRO no est\u00e9n clonados. Despu\u00e9s de confirmar d3256efd8e8b (\"veth: permitir habilitar NAPI incluso sin XDP\"), si GRO est\u00e1 habilitado en un dispositivo veth y TSO est\u00e1 deshabilitado en el dispositivo par, los skbs TCP pasar\u00e1n por la devoluci\u00f3n de llamada de NAPI. Si no hay ning\u00fan programa XDP adjunto, el c\u00f3digo veth no realiza ninguna verificaci\u00f3n compartida y los skbs compartidos/clonados podr\u00edan ingresar al motor GRO. Ignat inform\u00f3 de un ERROR que se activ\u00f3 m\u00e1s tarde debido a la condici\u00f3n anterior: [53.970529][C1] ERROR del kernel en net/core/skbuff.c:3574. [ 53.981755][ C1] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP KASAN PTI [ 53.982634][ C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 No contaminado 5.16.0-rc5+ #25 [ 53.982634][ C1] Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 0.0.0 06/02/2015 [ 53.982634][ C1] RIP: 0010:skb_shift+0x13ef/0x23b0 [ 53.982634][ C1] C\u00f3digo: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f 85 74 f5 ff ff <0f> 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89 f7 4c 89 8c [ 53.982634][ C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246 [ 53.982634][ C1] RAX: 0000000000000000000000 RB X: ffff8881180b4c80 RCX: 0000000000000000 [ 53.982634][ C1] RDX: 00000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2 [ 53.982634][ C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0 [ 53.982634][ C1] R10: ff ffed1022999e5c R11: 0000000000000002 R12: 0000000000000590 [ 53.982634][ C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0 [ 53.982634][ C1] FS: 00000000000000000(0000) GS:ffff888235880000(0000) knlGS:00000000000000000 [ 53.982634][ C1] CS: 0010 DS: 00 00 ES: 0000 CR0: 0000000080050033 [ 53.982634][ C1] CR2: 00007ff5f9b86680 CR3 : 0000000108ce8004 CR4: 0000000000170ee0 [ 53.982634][ C1] Seguimiento de llamadas: [ 53.982634][ C1] [ 53.982634][ C1] tcp_sacktag_walk+0xaba/0x18e0 [ 53.982634][ C1] t cp_sacktag_write_queue+0xe7b/0x3460 [ 53.982634][ C1 ] tcp_ack+0x2666/0x54b0 [ 53.982634][ C1] tcp_rcv_establecido+0x4d9/0x20f0 [ 53.982634][ C1] tcp_v4_do_rcv+0x551/0x810 [ 53.982634][ C1] tcp_v4_rcv+0x 22ed/0x2ed0 [ 53.982634][ C1] ip_protocol_deliver_rcu+0x96/0xaf0 [ 53.982634][ C1] ip_local_deliver_finish+0x1e0/0x2f0 [ 53.982634][ C1] ip_sublist_rcv_finish+0x211/0x440 [ 53.982634][ C1] ip_list_rcv_finish.constprop.0+0x424/0x660 [ 53.9 82634][C1] ip_list_rcv+0x2c8/0x410 [ 53.982634 ][ C1] __netif_receive_skb_list_core+0x65c/0x910 [ 53.982634][ C1] netif_receive_skb_list_internal+0x5f9/0xcb0 [ 53.982634][ C1] napi_complete_done+0x188/0x6e0 [ 53.982634][ C1] gro_cell_ encuesta+0x10c/0x1d0 [ 53.982634][ C1] __napi_poll+ 0xa1/0x530 [ 53.982634][ C1] net_rx_action+0x567/0x1270 [ 53.982634][ C1] __do_softirq+0x28a/0x9ba [ 53.982634][ C1] run_ksoftirqd+0x32/0x60 [ 53.982634][ C1] smpboot_thread_fn+0x559/0x8c0 [53.982634] [ C1] kthread+0x3b9/0x490 [ 53.982634][ C1] ret_from_fork+0x22/0x30 [ 53.982634][ C1] Solucione el problema omitiendo la etapa GRO para skbs compartidos o clonados. Para reducir la posibilidad de OoO, intente desbloquear los skbs antes de darse por vencido. v1 -> v2: - use evitar skb_copy y recurra a netif_receive_skb - Eric" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47147.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47147.json index 4b8b0da664a..095eec0e8be 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47147.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47147.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47147", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-25T09:15:09.100", - "lastModified": "2024-03-25T13:47:14.087", + "lastModified": "2024-10-31T15:35:02.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ptp: ocp: corrige una fuga de recursos en una ruta de manejo de errores. Si se produce un error despu\u00e9s de una llamada exitosa a 'pci_ioremap_bar()', se debe deshacer mediante el correspondiente 'pci_iounmap()' 'llamar, como ya se hizo en la funci\u00f3n de eliminaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/0e38e702f1152479e6afac34f151dbfd99417f99", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json index 034f230e1d7..ab68e6d5c9e 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47228.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47228", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.250", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-10-31T15:35:03.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: x86/ioremap: asigne la memoria reservada de EFI como cifrada para SEV. Algunos controladores requieren memoria marcada como datos de servicios de arranque de EFI. Para que el kernel no reutilice esta memoria despu\u00e9s de ExitBootServices(), se utiliza efi_mem_reserve() para preservarla insertando un nuevo descriptor de memoria EFI y marc\u00e1ndolo con el atributo EFI_MEMORY_RUNTIME. En SEV, la memoria marcada con el atributo EFI_MEMORY_RUNTIME debe ser asignada cifrada por Linux; de lo contrario, el kernel podr\u00eda fallar en el arranque como se muestra a continuaci\u00f3n: EFI Variables Facility v0.08 2004-May-17 falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0x3597688770a868b2: 0000 [#1] SMP NOPTI CPU: 13 PID: 1 Comm: swapper/0 No contaminado 5.12.4-2-default #1 openSUSE Tumbleweed Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 0.0.0 02 /06/2015 RIP: 0010:efi_mokvar_entry_next [...] Seguimiento de llamadas: efi_mokvar_sysfs_init? efi_mokvar_table_init do_one_initcall? __kmalloc kernel_init_freeable? rest_init kernel_init ret_from_fork Expanda la funci\u00f3n __ioremap_check_other() para verificar adicionalmente este otro tipo de datos de arranque reservados en tiempo de ejecuci\u00f3n e indicar que deben asignarse cifrados para un invitado SEV. [pb: mensaje de confirmaci\u00f3n de masaje. ]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47333.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47333.json index 28095682528..6fbd5408f07 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47333.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47333.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47333", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:20.200", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-10-31T16:35:00.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: misc: alcor_pci: corrige null-ptr-deref cuando no hay un puente PCI. Hay un problema con la funci\u00f3n de verificaci\u00f3n de capacidad ASPM (opcional). Un dispositivo se puede conectar directamente al complejo root; en este caso, bus->self(bridge) ser\u00e1 NULL, por lo tanto, priv->parent_pdev es NULL. Dado que alcor_pci_init_check_aspm(priv->parent_pdev) verifica la capacidad ASPM del enlace PCI y completa parent_cap_off, que ser\u00e1 utilizado m\u00e1s adelante por alcor_pci_aspm_ctrl() para encender/apagar din\u00e1micamente el dispositivo, lo que podemos hacer aqu\u00ed es evitar verificar la capacidad si estamos encendidos. el complejo ra\u00edz. Esto har\u00e1 que pdev_cap_off sea 0 y alcor_pci_aspm_ctrl() simplemente regrese cuando se llame a Bring, deshabilitando efectivamente ASPM para el dispositivo. [1.246492] BUG: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000c0 [1.248731] RIP: 0010:pci_read_config_byte+0x5/0x40 [1.253998] Seguimiento de llamadas: [1.254131]? alcor_pci_find_cap_offset.isra.0+0x3a/0x100 [alcor_pci] [ 1.254476] alcor_pci_probe+0x169/0x2d5 [alcor_pci]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47432.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47432.json index edda370d699..90d10d05e39 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47432.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47432.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47432", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:12.007", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-10-31T16:35:00.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: lib/generic-radix-tree.c: No se desborda en peek() Cuando comenzamos a distribuir nuevos n\u00fameros de inodos en la mayor parte del espacio de inodos de 64 bits, eso activ\u00f3 algunas esquinas. errores de casos, en particular algunos desbordamientos de enteros relacionados con el c\u00f3digo del \u00e1rbol de base. Ups." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/784d01f9bbc282abb0c5ade5beb98a87f50343ac", diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47471.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47471.json index ff61918c1d9..0672300c30f 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47471.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47471.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47471", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T07:15:11.847", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-10-31T16:35:01.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm: mxsfb: corrige el fallo de desreferencia del puntero NULL al descargar Es posible que mxsfb->crtc.funcs ya sea NULL al descargar el controlador, en cuyo caso se llama a mxsfb_irq_disable() a trav\u00e9s de drm_irq_uninstall() desde mxsfb_unload() conduce a la desreferencia del puntero NULL. Dado que lo \u00fanico que nos importa es enmascarar la IRQ y mxsfb->base sigue siendo v\u00e1lido, simplemente util\u00edcelo para borrar y enmascarar la IRQ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3cfc183052c3dbf8eae57b6c1685dab00ed3db4a", diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json index 0a4b5a2e953..4c5829f22da 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30356.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30356", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.387", - "lastModified": "2024-10-29T20:35:01.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T16:31:46.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.2.8", + "matchCriteriaId": "3DF0DF16-A655-4EFC-9E7C-B167F483DAAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/privilege-escalation#cve-2022-30356", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json index 062e81a063f..7cdab686bc1 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30357", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.450", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:43:03.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.2.8", + "matchCriteriaId": "3DF0DF16-A655-4EFC-9E7C-B167F483DAAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30357", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json index e137f2ff5e9..92b5cc425be 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30358.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30358", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.507", - "lastModified": "2024-10-29T20:35:03.073", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T16:41:38.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.2.8", + "matchCriteriaId": "3DF0DF16-A655-4EFC-9E7C-B167F483DAAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30358", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json index cd884e70aa4..cb43125cb02 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30359.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30359", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.570", - "lastModified": "2024-10-29T20:35:04.317", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T16:37:47.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.2.8", + "matchCriteriaId": "3DF0DF16-A655-4EFC-9E7C-B167F483DAAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30359", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json index c9b2993448a..b6b6c957a77 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30360.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30360", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.630", - "lastModified": "2024-10-29T20:35:05.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T16:38:26.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.2.8", + "matchCriteriaId": "3DF0DF16-A655-4EFC-9E7C-B167F483DAAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/stored-xss#cve-2022-30360", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json index 407eda9ace0..9ebc3c6c866 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30361.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30361", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.700", - "lastModified": "2024-10-29T20:35:06.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T16:34:18.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.2.8", + "matchCriteriaId": "3DF0DF16-A655-4EFC-9E7C-B167F483DAAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30361", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24204.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24204.json index 3c873e089dc..b5cef1eb72c 100644 --- a/CVE-2023/CVE-2023-242xx/CVE-2023-24204.json +++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24204.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24204", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T17:15:15.740", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-10-31T15:35:03.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en SourceCodester Simple Customer Relationship Management System v1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de nombre en get-quote.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204", diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25200.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25200.json index b412c515e2d..dfcb08478c4 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25200.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25200.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25200", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T07:15:08.103", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-10-31T15:35:04.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de inyecci\u00f3n de HTML en la versi\u00f3n NXG 19.05 del servidor web MT Safeline X-Ray X3310 que permite a un atacante remoto representar HTML malicioso y obtener informaci\u00f3n confidencial en el navegador de la v\u00edctima." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://summitinfosec.com/blog/x-ray-vision-identifying-cve-2023-25199-and-cve-2023-25200-in-manufacturing-equipment/", diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31310.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31310.json index 7b33067430d..479a8881835 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31310.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31310.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31310", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:20.683", - "lastModified": "2024-08-14T02:07:05.410", + "lastModified": "2024-10-31T15:35:04.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34669.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34669.json index 7f21440b1b7..048ae96225d 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34669.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34669.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34669", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T17:15:09.993", - "lastModified": "2023-07-26T00:33:37.767", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-31T16:35:02.160", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35692.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35692.json index 97d58bb43d7..834b9f47c81 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35692.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35692.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35692", "sourceIdentifier": "security@android.com", "published": "2023-07-14T16:15:14.160", - "lastModified": "2023-07-26T14:07:19.537", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-31T16:35:02.880", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-273" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38299.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38299.json index e6d113f318a..f5ffd27c98d 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38299.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38299.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38299", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.157", - "lastModified": "2024-04-22T19:24:06.727", + "lastModified": "2024-10-31T15:35:05.687", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Varias compilaciones de software para los dispositivos AT&T Calypso, Nokia C100, Nokia C200 y BLU View 3 filtran el IMEI del dispositivo a una propiedad del sistema a la que se puede acceder mediante cualquier aplicaci\u00f3n local en el dispositivo sin permisos ni privilegios especiales. Google restringi\u00f3 que las aplicaciones de terceros obtengan directamente identificadores de dispositivos no reiniciables en Android 10 y versiones posteriores, pero en estos casos se filtran mediante un proceso de alto privilegio y se pueden obtener indirectamente. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: AT&T Calypso (ATT/U318AA/U318AA:10/QP1A.190711.020/1632369780:user/release-keys); Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys); Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys); and BLU View 3 (BLU/B140DL/B140DL:11/RP1A.200720.011/1628014629:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1632535579:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1637325978:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1650073052:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1657087912:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1666316280:user/release-keys, and BLU/B140DL/B140DL:11/RP1A.200720.011/1672371162:user/release-keys). Esta aplicaci\u00f3n maliciosa lee la propiedad del sistema \"persist.sys.imei1\" para obtener indirectamente el IMEI del dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json index d0057728e82..6bf372ea7b1 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38405", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T21:15:09.907", - "lastModified": "2023-07-27T03:46:14.810", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-31T15:35:05.887", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50355.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50355.json index 8aa8a0e527f..90397c3a2c9 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50355.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50355.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50355", "sourceIdentifier": "psirt@hcl.com", "published": "2024-10-23T23:15:12.170", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:18:27.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "psirt@hcl.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, { "source": "psirt@hcl.com", "type": "Secondary", @@ -51,10 +81,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:sametime:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.0.2", + "matchCriteriaId": "FDA15EE5-1675-469C-BF7B-DB9FDE95F338" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:sametime:12.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "D6A54E0B-DB62-4674-B57D-827A55BBE2CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627", - "source": "psirt@hcl.com" + "source": "psirt@hcl.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52508.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52508.json index ea13886320d..e0e85bf5434 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52508.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52508.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52508", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:47.493", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-10-31T15:35:06.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-fc: evita la desreferencia del puntero nulo en nvme_fc_io_getuuid() La estructura nvme_fc_fcp_op que describe una operaci\u00f3n AEN se inicializa con un puntero de estructura de solicitud nula. Un FC LLDD puede realizar una llamada a nvme_fc_io_getuuid pasando un puntero a nvmefc_fcp_req para una operaci\u00f3n AEN. Agregue la validaci\u00f3n del puntero de la estructura de la solicitud antes de la desreferencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json index 7b6e947f1e3..954333a5758 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52541.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52541", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T09:15:08.600", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-10-31T15:35:12.207", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de autenticaci\u00f3n en la API para precarga de aplicaciones. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52617.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52617.json index a418ba9b7a1..142e434d264 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52617.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52617.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52617", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:09.057", - "lastModified": "2024-06-25T22:15:16.043", + "lastModified": "2024-10-31T15:35:17.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: switchtec: corrige el bloqueo de stdev_release() despu\u00e9s de una eliminaci\u00f3n sorpresa en caliente. Puede ocurrir una eliminaci\u00f3n en caliente del dispositivo PCI mientras stdev->cdev se mantiene abierto. La llamada a stdev_release() ocurre durante el cierre o la salida, en un punto mucho m\u00e1s all\u00e1 de switchtec_pci_remove(). De lo contrario, la \u00faltima referencia desaparecer\u00eda con el put_device() final, justo antes del retorno. En ese momento posterior, la limpieza devm ya elimin\u00f3 la asignaci\u00f3n stdev->mmio_mrpc. Adem\u00e1s, la referencia stdev->pdev no se contaba. Por lo tanto, en modo DMA, iowrite32() en stdev_release() causar\u00e1 un error de p\u00e1gina fatal, y el dma_free_coherent() posterior, si se alcanza, pasar\u00eda un puntero &stdev->pdev->dev obsoleto. Para solucionarlo, mueva el apagado de MRPC DMA a switchtec_pci_remove(), despu\u00e9s de stdev_kill(). Contar stdev->pdev ref ahora es opcional, pero puede evitar accidentes futuros. Reproducible a trav\u00e9s del script en https://lore.kernel.org/r/20231113212150.96410-1-dns@arista.com" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/0233b836312e39a3c763fb53512b3fa455b473b3", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json index b5ad1dc331d..a247bba9f7f 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52631", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:40.900", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-10-31T15:35:17.417", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fs/ntfs3: corrige un error de desreferencia NULL El problema aqu\u00ed es cuando se llama desde ntfs_load_attr_list(). El \"tama\u00f1o\" proviene de le32_to_cpu(attr->res.data_size), por lo que no puede desbordarse en sistemas de 64 bits, pero en sistemas de 32 bits el \"+ 1023\" puede desbordarse y el resultado es cero. Esto significa que kmalloc tendr\u00e1 \u00e9xito al devolver ZERO_SIZE_PTR y luego memcpy() fallar\u00e1 con un Ups en la siguiente l\u00ednea." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/686820fe141ea0220fc6fdfc7e5694f915cf64b2", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52776.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52776.json index c7c1b46e08c..1ed2bd9f263 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52776.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52776.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52776", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:16.680", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-10-31T15:35:18.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: corrige el bloqueo de eventos de temperatura y radar dfs. Los pdev activos de ath12k est\u00e1n protegidos por RCU, pero el c\u00f3digo de manejo de eventos de temperatura y radar DFS que llama a ath12k_mac_get_ar_by_pdev_id() no estaba marcado como una secci\u00f3n cr\u00edtica del lado de lectura. Marque el c\u00f3digo en cuesti\u00f3n como secciones cr\u00edticas del lado de lectura de RCU para evitar posibles problemas de use after free. Tenga en cuenta que el controlador de eventos de temperatura actualmente parece un marcador de posici\u00f3n, pero a\u00fan as\u00ed activar\u00eda un bloqueo de bloqueo de RCU. Compilaci\u00f3n probada \u00fanicamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/69bd216e049349886405b1c87a55dce3d35d1ba7", diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52811.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52811.json index b5be873745f..f6726a265f4 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52811.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52811.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52811", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:19.347", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-10-31T15:35:18.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: ibmvfc: Eliminar BUG_ON en el caso de un grupo de eventos vac\u00edo. En la pr\u00e1ctica, el controlador nunca debe enviar m\u00e1s comandos de los asignados al grupo de eventos de una cola. En el improbable caso de que esto suceda, el c\u00f3digo afirma un BUG_ON, y en el caso de que el kernel no est\u00e9 configurado para fallar en caso de p\u00e1nico, devuelve un puntero de evento basura de la lista de eventos vac\u00eda, lo que hace que las cosas vayan en espiral a partir de ah\u00ed. Este BUG_ON es un artefacto hist\u00f3rico del controlador ibmvfc que se actualiz\u00f3 por primera vez, y ahora es bien sabido que el uso de BUG_ON es una mala pr\u00e1ctica, excepto en el escenario m\u00e1s irrecuperable. No hay nada en este escenario que impida al conductor recuperarse y continuar. Elimine el BUG_ON en cuesti\u00f3n de ibmvfc_get_event() y devuelva un puntero NULL en el caso de un grupo de eventos vac\u00edo. Actualice todos los sitios de llamadas a ibmvfc_get_event() para comprobar si hay un puntero NULL y realizar la acci\u00f3n de recuperaci\u00f3n o error adecuada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/88984ec4792766df5a9de7a2ff2b5f281f94c7d4", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0016.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0016.json index 62387cd707a..2f6561b6149 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0016.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0016.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0016", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.460", - "lastModified": "2024-02-16T21:39:50.223", + "lastModified": "2024-10-31T15:35:18.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En varias ubicaciones, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n del dispositivo emparejado sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/1d7ba7c8a205522f384e8d5c7c9f26a421cab5f1", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0561.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0561.json index f48a0b6a706..00ed6e59d83 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0561.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0561.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0561", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-11T18:15:17.797", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-10-31T15:35:19.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento de WordPress Ultimate Posts Widget anterior a 2.3.1 no valida ni escapa algunas de sus opciones de widget antes de devolverlas en atributos, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/99b6aa8b-deb9-48f8-8896-f3c8118a4f70/", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0881.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0881.json index 1c4d68f32e4..5bde899f3d2 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0881.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0881.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0881", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-11T16:15:24.800", - "lastModified": "2024-08-30T13:15:12.190", + "lastModified": "2024-10-31T15:35:20.223", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel de WordPress anterior a 2.2.76 no impide que se muestren publicaciones protegidas con contrase\u00f1a como resultado de algunas acciones AJAX no autenticadas, lo que permite a usuarios no autenticados leer dichas publicaciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290/", diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10226.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10226.json index 8f39c3ee108..5fefcae096f 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10226.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10226.json @@ -2,20 +2,44 @@ "id": "CVE-2024-10226", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T14:15:06.170", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:48:41.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Arconix Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'box' shortcode in all versions up to, and including, 2.1.13 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": " El complemento Arconix Shortcodes para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado \"box\" del complemento en todas las versiones hasta la 2.1.13 incluida, debido a una limpieza de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -47,18 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.14", + "matchCriteriaId": "4271480C-8F3F-43AC-9192-BBCF30799DAC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3176718/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/arconix-shortcodes/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94bae97d-2959-4ace-992d-1f4b1ccc8c3b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10458.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10458.json index 4ac3f7dcb62..066e436ac70 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10458.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10458.json @@ -2,40 +2,141 @@ "id": "CVE-2024-10458", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:03.623", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:03:37.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permission leak could have occurred from a trusted site to an untrusted site via `embed` or `object` elements. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132." + }, + { + "lang": "es", + "value": "Podr\u00eda haberse producido una fuga de permisos desde un sitio de confianza a un sitio que no lo es a trav\u00e9s de elementos `embed` u `object`. Esta vulnerabilidad afecta a Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4 y Thunderbird < 132." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.17", + "matchCriteriaId": "AA3103A6-9786-45E6-A9E0-6FE578A2CA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "132.0", + "matchCriteriaId": "12C78A13-6A39-4F36-8534-D8ECE46E0042" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.4.0", + "matchCriteriaId": "6ECAB82A-D3AD-4798-8408-FC7306F2722A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.4.0", + "matchCriteriaId": "D120292A-201C-4965-A05E-850214B0376A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "132.0", + "matchCriteriaId": "F2C6BA33-28F1-4F1F-ADFE-B5F9A04E6657" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921733", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10459.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10459.json index 13cafe5dada..4e67560ecc3 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10459.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10459.json @@ -2,40 +2,141 @@ "id": "CVE-2024-10459", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:03.713", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:16:30.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132." + }, + { + "lang": "es", + "value": " Un atacante podr\u00eda haber provocado un use-after-free cuando la accesibilidad estaba habilitada, lo que habr\u00eda provocado un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4 y Thunderbird < 132." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.17", + "matchCriteriaId": "AA3103A6-9786-45E6-A9E0-6FE578A2CA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "132.0", + "matchCriteriaId": "12C78A13-6A39-4F36-8534-D8ECE46E0042" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.4.0", + "matchCriteriaId": "6ECAB82A-D3AD-4798-8408-FC7306F2722A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.4.0", + "matchCriteriaId": "D120292A-201C-4965-A05E-850214B0376A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "132.0", + "matchCriteriaId": "F2C6BA33-28F1-4F1F-ADFE-B5F9A04E6657" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1919087", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-55/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-56/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-57/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-58/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-59/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1137.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1137.json index 871fbd6391b..6a245057e27 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1137.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1137.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1137", "sourceIdentifier": "security@tibco.com", "published": "2024-03-12T18:15:07.110", - "lastModified": "2024-03-13T12:33:51.697", + "lastModified": "2024-10-31T15:35:20.503", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://community.tibco.com/advisories/tibco-security-advisory-march-12-2024-tibco-activespaces-cve-2024-1137-r208/", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1292.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1292.json index ca2de3ba746..89b35946fc9 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1292.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1292.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1292", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-08T05:15:07.577", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-10-31T15:35:21.273", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento wpb-show-core de WordPress anterior a 2.6 no desinfecta ni escapa algunos par\u00e1metros antes de devolverlos a la p\u00e1gina, lo que genera un cross-site scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1310.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1310.json index 244017b13e8..d8182d074fe 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1310.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1310", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.857", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-10-31T16:35:03.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WooCommerce WordPress anterior a 8.6 no impide que los usuarios con al menos el rol de colaborador filtren productos a los que no deber\u00edan tener acceso. (por ejemplo, productos privados, borradores y desechados)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/a7735feb-876e-461c-9a56-ea6067faf277/", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json index 80a5d092b95..1dd79b2bfd2 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1669", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.150", - "lastModified": "2024-02-26T16:27:52.577", + "lastModified": "2024-10-31T15:35:21.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El acceso a la memoria fuera de los l\u00edmites en Blink en Google Chrome anterior a 122.0.6261.57 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json index 7b2b22bc44b..7d123332448 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20280", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:13.697", - "lastModified": "2024-10-18T12:53:04.627", + "lastModified": "2024-10-31T15:35:23.060", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21002.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21002.json index ec09777c125..1305739fccc 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21002.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21002.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21002", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:13.870", - "lastModified": "2024-04-26T09:15:09.700", + "lastModified": "2024-10-31T16:35:04.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240426-0004/", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21004.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21004.json index a9fd8bf032f..407c57755bf 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21004.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21004", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:14.210", - "lastModified": "2024-04-26T09:15:09.933", + "lastModified": "2024-10-31T15:35:24.047", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240426-0004/", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21023.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21023.json index 2664dd0d90f..293215b2b5a 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21023.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21023.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21023", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:17.490", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-10-31T15:35:24.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21041.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21041.json index fe1bd577a95..2f9c0ba64f2 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21041.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21041.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21041", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:20.597", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-10-31T16:35:04.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21060.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21060.json index 40da8c4f3da..626792b2d35 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21060.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21060.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21060", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:23.910", - "lastModified": "2024-04-26T09:15:11.080", + "lastModified": "2024-10-31T16:35:05.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240426-0013/", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json index d1cada48275..9fcf6a1ac47 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21249", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:14.880", - "lastModified": "2024-10-16T16:38:43.170", + "lastModified": "2024-10-31T15:35:25.647", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21678.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21678.json index e703076874a..6ff0438c6ec 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21678.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21678.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21678", "sourceIdentifier": "security@atlassian.com", "published": "2024-02-20T18:15:50.897", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-10-31T16:35:06.307", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1354501606", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json index c69a1d71420..5ed72984c8b 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22276.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22276", "sourceIdentifier": "security@vmware.com", "published": "2024-06-27T21:15:13.860", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-10-31T15:35:26.797", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24372", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json index 9e513c79a21..adf86f3e0b3 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23079.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23079", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T23:15:07.703", - "lastModified": "2024-08-05T14:15:34.510", + "lastModified": "2024-10-31T16:35:07.030", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se descubri\u00f3 que JGraphT Core v1.5.2 conten\u00eda una NullPointerException a trav\u00e9s del componente org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://jgrapht.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23230.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23230.json index cb2cf1ec617..e4bfce0202c 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23230.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23230.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23230", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:47.733", - "lastModified": "2024-03-13T23:15:46.337", + "lastModified": "2024-10-31T15:35:27.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 mejorando el manejo de archivos. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23445.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23445.json index 1b17a201522..e735a3762e5 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23445.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23445.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23445", "sourceIdentifier": "bressers@elastic.co", "published": "2024-06-12T14:15:10.963", - "lastModified": "2024-06-13T18:36:09.010", + "lastModified": "2024-10-31T15:35:28.363", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://discuss.elastic.co/t/elasticsearch-8-14-0-security-update-esa-2024-13/360898", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23734.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23734.json index d02a54c6490..653e8161b8f 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23734.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23734.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23734", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T16:15:09.890", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-10-31T16:35:07.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Request Forgery en la funcionalidad de carga de las p\u00e1ginas de perfil de usuario en savignano S/Notify anterior a 2.0.1 para Bitbucket permite a los atacantes reemplazar el certificado S/MIME o las claves PGP para usuarios arbitrarios a trav\u00e9s de un enlace manipulado espec\u00edficamente para ello." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://help.savignano.net/snotify-email-encryption/sa-2023-11-28", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2369.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2369.json index d4fcb48d6b2..a3f5a6cdb74 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2369.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2369.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2369", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-02T05:15:47.043", - "lastModified": "2024-04-08T18:15:08.527", + "lastModified": "2024-10-31T16:35:12.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Page Builder Gutenberg Blocks de WordPress anterior a 3.1.7 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json index f91ac9d5210..0a68551698c 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26467.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26467", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:59.823", - "lastModified": "2024-02-26T16:32:25.577", + "lastModified": "2024-10-31T15:35:29.323", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) basada en DOM en el componente generate.html de tabatkins/railroad-diagrams antes de el commit ea9a123 permite a los atacantes ejecutar Javascript arbitrario mediante el env\u00edo de una URL manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/cd80/50463b0e62067ec861b7006cbf46b068", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26472.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26472.json index 2892f14dc63..d302e1b9500 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26472.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26472.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26472", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:19.003", - "lastModified": "2024-03-08T21:15:07.193", + "lastModified": "2024-10-31T16:35:08.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) reflejada en SocialMediaWebsite v1.0.1 permite a los atacantes inyectar JavaScript malicioso en el navegador web de una v\u00edctima a trav\u00e9s de los par\u00e1metros del selector o validador en offer.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26472", diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26490.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26490.json index 97da4d38972..d5450377345 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26490.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26490.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26490", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T06:15:57.923", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-10-31T16:35:09.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el m\u00f3dulo Addon JD Simple de flusity-CMS v2.33 permite a los atacantes ejecutar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto T\u00edtulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/2111715623/cms/blob/main/2.md", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26627.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26627.json index c2874a13b6c..22e873860c7 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26627.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26627.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26627", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:12.973", - "lastModified": "2024-06-25T22:15:19.457", + "lastModified": "2024-10-31T15:35:30.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: Saque scsi_host_busy() del bloqueo del host para activar el controlador EH Dentro de scsi_eh_wakeup(), se llama a scsi_host_busy() y se verifica con el bloqueo del host cada vez para decidir si se produce un error. Es necesario activar el controlador kthread. Esto puede ser demasiado pesado en caso de recuperaci\u00f3n, como por ejemplo: - N colas de hardware - la profundidad de la cola es M para cada cola de hardware - cada scsi_host_busy() itera sobre (N * M) etiquetas/solicitudes Si la recuperaci\u00f3n se activa en caso de que todas las solicitudes est\u00e1n en curso, cada scsi_eh_wakeup() est\u00e1 estrictamente serializado, cuando se llama a scsi_eh_wakeup() para la \u00faltima solicitud en curso, scsi_host_busy() se ha ejecutado (N * M - 1) veces y la solicitud se ha iterado durante ( N*M - 1) * (N * M) veces. Si tanto N como M son lo suficientemente grandes, se puede activar un bloqueo duro al adquirir el bloqueo del host, y se observa en mpi3mr (128 colas hw, profundidad de cola 8169). Solucione el problema llamando a scsi_host_busy() fuera del bloqueo del host. No necesitamos el bloqueo del host para obtener el recuento de ocupaci\u00f3n porque el bloqueo del host nunca cubre eso. [mkp: elimine las variables 'ocupadas' innecesarias se\u00f1aladas por Bart]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/07e3ca0f17f579491b5f54e9ed05173d6c1d6fcb", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26638.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26638.json index 165d5c47373..b79fac24a23 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26638.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26638.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26638", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:10.720", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-10-31T15:35:30.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nbd: siempre inicializa completamente la estructura msghdr syzbot se queja de que el valor msg->msg_get_inq puede no estar inicializado [1] la estructura msghdr obtuvo muchos campos nuevos recientemente, siempre debemos asegurarnos de que sus valores sean cero por defecto. [1] ERROR: KMSAN: valor uninit en tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571 tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571 inet_recvmsg+0x131/0x580 net/ipv4/af_inet. c:879 sock_recvmsg_nosec net/socket.c:1044 [en l\u00ednea] sock_recvmsg+0x12b/0x1e0 net/socket.c:1066 __sock_xmit+0x236/0x5c0 drivers/block/nbd.c:538 nbd_read_reply drivers/block/nbd.c:732 [en l\u00ednea] recv_work+0x262/0x3100 drivers/block/nbd.c:863 Process_one_work kernel/workqueue.c:2627 [en l\u00ednea] Process_scheduled_works+0x104e/0x1e70 kernel/workqueue.c:2700 workqueue.c :2781 kthread+0x3ed/0x540 kernel/kthread.c:388 ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242 Mensaje de variable local creado en: __sock_xmit+0x4c/0x5c0 drivers/block/nbd.c:513 nbd_read_reply drivers/block/nbd.c:732 [en l\u00ednea] recv_work+0x262/0x3100 drivers/block/nbd.c:863 CPU: 1 PID: 7465 Comm : kworker/u5:1 No contaminado 6.7.0-rc7-syzkaller-00041-gf016f7547aee #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 17/11/2023 Cola de trabajo: nbd5-recv recv_work" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/1960f2b534da1e6c65fb96f9e98bda773495f406", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json index b0eb67e7de2..1b6b1608a8c 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26889", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.380", - "lastModified": "2024-06-27T12:15:22.100", + "lastModified": "2024-10-31T16:35:10.200", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: hci_core: soluciona un posible desbordamiento del b\u00fafer struct hci_dev_info tiene un campo de nombre de tama\u00f1o fijo[8], por lo que en caso de que hdev->name sea mayor que strcpy intentar\u00eda escribir m\u00e1s all\u00e1 su tama\u00f1o, por lo que esto soluciona este problema cambiando al uso de strscpy." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2e845867b4e279eff0a19ade253390470e07e8a1", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26977.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26977.json index e21f2ee4eee..5ea3d4c0e3f 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26977.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26977.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26977", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:14.860", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-10-31T16:35:11.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: pci_iounmap(): corrige la fuga de mapeo MMIO El #ifdef ARCH_HAS_GENERIC_IOPORT_MAP accidentalmente tambi\u00e9n protege iounmap(), lo que significa que se filtraron los mapeos MMIO. Mueva la guardia para que llamemos a iounmap() para asignaciones MMIO." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28092.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28092.json index 48c2e006abc..aed2089a374 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28092.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28092.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28092", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T21:15:07.720", - "lastModified": "2024-03-20T13:00:16.367", + "lastModified": "2024-10-31T15:35:30.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El software UBEE DDW365 XCNDDW365 8.14.3105 en el hardware 3.13.1 permite a un atacante remoto que se encuentre cerca de una red Wi-Fi realizar ataques XSS almacenados a trav\u00e9s de RgFirewallEL.asp, RgDdns.asp, RgTime.asp, RgDiagnostics.asp o RgParentalBasic.asp. Los campos afectados son Nombre del servidor SMTP, Nombre de usuario SMTP, Nombre del host, Servidor de hora 1, Servidor de hora 2, Servidor de hora 3, Destino, Agregar palabra clave, Agregar dominio y Agregar dominio permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/cve/blob/main/Ubee/CVE-2024-28092", diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json index d372a4b88d7..0f471c10ae9 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28151.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28151", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:10.570", - "lastModified": "2024-05-01T18:15:16.783", + "lastModified": "2024-10-31T16:35:11.500", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Jenkins HTML Publisher Plugin 1.32 y versiones anteriores archiva enlaces simb\u00f3licos no v\u00e1lidos en directorios de informes de agentes y los recrea en el controlador, lo que permite a los atacantes con permiso Item/Configure determinar si existe una ruta en el sistema de archivos del controlador Jenkins, sin poder acceder a ella." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29947.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29947.json index 168cf50a257..fd9486e3aa3 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29947.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29947.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29947", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-04-02T11:15:51.640", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-10-31T15:35:31.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30808.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30808.json index 11ce0c3518c..85de1021502 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30808.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30808.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30808", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T18:15:12.510", - "lastModified": "2024-04-02T20:31:58.463", + "lastModified": "2024-10-31T16:35:12.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Bento4 v1.6.0-641-2-g1529b83. Hay un heap-use-after-free en AP4_SubStream::~AP4_SubStream en Ap4ByteStream.cpp, lo que provoca una denegaci\u00f3n de servicio (DoS), como lo demuestra mp42ts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/937", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json index 4545ed2b3cd..946acb2a25a 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31312.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31312", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.900", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-10-31T15:35:32.303", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En varias ubicaciones, existe una posible fuga de informaci\u00f3n debido a la falta de una verificaci\u00f3n de permiso. Esto podr\u00eda llevar a la divulgaci\u00f3n de informaci\u00f3n local exponiendo los medios reproducidos sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/748055291460bcaafa3e53c7da1601a687959477", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31395.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31395.json index 269736c8694..e9bd2df4ceb 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31395.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31395.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31395", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-22T05:15:53.120", - "lastModified": "2024-05-22T12:46:53.887", + "lastModified": "2024-10-31T15:35:33.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross-Site Scripting existe en las versiones de la serie a-blog cms Ver.3.1.x anteriores a la Ver.3.1.12, versiones de la serie Ver.3.0.x anteriores a la Ver.3.0.32, versiones de la serie Ver.2.11.x anteriores a Ver.2.11.61, versiones de la serie Ver.2.10.x anteriores a Ver.2.10.53 y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con un privilegio de editor o superior que pueda iniciar sesi\u00f3n en el producto puede ejecutar un script arbitrario en el navegador web del usuario que accedi\u00f3 a la p\u00e1gina de administraci\u00f3n de programaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json index f492fbd1be4..24fbb94ba26 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json @@ -2,16 +2,55 @@ "id": "CVE-2024-31972", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:06.760", - "lastModified": "2024-10-30T18:15:06.760", + "lastModified": "2024-10-31T16:35:13.347", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest." + }, + { + "lang": "es", + "value": "Los dispositivos EnGenius ESR580 A8J-EMR5000 permiten a un atacante remoto realizar ataques XSS almacenado que podr\u00edan provocar la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario (en el contexto de la sesi\u00f3n del usuario) a trav\u00e9s de los campos de entrada SSID de Wi-Fi. Los scripts web integrados en los campos vulnerables de esta manera se ejecutan inmediatamente cuando un usuario inicia sesi\u00f3n en la p\u00e1gina de administraci\u00f3n. Esto afecta a /admin/wifi/wlan1 y /admin/wifi/wlan_guest." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31972", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json index 28c605f8e7e..01f6dad0fc5 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json @@ -2,16 +2,55 @@ "id": "CVE-2024-31973", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:06.893", - "lastModified": "2024-10-30T18:15:06.893", + "lastModified": "2024-10-31T16:35:14.150", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via the 'Network Name (SSID)' input fields to the /index.html#wireless_basic page." + }, + { + "lang": "es", + "value": "Los dispositivos Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 permiten que un atacante remoto cerca de una red Wi-Fi realice ataques XSS almacenado a trav\u00e9s de los campos de entrada 'Nombre de red (SSID)' en la p\u00e1gina /index.html#wireless_basic." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-31973", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json index 6698b8ddf89..e9184ae98df 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json @@ -2,16 +2,55 @@ "id": "CVE-2024-31975", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:06.967", - "lastModified": "2024-10-30T18:15:06.967", + "lastModified": "2024-10-31T16:35:14.937", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "EnGenius ESR580 devices through 1.1.30 allow a remote attacker to conduct stored XSS attacks via the Wi-Fi SSID parameters. JavaScript embedded into a vulnerable field is executed when the user clicks the SSID field's corresponding EDIT button." + }, + { + "lang": "es", + "value": "Los dispositivos EnGenius ESR580 hasta la versi\u00f3n 1.1.30 permiten a un atacante remoto realizar ataques XSS almacenado a trav\u00e9s de los par\u00e1metros SSID de Wi-Fi. El c\u00f3digo JavaScript incrustado en un campo vulnerable se ejecuta cuando el usuario hace clic en el bot\u00f3n EDITAR correspondiente del campo SSID." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31975", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json index ebcd4ef5359..15dc231e0b8 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34401.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34401", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-03T01:15:48.577", - "lastModified": "2024-05-03T12:50:34.250", + "lastModified": "2024-10-31T15:35:33.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Savsoft Quiz 6.0 permite almacenar XSS a trav\u00e9s del par\u00e1metro index.php/quiz/insert_quiz/quiz_name." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.exploit-db.com/exploits/51988", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json index 4b0b2448a5e..5b0235f7aa5 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35877", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:08.990", - "lastModified": "2024-06-27T12:15:25.717", + "lastModified": "2024-10-31T15:35:34.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/mm/pat: corrige el manejo de VM_PAT en asignaciones COW El manejo de PAT no funcionar\u00e1 correctamente en las asignaciones COW: la primera PTE (o, de hecho, todas las PTE) pueden ser reemplazado durante fallos de escritura para se\u00f1alar folios an\u00f3nimos. Recuperar de manera confiable el PFN y el modo de cach\u00e9 correctos usando follow_phys() de las PTE no funcionar\u00e1 en las asignaciones COW. Usando follow_phys(), podr\u00edamos obtener la direcci\u00f3n+protecci\u00f3n de la publicaci\u00f3n an\u00f3nima (lo cual es muy incorrecto), o fallar en las entradas de intercambio/no intercambio, fallando en follow_phys() y activando un WARN_ON_ONCE() en untrack_pfn() y track_pfn_copy() , no llamando correctamente a free_pfn_range(). En free_pfn_range(), no llamar\u00edamos a memtype_free() o lo llamar\u00edamos con el rango incorrecto, posiblemente perdiendo memoria. Para solucionarlo, actualicemos follow_phys() para rechazar la devoluci\u00f3n de publicaciones an\u00f3nimas y recurramos al uso del PFN almacenado dentro de vma->vm_pgoff para asignaciones COW si nos encontramos con eso. Ahora manejaremos adecuadamente untrack_pfn() con asignaciones COW, donde no necesitamos el modo cach\u00e9. Sin embargo, tendremos que fallar fork()->track_pfn_copy() si la primera p\u00e1gina fue reemplazada por una publicaci\u00f3n an\u00f3nima: tendr\u00edamos que almacenar el modo de cach\u00e9 en el VMA para que esto funcione, probablemente aumentando el tama\u00f1o del VMA. Por ahora, manteng\u00e1moslo simple y dejemos que track_pfn_copy() simplemente falle en ese caso: ya habr\u00eda fallado en el pasado con entradas de intercambio/no intercambio, y habr\u00eda hecho algo incorrecto con folios an\u00f3nimos. Reproductor simple para activar WARN_ON_ONCE() en untrack_pfn(): <--- Reproductor C ---> #include #include #include #include int main(void) { struct io_uring_params p = {}; int anillo_fd; tama\u00f1o_t tama\u00f1o; carb\u00f3n *mapa; ring_fd = io_uring_setup(1, &p); if (ring_fd < 0) { perror(\"io_uring_setup\"); devolver 1; } tama\u00f1o = p.sq_off.array + p.sq_entries * tama\u00f1o de (sin firmar); /* Asigna el anillo de cola de env\u00edo MAP_PRIVATE */ map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE, ring_fd, IORING_OFF_SQ_RING); if (mapa == MAP_FAILED) { perror(\"mmap\"); devolver 1; } /* Tenemos al menos una p\u00e1gina. Vamos a acobardarnos. */ *mapa = 0; pausa(); devolver 0; } <--- Reproductor C ---> En un sistema con 16 GiB de RAM y swap configurado: # ./iouring & # memhog 16G # killall iouring [ 301.552930] ------------[ cut aqu\u00ed ]------------ [ 301.553285] ADVERTENCIA: CPU: 7 PID: 1402 en arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100 [ 301.553989] M\u00f3dulos vinculados en : binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g [ 301.558232] CPU: 7 PID: 1402 Comm: iouring No contaminado 6.7.5-100.fc38.x86_64 #1 [ 301.558772] Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4 [ 301.559569] RIP: 0010:untrack_pfn+0xf4/0x100 [ 301.559893] C\u00f3digo: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000 [ 301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282 [ 301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 455e047 [301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200 [301.562628] RBP: 0000000000000000 R08: 8 R09: 0000000000000000 [ 301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000 [ 301.563669] R13: 00000 R14: ffffba2c0377fc08 R15: 00000000000000000 [ 301.564186] FS: 0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000 0 [301.564773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0 [ 301.565725] KRU: 55555554 [ 301.565944] Seguimiento de llamadas: [ 301.566148] [ 301.566325] ? untrack_pfn+0xf4/0x100 [301.566618]? __advertir+0x81/0x130 [ 301.566876] ? untrack_pfn+0xf4/0x100 [ 3 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/04c35ab3bdae7fefbd7c7a7355f29fa03a035221", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36036.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36036.json index dff5040d886..3b04e66cc2d 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36036.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36036.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36036", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-27T18:15:10.200", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-10-31T16:35:15.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/cve-2024-36036.html", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json index 44034376d5d..e21274794e1 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json @@ -2,16 +2,55 @@ "id": "CVE-2024-36060", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.037", - "lastModified": "2024-10-30T18:15:07.037", + "lastModified": "2024-10-31T15:35:34.893", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "EnGenius EnStation5-AC A8J-ENS500AC 1.0.0 devices allow blind OS command injection via shell metacharacters in the Ping and Speed Test parameters." + }, + { + "lang": "es", + "value": "Los dispositivos EnGenius EnStation5-AC A8J-ENS500AC 1.0.0 permiten la inyecci\u00f3n ciega de comandos del sistema operativo a trav\u00e9s de metacaracteres de shell en los par\u00e1metros Ping y Speed Test." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-36060", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json index 35bcd5b5cf1..b44bd5a813b 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json @@ -2,16 +2,43 @@ "id": "CVE-2024-37573", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.107", - "lastModified": "2024-10-30T18:15:07.107", + "lastModified": "2024-10-31T15:35:35.677", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Talkatone com.talkatone.android application 8.4.6 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.talkatone.vedroid.ui.launcher.OutgoingCallInterceptor component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n Talkatone com.talkatone.android 8.4.6 para Android permite que cualquier aplicaci\u00f3n instalada (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.talkatone.vedroid.ui.launcher.OutgoingCallInterceptor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/actuator/com.talkatone.android/blob/main/CVE-2024-37573", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json index 6b93ab33d63..23b40f4b268 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json @@ -2,16 +2,55 @@ "id": "CVE-2024-42041", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.223", - "lastModified": "2024-10-30T18:15:07.223", + "lastModified": "2024-10-31T15:35:35.840", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.videodownload.browser.videodownloader (aka AppTool-Browser-Video All Video Downloader) application 20-30.05.24 for Android allows an attacker to execute arbitrary JavaScript code via the acr.browser.lightning.DefaultBrowserActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.videodownload.browser.videodownloader (tambi\u00e9n conocida como AppTool-Browser-Video All Video Downloader) 20-30.05.24 para Android permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s del componente acr.browser.lightning.DefaultBrowserActivity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/com.videodownload.browser.videodownloader/blob/main/CVE-2024-42041", diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json index 84ee99cfca4..a4aa1dca914 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43382.json @@ -2,16 +2,55 @@ "id": "CVE-2024-43382", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.160", - "lastModified": "2024-10-30T21:15:14.160", + "lastModified": "2024-10-31T15:35:36.610", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Snowflake JDBC driver versions >= 3.2.6 and <= 3.19.1 have an Incorrect Security Setting that can result in data being uploaded to an encrypted stage without the additional layer of protection provided by client side encryption." + }, + { + "lang": "es", + "value": "Las versiones del controlador JDBC de Snowflake >= 3.2.6 y <= 3.19.1 tienen una configuraci\u00f3n de seguridad incorrecta que puede provocar que los datos se carguen en una etapa cifrada sin la capa adicional de protecci\u00f3n proporcionada por el cifrado del lado del cliente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/snowflakedb/snowflake-jdbc/security/advisories/GHSA-f686-hw9c-xw9c", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4530.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4530.json index abc45e71637..c13e227abd2 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4530.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4530.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4530", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-27T06:15:09.927", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-10-31T15:35:40.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Business Card WordPress hasta la versi\u00f3n 1.0.0 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios registrados realicen acciones no deseadas, como editar categor\u00edas de tarjetas mediante ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/", diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json index c67909faf05..7d2ab22a62f 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46531", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T19:15:14.113", - "lastModified": "2024-10-30T19:15:14.113", + "lastModified": "2024-10-31T16:35:16.453", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpgurukul Vehicle Record Management System v1.0 was discovered to contain a SQL injection vulnerability via the searchinputdata parameter at /index.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que phpgurukul Vehicle Record Management System v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro searchinputdata en /index.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/shouvikdutta1998/Vehicle_Record_Management_System", diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json index a54b2e730aa..788e23419c7 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48093.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48093", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.337", - "lastModified": "2024-10-30T21:15:14.337", + "lastModified": "2024-10-31T15:35:37.423", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted File Upload in the Discussions tab in Operately v.0.1.0 allows a privileged user to achieve Remote Code Execution via uploading and executing malicious files without validating file extensions or content types." + }, + { + "lang": "es", + "value": "La carga de archivos sin restricciones en la pesta\u00f1a Discusiones en Operately v.0.1.0 permite que un usuario privilegiado logre la ejecuci\u00f3n remota de c\u00f3digo mediante la carga y ejecuci\u00f3n de archivos maliciosos sin validar las extensiones de archivo o los tipos de contenido." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-48093/Description.md", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json index 970a2e9cf43..4bbc2e7dd03 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48202.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48202", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T19:15:14.200", - "lastModified": "2024-10-30T19:15:14.200", + "lastModified": "2024-10-31T15:35:38.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "icecms <=3.4.7 has a File Upload vulnerability in FileUtils.java,uploadFile." + }, + { + "lang": "es", + "value": "icecms <=3.4.7 tiene una vulnerabilidad de carga de archivos en FileUtils.java,uploadFile." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Lunax0/LogLunax/blob/main/icecms/CVE-2024-48202.md", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48213.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48213.json index 85b757be5da..8d5068e87bd 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48213.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48213", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-23T22:15:02.600", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:09:20.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "RockOA v2.6.5 es vulnerable a Directory Traversal en webmain/system/beifen/beifenAction.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rockoa:xinhu:2.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D8996D86-FF64-432E-934F-15606035DF1E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/N0zoM1z0/CVEs/blob/main/CVE-2024-48213.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json index 1d4e20c50d8..f0ee119aec7 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48214", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.420", - "lastModified": "2024-10-30T18:15:07.420", + "lastModified": "2024-10-31T16:35:17.260", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "KERUI HD 3MP 1080P Tuya Camera 1.0.4 has a command injection vulnerability in the module that connects to the local network via a QR code. This vulnerability allows an attacker to create a custom, unauthenticated QR code and abuse one of the parameters, either SSID or PASSWORD, in the JSON data contained within the QR code. By that, the attacker can execute arbitrary code on the camera." + }, + { + "lang": "es", + "value": "KERUI HD 3MP 1080P Tuya Camera 1.0.4 tiene una vulnerabilidad de inyecci\u00f3n de comandos en el m\u00f3dulo que se conecta a la red local a trav\u00e9s de un c\u00f3digo QR. Esta vulnerabilidad permite a un atacante crear un c\u00f3digo QR personalizado y no autenticado y abusar de uno de los par\u00e1metros, ya sea SSID o PASSWORD, en los datos JSON contenidos en el c\u00f3digo QR. De esta manera, el atacante puede ejecutar c\u00f3digo arbitrario en la c\u00e1mara." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://medium.com/%40shenhavmor/exploiting-a-chinese-camera-for-fun-cve-2024-48214-2d56848870c2", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json index be4d6e489ba..378e26e0ea9 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48218", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.603", - "lastModified": "2024-10-29T18:35:08.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:44:18.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/21", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json index 48fc121bd9f..b1bdcc739aa 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48222", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.680", - "lastModified": "2024-10-29T18:35:10.053", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:44:22.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/22", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json index ad5e9df5140..2be5298fd26 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48223", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.740", - "lastModified": "2024-10-29T18:35:11.373", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:44:25.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/23", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json index 56436045a33..493589cfa1e 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48224", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.793", - "lastModified": "2024-10-29T18:35:12.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:32:45.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/24", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48225.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48225.json index 24198e9c91e..501fe2d3899 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48225.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48225.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48225", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.893", - "lastModified": "2024-10-28T21:35:18.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:35:46.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/25", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48226.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48226.json index c94a91ab819..b3f566dd6c3 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48226.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48226.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48226", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.953", - "lastModified": "2024-10-28T21:35:19.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:38:32.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/26", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48227.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48227.json index b3b96827da7..81796237cc7 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48227.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48227.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48227", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:04.010", - "lastModified": "2024-10-28T21:35:20.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:48:19.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/27", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48229.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48229.json index bcc2debbf7d..f169d104a90 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48229.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48229", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:04.063", - "lastModified": "2024-10-28T20:35:19.940", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:49:11.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/28", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48230.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48230.json index 1d2debe9ad3..e8c537884d5 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48230.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48230.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48230", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:04.123", - "lastModified": "2024-10-28T20:35:20.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-31T15:57:23.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/30", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json index f2aacc32a8e..77255bfe1e6 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48241", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:07.490", - "lastModified": "2024-10-30T18:15:07.490", + "lastModified": "2024-10-31T15:35:39.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in radare2 v5.8.0 through v5.9.4 allows a local attacker to cause a denial of service via the __bf_div function." + }, + { + "lang": "es", + "value": "Un problema en radare2 v5.8.0 a v5.9.4 permite que un atacante local provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n __bf_div." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/St-Andrews-Bug-Busters/Vuln_info/blob/main/radare2/CVE-2024-48241.md", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json index 024095fc5cf..5efecf50b72 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48271.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48271", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T20:15:04.553", - "lastModified": "2024-10-30T20:15:04.553", + "lastModified": "2024-10-31T16:35:18.043", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DSL6740C v6.TR069.20211230 was discovered to use insecure default credentials for Administrator access, possibly allowing attackers to bypass authentication and escalate privileges on the device via a bruteforce attack." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DSL6740C v6.TR069.20211230 usa credenciales predeterminadas inseguras para el acceso de administrador, lo que posiblemente permita a los atacantes eludir la autenticaci\u00f3n y aumentar los privilegios en el dispositivo a trav\u00e9s de un ataque de fuerza bruta." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/stevenyu113228/e264c145d6e6e6b59cf53fddc27409ad#1--predictable-administrator-credentials-in-d-link-dsl6740c-modem", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json index c58dc97cdd4..c8337f55319 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48272.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48272", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T20:15:04.620", - "lastModified": "2024-10-30T20:15:04.620", + "lastModified": "2024-10-31T16:35:19.107", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DSL6740C v6.TR069.20211230 was discovered to use an insecure default Wifi password, possibly allowing attackers to connect to the device via a bruteforce attack." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que D-Link DSL6740C v6.TR069.20211230 usa una contrase\u00f1a de Wifi predeterminada insegura, lo que posiblemente permite a los atacantes conectarse al dispositivo a trav\u00e9s de un ataque de fuerza bruta." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/stevenyu113228/e264c145d6e6e6b59cf53fddc27409ad#2--predictable-wifi-password-in-d-link-dsl6740c-modem", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json index e0294b7deac..9ebc2cb2290 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48311.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48311", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T02:15:04.003", - "lastModified": "2024-10-31T02:15:04.003", + "lastModified": "2024-10-31T16:35:19.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Piwigo v14.5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Edit album function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Piwigo v14.5.0 conten\u00eda cross-site request forgery (CSRF) a trav\u00e9s de la funci\u00f3n Editar \u00e1lbum." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/whiteshark2k/Piwigo-CSRF/blob/main/Piwigo-CSRF.md", diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json index 6b60833abe5..4eae78f7172 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48807.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48807", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.680", - "lastModified": "2024-10-30T21:15:14.680", + "lastModified": "2024-10-31T15:35:39.950", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in PHPGurukul Doctor Appointment Management System v.1.0 allows a local attacker to execute arbitrary code via the search parameter." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en PHPGurukul Doctor Appointment Management System v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de b\u00fasqueda." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://medium.com/%40KrishnaChaganti/cross-site-scripting-xss-in-appointment-management-system-cve-2024-48807-0f7523be9fa2", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json new file mode 100644 index 00000000000..03567508d29 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48910.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-48910", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-31T15:15:15.720", + "lastModified": "2024-10-31T15:15:15.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify was vulnerable to prototype pollution. This vulnerability is fixed in 2.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cure53/DOMPurify/commit/d1dd0374caef2b4c56c3bd09fe1988c3479166dc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-p3vf-v8qc-cwcr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49632.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49632.json index 9e141c3aa99..d4e4661890c 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49632.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49632.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49632", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T14:15:07.227", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:31:51.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Coral Web Design CWD 3D Image Gallery allows Reflected XSS.This issue affects CWD 3D Image Gallery: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Coral Web Design CWD 3D Image Gallery permite XSS reflejado. Este problema afecta a CWD 3D Image Gallery: desde n/a hasta 1.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coralwebdesign:cwd_3d_image_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "B34EBFE2-0210-45EE-A7D1-DA2E32B8B5B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cwd-3d-image-gallery/wordpress-cwd-3d-image-gallery-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49634.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49634.json index 494c95aa55d..86178622fa3 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49634.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49634.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49634", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T14:15:07.547", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:30:35.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Rimon Habib BP Member Type Manager allows Reflected XSS.This issue affects BP Member Type Manager: from n/a through 1.01." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Rimon Habib BP Member Type Manager permite XSS reflejado. Este problema afecta a BP Member Type Manager: desde n/a hasta 1.01." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rimonhabib:bp_member_type_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.01", + "matchCriteriaId": "D9172BEC-A621-4A5E-A781-0CC9E974A250" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bp-member-type-manager/wordpress-bp-member-type-manager-plugin-1-01-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49635.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49635.json index 9d5bd6029db..cf71881ac67 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49635.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49635.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49635", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T13:15:05.133", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:27:24.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Manzurul Haque Banner Slider allows Reflected XSS.This issue affects Banner Slider: from n/a through 2.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Manzurul Haque Banner Slider permite XSS reflejado. Este problema afecta a Banner Slider: desde n/a hasta 2.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:manzurulhaque:banner_slider:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1", + "matchCriteriaId": "5E9E0D8B-616A-4206-9E27-36343BD080B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/banner-slider/wordpress-banner-slider-plugin-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49638.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49638.json index 5a904cd2cb2..5ab67ac6b42 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49638.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49638.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49638", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T13:15:05.817", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:56:45.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ali Azlan Risk Warning Bar allows Reflected XSS.This issue affects Risk Warning Bar: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Ali Azlan Risk Warning Bar permite XSS reflejado. Este problema afecta a Risk Warning Bar: desde n/a hasta 1.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aliazlan:risk_warning_bar:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "829BA066-A55A-4757-8CD1-E328010B465B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/risk-warning-bar/wordpress-risk-warning-bar-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49639.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49639.json index 66c00f7526c..32572a3a078 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49639.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49639.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49639", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T13:15:06.080", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:58:48.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Edward Stoever Monitor.Chat allows Reflected XSS.This issue affects Monitor.Chat: from n/a through 1.1.1." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n inadecuada de entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Edward Stoever Monitor.Chat permite XSS reflejado. Este problema afecta a Monitor.Chat: desde n/a hasta 1.1.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:edwardstoever:monitor.chat:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.1", + "matchCriteriaId": "1096328E-1D32-4AED-931D-BA53853F365D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/monitor-chat/wordpress-monitor-chat-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49640.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49640.json index 41fd96653bf..5d457e06b7e 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49640.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49640.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49640", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T13:15:06.297", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:04:01.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AmaderCode Lab ACL Floating Cart for WooCommerce allows Reflected XSS.This issue affects ACL Floating Cart for WooCommerce: from n/a through 0.9." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en AmaderCode Lab ACL Floating Cart para WooCommerce permite XSS reflejado. Este problema afecta a ACL Floating Cart para WooCommerce: desde n/a hasta 0.9." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amadercodelab:acl_floating_cart_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.9", + "matchCriteriaId": "5136C807-2D56-4241-BD2F-E666831FE004" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/acl-floating-cart-for-woocommerce/wordpress-acl-floating-cart-for-woocommerce-plugin-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49641.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49641.json index f32938e49c7..43eaa7fce82 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49641.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49641.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49641", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T13:15:06.510", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:05:44.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tidaweb Tida URL Screenshot allows Reflected XSS.This issue affects Tida URL Screenshot: from n/a through 1.0." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Tidaweb Tida URL Screenshot permite XSS reflejado. Este problema afecta a Tida URL Screenshot: desde n/a hasta 1.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tidaweb:tida_url_screenshot:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "764A354C-A8B3-4B18-B98B-739C2F385176" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/tida-url-screenshot/wordpress-tida-url-screenshot-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json new file mode 100644 index 00000000000..d6f4217d168 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50354.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-50354", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-31T16:15:05.763", + "lastModified": "2024-10-31T16:15:05.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Consensys/gnark/commit/47ae846339add2bdf9983e499342bfdfe195191d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Consensys/gnark/pull/1307", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-cph5-3pgr-c82g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json index 3d2c3b1a9ba..21dcd5afc00 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51242.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51242", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.793", - "lastModified": "2024-10-30T21:15:14.793", + "lastModified": "2024-10-31T16:35:20.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Server-Side Request Forgery (SSRF) vulnerability has been identified in eladmin 2.7 and earlier in ServerDeployController.java. The manipulation of the HTTP Body ip parameter leads to SSRF." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de Server-Side Request Forgery (SSRF) en eladmin 2.7 y versiones anteriores en ServerDeployController.java. La manipulaci\u00f3n del par\u00e1metro ip del cuerpo HTTP conduce a SSRF." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/shadia0/Patienc/blob/main/eladmin_ssrf.md", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json index cda81d0ccff..e8edc49224d 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51243.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51243", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.860", - "lastModified": "2024-10-30T21:15:14.860", + "lastModified": "2024-10-31T15:35:40.967", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The eladmin v2.7 and before contains a remote code execution (RCE) vulnerability that can control all application deployment servers of this management system via DeployController.java." + }, + { + "lang": "es", + "value": "Eladmin v2.7 y anteriores contienen una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) que puede controlar todos los servidores de implementaci\u00f3n de aplicaciones de este sistema de administraci\u00f3n a trav\u00e9s de DeployController.java." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/shadia0/Patienc/blob/main/eladmin_rce.md", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json index d12536efa70..efd8f2347a5 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51254.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51254", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T14:15:06.140", - "lastModified": "2024-10-31T14:15:06.140", + "lastModified": "2024-10-31T15:35:41.800", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the sign_cacertificate function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json new file mode 100644 index 00000000000..acc95a041ba --- /dev/null +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51255", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T16:15:06.033", + "lastModified": "2024-10-31T16:15:06.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json new file mode 100644 index 00000000000..3f3b5b72fc4 --- /dev/null +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51260", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T16:15:06.113", + "lastModified": "2024-10-31T16:15:06.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json index 129099e8b87..d73c612b2e2 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51419.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51419", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.913", - "lastModified": "2024-10-30T21:15:14.913", + "lastModified": "2024-10-31T15:35:42.590", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Shenzhen Interconnection Harbor Network Technology Co., Ltd Ofweek Online Exhibition v.1.0.0 allows a remote attacker to execute arbitrary code." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en Shenzhen Interconnection Harbor Network Technology Co., Ltd Ofweek Online Exhibition v.1.0.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/475bd8bc21c4f4dfc8f26ce35eb6ca28.git", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json index c24ddda5aab..26b7d1ee32a 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51424.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51424", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.973", - "lastModified": "2024-10-30T21:15:14.973", + "lastModified": "2024-10-31T16:35:21.660", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Ethereum v.1.12.2 allows remote attacker to execute arbitrary code via the Owned.setOwner function" + }, + { + "lang": "es", + "value": "Un problema en Ethereum v.1.12.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n Owned.setOwner" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Wzy-source/Gala/blob/main/CVEs/AURA_0x967d176328948e4db4446b8caf623ff9b47221fb.md", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json index effaf25d80b..35418ae8b98 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51425.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51425", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:15.027", - "lastModified": "2024-10-30T21:15:15.027", + "lastModified": "2024-10-31T16:35:22.463", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure Permissions vulnerability in Ethereum v.1.12.2 allows a remote attacker to escalate privileges via the WaterToken Contract." + }, + { + "lang": "es", + "value": "La vulnerabilidad de permisos inseguros en Ethereum v.1.12.2 permite a un atacante remoto escalar privilegios a trav\u00e9s del contrato WaterToken." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Wzy-source/Gala/blob/main/CVEs/WaterToken_0x8890963266f895aca11fbe4679a1f9cc472f6531.md", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json index e5b22615b26..1f7dcdbe2a0 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51426.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51426", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:15.083", - "lastModified": "2024-10-30T21:15:15.083", + "lastModified": "2024-10-31T15:35:43.373", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure Permissions vulnerability in Ethereum v.1.12.2 allows a remote attacker to escalate privileges via the _transfer function." + }, + { + "lang": "es", + "value": "La vulnerabilidad de permisos inseguros en Ethereum v.1.12.2 permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n _transfer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Wzy-source/Gala/blob/main/CVEs/EOTT_0x5fe0971167215aade651f76492f8489e43ceb48a.md", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json index f3e20b7b6a1..0502294e606 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51427.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51427", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:15.147", - "lastModified": "2024-10-30T21:15:15.147", + "lastModified": "2024-10-31T15:35:44.180", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Ethereum v.1.12.2 allows remote attacker to execute arbitrary code via the PepeGxng smart contract mint function." + }, + { + "lang": "es", + "value": "Un problema en Ethereum v.1.12.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de acu\u00f1aci\u00f3n del contrato inteligente PepeGxng." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Wzy-source/Gala/blob/main/CVEs/PepeGxng_0x5d8d1f28cad84fad8d2fea9fdd4ab5022d23b0fe.md", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5143.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5143.json index 7957f8c85f9..e62533590af 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5143.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5143.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5143", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-05-23T17:15:31.560", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-10-31T15:35:44.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un usuario con privilegios administrativos del dispositivo puede cambiar la configuraci\u00f3n del servidor SMTP existente en el dispositivo, sin tener que volver a ingresar las credenciales del servidor SMTP. Al redirigir el tr\u00e1fico de env\u00edo a correo electr\u00f3nico al nuevo servidor, es posible que las credenciales originales del servidor SMTP queden expuestas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_10643804-10643841-16/HPSBPI03941", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json index 43936265c69..35da9233c96 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5498", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.630", - "lastModified": "2024-06-10T17:16:34.980", + "lastModified": "2024-10-31T15:35:45.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Use after free en la API de presentaci\u00f3n de Google Chrome anterior a 125.0.6422.141 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7473.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7473.json index fe7c621c30b..6c930b947d0 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7473.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7473.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7473", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:09.320", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:11:45.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An IDOR vulnerability exists in the 'Evaluations' function of the 'umgws datasets' section in lunary-ai/lunary versions 1.3.2. This vulnerability allows an authenticated user to update other users' prompts by manipulating the 'id' parameter in the request. The issue is fixed in version 1.4.3." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de IDOR en la funci\u00f3n 'Evaluations' de la secci\u00f3n 'umgws datasets' en las versiones 1.3.2 de lunary-ai/lunary. Esta vulnerabilidad permite que un usuario autenticado actualice las solicitudes de otros usuarios manipulando el par\u00e1metro 'id' en la solicitud. El problema se solucion\u00f3 en la versi\u00f3n 1.4.3." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -37,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:1.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "93840276-E91E-46AC-A986-328E70685F2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/88b55b01fcbab0fbbc5b8032a38d0345af98ecfa", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/afecd927-b5f6-44ba-9147-5c45091beda5", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7774.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7774.json index 644a8659705..659ff65c29d 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7774.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7774.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7774", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:09.930", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:39:04.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en el m\u00e9todo `getFullPath` de la versi\u00f3n 0.2.5 de langchain-ai/langchainjs. Esta vulnerabilidad permite a los atacantes guardar archivos en cualquier parte del sistema de archivos, sobrescribir archivos de texto existentes, leer archivos `.txt` y eliminar archivos. La vulnerabilidad se explota a trav\u00e9s de los m\u00e9todos `setFileContent`, `getParsedFile` y `mdelete`, que no desinfectan adecuadamente la entrada del usuario." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -37,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:langchain:langchain:0.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "7B64914C-D055-40ED-91D4-BC39AB147771" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/langchain-ai/langchainjs/commit/a0fad77d6b569e5872bd4a9d33be0c0785e538a9", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/8fe40685-b714-4191-af7a-3de5e5628cee", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7783.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7783.json index 70a050ff259..a6931bb9df5 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7783.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7783.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7783", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:10.137", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T15:49:02.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "mintplex-labs/anything-llm version latest contains a vulnerability where sensitive information, specifically a password, is improperly stored within a JWT (JSON Web Token) used as a bearer token in single user mode. When decoded, the JWT reveals the password in plaintext. This improper storage of sensitive information poses significant security risks, as an attacker who gains access to the JWT can easily decode it and retrieve the password. The issue is fixed in version 1.0.3." + }, + { + "lang": "es", + "value": " La \u00faltima versi\u00f3n de mintplex-labs/anything-llm contiene una vulnerabilidad en la que la informaci\u00f3n confidencial, espec\u00edficamente una contrase\u00f1a, se almacena incorrectamente dentro de un JWT (JSON Web Token) utilizado como token de portador en modo de usuario \u00fanico. Cuando se decodifica, el JWT revela la contrase\u00f1a en texto plano. Este almacenamiento inadecuado de informaci\u00f3n confidencial plantea importantes riesgos de seguridad, ya que un atacante que obtenga acceso al JWT puede decodificarlo f\u00e1cilmente y recuperar la contrase\u00f1a. El problema se solucion\u00f3 en la versi\u00f3n 1.0.3." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -47,14 +73,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.1", + "matchCriteriaId": "498B1DB1-2DCB-4F79-8767-AF1D35B56640" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mintplex-labs/anything-llm/commit/4430ddb05988470bc8f0479e7d07db1f7d4646ba", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/20e9950f-ad41-4d6b-8bd0-c7f7051695b3", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7962.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7962.json index 53ca4a1aaf4..1669146463e 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7962.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7962.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7962", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:10.557", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:14:52.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de lectura de archivos arbitrarios en la versi\u00f3n 20240628 de gaizhenbiao/chuanhuchatgpt debido a una validaci\u00f3n insuficiente al cargar archivos de plantilla de solicitud. Un atacante puede leer cualquier archivo que coincida con criterios espec\u00edficos utilizando una ruta absoluta. El archivo no debe tener una extensi\u00f3n .json y, a excepci\u00f3n de la primera l\u00ednea, todas las dem\u00e1s l\u00edneas deben contener comas. Esta vulnerabilidad permite leer partes de archivos que cumplen con el formato, incluidos archivos de c\u00f3digo y de registro, que pueden contener informaci\u00f3n altamente confidencial, como credenciales de cuenta." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -36,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@huntr.dev", "type": "Secondary", @@ -47,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:2023-06-28:*:*:*:*:*:*:*", + "matchCriteriaId": "9DCEDE87-A3AF-4AB9-8117-3452AA7C8367" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/2836fd1db3efcd5ede63c0e7fbbdf677730dbb51", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/83f0a8e1-490c-49e7-b334-02125ee0f1b1", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8143.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8143.json index 44ae9a4ac70..c3089c1623b 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8143.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8143.json @@ -2,16 +2,42 @@ "id": "CVE-2024-8143", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:10.750", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:23:35.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /file endpoint that allows authenticated users to access the chat history of other users. When a user logs in, a directory is created in the history folder with the user's name. By manipulating the /file endpoint, an authenticated user can enumerate and access files in other users' directories, leading to unauthorized access to private chat histories. This vulnerability can be exploited to read any user's private chat history." + }, + { + "lang": "es", + "value": "En la \u00faltima versi\u00f3n (20240628) de gaizhenbiao/chuanhuchatgpt, existe un problema en el endpoint /file que permite a los usuarios autenticados acceder al historial de chat de otros usuarios. Cuando un usuario inicia sesi\u00f3n, se crea un directorio en la carpeta de historial con el nombre del usuario. Al manipular el endpoint /file, un usuario autenticado puede enumerar y acceder a archivos en los directorios de otros usuarios, lo que genera un acceso no autorizado a los historiales de chat privados. Esta vulnerabilidad se puede explotar para leer el historial de chat privado de cualquier usuario." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -37,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,14 +83,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:2024-06-28:*:*:*:*:*:*:*", + "matchCriteriaId": "06045E21-583A-4673-B374-990B2B56ED86" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/ccc7479ace5c9e1a1d9f4daf2e794ffd3865fc2b", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/71c5ea4b-524a-4173-8fd4-2fbabd69502e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json new file mode 100644 index 00000000000..2157a43c558 --- /dev/null +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8185.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8185", + "sourceIdentifier": "security@hashicorp.com", + "published": "2024-10-31T16:15:06.267", + "lastModified": "2024-10-31T16:15:06.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vault Community and Vault Enterprise (\u201cVault\u201d) clusters using Vault\u2019s Integrated Storage backend are vulnerable to a denial-of-service (DoS) attack through memory exhaustion through a Raft cluster join API endpoint . An attacker may send a large volume of requests to the endpoint which may cause Vault to consume excessive system memory resources, potentially leading to a crash of the underlying system and the Vault process itself.\n\nThis vulnerability, CVE-2024-8185, is fixed in Vault Community 1.18.1 and Vault Enterprise 1.18.1, 1.17.8, and 1.16.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-636" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.hashicorp.com/t/hcsec-2024-26-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-processing-raft-cluster-join-requests/71047", + "source": "security@hashicorp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8553.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8553.json new file mode 100644 index 00000000000..05696cff04f --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8553.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8553", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-10-31T15:15:17.243", + "lastModified": "2024-10-31T15:15:17.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Foreman's loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman's database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-8553", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312524", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9505.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9505.json index 8db883f2c0e..432a3735b2f 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9505.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9505.json @@ -2,20 +2,44 @@ "id": "CVE-2024-9505", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T14:15:08.500", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T16:39:41.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Beaver Builder \u2013 WordPress Page Builder para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s del widget Button del complemento en todas las versiones hasta la 2.8.4.2 incluida, debido a una desinfecci\u00f3n de entrada y a un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarias en las p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -47,22 +71,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "2.8.4.3", + "matchCriteriaId": "12EACADD-5AA3-41DD-BCF0-416419569E1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3177345/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/beaver-builder-lite-version/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7cfab048-efc6-4c7c-a1bd-0a9daf8779bc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wpbeaverbuilder.com/change-logs/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index bdba146eba8..99f65a34dbc 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-31T15:00:33.966268+00:00 +2024-10-31T17:00:20.597318+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-31T14:58:27.613000+00:00 +2024-10-31T16:48:41.553000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267729 +267735 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `6` -- [CVE-2024-10454](CVE-2024/CVE-2024-104xx/CVE-2024-10454.json) (`2024-10-31T13:15:14.580`) -- [CVE-2024-42835](CVE-2024/CVE-2024-428xx/CVE-2024-42835.json) (`2024-10-31T14:15:05.610`) -- [CVE-2024-51254](CVE-2024/CVE-2024-512xx/CVE-2024-51254.json) (`2024-10-31T14:15:06.140`) -- [CVE-2024-51259](CVE-2024/CVE-2024-512xx/CVE-2024-51259.json) (`2024-10-31T14:15:06.260`) -- [CVE-2024-8934](CVE-2024/CVE-2024-89xx/CVE-2024-8934.json) (`2024-10-31T13:15:15.040`) +- [CVE-2024-48910](CVE-2024/CVE-2024-489xx/CVE-2024-48910.json) (`2024-10-31T15:15:15.720`) +- [CVE-2024-50354](CVE-2024/CVE-2024-503xx/CVE-2024-50354.json) (`2024-10-31T16:15:05.763`) +- [CVE-2024-51255](CVE-2024/CVE-2024-512xx/CVE-2024-51255.json) (`2024-10-31T16:15:06.033`) +- [CVE-2024-51260](CVE-2024/CVE-2024-512xx/CVE-2024-51260.json) (`2024-10-31T16:15:06.113`) +- [CVE-2024-8185](CVE-2024/CVE-2024-81xx/CVE-2024-8185.json) (`2024-10-31T16:15:06.267`) +- [CVE-2024-8553](CVE-2024/CVE-2024-85xx/CVE-2024-8553.json) (`2024-10-31T15:15:17.243`) ### CVEs modified in the last Commit -Recently modified CVEs: `62` +Recently modified CVEs: `117` -- [CVE-2024-29734](CVE-2024/CVE-2024-297xx/CVE-2024-29734.json) (`2024-10-31T14:35:13.830`) -- [CVE-2024-35919](CVE-2024/CVE-2024-359xx/CVE-2024-35919.json) (`2024-10-31T14:35:15.330`) -- [CVE-2024-37087](CVE-2024/CVE-2024-370xx/CVE-2024-37087.json) (`2024-10-31T14:35:15.630`) -- [CVE-2024-3785](CVE-2024/CVE-2024-37xx/CVE-2024-3785.json) (`2024-10-31T14:35:17.530`) -- [CVE-2024-39708](CVE-2024/CVE-2024-397xx/CVE-2024-39708.json) (`2024-10-31T14:35:16.610`) -- [CVE-2024-41153](CVE-2024/CVE-2024-411xx/CVE-2024-41153.json) (`2024-10-31T14:37:48.533`) -- [CVE-2024-41156](CVE-2024/CVE-2024-411xx/CVE-2024-41156.json) (`2024-10-31T14:49:39.800`) -- [CVE-2024-43795](CVE-2024/CVE-2024-437xx/CVE-2024-43795.json) (`2024-10-31T14:15:05.723`) -- [CVE-2024-44203](CVE-2024/CVE-2024-442xx/CVE-2024-44203.json) (`2024-10-31T14:08:10.090`) -- [CVE-2024-46977](CVE-2024/CVE-2024-469xx/CVE-2024-46977.json) (`2024-10-31T14:15:05.870`) -- [CVE-2024-47529](CVE-2024/CVE-2024-475xx/CVE-2024-47529.json) (`2024-10-31T14:15:05.980`) -- [CVE-2024-47968](CVE-2024/CVE-2024-479xx/CVE-2024-47968.json) (`2024-10-31T13:35:11.047`) -- [CVE-2024-47974](CVE-2024/CVE-2024-479xx/CVE-2024-47974.json) (`2024-10-31T13:35:11.790`) -- [CVE-2024-4811](CVE-2024/CVE-2024-48xx/CVE-2024-4811.json) (`2024-10-31T14:35:19.917`) -- [CVE-2024-48112](CVE-2024/CVE-2024-481xx/CVE-2024-48112.json) (`2024-10-31T14:35:19.053`) -- [CVE-2024-49636](CVE-2024/CVE-2024-496xx/CVE-2024-49636.json) (`2024-10-31T14:51:06.170`) -- [CVE-2024-49637](CVE-2024/CVE-2024-496xx/CVE-2024-49637.json) (`2024-10-31T14:52:42.927`) -- [CVE-2024-49980](CVE-2024/CVE-2024-499xx/CVE-2024-49980.json) (`2024-10-31T14:58:27.613`) -- [CVE-2024-50479](CVE-2024/CVE-2024-504xx/CVE-2024-50479.json) (`2024-10-31T13:02:20.793`) -- [CVE-2024-50483](CVE-2024/CVE-2024-504xx/CVE-2024-50483.json) (`2024-10-31T13:12:11.813`) -- [CVE-2024-50488](CVE-2024/CVE-2024-504xx/CVE-2024-50488.json) (`2024-10-31T13:19:42.087`) -- [CVE-2024-50497](CVE-2024/CVE-2024-504xx/CVE-2024-50497.json) (`2024-10-31T13:55:14.493`) -- [CVE-2024-50501](CVE-2024/CVE-2024-505xx/CVE-2024-50501.json) (`2024-10-31T13:51:19.780`) -- [CVE-2024-50502](CVE-2024/CVE-2024-505xx/CVE-2024-50502.json) (`2024-10-31T13:43:03.177`) -- [CVE-2024-8013](CVE-2024/CVE-2024-80xx/CVE-2024-8013.json) (`2024-10-31T13:33:03.953`) +- [CVE-2024-48311](CVE-2024/CVE-2024-483xx/CVE-2024-48311.json) (`2024-10-31T16:35:19.993`) +- [CVE-2024-48807](CVE-2024/CVE-2024-488xx/CVE-2024-48807.json) (`2024-10-31T15:35:39.950`) +- [CVE-2024-49632](CVE-2024/CVE-2024-496xx/CVE-2024-49632.json) (`2024-10-31T16:31:51.467`) +- [CVE-2024-49634](CVE-2024/CVE-2024-496xx/CVE-2024-49634.json) (`2024-10-31T16:30:35.667`) +- [CVE-2024-49635](CVE-2024/CVE-2024-496xx/CVE-2024-49635.json) (`2024-10-31T15:27:24.033`) +- [CVE-2024-49638](CVE-2024/CVE-2024-496xx/CVE-2024-49638.json) (`2024-10-31T15:56:45.253`) +- [CVE-2024-49639](CVE-2024/CVE-2024-496xx/CVE-2024-49639.json) (`2024-10-31T15:58:48.317`) +- [CVE-2024-49640](CVE-2024/CVE-2024-496xx/CVE-2024-49640.json) (`2024-10-31T16:04:01.113`) +- [CVE-2024-49641](CVE-2024/CVE-2024-496xx/CVE-2024-49641.json) (`2024-10-31T16:05:44.353`) +- [CVE-2024-51242](CVE-2024/CVE-2024-512xx/CVE-2024-51242.json) (`2024-10-31T16:35:20.873`) +- [CVE-2024-51243](CVE-2024/CVE-2024-512xx/CVE-2024-51243.json) (`2024-10-31T15:35:40.967`) +- [CVE-2024-51254](CVE-2024/CVE-2024-512xx/CVE-2024-51254.json) (`2024-10-31T15:35:41.800`) +- [CVE-2024-51419](CVE-2024/CVE-2024-514xx/CVE-2024-51419.json) (`2024-10-31T15:35:42.590`) +- [CVE-2024-51424](CVE-2024/CVE-2024-514xx/CVE-2024-51424.json) (`2024-10-31T16:35:21.660`) +- [CVE-2024-51425](CVE-2024/CVE-2024-514xx/CVE-2024-51425.json) (`2024-10-31T16:35:22.463`) +- [CVE-2024-51426](CVE-2024/CVE-2024-514xx/CVE-2024-51426.json) (`2024-10-31T15:35:43.373`) +- [CVE-2024-51427](CVE-2024/CVE-2024-514xx/CVE-2024-51427.json) (`2024-10-31T15:35:44.180`) +- [CVE-2024-5143](CVE-2024/CVE-2024-51xx/CVE-2024-5143.json) (`2024-10-31T15:35:44.950`) +- [CVE-2024-5498](CVE-2024/CVE-2024-54xx/CVE-2024-5498.json) (`2024-10-31T15:35:45.733`) +- [CVE-2024-7473](CVE-2024/CVE-2024-74xx/CVE-2024-7473.json) (`2024-10-31T15:11:45.557`) +- [CVE-2024-7774](CVE-2024/CVE-2024-77xx/CVE-2024-7774.json) (`2024-10-31T15:39:04.510`) +- [CVE-2024-7783](CVE-2024/CVE-2024-77xx/CVE-2024-7783.json) (`2024-10-31T15:49:02.870`) +- [CVE-2024-7962](CVE-2024/CVE-2024-79xx/CVE-2024-7962.json) (`2024-10-31T16:14:52.337`) +- [CVE-2024-8143](CVE-2024/CVE-2024-81xx/CVE-2024-8143.json) (`2024-10-31T16:23:35.827`) +- [CVE-2024-9505](CVE-2024/CVE-2024-95xx/CVE-2024-9505.json) (`2024-10-31T16:39:41.193`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1ff99cd13ad..bd93be9805f 100644 --- a/_state.csv +++ b/_state.csv @@ -186715,7 +186715,7 @@ CVE-2021-46741,0,0,0b40e8e32d29e0f96f0af2c276768a4ac016129ae4d863795d7a4af2661b4 CVE-2021-46742,0,0,13ff92c0902a8e3ccb77fb7b8c8327dfae3feb5c7ee87f870ba029a124b88197,2022-07-12T17:42:04.277000 CVE-2021-46743,0,0,7e258fae6545733572be15bf8f00b471c0183fe9feab8e30aa3e99cd00a61619,2022-04-08T15:14:50.130000 CVE-2021-46744,0,0,78589c41b7d92db5eaffce6d6a8851bc2287ed56c43eefd5ab65e59e830716c6,2023-08-08T14:22:24.967000 -CVE-2021-46746,0,1,f69dd045dd81ec8afaac03d1182b070f7b32ac7bec01930b9232502f62e5930b,2024-10-31T14:35:00.797000 +CVE-2021-46746,0,0,f69dd045dd81ec8afaac03d1182b070f7b32ac7bec01930b9232502f62e5930b,2024-10-31T14:35:00.797000 CVE-2021-46748,0,0,31c9dac1ff239e43a51a8186c85667ae15dfd1b24d0146589cf32b12385adf26,2023-11-27T19:03:01.993000 CVE-2021-46749,0,0,32b0321c9cac1f53241df70eefee71a55ba83baf5aabfc47646aa71e6dda16c7,2023-05-22T15:55:47.967000 CVE-2021-46753,0,0,389185adc5adbd69df72eaf6b406809e56d98b55bc10a477c0fbb10a2e142a9a,2023-05-22T15:55:38.593000 @@ -186956,7 +186956,7 @@ CVE-2021-47030,0,0,191e68acbdbd1c1f0f225e5ebf05b8248fc07d397602f67829f4d47b2c1e8 CVE-2021-47031,0,0,1e3bf9e1068eaa2267033719a5941be32c26869b3a6b259408d91ecdaf4b89e7,2024-02-28T14:06:45.783000 CVE-2021-47032,0,0,24a70d7664e17ea4744cee3f46b43c182cfcb14b26079b40f7a2c10eb08f11cf,2024-02-28T14:06:45.783000 CVE-2021-47033,0,0,3630460be23c3df4a748886cc7ac2b22d5ad2abfbada15c1d17342058100d2d0,2024-02-28T14:06:45.783000 -CVE-2021-47034,0,0,98cf2b01ab2caf4dc5e2776cfc1bc0d8667430bec26e6418ccf6206ea5f8dcaa,2024-02-28T14:06:45.783000 +CVE-2021-47034,0,1,cf15843bae82d7cccdf398ec779c95ca86236c9ecba65ead7dc7f841a43daaf4,2024-10-31T15:35:02.410000 CVE-2021-47035,0,0,b793e624ff6ee2d195e693bb86587277505f6d3bfc055ec15f6dad7dec3a75f4,2024-02-28T14:06:45.783000 CVE-2021-47036,0,0,f365ffd615ad1aa6b98bd0fe1f9057ad1fcbaec31632cf95f465c6a392a4c45a,2024-02-28T14:06:45.783000 CVE-2021-47037,0,0,846334603095ecf75466453c0700d4a8384cc0d9fdb90f70529b2ee3448a49c8,2024-02-28T14:06:45.783000 @@ -187011,7 +187011,7 @@ CVE-2021-47085,0,0,99425eb67a70567219ce9050998d710c23af03d38c7b64b5ce0c488c80c15 CVE-2021-47086,0,0,610eccf541b98554d8678c48c0d5e735bfe4ec661d4b93d980c952036c90cd47,2024-03-05T13:41:01.900000 CVE-2021-47087,0,0,d2155a3ca154078a2d21512de18d6b0fe27152c0f765557d870ff728afcedc3c,2024-03-05T13:41:01.900000 CVE-2021-47088,0,0,7e8d82dddc0835fbe0dde83c2c98a181b55b82dadacbe821ae98bee937d859f9,2024-03-05T13:41:01.900000 -CVE-2021-47089,0,1,b50edabd3e3e4e21c0ff051820173f8d5db58f5d63479eb150d9868cfc79de6d,2024-10-31T14:35:02.470000 +CVE-2021-47089,0,0,b50edabd3e3e4e21c0ff051820173f8d5db58f5d63479eb150d9868cfc79de6d,2024-10-31T14:35:02.470000 CVE-2021-47090,0,0,2c489b1391e1218d2d16941f8633f5d95ddf471b2541e7953e288e3588523c2d,2024-03-05T13:41:01.900000 CVE-2021-47091,0,0,6f8bf2fa9b9e29ebfde7540e7d404d6090906d8861a09e884d533ea7fe33ccaf,2024-03-05T13:41:01.900000 CVE-2021-47092,0,0,cc354a14cc04187592aa1176b9d80e6683dd927a110ff36a87a0a4164e6a3e09,2024-03-05T13:41:01.900000 @@ -187021,7 +187021,7 @@ CVE-2021-47095,0,0,160862750cd10acd7d63895599ff51c9a7437fae93b0217e46e2f341f6091 CVE-2021-47096,0,0,ec9af2346f98d6beb85e8e9897f8585b8a2ac531f8e091a4acd9ee39981904c8,2024-03-05T13:41:01.900000 CVE-2021-47097,0,0,58ebb26d1f7850230d5008448bcdebe25d89b78d79664ef55bf62f9a66de63f7,2024-03-05T13:41:01.900000 CVE-2021-47098,0,0,0763164a67074d05eb60adf8d1e8da3ca5f6c1734f995938051fc95b00a9e0e6,2024-03-05T13:41:01.900000 -CVE-2021-47099,0,0,543b29c5b86f05618efda9fcda62961ea6d55789763392618b64010076eb340a,2024-03-05T13:41:01.900000 +CVE-2021-47099,0,1,b903832f89bb58c7c86247b94532e21dfc6eed8d316ef43abd58b41424cbb19d,2024-10-31T15:35:02.640000 CVE-2021-47100,0,0,1c224bc08b12832046f7569ba844c13544fee5fa67b749f6d17297f4ff588da3,2024-03-05T13:41:01.900000 CVE-2021-47101,0,0,2dd0c132d4fcf56cf76f95f6ee00933bc0404ad5451a25508e0e9b195c8c2fd8,2024-03-05T13:41:01.900000 CVE-2021-47102,0,0,b68b813111aad09d7a7300a66a05d9ac2d37e3cbff10e5bdc442ddc1ab1d247c,2024-03-05T13:41:01.900000 @@ -187069,7 +187069,7 @@ CVE-2021-47143,0,0,37b3b8d3155f64eb272889fbc77228cdffb19e343cd5a977b4d7922edb475 CVE-2021-47144,0,0,25febb044d5b5b411adf17c5fcdd4f6855f827ff96f505723621b7d575de73ca,2024-03-25T13:47:14.087000 CVE-2021-47145,0,0,fdbc6d9b06e3f798652a7b2609b70e37946cc2bc77bbb9495674cd5bc80e647b,2024-03-25T13:47:14.087000 CVE-2021-47146,0,0,08dbefa42c40d1844a57f093fee3b8c13ac58c6de7bcdba3641db7a2b11131ac,2024-03-25T13:47:14.087000 -CVE-2021-47147,0,0,b8ced23088a8e1554c174a53c74bdab7cfc7609e491d3a993b99d7bbceeb9b72,2024-03-25T13:47:14.087000 +CVE-2021-47147,0,1,0ced239502f0767d52ae93a9f10f3b010bb3a5e5f840466957ea471dfead80eb,2024-10-31T15:35:02.873000 CVE-2021-47148,0,0,be7937de389ed9652b8adc19d11499f9bbd4c61345ea654e28b3e5674da466ed,2024-03-25T13:47:14.087000 CVE-2021-47149,0,0,c030a20d442030f60545f75b73bf56416a08b8610928eaeeb3c77c0684ab371a,2024-03-25T13:47:14.087000 CVE-2021-47150,0,0,c039c267eea8345920d021434c604afedc5623ca093058c28ca680cbc8aa1f37,2024-03-25T13:47:14.087000 @@ -187150,7 +187150,7 @@ CVE-2021-47224,0,0,413a390368944d1a7d57d9920709038152923e30f74f3dfe0473afbe34abf CVE-2021-47225,0,0,6151b31c9506986be96203f26eb64bee342321c5d48323fdd39dbc88fab43e3d,2024-05-21T16:54:26.047000 CVE-2021-47226,0,0,0ca14def49d58288ccebac9b5ffda959e779c40fe1395292a223b40d99620dd8,2024-05-21T16:54:26.047000 CVE-2021-47227,0,0,d58b6e5d0039e2c73e223660c4806a8199d919f5d02b15eb3b8ec0875620efcc,2024-05-21T16:54:26.047000 -CVE-2021-47228,0,0,d519df75826032b74fd765a7bcee0d20e202e145cf022f2036942fff3a0cfa7a,2024-05-21T16:54:26.047000 +CVE-2021-47228,0,1,9c1b787ae52c72cbfb8866da7935ec75c9a82081ae53aec3f3f0cce23cf65a07,2024-10-31T15:35:03.093000 CVE-2021-47229,0,0,fbd2921f2b86842d2838e402054523e81b9ec6072574e295a789287be69873f9,2024-05-21T16:54:26.047000 CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000 CVE-2021-47231,0,0,f314712ca79ec59020eb9de32c2053b5331ef3739c4795732d3f9fb7ddcb9ed1,2024-05-21T16:54:26.047000 @@ -187255,7 +187255,7 @@ CVE-2021-47329,0,0,9617f023b4c58539ce1aedb7e8c3a8b0044bc4a95894a91243feb80378496 CVE-2021-47330,0,0,5a89086a39e2af1dd9937de77f0b0418fbc5f38f4e40f933988f9c5f4daae84f,2024-05-21T16:54:26.047000 CVE-2021-47331,0,0,7d7718c1999e10f819b14d817cfc5d43dfc4dfd220e09294beaaf2e13106c5c8,2024-05-21T16:54:26.047000 CVE-2021-47332,0,0,89911590c05095a4c832cec1abc8f125eec5f8e0d64ab3638bab76661117c00f,2024-05-21T16:54:26.047000 -CVE-2021-47333,0,0,d374ac15943c5c6ca6d4f13c71d50b4486b76cb49278bd366ca1cdf6af5fd496,2024-05-21T16:54:26.047000 +CVE-2021-47333,0,1,bf18a433d24443a549d2e2775d33e4fb78dd89014f03f1c893b6dd4a6e617a9e,2024-10-31T16:35:00.737000 CVE-2021-47334,0,0,ccdc70627a61f9499f437dd7049abe052ac73edce800d3bee2efeb7d6f158f83,2024-05-21T16:54:26.047000 CVE-2021-47335,0,0,305607751f0c60b8ca7b5a6fdaeb3ba232fdd35bfacbda81fc077e23b1d78d7f,2024-05-21T16:54:26.047000 CVE-2021-47336,0,0,ca1f3a1d4374b4a98f0e2e5142c1cb2f7b7ffc1dd7a0659023d6e21fd1ce3a68,2024-05-21T16:54:26.047000 @@ -187354,7 +187354,7 @@ CVE-2021-47428,0,0,6e8f8debf94876982a6fe3a8035951a4cf9f87b02ef7074a9caedfcb398af CVE-2021-47429,0,0,38cec6ec3800c93cfc6e64ef5ee1b10eebc6af84474f6d4e053232e988b05fc6,2024-05-21T16:53:56.550000 CVE-2021-47430,0,0,d302f8d7e8108af12e1af7758846d8a23dc285c16858de75bd645851b0a9a7a2,2024-05-21T16:53:56.550000 CVE-2021-47431,0,0,aaffcf531ed8a9e71edcc8667da9d08f38735eba6e7dfb7afd038842ed8407f8,2024-05-21T16:53:56.550000 -CVE-2021-47432,0,0,137959e8383ffae0c27cc8c34e89dc5bb10436404be030e46eeae5bbd0189e22,2024-05-21T16:53:56.550000 +CVE-2021-47432,0,1,a54953de5dc7c7d3e8596d205bcbef180b3a0bf6d7f1846e475bb1c3c56cfab8,2024-10-31T16:35:00.927000 CVE-2021-47433,0,0,c148bb2562b5bf4fd0b117c5ac77d68f9f0898982f46fe81e77a108bc4e123c5,2024-05-22T12:46:53.887000 CVE-2021-47434,0,0,70997ef8ad845ae3a08fd1a02451beb7602e3f76ebe26eec75d71c034f0532a4,2024-05-22T12:46:53.887000 CVE-2021-47435,0,0,d063dc53db995430cfda65e2466747fb8cd69b46d7ca5747554bea3cb18149a7,2024-05-22T12:46:53.887000 @@ -187393,7 +187393,7 @@ CVE-2021-47467,0,0,6d932d61a8553c59fccf2ba4f727bf060f1dd07870f09a774c32cb1b956da CVE-2021-47468,0,0,df5d02a0acf771100ecf87ab9fca24fc179ec393ac741de53345b13d36bac9e5,2024-05-22T12:46:53.887000 CVE-2021-47469,0,0,3ef0139505f227a19f5edbcdecef004c151ef8f7fe013e22d15d7d7690071081,2024-05-22T12:46:53.887000 CVE-2021-47470,0,0,61bee4a8068707feeca5787e6386bf440bc7a61ae05f000ba3842a803f7d29cf,2024-05-22T12:46:53.887000 -CVE-2021-47471,0,0,4d74025f09179007d1bb5a99d3027cf865eeb3baa22846ba8a0bbc4935326927,2024-05-22T12:46:53.887000 +CVE-2021-47471,0,1,57fdcaa36c43f442cc1887d84740383a9b1dfe9c4c1844e9d81e4c981ce616b3,2024-10-31T16:35:01.100000 CVE-2021-47472,0,0,4a163680eb0964c77bae31dc9771b9bdcab4b71fd554a2d2151c19134b7cbb1d,2024-06-17T17:15:51.050000 CVE-2021-47473,0,0,62c8562680eb4c53639001cda404b00fb742f1279f4684ea0674924bae10b1dc,2024-05-22T12:46:53.887000 CVE-2021-47474,0,0,04fd221fb63a425b0cc8651869ddb014996f7867a1d0ff2cdc001afbfca8f702,2024-05-22T12:46:53.887000 @@ -187516,21 +187516,21 @@ CVE-2021-47590,0,0,f39be5f78d966c2d22d67b4496d2a7538ff62fc77cf57a6c71df81c4fb431 CVE-2021-47591,0,0,075ff96a49ab3870794068c07184348561582a3968bb161ed2673754442a5134,2024-06-20T12:43:25.663000 CVE-2021-47592,0,0,3e6a900f856612ffa91a686567e21f4c94ed7d6a279efc65d48294ed49768d05,2024-06-20T12:43:25.663000 CVE-2021-47593,0,0,d7a43d01ab4a125b4e19b7cc66507d59f9c795640b357b5f69d8e118285d751e,2024-06-20T12:43:25.663000 -CVE-2021-47594,0,1,8cdfebe564f634c8797806be731e7843af5aeef7ba442bbd86f3cc5d16520d6b,2024-10-31T13:25:38.567000 -CVE-2021-47595,0,1,22cbd66b2328e4653957278957d5f13a2f978d0699c1f3217e6008a131202601,2024-10-31T13:27:04.057000 +CVE-2021-47594,0,0,8cdfebe564f634c8797806be731e7843af5aeef7ba442bbd86f3cc5d16520d6b,2024-10-31T13:25:38.567000 +CVE-2021-47595,0,0,22cbd66b2328e4653957278957d5f13a2f978d0699c1f3217e6008a131202601,2024-10-31T13:27:04.057000 CVE-2021-47596,0,0,1907e3f165fb4e5b48753df6fccdd2af7df1251b38a69b71dafcd90b678b1e72,2024-08-19T18:22:13.667000 CVE-2021-47597,0,0,17331943a100612a59f274fb29e9b045b8ef7bffba10c35fde978c62c3806ef0,2024-08-19T18:15:30.577000 CVE-2021-47598,0,0,f212e8f5248b2a91eca1c18c921ffe8dcf284ef4e373f68a8749d1452432a2be,2024-08-27T16:14:48.593000 -CVE-2021-47599,0,1,52223877ee7b056e68bd93101a323f90cf2cf1ed3a12d6f5c9331770b20644b8,2024-10-31T13:36:53.667000 +CVE-2021-47599,0,0,52223877ee7b056e68bd93101a323f90cf2cf1ed3a12d6f5c9331770b20644b8,2024-10-31T13:36:53.667000 CVE-2021-47600,0,0,75cc3b8f9f4b82a2dba36cc9c8cf2cf73a752aa22859fcd049e14203568be90d,2024-08-27T16:14:38.423000 CVE-2021-47601,0,0,7e4eec57dea85ff7c42442dd774d3b6a4d991000ef8c50e5b20a9ac0d710c596,2024-08-27T16:14:33.227000 -CVE-2021-47602,0,1,9331402e967c710d555501b3f107e3b3a3a55f48a21ce0c53f93965980105bd1,2024-10-31T13:41:15.330000 -CVE-2021-47603,0,1,c39a36175f1ab432390342d3020157e09d5080a6b879b57520af3a302c16ee74,2024-10-31T13:46:39.310000 +CVE-2021-47602,0,0,9331402e967c710d555501b3f107e3b3a3a55f48a21ce0c53f93965980105bd1,2024-10-31T13:41:15.330000 +CVE-2021-47603,0,0,c39a36175f1ab432390342d3020157e09d5080a6b879b57520af3a302c16ee74,2024-10-31T13:46:39.310000 CVE-2021-47604,0,0,ac31811ff3ea9487872dcb752719657552aafd373d8cbc184273811f43ff1778,2024-08-27T16:14:27.793000 -CVE-2021-47605,0,1,51949b2be0cec2875d8874ddbbc898eefe503bd3fe714908a9e66ccba722cd11,2024-10-31T13:50:27.413000 -CVE-2021-47606,0,1,25c64ffa74b94e08390c0a438ff2a3f798bd8ce001419121add66fd1d7fed33f,2024-10-31T13:58:05.350000 -CVE-2021-47607,0,1,bd4fb8f531ce169ca1c9d616da1eeae4b2bdc198c406db74dde3c1b695aaa071,2024-10-31T14:07:03.140000 -CVE-2021-47608,0,1,0886f659afc1fa58b88f26d9849fa4d4aba6e61b8465f4b70c0dcd7ea7d1c486,2024-10-31T14:16:04.227000 +CVE-2021-47605,0,0,51949b2be0cec2875d8874ddbbc898eefe503bd3fe714908a9e66ccba722cd11,2024-10-31T13:50:27.413000 +CVE-2021-47606,0,0,25c64ffa74b94e08390c0a438ff2a3f798bd8ce001419121add66fd1d7fed33f,2024-10-31T13:58:05.350000 +CVE-2021-47607,0,0,bd4fb8f531ce169ca1c9d616da1eeae4b2bdc198c406db74dde3c1b695aaa071,2024-10-31T14:07:03.140000 +CVE-2021-47608,0,0,0886f659afc1fa58b88f26d9849fa4d4aba6e61b8465f4b70c0dcd7ea7d1c486,2024-10-31T14:16:04.227000 CVE-2021-47609,0,0,d5d3574371d69948da6acaf830f70f9ea8cb33a942e4472cbc068a76d779c28a,2024-10-30T21:31:54.493000 CVE-2021-47610,0,0,37f0f9bf2a6c534057e2bd73a9a69b473a415dbff8fc146dda3211d4f97f8e8d,2024-08-27T16:14:20.873000 CVE-2021-47611,0,0,5369632f1f51a18876adc9db044c282fadd9d8f0f62e0e0bcaffc9e232704990,2024-10-30T21:32:55.490000 @@ -198426,13 +198426,13 @@ CVE-2022-30351,0,0,2df1fcff158bfaa98e8e388cc82c7b76555d1068f7cfc1016565d9f0f4974 CVE-2022-30352,0,0,9c99852cab9cb3dba12ad494a32dc9a161c396d474ce4e7a613cf8447766b558,2022-06-10T02:33:25.820000 CVE-2022-30354,0,0,ed31654501a11742f4e835fe4296b61b12005697eaeaf68a14d81cdf10777a0a,2024-10-28T13:58:09.230000 CVE-2022-30355,0,0,6d9fc5fb26ac7ab8171f413564a07cbf75052f46f57c7fd9530e6ad9c225361f,2024-10-28T13:58:09.230000 -CVE-2022-30356,0,0,3911a82262c22fcde844adec556eca0e4bb6c86fd6948605faf7eef6a43cda3d,2024-10-29T20:35:01.120000 -CVE-2022-30357,0,0,9a65389899a6d289111e4563b3b9366a6e5ef747b49279b4e345f9f2dfcc58cc,2024-10-28T13:58:09.230000 -CVE-2022-30358,0,0,20103d4be02aecc7d635ac6f528447d711ba29607714f08b073408db99ac233c,2024-10-29T20:35:03.073000 -CVE-2022-30359,0,0,ca67a6809b0f5bc5329dcbeee12c762d4d1e2dda248645d6d8da7c9c5d3f3b5d,2024-10-29T20:35:04.317000 +CVE-2022-30356,0,1,7a1e04a7cf3625e64e58a6b4b1aa0c435bc9693617f116e89f127c0bd3e3bdcd,2024-10-31T16:31:46.453000 +CVE-2022-30357,0,1,23d90cefd015d379709c5b8644152f3538e766ba9e0dfeca7ffc5a80811ec716,2024-10-31T16:43:03.233000 +CVE-2022-30358,0,1,d03e58b6ffd47d97770cec53cbfef75f6d8b8c7cc3d97c81d72512623291bdb4,2024-10-31T16:41:38.260000 +CVE-2022-30359,0,1,6559761c73db6120089b0a44b4bee2781b1e3de315c1cb0bf69242f6ffc28af4,2024-10-31T16:37:47.300000 CVE-2022-3036,0,0,c4abe10251774bed45d05e8655ab46440316bc2da3c56604182cb58b05d9789f,2022-09-21T15:01:39.933000 -CVE-2022-30360,0,0,b069b04fa47b91f9c7878081b8c9e8ed1ac31a5ba0958384a36363af477e1b41,2024-10-29T20:35:05.583000 -CVE-2022-30361,0,0,871c1de74822964343222386c12dff75f62adbdb0cc26e56094281c438c6494d,2024-10-29T20:35:06.847000 +CVE-2022-30360,0,1,aef2dc04aa10f0b8ec821a995fc7b9baef5743e2ba45a8ffa6fce5bee12e535d,2024-10-31T16:38:26.377000 +CVE-2022-30361,0,1,89a1758adcf4edb5d6b93f74bb84137cd07276adf0a24247f3554b66b3644203,2024-10-31T16:34:18.877000 CVE-2022-30367,0,0,4ab429b852faf9723dbf506dba281ae94cd253e629be5b5f8d2fb2c552ccac49,2022-05-23T16:59:24.497000 CVE-2022-3037,0,0,c435799296f92b50e0bd30d245bc09441dcbbe40f6a0905fc66767266b6ff152,2023-11-07T03:50:43.193000 CVE-2022-30370,0,0,43e003e1eee0ff632ee04c0ec5c6be63af911ff9967992f449cf67592ab6166e,2022-05-23T16:49:37.360000 @@ -212633,9 +212633,9 @@ CVE-2022-48995,0,0,6d50aef3372db06b6d495aa3016571870681b9327c2409bc5336d097bc2fa CVE-2022-48996,0,0,0f669c5d177a55ab1de24ef7aebf7206e81a91803f760e8aa9a6146660e8c4e1,2024-10-23T15:13:25.583000 CVE-2022-48997,0,0,b7b9d54e465f5a467cd4544e1b3ea1f9aa1fa07b25224a4e924ef74e6000999e,2024-10-23T15:13:25.583000 CVE-2022-48998,0,0,b57fd57be2b9c4c0639652b977cb6f002cc2a4810b1a8b3ec1079b25ac9d83fc,2024-10-23T15:13:25.583000 -CVE-2022-48999,0,1,ade5189407bcb1c53b709efa68b58bb4a61ffa43108c0637b7c0e393d125b80c,2024-10-31T14:44:10.857000 +CVE-2022-48999,0,0,ade5189407bcb1c53b709efa68b58bb4a61ffa43108c0637b7c0e393d125b80c,2024-10-31T14:44:10.857000 CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075c4,2023-11-30T22:15:07.600000 -CVE-2022-49000,0,1,3315f81ffe886dd8a0d6755db95204b8e967d8d84fc20d98b4981297144d3f94,2024-10-31T14:56:17.890000 +CVE-2022-49000,0,0,3315f81ffe886dd8a0d6755db95204b8e967d8d84fc20d98b4981297144d3f94,2024-10-31T14:56:17.890000 CVE-2022-49001,0,0,90c0c95232b0e405569e477719b0ebe94e42951a70f8f80fcb42731ab4608f53,2024-10-30T18:58:53.863000 CVE-2022-49002,0,0,fad7889d4553e8099b0d53ab53b5daa8b36d6d338a8c65200d67fb3b44de9d3c,2024-10-25T14:24:12.620000 CVE-2022-49003,0,0,f8f764dbf52fdce662c912f1975da1ca6c961f4536dbe6925188461916d8623f,2024-10-25T14:12:59.897000 @@ -218203,7 +218203,7 @@ CVE-2023-24200,0,0,99e9ae8a537e111c71b07ff22cc2a30bb1409cd6f5f0741da46271860de00 CVE-2023-24201,0,0,8a9c207eca40e4d4b2e5e0d411bdfa1f733f7e823034b48f82d5e7a96dc43541,2023-10-18T15:32:22.423000 CVE-2023-24202,0,0,e3965a80227f83c888b8a8b1247e7326d64b24dcc2ac7c921830f6f5a15c597a,2023-10-18T15:32:30.043000 CVE-2023-24203,0,0,310132a3696e821c3d06852cf005e4472ad7ca07f7cea901f293fe3de9fa49f8,2024-05-14T19:17:55.627000 -CVE-2023-24204,0,0,698568ee1032ceb268391536bdb634af043c51ce077cd270d5aaed8a7bde9d48,2024-05-14T19:17:55.627000 +CVE-2023-24204,0,1,0fc42b3c76142d9e593693ade6bfc0302166b4f6c1e3cf8f0460f8be8e9a8ef1,2024-10-31T15:35:03.320000 CVE-2023-24205,0,0,89fe5646cfd7550fcb62fb0c8b9580ed996aabae8501169c97af23b808ccc1ff,2023-03-03T16:50:46.983000 CVE-2023-24206,0,0,3c877b6834ab98410e1478e4c6c238c8c1702d0ab7aeadf8aba552b0964ae136,2023-03-07T16:54:36.097000 CVE-2023-2421,0,0,6e671d3b1511a2b4eebc061d9d618010a2491e6384d9aea2ced42a0aca5807ee,2024-05-17T02:22:58.430000 @@ -219019,7 +219019,7 @@ CVE-2023-25196,0,0,b27797dea60d6f1ca75aaefa8c45cfe08f534c8a44f054fa68a519e6b580f CVE-2023-25197,0,0,36632fb9114380ab53315f939856a7cb749e1ad04cfdad6bf03eefa5abd06e25,2023-11-07T04:08:56.980000 CVE-2023-25199,0,0,d81c21d02b584034420981193f7edaddf04af66a9a34943af59142dee29ed9d2,2024-04-04T12:48:41.700000 CVE-2023-2520,0,0,3326ab4566b6281707727b204ff6ad6f086458d237d9f20e76492dab2c6cce7f,2024-05-17T02:23:02.043000 -CVE-2023-25200,0,0,3524136bf23f255b08e8e8abe3bdbd291eba0e2988edad854f4ef3e5d1ef5efb,2024-04-04T12:48:41.700000 +CVE-2023-25200,0,1,51dc38e2854eb1081a7c96f6706742d669c2d0c28913820743455ee3dc7f5a89,2024-10-31T15:35:04.180000 CVE-2023-25201,0,0,bb360609314c3b8df26714372b8c00a833f0be5e95719844e0fbee7d171e6320,2023-07-17T18:42:15.550000 CVE-2023-25206,0,0,a66c68e9232dee6976db80eccd93db72a749ba1c608ae9f3c1b3eac52e2fd623,2023-03-17T17:32:19.313000 CVE-2023-25207,0,0,d18a428162d8a39d938d7e9ece0b974f265a0faac5f3adf632e61e711cc7b756,2023-03-15T18:52:24.190000 @@ -223841,7 +223841,7 @@ CVE-2023-31304,0,0,2fcc0cbccc9a53bd2cff69caba5b473620491ec4a68ae2794ad193c9762ea CVE-2023-31305,0,0,d9246761767dbfcb2e2f558fb5fc5e1cec565f0df8c900e55c4f4f1cf420ccbb,2024-08-14T02:07:05.410000 CVE-2023-31307,0,0,927363a24df9ec7431f47a682d4205fb756e21f24bd0cd30e96e1e5c0bf4352a,2024-08-14T02:07:05.410000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 -CVE-2023-31310,0,0,8ccc7e5931d6d6bfc42a95a6f042175145d5e916bbb9dcb62980650f9827dfe9,2024-08-14T02:07:05.410000 +CVE-2023-31310,0,1,f17e30a0294060da2ce7aa247bba7d7e4f3746a8423691dd74baefa96f0eead0,2024-10-31T15:35:04.980000 CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19a27,2024-08-27T15:35:00.983000 CVE-2023-3132,0,0,52ab34552d4912b51189535960f33c42d601a676c80cf99d393d54a820deb2f0,2023-11-07T04:17:58.010000 CVE-2023-31320,0,0,94626c9fd18f585c07331302f269c549777a5d34517f86a0946e1593aaaba7c1,2023-11-30T15:10:43.827000 @@ -226461,7 +226461,7 @@ CVE-2023-34659,0,0,ba101ae9a9a6d722b772e73640680e94739c59a5da3aff941bdbae8a23637 CVE-2023-3466,0,0,6a83488758d15c147555e0ff29ed8d720348c008e9c4c1415429f70acbabdc3e,2023-07-28T14:54:11.013000 CVE-2023-34660,0,0,3fdae79286adb78105725fa2e0c187c138f0137808c41ee9fccc354d7a02987e,2023-06-23T21:24:20.913000 CVE-2023-34666,0,0,f76cf75345a2bd20080da0cef9068a77c71e3c695d022a60971bedfbfde43816,2023-10-04T17:36:00.863000 -CVE-2023-34669,0,0,0543d0a3f6afe89b0a7b06e0218f320cfa70792c10ad4a0919053a1fe945bf42,2023-07-26T00:33:37.767000 +CVE-2023-34669,0,1,84f15f4322d888707b0f12022052977a199f3f375af1086b4b7510f2159ddce3,2024-10-31T16:35:02.160000 CVE-2023-3467,0,0,ddc36a6bccdbf9a5a9a861700923fd29fe11a713965e08cbdb4c6b677ce12f22,2023-07-28T14:54:03.353000 CVE-2023-34671,0,0,430d38ebac24604129811785b11fbd0ccb77bf10a78e39ac10ab6ee086c1ed45,2023-07-05T15:42:10.257000 CVE-2023-34672,0,0,cb2a7a4c8015815cf4d1af3a124a789fdee78dca5922cf1fe574ae2bbe4be569,2023-07-03T20:00:19.827000 @@ -226969,7 +226969,7 @@ CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c37 CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000 CVE-2023-35690,0,0,10b31666d32fb921eb4f95053fcf3f0bd856083131ee7ecfd73bd4662ccda40b,2023-12-22T01:15:09.303000 CVE-2023-35691,0,0,c1f43dba39cb33b45c8f91110892fe526d3d45bc262e2bd40b7fb2d86647acb2,2023-07-20T18:54:48.517000 -CVE-2023-35692,0,0,7e92d28d27d7ee3db9d9917a6889932d0d839cacaf1df5047905a95093dbfc8c,2023-07-26T14:07:19.537000 +CVE-2023-35692,0,1,3f3ef26b096edc87873d3ef61f439fed0ccbc9d851fe8c3fb9366aea5989e861,2024-10-31T16:35:02.880000 CVE-2023-35693,0,0,33f8fd81bb24b626ae1a64cd26c75382ff1304e330148a1c85e371538b76aee3,2023-07-20T18:43:04.370000 CVE-2023-35694,0,0,39a950960774e51c41c895ffb6f7c831b0e3e5dc6f4f5e534f5f713a6cc72846,2023-07-20T19:00:19.483000 CVE-2023-35695,0,0,d1ef85c7d7ae205d92aaad125af2faa4ba7009a08f0332f7702722be4a36bbdf,2023-06-30T17:49:14.680000 @@ -229052,7 +229052,7 @@ CVE-2023-38295,0,0,4016d9baae518bf0696b020435affdc349f967568dc7494a3b5a7127ee5a6 CVE-2023-38296,0,0,1f7e0b083f1ca97eb24702c1e157c0da38ead63f125398b9dc376080776135ab,2024-07-03T01:40:46.110000 CVE-2023-38297,0,0,8252e63d0f592b7dcb5bb032ee0e2a17a136ef8adb27f39de20b5e59c80191cb,2024-10-25T20:35:04.400000 CVE-2023-38298,0,0,debb3ed1b34bb88369bd697dc12620e2bb1654e7205a7f55c40fcc1ad550c50a,2024-07-03T01:40:47.743000 -CVE-2023-38299,0,0,5e6da062082ac71d03dfb9eac5b123bdb10baafd569b1952dc362f7baad1d835,2024-04-22T19:24:06.727000 +CVE-2023-38299,0,1,ea4f8c4d1eaee22e2578b927c43b27d267ad49d9b08dd9de7784934a1de94d5a,2024-10-31T15:35:05.687000 CVE-2023-3830,0,0,cb6f641473bf3274cab69477038a72d6fdbebf532851a9d48054ad057fdda1f8,2024-05-17T02:27:51.403000 CVE-2023-38300,0,0,21d7bcc0f4d78e8cd7b0e3ff2f4e41777aaed6e081cd5d88be120e8f54bb8f60,2024-07-03T01:40:48.550000 CVE-2023-38301,0,0,dfbe90eed8465062140ec617f2e8acb915be38e7d4d7c9aea689994df35fc046,2024-07-03T01:40:49.340000 @@ -229152,7 +229152,7 @@ CVE-2023-38401,0,0,f223249cad0e96611c025c3968e9bb02034dab50e1e8aeec7027d344535fd CVE-2023-38402,0,0,312c3b5d5a8e059d711dcd8c655a0f88191fbdf96df2bca83de61ff87fde0d91,2023-08-23T16:51:57.520000 CVE-2023-38403,0,0,9fe01f79040db1b17780d18099f24f7436866565e9d5447f504f0f384d262fe1,2024-01-09T02:53:19.040000 CVE-2023-38404,0,0,902ddf5ac3ca2946c3aa751a963d2fe56e9b643da3d7f28aa15700e00eda6f6b,2023-07-27T23:45:52.217000 -CVE-2023-38405,0,0,eb678e1398b0cc7afc6cadec898dca16e86921fb7075e187826e227511830ad9,2023-07-27T03:46:14.810000 +CVE-2023-38405,0,1,0db0b78236ab2b18e0123f799f535dcc2fbb94406b20f5c9f8f18c7888f55bd9,2024-10-31T15:35:05.887000 CVE-2023-38406,0,0,b4e9fee11e6ca1b95b528449b15c85e7b4af1b868f84535cfe760130604cc642,2024-04-28T07:15:08.367000 CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 CVE-2023-38408,0,0,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000 @@ -230482,7 +230482,7 @@ CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef CVE-2023-4011,0,0,ff845b3bec6fa1ec7ec6e3f06d521b3f25d1051621eed84e2a9da8c89b74f8c4,2024-10-03T07:15:18.313000 CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000 CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000 -CVE-2023-40112,0,1,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000 +CVE-2023-40112,0,0,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000 CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000 CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04 CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000 @@ -237772,7 +237772,7 @@ CVE-2023-50349,0,0,04dfffcfcf4dfab27ce1ed21e44739e7fb4333c936c205d032d1c437e44a0 CVE-2023-5035,0,0,d3b1e13474896261f496e3c1ea44375668225ccd4ad1d69a2c4e96fce647a697,2023-11-09T19:54:28.697000 CVE-2023-50350,0,0,30808ae55f858010cc57fe0042a1ad50eb4dccfe3bc3f8085acb55885767be7b,2024-01-09T19:44:18.793000 CVE-2023-50351,0,0,8b5e0ddbf8f02b84d512f227e1927e5797e4a7a06ad179af091819fe71ae8fa1,2024-01-09T19:41:58.467000 -CVE-2023-50355,0,0,706f88184489596c14a5c63753c0225e52a1df633c6814923bfb857c4618806e,2024-10-25T12:56:07.750000 +CVE-2023-50355,0,1,938f2ab87a0409f74b1e1e988e7900a8bfd53b99cec45f16a83ed1ec5b29543a,2024-10-31T15:18:27.160000 CVE-2023-50356,0,0,afc5a7e88cb3a2a29820a92eb33919ca114eed7ff54c11165c52a68496c27451,2024-02-15T11:15:09.127000 CVE-2023-50357,0,0,c49fba6a6b8ae43153115bdc180d0a50fda6badb9bd287f826717a708c649d3b,2024-02-15T11:15:09.717000 CVE-2023-50358,0,0,affeae249fec946895d3bef4063e720c758024b3343a9b8cb10accf20047afe3,2024-02-15T06:15:45.960000 @@ -239195,7 +239195,7 @@ CVE-2023-52504,0,0,15a67b8626d1700c874927dc0b422260a6168dac8f548079841a0a0181574 CVE-2023-52505,0,0,fad7bdcb25a27f4bd9002f53a3adf4a52a2de2a20ba4463be496c82e62bfc5c0,2024-03-04T13:58:23.447000 CVE-2023-52506,0,0,6c1455dd02d42fdad1b3d21884f0f5398bf838f7b51cbd22f0fed9037494fa90,2024-03-04T13:58:23.447000 CVE-2023-52507,0,0,83b388ec25df944bf5dc291b174f930297e3e20324c8489d1e8d69d83db0f6b4,2024-03-04T13:58:23.447000 -CVE-2023-52508,0,0,e4d5045cb570685984e999f3117792b241c9ce1953459c10b517da3a5212ef33,2024-03-04T13:58:23.447000 +CVE-2023-52508,0,1,3df95157cefd88c2c70c60dc2487d4ca580bfd7d3fdbe934143d84c8e721de6d,2024-10-31T15:35:06.613000 CVE-2023-52509,0,0,bcfcbf5df8dadb5c77febe775be16b48e4efcb0ae7858106717d3661c9712efd,2024-03-04T13:58:23.447000 CVE-2023-5251,0,0,de8655b38a30642065bb297eb9a35bac6ebd60f43a29d54f33ad99175564509f,2023-11-08T02:15:53.437000 CVE-2023-52510,0,0,b0381f94ad157bbb54ab8605627db382c3f938399b2f02a5029ba8865071a1c0,2024-03-04T13:58:23.447000 @@ -239232,7 +239232,7 @@ CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb CVE-2023-52539,0,0,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92b49,2024-08-15T17:35:01.503000 CVE-2023-5254,0,0,5f7cee797c6f86eb738b8a7c6816dfcd5a4e6f8647e76dd5bd92cb5b95399be3,2023-11-07T04:23:40.643000 CVE-2023-52540,0,0,6043f7b2833db7ef103b97561cb4ef82751086dbea7d4957ecb9ee6908b9f107,2024-04-08T18:48:40.217000 -CVE-2023-52541,0,0,409f3f87e5ebdf3dd03445509a239e1d1acdefd3224de23169c507e030878ab4,2024-04-08T18:48:40.217000 +CVE-2023-52541,0,1,05a922d703fe178ffe3ffcc50d7254491f88bf17e762cb3f58c17de2d7f44cb8,2024-10-31T15:35:12.207000 CVE-2023-52542,0,0,33c4ca9584c19ffac8159188145368a515abd75a41b58a0077accc032bc8c564,2024-04-08T18:48:40.217000 CVE-2023-52543,0,0,41aac44c8931668192d5fa3c95aa2b64b2f3c224e1cf1305a133dfd5df96c932,2024-04-08T18:48:40.217000 CVE-2023-52544,0,0,27963c836572979af4e49300b2561228946c4d3cae999b213a50ec0f6bccbf4e,2024-04-08T18:48:40.217000 @@ -239315,7 +239315,7 @@ CVE-2023-52613,0,0,4dcb86489bae6af27d6a3a92a58c01948ee7bd34d4b1aadf14a7de570d57f CVE-2023-52614,0,0,8ee84d07fbe93a723185433e1f443e071e1b6576f617cf55d35e50f3e317f3db,2024-06-25T22:15:15.793000 CVE-2023-52615,0,0,124e1995c8a6a67390ea92195fefeeb05b7cfb8e05fddbb368a599eb724339a6,2024-06-27T12:15:15.583000 CVE-2023-52616,0,0,8ddda269abaeba5f1aed89367ae82d93cda73f0a5b631176a7ef3aaa8dc137fc,2024-06-25T22:15:15.973000 -CVE-2023-52617,0,0,375f5bcfa2f8bc354a28d0881f2bc671bd2b13e01bc45797183c336c124927cd,2024-06-25T22:15:16.043000 +CVE-2023-52617,0,1,eac24e547a3af9b5a616047303c5b7a0b033410067d47e1252c186ba4cdb4468,2024-10-31T15:35:17.193000 CVE-2023-52618,0,0,83551638bf3f8179363a6c15f587728d9ed3f1fd94461bb80d0591590597f903,2024-06-25T22:15:16.113000 CVE-2023-52619,0,0,256ca49ee66c7db9cacd43b16d9847f5dc2eece5d7a0e43a699c63a58ec81a8c,2024-06-27T12:15:15.680000 CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e6864d,2024-05-17T02:32:56.017000 @@ -239331,7 +239331,7 @@ CVE-2023-52628,0,0,3329a75501420e00bba96b49322ededdee6ebf8d515e2f0926cf7b2c91254 CVE-2023-52629,0,0,4aac381cfdcf6533bcbb5898019c55c00aa9c06c15dffc1a2cc7ddcb7c527b58,2024-08-01T13:45:41.290000 CVE-2023-5263,0,0,a5ca98a04e38722def5acce0f3cee4430b6299b258ed512a5240ea8a8830bc4e,2024-05-17T02:32:56.130000 CVE-2023-52630,0,0,c87212efbf5139852fd7e71805df929a746c8df75c9ee82e120adfee45deba78,2024-04-30T09:15:06.730000 -CVE-2023-52631,0,0,bbf044b5c0e3f013b5ff402e28693a55fd5fc67ad183959a1460b0d8e1c300d1,2024-04-02T12:50:42.233000 +CVE-2023-52631,0,1,35fce1f33eb905c47461fd9871e3e3b67e1d43b7a165e928b6b865dab18e80e7,2024-10-31T15:35:17.417000 CVE-2023-52632,0,0,4a6a28a3bf20a4ae8f2ba9993e8fe6be20f6e1cb81fb562eb1083a0af28ce781,2024-04-02T12:50:42.233000 CVE-2023-52633,0,0,7442af18d77fdf3e08ed9e92157aa3f1530a193d30a3901ba3e461f0316f5f2e,2024-04-02T12:50:42.233000 CVE-2023-52634,0,0,8b82685c296153240b5b9ecd61697d30d67145642672896cc43b58a52acc5e89,2024-04-02T12:50:42.233000 @@ -239488,7 +239488,7 @@ CVE-2023-52772,0,0,f9c3d488cd6b64a44ce418a4df3121c26fa7aa7e404bcc376a441d21a0b0d CVE-2023-52773,0,0,302cc243bbdd2da7cb505c86d57305c929e8c011d35030766e5dcc559e9c2134,2024-05-24T01:13:34.420000 CVE-2023-52774,0,0,24bf4047b9e39723ef928a3e860e648d80b5544e39ca6b64f888d9d32be3a902,2024-05-21T16:53:56.550000 CVE-2023-52775,0,0,50c7d0019b1d6d9694268305f9581086c8e23e10c1390d6e3eaeac029e7ebd73,2024-05-21T16:53:56.550000 -CVE-2023-52776,0,0,b7a52f2f962b3135323523e7a1328159878f6fbfe7685a1cf60b63f0adffa2d1,2024-05-21T16:53:56.550000 +CVE-2023-52776,0,1,e6fc2f1214d761c410da0e3bbd9005e7cccde7f4c4459dfe89d44080702c79ad,2024-10-31T15:35:18.237000 CVE-2023-52777,0,0,001c71e38885408e23972d68080d982794664c9270f8df3282f1d5a3e325ec79,2024-05-21T16:53:56.550000 CVE-2023-52778,0,0,af232458a4003ddf379460614e985a39b878351e793860f708c43a22d9fc7d4d,2024-05-21T16:53:56.550000 CVE-2023-52779,0,0,185cfb74915fb00f4b50699efd9845e8a8fc10a53f7474c4afd442f34ba5cffb,2024-05-21T16:53:56.550000 @@ -239527,7 +239527,7 @@ CVE-2023-52808,0,0,6fd90554329bf2513407577633c15a881e0ac5b8b41336c3aec723e0d2870 CVE-2023-52809,0,0,1b4e510cef57d2bb96228af37318a02418eedcb81c05c2c77a8d4f39c730fe65,2024-05-24T01:14:23.283000 CVE-2023-5281,0,0,6527d6878ce0dee695071838c24796d1657c4ef09ab085ef3d25d3f6821c0119,2024-05-17T02:32:57.910000 CVE-2023-52810,0,0,cff498cbe788ab138e0eb34e25fdb80301269d8036021fb508076e7f49de12cd,2024-07-03T01:44:00.357000 -CVE-2023-52811,0,0,0ead5c9a6f8b55b059f8eb58ec35dc6b5adc237db0c20374474098bb7c13ba7d,2024-05-21T16:53:56.550000 +CVE-2023-52811,0,1,4ef829d1d9e3f0164ebd33a4cb15319d1150df469b9306429aa383621ef5f2e8,2024-10-31T15:35:18.443000 CVE-2023-52812,0,0,67c77c1b4ac345df6a4910efd49e6b284c401c8f8570b8321f64df9a3cf4a686,2024-05-21T16:53:56.550000 CVE-2023-52813,0,0,5a497de90c526172c26b5dac57669c5d83bcc91b8398c5bb528989dc5ae64f3c,2024-05-21T16:53:56.550000 CVE-2023-52814,0,0,7beb37b73115ec81ce0ec04ef14d3c556e989e0aeced84f5749a8521c2300544,2024-07-03T01:44:01.383000 @@ -241461,7 +241461,7 @@ CVE-2024-0010,0,0,0619a8beffc460e406861d5436887a98d4820a4ca409aea20f604a00879fce CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50ac,2024-02-15T06:23:39.303000 CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000 CVE-2024-0015,0,0,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000 -CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec7221,2024-02-16T21:39:50.223000 +CVE-2024-0016,0,1,07b99aa38f7f021ca30f24587ae8679400297ca98f5e8da8ccc928cbae430ba9,2024-10-31T15:35:18.640000 CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000 CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000 CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000 @@ -241941,7 +241941,7 @@ CVE-2024-0557,0,0,d865968c9abec0590d2ecdcb9a420b4777e9043914f97c75416027b3a5782b CVE-2024-0558,0,0,96aeb8cf0dce546f9584e58671ff7f7715396792b70e3d901492554bc823eacf,2024-05-17T02:34:46.520000 CVE-2024-0559,0,0,2b489be9f48e4f4ee88dba228aac75e67986dc57254496c8abc860aa2bdd75c1,2024-03-12T12:40:13.500000 CVE-2024-0560,0,0,409c0d8e6471fa649d49f48b1bab7c329ea2d720630383d0d79cff1c14ca2598,2024-02-29T13:49:47.277000 -CVE-2024-0561,0,0,09bd47669bfb1d5000475a8644f9647b8b9cfe657a0a22ee3ca31f75fdadd4e7,2024-03-12T12:40:13.500000 +CVE-2024-0561,0,1,8c4e6c7ca48bb4f3b07e42b4b356f3cff23f84631edd2651fc3f78f949cac598,2024-10-31T15:35:19.430000 CVE-2024-0562,0,0,da76ada5e80bb87b4a110a9fa03a565bf9113fd5412b976afa32604e08bd486f,2024-08-27T14:57:10.957000 CVE-2024-0563,0,0,9ec355fcf8c2bfde63e8cd3b32f6b09899d66d999623867d4585cdbccddf2e84,2024-08-27T11:15:04.277000 CVE-2024-0564,0,0,e658595f44d1aeec7c9b8d0db769cc2be653bf4eea6c6475809afc90d39e1035,2024-10-16T15:15:14.110000 @@ -242236,7 +242236,7 @@ CVE-2024-0873,0,0,0d017532f0822fb01a43bd5a5b6fb8ed2d6c3075b76ac0b6436fcb6d890c94 CVE-2024-0874,0,0,e6fb28781735bc896300880a10982c06b4a0d863ac3f7c9c0e53997a057bc6f4,2024-09-11T22:15:01.933000 CVE-2024-0879,0,0,40ca4d922e04a74721c93cda9d6ef307a09b39f845db5f9dd6db6b694e034cf2,2024-01-31T19:16:07.630000 CVE-2024-0880,0,0,44431bf4f01e73978bc2a282db63f61857269e71b91d3e3d902140e76c6dd1ce,2024-05-17T02:35:00.317000 -CVE-2024-0881,0,0,98f221da2ce5b910f526cf4601e71f3a4679fdd70405fdedbf2c41fb491a9b53,2024-08-30T13:15:12.190000 +CVE-2024-0881,0,1,1252bf71170a54b7a474d354bacf2afe464c57991281e1919b7ffd68baf1e1ed,2024-10-31T15:35:20.223000 CVE-2024-0882,0,0,84f9ccec11ac50ed76f1b2b2a213c4de6a55caf9106a40c86eeec8ed6146aa41,2024-05-17T02:35:00.453000 CVE-2024-0883,0,0,1770a78a30c574d0609966466d73d5fca219f70c80b5926c2f2202433ad0de4d,2024-05-17T02:35:00.570000 CVE-2024-0884,0,0,02bf1f09acddc232b1af1ecd3b28d9f047cb5419ab322210f451d56e705b4b96,2024-05-17T02:35:00.677000 @@ -242478,7 +242478,7 @@ CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826 CVE-2024-10214,0,0,387761b00ca263850d15f9fc0085dd195781994f66bd9edc33fb8fef62fe7001,2024-10-29T14:34:50.257000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 CVE-2024-10223,0,0,cd865517b4f8a8ffc796b342e05a7bf08eca094f8bc12d9402375b35b3f2f4c9,2024-10-30T07:15:15.487000 -CVE-2024-10226,0,0,5b578efa4cb98c9f5b6f02eac4f65de90209e937f40993cf9dca20324ab58f1b,2024-10-29T14:34:04.427000 +CVE-2024-10226,0,1,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000 CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000 CVE-2024-10228,0,0,ce55209329b0533b27c51280a78a7bfde62501c7788cd18c1e4ff9adf65e277d,2024-10-29T22:15:03.220000 CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000 @@ -242612,13 +242612,13 @@ CVE-2024-10448,0,0,8592ee07b49e81610af100bc63f005e0b694650efb1b3544bc63d15b37059 CVE-2024-10449,0,0,8607f328e6ad15d8ca267c31a328033a0fcda88d731c3cb315537e91214fb44b,2024-10-31T12:47:08.810000 CVE-2024-10450,0,0,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b366238480a,2024-10-29T16:15:04.593000 -CVE-2024-10454,1,1,00a532df7fc763ef532ba53fc65d3c8c542dd62967499eae25b9ca1ff4ccf09a,2024-10-31T13:15:14.580000 +CVE-2024-10454,0,0,00a532df7fc763ef532ba53fc65d3c8c542dd62967499eae25b9ca1ff4ccf09a,2024-10-31T13:15:14.580000 CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 CVE-2024-10456,0,0,4e8313f83dd74eaf01a85b0e2c8241c892546e7f6f740c8d60482cb697257f25,2024-10-30T18:15:05.123000 -CVE-2024-10458,0,0,7226d5d845dae2d50cf0c67a709b76b4ee40123526a8a54fcaba4953dcdb6c62,2024-10-29T14:34:04.427000 -CVE-2024-10459,0,0,9d75223b7f4d8772f198dec4be94083c31b07915596609c3d6e28cafba36747c,2024-10-29T14:34:04.427000 +CVE-2024-10458,0,1,b652a5b379db5d10291e05d5cc6c58f81dfce341dce157b963ee9c6c3613034a,2024-10-31T15:03:37.573000 +CVE-2024-10459,0,1,20a9a9b2e420e8c8388f742a97fba9508284c4e5e7259d502e35a8a80d0e7ecc,2024-10-31T15:16:30.147000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 -CVE-2024-10460,0,1,528e842660e78442d2a60439f5926893dddc35fffc78eaed4be498e8f0df3a7b,2024-10-31T14:32:10.607000 +CVE-2024-10460,0,0,528e842660e78442d2a60439f5926893dddc35fffc78eaed4be498e8f0df3a7b,2024-10-31T14:32:10.607000 CVE-2024-10461,0,0,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000 CVE-2024-10462,0,0,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000 CVE-2024-10463,0,0,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000 @@ -242634,8 +242634,8 @@ CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000 CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 -CVE-2024-10487,0,1,afd74b0a34323c60dbd4f535b3b82532f3b5a0affd95989cc244517ea9d5ec96,2024-10-31T14:35:04.283000 -CVE-2024-10488,0,1,69038bbef0b99288e3361fe760223b169ea77142f6a0f65d45c3c8314e4211a0,2024-10-31T14:35:04.517000 +CVE-2024-10487,0,0,afd74b0a34323c60dbd4f535b3b82532f3b5a0affd95989cc244517ea9d5ec96,2024-10-31T14:35:04.283000 +CVE-2024-10488,0,0,69038bbef0b99288e3361fe760223b169ea77142f6a0f65d45c3c8314e4211a0,2024-10-31T14:35:04.517000 CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000 CVE-2024-10491,0,0,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000 CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000 @@ -242736,7 +242736,7 @@ CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f09 CVE-2024-1134,0,0,92ca7b611a6a52333e888fa3a581b5dbc5c29b22a5e7e62eb553cb40e2cb6d77,2024-05-24T13:03:05.093000 CVE-2024-1135,0,0,c4e807742cebaf6bf696946dfb175a5e42a114f551ef03f8a1a000797bbd864f,2024-06-30T23:15:02.563000 CVE-2024-1136,0,0,afecf0ebdd615b0db4af51c2dffb234fe058d5206cf056cda6c9c969b40b0967,2024-02-28T14:06:45.783000 -CVE-2024-1137,0,0,7ebbc8c22a3963224e5777e6e47505838c5e971063659f663f09dc36ebf39061,2024-03-13T12:33:51.697000 +CVE-2024-1137,0,1,7770507df04fd140e1caae778f76cfb6c15abcb49e56639ed0158e45600edd60,2024-10-31T15:35:20.503000 CVE-2024-1138,0,0,82205a90b4164fa73ef6a7a95de3da9e244cf92b71ef2ebb779a9979063152da,2024-03-13T12:33:51.697000 CVE-2024-1139,0,0,3dc684f5c9c2296003368c61d669c2f327953a7aefcd4f9a72abdc4b058cbe13,2024-05-16T23:15:47.323000 CVE-2024-1140,0,0,346c2ed0aaabc419b4aefe2cf8513b81b972566618f29982168bc7166c832ab2,2024-02-27T19:17:32.253000 @@ -242880,7 +242880,7 @@ CVE-2024-1288,0,0,9b4b26e98e455da0bf3a01191faed41bc4e93cd412694a208b945f21b0c39b CVE-2024-1289,0,0,ce4baaa839d6e246e03946bbec3160687088f2a904b66c70b5f22766bbcb5e31,2024-04-10T13:24:00.070000 CVE-2024-1290,0,0,d8c98dc21c8ebffa389e2adca534c5228f87db07c9e83c1a3e5e389d19cbb2e7,2024-03-12T12:40:13.500000 CVE-2024-1291,0,0,10fafd045b32182cd18c1a4d750c94ac76cbc3f03fb2ffd85b82cb5e2ff8d4b0,2024-03-13T18:16:18.563000 -CVE-2024-1292,0,0,7fc7fb1b96765afbbd247550892db7527119c1a8e57d7581e5473c321f8579e4,2024-04-08T18:48:40.217000 +CVE-2024-1292,0,1,29132e5250ecb42a55fd5bdda6f76ebeb90cac232e7a1073c9994dff52c293eb,2024-10-31T15:35:21.273000 CVE-2024-1293,0,0,e471e79b77611f62bb59b862001c132352bd2a8beca8853eefebde5311abd9b7,2024-03-13T18:16:18.563000 CVE-2024-1294,0,0,7708751bfdcdf83e56e4de24760c2a792b7bd0c3c50de29207d3173f5160ef9d,2024-02-29T13:49:29.390000 CVE-2024-1295,0,0,74c27eead2a46242630788e9a95436651e414f0affb404fe9f90f6177a3a4b98,2024-08-07T19:06:16.393000 @@ -242898,7 +242898,7 @@ CVE-2024-1306,0,0,5038dec5b2b173fda32e156dbbbc3ae1d9583b59a01ca29d58b469ec10627d CVE-2024-1307,0,0,aef0ff1cfd8369bf21c4d4841fc06befe7d2ed62374aca7af4bc603f7fdf8c25,2024-08-09T19:35:03.493000 CVE-2024-1308,0,0,c14a9657c393471f82c6c22e0d4901de242d02818d63ca3e23260797d16563c6,2024-04-10T13:24:00.070000 CVE-2024-1309,0,0,1ff97c884fd33ed7b0eafdc39bbc06be7a9fbc1deeda8f495ac8f8ee77206a31,2024-04-18T21:15:07.060000 -CVE-2024-1310,0,0,0f224a4363799495ea41f70cff3a28c33e1101424c9cbdf7731e2080a04d7f4e,2024-04-15T13:15:31.997000 +CVE-2024-1310,0,1,5d2addf804c32aa308f35f8aec312729df2db396af22c52c6a285112237313fa,2024-10-31T16:35:03.893000 CVE-2024-1311,0,0,158f219d191fc55e3a703340acfe0db7300bc756f612b9aecd45c845150c15d2,2024-03-13T18:16:18.563000 CVE-2024-1312,0,0,5881f9a1935111843000509e72e7d874f8914b8ba0d8f1dcb31aaebae0b90758,2024-02-15T05:03:16.077000 CVE-2024-1313,0,0,e178cffe6aa77a4f0d6d1f0bc0814c15387ceb02accf822d00ca94cf3dcbb92c,2024-06-10T18:15:24.947000 @@ -243229,7 +243229,7 @@ CVE-2024-1664,0,0,e9275b215a44aaded206835a971220889626e960fd4f0136cc76fd6bdc26b3 CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a098,2024-06-07T17:15:49.850000 CVE-2024-1666,0,0,1f8333a8347ccf0940f5f18eb72bff97cea1045d2d21b82516336ffe9989709b,2024-04-16T13:24:07.103000 CVE-2024-1668,0,0,5d777dacf70894c13bb98378761ebbab538d2f58e3be366f3dd859cfdec3a507,2024-03-13T18:15:58.530000 -CVE-2024-1669,0,0,7051f11d6175af0afa7adcb8852b15d12f5bb44802faedbbae321e1477b73fea,2024-02-26T16:27:52.577000 +CVE-2024-1669,0,1,ae22d791fe16b24d1cf628f15b39c04205c9c5736dce59302c0c7b298ad8f6d8,2024-10-31T15:35:21.517000 CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000 CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000 CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000 @@ -243699,7 +243699,7 @@ CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462 CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000 CVE-2024-20279,0,0,05b20e0d8f3b8cda00d50e64da3647c27567cdb3c3b97e828571e56bf1250500,2024-08-29T13:25:27.537000 CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b30,2024-03-13T18:15:58.530000 -CVE-2024-20280,0,0,da8f41bc84f7d802575125351a783329e8aa97a8053af1d58e9a8a5382a07caa,2024-10-18T12:53:04.627000 +CVE-2024-20280,0,1,4deca340c1d6c339026e63a4905e7a37df7dc63f42e904374ced965929e63413,2024-10-31T15:35:23.060000 CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000 CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000 CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000 @@ -243770,7 +243770,7 @@ CVE-2024-20343,0,0,7c9d164f9ec94ab3681a2158dfc37a563399321d4ad394ceb86611456e6f0 CVE-2024-20344,0,0,0c95d8c456a266581d87105f2300bfe021552d9f4a6b780624736cdaf9bbf776,2024-02-29T13:49:29.390000 CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237eeb39,2024-03-07T13:52:27.110000 CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657528,2024-03-06T21:42:54.697000 -CVE-2024-20347,0,1,52aa661546c6b8994a89fed282dca85d8861ae1a559626c851c31cb0236c7b1d,2024-10-31T14:35:05.260000 +CVE-2024-20347,0,0,52aa661546c6b8994a89fed282dca85d8861ae1a559626c851c31cb0236c7b1d,2024-10-31T14:35:05.260000 CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000 CVE-2024-2035,0,0,216279b16f620c2ff4b0a8961dd1dd14e0bafebc256a395c018effc533e0c28d,2024-10-11T14:20:05.590000 CVE-2024-20350,0,0,a12c7038f7859e98d5699951ee7006a12ff1675d76aabb6f00e8b49b9f735c1a,2024-09-26T13:32:02.803000 @@ -243845,8 +243845,8 @@ CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000 -CVE-2024-20420,0,1,bf5b2e28728b393dc4c68ac30d4f5934f5f4c3a252f289a6ace4b087b2c80ce0,2024-10-31T14:35:05.980000 -CVE-2024-20421,0,1,010353f6315a1178c3a836b86ba880ca671547b6c70a4204900c9847f12b906d,2024-10-31T14:35:06.853000 +CVE-2024-20420,0,0,bf5b2e28728b393dc4c68ac30d4f5934f5f4c3a252f289a6ace4b087b2c80ce0,2024-10-31T14:35:05.980000 +CVE-2024-20421,0,0,010353f6315a1178c3a836b86ba880ca671547b6c70a4204900c9847f12b906d,2024-10-31T14:35:06.853000 CVE-2024-20424,0,0,ffa62354c649fb92a19c53bb88a63b5a68961428021270eef69bc0cdf2db3939,2024-10-25T12:56:36.827000 CVE-2024-20426,0,0,de1754515a9d08a81fb464f1c350f5eea8399c648858dacb1404601225681f6e,2024-10-25T12:56:36.827000 CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 @@ -243878,13 +243878,13 @@ CVE-2024-20455,0,0,0eab0e0d21dc4342feafbdcb7840d45bd73b5886ce73a3d40c40f5d3f5d51 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 CVE-2024-20458,0,0,7fb1e55e612ee6c8cc09ba5c55e99526661fa33e17c363c55add3406c5a053f4,2024-10-22T18:03:09.777000 CVE-2024-20459,0,0,5cd54a48218e6b57b046cb69743cb297e897ffabcfc93cde2b5b5db91e60d9df,2024-10-22T18:06:48.333000 -CVE-2024-20460,0,1,1680f4feb024550f85cfbc4af79437ce465cc993fb1f24de2a76ac8f316389ea,2024-10-31T14:35:07.573000 +CVE-2024-20460,0,0,1680f4feb024550f85cfbc4af79437ce465cc993fb1f24de2a76ac8f316389ea,2024-10-31T14:35:07.573000 CVE-2024-20461,0,0,c15342729fb0990fca2c54c1ab369938cf9683949c2cefcc250f30164551b25e,2024-10-22T18:26:01.890000 -CVE-2024-20462,0,1,99866908b00ddcc852a105c5396f95be60dae111a9a847130bf50c0b1c3eb78a,2024-10-31T14:35:08.380000 -CVE-2024-20463,0,1,36a216f0f7d6ec15c580a77a917994b81fb0f5b89dfafc02914e763698043264,2024-10-31T13:35:02.373000 +CVE-2024-20462,0,0,99866908b00ddcc852a105c5396f95be60dae111a9a847130bf50c0b1c3eb78a,2024-10-31T14:35:08.380000 +CVE-2024-20463,0,0,36a216f0f7d6ec15c580a77a917994b81fb0f5b89dfafc02914e763698043264,2024-10-31T13:35:02.373000 CVE-2024-20464,0,0,f24579468ebdb84e5fe9b1671318293b6d5b473cae484edf3392abda0d117c91,2024-10-24T19:47:29.740000 CVE-2024-20465,0,0,58c61302cfd8374a2de79b49d5aac585902b54820b0fbcf82d9f704341c07483,2024-10-24T19:46:15.007000 -CVE-2024-20466,0,1,d0329ee630c2b2a6ce426800fea8982bf585a45fc72abad0a547b583e87462bd,2024-10-31T14:35:09.360000 +CVE-2024-20466,0,0,d0329ee630c2b2a6ce426800fea8982bf585a45fc72abad0a547b583e87462bd,2024-10-31T14:35:09.360000 CVE-2024-20467,0,0,c1af58980ccad99499fcb95639264b5a0614f69936f5a7ffc5edb35f8fbf6c29,2024-10-03T20:09:50.970000 CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 @@ -244315,9 +244315,9 @@ CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd CVE-2024-20999,0,0,ae1d247ac8bd0064fcaa5c351da8867d565266aa9668e6f33e11707ade3df947,2024-04-17T12:48:31.863000 CVE-2024-21000,0,0,9c5f125bf169c30b06c52ede685fcd775c64e00e8b2cc0e3e50d458dc0bd8fee,2024-04-26T09:15:09.633000 CVE-2024-21001,0,0,15357e74cca458136023da71124e809428be72e21fc69e6c2d391bf270dd99e0,2024-04-17T12:48:31.863000 -CVE-2024-21002,0,0,fe6f52efbd3c3ae20c5ec8d80f8900e039814ee0867a0ae8e2ae1644c1924a8a,2024-04-26T09:15:09.700000 +CVE-2024-21002,0,1,7f5c86fdcff82f93225a75a7e73262c6da92b927148218de7deb268aa0c73332,2024-10-31T16:35:04.067000 CVE-2024-21003,0,0,90a06bec930da30c9a00d7e245d95aa433119de047332777b49810dcb3c38582,2024-04-26T09:15:09.823000 -CVE-2024-21004,0,0,12fb5f942e2654153a412c5fc14ae11006d2f5e0ec44b20048eedc0b493190fb,2024-04-26T09:15:09.933000 +CVE-2024-21004,0,1,74d75259359885feb58e67b784c7f0a497e76221cd93421bf881ed958c2f234c,2024-10-31T15:35:24.047000 CVE-2024-21005,0,0,3a0033bb21374d9be43479eee698b2830f41d8d2a9d0eb123f27394e5de66035,2024-04-26T09:15:10.030000 CVE-2024-21006,0,0,2bf05827c1375073e1ad934485914186267cfb26e257a4c1e61a55b796ef3611,2024-04-17T12:48:31.863000 CVE-2024-21007,0,0,318b973189a970b7ce55f9b439b79912feb01731965e9cf4d9ebb34a06f5b815,2024-08-21T15:35:03.230000 @@ -244338,7 +244338,7 @@ CVE-2024-2102,0,0,063af9520b1c53909e19a4c543dd4e89e92c8386c428fad7438fe729761d52 CVE-2024-21020,0,0,d93fbad604c8e8745c1fad68359513bcf3ca7a5201c226f17ea97a532899c166,2024-04-17T12:48:31.863000 CVE-2024-21021,0,0,b6e440cb47f4455a8f7f21333abe159a9793be0fa8a8c63ca1e08d9c4c708934,2024-04-17T12:48:31.863000 CVE-2024-21022,0,0,7ccbb7b797124115a160253b5a2400bd740ca6dfa914b0db3e9b919856d02d6b,2024-04-17T12:48:31.863000 -CVE-2024-21023,0,0,575d42d7ce885a6c46a755c8d6d9456a7f6c918c906a8dc19ed2cd01ed16cd1b,2024-04-17T12:48:31.863000 +CVE-2024-21023,0,1,927d06c9c846b66c85686832a7d8ba13dd57e57adc9551190b6fa4a25e207424,2024-10-31T15:35:24.947000 CVE-2024-21024,0,0,4b07a3985eeac45f7d54b09efd6441e42ce548c3dd1c1f08e54387e9dd30c772,2024-04-17T12:48:31.863000 CVE-2024-21025,0,0,38752368a88736636219c96ca34be1d3136c57c15f9dc3d74849b7994f27fa18,2024-04-17T12:48:31.863000 CVE-2024-21026,0,0,bb4bd2aeeb520f557a235cf2c384bcd9afa22628dbaa611ed6aada649ea8a800,2024-04-19T17:34:46.467000 @@ -244357,7 +244357,7 @@ CVE-2024-21037,0,0,33050a6276f922cfcedac97b78c12fdbc7f45b309b0174964155153f73d52 CVE-2024-21038,0,0,bfdd0e7e4013735185b099df381c36ba9c4b9fe7698d8ce6190978f3af67da26,2024-04-17T12:48:31.863000 CVE-2024-21039,0,0,5533a80506dc2a9584f3f0a1cb6213d349fbac4fc9f3be60fa10f69e60d73724,2024-04-17T12:48:31.863000 CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000 -CVE-2024-21041,0,0,eaf2032cdf5bf4afddf0ed969579bcd3dcb951ea769dc745c4d533118eedb813,2024-04-17T12:48:31.863000 +CVE-2024-21041,0,1,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000 CVE-2024-21042,0,0,a53b604b49a76162fbba6ea20fde9e5db3c2c63e25a2d34ff97af2cb2bb953ae,2024-04-17T12:48:31.863000 CVE-2024-21043,0,0,fa4ff1dddcfdbb8d39b382afa37fff315ec76533c2125d61c6da718ca58b6150,2024-04-17T12:48:31.863000 CVE-2024-21044,0,0,2cd88f43af07596557d9fca3fb13efe6eb725b0bbf07f13100392e30400b440d,2024-04-17T12:48:31.863000 @@ -244377,7 +244377,7 @@ CVE-2024-21057,0,0,c1217f83633c24cb2e62e95ffd4860f165c284aba6906919eece4336c921c CVE-2024-21058,0,0,de3387d8cd971b8336dcc81645234860ce8088de064eccf609c7de46d01036b9,2024-04-17T12:48:31.863000 CVE-2024-21059,0,0,0f97002f977205acc4590b692add0bf6611ecd18e8d15883f979b9d831001abd,2024-04-17T12:48:31.863000 CVE-2024-2106,0,0,213f924b1030e277957ab3251c0a5e0aaf21bb221bf06ebf6920975bdeafa568,2024-03-13T18:15:58.530000 -CVE-2024-21060,0,0,c8d2abc20fe0e7a02c23a6720c308ec779d5489124604064843523066c59782c,2024-04-26T09:15:11.080000 +CVE-2024-21060,0,1,5dad82251c69460b0dcc342dbc8fe5f30ffd6435784fefca48a78f953ddd6047,2024-10-31T16:35:05.517000 CVE-2024-21061,0,0,acce4a5f468dca01931c32e50c6611a1e683c3d9c025ec493bafb29e16c7fe5f,2024-04-26T09:15:11.143000 CVE-2024-21062,0,0,f52b903674b0da400a3e3849ca455d776135add7df0354d62dc29d89b7440bac,2024-04-26T09:15:11.213000 CVE-2024-21063,0,0,73270d165bc0b9fbb9db2ba8819a13b23a6c11f25a3f1c5d26effd3bfb36135a,2024-04-17T12:48:31.863000 @@ -244443,7 +244443,7 @@ CVE-2024-21117,0,0,c00c4008bc12621d52c01b8472214c0be8ae4e9de0cb223458bb38ef939df CVE-2024-21118,0,0,f114752b89d9b7c0657ca7ba9e9d4a87c147c0dace0ecb0acd8bb329459af8ce,2024-04-17T12:48:07.510000 CVE-2024-21119,0,0,9381600d4aa69a4373e482e4320b8fc62fa345594208c335b64ab5a7d172dea7,2024-04-17T12:48:07.510000 CVE-2024-2112,0,0,a9796693bf64fe8c1cb1a520a8b14d3b45df38763dca2df6ddc6b2059d00055c,2024-04-10T13:23:38.787000 -CVE-2024-21120,0,1,b0038d7950fd54e728ca8204a661eead3f856b119245dfad7d926e5d9d2db135,2024-10-31T13:35:03.740000 +CVE-2024-21120,0,0,b0038d7950fd54e728ca8204a661eead3f856b119245dfad7d926e5d9d2db135,2024-10-31T13:35:03.740000 CVE-2024-21121,0,0,8a0d5fd4a744b9f97fa1125505a479ab3d5433ac8cc3bef173d2253a6f64884a,2024-04-17T12:48:07.510000 CVE-2024-21122,0,0,a57d97d459ac8321977230309495b6b2091491e8fde03b0b41f454ed964830a6,2024-07-17T13:34:20.520000 CVE-2024-21123,0,0,9641e8c5df4b42df53361943ff91464ab7c43c6dad8de03e9a9bf2477bde0df7,2024-07-17T13:34:20.520000 @@ -244531,13 +244531,13 @@ CVE-2024-21202,0,0,deaaeb207b76e5d780f9f2aac38c9d614842ab21a66472da77bf28a69d425 CVE-2024-21203,0,0,485891ac42bb6471c272b9a68a958e530ac5119e2c4569ec98012fb7f6b3a688,2024-10-16T20:46:35.560000 CVE-2024-21204,0,0,ae3974e6e819eb72c15fda38a94ec00e7ce8c7ae66ff8d4329ce8bc23c1a6752,2024-10-18T14:32:36.837000 CVE-2024-21205,0,0,06c1ad328c7908bb2d5426b85e1fe09ef6e93b5dc063148369f98528b7c21882,2024-10-18T14:50:37.103000 -CVE-2024-21206,0,1,6271714f1b485eba5c2dca8324c2860a0dcb11d28c7214eacb6dd66f8294a44a,2024-10-31T13:35:04.520000 +CVE-2024-21206,0,0,6271714f1b485eba5c2dca8324c2860a0dcb11d28c7214eacb6dd66f8294a44a,2024-10-31T13:35:04.520000 CVE-2024-21207,0,0,441e7ee527d2b149c57c3cf29122fa50593225a02ed0e8e1aa929ce2ccb3cd06,2024-10-16T20:45:17.507000 -CVE-2024-21208,0,1,3ac6907e7d22668c8a6ed9080ba15a9b71b199c754346105e69e540e07c347bd,2024-10-31T13:35:05.287000 +CVE-2024-21208,0,0,3ac6907e7d22668c8a6ed9080ba15a9b71b199c754346105e69e540e07c347bd,2024-10-31T13:35:05.287000 CVE-2024-21209,0,0,09a10e210e54f395a42456e8f1afac7dc21db5e4c2e5e9d4c0f4a12f07e14076,2024-10-16T20:44:58.323000 CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000 -CVE-2024-21210,0,1,9dad798a1dcc454c85da1b731c21bb29a6be116baa9cd19c5a6bf09bdc5d89b2,2024-10-31T13:35:06.037000 -CVE-2024-21211,0,1,9b0873836fd6e9f35822ed898c3df9af35cf9b62fb64aaa84ed5cf247492c359,2024-10-31T13:35:06.843000 +CVE-2024-21210,0,0,9dad798a1dcc454c85da1b731c21bb29a6be116baa9cd19c5a6bf09bdc5d89b2,2024-10-31T13:35:06.037000 +CVE-2024-21211,0,0,9b0873836fd6e9f35822ed898c3df9af35cf9b62fb64aaa84ed5cf247492c359,2024-10-31T13:35:06.843000 CVE-2024-21212,0,0,19f687ae812c0e698f3f0e8daad4c738a294b64f047163a3f6c2379dc26312f5,2024-10-16T20:44:19.233000 CVE-2024-21213,0,0,42d1671ecea98024063bd01928cc7c2037a7c665f9b2aa465a872189431111e7,2024-10-16T20:43:51.853000 CVE-2024-21214,0,0,e575dd8aa54a53a935c3658f84cd238ad5d3c176b9a1942a7f0e09138fd872d9,2024-10-18T18:16:16.987000 @@ -244551,7 +244551,7 @@ CVE-2024-2123,0,0,0719ae4bee332af79c93b8620c3a1fe6da02de27a90f1595704940d001e25d CVE-2024-21230,0,0,c4e17944ebc3bfcbdf78b6336940e6a6054992926ab544142906aebeac23eae0,2024-10-16T20:42:35.450000 CVE-2024-21231,0,0,36b78c7f1d40d41b87ee14c511c304eaf9286e1b39ae47f4ae34fcf1169219e8,2024-10-16T20:42:13.877000 CVE-2024-21232,0,0,d3c11f941e85cc6d35f85f7ba5765b381a26d5c1e4add84f192886aaa77d4741,2024-10-16T20:41:35.300000 -CVE-2024-21233,0,1,03119082f7ea7bc8de7a1055e64dac35ff5ed90f9417af24df297361960a091e,2024-10-31T13:35:07.607000 +CVE-2024-21233,0,0,03119082f7ea7bc8de7a1055e64dac35ff5ed90f9417af24df297361960a091e,2024-10-31T13:35:07.607000 CVE-2024-21234,0,0,b3b8ed4e786067e578b55ed1ad884f7dcaf26511a099c1b0304d1e83b0941272,2024-10-18T19:05:00.380000 CVE-2024-21235,0,0,e8b8c6826fe22ed257db7bc493fd1c19c482c81b703061b649ee81dc38c96926,2024-10-18T18:30:26.097000 CVE-2024-21236,0,0,f3064ccc3b1d0405a68efbf4a4a2fc151335deb597e7bbeb33d75084dfe01195,2024-10-16T20:41:14.010000 @@ -244566,10 +244566,10 @@ CVE-2024-21244,0,0,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b60 CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000 CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000 CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000 -CVE-2024-21249,0,0,8c8448494e88fa3a51a4461e9a5ac6bad487d7f244a14567a92f93a8fd3bd8b2,2024-10-16T16:38:43.170000 +CVE-2024-21249,0,1,561b0c05f80cd133fd2bf7f9570e926d43e2c7747cbbd22ee7f0f51bfa829c07,2024-10-31T15:35:25.647000 CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000 CVE-2024-21250,0,0,c3a216316fd161ecf42e4b85935aab4377046a8c65dc40e8a08a09abcd439125,2024-10-17T14:35:19.303000 -CVE-2024-21251,0,1,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000 +CVE-2024-21251,0,0,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000 CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000 CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000 CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000 @@ -244868,7 +244868,7 @@ CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c5 CVE-2024-21550,0,0,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,cca88d3958ef8dbde43c3d8aa2af78ed997fde7ae88029225af47b23b037e5fa,2024-07-24T12:55:13.223000 CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000 -CVE-2024-21583,0,1,5ee759afacfac4eacf9b9c2f67334664ec22ef2b0f47b92ba28f55ea8a67006f,2024-10-31T14:35:10.887000 +CVE-2024-21583,0,0,5ee759afacfac4eacf9b9c2f67334664ec22ef2b0f47b92ba28f55ea8a67006f,2024-10-31T14:35:10.887000 CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000 CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740afc,2024-01-31T00:15:45.920000 CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000 @@ -244960,7 +244960,7 @@ CVE-2024-21673,0,0,2866498f011d332228d57663487e1910da9b98ccfca23369f4ebc12b93e4c CVE-2024-21674,0,0,18c1e032e97a47f3454b7df606226cc8c3949f13466f20b4fb2290f61fe56ad9,2024-08-29T20:36:01.397000 CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc610b,2024-04-18T17:15:48.620000 CVE-2024-21677,0,0,172011c5d5a06c0e2ca2f356ecd05cb171d9f8cbcabb5b389ad48344d43d1ad1,2024-03-20T13:00:16.367000 -CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc778397e,2024-02-20T19:50:53.960000 +CVE-2024-21678,0,1,39a88cd61739c23dcdadeef9b238931362f5b5c40ea2ad2bc53f3f6c2289e633,2024-10-31T16:35:06.307000 CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000 CVE-2024-21682,0,0,646c2077276d5778c5018e29b5374e3c012d049729d58323d6e6c9b112e6285d,2024-08-28T16:35:07.830000 CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000 @@ -245427,7 +245427,7 @@ CVE-2024-22272,0,0,a4dcf85cbf4922799718d1c10a1120b8457bb2d971adaefbd755578980198 CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da58959d8,2024-05-22T12:46:53.887000 CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 CVE-2024-22275,0,0,4e0b17231c07cc777231dbb9d62f6bfa759cfc82db650243f36e18a0ee106c1b,2024-05-22T12:46:53.887000 -CVE-2024-22276,0,0,419203f50311fd388fe713fe6b9bd9748f16b9b808692bb6bb617d18f1b85850,2024-06-28T10:27:00.920000 +CVE-2024-22276,0,1,d4f63a1bce630b1d72b2bfa51a6764db364daba4f4514c85097d4714b657fa3d,2024-10-31T15:35:26.797000 CVE-2024-22277,0,0,58ae5d0e4105b74890ddefb8230f50e402808e8f123d8f12b678d28eac27f1bc,2024-08-21T16:12:46.790000 CVE-2024-22278,0,0,f35dc006103cc663388ce8b4cff5063958c5dfc051683cc0f74cfb0c3db3bfcd,2024-08-14T22:15:04.253000 CVE-2024-22279,0,0,5d8aa0dbd91af7dcc363b8a8ffff6d2d8af807d5702d0e6e6114610449201025,2024-06-12T18:04:20.147000 @@ -245512,7 +245512,7 @@ CVE-2024-22368,0,0,f9c04f74fdefa82c010dcd368da5580ef7cd5ff30628c11bc03132d8ce708 CVE-2024-22369,0,0,30b4ed35002a1c9041765935be8eb0a4b2b4296c6df468fe9e2f5061e6b3b9fc,2024-02-20T19:50:53.960000 CVE-2024-2237,0,0,8acc771e5420188b33ab0fa565428c5e7a786ced19cedd2d276b0e24b8b2ca41,2024-03-13T18:15:58.530000 CVE-2024-22370,0,0,9faa550aecd655dd0c6044075a993cb7fd6340db4b5ed67443b2de43fe28b521,2024-01-12T19:29:18.790000 -CVE-2024-22371,0,1,5454e849d39d2498395a42edf5d52445cdc985e5174600a9165a6e2ecf1b03e2,2024-10-31T13:35:09.107000 +CVE-2024-22371,0,0,5454e849d39d2498395a42edf5d52445cdc985e5174600a9165a6e2ecf1b03e2,2024-10-31T13:35:09.107000 CVE-2024-22372,0,0,41a96df2cec3cd9d4b88fe1ba832af86ed0b835682a086e1a6cff274644119c9,2024-08-01T02:15:01.737000 CVE-2024-22373,0,0,ee90570c26c3acb48d9fa787d85b6b327edae750fc1f814f1d147a75d6b2e6d8,2024-05-05T03:15:06.740000 CVE-2024-22374,0,0,ada482f55322a26063d3cb90e19620c8207cc9786123643d00e235a12ddea029,2024-08-14T17:49:14.177000 @@ -245770,7 +245770,7 @@ CVE-2024-22873,0,0,3e804664cc070ce55555c4a054f46b8aa2f31d8d94dcc162e42607997d87b CVE-2024-22876,0,0,2b681eac932c151f8b6d70661e354dac90a6846621aa7fbcc62aabd644cf5d8a,2024-01-25T18:19:25.647000 CVE-2024-22877,0,0,240f9475c4adad9f666e1dfbbc8f3731afeed11d7d0ecb60814db8666105f3c3,2024-01-25T17:45:50.770000 CVE-2024-2288,0,0,44a5855956b2fb35334f494e61358fff44a28f989d0dcfad2afaa8242c6c8696,2024-10-15T20:31:45.067000 -CVE-2024-22889,0,1,73eff1b2ef01dcb0e58c8cdd77dd5edc3ee549423578adb4edecf31600fba852,2024-10-31T14:35:11.827000 +CVE-2024-22889,0,0,73eff1b2ef01dcb0e58c8cdd77dd5edc3ee549423578adb4edecf31600fba852,2024-10-31T14:35:11.827000 CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000 CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000 CVE-2024-22892,0,0,1cb70c9bbe2035656f1a61537a281bff8d1269d1ea2645c56c1075af5d2518c3,2024-10-01T19:10:13.467000 @@ -245839,7 +245839,7 @@ CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad3 CVE-2024-23076,0,0,9cc2c28cefabea273070bf7e7250bcdaeefdd0b641f60be2a4ba85c81952af87,2024-10-25T21:35:05.413000 CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4456,2024-08-21T14:35:02.117000 CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000 -CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000 +CVE-2024-23079,0,1,92990006b1e19058a713be27aa1de89462bf595893d09d16cc16cfa9f739cede,2024-10-31T16:35:07.030000 CVE-2024-2308,0,0,5bb2112645629721229497ec215ea65583df40f8b60e0deeb65bb784d4510e83,2024-03-17T22:38:29.433000 CVE-2024-23080,0,0,f45adee4e0e22336e2755adc7f0e4c8ad553b3c9ddbfd250b5b847f6bae20f98,2024-08-27T15:35:06.003000 CVE-2024-23081,0,0,870c1c4df2360c6a0bcdcbbc7e7323672b70deea175c507823f8849ab5657624,2024-08-01T23:15:40.290000 @@ -245967,7 +245967,7 @@ CVE-2024-23226,0,0,c0d0d5fec02771ea9a3a526f532b92cd110b517e8f0faaae4ea650f235ab3 CVE-2024-23227,0,0,76df15f6bc2ca6b12012309a52c71fb5a4f3228c7f6483628fc9bf7ed873f2b0,2024-03-13T23:15:46.290000 CVE-2024-23228,0,0,cc53be31cb9d833cc5f783d1b1a5baa2ef8daadab372d7bfd86c3142f74dcac9,2024-07-03T01:47:38.910000 CVE-2024-23229,0,0,561351da6f91af092533ed5801a4de12d08e4fb8a08cae5fec6b16d788979c5a,2024-10-30T20:35:08.097000 -CVE-2024-23230,0,0,ddbb7859b4c1b994076995e0f94a6c532d5346bdce5f3bbe28c8464827620925,2024-03-13T23:15:46.337000 +CVE-2024-23230,0,1,0ce355c026a81eb330cd3a55adfdd58c7b28ad2193d6045812672f59d130ef9d,2024-10-31T15:35:27.513000 CVE-2024-23231,0,0,0c006833f1467b383e93b7d07c3cef0ebd7c088db978ea80541620978106cd1d,2024-03-13T22:15:09.780000 CVE-2024-23232,0,0,9e7b49448cac16c45fbeaf042c9f71b2d8db550fb449e33aa9abdc891de85b63,2024-03-13T21:15:56.087000 CVE-2024-23233,0,0,313670ac068b12d9fa516d4a3c082e80e45b5e5dbe4efd3c4e89ac3ce5144465,2024-03-13T21:15:56.140000 @@ -246139,7 +246139,7 @@ CVE-2024-23441,0,0,9c5dca83c16b9bb0dcc1e9e69acca607a575bb56eafd40d60d7d021ac0bb7 CVE-2024-23442,0,0,5f8a68032ea653fbe64c514e7b6426371d76626b34b59cc1abb65dea78329a83,2024-08-07T16:32:00.580000 CVE-2024-23443,0,0,ec52c90b1bdd9302a1feb9cf7a1a344bef4f50d5729b639a22d6f8e35b652893,2024-08-19T19:33:31.207000 CVE-2024-23444,0,0,9d04c210297b8378296ccd9e937d21ef43ab4badaaad1c5feb386881ba03d55c,2024-08-01T12:42:36.933000 -CVE-2024-23445,0,0,6c527df37925bfee88abbff37b4b4e377f6526ae267b170f8c243c193159d3f0,2024-06-13T18:36:09.010000 +CVE-2024-23445,0,1,aa98211f7061604560409e2571afd3d6adcf11a9c8a3dbedfa84e48e6177f0d2,2024-10-31T15:35:28.363000 CVE-2024-23446,0,0,4d7124defa0cb48f303fd49a5701937ff8d343d7ed35efe26f93d719e40bd716,2024-02-14T20:10:24.323000 CVE-2024-23447,0,0,ead5eeded6dc2e4e220b06ad6f5040f9ba1bf7850a4aca072f42a67732bb7fc3,2024-02-14T20:02:00.753000 CVE-2024-23448,0,0,9c88a7e362c6a04736299a5cac65a111d4bea131651aecfdc456747dd687125b,2024-02-15T15:39:14.317000 @@ -246358,7 +246358,7 @@ CVE-2024-23686,0,0,0f8e622bfe9699fdde6c2b0648149f7edf83731c9b47ad381d5ff090b7d5b CVE-2024-23687,0,0,5fdd2c389c5d2eaf89aa8b5a0863cf42288a4e877de2de44bf84294c1bb02a66,2024-01-26T16:54:13.900000 CVE-2024-23688,0,0,81d4edf2e01cedf5666dcc076a0a5b7b4d927e2138b75e187700e01c55764e57,2024-01-26T15:53:31.397000 CVE-2024-23689,0,0,e6e68ec161da53b03bcbdf90d8370855b9f5159ad41b6f3011464072ccb9cb90,2024-01-26T14:50:45.023000 -CVE-2024-2369,0,0,ec2eadcd34d8546ff9e008e10197a9a6af2faa343d241b491b1deecab645cbad,2024-04-08T18:15:08.527000 +CVE-2024-2369,0,1,14c2774141e23864718f4ef05b619381edad06e0b0f1cdc5b83e808c6cdc26a2,2024-10-31T16:35:12.287000 CVE-2024-23692,0,0,65aa5e8f23de8a0da898982a339a61e6ecd92c42c44c407aca2f6fc4deedd858,2024-08-14T16:59:39.767000 CVE-2024-23695,0,0,ce18d2d55c36b9821d9a6de4198ed4baccdebf868801b1a79717c754c5a30b24,2024-07-12T16:11:25.493000 CVE-2024-23696,0,0,022ce62aafd52a367ae1fd55ff3f32b8271ce7a04dcdd1cf3f08be45eca0df5b,2024-07-12T16:11:26.310000 @@ -246388,7 +246388,7 @@ CVE-2024-23729,0,0,b362985433849942fa57ffb7c60805e017ed14757dbdcdaedfa5548bdf2c9 CVE-2024-23730,0,0,4088c5b420c8561e609e86e9e6639362f96648106817a43f2c436ecb5e3da5bc,2024-01-29T15:22:56.753000 CVE-2024-23731,0,0,9e444542e77d768ae255d5361c86689c30d0d3ff31dd7c8827b69cb99e58f1a3,2024-01-26T21:11:25.430000 CVE-2024-23732,0,0,02703c2ad5218c00fbf227a383e9ac2f87b400985304eaa4f21127fe5bfed2aa,2024-01-26T21:11:51.840000 -CVE-2024-23734,0,0,1078a1a76989e0192b69db5ffa91c8c13e6beb2e13718835d413cc9491169e21,2024-04-10T19:49:51.183000 +CVE-2024-23734,0,1,4cf048a3603c2236c83db185389a1798a3a8236cb3edbaddf13143286cab452a,2024-10-31T16:35:07.840000 CVE-2024-23735,0,0,1e59c189ebdd76a87eae090bebc9792b24a3eddd264b9f1d7bc1535978159480,2024-04-10T19:49:51.183000 CVE-2024-23736,0,0,bcd223ae0db7879befee0415fb371b15c3be00a7450081b37507ddd44cb2eebb,2024-07-11T15:05:26.800000 CVE-2024-23737,0,0,33f3b596037211695cde51ae42037e9b7f68645a30cea20e35e881cc76e8e296,2024-08-29T20:34:40.387000 @@ -246900,7 +246900,7 @@ CVE-2024-24622,0,0,8ffdaf8904842470ccf0aae2fb09ea08e7a29fd5e82100db2efa14804572c CVE-2024-24623,0,0,e23522cd90c3f81436f021cc1cee0d90070bf1ffe4505ee298f9391aeae672e0,2024-08-02T00:15:20.637000 CVE-2024-2463,0,0,83d524caf02b4808a89c7c61c4da40ddbea3d86f2ddf48f57fe66c47a0e3746d,2024-08-01T22:35:16.773000 CVE-2024-2464,0,0,048d096954b98cf766a43ceaec22b42d04ebd096b39362170ba590c40b4c8e8e,2024-10-30T19:35:10.350000 -CVE-2024-2465,0,1,aa987313de51b9d52428b619bf3978552bad48bc9efb928e37f8628f94028d68,2024-10-31T14:35:14.937000 +CVE-2024-2465,0,0,aa987313de51b9d52428b619bf3978552bad48bc9efb928e37f8628f94028d68,2024-10-31T14:35:14.937000 CVE-2024-2466,0,0,48c155e64096c9b91823c31630eed3e83a40f2e8d8db10b3ec7c533a068ba102,2024-08-23T19:35:12.650000 CVE-2024-2467,0,0,9bcf217419e076743a229c7d9329553030b624f85cef7b05ba0694abd37301e6,2024-04-25T17:24:59.967000 CVE-2024-2468,0,0,f5fa0f4e21305851a5ed43e2730a4e0c2e70e0ee8b201aed06c129c3eb28843c,2024-03-25T01:51:01.223000 @@ -248227,13 +248227,13 @@ CVE-2024-26462,0,0,26de7b444e254c213d77640f77662b5b241a0427363fa56252d8a7b716583 CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000 CVE-2024-26465,0,0,3a896709d200549d8e79b89e1e93cd3f7afbd9ee26478bdb4b85743140b25407,2024-02-26T16:32:25.577000 CVE-2024-26466,0,0,6709258f243577bc1f93e1c54519a7b66e4e3ffda1e209724abca2cbfec5238f,2024-10-30T20:35:12.827000 -CVE-2024-26467,0,0,f852e96e7aa9bd31104a7a5efbb92bf78ab3732b64936f49fadf5127e244746f,2024-02-26T16:32:25.577000 +CVE-2024-26467,0,1,c79919be511844338d780cb29a83d8434b9e819bf896bf804be060a155284c12,2024-10-31T15:35:29.323000 CVE-2024-26468,0,0,def1bc4284fa411449589c5e4214627b54a1a33219fd215b1c6f274069ececaf,2024-02-26T16:32:25.577000 CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000 CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000 CVE-2024-26470,0,0,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000 CVE-2024-26471,0,0,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000 -CVE-2024-26472,0,0,3ea665ae7d8c4cb8ea3ef77beb55f90d75bb053da605750b4803b40c300fd840,2024-03-08T21:15:07.193000 +CVE-2024-26472,0,1,4c4bad048eb62d0f5c9232a581b443644013f701bfed1b32dc0f1f99e73f7dea,2024-10-31T16:35:08.623000 CVE-2024-26473,0,0,fc9f75146122995e0277d9d0adf8775c5418cc84731af51473c2bfe5d4f1f791,2024-02-29T13:49:29.390000 CVE-2024-26475,0,0,20ad9200302e3e54b711e4fc6343b6cece119754af3510ad17450c27265394ef,2024-03-15T12:53:06.423000 CVE-2024-26476,0,0,86217df566dd4435b72fd3727298db36201b9d7d0dfc96aa7e00ce9a615454c6,2024-08-12T18:35:32.803000 @@ -248244,7 +248244,7 @@ CVE-2024-26483,0,0,b5ec47ce1b513ecf6dbceb8f812429a8fe9ec195f20a1c367fcd9ea7c5680 CVE-2024-26484,0,0,c8047678f7231824b5c927e31411e2a4e30944b1f11ae642e23849e18530be29,2024-08-26T19:35:24.853000 CVE-2024-26489,0,0,66cfbedf131a53c21ff3313641983aeb0011805244fec1b387ac6a56f1259318,2024-02-22T19:07:27.197000 CVE-2024-2649,0,0,33b94c38d3a45f74f6718ae1eb94103cab8852874cf5ba7ffe3119736f42cfff,2024-05-17T02:38:23.307000 -CVE-2024-26490,0,0,aa5c95d9568ffeff67d082f5e625a8d3790e84f13ee3d4cb803a75ca49441fa4,2024-02-22T19:07:27.197000 +CVE-2024-26490,0,1,b58e1b7fd4606b4e85095058d72ea78d7ba44d3bf743531e730a2b102782d01e,2024-10-31T16:35:09.413000 CVE-2024-26491,0,0,74f1ba8b39e9410256b69e956a81c1395874aa769444270185f7eb4f2f689d03,2024-08-28T20:35:09.023000 CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000 CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000 @@ -248324,7 +248324,7 @@ CVE-2024-26623,0,0,072badb03b6dfd11f30eaa3dc91549de4bb838c1b1cb59508b9c081211145 CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000 CVE-2024-26625,0,0,9e3b764a2377334b390fbaa35085e0548763f75b8ded75b0e5619c5b97c44843,2024-06-27T13:15:55.670000 CVE-2024-26626,0,0,63525a5fd910f55250614b36cebc3d752475ac77c23f86d1878a9db8ceaaa4d3,2024-04-04T14:15:09.390000 -CVE-2024-26627,0,0,b80c664abebc8fa5529da4975a1b3f29f8743f7f82f525af36251b755a6787db,2024-06-25T22:15:19.457000 +CVE-2024-26627,0,1,17135619e34a021ca4587639b8c90b22d2a21c9f7c2952703e86883b28bd61e3,2024-10-31T15:35:30.300000 CVE-2024-26628,0,0,da7f47400f41cb31ecd3afb43bae4a639d3d68eda0a5da59e7d46fbaf261a8b7,2024-03-20T17:15:07.367000 CVE-2024-26629,0,0,b96483da4b4ba60aa717752f92fa18f29ce05e615de7c19840399ebf4a040cd8,2024-06-21T14:15:11.633000 CVE-2024-2663,0,0,d2d0e98a1e7083016a816a6e2772a944fb7c73e3b16eea84ad261bdbd42f48da,2024-04-30T13:11:16.690000 @@ -248336,7 +248336,7 @@ CVE-2024-26634,0,0,ad2e282d3e927b5f098735c9588837c39fb6d52d3e5c81b7bc620afe71c1e CVE-2024-26635,0,0,9ccd8d24da9a1dd3cac8fc46adee8bd364e3accae3dafb495dc11ffa106f59cb,2024-06-27T12:15:19.117000 CVE-2024-26636,0,0,96ee948e6e102c9352679a1cea781601aa44e2452e311a25c5444990825b536c,2024-06-27T12:15:19.263000 CVE-2024-26637,0,0,192e52b3e33e418e2bda4b3b8cc79eaa2222dae15a79913f355c96082861d2ff,2024-03-18T12:38:25.490000 -CVE-2024-26638,0,0,9882cbaa583d03232e54aa3492ed97bd898b2350c31e58c004ea062e5a64233d,2024-03-18T12:38:25.490000 +CVE-2024-26638,0,1,13ddd4be4a9e1a042c7707a01ed7c65b16ac5b803ad2738595e2fb6125b54910,2024-10-31T15:35:30.513000 CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000 CVE-2024-2664,0,0,cc2cb9e8d00b491249c71ce1e80a9901a0f6a18ebaaab2e08dbaa9ff3f4dbb18,2024-04-10T13:23:38.787000 CVE-2024-26640,0,0,039535fbdb1a82b2250451622a0631b806762b89ee80bf76e3916c9409aebb08,2024-06-25T22:15:19.727000 @@ -248443,7 +248443,7 @@ CVE-2024-26731,0,0,a0b35e80e7d711c60a97912dc302c5db34b4fd9235fbfe456f2513f7ece65 CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000 CVE-2024-26733,0,0,646af548b9533cc8bde386b28e554214eab8f2a020503960c0d1f100df49ab2b,2024-06-25T23:15:25.030000 CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000 -CVE-2024-26735,0,1,7afe0996673efde5a6585f2186b8a08bb5ef98d3542cccab732c4df20b91e8aa,2024-10-31T14:35:12.657000 +CVE-2024-26735,0,0,7afe0996673efde5a6585f2186b8a08bb5ef98d3542cccab732c4df20b91e8aa,2024-10-31T14:35:12.657000 CVE-2024-26736,0,0,a562229f2b02fc6cec76f3673034e8ce7378dc0d0fc6cbaec0df447d9263eebb,2024-06-25T22:15:21.543000 CVE-2024-26737,0,0,0eebf05ac9670a7b6624c0152880292a6d84adf09232bb7ee2becab2991f6bad,2024-04-03T17:24:18.150000 CVE-2024-26738,0,0,3ed173e742b2f1ef480700b80fac0353c8315c8c73b558ad6f8306db1c647ea2,2024-04-03T17:24:18.150000 @@ -248612,7 +248612,7 @@ CVE-2024-26885,0,0,9812c38d96715b3542cd06a50cf5aebdb7959c0c74a3a73865ef4bf356dd8 CVE-2024-26886,0,0,22c9c87551a38bc4020e424ede77e1d9dc5415f6bb6aca319e99ad271a086753,2024-04-17T12:48:07.510000 CVE-2024-26887,0,0,256d8ba53763324b885d30621bb139639686e292be09a8808e097fe5b90884ff,2024-04-17T12:48:07.510000 CVE-2024-26888,0,0,04832429818b0a6c947a6524ceddc5403f2a1f69e07151cde69f04c2df710a27,2024-04-17T12:48:07.510000 -CVE-2024-26889,0,0,633e4fef892eb08371aac2f966d2885de5a99b8037bb176fb6707042c3f82cb1,2024-06-27T12:15:22.100000 +CVE-2024-26889,0,1,46ec2a96d223b9f1cb02cabef48aa0711a1e49d0400eab278888d0a5c0e91362,2024-10-31T16:35:10.200000 CVE-2024-2689,0,0,a70fa317f27c6a40babd481e82ea078fac342955ef65758b6b37c51a83900200,2024-04-04T12:48:41.700000 CVE-2024-26890,0,0,442ddef52e9c264bc395f1d392f8e749c4361ea4cfc6bd82e29e835d19500d45,2024-04-17T12:48:07.510000 CVE-2024-26891,0,0,e75c6313f07c138ae9c36d0ab38fdf2f3dec2472492fc6c7e58e9f5d631654b1,2024-06-25T22:15:25.327000 @@ -248709,7 +248709,7 @@ CVE-2024-26973,0,0,1ffa32874ac86674616b9c65a4998dafa3aee878a6c16633653d638380497 CVE-2024-26974,0,0,b9b8313a9c7305b8fa4ea7035db32db837845fb5fe59e7dea6581e5e181c765a,2024-06-27T12:15:23.293000 CVE-2024-26975,0,0,b8948d8dc751bf63cba89aee9d9698bacb5649b366a3d8268da651c48a46e852,2024-05-01T13:02:20.750000 CVE-2024-26976,0,0,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4baec7c,2024-07-03T01:50:10.377000 -CVE-2024-26977,0,0,1ebc6c5c595b695887aee884e1b3633cb0833cb65f13c96d7b2e671b86068f61,2024-05-01T13:02:20.750000 +CVE-2024-26977,0,1,497654cb7be192f219ce80826de497c17b0440b7c74d50ac35e9e9acebd5f1a5,2024-10-31T16:35:11.057000 CVE-2024-26978,0,0,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000 CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709b88,2024-06-12T16:15:11.147000 CVE-2024-2698,0,0,40bd5a1cdf4bb74113246fbb824eb2e69afabe86a31672736550bc5463d9a867,2024-10-02T15:15:14.603000 @@ -249627,7 +249627,7 @@ CVE-2024-28089,0,0,8dcfc5f0af6bda2c62c3d6583b98af8806f63e5c3b009d2d4c4b9e591fef1 CVE-2024-2809,0,0,82a495e20989f000a99f2c2b597fd459041cdf90f3f5905ac9eb213a6d9d3a11,2024-05-17T02:38:31.340000 CVE-2024-28090,0,0,171bdf36c21f5eca0df2edcfe7464195fb5b1b8efbe9da50a6b805091a98fc56,2024-03-28T20:53:20.813000 CVE-2024-28091,0,0,5ed7c34632c1a0aa269b6a00d852ca628a0683b7be9f9882c51016680515c606,2024-03-28T20:53:20.813000 -CVE-2024-28092,0,0,5c881d6bbcb320b99b5bc1adf53a2e7899c1c5fdb581805e7631d7f5c1594e8e,2024-03-20T13:00:16.367000 +CVE-2024-28092,0,1,9a3e7c770d31d9e59cd223d8d8e1cc67d0ce3b46473455bb5ee983e000b08dfb,2024-10-31T15:35:30.710000 CVE-2024-28093,0,0,a74b48923501efe2ba32810919673a6db5f0b67cc3e4e9ba0a101f0358325a24,2024-10-28T21:15:04.167000 CVE-2024-28094,0,0,74ad54803fa87c64355f96b089f449c44265820427658000ab8a62971a975a96,2024-03-07T13:52:27.110000 CVE-2024-28095,0,0,1b7acaa11106b6d74288d818dfca388e6351fd1c0dbffb28e0398973e1fb67dd,2024-03-07T13:52:27.110000 @@ -249679,7 +249679,7 @@ CVE-2024-28148,0,0,47049d1db8585c3dde29a9470fb6d684b6da98e633a5abddbaaf1450f69bb CVE-2024-28149,0,0,d57757f16645c63e0c9502e4711b42f37419d20f304e87c5cfd79696154e2cc2,2024-05-01T18:15:16.697000 CVE-2024-2815,0,0,e870ad3fa73267b9278cf23f6d2369bdda6a88605b4512a729c5f6d6173abc6e,2024-05-17T02:38:31.990000 CVE-2024-28150,0,0,0db8b1e97a0ee8e6eba4c87c8dd4e2777010b004fa480c25edb77b0148ada01c,2024-05-01T18:15:16.747000 -CVE-2024-28151,0,0,1501a10687b45358103598dcf0f8894c76d2014223b0b1ca17af905d826e15ac,2024-05-01T18:15:16.783000 +CVE-2024-28151,0,1,5283a040a6b8355ef8622825ba855afc3180ed8fc3ecee17c382e830c6c249f4,2024-10-31T16:35:11.500000 CVE-2024-28152,0,0,d346e4768b92de65867392fc684d46a431ae9223aff6757e8603e9edebb48f03,2024-05-01T18:15:16.823000 CVE-2024-28153,0,0,b4d921793a8b7e300347aa593d28cc61e78e4bd1ef14a12f0b164a18aa8c4d66,2024-05-01T18:15:16.860000 CVE-2024-28154,0,0,f3c5e1223674cd4f63e01c3170fae2ae6e1a05a85671857da6a95d10a5850122,2024-05-01T18:15:16.893000 @@ -249779,7 +249779,7 @@ CVE-2024-28269,0,0,b7dba037dfa057d99dedf14ed710d84a658c9775dd875bb28a1c5e4a54714 CVE-2024-2827,0,0,8a3b8a600b66b6a1d493b06795e5ff420fded15847345b5fd4692002caac1e89,2024-05-17T02:38:33.003000 CVE-2024-28270,0,0,d31e1c2434769794f7fdbd96bb87b1e9def96007379aac5531dfd1dd843aefb6,2024-08-01T14:35:06.503000 CVE-2024-28275,0,0,7f204621f55876799e4a0739675d5f90796a416c553e1fed23a049073a997181,2024-08-01T13:49:02.517000 -CVE-2024-28276,0,1,cf16374148522979479e183cab9fa2a9dd828629a92012e2621ec5f88dc5a891,2024-10-31T13:35:09.900000 +CVE-2024-28276,0,0,cf16374148522979479e183cab9fa2a9dd828629a92012e2621ec5f88dc5a891,2024-10-31T13:35:09.900000 CVE-2024-28277,0,0,11d55096db4a6f8daf8d5b5c78d2c8d6c9326505ca094e2c49ca8ad7bf77760d,2024-05-14T16:13:02.773000 CVE-2024-28279,0,0,55b3ccd94f211aef8d797e18d612a2f101844bd7f75e59dedcf73508a0cb187d,2024-07-03T01:51:33.390000 CVE-2024-2828,0,0,8900d844f8cfc7f7690e29cda848c134f6d2f92cdafcde758804b06ac18f0c75,2024-05-17T02:38:33.097000 @@ -250574,7 +250574,7 @@ CVE-2024-29730,0,0,b186c5b3880379c585659498d231a4340abc326b0fc3ca68ca70958057195 CVE-2024-29731,0,0,68b136b744379f26748e41e0fdbaa75d019b3aa6b49c48f975004138369bd863,2024-08-30T15:49:30.047000 CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710f0b,2024-03-21T12:58:51.093000 CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000 -CVE-2024-29734,0,1,10f1f3064be9a005469469edccba59e0f65e741cf2f3f27a194968904d4079ee,2024-10-31T14:35:13.830000 +CVE-2024-29734,0,0,10f1f3064be9a005469469edccba59e0f65e741cf2f3f27a194968904d4079ee,2024-10-31T14:35:13.830000 CVE-2024-29735,0,0,a76efb6a52b5ea1ac6fea742527db9da26fd73b24e7a91a20242bea9de6c3b0d,2024-08-29T20:36:39.460000 CVE-2024-29736,0,0,5b51c834110c4ab0fba6db5636bf570f371288eeb5e87d8fc00ae6c266b9181d,2024-08-22T17:31:48.980000 CVE-2024-29737,0,0,773c8720c44afb54cbbd0c12354c2f0a043cfa72e5f75a21b0108ef944307c03,2024-08-01T13:49:34.853000 @@ -250794,7 +250794,7 @@ CVE-2024-29943,0,0,77fce75b3b79190c7987459c64d58a0451f9c8cb7178727b76412299d4b63 CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139be6,2024-08-27T18:35:09.073000 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000 -CVE-2024-29947,0,0,5ce72939d2768b5ffd8ef75fa59eeac4277e1fd0f98f69cde2fd39c4873b7e51,2024-04-02T12:50:42.233000 +CVE-2024-29947,0,1,8ad8469acdce0b9e6eead1629c69da154792700d4004eaaf5144ca5b844c0d04,2024-10-31T15:35:31.567000 CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000 CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000 CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000 @@ -251541,7 +251541,7 @@ CVE-2024-30802,0,0,1376f3b4e3d1d6ed6e73bef87767a1a17df2d57663c8be14203281e52f5ae CVE-2024-30804,0,0,dd10458412d3521d15e3678824d59c04de028b22e6295f81ee6095b0ff10efe7,2024-10-25T20:35:07.267000 CVE-2024-30806,0,0,d64ba375e8a4aee4aa1348cdd3ca4e1493d138147be36aa2ff70b6291ff84259,2024-09-04T16:35:07.870000 CVE-2024-30807,0,0,9adf66eab8d20fa39067410ec7fc440301636d430d268d7656949581b727165e,2024-10-30T18:35:08.630000 -CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000 +CVE-2024-30808,0,1,e3c2a1a4124d0f64358c55197e1a053a008d05d16e6630a9af373b92f6d2f5ac,2024-10-31T16:35:12.477000 CVE-2024-30809,0,0,1fcb0fd8f1a39e7f469bccbb27a3f6f436aa5c361167acbe3a36e26117f3ec6d,2024-08-01T13:50:27.443000 CVE-2024-3081,0,0,01dfa9fbad742b3b5c96a84664fd07fad21a9856f0e0dafe766309ca8f119c58,2024-05-17T02:39:42.433000 CVE-2024-3082,0,0,ddd6a74b840044483caf8292bafcfb40c7d583a802a91848e7d38c00bc276751,2024-09-30T15:15:05.573000 @@ -251902,7 +251902,7 @@ CVE-2024-31309,0,0,ca12cd2686364246003ec4c4d38c5113be1d9d0085fddb7dc5f385b2b6a92 CVE-2024-3131,0,0,c105af314f6cd2a67026a981250eb1886cf285c372d5dbe1b84a99c03d0161a7,2024-05-17T02:39:44.143000 CVE-2024-31310,0,0,18d1418ec38f7c8ff17788048da0079aa6b632f7675bd0da4820aeaa7280cd83,2024-08-01T13:50:49.710000 CVE-2024-31311,0,0,bc87f5eff00ede1d1c04389c216e60b2a2a407288e31ea28ec5028c636a65054,2024-07-11T15:05:38.153000 -CVE-2024-31312,0,0,3e59aee3cfa2f94cb0ef2f4dd0a4353f30db5e3e79096083a0ada05027297595,2024-07-11T13:06:13.187000 +CVE-2024-31312,0,1,03cf0c2ff32c1c54a3d6bba8e7844e81a619609e8735422ec375e1e5aaef68a3,2024-10-31T15:35:32.303000 CVE-2024-31313,0,0,ceb2987f383004ca75547566ea31a4a0eedc5e53d834a176eb55faa006ac3bd7,2024-08-01T13:50:49.893000 CVE-2024-31314,0,0,f79a503fa2b5e6b0ca89cfce664066f03d71aa556965c71aeebf162d04cdcf57,2024-07-11T13:06:13.187000 CVE-2024-31315,0,0,285e9341c5dea2df00bd2c416691a1faeb9d23f21a318a12574fefeadc97541f,2024-07-11T15:05:39.143000 @@ -251986,7 +251986,7 @@ CVE-2024-31391,0,0,be3e3b0749f1f4a92f989cd2a13433175b667c60773cc8880e10eb3ed1687 CVE-2024-31392,0,0,f0207d337d79a299cb771825b7dbb479f58a71a9edd6b7a24834f55fec6479f6,2024-10-30T17:35:03.930000 CVE-2024-31393,0,0,675d7cbb5105173b3ddbf8a5a8c43270ec3504343013c71755eb5691c8dc2cb2,2024-04-03T17:24:18.150000 CVE-2024-31394,0,0,057a59cfe49b19144d2e3f8a03ac1db28c62eb3e70e92a240bc4577876d0a78c,2024-05-22T12:46:53.887000 -CVE-2024-31395,0,0,84ffe8279d5fc146d1e75e38d339843647ddbe44b201c68383044efb99b4ee60,2024-05-22T12:46:53.887000 +CVE-2024-31395,0,1,0f24decbea51e3e2eb9a27246dbf196ae496903dfb9329a5844ea4ba0f696263,2024-10-31T15:35:33.107000 CVE-2024-31396,0,0,3459f305b0a80cfe56958d75d2dbcac63c337a642c0a699b6a99c0cfafa2b0c8,2024-08-01T13:50:53.827000 CVE-2024-31397,0,0,84e5539fe288f7e4c3b9dc6907e828a79fd1c0ce0682e8ac0d31f1740d4dafd1,2024-07-03T01:54:48.070000 CVE-2024-31398,0,0,9f26a8966841c1dd476fe71aad3f95e154dd42eb5a5c4250c23c422aac667aac,2024-08-23T02:29:18.453000 @@ -252340,10 +252340,10 @@ CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb9 CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000 CVE-2024-31970,0,0,dc760428323022074304e6c9bb04a280cd725057b022c5a2ca8dd65247ed99d9,2024-09-03T21:15:15.603000 CVE-2024-31971,0,0,a1f4b42965419df8f210a326f6ff82813b583045274127c94e5e4f5a032a0e1b,2024-10-28T21:15:04.253000 -CVE-2024-31972,0,0,7192fae571c1ab1e202c201b7113c02c4234890ed042f9671a85615954ec0a0f,2024-10-30T18:15:06.760000 -CVE-2024-31973,0,0,03d63ffb1c32e04793a4762ff57566dbe2b867558d8ce7b244d134aa6d92497e,2024-10-30T18:15:06.893000 +CVE-2024-31972,0,1,2c7a599051ae119780338ab9b442cbeeb73197c2b9b57b59996efb3af5c48c2e,2024-10-31T16:35:13.347000 +CVE-2024-31973,0,1,3fcf6ec328427aea2123998ffb5c52b17ae76964cccc725e0871d708cc5bcf2b,2024-10-31T16:35:14.150000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 -CVE-2024-31975,0,0,063e04bc50fdf8529cbdc56dff32a76ecfbbf4663a658390f3e293a3cdb9784c,2024-10-30T18:15:06.967000 +CVE-2024-31975,0,1,7550f5c9c88af659cd8584b3c629c1cecda27b61379ae9e83844f8c870633996,2024-10-31T16:35:14.937000 CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000 CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000 CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 @@ -254097,7 +254097,7 @@ CVE-2024-34397,0,0,16b5c41784e4f3ba325a2b1735509d7fce68bb2c9a1b2765d2c61257921c1 CVE-2024-34399,0,0,b575bfaa23d53510470a68bea01ab071e8876f6597cd9250405e7f9141fb6390,2024-09-20T12:30:17.483000 CVE-2024-3440,0,0,534ad01cc4d99b7aec93fa9eb5959ed4cc5d68a1c33a8c467ae485dbc87a6451,2024-05-17T02:39:56.370000 CVE-2024-34400,0,0,1bca49bc8c0dee071844795fcbc00247b784cd5c7eae97a5694b29753f6686dd,2024-06-26T12:44:29.693000 -CVE-2024-34401,0,0,27b9367da2f161e981b1286c7a0adf44c7e4e274412f5e7a72f3e98a3426afa2,2024-05-03T12:50:34.250000 +CVE-2024-34401,0,1,5c971e4d11ff393ebf092a1d7fe56171b0a363342e2088669ab44b1cabc67da5,2024-10-31T15:35:33.893000 CVE-2024-34402,0,0,40c1c09e73a5e121ad069e420d9f5e2215153ab4f3ce6510830030c249155906,2024-07-03T01:59:58.723000 CVE-2024-34403,0,0,a772c000336bb8be08b5529657346fe94b3dd49c540ea077515808f0de4e0beb,2024-07-03T01:59:59.493000 CVE-2024-34404,0,0,2218f03848badcec6b845021573c2c5e793459d6da07af9ab9bf7f14fee0936f,2024-05-03T12:50:34.250000 @@ -255147,7 +255147,7 @@ CVE-2024-35873,0,0,6dc07dd491ce1ae820a5d4fb78b100219e98385c6d062d44d66a72a56df36 CVE-2024-35874,0,0,3f9cf166158c93dc476fb8654991540d2336f2d5d38b587de46fb9ac634f5d41,2024-05-20T13:00:04.957000 CVE-2024-35875,0,0,8ab9621867535870defa53a806e98a2282aeda1bda484993ec9b5afbb0ec82ec,2024-05-20T13:00:04.957000 CVE-2024-35876,0,0,21d4e04307171f23eb20581ae687ed873b8b572985d4124c23ec05853b41f51c,2024-05-23T14:15:09.830000 -CVE-2024-35877,0,0,b628c42948a0aa7d81fb737e33ef7d204a9f66737f2ab5815ed9e2ee14cb58c9,2024-06-27T12:15:25.717000 +CVE-2024-35877,0,1,13e1b7c2a56dcd33e5d34564d9fe30e5c7e342f47a64068304f8e57f3bd7baf9,2024-10-31T15:35:34.693000 CVE-2024-35878,0,0,fc62f44fa6fdfdc52094a163373d9f52a1a85a04c030ea6948c89e21d6effcbe,2024-05-20T13:00:04.957000 CVE-2024-35879,0,0,2d22b566198c76e4772a742cf5c33dc0c6f470cce4aac56fda1b810d74ae8ad3,2024-06-25T22:15:32.057000 CVE-2024-3588,0,0,4dedbcc4313ba8cb11aaace549e0dd1c777d3f65d96b9f644afcfeb2c777e541,2024-05-02T18:00:37.360000 @@ -255192,7 +255192,7 @@ CVE-2024-35915,0,0,4b8e80b7e0df701bf5661f81d3a455421f102d76dba1c849ae68cf406ec48 CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a1ac,2024-05-20T13:00:04.957000 CVE-2024-35917,0,0,ef28657905524f9b7f229abe3cf11569c21934c08ac9147215aa72d97ba1ce78,2024-05-20T13:00:04.957000 CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000 -CVE-2024-35919,0,1,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000 +CVE-2024-35919,0,0,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000 CVE-2024-3592,0,0,06f19b0f4030aa5db1e2c8d8139272dad226c0945ae251432ae728d2bb8e4467,2024-06-07T14:56:05.647000 CVE-2024-35920,0,0,e038127788e84b65006b7bac3b3d638e07acf776aced57ca59ab8396cc9131a0,2024-05-20T13:00:04.957000 CVE-2024-35921,0,0,86f3f43aed64babe95e54be060b922943333fbafaebdf08ad2eaefa3d9aa11af,2024-05-20T13:00:04.957000 @@ -255321,7 +255321,7 @@ CVE-2024-36032,0,0,2109bf212013c0ba30d278bc6b666931e282e8ca3b018462b2d195519f5dd CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d43a,2024-07-05T08:15:02.720000 CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000 CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000 -CVE-2024-36036,0,0,7da0ef0412625002a493959e0f4b9d5a2d61be8a7aa9a2a45b491bb215f046f7,2024-05-28T12:39:28.377000 +CVE-2024-36036,0,1,f9fb5156304c57a40757d765df5364ac35b8d4db65c442212813c00360bf9d28,2024-10-31T16:35:15.723000 CVE-2024-36037,0,0,38e293cc8c09dc94fd987a33e5a092088fcec9402eddbf56938ce37dd2a7c640,2024-10-25T19:35:06.023000 CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000 CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db70a,2024-06-24T07:15:15.230000 @@ -255341,7 +255341,7 @@ CVE-2024-36055,0,0,2ae48e192918df566d0d9f05622839de441a2acf51ff71e22796e7147fb8c CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 -CVE-2024-36060,0,0,47ac2b47ef070fafcd6d8ef5d543187d564e462de0136ed700db546a70c3411b,2024-10-30T18:15:07.037000 +CVE-2024-36060,0,1,c82de4fe53902252cbedc96b489f1959e38592d9af6f6c2389bfd01c1a6aca2b,2024-10-31T15:35:34.893000 CVE-2024-36066,0,0,e5935714f53a973b510722d45f5d3bf2cba784516885d84bf43ae18c5d973e73,2024-09-18T20:28:50.313000 CVE-2024-36068,0,0,67b8dd20c17029d0df65b62ef592fd27b14aad04438209518cbf5b8f0453cf62,2024-09-05T20:27:19.640000 CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea80,2024-05-02T18:00:37.360000 @@ -256017,7 +256017,7 @@ CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7 CVE-2024-37084,0,0,e8df0694fdec2710f267b23abcc1607a09f45be7ad027071682046814f69bbe8,2024-08-26T16:11:27.507000 CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000 CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000 -CVE-2024-37087,0,1,43aed8bcf7bf19587f693af8d68aefcbb6d8364f5ad3ee6823f45607d542a0c4,2024-10-31T14:35:15.630000 +CVE-2024-37087,0,0,43aed8bcf7bf19587f693af8d68aefcbb6d8364f5ad3ee6823f45607d542a0c4,2024-10-31T14:35:15.630000 CVE-2024-37089,0,0,4079e469a0b9c8eff7513f19c004b5889c685b5a744b48949620385f99d2cae6,2024-08-20T20:15:43.643000 CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000 CVE-2024-37091,0,0,b626c72d25f84f9219d28a104cd2d18472b59c6cd0ed8347ffeee08b9e2b4719,2024-10-20T12:15:02.977000 @@ -256394,7 +256394,7 @@ CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000 CVE-2024-37570,0,0,3d4360fa9467e8eab1b52b173ed2069d0c82ea4d63ef454bbfc16c6908108d82,2024-10-25T19:35:06.277000 CVE-2024-37571,0,0,67e7b2412f8af956bea28aab4c57aae5f7e196be8f9b19162aa5c75b5cf90c89,2024-06-27T12:47:19.847000 -CVE-2024-37573,0,0,550b704c3f502709be7a35148f537b84d5935982dac3dec6b20c4a996030062f,2024-10-30T18:15:07.107000 +CVE-2024-37573,0,1,35403d5840856e7fce6a375dc03b8fa51c5bfda7921a316c41c199622ccf5676,2024-10-31T15:35:35.677000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 @@ -256504,7 +256504,7 @@ CVE-2024-37846,0,0,0a771dd4297ecb7d6b521e019dc9e4e37262258e8937f6940b3754658324b CVE-2024-37847,0,0,4a1f07d2568b8def7f98c67a4d243c1afbe30f9de21a43af0fc95c8f1b1da6c5,2024-10-29T18:35:06.983000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 -CVE-2024-3785,0,1,a59b207d5a568fe95d1650fae2ba42ab1a2108a4cbb162f57fceb4094d5da52c,2024-10-31T14:35:17.530000 +CVE-2024-3785,0,0,a59b207d5a568fe95d1650fae2ba42ab1a2108a4cbb162f57fceb4094d5da52c,2024-10-31T14:35:17.530000 CVE-2024-37855,0,0,f1f3ecfbab7ca802e055151d5420d5f7ca02cdfc7b7912208150b9a33ddd284c,2024-07-03T02:04:50.817000 CVE-2024-37856,0,0,9302de460a4c7027c66921d13cd3a230b84232625cf00fe0e308c5a1ad11468a,2024-10-30T20:35:22.590000 CVE-2024-37857,0,0,bbbf66c5ae4e5b03452facf52d12302119ab17f8211a271346d66e2be4704782,2024-08-01T13:54:22.703000 @@ -257919,7 +257919,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8 CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000 -CVE-2024-39708,0,1,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000 +CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,8b5ceb8324ff1f59d883393f3c2fa903aaaabc7a64330bd1fe2b73aa3534e83b,2024-09-06T17:35:12.380000 CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b04745987c,2024-09-09T17:35:03.387000 @@ -258742,8 +258742,8 @@ CVE-2024-41143,0,0,e8899d473fa3a8ea11660d6f2ba88aff617e29347ef6b002447e4155241e1 CVE-2024-41144,0,0,a99ced5ff39791199789f8b7404cf70d5ada3bff5c6dc65a7803cc1121e905e5,2024-09-04T17:25:48.123000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-41150,0,0,f29e18c57230cbc3b76f00f0b7fe1001f55bb08bda82442884bf5072f9726b00,2024-08-27T14:35:09.013000 -CVE-2024-41153,0,1,dafb89be97200d81ac5d60fe35f2a445ceac861b85bb58f78c85df804ae27889,2024-10-31T14:37:48.533000 -CVE-2024-41156,0,1,c0093084afabf89304f87b01eeae3792e9c6bc73b0c168ddc8c792fe08c67a19,2024-10-31T14:49:39.800000 +CVE-2024-41153,0,0,dafb89be97200d81ac5d60fe35f2a445ceac861b85bb58f78c85df804ae27889,2024-10-31T14:37:48.533000 +CVE-2024-41156,0,0,c0093084afabf89304f87b01eeae3792e9c6bc73b0c168ddc8c792fe08c67a19,2024-10-31T14:49:39.800000 CVE-2024-41157,0,0,7a282611d45c2fbb6f2dc936e4617dedd23e7f4d2ca4cbf354d2844aba4fb55d,2024-09-04T16:30:40.737000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-41160,0,0,4405f1fa554ba7d9df44bc4bbb96ea93e068b229b76d85cd7934b300d79543d0,2024-09-09T12:21:53.383000 @@ -259260,7 +259260,7 @@ CVE-2024-42038,0,0,eb94dedf88ce1c88ce5bfbc4f90e50df94d98b05443b426e18ed40ec47c0c CVE-2024-42039,0,0,7c8969b8c7addbeea34acdb619551d58483846230427052a3b95bfac07270d18,2024-09-12T19:37:01.487000 CVE-2024-4204,0,0,862cae0d91d079678d989fc30b77e9abff361be6cebd83fcf5dbeecd5c0be203,2024-05-17T18:36:05.263000 CVE-2024-42040,0,0,0994275c2c474f352961ba40bdf13e3388778f56f566ec8d1d02a6ad8ef6691a,2024-08-23T16:18:28.547000 -CVE-2024-42041,0,0,d83cbb9aaa6f76c62437214077cda06da4047e9b91244abad56488139d97f345,2024-10-30T18:15:07.223000 +CVE-2024-42041,0,1,9c598e53b7ae4b91b3c6f0383ea7ce7b6a0ad08df9c0057a9be758e8995e8a19,2024-10-31T15:35:35.840000 CVE-2024-42049,0,0,9abf5139ab1afe8d55de5e333c97afa73e09c57ae34abc37f55eb8e975c40df6,2024-08-01T13:59:18.253000 CVE-2024-4205,0,0,3bc679c8856618cb4acfda15e793a18c79adc1e7d27d459136a04f77802a5775,2024-05-31T13:01:46.727000 CVE-2024-42050,0,0,d2a1e67e449aa6326dde0504a879c37570d5ac7e2fe0ffc282ef9a9581af71d3,2024-08-01T13:59:19.083000 @@ -259835,7 +259835,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95 CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000 CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000 CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000 -CVE-2024-42835,1,1,be8a15032d8b7e2767c06844b2c610cc3d4f02c091e6e878f9c0ddb188a4332c,2024-10-31T14:15:05.610000 +CVE-2024-42835,0,0,be8a15032d8b7e2767c06844b2c610cc3d4f02c091e6e878f9c0ddb188a4332c,2024-10-31T14:15:05.610000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000 @@ -260155,7 +260155,7 @@ CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202 CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000 CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000 CVE-2024-43381,0,0,cadf370b69704b630cecfb0fbe8ba07b198197e9a1164f2a1cf1bce7367f0908,2024-09-11T13:02:26.053000 -CVE-2024-43382,0,0,8694251f9b436a9396b2103d88dce4dfa242b33b19a6f2b630a0e20219b2a63c,2024-10-30T21:15:14.160000 +CVE-2024-43382,0,1,69bb0259c447ec45a97de54e2ebc230bc1fd8481e7c79e71a8e68a98dc5a0c5d,2024-10-31T15:35:36.610000 CVE-2024-43383,0,0,c0048cb1cc56a46ac04ad661b4237b2864c488f3c9da521dfcbc4eda502fdc1f,2024-10-31T10:15:04.293000 CVE-2024-43385,0,0,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000 CVE-2024-43386,0,0,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000 @@ -260407,7 +260407,7 @@ CVE-2024-43791,0,0,2bd2bc46ca8d9e06de5a015638de614e582ba6d4dc15a542dfa7ce0b054d1 CVE-2024-43792,0,0,5dfd532d611c334ef7463fb3ed0a1e3a14dcc1ccfb2dfd854fb0c34158bf7c9e,2024-09-16T16:26:18.063000 CVE-2024-43793,0,0,28f7d2c5a02a2888bcaeed49e9492d6763c121916beec115ab73cecaf6424a4a,2024-09-16T16:28:45.233000 CVE-2024-43794,0,0,012282e0e09ace65c9817dd3efc52ee0130360e07c8e8e9b08cf3adc91c29f00,2024-08-23T18:46:31.730000 -CVE-2024-43795,0,1,1eb397f1a4685be765f7216c060bf7d75e320a8df0ab172a3d0c57ebf1869276,2024-10-31T14:15:05.723000 +CVE-2024-43795,0,0,1eb397f1a4685be765f7216c060bf7d75e320a8df0ab172a3d0c57ebf1869276,2024-10-31T14:15:05.723000 CVE-2024-43796,0,0,7eab0f98e9cc4b529e67976e2e3e5108a50bbe0663aaa9206477dd6bf141453b,2024-09-20T16:07:47.997000 CVE-2024-43797,0,0,93bf50c44e46a55d09c378845b20b036c0751fae29a6426402d2fc53d3595af8,2024-09-13T19:49:33.803000 CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000 @@ -260783,7 +260783,7 @@ CVE-2024-44197,0,0,96a67bc53eb67814f0144909bf31b5b2b095c5319ef55687f42e9a0c6356d CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000 CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000 CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000 -CVE-2024-44203,0,1,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000 +CVE-2024-44203,0,0,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000 CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000 CVE-2024-44205,0,0,e33dfb139154886257e161081c01cc4f82c900563ff347637d97391b0de316f3,2024-10-29T15:27:08.630000 CVE-2024-44206,0,0,cce809798797c4f27f98da648a0cb34cc37e85900206791dd0f0bb97bf5465c4,2024-10-29T21:35:15.080000 @@ -261364,7 +261364,7 @@ CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4 CVE-2024-45297,0,0,425aa9a648c40d63948c8227ee90a6e20745753152216a548e199826ed46c572,2024-10-19T01:06:04.160000 CVE-2024-45298,0,0,3855d0d2f5eeba6af655c62306c41db8dfb0c660d64bc08f64547216bf276198,2024-09-20T12:30:17.483000 CVE-2024-45299,0,0,9c3c8396841ffa0041cd432be8da2038212f3a02e0878e8a646a9564573126e8,2024-09-30T12:48:22.930000 -CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 +CVE-2024-4530,0,1,2761c695ba977edcd395334d9ef59e1dd700d6cb9d0ca8639b3c73bde015fde7,2024-10-31T15:35:40.750000 CVE-2024-45300,0,0,27fd775164e57067a38ceabd2aa31d5b4a7f60dbeadc170d1b287ab3c44d3eb5,2024-09-29T00:08:14.363000 CVE-2024-45302,0,0,9c7190c10c27ef40d1c9209827dd8e45f9bb7da829c533438c3bcb25c5fb1108,2024-10-01T20:05:07.857000 CVE-2024-45303,0,0,0f2993ec35c2f5c69a86f92f14083da5a1f9682262497cdf98941162719918c3,2024-09-18T20:25:05.807000 @@ -261863,7 +261863,7 @@ CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 CVE-2024-46528,0,0,81f8583f4022a65d1ad9471b4717d45f3c83d5a174d4df1514139f8d90b90c3a,2024-10-22T19:35:08.350000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 -CVE-2024-46531,0,0,a184904a2c7dcb5fc7f01e91991fb827e0576cb649cc868475eab17324bcde32,2024-10-30T19:15:14.113000 +CVE-2024-46531,0,1,878a7e01df4c686cd7cdf931908bd2db34d00b16932fa7e72aa7bf69654762d4,2024-10-31T16:35:16.453000 CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000 CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000 CVE-2024-46538,0,0,dfc9741b1ceb0c2e645ed8952810cc1343c34577d0526c0ae91f23ea6649c3f5,2024-10-30T20:45:35.240000 @@ -262195,7 +262195,7 @@ CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816 CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000 CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000 CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000 -CVE-2024-46977,0,1,f40fb7d824bf80dc3cd6ed4824964dec6ba1fc6bbe8e124dca22142b9c8356e4,2024-10-31T14:15:05.870000 +CVE-2024-46977,0,0,f40fb7d824bf80dc3cd6ed4824964dec6ba1fc6bbe8e124dca22142b9c8356e4,2024-10-31T14:15:05.870000 CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3ef1,2024-09-20T12:30:17.483000 CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000 CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000 @@ -262544,7 +262544,7 @@ CVE-2024-47525,0,0,8339d8a4218b69cc82268cff155d0d4fed2713f73ada7785c822ea6568feb CVE-2024-47526,0,0,eb16a10d8f74cde3579603749ff3cfb381488e1ecf42d3c0633b2eaac9e4c5e1,2024-10-04T13:50:43.727000 CVE-2024-47527,0,0,6448adfc6fe781d292ba5a9887205495de1e6ae1fd7107635f3ac2f0d1da5da0,2024-10-07T19:08:41.467000 CVE-2024-47528,0,0,f8a40bc5f3a1abfe246d4cda70316c63fc753979863ed711468abfa611b23cd8,2024-10-04T13:50:43.727000 -CVE-2024-47529,0,1,31311b0fa29b7b41c64bdb815a27dee29e2a143468e05f041223859f38dd766c,2024-10-31T14:15:05.980000 +CVE-2024-47529,0,0,31311b0fa29b7b41c64bdb815a27dee29e2a143468e05f041223859f38dd766c,2024-10-31T14:15:05.980000 CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000 CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0c29,2024-10-04T13:51:25.567000 CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000 @@ -262852,13 +262852,13 @@ CVE-2024-47964,0,0,27bec73a2c0b899bfe6fd9ec81da4b9100f04cbc9375a6fcf7ce2251e7877 CVE-2024-47965,0,0,f3e570fde495e0ba110bc62b328022dd6ec82c923d79b077bc2509e9e6dad0ab,2024-10-17T14:36:54.353000 CVE-2024-47966,0,0,48de3a5cb5e680eb92b755d3c4d9642426c8812a20434d6c33a3c9f7a2c10b93,2024-10-17T14:36:15.057000 CVE-2024-47967,0,0,148db097bc94b263302a99970c2cc0afadc291afc172aa4c4074880ce53625ae,2024-10-18T17:15:13.133000 -CVE-2024-47968,0,1,7e915c4ce8b4cc184858ffd5de47da321d6409bef5e0e59e44252c5892ef10bd,2024-10-31T13:35:11.047000 +CVE-2024-47968,0,0,7e915c4ce8b4cc184858ffd5de47da321d6409bef5e0e59e44252c5892ef10bd,2024-10-31T13:35:11.047000 CVE-2024-47969,0,0,cca9607f354104b423066ece0dc4ef5cb988716d253447be49d5f3344fccc48a,2024-10-10T12:57:21.987000 CVE-2024-4797,0,0,0e4696a184ba6dbc49929e4ce9c47a26c4e841b1ccb4a5975e3c36e38faab420,2024-05-17T02:40:37.683000 CVE-2024-47971,0,0,534d5d54d79d2918bba754e46b72e551e8a383f4547c31054409d42c679203f5,2024-10-10T12:57:21.987000 CVE-2024-47972,0,0,e9b35fd24d99baa059963425b162ad00cc0a462f2ffbc38c3c5c9d106848940f,2024-10-17T22:15:03.113000 CVE-2024-47973,0,0,3a0aa017e97ae06d1cf3d1bc086b0dc9ef048219777341e2d17989996ce6923a,2024-10-10T12:57:21.987000 -CVE-2024-47974,0,1,cbdc8a9a2e83552d2f94c63a65f1c8a65099c8459c544321dce3d0dd12f5f7b2,2024-10-31T13:35:11.790000 +CVE-2024-47974,0,0,cbdc8a9a2e83552d2f94c63a65f1c8a65099c8459c544321dce3d0dd12f5f7b2,2024-10-31T13:35:11.790000 CVE-2024-47975,0,0,f2fcfe13d795ec593199978d9bd2ccef6b74c32b8404475a2a1a928dd974eded,2024-10-11T20:15:05.143000 CVE-2024-47976,0,0,a72eec2fad6d99c6f2545eb3ceeea90e4e1aac1ad9db1adc6f42139b98b981fa,2024-10-17T22:15:03.210000 CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e0106e,2024-06-04T19:20:49.813000 @@ -262903,11 +262903,11 @@ CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 -CVE-2024-48093,0,0,3a7987a92b4bbcd1b7c1a073011bdf20dd6c9421d9d62098928a3b1fee1c0fb3,2024-10-30T21:15:14.337000 +CVE-2024-48093,0,1,5355adce4a10da211a08d3d6118090574c30dbc48765543d5e8f54b60c67bdf4,2024-10-31T15:35:37.423000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 CVE-2024-48107,0,0,c40d4300b831a33464aba579f0b2928bc6562dbbd091bed8c83ce565b9877e14,2024-10-30T17:35:10.860000 -CVE-2024-4811,0,1,edf02d3d2820d3eb4d79512dbe6202ba3ad4c52de06ce4f4dc329075ef4f69f3,2024-10-31T14:35:19.917000 -CVE-2024-48112,0,1,b99393ccbe63d75e4cc268eae784380b2239c4159470317e34354a4c2c1781ea,2024-10-31T14:35:19.053000 +CVE-2024-4811,0,0,edf02d3d2820d3eb4d79512dbe6202ba3ad4c52de06ce4f4dc329075ef4f69f3,2024-10-31T14:35:19.917000 +CVE-2024-48112,0,0,b99393ccbe63d75e4cc268eae784380b2239c4159470317e34354a4c2c1781ea,2024-10-31T14:35:19.053000 CVE-2024-48119,0,0,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 CVE-2024-48120,0,0,ac048d30db75e88feb91392efffb6e9bab5a19e9dc21f5cdbbca8a6a240da1c5,2024-10-29T20:57:53.360000 @@ -262937,25 +262937,25 @@ CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168 CVE-2024-48195,0,0,624eed9854f46ef9dafc813bcbfebca0bf2ab48de4eb64a4aa5f0a1ddeec9a89,2024-10-30T18:35:14.433000 CVE-2024-48196,0,0,06085a08add8a4f4e1622d4b148953be486d5c8e3772fc9fb5febed91d95829e,2024-10-30T18:35:15.220000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 -CVE-2024-48202,0,0,01ec2a960c5ed7b314b43c9635893e222b88f77ab05491227615dcd639746420,2024-10-30T19:15:14.200000 +CVE-2024-48202,0,1,6a991d4260ecb620082a50303e3e09368ecc201c8b57a4ee048562622acb1335,2024-10-31T15:35:38.390000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 CVE-2024-48206,0,0,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000 CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 -CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000 -CVE-2024-48214,0,0,545337ba91d9e48fe5a14a91b3e479f2b07f65d57894410b810073acc8b06a4f,2024-10-30T18:15:07.420000 -CVE-2024-48218,0,0,4df2a1737bc3ceef8118ffc8f43bf6e7bfd49691ee8956737c4244a24a4c0e36,2024-10-29T18:35:08.783000 +CVE-2024-48213,0,1,ccaf1cd995763b75b91925aad52e11931ffbdc04bb0bbcd851bc9880efe681d9,2024-10-31T15:09:20.730000 +CVE-2024-48214,0,1,78cdef8b5cf77a590137f1180c767a14d73d8882d8f7bf7b4722d04546484757,2024-10-31T16:35:17.260000 +CVE-2024-48218,0,1,4b803b4002b5edc5abb8b754e173e0e42c64b19814d1d2b7448b5a518c468f92,2024-10-31T15:44:18.777000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 -CVE-2024-48222,0,0,97fd76ae3dd28f1e5888fec68e340e9e5e41841170d874971e984dd4b28f68c5,2024-10-29T18:35:10.053000 -CVE-2024-48223,0,0,a9b041f56d6046d662d47741900d11180ff109d214fa15a9b38fe6f39c8abe71,2024-10-29T18:35:11.373000 -CVE-2024-48224,0,0,c634fb714a989ce5fdfe470e52e395775fab9b0ab26c37c53b870c4afe668500,2024-10-29T18:35:12.697000 -CVE-2024-48225,0,0,a8831170e3eda9980baee63e48cc804c9b2092188511bc7b12f356f931e0b4b8,2024-10-28T21:35:18.743000 -CVE-2024-48226,0,0,4cb662eb4f15899ccf7a0dbcb626d5a6b1f5cd6d5d2bcdd68aafd729b2a4945d,2024-10-28T21:35:19.080000 -CVE-2024-48227,0,0,d2fa684dbc5ea7a1fe7a4ea371675722e3492c6e4916e182a238767c00f4362b,2024-10-28T21:35:20.360000 +CVE-2024-48222,0,1,d3ace986c7defc25fde2606da008a1a682b072a0252b8970d36668d6aab75cdc,2024-10-31T15:44:22.123000 +CVE-2024-48223,0,1,ede6151653ec4036db59a4b8376e1c399ad2c4d930662bdd2bfdb1fb1f7a80b2,2024-10-31T15:44:25.177000 +CVE-2024-48224,0,1,70760ad56046c4d23df6eb1d6705a68ee7308b36f42610fcccbe238619f31a45,2024-10-31T15:32:45.133000 +CVE-2024-48225,0,1,1272d8e6de29bdbe3031987acba678599d522c199ea0dce4b7a9e5fe8ef6196c,2024-10-31T15:35:46.407000 +CVE-2024-48226,0,1,f5935669ef1287efef3607f6598630f2f37f68dac896432e16f011e6a28c1f12,2024-10-31T15:38:32.917000 +CVE-2024-48227,0,1,a4275943a9bbbf7b12920323b3a5cbb6835d6c5bd1ea8baecfe97d32f3131d72,2024-10-31T15:48:19.927000 CVE-2024-48228,0,0,1c4d77fabacb4a82899495e465bceea2a6892f50bf763c9498fd122637b260f8,2024-10-28T20:35:19.150000 -CVE-2024-48229,0,0,ba711c210693708167a8c53be4267f56390c6754bac54b0389ca08d4205cf02c,2024-10-28T20:35:19.940000 +CVE-2024-48229,0,1,c034dac056fe316e898e0e12aabd510a4c4e7b0f910ac0f1e3183eb239af7f2a,2024-10-31T15:49:11.533000 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 -CVE-2024-48230,0,0,07e07a763d45296ea9f758120b7e045d4db9e8f15abf026e375b470c1a3f3b59,2024-10-28T20:35:20.727000 +CVE-2024-48230,0,1,fd569f1c227395142830dc48ede080b764a75bcbfa62596aaf8cdd88a155dd80,2024-10-31T15:57:23.693000 CVE-2024-48231,0,0,937449141a6aa1a64ac6ee0f623969ee8c2a56a4e76a3e216a9b1fafdd881546,2024-10-21T19:35:06.217000 CVE-2024-48232,0,0,55b3d875fb2079a43d88dbfcab6e65c9a2a11ed364000ed48670de5e42022263,2024-10-30T19:35:26.257000 CVE-2024-48233,0,0,5079087488de765c44b2e5efadc3adcfed6b8eb841374ab16026cf622181f848,2024-10-30T19:35:27.360000 @@ -262966,7 +262966,7 @@ CVE-2024-48237,0,0,f3d3944c7915cd53a5149061b05fd23c13ecbc6a88f801480d775419cbc2f CVE-2024-48238,0,0,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000 CVE-2024-48239,0,0,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 -CVE-2024-48241,0,0,7c567e5e4359fa3a6a2946531b46e62f29d10096d5832e934f7e07203f224751,2024-10-30T18:15:07.490000 +CVE-2024-48241,0,1,aacc600ef815beb74a707c3fa236751d2254139cc7c91a3d9b7aac729eef4b6e,2024-10-31T15:35:39.163000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 CVE-2024-48251,0,0,d31074b7bd4badb1c138e8ee894c9698881e0c5446022316d3777a7df111e058,2024-10-17T18:35:12.280000 @@ -262976,8 +262976,8 @@ CVE-2024-48257,0,0,cde7b8837142e8c81fa5cdd04cd1a286ad8050551e4a13ecd4d16d52e71f8 CVE-2024-48259,0,0,05be91466999f287d7c34a7b188d482630d814bc65ce325c3824838e8ad22bcc,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 -CVE-2024-48271,0,0,0d582178d3148fdc1d08dfe90c25889551033547d2a75e2089be70646895f0f1,2024-10-30T20:15:04.553000 -CVE-2024-48272,0,0,dce653cb128f949de3a7330df987c2acc585696d6b1ac9720c64b40429985908,2024-10-30T20:15:04.620000 +CVE-2024-48271,0,1,1f888af0fe10438ec47a242ce9fd16a02912365e415ea23c0f0ffd3f5c6eb91a,2024-10-31T16:35:18.043000 +CVE-2024-48272,0,1,be1e171db2123b60b541ab0d8a703adde1bb634510b908044cddbcc264a3e1d3,2024-10-31T16:35:19.107000 CVE-2024-48278,0,0,2d230a37c6a5ea93411d7a1b4293f4f461a087e46c8a9a4eaba61f8eeb3339e7,2024-10-16T16:38:43.170000 CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737e13,2024-10-16T16:38:43.170000 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 @@ -262985,7 +262985,7 @@ CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 CVE-2024-48307,0,0,df3a00e7bacafe2786ff0786147fc98c044a5f54c62a06ecd6885c5296cde834,2024-10-31T01:15:14.803000 -CVE-2024-48311,0,0,f8315d3fcfeb51f8d634590cfad7c9156e5f3a43334fac5e1e306e6acb4b1d2f,2024-10-31T02:15:04.003000 +CVE-2024-48311,0,1,d7c0370dd0b10cfc270efb9e368b85a66e3d825eb9e86a9a918e49a33499f4e2,2024-10-31T16:35:19.993000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 CVE-2024-48346,0,0,e9ae7cc0b0e1a356f05a97d8deeb8d9dc84f4c9c61fc4af7c52397b9719f02d9,2024-10-30T21:15:14.450000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 @@ -263136,7 +263136,7 @@ CVE-2024-48796,0,0,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda79b,2024-10-15T15:35:21.060000 CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000 -CVE-2024-48807,0,0,0943f1af2d0de8487baeed4d9a08b34f665bc3ff9b26abda393a9f5cb45cdda1,2024-10-30T21:15:14.680000 +CVE-2024-48807,0,1,300764b96823e0f840d30e92768793ba9fbd15ee4d35e3420f8875c90597d071,2024-10-31T15:35:39.950000 CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000 CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 @@ -263161,6 +263161,7 @@ CVE-2024-48903,0,0,af1ee698040ee7f8c19b83dd0eb3404cde07c42231b0e3832a1aa5561c101 CVE-2024-48904,0,0,56bc56ed1722c08287266703a07bddbd88211e3eebee5fa1d299ad65c198bf37,2024-10-23T15:12:34.673000 CVE-2024-48909,0,0,67804b300a72fc34a54a9327f0b3a7a8082afb16b0051c28b942604285939f48,2024-10-17T17:56:11.130000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 +CVE-2024-48910,1,1,a527611b146188896bde75e2d8a72688f718e23b50b3f8fdb5a31b4ef66d5770,2024-10-31T15:15:15.720000 CVE-2024-48911,0,0,f147f0790cf653449e8f662255582c7c922d3f40a3d15e4b98d08b1e5fd9c969,2024-10-17T21:13:37.147000 CVE-2024-48913,0,0,06d6a212c655b7ac1bbc6f5a3509e81cf89d4f1d83017b87d6e9303af3084bb1,2024-10-16T16:38:43.170000 CVE-2024-48914,0,0,8775ce8f63d45f4e21be0399438c25117df9f166b6335c0adfec50056398fb57,2024-10-16T16:38:43.170000 @@ -263436,16 +263437,16 @@ CVE-2024-49629,0,0,60f0852b23beb1819b5458d406150de82aa310255dbbddedffa202b89c290 CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000 CVE-2024-49630,0,0,34d75746c00996da3a49f93eed6bc8a4f3be9da6c45cb9f15692d41526269ce7,2024-10-23T20:44:41.857000 CVE-2024-49631,0,0,5230732de6a35313190c213cb431a622620f306560265c0ab55df925f02e4a2a,2024-10-24T14:12:59.600000 -CVE-2024-49632,0,0,b6aa910a6238793d01d711b67c611605efa05142f4f99d683b1ce55d6a3eae5d,2024-10-29T14:34:04.427000 -CVE-2024-49634,0,0,de32cef9ec4be91fae2af05a390224a872c2af3d4660f72a891aa49fb4d4c85b,2024-10-29T14:34:04.427000 -CVE-2024-49635,0,0,956efdcd813edd8b0c50992e432c2791dae865785bdc2e31ed9219302f43b26d,2024-10-29T14:34:04.427000 -CVE-2024-49636,0,1,255fdd04384bf8ca2562d97a4c5e177b4e9b4aac97c2ca451b2afae414b394c3,2024-10-31T14:51:06.170000 -CVE-2024-49637,0,1,e01c6345fd816ce1767b0513889e9638b57f60a23829522448e5341cbe17e0fa,2024-10-31T14:52:42.927000 -CVE-2024-49638,0,0,d01827d0ee488b9070f09ced5eb1c69a68c899bea097d695348d27feae15ba2f,2024-10-29T14:34:04.427000 -CVE-2024-49639,0,0,1eeafd0406a64062b1bfa5d7382f0a0e30de4a38ffa7fec244a4d5f8a12a5359,2024-10-29T14:34:04.427000 +CVE-2024-49632,0,1,2c67c3ba0ba2b9651513795c4ea5f240593c8590211ea66029eef5d23edc7a49,2024-10-31T16:31:51.467000 +CVE-2024-49634,0,1,db65d81935e1f29e44e1135ea88e3580375dd56ed1e281b38edfd03a9353440f,2024-10-31T16:30:35.667000 +CVE-2024-49635,0,1,bbed47e82079c50ee70fa83fad007afc3e7c93c897b13173a99a2633f8d1be23,2024-10-31T15:27:24.033000 +CVE-2024-49636,0,0,255fdd04384bf8ca2562d97a4c5e177b4e9b4aac97c2ca451b2afae414b394c3,2024-10-31T14:51:06.170000 +CVE-2024-49637,0,0,e01c6345fd816ce1767b0513889e9638b57f60a23829522448e5341cbe17e0fa,2024-10-31T14:52:42.927000 +CVE-2024-49638,0,1,6ee511cbe98922861603feaa2fa6875e1c3bee74c7553cc8bbf8e3c0ff995afd,2024-10-31T15:56:45.253000 +CVE-2024-49639,0,1,82ffeb5e3fd995175985b5782e7cbdd12a8ec35a00cfaffe6c965dcdb2a644e2,2024-10-31T15:58:48.317000 CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000 -CVE-2024-49640,0,0,15b8429bfc6b07e3359aecb2089ebf7e02496d8842e0b2634f6ac0caf135c572,2024-10-29T14:34:04.427000 -CVE-2024-49641,0,0,b281893547c51d112e722ba7b5f0cb5a0d41921321f08527e7e9885a3f846a0c,2024-10-29T14:34:04.427000 +CVE-2024-49640,0,1,becbe9cd8e4562101ae9f0fd4aeb9f5d80e9d81b9046f0c79b66a78a4ae5a7e8,2024-10-31T16:04:01.113000 +CVE-2024-49641,0,1,0c76c83cf503f374bc615797049759b6f98944a9c823b145687554c637514560,2024-10-31T16:05:44.353000 CVE-2024-49642,0,0,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000 CVE-2024-49643,0,0,fe1ed03525bdcff2f5736c096712681532b386cf4e119c9eaa196cfab5e8ff58,2024-10-29T14:34:04.427000 CVE-2024-49645,0,0,fbc7fb365d72db2b32d09d4bc36811ca2875e91a7b163c8ae6bcdfeef6df51d2,2024-10-29T14:34:04.427000 @@ -263661,7 +263662,7 @@ CVE-2024-49977,0,0,1fa968b4b6ffe89f61827f270e7cc697b9e8aa1241eadd73e01f50d4c563e CVE-2024-49978,0,0,f3d61134b9c5d10fd2ab4e39b19ef4b5767227435be40207fd8a06c0cd6a1116,2024-10-29T18:01:43.080000 CVE-2024-49979,0,0,f8baa0b1d12557a520a3d58ee95542c5e5816ff4eafb95d3e16fe1836897fae6,2024-10-29T18:02:14.197000 CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000 -CVE-2024-49980,0,1,01da24b6adba0cc33e730063ad71da50f820538725b0e9d8f1aff7847a16b187,2024-10-31T14:58:27.613000 +CVE-2024-49980,0,0,01da24b6adba0cc33e730063ad71da50f820538725b0e9d8f1aff7847a16b187,2024-10-31T14:58:27.613000 CVE-2024-49981,0,0,be8906564b57b0b9a043fe42c3d38b8548c4c2cbb0858120a7fa2fad8e2b8ee7,2024-10-25T14:56:40.073000 CVE-2024-49982,0,0,1ae51728dfad6dc77da9a9af15e226c1ee61eeb30c84012b23419f82a91617a3,2024-10-25T15:08:03.790000 CVE-2024-49983,0,0,9274e8e7a27d798fd4c38e26ef366e23490e6efa1ece0fb652aec8a9e521a033,2024-10-29T16:23:31.943000 @@ -263805,6 +263806,7 @@ CVE-2024-50344,0,0,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5 CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000 +CVE-2024-50354,1,1,1f20ca590c38e43a7f364e4a76d630df65540096d85e4f8894633db095556fa8,2024-10-31T16:15:05.763000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 @@ -263886,17 +263888,17 @@ CVE-2024-50475,0,0,36f0716dcab36685f56e76af410832e5c6a209caa40371aa54bc3fa36e47c CVE-2024-50476,0,0,03d0282cf6fe1ea02e5a0236d992f96a633bb2360c708089005fbef43f31b2f1,2024-10-29T14:34:04.427000 CVE-2024-50477,0,0,1eb2d0ec96fdf2e84fa349e4821a23717cbd3586359498a97ff2ce76b3c3b98c,2024-10-31T00:24:28.160000 CVE-2024-50478,0,0,5004f952218ac00d59752232714de2cfa65ca0b36f3a44b13e8a91d54761ed2a,2024-10-31T01:44:47.407000 -CVE-2024-50479,0,1,7162c3be7774651a0d6aefe442c76146159aeea124befdbc0802a814f3f54e70,2024-10-31T13:02:20.793000 +CVE-2024-50479,0,0,7162c3be7774651a0d6aefe442c76146159aeea124befdbc0802a814f3f54e70,2024-10-31T13:02:20.793000 CVE-2024-5048,0,0,1988e01de8a973c004f1ed34b391d1facc45cbb912e138052c0f7d6310398087,2024-06-04T19:20:57.353000 CVE-2024-50480,0,0,9c6e44b2ad8cf235f8be06fa94bbc4d18226aff4b3790f429ce6a0c7315d34ce,2024-10-29T14:34:04.427000 CVE-2024-50481,0,0,5405cf2423a54dd83747cd2bd6fe4fee0c2c27112bd62081838b851d73fdc674,2024-10-29T14:34:04.427000 CVE-2024-50482,0,0,4c46db4544a2adb3c3153011ed323f9f2e4e58f44e74fcdad316d5a91a78a6b5,2024-10-29T14:34:04.427000 -CVE-2024-50483,0,1,7937b37074fa5a3b3b31b683f826eca8d5f5f9009eb2515563ff23d6802ab280,2024-10-31T13:12:11.813000 +CVE-2024-50483,0,0,7937b37074fa5a3b3b31b683f826eca8d5f5f9009eb2515563ff23d6802ab280,2024-10-31T13:12:11.813000 CVE-2024-50484,0,0,fb5831468b35cba53c55a495474b64b7a8b6ec35859af8dabef2b71806e20ffa,2024-10-29T14:34:04.427000 CVE-2024-50485,0,0,9ed12dd296d38fb6cbdb7c8752c66128ce6bd15ef5deace517d3530a40748c87,2024-10-29T14:34:04.427000 CVE-2024-50486,0,0,2469de3018a70da3d3ba9f22de0bba39364400ac5239e2e8af62e693ee3e1607,2024-10-29T16:07:03.833000 CVE-2024-50487,0,0,44b8467c1e55727f7935d9f24cdee5667d7a113233aebc17eeecc3d83f2f2ef5,2024-10-31T00:17:48.153000 -CVE-2024-50488,0,1,92b5881a6f09aa9100cab7be6bd104b49f594c60708054bde44c913395051e13,2024-10-31T13:19:42.087000 +CVE-2024-50488,0,0,92b5881a6f09aa9100cab7be6bd104b49f594c60708054bde44c913395051e13,2024-10-31T13:19:42.087000 CVE-2024-50489,0,0,052390e832091de8b4e86a61a6aab7bbd00e0054fa2778c6e9529e093b8eee4d,2024-10-31T00:16:07.977000 CVE-2024-5049,0,0,5a3f3841afc31b2308320d9a79229ff3b2e78886b62ff0b6a021008032b5bd1d,2024-05-17T18:35:35.070000 CVE-2024-50490,0,0,df5308d43aea0811e64f7f34c1741602a9a3be24440d41ba19ac9b091f537e4b,2024-10-29T14:34:04.427000 @@ -263906,11 +263908,11 @@ CVE-2024-50493,0,0,1b86e41beced3d67b90f334d27db11237a706dc3447bbfcf4216e988a60b9 CVE-2024-50494,0,0,9569aa1d34f7229fbd2091c58d08802086f733f20697c3538e6874d12444dba9,2024-10-29T14:34:04.427000 CVE-2024-50495,0,0,dbb01d9e1ce3a0d2a398c602b6c55fb03dd093568dcc101086f2d71c70104b40,2024-10-29T14:34:04.427000 CVE-2024-50496,0,0,8759135a902bd5e1d547f7a30947e1e84eb491a378f48e131323791258ffeb16,2024-10-29T14:34:04.427000 -CVE-2024-50497,0,1,1dbbcb1307a2bd22e56a95aa07cf54debd2e092e146c406bfc7f1289bd2f8b66,2024-10-31T13:55:14.493000 +CVE-2024-50497,0,0,1dbbcb1307a2bd22e56a95aa07cf54debd2e092e146c406bfc7f1289bd2f8b66,2024-10-31T13:55:14.493000 CVE-2024-50498,0,0,33bc7bd73e04ec5df59dd34db418e6cd48c39a64b196d0dbfa582dde1e112356,2024-10-31T01:16:41.317000 CVE-2024-5050,0,0,619081545361528557d824107c37f32918188d04adf33ba524a4859e2e6341a3,2024-06-04T19:20:57.457000 -CVE-2024-50501,0,1,9730280cc1123cc5def2850ac443e575973aeb1d6cf344927e14d300de189cc9,2024-10-31T13:51:19.780000 -CVE-2024-50502,0,1,9ddcb622b0ed4b183c8b5d25d4afba00562ea225fa79fd5c791293fd23c03b19,2024-10-31T13:43:03.177000 +CVE-2024-50501,0,0,9730280cc1123cc5def2850ac443e575973aeb1d6cf344927e14d300de189cc9,2024-10-31T13:51:19.780000 +CVE-2024-50502,0,0,9ddcb622b0ed4b183c8b5d25d4afba00562ea225fa79fd5c791293fd23c03b19,2024-10-31T13:43:03.177000 CVE-2024-50503,0,0,13c77bbea684ac03d6c9bb023e29846b9a7ca81d92cfeb2c350eb96545279306,2024-10-30T08:15:02.813000 CVE-2024-50504,0,0,64e9ff9f208d92ea57b05e1aa61760bf3f7128f163c70b67451830c2c24c1ee2,2024-10-30T08:15:03.077000 CVE-2024-50506,0,0,9ed5dec08bae9cc3d4b760cfa2f2e993be26ea625e5a3d4e0a6ef704f5e10724,2024-10-30T08:15:03.323000 @@ -264014,13 +264016,15 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed4992761,2024-10-17T18:32:52.030000 -CVE-2024-51242,0,0,b4007dc67a4099908026fdd6fb5ef79aa0425c2418a8020d0d34e562fd33b09f,2024-10-30T21:15:14.793000 -CVE-2024-51243,0,0,e1b6753c3b95e40f2954963da9a99f9796281537891caa48bb3073e17240b4a3,2024-10-30T21:15:14.860000 -CVE-2024-51254,1,1,44e30a8302347264ab083b91f41f464ee9745a1574099dc7491e6ede61a22b42,2024-10-31T14:15:06.140000 +CVE-2024-51242,0,1,12f705da9022a8e38ebd9ee7e7e6ac01dfd058f24c1a03edec744b643eba3520,2024-10-31T16:35:20.873000 +CVE-2024-51243,0,1,800270ed7103621b26b8eae536fb3a8968dff426a0791be494e93fac6c2df32a,2024-10-31T15:35:40.967000 +CVE-2024-51254,0,1,f20ab585f3fe372c65595856805921bb8d2b22af7824679356ebca594f108d37,2024-10-31T15:35:41.800000 +CVE-2024-51255,1,1,e1cbafeb091e663b926de7b59cdcd9a21fea2bea834bdd892b0fb1b83916d910,2024-10-31T16:15:06.033000 CVE-2024-51257,0,0,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000 CVE-2024-51258,0,0,8552984991114543bb72db401d789b000ecda7ab1e49c15b21f3ab9c1d4b407b,2024-10-30T18:35:17.040000 -CVE-2024-51259,1,1,6d702cbaf70c10cfdda0a7abce448d3145a25d2256f8a60137d2335418de4f22,2024-10-31T14:15:06.260000 +CVE-2024-51259,0,0,6d702cbaf70c10cfdda0a7abce448d3145a25d2256f8a60137d2335418de4f22,2024-10-31T14:15:06.260000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 +CVE-2024-51260,1,1,671bfb7984aca048f642929131c3bdfc6798158fd3f798eefbd06d5d50e126ba,2024-10-31T16:15:06.113000 CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000 CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000 CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000 @@ -264041,13 +264045,13 @@ CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd CVE-2024-51378,0,0,f6b847436d6454318a22bddb787fe79bac14b8796ff39c09e4001e54682664f0,2024-10-30T15:35:23.600000 CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 -CVE-2024-51419,0,0,709d9559c95987c590da7cc9f070a7a987f260abcb5551f3f9d84e317106af27,2024-10-30T21:15:14.913000 +CVE-2024-51419,0,1,f2bde5a2b16d5461a757a11654dd9683461b76fa6cebc43eb41c4882c16408c4,2024-10-31T15:35:42.590000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 -CVE-2024-51424,0,0,e5a2bc9f454aa82143ea24af5bc974ac296f85091a9e88f983e49ce1d3c0b56f,2024-10-30T21:15:14.973000 -CVE-2024-51425,0,0,bccecd17bd0e77491c9fbc250a91a7a5775715c3aee25bf7fdfd490d8f07e81e,2024-10-30T21:15:15.027000 -CVE-2024-51426,0,0,c06666df064f1199cc478e793630532549acaeac1a97283437613ff7c6e82454,2024-10-30T21:15:15.083000 -CVE-2024-51427,0,0,dea05743b850cb5284d844c3097eb59c4e2718341ad7b15b6e4ee53f38e6ddc2,2024-10-30T21:15:15.147000 -CVE-2024-5143,0,0,e21a987518c06589a6da36e0d35257f005aa787fff502677dfeaefae4b228c17,2024-05-24T01:15:30.977000 +CVE-2024-51424,0,1,2316737ebdeb7c3600cea83652a5e9f46db8a616640d2d08a07bccc51b0ca59f,2024-10-31T16:35:21.660000 +CVE-2024-51425,0,1,833bdc625e1a738ada7ad7d5f55c83a7b1c7a93226be1681295fc3cb6fe3b978,2024-10-31T16:35:22.463000 +CVE-2024-51426,0,1,e6101206ecf4337bb6318e551c0f2f3f51553eecbb2541547a51b5d27151fe70,2024-10-31T15:35:43.373000 +CVE-2024-51427,0,1,fcfe3e7677db4a7b336b2247c857e7519564993e67b9bed1d6a6e1e171a8c15f,2024-10-31T15:35:44.180000 +CVE-2024-5143,0,1,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000 CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000 @@ -264384,7 +264388,7 @@ CVE-2024-5494,0,0,873b32b5a8631a7cfafda5ef05f4cca30f0a687443c321eec260009bcbcc90 CVE-2024-5495,0,0,f56c48f5bcd456da60fe32b92184eb68647a5d9733dc6b79e3edcb3de5d2dbfe,2024-08-01T13:59:50.400000 CVE-2024-5496,0,0,df1432449d01998c3afe7dd375c469d734075268fe0daa88ef4698d508149d6e,2024-07-03T02:09:00.193000 CVE-2024-5497,0,0,f8911b8845bbbfa95a7832f1617866f45a83c965f344f6e4c9cf922533c51dcb,2024-07-03T02:09:01.003000 -CVE-2024-5498,0,0,249bc82e919537483fbbd7e36f7610746bc1d1c9ddc202b4c423e6c0b454fd61,2024-06-10T17:16:34.980000 +CVE-2024-5498,0,1,5017535bd719bea75a4a2214ffb84ae00539f69b5806726015fb04d9ca64dca2,2024-10-31T15:35:45.733000 CVE-2024-5499,0,0,35dd9c6b1c2542f41b348af6ab7b219dd2f92d9ae3c52132e0b08b696c15d780,2024-07-03T02:09:01.860000 CVE-2024-5500,0,0,08dbbebab53ed3353be996009fd4c1da58d2bb9845253d44287e5f1fec38cdbb,2024-08-01T13:59:52.040000 CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345a3,2024-06-03T14:46:24.250000 @@ -266039,7 +266043,7 @@ CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4 CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000 CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000 CVE-2024-7472,0,0,1915bf4a426a37e46e592b133c645563f3fd303e31151501720f3e9bed750db8,2024-10-29T14:34:04.427000 -CVE-2024-7473,0,0,9d07607226699ccf0acd9f494035f0dc8e05b8c8f6ea397eba5f7678020a2147,2024-10-29T14:34:04.427000 +CVE-2024-7473,0,1,20168a95c050c826b36808d062806e3ad8c89fac510d32acafd85084e3f5514a,2024-10-31T15:11:45.557000 CVE-2024-7474,0,0,fd603ba5192c32c81661db241a24a16d96938f0a539e4ad024748791a7268266,2024-10-29T14:35:21.207000 CVE-2024-7475,0,0,2b037db3837162a776e57f7b2c7175870a05e0cd0e7064c84fd1c023e8b92b59,2024-10-29T14:35:21.403000 CVE-2024-7477,0,0,b965ae55657c73e31f78218a320569adb7f93e50d4b13da2aa9ac96583a28b42,2024-09-11T15:03:06.637000 @@ -266285,14 +266289,14 @@ CVE-2024-7763,0,0,18f4a84296d159e45e10b504f50d280ed71a4f30d1c38b23b2a54be7a715c7 CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000 CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000 CVE-2024-7772,0,0,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000 -CVE-2024-7774,0,0,3070a44c277e1333f0d2427da259897acbab258510f6f047fc960459be5c30e9,2024-10-29T14:34:04.427000 +CVE-2024-7774,0,1,46326b9bac829c392c99cab488ded866f8dd21a7289b506097eedd4c813ccf89,2024-10-31T15:39:04.510000 CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000 CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000 CVE-2024-7778,0,0,2fe0c9b8600c103dc69d73ebe792b6f5d96c6eaccbc88de74e66c7097ae3a047,2024-09-26T22:22:04.053000 CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000 CVE-2024-7781,0,0,195406e4d26756061eec11348aa250b24d79fc541f740fe89b1afbbb454c19eb,2024-10-02T16:21:03.113000 CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000 -CVE-2024-7783,0,0,daa273ed833d4bd306655d31b756f6dc53d7a862dd88feb2d4839be026c12aa6,2024-10-29T14:34:04.427000 +CVE-2024-7783,0,1,39c8808c8c931a81ab6f36457422df672bce6f594a7e28cbb717d3fa5f5b7d4e,2024-10-31T15:49:02.870000 CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000 CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000 CVE-2024-7786,0,0,fc116ee7a384561ad006648b89134c44e9184040e8b317407aecf4e96010cf80,2024-10-07T17:46:08.943000 @@ -266441,7 +266445,7 @@ CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 CVE-2024-7960,0,0,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000 CVE-2024-7961,0,0,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000 -CVE-2024-7962,0,0,582658592d187b202de2d11d01b70d2fae80e8abf3cb2975e04203cb3deaa696,2024-10-29T14:34:04.427000 +CVE-2024-7962,0,1,013f814ddc295e67c2a213973bd41a98a0675a4be6406655799997a3ee6aaa0a,2024-10-31T16:14:52.337000 CVE-2024-7963,0,0,5d9d56257af0c8a46d80addfe5060ee179dc9f0bcbd8087ed3e38a0505c107e7,2024-10-10T12:51:56.987000 CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000 CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000 @@ -266478,7 +266482,7 @@ CVE-2024-8006,0,0,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db CVE-2024-8007,0,0,31efab1ff2bdd67996604f02ecd2084f262495a161d3f96e0300d65972c02a8d,2024-09-23T17:15:13.813000 CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000 CVE-2024-8012,0,0,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000 -CVE-2024-8013,0,1,9be8d9fe1b092d48efc45b77584d7cef4ac4b750dd4ded7fd64e3d7634f2a9dd,2024-10-31T13:33:03.953000 +CVE-2024-8013,0,0,9be8d9fe1b092d48efc45b77584d7cef4ac4b750dd4ded7fd64e3d7634f2a9dd,2024-10-31T13:33:03.953000 CVE-2024-8014,0,0,df95f93b033a08a5d0d50b2c821a302b2eb801899f165ddc91a99907822a3901,2024-10-15T14:54:09.580000 CVE-2024-8015,0,0,6f5d063f2a73fa89cddbc983a389019b58f4aaccd5653d67706fe48a0cb636ff,2024-10-15T14:55:12.340000 CVE-2024-8016,0,0,2657510d64afe84d5852969b1e9344475f01e752907a5430dff930bc1f486129,2024-09-03T14:51:16.470000 @@ -266564,7 +266568,7 @@ CVE-2024-8139,0,0,30a28567f99fee6c1c6f825267497f95b5b28ab0436eee99757c8433aaff2e CVE-2024-8140,0,0,5905102d90fa9e01c1c294a1e12efca1eb0a1890a608c263dfef788228e71855,2024-08-26T19:09:52.653000 CVE-2024-8141,0,0,d494eb4aa5e779d518a311786c18c827e0ced59860399587e09c025afdbaf176,2024-08-26T19:09:16.763000 CVE-2024-8142,0,0,d4b24d12d326b40d1c063c9a3edca906c8e404b0436fcc16715466b79bbf260c,2024-08-26T19:08:38.493000 -CVE-2024-8143,0,0,102604b462c1d031990c2db79f517efbf3988c959905abd72423d86ae965bbcc,2024-10-29T14:34:04.427000 +CVE-2024-8143,0,1,d0b4632b344070eb67aa58e35caf14813d56b2878347cc8569964a43a3431954,2024-10-31T16:23:35.827000 CVE-2024-8144,0,0,8c217cf77629850f2a31ec00f7904f772883a591a54b72411e3d3cd24bcf1f00,2024-09-18T18:24:46.730000 CVE-2024-8145,0,0,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000 CVE-2024-8146,0,0,a2a80ffef156fb85ffee90216beed89480bdca821cd7147cd0b42bd2951a2961,2024-09-24T17:00:38.933000 @@ -266598,6 +266602,7 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8184,0,0,d48d558194844a1f751cae7594bf18c33ea7d327e56afa5866ea86b36313537e,2024-10-15T12:57:46.880000 +CVE-2024-8185,1,1,26704d16d6950ac2c758a400464a9f1d09ede441b55dd42cb676694c324d261a,2024-10-31T16:15:06.267000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000 CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000 @@ -266859,6 +266864,7 @@ CVE-2024-8547,0,0,a5c726f624e35e2e38ae2311e7ed395da023cf1c888c1c750584ab5f9e8492 CVE-2024-8548,0,0,79d6b79af13a38bbe8eb976675ec8fe70e73bfe199b20619eaaa02e33fc56380,2024-10-04T13:51:25.567000 CVE-2024-8549,0,0,9d15342b3eb4ac6ebd08188bbf5727cd19e2d1db961fed83db600a8a3150700d,2024-10-02T16:04:41.970000 CVE-2024-8552,0,0,ab7cb4c880b3ec4297f7ff802068bed1b689ce05b544a01cb748e0f63a229aea,2024-10-02T17:00:45.083000 +CVE-2024-8553,1,1,fcb661fb871f1ab923e0fe102980875df01a71eb9eefe665b53b72a154876bc6,2024-10-31T15:15:17.243000 CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000 CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000 CVE-2024-8557,0,0,86ab04a42076aa0fe9f792cba1f27d54b98becfc358809b664a63ce528fde776,2024-09-10T14:19:36.280000 @@ -267113,7 +267119,7 @@ CVE-2024-8924,0,0,329d97b4ddecec7a888f06c50c8c22d832c133b4f48330aff42c5aebe55b04 CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 -CVE-2024-8934,1,1,4476715996367104e5b45ab5e682dea180869422f2a6c8aa1565264f21f9aec1,2024-10-31T13:15:15.040000 +CVE-2024-8934,0,0,4476715996367104e5b45ab5e682dea180869422f2a6c8aa1565264f21f9aec1,2024-10-31T13:15:15.040000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000 @@ -267460,7 +267466,7 @@ CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9 CVE-2024-9488,0,0,3154f25401247f46098357ebd2d84fe95bb2164e861af1c275743e022d6c3976,2024-10-25T12:56:07.750000 CVE-2024-9489,0,0,09fd4a2a95dcd03917f853a7ea1dba8bde73b0fceba3df1b093f3994b7368ff9,2024-10-29T22:15:08.703000 CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000 -CVE-2024-9505,0,0,9f563819d874cda28d933cc3759112519ce910489eea1287ec5cc51a40bde8da,2024-10-29T14:34:04.427000 +CVE-2024-9505,0,1,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000 CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000 CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000 CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000