Auto-Update: 2024-10-18T16:00:20.610870+00:00

This commit is contained in:
cad-safe-bot 2024-10-18 16:03:21 +00:00
parent 06ae950b99
commit 681b0afab7
46 changed files with 2591 additions and 476 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-28002",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-11-14T18:15:29.137",
"lastModified": "2023-11-20T18:13:19.507",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-18T15:15:03.203",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.12, 6.4 all versions, 6.2 all versions, 6.0 all versions and FortiProxy 7.2 all versions, 7.0 all versions, 2.0 all versions VMs may allow a local attacker\u00a0with admin privileges to boot a malicious image on the device and bypass the filesystem integrity check in place."
"value": "An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.12, 6.4 all versions, 6.2 all versions, 6.0 all versions and VMs may allow a local attacker\u00a0with admin privileges to boot a malicious image on the device and bypass the filesystem integrity check in place."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20787",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T09:15:05.000",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:43:18.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1.0",
"matchCriteriaId": "D4AE1754-009F-4B40-B1D2-4464C2BEE116"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-52.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21190",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:05.973",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:11:55.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "secalert_us@oracle.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
@ -39,10 +59,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6329B1A2-75A8-4909-B4FB-77AC7232B6ED"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21191",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:06.150",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:13:26.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 5.3
},
{
"source": "secalert_us@oracle.com",
"type": "Secondary",
@ -39,10 +59,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6329B1A2-75A8-4909-B4FB-77AC7232B6ED"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21192",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:06.340",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:18:52.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6329B1A2-75A8-4909-B4FB-77AC7232B6ED"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21193",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:06.533",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:20:07.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,61 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.39",
"matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.2",
"matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21194",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:06.733",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:26:35.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,62 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.39",
"matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.2",
"matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21195",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:06.930",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:27:46.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:bi_publisher:7.0.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F59017DC-0258-45BD-89E4-DC8EBA922107"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:bi_publisher:7.6.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB270CE9-4B22-4AF9-9CF6-92B078B644EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "274A0CF5-41E8-42E0-9931-F7372A65B9C4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21202",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:08.310",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:28:44.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "secalert_us@oracle.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
@ -39,10 +59,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_people_tools:8.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D370F2E3-EF8A-440C-8319-D52FA3431428"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_people_tools:8.60:*:*:*:*:*:*:*",
"matchCriteriaId": "E7E019DA-6DB1-430F-9459-A2F24D9EE7B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_people_tools:8.61:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E5EEAF-DE22-4298-8ECA-C0CB106A9316"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21204",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:08.673",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:32:36.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,53 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F8752C4-11DC-4706-9995-846258D9B721"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21205",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:08.857",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:50:37.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6329B1A2-75A8-4909-B4FB-77AC7232B6ED"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21215",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:10.797",
"lastModified": "2024-10-17T14:35:15.600",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:51:31.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +61,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6329B1A2-75A8-4909-B4FB-77AC7232B6ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:fusion_middleware:14.1.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3ED632D-FC5B-4035-A0B1-66986B08469F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21248",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:14.707",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:59:21.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.22",
"matchCriteriaId": "1546CD49-450F-49FF-B492-8AC165123739"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.0",
"versionEndIncluding": "7.1.2",
"matchCriteriaId": "6B6D587F-89CC-4F88-B787-B7BDB295E121"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21253",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:15.643",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:59:43.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.22",
"matchCriteriaId": "1546CD49-450F-49FF-B492-8AC165123739"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21259",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:16.590",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T15:00:17.133",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +61,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.22",
"matchCriteriaId": "1546CD49-450F-49FF-B492-8AC165123739"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.0",
"versionEndIncluding": "7.1.2",
"matchCriteriaId": "6B6D587F-89CC-4F88-B787-B7BDB295E121"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21263",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:17.340",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T15:00:52.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.22",
"matchCriteriaId": "1546CD49-450F-49FF-B492-8AC165123739"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.0",
"versionEndIncluding": "7.1.2",
"matchCriteriaId": "6B6D587F-89CC-4F88-B787-B7BDB295E121"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21273",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:19.140",
"lastModified": "2024-10-16T16:38:14.557",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T15:02:45.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.22",
"matchCriteriaId": "1546CD49-450F-49FF-B492-8AC165123739"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.0",
"versionEndIncluding": "7.1.2",
"matchCriteriaId": "6B6D587F-89CC-4F88-B787-B7BDB295E121"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23742",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-28T03:15:08.390",
"lastModified": "2024-08-01T23:15:47.737",
"lastModified": "2024-10-18T15:35:09.310",
"vulnStatus": "Modified",
"cveTags": [
{
@ -56,6 +56,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25714",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-11T03:15:09.393",
"lastModified": "2024-08-01T13:47:49.190",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-18T14:08:58.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rhonabwy_project:rhonabwy:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.3",
"matchCriteriaId": "FAD0C3CC-EA77-47A6-9A26-724FB9871C50"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/babelouest/rhonabwy/commit/f9fd9a1c77e48b514ebb3baf0360f87eef3d846e",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45136",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T15:15:13.163",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:20:49.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.5.4",
"matchCriteriaId": "BA9F09B4-2963-4ADD-9CD8-50996E95423C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.0",
"versionEndExcluding": "19.5",
"matchCriteriaId": "AD0CF9D9-54BB-480D-8BEF-CC170F6C9B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb24-79.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45137",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T15:15:13.373",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:20:27.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +71,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.5.4",
"matchCriteriaId": "39DD7E91-43A7-4104-81A0-DC4F0E2F2005"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.0",
"versionEndExcluding": "19.5",
"matchCriteriaId": "FA2F3D57-560A-45F4-9A94-F8E059909279"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb24-79.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45138",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:05.723",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:42:18.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45139",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:05.947",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:42:26.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +61,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45140",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:06.167",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:42:31.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45141",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:06.380",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:42:35.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45142",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:06.583",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:42:38.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +61,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45143",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:06.783",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:42:43.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +61,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45144",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:06.973",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:42:45.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45145",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T10:15:03.283",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:26:54.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:lightroom:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.5",
"matchCriteriaId": "9EAD0BC0-5BCC-4CA7-AAB3-058D6DE2053F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:lightroom:*:*:*:*:classic:*:*:*",
"versionEndExcluding": "12.5.1",
"matchCriteriaId": "FAE977B5-7EAE-4278-896B-87DCF8089996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:lightroom:*:*:*:*:classic:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.5.1",
"matchCriteriaId": "C6FFB5C3-F6BA-4AB3-BFB1-B9F3ED4E408F"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/lightroom/apsb24-78.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45146",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T09:15:05.693",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:35:50.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.4",
"matchCriteriaId": "4B06788F-CEC7-48DA-B8E3-A9BF0C2C1E8E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/dimension/apsb24-74.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45150",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T09:15:06.210",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:35:32.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +71,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.4",
"matchCriteriaId": "4B06788F-CEC7-48DA-B8E3-A9BF0C2C1E8E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/dimension/apsb24-74.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45152",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T14:15:07.183",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:41:51.683",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "223FBC3F-3935-4371-958B-9A34BEE2A11F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47421",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T15:15:13.977",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:14:20.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.7",
"matchCriteriaId": "F5A639A9-A9B0-43D2-9EB6-774072B29BEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.5",
"matchCriteriaId": "10A66E49-5FA2-4F23-AA9D-21AE055CA140"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-82.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47422",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T15:15:14.190",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:14:52.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.7",
"matchCriteriaId": "F5A639A9-A9B0-43D2-9EB6-774072B29BEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.5",
"matchCriteriaId": "10A66E49-5FA2-4F23-AA9D-21AE055CA140"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-82.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47423",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T15:15:14.393",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:15:01.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.7",
"matchCriteriaId": "F5A639A9-A9B0-43D2-9EB6-774072B29BEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.5",
"matchCriteriaId": "10A66E49-5FA2-4F23-AA9D-21AE055CA140"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-82.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47424",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T15:15:14.600",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:15:12.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.7",
"matchCriteriaId": "F5A639A9-A9B0-43D2-9EB6-774072B29BEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.5",
"matchCriteriaId": "10A66E49-5FA2-4F23-AA9D-21AE055CA140"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-82.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47425",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-09T15:15:14.800",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:13:08.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.7",
"matchCriteriaId": "F5A639A9-A9B0-43D2-9EB6-774072B29BEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.5",
"matchCriteriaId": "10A66E49-5FA2-4F23-AA9D-21AE055CA140"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-82.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47674",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-15T11:15:13.073",
"lastModified": "2024-10-17T14:15:13.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T14:50:02.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,151 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: evitar dejar asignaciones pfn parciales en caso de error Como se\u00f1ala Jann, las asignaciones PFN son especiales, porque a diferencia de las asignaciones de memoria normales, no hay informaci\u00f3n de duraci\u00f3n asociada con la asignaci\u00f3n: es solo una asignaci\u00f3n sin procesar de PFN sin recuento de referencias de una 'p\u00e1gina de estructura'. Todo eso es muy intencional, pero significa que es f\u00e1cil arruinar la limpieza en caso de errores. S\u00ed, un mmap() fallido siempre limpiar\u00e1 eventualmente cualquier asignaci\u00f3n parcial, pero sin ninguna duraci\u00f3n expl\u00edcita en la asignaci\u00f3n de la tabla de p\u00e1ginas en s\u00ed, es muy f\u00e1cil hacer el manejo de errores en el orden incorrecto. En particular, es f\u00e1cil liberar por error el almacenamiento de respaldo f\u00edsico antes de que las tablas de p\u00e1ginas se limpien realmente y (temporalmente) tengan entradas PTE colgantes obsoletas. Para hacer que esta situaci\u00f3n sea menos propensa a errores, simplemente aseg\u00farese de que cualquier asignaci\u00f3n pfn parcial se elimine temprano, antes de cualquier otro manejo de errores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-459"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.168",
"matchCriteriaId": "F032D82B-5582-4DF5-B921-BFE0BD301364"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.111",
"matchCriteriaId": "FCBCD375-91FC-4790-94C0-6FF9C68F6498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.52",
"matchCriteriaId": "02ADDA94-95BB-484D-8E95-63C0428A28E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.11",
"matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*",
"matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5b2c8b34f6d76bfbd1dd4936eb8a0fbfb9af3959",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/65d0db500d7c07f0f76fc24a4d837791c4862cd2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/79a61cc3fc0466ad2b7b89618a6157785f0293b3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/954fd4c81f22c4b6ba65379a81fd252971bf4ef3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a95a24fcaee1b892e47d5e6dcc403f713874ee80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4740",
"sourceIdentifier": "psirt@moxa.com",
"published": "2024-10-18T09:15:04.237",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T15:13:42.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@moxa.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
},
{
"source": "psirt@moxa.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moxa:mxsecurity:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.0",
"matchCriteriaId": "B684EB4B-A888-4494-BAC5-09DD44216846"
}
]
}
]
}
],
"references": [
{
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-231878-mxsecurity-series-multiple-vulnerabilities",
"source": "psirt@moxa.com"
"source": "psirt@moxa.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7722",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-21T16:15:10.580",
"lastModified": "2024-08-21T17:24:59.627",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T15:45:50.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "11.2.11.54113",
"matchCriteriaId": "C0744A38-EFF7-4D08-9BC7-1D66DE4C104F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.0.0.12394",
"versionEndExcluding": "12.1.8.15703",
"matchCriteriaId": "7071CB16-9D8C-4C6D-9317-4128C11F64B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "13.0.0.21632",
"versionEndExcluding": "13.1.3.22478",
"matchCriteriaId": "C30D9630-BE28-4E39-9311-F6279E12F2A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "2023.1.0.15510",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "15CBEC0F-FEFA-477E-968B-457BCE7360EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "68E36E53-D875-4AD9-BEE9-B021AB416040"
}
]
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1124/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7723",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-21T16:15:10.760",
"lastModified": "2024-08-21T17:24:59.627",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T15:45:47.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "11.2.11.54113",
"matchCriteriaId": "C0744A38-EFF7-4D08-9BC7-1D66DE4C104F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.0.0.12394",
"versionEndExcluding": "12.1.8.15703",
"matchCriteriaId": "7071CB16-9D8C-4C6D-9317-4128C11F64B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "13.0.0.21632",
"versionEndExcluding": "13.1.3.22478",
"matchCriteriaId": "C30D9630-BE28-4E39-9311-F6279E12F2A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "2023.1.0.15510",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "15CBEC0F-FEFA-477E-968B-457BCE7360EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "68E36E53-D875-4AD9-BEE9-B021AB416040"
}
]
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1125/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7724",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-21T16:15:10.933",
"lastModified": "2024-08-21T17:24:59.627",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T15:45:35.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -40,6 +62,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -51,14 +83,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "11.2.11.54113",
"matchCriteriaId": "C0744A38-EFF7-4D08-9BC7-1D66DE4C104F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.0.0.12394",
"versionEndExcluding": "12.1.8.15703",
"matchCriteriaId": "7071CB16-9D8C-4C6D-9317-4128C11F64B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "13.0.0.21632",
"versionEndExcluding": "13.1.3.22478",
"matchCriteriaId": "C30D9630-BE28-4E39-9311-F6279E12F2A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "2023.1.0.15510",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "15CBEC0F-FEFA-477E-968B-457BCE7360EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "68E36E53-D875-4AD9-BEE9-B021AB416040"
}
]
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1126/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7725",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-08-21T16:15:11.120",
"lastModified": "2024-08-21T17:24:59.627",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-18T15:45:29.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "11.2.11.54113",
"matchCriteriaId": "C0744A38-EFF7-4D08-9BC7-1D66DE4C104F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "12.0.0.12394",
"versionEndExcluding": "12.1.8.15703",
"matchCriteriaId": "7071CB16-9D8C-4C6D-9317-4128C11F64B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "13.0.0.21632",
"versionEndExcluding": "13.1.3.22478",
"matchCriteriaId": "C30D9630-BE28-4E39-9311-F6279E12F2A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "2023.1.0.15510",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "15CBEC0F-FEFA-477E-968B-457BCE7360EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.2.3.25184",
"matchCriteriaId": "68E36E53-D875-4AD9-BEE9-B021AB416040"
}
]
}
]
}
],
"references": [
{
"url": "https://www.foxit.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1127/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,112 @@
{
"id": "CVE-2024-9537",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-10-18T15:15:04.170",
"lastModified": "2024-10-18T15:15:04.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Red",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "RED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://arcticwolf.com/resources/blog/rackspace-breach-linked-to-zero-day-vulnerability-sciencelogic-sl1s-third-party-utility/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://rackspace.service-now.com/system_status?id=detailed_status&service=4dafca5a87f41610568b206f8bbb35a6",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://support.sciencelogic.com/s/article/15465",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://support.sciencelogic.com/s/article/15527",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://twitter.com/ynezzor/status/1839931641172467907",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://www.bleepingcomputer.com/news/security/rackspace-monitoring-data-stolen-in-sciencelogic-zero-day-attack/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-18T14:00:28.796987+00:00
2024-10-18T16:00:20.610870+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-18T13:49:32.090000+00:00
2024-10-18T15:45:50.717000+00:00
```
### Last Data Feed Release
@ -33,45 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266127
266128
```
### CVEs added in the last Commit
Recently added CVEs: `1`
- [CVE-2024-47240](CVE-2024/CVE-2024-472xx/CVE-2024-47240.json) (`2024-10-18T12:15:02.773`)
- [CVE-2024-9537](CVE-2024/CVE-2024-95xx/CVE-2024-9537.json) (`2024-10-18T15:15:04.170`)
### CVEs modified in the last Commit
Recently modified CVEs: `263`
Recently modified CVEs: `43`
- [CVE-2024-9264](CVE-2024/CVE-2024-92xx/CVE-2024-9264.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9347](CVE-2024/CVE-2024-93xx/CVE-2024-9347.json) (`2024-10-18T12:53:04.627`)
- [CVE-2024-9350](CVE-2024/CVE-2024-93xx/CVE-2024-9350.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9351](CVE-2024/CVE-2024-93xx/CVE-2024-9351.json) (`2024-10-18T12:53:04.627`)
- [CVE-2024-9352](CVE-2024/CVE-2024-93xx/CVE-2024-9352.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9361](CVE-2024/CVE-2024-93xx/CVE-2024-9361.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9364](CVE-2024/CVE-2024-93xx/CVE-2024-9364.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9366](CVE-2024/CVE-2024-93xx/CVE-2024-9366.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9373](CVE-2024/CVE-2024-93xx/CVE-2024-9373.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9382](CVE-2024/CVE-2024-93xx/CVE-2024-9382.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9383](CVE-2024/CVE-2024-93xx/CVE-2024-9383.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9414](CVE-2024/CVE-2024-94xx/CVE-2024-9414.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9425](CVE-2024/CVE-2024-94xx/CVE-2024-9425.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9452](CVE-2024/CVE-2024-94xx/CVE-2024-9452.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9674](CVE-2024/CVE-2024-96xx/CVE-2024-9674.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9683](CVE-2024/CVE-2024-96xx/CVE-2024-9683.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9703](CVE-2024/CVE-2024-97xx/CVE-2024-9703.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9848](CVE-2024/CVE-2024-98xx/CVE-2024-9848.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9861](CVE-2024/CVE-2024-98xx/CVE-2024-9861.json) (`2024-10-18T12:53:04.627`)
- [CVE-2024-9862](CVE-2024/CVE-2024-98xx/CVE-2024-9862.json) (`2024-10-18T12:53:04.627`)
- [CVE-2024-9863](CVE-2024/CVE-2024-98xx/CVE-2024-9863.json) (`2024-10-18T12:53:04.627`)
- [CVE-2024-9892](CVE-2024/CVE-2024-98xx/CVE-2024-9892.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9898](CVE-2024/CVE-2024-98xx/CVE-2024-9898.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-9940](CVE-2024/CVE-2024-99xx/CVE-2024-9940.json) (`2024-10-18T12:53:04.627`)
- [CVE-2024-9951](CVE-2024/CVE-2024-99xx/CVE-2024-9951.json) (`2024-10-18T12:52:33.507`)
- [CVE-2024-25714](CVE-2024/CVE-2024-257xx/CVE-2024-25714.json) (`2024-10-18T14:08:58.867`)
- [CVE-2024-45136](CVE-2024/CVE-2024-451xx/CVE-2024-45136.json) (`2024-10-18T14:20:49.137`)
- [CVE-2024-45137](CVE-2024/CVE-2024-451xx/CVE-2024-45137.json) (`2024-10-18T14:20:27.983`)
- [CVE-2024-45138](CVE-2024/CVE-2024-451xx/CVE-2024-45138.json) (`2024-10-18T14:42:18.163`)
- [CVE-2024-45139](CVE-2024/CVE-2024-451xx/CVE-2024-45139.json) (`2024-10-18T14:42:26.347`)
- [CVE-2024-45140](CVE-2024/CVE-2024-451xx/CVE-2024-45140.json) (`2024-10-18T14:42:31.003`)
- [CVE-2024-45141](CVE-2024/CVE-2024-451xx/CVE-2024-45141.json) (`2024-10-18T14:42:35.603`)
- [CVE-2024-45142](CVE-2024/CVE-2024-451xx/CVE-2024-45142.json) (`2024-10-18T14:42:38.620`)
- [CVE-2024-45143](CVE-2024/CVE-2024-451xx/CVE-2024-45143.json) (`2024-10-18T14:42:43.117`)
- [CVE-2024-45144](CVE-2024/CVE-2024-451xx/CVE-2024-45144.json) (`2024-10-18T14:42:45.377`)
- [CVE-2024-45145](CVE-2024/CVE-2024-451xx/CVE-2024-45145.json) (`2024-10-18T14:26:54.053`)
- [CVE-2024-45146](CVE-2024/CVE-2024-451xx/CVE-2024-45146.json) (`2024-10-18T14:35:50.380`)
- [CVE-2024-45150](CVE-2024/CVE-2024-451xx/CVE-2024-45150.json) (`2024-10-18T14:35:32.140`)
- [CVE-2024-45152](CVE-2024/CVE-2024-451xx/CVE-2024-45152.json) (`2024-10-18T14:41:51.683`)
- [CVE-2024-4740](CVE-2024/CVE-2024-47xx/CVE-2024-4740.json) (`2024-10-18T15:13:42.123`)
- [CVE-2024-47421](CVE-2024/CVE-2024-474xx/CVE-2024-47421.json) (`2024-10-18T14:14:20.443`)
- [CVE-2024-47422](CVE-2024/CVE-2024-474xx/CVE-2024-47422.json) (`2024-10-18T14:14:52.763`)
- [CVE-2024-47423](CVE-2024/CVE-2024-474xx/CVE-2024-47423.json) (`2024-10-18T14:15:01.977`)
- [CVE-2024-47424](CVE-2024/CVE-2024-474xx/CVE-2024-47424.json) (`2024-10-18T14:15:12.930`)
- [CVE-2024-47425](CVE-2024/CVE-2024-474xx/CVE-2024-47425.json) (`2024-10-18T14:13:08.090`)
- [CVE-2024-47674](CVE-2024/CVE-2024-476xx/CVE-2024-47674.json) (`2024-10-18T14:50:02.710`)
- [CVE-2024-7722](CVE-2024/CVE-2024-77xx/CVE-2024-7722.json) (`2024-10-18T15:45:50.717`)
- [CVE-2024-7723](CVE-2024/CVE-2024-77xx/CVE-2024-7723.json) (`2024-10-18T15:45:47.643`)
- [CVE-2024-7724](CVE-2024/CVE-2024-77xx/CVE-2024-7724.json) (`2024-10-18T15:45:35.440`)
- [CVE-2024-7725](CVE-2024/CVE-2024-77xx/CVE-2024-7725.json) (`2024-10-18T15:45:29.083`)
## Download and Usage

File diff suppressed because it is too large Load Diff