diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9825.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9825.json index dc9354d67e1..4fbff62639d 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9825.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9825.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9825", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.983", - "lastModified": "2017-04-10T22:31:05.007", + "lastModified": "2024-11-04T18:55:24.060", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9827.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9827.json index e82f94b6c9c..7ebb8c83089 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9827.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9827.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9827", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-07T20:29:00.293", - "lastModified": "2017-08-08T16:22:13.923", + "lastModified": "2024-11-04T18:55:06.360", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6EA542-A222-4E6A-869B-F3805CAFCDD0" + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9828.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9828.json index e23cc97a52e..b65167ff4cc 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9828.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9828.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9828", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-07T20:29:00.323", - "lastModified": "2017-08-08T16:20:52.673", + "lastModified": "2024-11-04T18:53:21.077", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6EA542-A222-4E6A-869B-F3805CAFCDD0" + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9829.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9829.json index faeda1e689a..4c3151364b6 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9829.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9829.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9829", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-05T17:59:00.150", - "lastModified": "2017-05-09T12:40:33.057", + "lastModified": "2024-11-04T18:53:00.827", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9830.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9830.json index 2b7263b7f8a..0cfefe9f1e8 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9830.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9830.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9830", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-07T20:29:00.370", - "lastModified": "2017-08-08T16:28:54.523", + "lastModified": "2024-11-04T18:52:34.957", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6EA542-A222-4E6A-869B-F3805CAFCDD0" + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9831.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9831.json index 68517ea6348..3372330640a 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9831.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9831.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9831", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-07T20:29:00.403", - "lastModified": "2017-08-08T16:24:53.473", + "lastModified": "2024-11-04T18:50:14.833", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6EA542-A222-4E6A-869B-F3805CAFCDD0" + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9848.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9848.json index 06fdc886e7b..8f6812a9a76 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9848.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9848.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9848", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-20T16:59:01.110", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-04T18:49:53.660", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -185,8 +185,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9852.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9852.json index 0f8f22eccb0..6c460e61f86 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9852.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9852.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9852", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-17T14:59:00.500", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-04T18:49:46.877", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9853.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9853.json index 42263186269..e242cc183a9 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9853.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9853.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9853", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-17T14:59:00.547", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-04T18:49:37.570", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9854.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9854.json index 9d039ed0747..70032bfe357 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9854.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9854.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9854", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-17T14:59:00.610", - "lastModified": "2018-10-30T16:27:37.717", + "lastModified": "2024-11-04T18:49:30.603", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-99xx/CVE-2014-9907.json b/CVE-2014/CVE-2014-99xx/CVE-2014-9907.json index 0dff6a1ede5..caa9010f336 100644 --- a/CVE-2014/CVE-2014-99xx/CVE-2014-9907.json +++ b/CVE-2014/CVE-2014-99xx/CVE-2014-9907.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9907", "sourceIdentifier": "security@debian.org", "published": "2017-04-19T14:59:00.147", - "lastModified": "2017-05-09T12:40:25.760", + "lastModified": "2024-11-04T18:49:20.907", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6EA542-A222-4E6A-869B-F3805CAFCDD0" + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10144.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10144.json index 142a9c7f5e6..33bd82db03e 100644 --- a/CVE-2016/CVE-2016-101xx/CVE-2016-10144.json +++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10144.json @@ -2,8 +2,8 @@ "id": "CVE-2016-10144", "sourceIdentifier": "security@debian.org", "published": "2017-03-24T15:59:00.403", - "lastModified": "2017-11-04T01:29:15.677", - "vulnStatus": "Modified", + "lastModified": "2024-11-04T18:48:46.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6EA542-A222-4E6A-869B-F3805CAFCDD0" + "versionEndExcluding": "6.9.7-1", + "matchCriteriaId": "EBEF639E-3E7F-40F9-B624-B05E65A37E2C" } ] } @@ -96,7 +97,11 @@ "references": [ { "url": "http://www.debian.org/security/2017/dsa-3799", - "source": "security@debian.org" + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2017/01/16/6", @@ -144,7 +149,10 @@ }, { "url": "https://security.gentoo.org/glsa/201702-09", - "source": "security@debian.org" + "source": "security@debian.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10145.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10145.json index b8c174b0c4f..db847ecf60c 100644 --- a/CVE-2016/CVE-2016-101xx/CVE-2016-10145.json +++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10145.json @@ -2,8 +2,8 @@ "id": "CVE-2016-10145", "sourceIdentifier": "security@debian.org", "published": "2017-03-24T15:59:00.433", - "lastModified": "2017-11-04T01:29:15.740", - "vulnStatus": "Modified", + "lastModified": "2024-11-04T18:45:24.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BE6EA542-A222-4E6A-869B-F3805CAFCDD0" + "versionEndExcluding": "6.9.7-1", + "matchCriteriaId": "EBEF639E-3E7F-40F9-B624-B05E65A37E2C" } ] } @@ -96,7 +97,11 @@ "references": [ { "url": "http://www.debian.org/security/2017/dsa-3799", - "source": "security@debian.org" + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2017/01/16/6", @@ -144,7 +149,10 @@ }, { "url": "https://security.gentoo.org/glsa/201702-09", - "source": "security@debian.org" + "source": "security@debian.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-75xx/CVE-2016-7532.json b/CVE-2016/CVE-2016-75xx/CVE-2016-7532.json index 2e4d142e74c..42265ad89a7 100644 --- a/CVE-2016/CVE-2016-75xx/CVE-2016-7532.json +++ b/CVE-2016/CVE-2016-75xx/CVE-2016-7532.json @@ -2,7 +2,7 @@ "id": "CVE-2016-7532", "sourceIdentifier": "security@debian.org", "published": "2017-04-20T18:59:01.310", - "lastModified": "2017-05-09T12:39:12.837", + "lastModified": "2024-11-04T18:55:38.580", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46978.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46978.json index 5c7258a1d03..b1e2f932c99 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46978.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46978.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46978", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.183", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-11-04T18:35:00.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: nVMX: siempre intente asignar eVMCS despu\u00e9s de la migraci\u00f3n Cuando se utiliza VMCS iluminado y el estado anidado se migra con vmx_get_nested_state()/vmx_set_nested_state() KVM no puede asignar evmcs p\u00e1gina de inmediato: evmcs gpa no es 'struct kvm_vmx_nested_state_hdr' y no podemos leerlo desde la p\u00e1gina de asistencia de VP porque el espacio de usuario puede decidir restaurar HV_X64_MSR_VP_ASSIST_PAGE despu\u00e9s de restaurar el estado anidado (y QEMU, por ejemplo, hace exactamente eso). Para asegurarse de que eVMCS est\u00e9 asignado, /vmx_set_nested_state() genera la solicitud KVM_REQ_GET_NESTED_STATE_PAGES. el commit f2c7ef3ba955 (\"KVM: nSVM: cancelar KVM_REQ_GET_NESTED_STATE_PAGES en vmexit anidado\") agreg\u00f3 la limpieza KVM_REQ_GET_NESTED_STATE_PAGES a nested_vmx_vmexit() para asegurarse de que el mapa de bits del permiso MSR no se cambie cuando ocurre una salida inmediata de L2 a L1 justo despu\u00e9s de la migraci\u00f3n (causada por un evento pendiente, Por ejemplo). Desafortunadamente, en exactamente la misma situaci\u00f3n todav\u00eda necesitamos tener eVMCS mapeado para que nested_sync_vmcs12_to_shadow() refleje los cambios en VMCS12 a eVMCS. Como curita, restaure nested_get_evmcs_page() al borrar KVM_REQ_GET_NESTED_STATE_PAGES en nested_vmx_vmexit(). La \"soluci\u00f3n\" est\u00e1 lejos de ser ideal, ya que no podemos propagar f\u00e1cilmente posibles fallas e incluso si pudi\u00e9ramos, lo m\u00e1s probable es que ya sea demasiado tarde para hacerlo. Toda la idea 'KVM_REQ_GET_NESTED_STATE_PAGES' para mapear eVMCS despu\u00e9s de la migraci\u00f3n parece ser fr\u00e1gil ya que nos desviamos demasiado de la ruta 'nativa' cuando la carga de vmptr ocurre en vmx_set_nested_state()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/200a45649ab7361bc80c70aebf7165b64f9a6c9f", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46989.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46989.json index 29ba5d948b5..971de5a1e93 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46989.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46989.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46989", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.687", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-11-04T17:35:01.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: hfsplus: evita la corrupci\u00f3n al reducir y truncar Creo que hay algunos problemas introducidos por el commit 31651c607151 (\"hfsplus: evita el punto muerto en el truncamiento de archivos\") HFS+ tiene registros de extensi\u00f3n que siempre contienen 8 extensiones. En caso de que el primer registro de extensi\u00f3n en el archivo de cat\u00e1logo se llene, se asignan nuevos registros desde el archivo de desbordamiento de extensiones. En caso de que se produzca un truncamiento reducido en la mitad de un registro de extensi\u00f3n que se ubica en un archivo de desbordamiento de extensiones, la l\u00f3gica en hfsplus_file_truncate() se cambi\u00f3 para que la llamada a hfs_brec_remove() ya no est\u00e9 protegida. La acci\u00f3n correcta ser\u00eda simplemente liberar las extensiones que exceden el nuevo tama\u00f1o dentro del registro de extensi\u00f3n llamando a hfsplus_free_extents() y luego verificar si se debe eliminar todo el registro de extensi\u00f3n. Sin embargo, dado que la guardia (blk_cnt > start) est\u00e1 ahora despu\u00e9s de la llamada a hfs_brec_remove(), esto tiene el efecto desafortunado de que el \u00faltimo registro de extensi\u00f3n coincidente se elimina incondicionalmente. Para reproducir este problema, cree un archivo que tenga al menos 10 extensiones y luego realice un truncamiento reducido hasta la mitad del \u00faltimo registro de extensi\u00f3n, de modo que el n\u00famero de extensiones restantes no sea menor o divisible por 8. Esto hace que el \u00faltimo registro de extensi\u00f3n ( 8 extensiones) para eliminarse por completo en lugar de truncarse a la mitad. Por tanto, esto provoca corrupci\u00f3n y p\u00e9rdida de datos. La soluci\u00f3n para esto es simplemente verificar si el nuevo final truncado est\u00e1 debajo del inicio de este registro de extensi\u00f3n, lo que hace que sea seguro eliminar el registro de extensi\u00f3n completo. Sin embargo, la llamada a hfs_brec_remove() no se puede mover a su lugar anterior ya que estamos eliminando ->tree_lock y puede provocar una condici\u00f3n de ejecuci\u00f3n y la invalidaci\u00f3n de la informaci\u00f3n almacenada en cach\u00e9, posiblemente corrompiendo los datos del nodo. Otro tema est\u00e1 relacionado con \u00e9ste. Al ingresar al bloque (blk_cnt > start) no mantenemos ->tree_lock. Salimos del bucle sin mantener el bloqueo, pero hfs_find_exit() lo desbloquea. No estoy seguro de si es posible que otra persona tome el bloqueo bajo nuestros pies, pero puede causar errores dif\u00edciles de depurar y desbloqueo prematuro. Aunque no exista ning\u00fan riesgo real, el bloqueo siempre debe mantenerse en equilibrio. Tomando as\u00ed el candado ahora justo antes del control." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a", diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47044.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47044.json index db2809f2b3a..3669fea31de 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47044.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47044.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47044", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:40.173", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-11-04T17:35:01.323", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: sched/fair: corrigi\u00f3 el desplazamiento fuera de los l\u00edmites en load_balance() Syzbot inform\u00f3 sobre varios casos en los que sd->nr_balance_failed puede crecer a valores mucho m\u00e1s altos de lo que uno esperar\u00eda. . Un load_balance() exitoso lo restablece a 0; uno fallido lo incrementa. Una vez que llegue a sd->cache_nice_tries + 3, esto *deber\u00eda* activar un saldo activo, que lo establecer\u00e1 en sd->cache_nice_tries+1 o lo restablecer\u00e1 a 0. Sin embargo, en caso de que el saldo est\u00e9 activo La tarea no puede ejecutarse en env->dst_cpu, entonces el incremento se realiza sin ninguna modificaci\u00f3n adicional. Esto podr\u00eda repetirse hasta la saciedad y explicar\u00eda los valores absurdamente altos informados por syzbot (86, 149). VincentG se\u00f1al\u00f3 que es valioso dejar que sd->cache_nice_tries crezca, por lo que el cambio en s\u00ed deber\u00eda corregirse. Eso significa evitar: \"\"\" Si el valor del operando derecho es negativo o es mayor o igual que el ancho del operando izquierdo promocionado, el comportamiento no est\u00e1 definido. \"\"\" Por lo tanto, debemos limitar el exponente de desplazamiento a BITS_PER_TYPE( typeof(lefthand)) - 1. Ech\u00e9 un vistazo a otros casos similares a trav\u00e9s de coccinelle: @expr@ position pos; expresi\u00f3n E1; expresi\u00f3n E2; @@ ( E1 >> E2@pos | E1 >> E2@pos ) @cst depende de expr@ posici\u00f3n pos; expresi\u00f3n expr.E1; cst constante; @@ ( E1 >> cst@pos | E1 << cst@pos ) @script:python depende de !cst@ pos << expr.pos; exp << expr.E2; @@ # Truco sucio para ignorar constexpr if exp.upper() != exp: coccilib.report.print_report(pos[0], \"Posible cambio de UB aqu\u00ed\") La \u00fanica otra coincidencia en kernel/sched es rq_clock_thermal() que emplea sched_thermal_decay_shift, y ese exponente ya est\u00e1 limitado a 10, por lo que ese est\u00e1 bien." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2f3eab368e313dba35fc2f51ede778bf7b030b54", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json index 6b4afe22045..eb660949672 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47130", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.577", - "lastModified": "2024-03-17T22:38:29.433", + "lastModified": "2024-11-04T17:35:02.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nvmet: soluci\u00f3n que libera p2pmem no asignado En caso de que se encuentre un dispositivo p2p pero el grupo p2p est\u00e9 vac\u00edo, el objetivo nvme todav\u00eda est\u00e1 intentando liberar el sgl del grupo p2p en lugar del sgl normal. pool y provocando un bloqueo (se llama a BUG()). En su lugar, asigne p2p_dev para la solicitud solo si se asign\u00f3 desde el grupo p2p. Este es el accidente que se provoc\u00f3: [domingo 30 de mayo 19:13:53 2021] ------------[ cortar aqu\u00ed ]------------ [domingo de mayo 30 19:13:53 2021] \u00a1ERROR del kernel en lib/genalloc.c:518! [domingo 30 de mayo 19:13:53 2021] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] SMP PTI... [domingo 30 de mayo 19:13:53 2021] ERROR del kernel en lib/genalloc.c:518. ... [dom 30 de mayo 19:13:53 2021] RIP: 0010:gen_pool_free_owner+0xa8/0xb0 ... [dom 30 de mayo 19:13:53 2021] Seguimiento de llamadas: [dom 30 de mayo 19:13:53 2021 ] ------------[ cortar aqu\u00ed ]------------ [domingo 30 de mayo 19:13:53 2021] pci_free_p2pmem+0x2b/0x70 [domingo 30 de mayo 19 :13:53 2021] pci_p2pmem_free_sgl+0x4f/0x80 [domingo 30 de mayo 19:13:53 2021] nvmet_req_free_sgls+0x1e/0x80 [nvmet] [domingo 30 de mayo 19:13:53 2021] ERROR del kernel en lib/genalloc.c: 518! [dom 30 de mayo 19:13:53 2021] nvmet_rdma_release_rsp+0x4e/0x1f0 [nvmet_rdma] [dom 30 de mayo 19:13:53 2021] nvmet_rdma_send_done+0x1c/0x60 [nvmet_rdma]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/8a452d62e7cea3c8a2676a3b89a9118755a1a271", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json index d8ba95ada19..8dd24ceb5cf 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47271", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.610", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-11-04T18:35:01.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: cdnsp: soluciona el problema de interbloqueo en cdnsp_thread_irq_handler. El parche corrige el siguiente problema cr\u00edtico causado por el interbloqueo que se detect\u00f3 durante las pruebas Clase NCM: smp: csd: se detect\u00f3 un bloqueo CSD que no responde ( #1) en CPU#0 smp: csd: el bloqueo CSD (#1) no responde. .... RIP: 0010:native_queued_spin_lock_slowpath+0x61/0x1d0 RSP: 0018:ffffbc494011cde0 EFLAGS: 00000002 RAX: 0000000000000101 RBX: ffff9ee8116b4a68 RCX: 0000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff9ee8116b4658 RBP: ffffbc494011cde0 R08: 0000000000000001 R09: 00000000000000000 R 10: ffff9ee8116b4670 R11: 0000000000000000 R12: ffff9ee8116b4658 R13: ffff9ee8116b4670 R14: 00000000000000246 R15: ffff9ee8116b4658 CS: 0010 DS: 0 ES: 0000 CR0: 0000000080050033 CR2: 00007f7bcc41a830 CR3: 000000007a612003 CR4: 00000000001706e0 Seguimiento de llamadas: do_raw_spin_lock+0xc0/0xd0 _raw_spin_lock_irqsave + 0x95/0xa0 cdnsp_gadget_ep_queue.cold+0x88/0x107 [cdnsp_udc_pci] usb_ep_queue+0x35/0x110 eth_start_xmit+0x220/0x3d0 [u_ether] ncm_tx_timeout+0x34/0x40 [usb_f_ncm] ? ncm_free_inst+0x50/0x50 [usb_f_ncm] __hrtimer_run_queues+0xac/0x440 hrtimer_run_softirq+0x8c/0xb0 __do_softirq+0xcf/0x428 asm_call_irq_on_stack+0x12/0x20 +0x61/0x70 irq_exit_rcu+0xc1/0xd0 sysvec_apic_timer_interrupt+0x52/0xb0 asm_sysvec_apic_timer_interrupt+0x12 /0x20 RIP: 0010:do_raw_spin_trylock+0x18/0x40 RSP: 0018:ffffbc494138bda8 EFLAGS: 00000246 RAX: 00000000000000000 RBX: ffff9ee8116b4658 RCX: 0000000000000 000 RDX: 0000000000000001 RSI: 00000000000000000 RDI: ffff9ee8116b4658 RBP: ffffbc494138bda8 R08: 00000000000000001 R09: 0000000000000000 R10: ffff9ee8116b4670 R11 : 0000000000000000 R12: ffff9ee8116b4658 R13: ffff9ee8116b4670 R14: ffff9ee7b5c73d80 R15: ffff9ee8116b4000 _raw_spin_lock+0x3d/0x70 ? cdnsp_thread_irq_handler.cold+0x32/0x112c [cdnsp_udc_pci] cdnsp_thread_irq_handler.cold+0x32/0x112c [cdnsp_udc_pci] ? cdnsp_remove_request+0x1f0/0x1f0 [cdnsp_udc_pci] ? cdnsp_thread_irq_handler+0x5/0xa0 [cdnsp_udc_pci] ? irq_thread+0xa0/0x1c0 irq_thread_fn+0x28/0x60 irq_thread+0x105/0x1c0 ? __kthread_parkme+0x42/0x90 ? irq_forced_thread_fn+0x90/0x90? wake_threads_waitq+0x30/0x30? irq_thread_check_affinity+0xe0/0xe0 kthread+0x12a/0x160 ? kthread_park+0x90/0x90 ret_from_fork+0x22/0x30 La causa principal del problema es la instrucci\u00f3n spin_lock/spin_unlock en lugar de spin_lock_irqsave/spin_lock_irqrestore en la funci\u00f3n cdnsp_thread_irq_handler." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/a9aecef198faae3240921b707bc09b602e966fce", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json index 9924f92f4a0..c4bbb7ea219 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47551.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47551", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:19.927", - "lastModified": "2024-07-03T01:38:09.747", + "lastModified": "2024-11-04T18:35:01.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/06c6f8f86ec243b89e52f0c3dc7062bcb9de74df", diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20509.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20509.json index b3060e51286..9a6c7f547d1 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20509.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20509.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20509", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:18.590", - "lastModified": "2024-08-14T02:07:05.410", + "lastModified": "2024-11-04T18:35:02.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31304.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31304.json index 90e70418338..3994feb808d 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31304.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31304.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31304", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:20.110", - "lastModified": "2024-08-14T02:07:05.410", + "lastModified": "2024-11-04T17:35:02.577", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40124.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40124.json index 126f1a657cc..6dc363a29ba 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40124.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40124.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40124", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.743", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-11-04T17:35:03.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En varias ubicaciones, existe una posible lectura entre usuarios debido a un agente confundido. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local de fotograf\u00edas u otras im\u00e1genes sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/86c8421c1181816b6cb333eb62a78e32290c4b17", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42823.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42823.json index b3470650041..2f1e100d268 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42823.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42823.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42823", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:47.540", - "lastModified": "2024-02-22T19:07:37.840", + "lastModified": "2024-11-04T17:35:04.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El problema se resolvi\u00f3 sanitizando el registro. Este problema se solucion\u00f3 en watchOS 10.1, macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213981", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42843.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42843.json index abcb29fa379..7a41e3f8225 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42843.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42843.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42843", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:48.940", - "lastModified": "2024-05-07T06:15:06.573", + "lastModified": "2024-11-04T17:35:05.077", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de interfaz de usuario inconsistente con una gesti\u00f3n de estado mejorada. Este problema se solucion\u00f3 en iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visitar un sitio web malicioso puede provocar una suplantaci\u00f3n de la barra de direcciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/26/1", diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46294.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46294.json index 575e9c71b34..6bb72121f6c 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46294.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46294.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46294", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.267", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-11-04T17:35:06.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Teledyne FLIR M300 2.00-19. Las contrase\u00f1as de las cuentas de usuario se cifran localmente y se pueden descifrar en contrase\u00f1as de texto plano mediante la utilidad umSetup. Esta utilidad requiere permisos de root para ejecutarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://Loudmouth.io", diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4826.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4826.json index 6bef430e070..2640158d432 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4826.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4826.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4826", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-23T10:15:07.680", - "lastModified": "2024-02-23T16:14:43.447", + "lastModified": "2024-11-04T17:35:07.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El tema SocialDriver de WordPress anterior a la versi\u00f3n 2024 tiene un prototipo de vulnerabilidad de contaminaci\u00f3n que podr\u00eda permitir a un atacante inyectar propiedades arbitrarias, lo que resultar\u00eda en un ataque de cross site scripting (XSS)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://socialdriver.com", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52343.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52343.json index 77ae2c7d17f..169eb6bc511 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52343.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52343.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52343", "sourceIdentifier": "security@unisoc.com", "published": "2024-04-08T03:15:08.363", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-11-04T17:35:08.043", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el mensaje SecurityCommand despu\u00e9s de que se haya activado la seguridad, existe una posible validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n, sin necesidad de privilegios de ejecuci\u00f3n adicionales." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1777143682512781313", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52346.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52346.json index 363694df725..162a00cb01d 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52346.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52346.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52346", "sourceIdentifier": "security@unisoc.com", "published": "2024-04-08T03:15:08.503", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-11-04T18:35:03.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el controlador del m\u00f3dem, existe una posible falla del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del System necesarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1777143682512781313", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52561.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52561.json index 01df97c55f8..6c58ea30b0f 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52561.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52561.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52561", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:48.803", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-11-04T18:35:04.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: arm64: dts: qcom: sdm845-db845c: marcar la regi\u00f3n de memoria de inicio continua como reservada Agregar una regi\u00f3n de memoria reservada para la memoria framebuffer (la regi\u00f3n de memoria de inicio configurada por el gestor de arranque). Soluciona un problema de p\u00e1nico en el kernel (arm-smmu: fallo de contexto no controlado en esta regi\u00f3n de memoria en particular) informado en DB845c que ejecuta v5.10.y." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/110e70fccce4f22b53986ae797d665ffb1950aa6", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json index 6c2d5810493..fe8f74e51a8 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52623", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-26T18:15:08.930", - "lastModified": "2024-11-04T13:16:42.057", + "lastModified": "2024-11-04T17:35:08.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: SUNRPC: corrija una advertencia de uso sospechoso de RCU Recib\u00ed la siguiente advertencia mientras ejecutaba cthon en un servidor ontap que ejecutaba pNFS: [ 57.202521] ============ ================= [ 57.202522] ADVERTENCIA: uso sospechoso de RCU [ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 No contaminado [ 57.202525] -------- --------------------- [ 57.202525] net/sunrpc/xprtmultipath.c:349 \u00a1\u00a1Lista de RCU atravesada en la secci\u00f3n que no es de lectura!! [57.202527] otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: [57.202528] rcu_scheduler_active = 2, debug_locks = 1 [57.202529] no hay bloqueos retenidos por test5/3567. [ 57.202530] seguimiento de pila: [ 57.202532] CPU: 0 PID: 3567 Comm: test5 No contaminado 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e [ 57.20253 4] Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS desconocido 2 /2/2022 [ 57.202536] Seguimiento de llamadas: [ 57.202537] [ 57.202540] dump_stack_lvl+0x77/0xb0 [ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0 [ 57.202556] rpc_xprt_sw itch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6] [ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50 /0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6] [ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6] [ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d 98e71675af20c19bdb1f6] [57.202671]? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6] [ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c71 6d88496ded0ea6d289bbea684fa996f9b57a9] [ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9] [ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e 3a4187f18ae8a27b630f9feae6831b584a9360a] [ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a] [ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9] [ 57.202788] __nfs_pageio_add_request+ 0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902] [ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965 514a828e6902] [ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902] [ 57.202849] nfs_writepages_callback+0x13/0x30 [n fs 6c976fa593a7c2976f5a0aeb4965514a828e6902] [ 57.202866] write_cache_pages+0x265/ 0x450 [57.202870]? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902] [ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f 5a0aeb4965514a828e6902] [ 57.202913] do_writepages+0xd2/0x230 [ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80 [ 57.202921] filemap_fdatawrite_wbc+0x67/0x80 [ 57.202924] filemap_write_and_wait_range+0xd9/0x170 [ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c97 6fa593a7c2976f5a0aeb4965514a828e6902] [ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9] [ 57.202969] __se_s ys_cerrar+ 0x46/0xd0 [57.202972] do_syscall_64+0x68/0x100 [57.202975]? do_syscall_64+0x77/0x100 [57.202976]? do_syscall_64+0x77/0x100 [ 57.202979] Entry_SYSCALL_64_after_hwframe+0x6e/0x76 [ 57.202982] RIP: 0033:0x7fe2b12e4a94 [ 57.202985] C\u00f3digo: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3 [ 57.202987] RSP : 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 00000000000000003 [ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94 [ 57.202991] RDX: 00000000 00002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003 [ 57.202992] RBP: 00007ffe857dfc50 R08: 7ffffffffffffffff R09: 0000000065650f49 [ 57.202993] R10 : 00007f -- -truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/31b62908693c90d4d07db597e685d9f25a120073", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52627.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52627.json index 492480e30cc..4844b711f41 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52627.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52627.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52627", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-26T18:15:09.140", - "lastModified": "2024-11-04T13:16:42.313", + "lastModified": "2024-11-04T17:35:09.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iio: adc: ad7091r: permitir a los usuarios configurar eventos de dispositivo Los dispositivos AD7091R-5 son compatibles con el controlador ad7091r-5 junto con el controlador ad7091r-base. Esos controladores declararon eventos iio para notificar al espacio del usuario cuando las lecturas de ADC caen por debajo de los umbrales de los registros de l\u00edmite bajo o por encima de los valores establecidos en los registros de l\u00edmite alto. Sin embargo, para configurar los eventos de iio y sus umbrales, se debe implementar un conjunto de funciones de devoluci\u00f3n de llamada que no estaban presentes hasta ahora. La consecuencia de intentar configurar eventos ad7091r-5 sin las funciones de devoluci\u00f3n de llamada adecuadas fue una desreferencia del puntero nulo en el kernel porque los punteros a las funciones de devoluci\u00f3n de llamada no estaban configurados. Implemente devoluciones de llamadas de configuraci\u00f3n de eventos que permitan a los usuarios leer/escribir umbrales de eventos y habilitar/deshabilitar la generaci\u00f3n de eventos. Dado que las estructuras de especificaciones de eventos son gen\u00e9ricas para los dispositivos AD7091R, tambi\u00e9n mueva las del controlador ad7091r-5 al controlador base para que puedan reutilizarse cuando se agregue soporte para ad7091r-2/-4/-8." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10035.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10035.json index 111fe2f63d5..004ed1dc5f5 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10035.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10035", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-11-04T12:16:08.880", - "lastModified": "2024-11-04T12:16:08.880", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "iletisim@usom.gov.tr", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json index 6a5770ec002..7307f6e0972 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10041", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-23T14:15:03.970", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T17:35:09.270", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PAM. La informaci\u00f3n secreta se almacena en la memoria, donde el atacante puede hacer que el programa v\u00edctima se ejecute enviando caracteres a su entrada est\u00e1ndar (stdin). Mientras esto ocurre, el atacante puede entrenar al predictor de bifurcaciones para que ejecute una cadena ROP de manera especulativa. Esta falla podr\u00eda provocar la filtraci\u00f3n de contrase\u00f1as, como las que se encuentran en /etc/shadow mientras se realizan autenticaciones." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-10041", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json index ba4aa8a6e7f..13dd3660b15 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10389", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-11-04T11:15:04.647", - "lastModified": "2024-11-04T16:35:03.007", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10523.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10523.json index 4387cb12d71..093d49487d7 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10523.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10523.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10523", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-11-04T12:16:09.217", - "lastModified": "2024-11-04T12:16:09.217", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10750.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10750.json index 5fd944ac18e..3aac17f08b3 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10750.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10750", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T02:15:14.667", - "lastModified": "2024-11-04T02:15:14.667", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10751.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10751.json index dc7622c635e..772378d4a8e 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10751.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10751.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10751", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T02:15:14.993", - "lastModified": "2024-11-04T02:15:14.993", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10752.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10752.json index 021b6f7ea1d..0f1662ae443 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10752.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10752.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10752", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T02:15:15.310", - "lastModified": "2024-11-04T13:17:04.067", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10753.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10753.json index 6932165cc65..197e5bd78cd 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10753.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10753.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10753", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T02:15:15.613", - "lastModified": "2024-11-04T02:15:15.613", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10754.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10754.json index d8a5720fb44..684f5d1c99c 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10754.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10754.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10754", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T03:15:03.513", - "lastModified": "2024-11-04T03:15:03.513", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10755.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10755.json index 72cf6f7f089..5fd90bebfc0 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10755.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10755.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10755", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T03:15:03.800", - "lastModified": "2024-11-04T03:15:03.800", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10756.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10756.json index 3502d7aeef9..49ed54fb3f4 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10756.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10756.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10756", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T03:15:04.107", - "lastModified": "2024-11-04T03:15:04.107", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10757.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10757.json index 4526a7b1678..1c461d7e508 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10757.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10757.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10757", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T03:15:04.400", - "lastModified": "2024-11-04T03:15:04.400", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10758.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10758.json index 8dbec8444a4..20597fd613a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10758.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10758.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10758", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T04:15:02.970", - "lastModified": "2024-11-04T04:15:02.970", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10759.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10759.json index 0c1f76086fe..72c8bb46792 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10759.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10759.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10759", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T04:15:03.273", - "lastModified": "2024-11-04T04:15:03.273", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10760.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10760.json index af802f741eb..37729ccccc6 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10760.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10760.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10760", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T05:15:03.810", - "lastModified": "2024-11-04T05:15:03.810", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json index b26fe9b119e..de745cb8c5a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10761.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10761", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T05:15:04.693", - "lastModified": "2024-11-04T07:15:06.913", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10764.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10764.json index 7f8a6e0c82a..67fc2c6db6a 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10764.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10764.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10764", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T16:15:04.497", - "lastModified": "2024-11-04T16:15:04.497", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10765.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10765.json index b23a3a23ce4..102cba920e9 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10765.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10765.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10765", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-04T16:15:04.890", - "lastModified": "2024-11-04T16:15:04.890", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10766.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10766.json new file mode 100644 index 00000000000..31e5ede85d0 --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10766.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-10766", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T18:15:04.330", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Codezips Free Exam Hall Seating Management System 1.0. This issue affects some unknown processing of the file /pages/save_user.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher disclosure contains confusing vulnerability classes and file names." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Charlotte008/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282953", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282953", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.436478", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json index 5436d39caef..646e24a72b6 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20104", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:15.940", - "lastModified": "2024-11-04T11:35:00.850", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json index fcb4d9c18f5..9d63679ef4e 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20106.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20106", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.070", - "lastModified": "2024-11-04T11:35:01.303", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json index 489ac6e0754..795a73d3028 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20107", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.163", - "lastModified": "2024-11-04T11:35:01.503", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json index 6db1c8553ba..ebb2f1770aa 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20108.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20108", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.273", - "lastModified": "2024-11-04T11:35:01.713", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json index 2615f5c77ba..ec7af1c2d5f 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20109.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20109", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.387", - "lastModified": "2024-11-04T11:35:01.923", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json index 4634ead4a74..d6dc6a792f9 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20110.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20110", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.480", - "lastModified": "2024-11-04T11:35:02.163", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json index 79ebcd21ea1..23c249fd383 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20111", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.567", - "lastModified": "2024-11-04T02:15:16.567", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json index b5e23d3b7e9..c0fb2b9edce 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20112", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.653", - "lastModified": "2024-11-04T11:35:02.463", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json index a8546882633..a2c4f5194c2 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20113", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.743", - "lastModified": "2024-11-04T11:35:02.667", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json index e3f071da1c8..4ee5fb08ec7 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20114", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.830", - "lastModified": "2024-11-04T02:15:16.830", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json index b2e8ffa272e..4eb0f4f7ea9 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20115.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20115", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:16.923", - "lastModified": "2024-11-04T11:35:02.960", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json index 1d671bc91d2..23e3061cd92 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20117.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20117", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.017", - "lastModified": "2024-11-04T11:35:03.160", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json index f1682ac307e..9e0d33ecff6 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20118", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.097", - "lastModified": "2024-11-04T11:35:03.373", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json index e4df2689d3b..dd6fa23d9c4 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20119", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.190", - "lastModified": "2024-11-04T11:35:03.570", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json index dd1bf6d8884..47e703c22ae 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20120", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.280", - "lastModified": "2024-11-04T11:35:03.770", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json index ccac2410507..fb388841ade 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20121", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.383", - "lastModified": "2024-11-04T11:35:03.967", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20122.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20122.json index e34ef033337..bafb69171eb 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20122.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20122", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.473", - "lastModified": "2024-11-04T02:15:17.473", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json index 8a5485c5bcf..be62b77b13b 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20123", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.567", - "lastModified": "2024-11-04T11:35:04.170", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json index 0a60afc1b43..c66948eb556 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20124", "sourceIdentifier": "security@mediatek.com", "published": "2024-11-04T02:15:17.647", - "lastModified": "2024-11-04T11:35:04.363", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22255.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22255.json index 4a78c948017..592ac1146eb 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22255.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22255.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22255", "sourceIdentifier": "security@vmware.com", "published": "2024-03-05T18:15:48.277", - "lastModified": "2024-03-05T18:50:18.333", + "lastModified": "2024-11-04T18:35:06.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,9 +36,41 @@ }, "exploitabilityScore": 2.5, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.0 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html", diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23377.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23377.json index ffe9df372e1..2c497a6f0a8 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23377.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23377", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:04.100", - "lastModified": "2024-11-04T10:15:04.100", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23385.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23385.json index 01d06b7f818..6ff6e9384a5 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23385.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23385", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:04.500", - "lastModified": "2024-11-04T10:15:04.500", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23386.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23386.json index 5ca6268fc90..2e5b04846a2 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23386.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23386.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23386", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:04.760", - "lastModified": "2024-11-04T10:15:04.760", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23590.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23590.json index 5dccc07a504..6655eb336b5 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23590.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23590.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23590", "sourceIdentifier": "security@apache.org", "published": "2024-11-04T10:15:04.990", - "lastModified": "2024-11-04T10:15:04.990", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json index 2a50c37f896..2d03ad68b4a 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26666", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.500", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-11-04T17:35:11.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: wifi: mac80211: corrige el uso de RCU en TDLS fast-xmit Esto busca el enlace bajo protecci\u00f3n de RCU, pero no se garantiza que realmente tenga protecci\u00f3n. Arregla eso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json index 436df461a44..9958b294f8f 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26758", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.263", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-11-04T18:35:07.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: md: No ignorar la matriz suspendida en md_check_recovery() mddev_suspend() nunca detiene sync_thread, por lo tanto, no tiene sentido ignorar la matriz suspendida en md_check_recovery(), lo que podr\u00eda causar sync_thread no se puede cancelar el registro. Despu\u00e9s de commit f52f5c71f3d4 (\"md: arreglar la detenci\u00f3n del hilo de sincronizaci\u00f3n\"), el siguiente bloqueo se puede activar mediante test shell/integrity-caching.sh: 1) suspender la matriz: raid_postsuspend mddev_suspend 2) detener la matriz: raid_dtr md_stop __md_stop_writes stop_sync_thread set_bit(MD_RECOVERY_INTR , &mddev->recuperaci\u00f3n); md_wakeup_thread_directly(mddev->sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery)) 3) hilo de sincronizaci\u00f3n realizado: md_do_sync set_bit(MD_RECOVERY_DONE, &mddev->recovery); md_wakeup_thread(mddev->thread); 4) el hilo del demonio no puede cancelar el registro del hilo de sincronizaci\u00f3n: md_check_recovery si (mddev->suspended) regresa; -> devolver directamente md_read_sync_thread clear_bit(MD_RECOVERY_RUNNING, &mddev->recovery); -> MD_RECOVERY_RUNNING no se puede borrar, por lo tanto el paso 2 se bloquea; Este problema no solo est\u00e1 relacionado con dm-raid; solucionelo ignorando la matriz suspendida en md_check_recovery(). Y los parches de seguimiento mejorar\u00e1n mejor dm-raid para congelar el hilo de sincronizaci\u00f3n durante la suspensi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1baae052cccd08daf9a9d64c3f959d8cdb689757", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json index 97fc7f114ff..39a2663d652 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26786", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.247", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-11-04T17:35:11.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommufd: corrige el error de sobrescritura de iopt_access_list_id Syzkaller inform\u00f3 lo siguiente WARN_ON: ADVERTENCIA: CPU: 1 PID: 4738 en drivers/iommu/iommufd/io_pagetable.c:1360 Seguimiento de llamadas: iommufd_access_change_ioas+0x2fe /0x4e0 iommufd_access_destroy_object+0x50/0xb0 iommufd_object_remove+0x2a3/0x490 iommufd_object_destroy_user iommufd_access_destroy+0x71/0xb0 iommufd_test_staccess_release+0x89/0xd0 __fput+0x272/0x b50 __fput_sync+0x4b/0x60 __do_sys_close __se_sys_close __x64_sys_close+0x8b/0x110 do_syscall_x64 La falta de coincidencia entre el puntero de acceso en la lista y el puntero pasado resulta de una sobrescritura de acceso->iopt_access_list_id, en iopt_add_access(). Llamado desde iommufd_access_change_ioas() cuando xa_alloc() tiene \u00e9xito pero iopt_calculate_iova_alignment() falla. Agregue un new_id en iopt_add_access() y actualice solo iopt_access_list_id cuando regrese exitosamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9526a46cc0c378d381560279bea9aa34c84298a0", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json index 45ce8c2e1b9..965c78634db 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26956", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:11.837", - "lastModified": "2024-06-27T13:15:57.290", + "lastModified": "2024-11-04T17:35:12.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: corrige el error al detectar da\u00f1os en DAT en btree y asignaciones directas Serie de parches \"nilfs2: corrige el error del kernel en submit_bh_wbc()\". Esto resuelve un ERROR del kernel informado por syzbot. Dado que hay dos fallas involucradas, hice un parche para cada uno por separado. El primer parche por s\u00ed solo resuelve el error reportado por syzbot, pero creo que ambas correcciones deber\u00edan enviarse a estable, as\u00ed que las etiquet\u00e9 como tales. Este parche (de 2): Syzbot ha informado de un error en el kernel en submit_bh_wbc() al escribir datos de archivos en un sistema de archivos nilfs2 cuyos metadatos est\u00e1n da\u00f1ados. Hay dos errores involucrados en este tema. El primer defecto es que cuando nilfs_get_block() localiza un bloque de datos usando btree o mapeo directo, si la rutina de traducci\u00f3n de direcciones de disco nilfs_dat_translate() falla con el c\u00f3digo interno -ENOENT debido a la corrupci\u00f3n de los metadatos DAT, se puede devolver a nilfs_get_block(). Esto hace que nilfs_get_block() identifique err\u00f3neamente un bloque existente como inexistente, lo que provoca que tanto la b\u00fasqueda como la inserci\u00f3n del bloque de datos fallen de manera inconsistente. El segundo defecto es que nilfs_get_block() devuelve un estado exitoso en este estado inconsistente. Esto hace que la persona que llama __block_write_begin_int() u otros soliciten una lectura aunque el b\u00fafer no est\u00e9 asignado, lo que resulta en una verificaci\u00f3n BUG_ON para el indicador BH_Mapped en submit_bh_wbc() que falla. Esto soluciona el primer problema cambiando el valor de retorno al c\u00f3digo -EINVAL cuando falla una conversi\u00f3n usando DAT con el c\u00f3digo -ENOENT, evitando la condici\u00f3n conflictiva que conduce al error del kernel descrito anteriormente. Aqu\u00ed, el c\u00f3digo -EINVAL indica que se detect\u00f3 corrupci\u00f3n de metadatos durante la b\u00fasqueda del bloque, lo que se manejar\u00e1 adecuadamente como un error del sistema de archivos y se convertir\u00e1 a -EIO al pasar a trav\u00e9s de la capa bmap nilfs2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/2e2619ff5d0def4bb6c2037a32a6eaa28dd95c84", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json index d0f39e53ad7..3959acd4808 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26994", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:17.207", - "lastModified": "2024-06-27T12:15:23.573", + "lastModified": "2024-11-04T17:35:12.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux se ha solucionado la siguiente vulnerabilidad: Speakup: Evitar crash en palabras muy largas En caso de que una consola est\u00e9 configurada muy grande y contenga una palabra muy larga (>256 caracteres), tenemos que detenernos antes de la longitud de la palabra. b\u00fafer de palabras." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2616.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2616.json index 1b0c87f6d3f..f401f5a5de6 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2616.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2616.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2616", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:09.260", - "lastModified": "2024-03-25T17:15:52.007", + "lastModified": "2024-11-04T17:35:14.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Para proteger a la UCI contra la explotaci\u00f3n, el comportamiento de las condiciones de falta de memoria se cambi\u00f3 para que falle en lugar de intentar continuar. Esta vulnerabilidad afecta a Firefox ESR <115.9 y Thunderbird <115.9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27234.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27234.json index bfc298d091e..1eec646f75a 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27234.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27234.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27234", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:49.010", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-11-04T17:35:12.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En fvp_set_target de fvp.c, hay una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json index a3976d3f1d2..85c8d0c82ef 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28820", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T16:15:10.950", - "lastModified": "2024-10-25T18:35:04.300", + "lastModified": "2024-11-04T18:35:08.457", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/threerings/openvpn-auth-ldap/pull/92", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json index 42b8f2db00c..90a066ab365 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29133.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29133", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T09:15:07.943", - "lastModified": "2024-05-01T17:15:31.283", + "lastModified": "2024-11-04T17:35:13.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de escritura fuera de los l\u00edmites en la configuraci\u00f3n de Apache Commons. Este problema afecta a la configuraci\u00f3n de Apache Commons: desde 2.0 antes de 2.10.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.10.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30204.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30204.json index a90967f6cd4..61f1d6edf60 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30204.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30204.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30204", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T15:15:52.523", - "lastModified": "2024-05-01T18:15:19.670", + "lastModified": "2024-11-04T17:35:14.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Emacs anterior a 29.3, la vista previa de LaTeX est\u00e1 habilitada de forma predeterminada para los archivos adjuntos de correo electr\u00f3nico." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/25/2", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31747.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31747.json index a548892889e..61df766d03d 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31747.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31747.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31747", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T19:15:20.340", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-11-04T17:35:15.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en Yealink VP59 Microsoft Teams Phone firmware 91.15.0.118 (fixed in 122.15.0.142) permite a un atacante f\u00edsicamente cercano desactivar el bloqueo del tel\u00e9fono a trav\u00e9s de la opci\u00f3n del men\u00fa Walkie Talkie." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://medium.com/%40deepsahu1/yealink-vp59-microsoft-teams-phone-lock-bypass-b7fee9dd9c8c", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json index b91c9ff4998..a9c7d055d64 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31868.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31868", "sourceIdentifier": "security@apache.org", "published": "2024-04-09T16:15:08.413", - "lastModified": "2024-10-03T13:15:14.833", + "lastModified": "2024-11-04T17:35:15.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de codificaci\u00f3n o escape de salida inadecuados en Apache Zeppelin. Los atacantes pueden modificar helium.json y exponer ataques XSS a usuarios normales. Este problema afecta a Apache Zeppelin: desde 0.8.2 antes de 0.11.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.11.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31951.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31951.json index 9fc59e6aa2d..50d5c6f3f6f 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31951.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31951.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31951", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-07T21:15:07.600", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-11-04T17:35:15.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el analizador Opaque LSA Extended Link de FRRouting (FRR) hasta 9.1, puede haber un desbordamiento del b\u00fafer y una falla del daemon en ospf_te_parse_ext_link para paquetes OSPF LSA durante un intento de leer subTLV SID de adyacencia de enrutamiento de segmento (las longitudes no est\u00e1n validadas)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/FRRouting/frr/pull/15674/", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json index 4a1c4727d3f..15b93ba53fb 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json @@ -2,13 +2,13 @@ "id": "CVE-2024-31975", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T18:15:06.967", - "lastModified": "2024-11-01T12:57:03.417", + "lastModified": "2024-11-04T17:15:07.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "EnGenius ESR580 devices through 1.1.30 allow a remote attacker to conduct stored XSS attacks via the Wi-Fi SSID parameters. JavaScript embedded into a vulnerable field is executed when the user clicks the SSID field's corresponding EDIT button." + "value": "EnGenius EWS356-Fit devices through 1.1.30 allow a remote attacker to conduct stored XSS attacks via the Wi-Fi SSID parameters. JavaScript embedded into a vulnerable field is executed when the user clicks the SSID field's corresponding EDIT button." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32915.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32915.json index 0b4287563eb..e137db9680a 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32915.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32915.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32915", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.467", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-11-04T18:35:09.293", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En CellInfoListParserV2::FillCellInfo() de protocolnetadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32916.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32916.json index 4a29b25d135..67102ed80f1 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32916.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32916", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.533", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-11-04T17:35:16.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En fvp_freq_histogram_init de fvp.c, existe una posible Divulgaci\u00f3n de Informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-06-01", diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33029.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33029.json index 90c33da5013..9f42b8e76cc 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33029.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33029.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33029", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:05.147", - "lastModified": "2024-11-04T10:15:05.147", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33030.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33030.json index 644593d94dc..a7f2e1ca872 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33030.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33030.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33030", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:05.370", - "lastModified": "2024-11-04T10:15:05.370", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33031.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33031.json index e6cb3ba22ad..c0a045f20ed 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33031.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33031.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33031", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:05.603", - "lastModified": "2024-11-04T10:15:05.603", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33032.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33032.json index e77e85df81a..65aa0e7d2f6 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33032.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33032", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:05.827", - "lastModified": "2024-11-04T10:15:05.827", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33033.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33033.json index 1e66c308b44..b271ccbd089 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33033.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33033", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:06.057", - "lastModified": "2024-11-04T10:15:06.057", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33068.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33068.json index a3fcc930729..d920cd50ba8 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33068.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33068", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:06.283", - "lastModified": "2024-11-04T10:15:06.283", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33528.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33528.json index 2659c1108ce..2870be9809b 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33528.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33528.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33528", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-21T15:15:29.167", - "lastModified": "2024-05-23T17:15:29.213", + "lastModified": "2024-11-04T17:35:17.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una vulnerabilidad de Cross Site Scripting Almacenado (XSS) en ILIAS 7 anterior a 7.30 e ILIAS 8 anterior a 8.11 permite a atacantes remotos autenticados con privilegios de tutor inyectar scripts web o HTML de su elecci\u00f3n mediante la carga de archivos XML." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=1719&obj_id=170029", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34155.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34155.json index f4cbd237e86..a0283c01a44 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34155.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34155.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34155", "sourceIdentifier": "security@golang.org", "published": "2024-09-06T21:15:11.947", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-11-04T17:35:17.887", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Llamar a cualquiera de las funciones Parse en el c\u00f3digo fuente de Go que contiene literales profundamente anidados puede provocar p\u00e1nico debido al agotamiento de la pila." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://go.dev/cl/611238", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34882.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34882.json new file mode 100644 index 00000000000..a5db44df676 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34882.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-34882", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:04.683", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently protected credentials in SMTP server settings in 1C-Bitrix Bitrix24 23.300.100 allows remote administrators to send SMTP account passwords to an arbitrary server via HTTP POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://bitrix24.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DrieVlad/BitrixVulns", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34883.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34883.json new file mode 100644 index 00000000000..bde3663e315 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34883.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-34883", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:04.787", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently protected credentials in DAV server settings in 1C-Bitrix Bitrix24 23.300.100 allow remote administrators to read proxy-server accounts passwords via HTTP GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://bitrix24.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DrieVlad/BitrixVulns", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34887.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34887.json new file mode 100644 index 00000000000..3e574386c2d --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34887.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-34887", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:04.867", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently protected credentials in AD/LDAP server settings in 1C-Bitrix Bitrix24 23.300.100 allows remote administrators to send AD/LDAP administrators account passwords to an arbitrary server via HTTP POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://bitrix24.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DrieVlad/BitrixVulns", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json index 226eb6e8d1c..38ceb256b15 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35947", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T12:15:08.220", - "lastModified": "2024-06-27T14:15:13.860", + "lastModified": "2024-11-04T17:35:18.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dyndbg: corrige el antiguo BUG_ON en >control parser. Corrige un BUG_ON de 2009. Incluso si parece \"unreachable\" (realmente no lo mir\u00e9), asegur\u00e9monos elimin\u00e1ndolo. haciendo pr_err y devuelve -EINVAL en su lugar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json index cf53da21f98..74e6ddb2195 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3545.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3545", "sourceIdentifier": "security@devolutions.net", "published": "2024-04-09T19:15:41.380", - "lastModified": "2024-04-10T13:23:38.787", + "lastModified": "2024-11-04T17:35:20.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El manejo inadecuado de permisos en la funci\u00f3n de cach\u00e9 fuera de l\u00ednea de vault en Devolutions Remote Desktop Manager 2024.1.20 y versiones anteriores en Windows y Devolutions Server 2024.1.8 y versiones anteriores permite a un atacante acceder a informaci\u00f3n confidencial contenida en el archivo de cach\u00e9 fuera de l\u00ednea obteniendo acceso a una computadora donde el software est\u00e1 instalado aunque el modo sin conexi\u00f3n est\u00e9 desactivado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0006", diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json index 00927a40d96..fd9d18a8523 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36383", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-27T11:15:08.710", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-11-04T17:35:18.540", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 un problema en la autenticaci\u00f3n SAML de Logpoint anterior a 6.0.3. Un atacante puede colocar un nombre de archivo manipulado en el campo de estado de una respuesta SAML SSO-URL y el archivo correspondiente a este nombre de archivo finalmente se eliminar\u00e1. Esto puede provocar una interrupci\u00f3n del inicio de sesi\u00f3n de autenticaci\u00f3n SAML." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36485.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36485.json index 9e73718faa0..f4ad1678ecc 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36485.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36485", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-11-04T12:16:09.507", - "lastModified": "2024-11-04T12:16:09.507", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json index ecf77515291..b55343faa2b 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36962", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.740", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-11-04T17:35:18.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ks8851: Cola de paquetes RX en el controlador IRQ en lugar de deshabilitar los BH Actualmente, el controlador usa local_bh_disable()/local_bh_enable() en su controlador IRQ para evitar activar el softirq net_rx_action() al salir de netif_rx(). net_rx_action() podr\u00eda activar esta devoluci\u00f3n de llamada del controlador .start_xmit, que est\u00e1 protegido por el mismo candado que el controlador IRQ, por lo que llamar al .start_xmit desde netif_rx() desde la secci\u00f3n cr\u00edtica del controlador IRQ protegido por el bloqueo podr\u00eda llevar a un intento de reclamar el candado ya reclamado y un colgado. El enfoque local_bh_disable()/local_bh_enable() funciona s\u00f3lo en caso de que el controlador IRQ est\u00e9 protegido por un spinlock, pero no funciona si el controlador IRQ est\u00e1 protegido por mutex, es decir, esto funciona para KS8851 con interfaz de bus paralelo, pero no para KS8851 con Interfaz de bus SPI. Elimine la manipulaci\u00f3n de BH y en lugar de llamar a netif_rx() dentro del c\u00f3digo del controlador IRQ protegido por el bloqueo, primero ponga en cola todos los SKB recibidos en el controlador IRQ y, una vez que el controlador IRQ salga de la secci\u00f3n cr\u00edtica protegida por el bloqueo, retire la cola. todos los SKB en cola y env\u00edelos todos a netif_rx(). En este punto, es seguro activar el softirq net_rx_action(), ya que la llamada netif_rx() est\u00e1 fuera del bloqueo que protege el controlador IRQ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/7e2901a2a9195da76111f351584bf77552a038f0", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json index f4b2a61cc96..9e9dfba92c9 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37384", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T04:15:30.597", - "lastModified": "2024-07-03T02:04:17.060", + "lastModified": "2024-11-04T17:35:19.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Roundcube Webmail anterior a 1.5.7 y 1.6.x anterior a 1.6.7 permite XSS a trav\u00e9s de columnas de lista de las preferencias del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38403.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38403.json index a763cfa651b..5eb44ef6216 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38403.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38403.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38403", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:06.547", - "lastModified": "2024-11-04T10:15:06.547", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38405.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38405.json index 87cf9a2f457..cd72d06e2e6 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38405.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38405.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38405", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:06.793", - "lastModified": "2024-11-04T10:15:06.793", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38406.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38406.json index fdb04f36774..50e83c3e726 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38406.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38406", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:07.020", - "lastModified": "2024-11-04T10:15:07.020", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38407.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38407.json index c24f8d59701..76e8fde97ba 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38407.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38407.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38407", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:07.247", - "lastModified": "2024-11-04T10:15:07.247", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38408.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38408.json index d77d026cae9..9c2e7fc1321 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38408.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38408", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:07.460", - "lastModified": "2024-11-04T10:15:07.460", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38409.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38409.json index f0b8bc954a1..13649ec78f9 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38409.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38409", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:07.713", - "lastModified": "2024-11-04T10:15:07.713", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38410.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38410.json index 48b84ae7536..a5980063120 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38410.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38410", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:07.933", - "lastModified": "2024-11-04T10:15:07.933", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38415.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38415.json index caf4130adad..0f25c7485d7 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38415.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38415.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38415", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:08.173", - "lastModified": "2024-11-04T10:15:08.173", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38419.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38419.json index 36b05ec849a..db23d9dfd3c 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38419.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38419.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38419", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:08.420", - "lastModified": "2024-11-04T10:15:08.420", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38421.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38421.json index db21c9bd593..8628622a726 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38421.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38421.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38421", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:08.673", - "lastModified": "2024-11-04T10:15:08.673", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38422.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38422.json index 3edc05c0fa0..2dfd8420000 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38422.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38422.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38422", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:08.917", - "lastModified": "2024-11-04T10:15:08.917", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38423.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38423.json index 6a400fce105..6ae917bde01 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38423.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38423", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:09.183", - "lastModified": "2024-11-04T10:15:09.183", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38424.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38424.json index bb122048ffe..c35a035b5da 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38424.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38424", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-04T10:15:09.440", - "lastModified": "2024-11-04T10:15:09.440", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39341.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39341.json index 72033c73570..741f889117c 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39341.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39341.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39341", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-23T18:15:05.507", - "lastModified": "2024-09-26T13:32:55.343", + "lastModified": "2024-11-04T17:35:19.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El software Entrust Instant Financial Issuance (On Premise) (antes conocido como Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, 6.8.x y versiones anteriores deja un archivo de configuraci\u00f3n (es decir, WebAPI.cfg.xml) despu\u00e9s del proceso de instalaci\u00f3n. Se puede acceder a este archivo sin autenticaci\u00f3n en el puerto HTTP 80 adivinando la ruta webroot de IIS correcta. Incluye los nombres y valores de los par\u00e1metros de configuraci\u00f3n del sistema con valores de configuraci\u00f3n confidenciales cifrados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/VAMorales/21a8700a67d80c263b38e693fd528313", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json index 46f43f063aa..5c47ec64fd4 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40656", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.297", - "lastModified": "2024-09-11T16:26:11.920", + "lastModified": "2024-11-04T17:35:21.163", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En handleCreateConferenceComplete de ConnectionServiceWrapper.java, existe una forma posible de revelar im\u00e1genes entre usuarios debido a un subordinado confundido. Esto podr\u00eda generar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/f3e6a6c02439401eb7aeb3749ee5ec0b51a625b9", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json index 40290897489..262b32f5e09 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40659", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.473", - "lastModified": "2024-09-11T16:26:11.920", + "lastModified": "2024-11-04T18:35:10.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En getRegistration de RemoteProvisioningService.java, existe una forma posible de deshabilitar permanentemente la funci\u00f3n de generaci\u00f3n de claves de AndroidKeyStore mediante la actualizaci\u00f3n de las claves de certificaci\u00f3n de todas las aplicaciones instaladas debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/RemoteKeyProvisioning/+/c65dce4c6d8d54e47dce79a56e29e2223a2354e6", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45164.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45164.json index a7c6db7213b..d7111feb3f5 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45164.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45164.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45164", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T14:15:14.677", - "lastModified": "2024-11-04T14:15:14.677", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45498.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45498.json index 81c9a56e7cf..ef4fe469fb4 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45498.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45498.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45498", "sourceIdentifier": "security@apache.org", "published": "2024-09-07T08:15:11.407", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-11-04T17:35:22.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Ejemplo de DAG: example_inlet_event_extra.py incluido con Apache Airflow versi\u00f3n 2.10.0 tiene una vulnerabilidad que permite que un atacante autenticado con solo permiso de activaci\u00f3n de DAG ejecute comandos arbitrarios. Si utiliz\u00f3 ese ejemplo como base de sus DAG, revise si no ha copiado el ejemplo peligroso; consulte https://github.com/apache/airflow/pull/41873 para obtener m\u00e1s informaci\u00f3n. Recomendamos no exponer los DAG de ejemplo en su implementaci\u00f3n. Si debe exponer los DAG de ejemplo, actualice Airflow a la versi\u00f3n 2.10.1 o posterior." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json index 6a16bf49e25..d7dad6a5101 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45882", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:21.837", - "lastModified": "2024-11-04T15:15:21.837", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `delete_map_profile.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json index 0776cd9f755..3d54bd4fb6c 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45884", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:21.937", - "lastModified": "2024-11-04T15:15:21.937", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `setSWMGroup.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json index a8a35c3f09d..ca74e1d4f17 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45885.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45885", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:22.040", - "lastModified": "2024-11-04T15:15:22.040", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `autodiscovery_clear.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json index b734ccf587a..2647fb71470 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45887", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:22.123", - "lastModified": "2024-11-04T15:15:22.123", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `doOpenVPN.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json index 22bcf594445..357997db2de 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45888.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45888", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:22.210", - "lastModified": "2024-11-04T15:15:22.210", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `set_ap_map_config.'" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json index 4209c7d1638..5d08904e94a 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45889.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45889", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:22.297", - "lastModified": "2024-11-04T15:15:22.297", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `commandTable.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json index 336809446e6..7c491224e3c 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45890.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45890", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:22.400", - "lastModified": "2024-11-04T15:15:22.400", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `download_ovpn.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json index 139f530654d..aaf2e886c56 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45891", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:22.477", - "lastModified": "2024-11-04T15:15:22.477", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `delete_wlan_profile.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json index c20a234ccb6..afe4fff0a85 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45893", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T15:15:22.560", - "lastModified": "2024-11-04T15:15:22.560", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `setSWMOption.`" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/N1nEmAn/wp/blob/main/test_v.zip", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json new file mode 100644 index 00000000000..ef288e5d53c --- /dev/null +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48336", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:05.027", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS app before loading it, which allows a local untrusted app with no additional privileges to silently execute arbitrary code in the Magisk app and escalate privileges to root via a crafted package, aka Bug #8279. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/canyie/MagiskEoP", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/topjohnwu/Magisk/commit/c2eb6039579b8a2fb1e11a753cea7662c07bec02", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48809.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48809.json new file mode 100644 index 00000000000..bb141ada8a7 --- /dev/null +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48809.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48809", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T17:15:07.880", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Open Networking Foundations sdran-in-a-box v.1.4.3 and onos-a1t v.0.2.3 allows a remote attacker to cause a denial of service via the onos-a1t component of the sdran-in-a-box, specifically the DeleteWatcher function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/bergen876/5a21f78e266c12aa2586beb2178443b0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/onosproject/sdran-in-a-box/issues/206", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48878.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48878.json index d60a45a690c..ff050de8ef3 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48878.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48878", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-11-04T11:15:06.417", - "lastModified": "2024-11-04T11:15:06.417", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50024.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50024.json index 0326e1b890a..f9b1f0e1ff3 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50024.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50024.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50024", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:15.850", - "lastModified": "2024-10-25T15:08:58.293", + "lastModified": "2024-11-04T18:34:56.237", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,38 +60,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.32", "versionEndExcluding": "5.10.227", - "matchCriteriaId": "55B1128C-32C2-4BFA-94CA-82EBE52BE30E" + "matchCriteriaId": "BF903132-A3AF-4A91-AFA9-3C8A9C378FAE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.168", - "matchCriteriaId": "B8FAF52D-C7FB-4C74-AAE4-40660F84762E" + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.113", - "matchCriteriaId": "504F69F3-4FD5-4DA8-BDB2-29C3596A3E0C" + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.57", - "matchCriteriaId": "93BCF2E0-79C7-4648-9026-BB2D02449545" + "matchCriteriaId": "05D83DB8-7465-4F88-AFB2-980011992AC1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.11.4", - "matchCriteriaId": "327EC9BC-2736-40A9-839A-3068588BE430" + "matchCriteriaId": "AA84D336-CE9A-4535-B901-1AD77EC17C34" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50036.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50036.json index 8e44bc18168..74f29d5625c 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50036.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50036.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50036", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:16.717", - "lastModified": "2024-10-25T15:41:31.273", + "lastModified": "2024-11-04T18:34:21.040", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,45 +60,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.10.50", "versionEndExcluding": "3.11", - "matchCriteriaId": "2702B874-20FE-463B-A335-04F2589F4DC5" + "matchCriteriaId": "EB008871-978A-402A-8407-15291079DC44" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.12.26", "versionEndExcluding": "3.13", - "matchCriteriaId": "429F18C3-B964-4E6B-B230-62AFAB287B6A" + "matchCriteriaId": "597B9ABF-E2FF-405B-8226-0BD990181032" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.14.14", "versionEndExcluding": "3.15", - "matchCriteriaId": "FFD7BD6D-B8D7-4500-B111-701224430EE3" + "matchCriteriaId": "6241E34F-0DAB-4BE0-AD33-1BEEDA5841C9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.15.7", "versionEndExcluding": "3.16", - "matchCriteriaId": "FE4AB437-E3F2-44F6-A535-9DC3B6975B1D" + "matchCriteriaId": "F88CDBE1-4ECE-4BE4-B2A6-7E814D3EA822" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.16", "versionEndExcluding": "6.6.57", - "matchCriteriaId": "B63575AE-DD69-4DB8-AC13-036544FA3558" + "matchCriteriaId": "8D4764C3-4502-4F9B-8704-85262723C867" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7", "versionEndExcluding": "6.11.4", - "matchCriteriaId": "327EC9BC-2736-40A9-839A-3068588BE430" + "matchCriteriaId": "AA84D336-CE9A-4535-B901-1AD77EC17C34" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json index 21521d0a87f..3b49fb008c2 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50067", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-28T01:15:02.930", - "lastModified": "2024-11-04T12:16:09.967", - "vulnStatus": "Modified", + "lastModified": "2024-11-04T18:34:01.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,10 +60,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.14", "versionEndExcluding": "6.12", - "matchCriteriaId": "E1469267-C646-45B9-8184-EDA367A2CF53" + "matchCriteriaId": "8F4406AF-A340-4EB4-9920-E502C2DA6CCC" }, { "vulnerable": true, @@ -100,11 +100,17 @@ }, { "url": "https://git.kernel.org/stable/c/537ad4a431f6dddbf15d40d19f24bb9ee12b55cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e5f93788c9dd4309e75a56860a1ac44a8e117b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50523.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50523.json index ca97ffee8ac..69518dab7ad 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50523.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50523.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50523", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:14.770", - "lastModified": "2024-11-04T14:15:14.770", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50525.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50525.json index 59bf73c38d6..74ede19c7f3 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50525.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50525.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50525", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:14.983", - "lastModified": "2024-11-04T14:15:14.983", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50526.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50526.json index c7cf69d816b..cb209c1c2c4 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50526.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50526.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50526", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:15.170", - "lastModified": "2024-11-04T14:15:15.170", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50527.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50527.json index d26c39f1bda..f6f1c305e7f 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50527.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50527", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:15.367", - "lastModified": "2024-11-04T14:15:15.367", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50528.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50528.json index 5fc980b1fef..54fe5fa5389 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50528.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50528", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:15.560", - "lastModified": "2024-11-04T14:15:15.560", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50529.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50529.json index 5b10d5d95b5..34e528cb19a 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50529.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50529.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50529", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:15.750", - "lastModified": "2024-11-04T14:15:15.750", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50530.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50530.json index 1cdc9000c89..93eef2fa9a0 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50530.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50530.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50530", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:15.937", - "lastModified": "2024-11-04T14:15:15.937", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50531.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50531.json index 5099933d259..079be4e7d9e 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50531.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50531.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50531", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:16.117", - "lastModified": "2024-11-04T14:15:16.117", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51127.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51127.json new file mode 100644 index 00000000000..58a3fd4541a --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51127.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51127", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:05.113", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the createTempFile method of hornetq v2.4.9 allows attackers to arbitrarily overwrite files or access sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://hornetq.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51136.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51136.json new file mode 100644 index 00000000000..b565d533cce --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51136.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-51136", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T17:15:08.050", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An XML External Entity (XXE) vulnerability in Dmoz2CSV in openimaj v1.3.10 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted XML file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/openimaj/openimaj", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/openimaj/openimaj/issues/382", + "source": "cve@mitre.org" + }, + { + "url": "https://mvnrepository.com/artifact/org.openimaj.tools/WebTools", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51244.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51244.json index 4ef24306bd1..c8acbbd9b5e 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51244.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51244.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51244", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T17:15:18.093", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T17:35:31.740", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doIPSec function." + }, + { + "lang": "es", + "value": "En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n doIPSec." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51245.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51245.json index 938c0030790..aa266a12115 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51245.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51245.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51245", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T17:15:18.237", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T17:35:33.130", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DrayTek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the rename_table function." + }, + { + "lang": "es", + "value": " En DrayTek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n rename_table." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json index f38c187b28b..ce056f80697 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51246.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51246", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T14:15:16.303", - "lastModified": "2024-11-04T14:15:16.303", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doPPTP function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51247.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51247.json index 04b8533daf2..45f02671b3e 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51247.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51247.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51247", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T17:15:18.380", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T17:35:35.743", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doPPPo function." + }, + { + "lang": "es", + "value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n doPPPo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51248.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51248.json index 940cd193cd9..17ed04f7c85 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51248.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51248.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51248", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T17:15:18.513", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T17:35:37.110", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the modifyrow function." + }, + { + "lang": "es", + "value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n modifyrow." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json index 8b51b4bada3..43e590c06d9 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51249", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T14:15:16.383", - "lastModified": "2024-11-04T14:15:16.383", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the reboot function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json index 6ba5fea846d..3bbad2d39b6 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51251.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51251", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T14:15:16.453", - "lastModified": "2024-11-04T14:15:16.453", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the backup function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json index 6dfe3e02e94..62a10f2f47d 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51253", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T14:15:16.530", - "lastModified": "2024-11-04T14:15:16.530", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doL2TP function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51326.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51326.json new file mode 100644 index 00000000000..6455230b8d3 --- /dev/null +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51326.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51326", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:05.207", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in projectworlds Travel management System v.1.0 allows a remote attacker to execute arbitrary code via the 't2' parameter in deletesubcategory.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51326%20-%20Union%20SQLi", + "source": "cve@mitre.org" + }, + { + "url": "https://projectworlds.in/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51327.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51327.json new file mode 100644 index 00000000000..20b3ae75045 --- /dev/null +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51327.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51327", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:05.310", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection in loginform.php in ProjectWorld's Travel Management System v1.0 allows remote attackers to bypass authentication via SQL Injection in the 'username' and 'password' fields." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51327%20-%20SQLi%20Auth%20Bypass", + "source": "cve@mitre.org" + }, + { + "url": "https://projectworlds.in/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json new file mode 100644 index 00000000000..eb25c2f9674 --- /dev/null +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51328", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:05.393", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in addcategory.php in projectworld's Travel Management System v1.0 allows remote attacker to inject arbitrary code via the t2 parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51328%20-%20Stored%20XSS%20", + "source": "cve@mitre.org" + }, + { + "url": "https://projectworlds.in/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51329.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51329.json new file mode 100644 index 00000000000..9328168fb8a --- /dev/null +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51329.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51329", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T18:15:05.480", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Host header injection vulnerability in Agile-Board 1.0 allows attackers to obtain the password reset token via user interaction with a crafted password reset link." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/idrsdev/agile-board/tree/main", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51329%20-%20Host%20Header%20Injection", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json index 32f8cdb569c..a8bdd680d84 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51408", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T14:15:16.603", - "lastModified": "2024-11-04T14:15:16.603", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51556.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51556.json index f86b9979021..b5d1a8df083 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51556.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51556", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-11-04T13:17:04.850", - "lastModified": "2024-11-04T13:17:04.850", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51557.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51557.json index 72d559f9464..575ddafbe3c 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51557.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51557.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51557", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-11-04T13:17:05.167", - "lastModified": "2024-11-04T13:17:05.167", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51558.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51558.json index 7b923f3ed3e..b46d491888b 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51558.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51558.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51558", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-11-04T13:17:05.450", - "lastModified": "2024-11-04T13:17:05.450", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51559.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51559.json index 79996a49b19..6bcb252a7f7 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51559.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51559", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-11-04T13:17:05.650", - "lastModified": "2024-11-04T13:17:05.650", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51560.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51560.json index 56704fef773..58554d2ad8a 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51560.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51560.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51560", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-11-04T13:17:05.810", - "lastModified": "2024-11-04T13:17:05.810", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51561.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51561.json index 002cfe4a2b4..5a119683b77 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51561.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51561.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51561", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-11-04T13:17:05.963", - "lastModified": "2024-11-04T13:17:05.963", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51582.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51582.json index fc037cc7288..6678feb8fca 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51582.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51582", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:16.797", - "lastModified": "2024-11-04T14:15:16.797", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json index f929aca1b4d..9f50d6d3650 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51626", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:22.730", - "lastModified": "2024-11-04T15:15:22.730", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51661.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51661.json index ac0e93e822c..5fe14d7444c 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51661.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51661", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T11:15:06.700", - "lastModified": "2024-11-04T11:15:06.700", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json index 79503d2199f..1801730c3ac 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51665", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:16.987", - "lastModified": "2024-11-04T14:15:16.987", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json index 9d31837d641..10a7074651d 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51672", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:17.190", - "lastModified": "2024-11-04T14:15:17.190", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json index 0baa5edae8d..1c6e350950f 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51677", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:22.947", - "lastModified": "2024-11-04T15:15:22.947", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json index 43562b6893d..f8189a66d91 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51678", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.163", - "lastModified": "2024-11-04T15:15:23.163", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json index fb4b9bcf176..8ec62ea4148 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51680", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.367", - "lastModified": "2024-11-04T15:15:23.367", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json index ae292fffea7..3fa83723cce 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51681", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.577", - "lastModified": "2024-11-04T15:15:23.577", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json index 4a0c2164139..49799b3d5f7 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51682", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.787", - "lastModified": "2024-11-04T15:15:23.787", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json index 13157bdba70..52d8db6164e 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51683", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:24.013", - "lastModified": "2024-11-04T15:15:24.013", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51685.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51685.json index 896c156edf9..7c6ed36c3ff 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51685.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51685", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:24.230", - "lastModified": "2024-11-04T15:15:24.230", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json index c6f4cf6a6c6..6143ba86bed 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6536.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6536", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-30T06:15:04.013", - "lastModified": "2024-07-30T13:32:45.943", + "lastModified": "2024-11-04T17:35:41.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento de WordPress Zephyr Project Manager anterior a 3.3.99 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como editores y administradores, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ee40c1c6-4186-4b97-866c-fb0e76cedeb8/", diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9147.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9147.json index 86673cd9e60..7636c36ed85 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9147.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9147.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9147", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-11-04T13:17:06.120", - "lastModified": "2024-11-04T13:17:06.120", - "vulnStatus": "Received", + "lastModified": "2024-11-04T18:50:05.607", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json index 456b806f7c6..04c1819fa05 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9287", "sourceIdentifier": "cna@python.org", "published": "2024-10-22T17:15:06.697", - "lastModified": "2024-10-30T16:15:05.100", + "lastModified": "2024-11-04T18:15:05.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -74,6 +74,22 @@ } ], "references": [ + { + "url": "https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483", "source": "cna@python.org" diff --git a/README.md b/README.md index 8add4d834c6..f7c5a5c9c3d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-04T17:00:19.732272+00:00 +2024-11-04T19:00:20.374735+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-04T16:52:48.677000+00:00 +2024-11-04T18:55:38.580000+00:00 ``` ### Last Data Feed Release @@ -33,63 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -268144 +268156 ``` ### CVEs added in the last Commit -Recently added CVEs: `19` +Recently added CVEs: `12` -- [CVE-2024-10764](CVE-2024/CVE-2024-107xx/CVE-2024-10764.json) (`2024-11-04T16:15:04.497`) -- [CVE-2024-10765](CVE-2024/CVE-2024-107xx/CVE-2024-10765.json) (`2024-11-04T16:15:04.890`) -- [CVE-2024-45882](CVE-2024/CVE-2024-458xx/CVE-2024-45882.json) (`2024-11-04T15:15:21.837`) -- [CVE-2024-45884](CVE-2024/CVE-2024-458xx/CVE-2024-45884.json) (`2024-11-04T15:15:21.937`) -- [CVE-2024-45885](CVE-2024/CVE-2024-458xx/CVE-2024-45885.json) (`2024-11-04T15:15:22.040`) -- [CVE-2024-45887](CVE-2024/CVE-2024-458xx/CVE-2024-45887.json) (`2024-11-04T15:15:22.123`) -- [CVE-2024-45888](CVE-2024/CVE-2024-458xx/CVE-2024-45888.json) (`2024-11-04T15:15:22.210`) -- [CVE-2024-45889](CVE-2024/CVE-2024-458xx/CVE-2024-45889.json) (`2024-11-04T15:15:22.297`) -- [CVE-2024-45890](CVE-2024/CVE-2024-458xx/CVE-2024-45890.json) (`2024-11-04T15:15:22.400`) -- [CVE-2024-45891](CVE-2024/CVE-2024-458xx/CVE-2024-45891.json) (`2024-11-04T15:15:22.477`) -- [CVE-2024-45893](CVE-2024/CVE-2024-458xx/CVE-2024-45893.json) (`2024-11-04T15:15:22.560`) -- [CVE-2024-51626](CVE-2024/CVE-2024-516xx/CVE-2024-51626.json) (`2024-11-04T15:15:22.730`) -- [CVE-2024-51677](CVE-2024/CVE-2024-516xx/CVE-2024-51677.json) (`2024-11-04T15:15:22.947`) -- [CVE-2024-51678](CVE-2024/CVE-2024-516xx/CVE-2024-51678.json) (`2024-11-04T15:15:23.163`) -- [CVE-2024-51680](CVE-2024/CVE-2024-516xx/CVE-2024-51680.json) (`2024-11-04T15:15:23.367`) -- [CVE-2024-51681](CVE-2024/CVE-2024-516xx/CVE-2024-51681.json) (`2024-11-04T15:15:23.577`) -- [CVE-2024-51682](CVE-2024/CVE-2024-516xx/CVE-2024-51682.json) (`2024-11-04T15:15:23.787`) -- [CVE-2024-51683](CVE-2024/CVE-2024-516xx/CVE-2024-51683.json) (`2024-11-04T15:15:24.013`) -- [CVE-2024-51685](CVE-2024/CVE-2024-516xx/CVE-2024-51685.json) (`2024-11-04T15:15:24.230`) +- [CVE-2024-10766](CVE-2024/CVE-2024-107xx/CVE-2024-10766.json) (`2024-11-04T18:15:04.330`) +- [CVE-2024-34882](CVE-2024/CVE-2024-348xx/CVE-2024-34882.json) (`2024-11-04T18:15:04.683`) +- [CVE-2024-34883](CVE-2024/CVE-2024-348xx/CVE-2024-34883.json) (`2024-11-04T18:15:04.787`) +- [CVE-2024-34887](CVE-2024/CVE-2024-348xx/CVE-2024-34887.json) (`2024-11-04T18:15:04.867`) +- [CVE-2024-48336](CVE-2024/CVE-2024-483xx/CVE-2024-48336.json) (`2024-11-04T18:15:05.027`) +- [CVE-2024-48809](CVE-2024/CVE-2024-488xx/CVE-2024-48809.json) (`2024-11-04T17:15:07.880`) +- [CVE-2024-51127](CVE-2024/CVE-2024-511xx/CVE-2024-51127.json) (`2024-11-04T18:15:05.113`) +- [CVE-2024-51136](CVE-2024/CVE-2024-511xx/CVE-2024-51136.json) (`2024-11-04T17:15:08.050`) +- [CVE-2024-51326](CVE-2024/CVE-2024-513xx/CVE-2024-51326.json) (`2024-11-04T18:15:05.207`) +- [CVE-2024-51327](CVE-2024/CVE-2024-513xx/CVE-2024-51327.json) (`2024-11-04T18:15:05.310`) +- [CVE-2024-51328](CVE-2024/CVE-2024-513xx/CVE-2024-51328.json) (`2024-11-04T18:15:05.393`) +- [CVE-2024-51329](CVE-2024/CVE-2024-513xx/CVE-2024-51329.json) (`2024-11-04T18:15:05.480`) ### CVEs modified in the last Commit -Recently modified CVEs: `27` +Recently modified CVEs: `173` -- [CVE-2022-37620](CVE-2022/CVE-2022-376xx/CVE-2022-37620.json) (`2024-11-04T16:52:48.677`) -- [CVE-2023-52544](CVE-2023/CVE-2023-525xx/CVE-2023-52544.json) (`2024-11-04T15:35:10.043`) -- [CVE-2024-10389](CVE-2024/CVE-2024-103xx/CVE-2024-10389.json) (`2024-11-04T16:35:03.007`) -- [CVE-2024-10615](CVE-2024/CVE-2024-106xx/CVE-2024-10615.json) (`2024-11-04T16:45:15.873`) -- [CVE-2024-10616](CVE-2024/CVE-2024-106xx/CVE-2024-10616.json) (`2024-11-04T16:44:56.000`) -- [CVE-2024-10617](CVE-2024/CVE-2024-106xx/CVE-2024-10617.json) (`2024-11-04T16:44:40.280`) -- [CVE-2024-10618](CVE-2024/CVE-2024-106xx/CVE-2024-10618.json) (`2024-11-04T15:11:29.697`) -- [CVE-2024-10619](CVE-2024/CVE-2024-106xx/CVE-2024-10619.json) (`2024-11-04T15:11:44.627`) -- [CVE-2024-10730](CVE-2024/CVE-2024-107xx/CVE-2024-10730.json) (`2024-11-04T16:42:33.607`) -- [CVE-2024-10731](CVE-2024/CVE-2024-107xx/CVE-2024-10731.json) (`2024-11-04T16:43:04.747`) -- [CVE-2024-10732](CVE-2024/CVE-2024-107xx/CVE-2024-10732.json) (`2024-11-04T16:43:49.787`) -- [CVE-2024-20051](CVE-2024/CVE-2024-200xx/CVE-2024-20051.json) (`2024-11-04T15:35:27.250`) -- [CVE-2024-20065](CVE-2024/CVE-2024-200xx/CVE-2024-20065.json) (`2024-11-04T15:35:27.450`) -- [CVE-2024-22721](CVE-2024/CVE-2024-227xx/CVE-2024-22721.json) (`2024-11-04T15:35:27.650`) -- [CVE-2024-24050](CVE-2024/CVE-2024-240xx/CVE-2024-24050.json) (`2024-11-04T16:35:03.377`) -- [CVE-2024-27867](CVE-2024/CVE-2024-278xx/CVE-2024-27867.json) (`2024-11-04T15:35:28.613`) -- [CVE-2024-28288](CVE-2024/CVE-2024-282xx/CVE-2024-28288.json) (`2024-11-04T15:35:28.810`) -- [CVE-2024-28327](CVE-2024/CVE-2024-283xx/CVE-2024-28327.json) (`2024-11-04T15:35:29.603`) -- [CVE-2024-30883](CVE-2024/CVE-2024-308xx/CVE-2024-30883.json) (`2024-11-04T15:35:30.403`) -- [CVE-2024-30890](CVE-2024/CVE-2024-308xx/CVE-2024-30890.json) (`2024-11-04T15:35:31.227`) -- [CVE-2024-33851](CVE-2024/CVE-2024-338xx/CVE-2024-33851.json) (`2024-11-04T15:35:31.737`) -- [CVE-2024-35312](CVE-2024/CVE-2024-353xx/CVE-2024-35312.json) (`2024-11-04T15:35:31.940`) -- [CVE-2024-4766](CVE-2024/CVE-2024-47xx/CVE-2024-4766.json) (`2024-11-04T15:35:35.123`) -- [CVE-2024-6657](CVE-2024/CVE-2024-66xx/CVE-2024-6657.json) (`2024-11-04T15:15:24.440`) -- [CVE-2024-9167](CVE-2024/CVE-2024-91xx/CVE-2024-9167.json) (`2024-11-04T15:15:24.557`) +- [CVE-2024-51249](CVE-2024/CVE-2024-512xx/CVE-2024-51249.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51251](CVE-2024/CVE-2024-512xx/CVE-2024-51251.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51253](CVE-2024/CVE-2024-512xx/CVE-2024-51253.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51408](CVE-2024/CVE-2024-514xx/CVE-2024-51408.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51556](CVE-2024/CVE-2024-515xx/CVE-2024-51556.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51557](CVE-2024/CVE-2024-515xx/CVE-2024-51557.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51558](CVE-2024/CVE-2024-515xx/CVE-2024-51558.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51559](CVE-2024/CVE-2024-515xx/CVE-2024-51559.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51560](CVE-2024/CVE-2024-515xx/CVE-2024-51560.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51561](CVE-2024/CVE-2024-515xx/CVE-2024-51561.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51582](CVE-2024/CVE-2024-515xx/CVE-2024-51582.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51626](CVE-2024/CVE-2024-516xx/CVE-2024-51626.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51661](CVE-2024/CVE-2024-516xx/CVE-2024-51661.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51665](CVE-2024/CVE-2024-516xx/CVE-2024-51665.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51672](CVE-2024/CVE-2024-516xx/CVE-2024-51672.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51677](CVE-2024/CVE-2024-516xx/CVE-2024-51677.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51678](CVE-2024/CVE-2024-516xx/CVE-2024-51678.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51680](CVE-2024/CVE-2024-516xx/CVE-2024-51680.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51681](CVE-2024/CVE-2024-516xx/CVE-2024-51681.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51682](CVE-2024/CVE-2024-516xx/CVE-2024-51682.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51683](CVE-2024/CVE-2024-516xx/CVE-2024-51683.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-51685](CVE-2024/CVE-2024-516xx/CVE-2024-51685.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-6536](CVE-2024/CVE-2024-65xx/CVE-2024-6536.json) (`2024-11-04T17:35:41.007`) +- [CVE-2024-9147](CVE-2024/CVE-2024-91xx/CVE-2024-9147.json) (`2024-11-04T18:50:05.607`) +- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-11-04T18:15:05.627`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d785153f931..7c0cb8999f3 100644 --- a/_state.csv +++ b/_state.csv @@ -73296,13 +73296,13 @@ CVE-2014-9821,0,0,a10b48c2cb08a38b661a78e7ffe89d9338aaea4c031262e788484d74d6c196 CVE-2014-9822,0,0,1b7a686e93975c0ed2ea9590e1f4a4becfcc480eb5e7c0da7b10f83a3454a55b,2024-10-31T19:56:51.983000 CVE-2014-9823,0,0,5b4f713b1aa371727f052d1e24491ccb5acf554c78179b76d7033ebe478b1155,2024-10-31T19:56:59.013000 CVE-2014-9824,0,0,a381cf0247b001d2b073d67346571aa1dc1560c09759e173df27875b30a4c9c9,2024-10-31T19:57:06.380000 -CVE-2014-9825,0,0,8237657f1bc545991336e8373e80d977dec8ae49fdc4a04e44914118dadb3791,2017-04-10T22:31:05.007000 +CVE-2014-9825,0,1,d101e503c09f6e6082e188174e52c62e24b5ca674dc710efcf5b1bc0a5aa0441,2024-11-04T18:55:24.060000 CVE-2014-9826,0,0,860ab0020773466be74236a4548947dce8cf843f8de8cac7e27b4d6c73bb939a,2017-04-04T15:09:57.817000 -CVE-2014-9827,0,0,ca945600dc5be9a5edda22d9a67746fe77c869edcce014d962be9a7759e736ab,2017-08-08T16:22:13.923000 -CVE-2014-9828,0,0,ba10be34d0d6516c3996e007a19c92190e4cc058e588feaf531a20d2908b7b8d,2017-08-08T16:20:52.673000 -CVE-2014-9829,0,0,76332fe8e50ad3946962f67f8045282aa1bb17f323ff8460e8987c9249bd2be9,2017-05-09T12:40:33.057000 -CVE-2014-9830,0,0,6bf5fd26cd6ac3f72e775e9676af92910a99e3688c95e81ec0e61f7df7358dcf,2017-08-08T16:28:54.523000 -CVE-2014-9831,0,0,ad209a5d39fb22eed17c4c9a642e08a1aba1847961a0146c8747dc630e035508,2017-08-08T16:24:53.473000 +CVE-2014-9827,0,1,72c893d8e6fc9424d1240f349d84e581750673a3a31dff7dab4aff66279d67ba,2024-11-04T18:55:06.360000 +CVE-2014-9828,0,1,da6df16a5ca83fb738bd5c446e89e992751c72c5d551a7eaf2be4861037c9bea,2024-11-04T18:53:21.077000 +CVE-2014-9829,0,1,d1e034c250811e4896fd2678b6320e68c2e3210e4e4e033af0977f1df3a19db9,2024-11-04T18:53:00.827000 +CVE-2014-9830,0,1,0f184f38764a4102d76c0674029dca46ce8e23a47f4fa8209f0f7b7ac0f634b7,2024-11-04T18:52:34.957000 +CVE-2014-9831,0,1,8906e9c19fbb7ca6cef850dc6148e7aada5ffdc646cdfd28f9e9247c568b79c0,2024-11-04T18:50:14.833000 CVE-2014-9832,0,0,f4c9c46492ce32d720439901293429b2bde360d262ac3dab77bfb7286622b851,2017-03-24T12:39:25.350000 CVE-2014-9833,0,0,ba752ec697e0cbbbd7638d418562d744e744957d16591caaca98f467a9f7af6a,2017-03-24T12:39:31.367000 CVE-2014-9834,0,0,23f9e8bf52d2fb29ece768bfdd7ad96153a515c50fe9b79758374b726cd4e77d,2017-03-24T12:39:36.040000 @@ -73319,13 +73319,13 @@ CVE-2014-9844,0,0,05640cc96b6e6b44623c6925119d31879036f01b4b263b4e9f2b60d4f829ea CVE-2014-9845,0,0,6049508ba42111e1f47b9053c88472e273702be69ee16083e810de6f4b2caaf4,2018-10-30T16:27:37.467000 CVE-2014-9846,0,0,9b9aa021de58b7c8ae4df9109a2e387b0524add155e9510b000f263c36198606,2018-10-30T16:27:37.467000 CVE-2014-9847,0,0,0216f650265c3b41a9c8f5f928489b69e615ed1366efcea424356a20c157e172,2018-10-30T16:27:37.467000 -CVE-2014-9848,0,0,1c6f605a52e611d273519895854b55c1a82bab017536ae2eb10453a283d4a559,2018-10-30T16:27:37.467000 +CVE-2014-9848,0,1,1174b38ef289c68d153fd20f7fda420ffd5eee6ab807cceda1511cd2d37680a9,2024-11-04T18:49:53.660000 CVE-2014-9849,0,0,81170460990ec391e5fb1ee6b1796ef3dc2ad44d7843abc2de515e3367bb5ca6,2018-10-30T16:27:37.467000 CVE-2014-9850,0,0,5101491cecdcc0214cfb438cf77e8fff18e3cc649b61b48af2d45c978fd8478f,2018-10-30T16:27:37.467000 CVE-2014-9851,0,0,3cb7e7b40af7f4652eb38a2dc3f6eb89735d0f81f15d22623e978aad96253c0a,2018-10-30T16:27:37.467000 -CVE-2014-9852,0,0,cda9c2c9fed2e40e2e8da4561102ba7656a0c49eeb5270c440db4ecdf503b82a,2018-10-30T16:27:37.467000 -CVE-2014-9853,0,0,5c7176aa64d30a181e6e8011c7de4c3726b317708bf267a862e46d0ce390ca5e,2018-10-30T16:27:37.467000 -CVE-2014-9854,0,0,7655e6d0c62078532d131a72f96c497c822a83f9b7b0cab16bfc336943f823bf,2018-10-30T16:27:37.717000 +CVE-2014-9852,0,1,a4925c330c92cd55d484b946ffbdec6fa86f30191cdd63728b0a6dcde2d581a8,2024-11-04T18:49:46.877000 +CVE-2014-9853,0,1,2f1c6a4124afaf29b236e71b4f8068a75979cc6ca0c5137f6d738d6ee2a2341f,2024-11-04T18:49:37.570000 +CVE-2014-9854,0,1,55a9646c2c63f2e2c4a3c2c1ceb47c5cdc631316975e57cbf2d9f7322e9a78a8,2024-11-04T18:49:30.603000 CVE-2014-9862,0,0,659989a52282877bf97b6f43ed241545b5469be31d568b4a5c4c76b7c30234da,2020-09-17T14:15:12.343000 CVE-2014-9863,0,0,08adb223d08b08f3ad185495429c48ef85b6a32d516b8f1f322614bd8911e062,2016-11-28T19:15:05.683000 CVE-2014-9864,0,0,9cc0dabb2fd7a892a73971ab6ce2a819e436df1250f891cdf0ce20521eff81ae,2016-11-28T19:15:06.620000 @@ -73371,7 +73371,7 @@ CVE-2014-9903,0,0,3c3364b597d9512b64981e3817efdf3af9281467a82c7a44d580da4dedcc80 CVE-2014-9904,0,0,ca51f4ba3cd0c1d839518211136b0bf260f44789728e316852af0d7835c8d7fe,2023-01-17T21:42:22.280000 CVE-2014-9905,0,0,c0a0390d3f31ab7ff8f1652b0583ad9a617497ec01918bc3b6f50538aa0b8c0d,2022-12-20T16:52:37.880000 CVE-2014-9906,0,0,e21f58e9b909387c967735f7022dce4cc57dd4b355e0126b643a920d898efdd6,2016-11-28T19:15:49.847000 -CVE-2014-9907,0,0,45df7f8063def51d7f781175bad4635093f73b900b352cd63ea80ea3e9ddb8d2,2017-05-09T12:40:25.760000 +CVE-2014-9907,0,1,3d67528f4ad1b73e37b530ced1fd0f2220f392b8fa17942df249340725942587,2024-11-04T18:49:20.907000 CVE-2014-9908,0,0,35e41efc1256ffbf38b02fdbca717f1c3365b32de708e17c03c361ee3a8bf607,2020-01-13T21:01:20.453000 CVE-2014-9909,0,0,99f41d2524595ad235bd0d8e32c13b3eb20e03fb5e1920c64a25acfd1c0c715f,2017-01-20T02:59:02.827000 CVE-2014-9910,0,0,970ad47a429a59199e9cdc655b178479768d23b5d77dad5afebac000e404fca2,2017-01-20T02:59:02.870000 @@ -83465,8 +83465,8 @@ CVE-2016-10140,0,0,e41cd82f3c55eaf993fe959d6851e52a78c27f5e92eb8da9969f1d8f2b390 CVE-2016-10141,0,0,bd054c5d51cb1e20af51c3c4a2dd42453f9b3b7b7c0f06baca9d8d8479c8bcb5,2023-11-07T02:29:31.753000 CVE-2016-10142,0,0,ef0621fcec1497763bfe129efe28b498ec891f1c4e995754ceefd4ddc22409ae,2023-11-07T02:29:31.830000 CVE-2016-10143,0,0,c9281f523f56ceee5ed579abb3bfb67203d358bc79cf466532b0ce83a10ea20e,2017-03-14T01:59:00.333000 -CVE-2016-10144,0,0,3e597c27810c67a8f4f024a3fc6dc5b102e5f09af4eeca1602c415ce588ce3e1,2017-11-04T01:29:15.677000 -CVE-2016-10145,0,0,43f7b7611fd4b6e119f05198cbbbddfe85d76e19985459eebd1c7bbb91e2b922,2017-11-04T01:29:15.740000 +CVE-2016-10144,0,1,237c80d7c8016be1d43b0ae87fea34d37a380688c12421738ba6cbe399a00793,2024-11-04T18:48:46.350000 +CVE-2016-10145,0,1,c3fc1d11655b4d3a65e85cfa6c2d486f58dba5f751f72d51cec4501755c3ef46,2024-11-04T18:45:24.470000 CVE-2016-10146,0,0,dc530eed2010ae83edb60518ce68eacdd83dd3d5ba5b1e0b5367935ac4b0ee01,2017-11-04T01:29:15.787000 CVE-2016-10147,0,0,14848770473e2f0cdc7f6d0b11ad5ca9a287cc99358656e1997db28569d707a1,2023-02-12T23:16:49.557000 CVE-2016-10148,0,0,0b93c7f6a79f52f11ed2692aa806523f9eaa05a4289d5f4bb5c3568ab83403c9,2017-03-16T01:59:00.887000 @@ -90459,7 +90459,7 @@ CVE-2016-7528,0,0,c16129d2462881b38bc83868468c620340a98142b2c9d4ae0116ffa0131b62 CVE-2016-7529,0,0,815c7fdada9f9e2bc75a51b9f5d1bf734db049324d2d75ffe30ad23eea1b27df,2024-07-03T15:22:20.367000 CVE-2016-7530,0,0,6492e65bbb8672ec847a4514447a6f39c1d56b13a2cf7c79ef9c970546f67022,2024-07-03T15:22:34.133000 CVE-2016-7531,0,0,c15056ad0b2cfe60b5b6e425711faabdbd0d18e669e26e61664e67468a59b7a2,2017-05-09T12:39:15.447000 -CVE-2016-7532,0,0,22f7e93a10dc40788c1562890bf58dd7b4c8eb8af1834f6c53053c6e06880468,2017-05-09T12:39:12.837000 +CVE-2016-7532,0,1,2c355ffc793fc8d79b23839d2327b5134d031a650ffe2d95f63e871231ba72e6,2024-11-04T18:55:38.580000 CVE-2016-7533,0,0,0b5c1dbe1976d2fc2f4abf252703deacc66d9d8030522be17c5c1c20eb40fb1b,2024-07-03T15:23:17.167000 CVE-2016-7534,0,0,1d15b6b809a00df4dfaaa24cd210f52122b7bfacbd0bd967b9c1a2a0a459bd8d,2024-07-10T14:33:13.477000 CVE-2016-7535,0,0,8364736a933b4b4150718ace08297add9cf1bdd850ae670287119fb063330282,2024-07-10T14:33:28.527000 @@ -182175,7 +182175,7 @@ CVE-2021-40336,0,0,dd8ba1d52378bca04c97754249bf363627f42c7571f337b4303edd681c6d1 CVE-2021-40337,0,0,762407104695431913677ed30b66b8eada1f886a677eca141e7cbaf23910f855,2022-01-31T20:44:02.860000 CVE-2021-40338,0,0,a6cc55299b627e8ac7cbdce044a016e36499b2386a043f1425d24a74b3e694de,2022-08-09T00:50:27.057000 CVE-2021-40339,0,0,962441e8a2f4e2abc8b61ac9755fc9deed4ade0d8cde8808db7b23c203cfde8f,2022-02-03T17:33:22.717000 -CVE-2021-4034,0,1,d1282fea5dbd8faa772c600b8b063603736c3959e62d3572e8265227b14fb3c0,2024-11-04T16:35:01.707000 +CVE-2021-4034,0,0,d1282fea5dbd8faa772c600b8b063603736c3959e62d3572e8265227b14fb3c0,2024-11-04T16:35:01.707000 CVE-2021-40340,0,0,97485ab93501cff6d0168603d57ba679ebd8c6d1b7d1fc83adc3dc8fc685e3c4,2022-02-03T17:37:01.523000 CVE-2021-40341,0,0,cb763aca376b2feb718d525045b2ae60001c95564a590354243545786bd58354,2023-11-07T03:38:33.497000 CVE-2021-40342,0,0,6f4827b7de1bcb4bb732ce8022b862a333338f91e179d6af4d20e9c6e2dc3263,2023-11-07T03:38:33.573000 @@ -186900,7 +186900,7 @@ CVE-2021-46974,0,0,68106efb1dea0e888fc3f320c7c7f115f18907377c2b796169ea6fdae092b CVE-2021-46975,0,0,379ee4cd812bfdbb2fdb73351c9c5db9b3f393ba3702c95ca5be896799b9eeec,2024-03-19T14:15:07.467000 CVE-2021-46976,0,0,d459fe959a5a76c1fabcab8d05c872a73f329bb3a08d112447c0d44f1b1b1803,2024-02-28T14:06:45.783000 CVE-2021-46977,0,0,d1d161e94901e50528f60d982519891204ae84ebfa26840884a3742c374819f7,2024-02-28T14:06:45.783000 -CVE-2021-46978,0,0,4fd4e0c0921c5aa3d66a4df3e4ae843410139a551e32f487173058840b17e736,2024-02-28T14:06:45.783000 +CVE-2021-46978,0,1,0187421fdb780c5e8402e6f5d3328f1325a92158cb760e25754a40716ed6a9f2,2024-11-04T18:35:00.933000 CVE-2021-46979,0,0,c37c9c214f340e677412cf2d33e7caafefcb389b424397f0168c07f01ce4d395,2024-02-28T14:06:45.783000 CVE-2021-46980,0,0,58325d996fe77641a4d00dbfe23b24bd7564ddab119d93d92ae442b18a3036cb,2024-02-28T14:06:45.783000 CVE-2021-46981,0,0,7c3826cb77987b8c9c9e2349d834ad83f81a936ca88dee47698c5d7da692053a,2024-02-28T14:06:45.783000 @@ -186911,7 +186911,7 @@ CVE-2021-46985,0,0,e5ec7d62e2dc241caedb03fb75bb65f46b7b8503decf87c3c257b8e400319 CVE-2021-46986,0,0,ebd0dd8fe5db0b48cbd262a90b8e8423d57b98cf2e9d94a4cda5e99e2875036e,2024-02-28T14:06:45.783000 CVE-2021-46987,0,0,c8633812fefd31995d23ecde0454c24318fd6e76ce3d74ee491b6218c131b2c9,2024-02-28T14:06:45.783000 CVE-2021-46988,0,0,a9ba9f369fea8a4d24ea3389b2ab5fa9be247ca1e8ca43aa55f681f99b5ccccb,2024-02-28T14:06:45.783000 -CVE-2021-46989,0,0,183416693ba6f372ebf4b3b3edcfe64e5a764bcc86d900fca103387a1e8557eb,2024-02-28T14:06:45.783000 +CVE-2021-46989,0,1,7866592ccbf1276372121c94c8485d5e30621d2f483a5264775b43216b0a6e03,2024-11-04T17:35:01.073000 CVE-2021-46990,0,0,3e4ac0af655ffa67aafe6583a51f4992e8dee7b3c5537062fca28ff84cfa3c9d,2024-02-28T14:06:45.783000 CVE-2021-46991,0,0,f3f161f91325f1426ad11e08d068f744953007e52a77b86fa73cc8203e02b7de,2024-02-28T14:06:45.783000 CVE-2021-46992,0,0,3b16720d3cef6c7f4a65ba23608e80851b1f858dd42d7ebe5c67c0d0e5a3f026,2024-02-28T14:06:45.783000 @@ -186966,7 +186966,7 @@ CVE-2021-47040,0,0,84ff3bafb4df71a01a584cf0d1216a5dc4f656f10350ce702f9885829de3d CVE-2021-47041,0,0,5bbef1bda2211d11616202302db5de2eb2b211978d2a678bbdf26df255371c69,2024-02-28T14:06:45.783000 CVE-2021-47042,0,0,4837a63de577c894fb1e2d57b5556538bb59eb7b609f368c9d56694f7cab2b82,2024-02-28T14:06:45.783000 CVE-2021-47043,0,0,a30aae0e86cae1f5c5dc4f207b2e3c34cd30973ca644656944c78b3bb7967ca8,2024-02-28T14:06:45.783000 -CVE-2021-47044,0,0,b8ed7f7c6f1fe9dd16715e56a5fad5f8318385707b2ce64fd61ea28b5e623a9e,2024-02-28T14:06:45.783000 +CVE-2021-47044,0,1,1e5d1e4d770c8ee1cc95c9eb8184f91bbfbe0dbc488a180598dbb2e7b19a3d6e,2024-11-04T17:35:01.323000 CVE-2021-47045,0,0,7d850b3bf5b32401514a226ef2231c9e572882fdaee826d8ee2f4d904b6a3ed2,2024-02-28T14:06:45.783000 CVE-2021-47046,0,0,c6e0c7a9d3ccf4567bd445327f70a7b7d6b7a1f8e55d897a4862451a7c7d41ee,2024-02-28T14:06:45.783000 CVE-2021-47047,0,0,a5be49f7ba267bddcbda30bf54b32c88976252fbacf1f803efbd8e0bfc5c96bc,2024-02-28T14:06:45.783000 @@ -187052,7 +187052,7 @@ CVE-2021-47126,0,0,a034e294c1d1b663d08eaf969805865c1efbc89fcc8511c70b55bf9fe0c91 CVE-2021-47127,0,0,e4981b245281ea0af5618150d4684033b91a573e39d2b09ae4cf2fd729abd995,2024-03-17T22:38:29.433000 CVE-2021-47128,0,0,d4b8a83073f5f99b0dad82cbfd95dacc611cbe63c431e8fa1d88a19ed32ba271,2024-03-17T22:38:29.433000 CVE-2021-47129,0,0,0b91474c287c9fac5441e0bfddbeb84807bcf87135fd1024c88789a5dd0ae27e,2024-03-17T22:38:29.433000 -CVE-2021-47130,0,0,3717b6f5799236c44a2aaa4438c5b6b391ba7d18c8a79a0fc222e6458abe3a03,2024-03-17T22:38:29.433000 +CVE-2021-47130,0,1,5b886b2fc7d9d62e8e586a18b61b3d341ddf828bbd4e31d4c16769a790585b87,2024-11-04T17:35:02.347000 CVE-2021-47131,0,0,fc14dc8b737479df9209c72577a6a68af3c4912ed49c51710efaa06b7a718277,2024-03-17T22:38:29.433000 CVE-2021-47132,0,0,724d4921dcb0e535eb4a7121c97e55ed94336b6cbad0341e8c4b65507e7d629b,2024-03-17T22:38:29.433000 CVE-2021-47133,0,0,ae7fd3a33929a5c4e101fee2460851fe1e4a477aecdaff34b7dde35db2cb171f,2024-03-17T22:38:29.433000 @@ -187193,7 +187193,7 @@ CVE-2021-47267,0,0,6349e0bc990c8821b4f1f47330358ad43006a2ca756ca74dc78d487011a23 CVE-2021-47268,0,0,f7ae2ff7dc4130803f352293a0eb617910736952e5ca52dcc0839f9aed403876,2024-05-21T16:54:26.047000 CVE-2021-47269,0,0,c2c5b47a5a979a7f48e0f6de92f8080fa46cdab42d8445b05c910db852887da9,2024-05-21T16:54:26.047000 CVE-2021-47270,0,0,ba39234c032bc1c921b7e7a36fa33cfb1260f9f29471d99d62b5b112c5882df4,2024-05-21T16:54:26.047000 -CVE-2021-47271,0,0,88b55876772d89988bcdb29119f87c0324f7371145a19362c788ad10fe4efc1f,2024-05-21T16:54:26.047000 +CVE-2021-47271,0,1,6898381db67887cd7465156fda4a155410858f8a93bfff1b093cf4b56f2976f7,2024-11-04T18:35:01.380000 CVE-2021-47272,0,0,ccf09efbddc0d92c1646801db2efae3f666097c5304c778fd3c94abd16b798b9,2024-05-21T16:54:26.047000 CVE-2021-47273,0,0,c608a2634e582e877617b62d19ef59066408b3424cf2dc765ffbfc0d5cb2d3e3,2024-05-21T16:54:26.047000 CVE-2021-47274,0,0,5e6b9f71d6b39e786c1e9484a9a5c1020a127cc111bfd1e3867b25c1d707414c,2024-07-03T01:37:32.447000 @@ -187473,7 +187473,7 @@ CVE-2021-47547,0,0,9bd2d6e670b856487fa0f6b8bf5630349a5e909414d7a495b56733e3b4f42 CVE-2021-47548,0,0,03a8a3877d4ca0ad093bd20ff48d4aebe255325f8becd5edf1b9a31b21d3ffa9,2024-07-03T01:38:08.723000 CVE-2021-47549,0,0,513795ad7a7ea3e427214675d10d84c28c33553bc02366f8eefe4045f37975aa,2024-05-24T18:09:20.027000 CVE-2021-47550,0,0,625b7614680ee2b0447f843771d1b01d412586caa610798634da339105c2afb3,2024-06-10T19:23:10.227000 -CVE-2021-47551,0,0,2037ebec9cd8406c75a4393d26ee8abf9ff4a8ae48c5458cedcbca08f15f44c0,2024-07-03T01:38:09.747000 +CVE-2021-47551,0,1,eac531d2e05b82c07ff9255b733606dbe0ffe65bbbebf081e70ce81f529e47aa,2024-11-04T18:35:01.610000 CVE-2021-47552,0,0,5d3d5362faf4887dd9c84f934a6fae5b4c1336fd72a4a6faa1165471dbee6a90,2024-05-24T18:09:20.027000 CVE-2021-47553,0,0,321382f7b9e6bf328f90a5b45f80489cf47e5531e7cf08bf3aa8c852a939d4b6,2024-05-24T18:09:20.027000 CVE-2021-47554,0,0,259e8e5707d266118c9c75a97a5d9e029fb1a3d3dd6cc808c2e17bc1fb0e8874,2024-05-24T18:09:20.027000 @@ -199239,7 +199239,7 @@ CVE-2022-31262,0,0,582d85538a85c85615b416547f8c90371be189749bda0d021ce8d00d8f299 CVE-2022-31263,0,0,7c40bc843920b8f6df5cf44765d5c636fbe80b0fc5325949f4750655b9b508ab,2022-06-02T19:45:24.870000 CVE-2022-31264,0,0,f36248fc9f2daf82235aa936b8cceaa5238aa7398fd96bd8d5798f1cad7efeb4,2023-04-26T19:10:58.567000 CVE-2022-31265,0,0,acb54b71668cf63bf24ebf43dda721f0aee39ca0a336cd714f8b2a69a87a6916,2022-06-08T19:29:28.027000 -CVE-2022-31266,0,1,5e3dabed6c7a4e4fa25c661f23e5b36ba51c9bec1581f51c6a2ec8f2e2cb498b,2024-11-04T16:43:35.470000 +CVE-2022-31266,0,0,5e3dabed6c7a4e4fa25c661f23e5b36ba51c9bec1581f51c6a2ec8f2e2cb498b,2024-11-04T16:43:35.470000 CVE-2022-31267,0,0,20ac115fcbc50c3b2c094913cbfc4ce084933104932559c929c7dd476458f34a,2022-06-07T14:23:16.687000 CVE-2022-31268,0,0,c363b440d03302852d5254e25e9e2447cd5ef1f1baca576befb58333bc00da25,2022-06-02T18:24:43.647000 CVE-2022-31269,0,0,eb485b50f75e373ba3234321e01d5ed4fc46a4eccd3f2e760caefdec7f9514fc,2022-09-02T20:32:08.313000 @@ -204267,7 +204267,7 @@ CVE-2022-37614,0,0,a088abc6d61fd0d171cee6d60502f8bbe2aa020202e9d0c4d4aabda7645fa CVE-2022-37616,0,0,12800177f0f5572c98f49d5374349510eff69e263ee16f160afe1a370301eea0,2023-02-10T16:17:17.560000 CVE-2022-37617,0,0,7db5923364b62a09b0e836629cf3a80cb470af6e55f46e91936e9048d7618e67,2022-10-13T15:35:05.747000 CVE-2022-3762,0,0,c96a8c94252480638b4276efdfcc8d70f413a9a744ad86673bd052d00b7e00ec,2023-11-07T03:51:46.557000 -CVE-2022-37620,0,1,7f5ac2a073219a6d081ade8b8f63aea894333beb68cbe9d911c8ca494effc47d,2024-11-04T16:52:48.677000 +CVE-2022-37620,0,0,7f5ac2a073219a6d081ade8b8f63aea894333beb68cbe9d911c8ca494effc47d,2024-11-04T16:52:48.677000 CVE-2022-37621,0,0,75c295295993741397fb9f82019574b5bda14dc3412d1c3c21ca3565f63542bb,2022-11-03T14:31:33.433000 CVE-2022-37623,0,0,034752aefa6656dcf1090794c682c2acc9b56f49ec294632bf91612ec983d265,2022-11-15T18:52:12.537000 CVE-2022-3763,0,0,4e56dfae977bf6c4344bc7b6783d3acd1359969193857cfb90208f171a368fd9,2023-11-07T03:51:46.637000 @@ -214954,7 +214954,7 @@ CVE-2023-2047,0,0,cffaecf8374ebb191af0f661ba6a6ae01114c895a3998ae75ad057d2324f91 CVE-2023-2048,0,0,3b96fdf8bf6bb1815e88259c23a8e8802bc71a7230a6980ba2168438ccf5766c,2024-05-17T02:22:36.683000 CVE-2023-2049,0,0,8dac22165dd378125a2d02dfc6c92bf36750623be7e8c8651944b5a13cfd2b96,2024-05-17T02:22:36.810000 CVE-2023-2050,0,0,52bd1ab7278b756f4e980be0c308c962c43732bbdb6944a3222ce1a25981c8ca,2024-05-17T02:22:36.920000 -CVE-2023-20509,0,0,395f73289a6f2f7eed9b4f4e528e974be15f70c1b66bce0a7ce57b1b555d4382,2024-08-14T02:07:05.410000 +CVE-2023-20509,0,1,d5079805debaf740012b23a288a83fc5ba0dcdd7af74df5c3331c1379a669e87,2024-11-04T18:35:02.490000 CVE-2023-2051,0,0,aae0b82e887061c7db66b0d038eeb5f5dd09f4b2acd07b8f05b78ea85d55a2f1,2024-05-17T02:22:37.033000 CVE-2023-20510,0,0,a28fddaa3bb3d74952e71d2d049a0f73848147e98f221e4c4bbda55281a9d31f,2024-08-14T02:07:05.410000 CVE-2023-20512,0,0,6c28a8516784d76dc627815e8a69fce65ff900673d7a5c7fb91dedc498c8b14a,2024-10-30T19:35:02.517000 @@ -223837,7 +223837,7 @@ CVE-2023-3130,0,0,ebfebbdee0a909a4baa4899df5c6a28ad3a7a04e265d15250b4d0c062e6eb4 CVE-2023-31300,0,0,c6a4108718dbef116ebe62862a40eb993a0f2f7732323f0332ebfa85216b3aaa,2024-01-08T12:52:27.867000 CVE-2023-31301,0,0,8b4aa9e0020370e9364f1514c1548d00f13f3a6f7e88a244d5ac3dcc0555465f,2024-01-04T21:53:26.990000 CVE-2023-31302,0,0,7db878fe5302d808bd5001becdb205fd1302d85ff5b5989c39244fbd498603b5,2024-01-08T13:04:07.097000 -CVE-2023-31304,0,0,2fcc0cbccc9a53bd2cff69caba5b473620491ec4a68ae2794ad193c9762ea577,2024-08-14T02:07:05.410000 +CVE-2023-31304,0,1,d35cbd3c1a51f731cb3021ec4d7f26ebe776aa5c814e8a89e6392f12283085fa,2024-11-04T17:35:02.577000 CVE-2023-31305,0,0,d9246761767dbfcb2e2f558fb5fc5e1cec565f0df8c900e55c4f4f1cf420ccbb,2024-08-14T02:07:05.410000 CVE-2023-31307,0,0,927363a24df9ec7431f47a682d4205fb756e21f24bd0cd30e96e1e5c0bf4352a,2024-08-14T02:07:05.410000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 @@ -230493,7 +230493,7 @@ CVE-2023-40120,0,0,5b838e8c4c47501317dd05adcfbe80413a66e135a880283ba48578edf0596 CVE-2023-40121,0,0,6f1b8149132fed1f9caf7760d93e85063d510874095d383f4206a9c6ee1cdfd0,2023-10-30T17:13:34.723000 CVE-2023-40122,0,0,e741aaa829c64452d1ac98aa1d049188ec81231d3a0ebd8d7170393b59c86ef8,2024-02-16T13:37:55.033000 CVE-2023-40123,0,0,a013553dba266da76c92a11e3761fe0b31b0c8f54144492635fda08d8a24f69c,2023-10-30T17:13:46.193000 -CVE-2023-40124,0,0,55a029b0f339fd112dd362cda7dae0a62614c1fc07d4a07467a85bcd6ca523f5,2024-02-16T13:37:55.033000 +CVE-2023-40124,0,1,4ae28f7df70f41883dc7bfaffe769bb97ce4e85bcd352b55009b7b03f9d86b13,2024-11-04T17:35:03.337000 CVE-2023-40125,0,0,10829f6953f4822c99106d9d0f88e1b3db3a4e3fb3d7cbcdc340674c9e164399,2023-10-30T17:13:55.827000 CVE-2023-40127,0,0,963ee1f1b403e4155e01a7067eedf37fb5ec80918d54710881ab39a3ebff3036,2023-10-30T17:18:28.157000 CVE-2023-40128,0,0,5ca85b7746c980988a6fa9739296461ca29ba4d7b3cc7003dd0d8020e289c12a,2023-10-30T17:14:16.593000 @@ -232567,7 +232567,7 @@ CVE-2023-4282,0,0,085a2ef782c4ab33d8733756104530425d8c8aa9e976ffea2f9c3c7c799557 CVE-2023-42820,0,0,4f4a424580624de974093ce23efe959ca821d9a703013ffd027ed0f76cbf69b2,2023-09-29T15:04:32.443000 CVE-2023-42821,0,0,66f6aadae2a34eeac865f857102bc3b26a5c60b6e36f3488d9988d4daf35e5af,2023-09-26T14:59:06.790000 CVE-2023-42822,0,0,8190ac9dadae4e7d4fa3ad2550ce9d236b8884c40ebd4e9f3eb483d3c568be1d,2023-11-03T21:15:16.230000 -CVE-2023-42823,0,0,fdf919f43e53e226b6eda2cb1304c2ccdae3f3b29971941075766e7c86647785,2024-02-22T19:07:37.840000 +CVE-2023-42823,0,1,db1fd6995028860cfdc29311d82aa77ca995032e2e43b4369365896bb8231790,2024-11-04T17:35:04.180000 CVE-2023-42824,0,0,485e0cd2c78947a6b7d7e2f90d965cacac7d26f1634b0de55cdb0acdf56558b1,2023-10-26T20:01:18.743000 CVE-2023-42826,0,0,c7e4ad3cd8aa997f54826518199738e903ac4af1c487d59e3b2d8e98f8642331,2024-01-12T14:42:28.700000 CVE-2023-42828,0,0,e2f1754bcff1d34297cb8e4955796ced60cae334d5c978995cc13802654d392a,2024-01-17T21:22:41.863000 @@ -232586,7 +232586,7 @@ CVE-2023-4284,0,0,61fe561181169a40965e309f813ea607fd0daab2834cbef8e665fe00162fc6 CVE-2023-42840,0,0,7d5761fec7b6f15aa84a1074a2da48e2a22e511dd264acb4eb97aeef295d728b,2024-02-22T19:07:27.197000 CVE-2023-42841,0,0,1ba74cc5d5e854bd871cdd5a2c1321cd1721679505b9b640a088d8b01d078fa3,2024-09-10T21:35:05.947000 CVE-2023-42842,0,0,e6c3110fb32fb31efa637e19595877e38152993b501001f3e91f7f4195c48558,2023-12-13T01:15:08.050000 -CVE-2023-42843,0,0,bdb5ca10e9d3a9a9fe46e77d292b8a39a4c6afdebaa449ae993bf3b835c66f09,2024-05-07T06:15:06.573000 +CVE-2023-42843,0,1,fdcaee2947060de20442c439e087fd1ee28a11ba66828a8d78ea7542fc20bb0f,2024-11-04T17:35:05.077000 CVE-2023-42844,0,0,66793d4e8de2c24e97a03d4cefbe2f223f4ee5ce1cd36dda628aa0655d9dc25f,2023-11-02T18:08:23.333000 CVE-2023-42845,0,0,9507f97dc4b913465e85ae62bddedca7d865f48caf294e5533af19459dc099ee,2023-11-02T18:08:38.750000 CVE-2023-42846,0,0,848125d4c2d8d21314821b56fcf8efec7a8c30032b153bfb1279f335aea162b9,2024-09-11T15:35:06.370000 @@ -234861,7 +234861,7 @@ CVE-2023-46288,0,0,4e7c3d0f2a47c2cdb963e20693070bcb74b570c31f4c02925a81ed68bcc5f CVE-2023-46289,0,0,b718fe11c7d9982447dba29076a54dbfa45cb0ef9825d49911b46533095026f6,2023-11-07T18:18:35.950000 CVE-2023-4629,0,0,a2da5926fb0fca7bbafeced6fa322c009d8e911a79a6b6bf7f38a2a5e0ea6e3c,2024-03-12T12:40:13.500000 CVE-2023-46290,0,0,27e5ae817a0021378c38e4fd99f2c228169bd8f39b57bf0a325b209cd30c76ea,2023-11-07T19:09:56.033000 -CVE-2023-46294,0,0,5aebe5d15d21a3c99db9d0aa22d1effedd56a960f93e5caf38568b64d0bdb4c0,2024-05-02T13:27:25.103000 +CVE-2023-46294,0,1,229d21e7c2595b78ee7f7a15c45c0846701c2e9380c9a89ebb06ec6fba8d432d,2024-11-04T17:35:06.003000 CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000 CVE-2023-46297,0,0,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000 CVE-2023-46298,0,0,11fb6fb4012be55616d4ed607b07d97f1217c6cccf4f89f567489addcccf54b4,2023-10-28T03:30:11.740000 @@ -236185,7 +236185,7 @@ CVE-2023-48256,0,0,8c52f18e432061d2a86f7618ae0e765e4069bd7fc12e6f62bad63d84c7525 CVE-2023-48257,0,0,88bbb2f20880f49b2a522dfbdf30f9b8dce56f99a7d766a6b6c4110a57d7b5e6,2024-01-16T22:07:15.017000 CVE-2023-48258,0,0,b6687b2a138bbcb4c013f582b78cfc0286c75f96b82f8ef6a4ce99d1cf785703,2024-01-16T21:51:00.210000 CVE-2023-48259,0,0,96cbaf7244c934dc3aeb8a3efec60957668e394e0d7d7fdd1f1ce0396347c9ea,2024-01-16T20:16:25.587000 -CVE-2023-4826,0,0,510c76696924dd84b99ee9375bd028e395520fba1c9d1f829fd598b4bccabdd5,2024-02-23T16:14:43.447000 +CVE-2023-4826,0,1,318596b5a747e1583655f90a19e11273a636c3559a105af583e0c1f16011ca7a,2024-11-04T17:35:07.100000 CVE-2023-48260,0,0,73384636cb26d0175058822892fe9f4096a1bb2b6020454bd670d5ec89d92331,2024-01-16T20:16:05.787000 CVE-2023-48261,0,0,e92cfb8571fd6999ae57fd1871df0ab0d23bf1431180260aa67b9a22ca203dac,2024-01-16T20:15:31.977000 CVE-2023-48262,0,0,b615e0b8572761b1da7bd5b5e91032a64ba9047101531ded3eb11010312f0421,2024-01-16T20:30:28.287000 @@ -239047,10 +239047,10 @@ CVE-2023-5234,0,0,aef3fc2b8ae003c9924c974f3bb05bf3d8e87189a981252ee97d34bc614416 CVE-2023-52340,0,0,efcc45d139400c921426d64a1335d9bdc07b1697256afd1ef16215d589e13c89,2024-07-08T16:42:51.350000 CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661cf4,2024-08-01T13:45:36.707000 CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000 -CVE-2023-52343,0,0,a7e6c18e23d3a69b842723f8c5414f2f6df809646d4ef3dcee4864419d13be72,2024-04-08T18:48:40.217000 +CVE-2023-52343,0,1,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000 CVE-2023-52344,0,0,b7bdf893497358fce61c7e7c376341fa7e28c8aeaf6089f1eaf3b8ab0febdf07,2024-04-08T18:48:40.217000 CVE-2023-52345,0,0,79680366d279669fe64f4cd5be841271339a4fd967e56a100f124c184011b03e,2024-04-08T18:48:40.217000 -CVE-2023-52346,0,0,3ff0d56ae01dac1221b85f2c58281f58f1afb39fef45c2aba38e082bfb826937,2024-04-08T18:48:40.217000 +CVE-2023-52346,0,1,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000 CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000 CVE-2023-52348,0,0,7d43b2ab56f6d858307bdd7cb075403483cf601c54e7b506903fcac3dafba44d,2024-04-08T18:48:40.217000 CVE-2023-52349,0,0,e0268b41501b405d0a34f5e46844e3fb81c4f91874104463a587c292cc6b3166,2024-04-08T18:48:40.217000 @@ -239237,7 +239237,7 @@ CVE-2023-52540,0,0,6043f7b2833db7ef103b97561cb4ef82751086dbea7d4957ecb9ee6908b9f CVE-2023-52541,0,0,05a922d703fe178ffe3ffcc50d7254491f88bf17e762cb3f58c17de2d7f44cb8,2024-10-31T15:35:12.207000 CVE-2023-52542,0,0,bc3b88aa47baacfeee22c5097944807475e5f67a82e59ee630b579b0961a4395,2024-10-31T18:35:03.870000 CVE-2023-52543,0,0,41aac44c8931668192d5fa3c95aa2b64b2f3c224e1cf1305a133dfd5df96c932,2024-04-08T18:48:40.217000 -CVE-2023-52544,0,1,619680077a04f576300a30bad30a8396a31993e4c0bc7fd0f41858f5acb40cd4,2024-11-04T15:35:10.043000 +CVE-2023-52544,0,0,619680077a04f576300a30bad30a8396a31993e4c0bc7fd0f41858f5acb40cd4,2024-11-04T15:35:10.043000 CVE-2023-52545,0,0,7c866bf49e9ed6314cdc69e05703bc4aa26b629aa7be4fc7e540db613309f921,2024-08-26T17:35:01.777000 CVE-2023-52546,0,0,69fc085c2ba8387b4400b1cea5eed4f91db78d426c8820d3b5ced7bc2c0f8555,2024-04-08T18:48:40.217000 CVE-2023-52547,0,0,0fa58c5c023f6fa92ca47dc6bc47b2bf0b8d6e9b007b856535b3752ea090a3e3,2024-05-28T12:39:28.377000 @@ -239256,7 +239256,7 @@ CVE-2023-52558,0,0,7a2164a6ea51bedc215ff5cabec224ee6fc723b56d536531a97955800cae2 CVE-2023-52559,0,0,04af586fb20ce25776f7cc5f46253da9986ceb3c1247d4979acb72706c00df50,2024-03-04T13:58:23.447000 CVE-2023-5256,0,0,5aee69de1e22d307abc14e771be22f79d8ee5fd41ede5223ed59f45c075ed353,2024-09-23T19:35:15.590000 CVE-2023-52560,0,0,bc4d2a15407ff432bc881d4e2170a40df60185e7a75ae78863245ad7424b8ffa,2024-03-04T13:58:23.447000 -CVE-2023-52561,0,0,fe38555408aa2ad6c3afcc503e8c34d5601ff52d43e71fcaea37b03a6c591b02,2024-03-04T13:58:23.447000 +CVE-2023-52561,0,1,1022d103dd37f889d52795204f0c9d00659a923895a656157d5b325fafa5cbac,2024-11-04T18:35:04.423000 CVE-2023-52562,0,0,454d21a00b73374bef1d9203abf0967f2678b88a94fb5ff95a91c111a0cb0bf6,2024-03-04T13:58:23.447000 CVE-2023-52563,0,0,960b5a9380bd6ee2fc552704a4ddd50a6733a22470964324c4db37d93d49fe1e,2024-03-04T13:58:23.447000 CVE-2023-52564,0,0,3a218cd093fa4b84f7fa8ddb8efdc1d5ffe4511c4ca71bc1445b6bdf4e6aae11,2024-05-28T20:16:33.820000 @@ -239324,11 +239324,11 @@ CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e686 CVE-2023-52620,0,0,5d0b94b1352a669c08bac1c5a9bb6d9ff96c67ecbbeaf0ffd97ef6b79908b648,2024-11-04T13:16:41.823000 CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000 CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000 -CVE-2023-52623,0,0,1e731136ff02f2bff0ac52d074d0942b708675b54b93efcfc8fcc34392ff53b8,2024-11-04T13:16:42.057000 +CVE-2023-52623,0,1,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000 CVE-2023-52624,0,0,545684061372867fc2ccbd4f79630f0d293a5172b640770b5669f54f98e42ad5,2024-03-27T12:29:41.530000 CVE-2023-52625,0,0,33e2b5c9631b6255ea3d926003091e30d9a4307751bdc59e18c65ddda848418a,2024-03-27T12:29:41.530000 CVE-2023-52626,0,0,5c2f2378516bd010d48ba17ce823ea0145216cde165d7d8985c9f0a3930373e5,2024-03-27T12:29:41.530000 -CVE-2023-52627,0,0,011894822e6fac8644e97cec0afd8c1512aa0b2336b81100b9f1a4253dab64f1,2024-11-04T13:16:42.313000 +CVE-2023-52627,0,1,379f202191b7fbaf40215b778fd642c87ec1f9426b35ba261cd383760ca356b5,2024-11-04T17:35:09.073000 CVE-2023-52628,0,0,3329a75501420e00bba96b49322ededdee6ebf8d515e2f0926cf7b2c91254fe1,2024-07-05T08:15:02.090000 CVE-2023-52629,0,0,4aac381cfdcf6533bcbb5898019c55c00aa9c06c15dffc1a2cc7ddcb7c527b58,2024-08-01T13:45:41.290000 CVE-2023-5263,0,0,a5ca98a04e38722def5acce0f3cee4430b6299b258ed512a5240ea8a8830bc4e,2024-05-17T02:32:56.130000 @@ -242373,10 +242373,10 @@ CVE-2024-10024,0,0,341fb3a51358c0d5f83894d8ffa34bc8830630ac4903510ed67f09db34646 CVE-2024-10025,0,0,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 CVE-2024-10033,0,0,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625cc1e,2024-10-30T18:50:04.137000 -CVE-2024-10035,0,0,b573f3033f0f03e34bc4f609ea946fdba5558a093ab0a414fffb4408f70aa21c,2024-11-04T12:16:08.880000 +CVE-2024-10035,0,1,e1bab51809ac69fa5c75a2d897691dc0f5acda7e478ad5d8b743b12fab524013,2024-11-04T18:50:05.607000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-10040,0,0,7b56aeaf06debaabcdf1e140476d580d2600dab38558a586b77601e247b0f5d1,2024-11-01T18:26:23.450000 -CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 +CVE-2024-10041,0,1,51c1a91c4f22ee214c5dcda807542750d47d7e85f524ab1da7d13a157020a726,2024-11-04T17:35:09.270000 CVE-2024-10045,0,0,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 CVE-2024-10048,0,0,753b7b10384148568802076e97b22f964c12e42cf7a3108618b3a771a6303c01,2024-10-29T14:34:04.427000 CVE-2024-10049,0,0,885c4f58797b80385cdce80d924e46fe2b372795dfe14e40121472290c664142,2024-10-29T14:49:04.463000 @@ -242570,7 +242570,7 @@ CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f103 CVE-2024-10381,0,0,63addd0f8191b1c4cfb4d8f0e97d60f16153f091ecece1db9c0d0bcf5f8350fa,2024-10-28T13:58:09.230000 CVE-2024-10386,0,0,2f19951219ebf285623df88c007e35e2ba1a621ceccb3eda9a0f05f4aa7fff04,2024-10-28T13:58:09.230000 CVE-2024-10387,0,0,12b5ab9fc09cd164a10e40d20079f8a9e53a7fb87af2edbf444782194d8bf238,2024-10-28T13:58:09.230000 -CVE-2024-10389,0,1,1469a30412f242c5c84ea21baa6cf7685508116b07234d3d2ccfcb57d6ce655d,2024-11-04T16:35:03.007000 +CVE-2024-10389,0,1,7f50d02831ec0c7210e3e958315c008e60e035592678e929be937e615de9b81c,2024-11-04T18:50:05.607000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 @@ -242658,7 +242658,7 @@ CVE-2024-10507,0,0,18e22ae2d57c66f0ad77c1d6593d7aee514c678b3e74cb548851fdcaf5ed4 CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803f94,2024-11-01T20:52:15.573000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 -CVE-2024-10523,0,0,65b18946dd0cbb3486073d0c13b5c0bde7715c768cc56037cec7ce279d68dfc8,2024-11-04T12:16:09.217000 +CVE-2024-10523,0,1,0a9da5f6f5fef7b13b15150d455643207cf8fb33d80d9527338aeff92e2045d0,2024-11-04T18:50:05.607000 CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000 CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 @@ -242694,11 +242694,11 @@ CVE-2024-10610,0,0,b3a7842f20edf6bf99b6648e195fb54a824ea4836ba5e14a15be0d3bcb1ee CVE-2024-10611,0,0,c7e35c776731b547b2d283900f2d57b96116edf5c2f9ff849428c9bf239b8d66,2024-11-01T12:57:03.417000 CVE-2024-10612,0,0,fe6a26759d6a968a1fc65a8d80e1f3a4fe80e841f29e8e56f78d40dcb30920d6,2024-11-01T12:57:03.417000 CVE-2024-10613,0,0,38e372ddac5abe1d7fa7c2b8c6c368bffdffde44b72777c7f77e7072444d91cb,2024-11-01T12:57:03.417000 -CVE-2024-10615,0,1,d468c3c695fbdb8cb7cc6c7db0c7407baccd7e1d70755b08b6bc3f2aa94d8de1,2024-11-04T16:45:15.873000 -CVE-2024-10616,0,1,94f55ed4bd0faf50e0891f64e2b5ea20ec640d29892974759f9c3551daa23321,2024-11-04T16:44:56 -CVE-2024-10617,0,1,48b23a1a9f67b2d6b1e5c5b67deed264e7e8de26c1992ee93609edc3bcb03f73,2024-11-04T16:44:40.280000 -CVE-2024-10618,0,1,93149fe02b452b3955b6d6ea5aee1a2a6f14d11cfd7cac8e8631e7490dd201ad,2024-11-04T15:11:29.697000 -CVE-2024-10619,0,1,a69d9e7a25ac11fb3b1ab17e7ce2294adef4cd488803cb21c60293a84d322259,2024-11-04T15:11:44.627000 +CVE-2024-10615,0,0,d468c3c695fbdb8cb7cc6c7db0c7407baccd7e1d70755b08b6bc3f2aa94d8de1,2024-11-04T16:45:15.873000 +CVE-2024-10616,0,0,94f55ed4bd0faf50e0891f64e2b5ea20ec640d29892974759f9c3551daa23321,2024-11-04T16:44:56 +CVE-2024-10617,0,0,48b23a1a9f67b2d6b1e5c5b67deed264e7e8de26c1992ee93609edc3bcb03f73,2024-11-04T16:44:40.280000 +CVE-2024-10618,0,0,93149fe02b452b3955b6d6ea5aee1a2a6f14d11cfd7cac8e8631e7490dd201ad,2024-11-04T15:11:29.697000 +CVE-2024-10619,0,0,a69d9e7a25ac11fb3b1ab17e7ce2294adef4cd488803cb21c60293a84d322259,2024-11-04T15:11:44.627000 CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000 CVE-2024-10620,0,0,724abc136e85c83fb378f9f08553f42597c7003f31982d5ab3f2f979a65abde0,2024-11-01T12:57:03.417000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 @@ -242730,9 +242730,9 @@ CVE-2024-10702,0,0,1325634e3f4fdbfa2e4a1276b2401b086b25bcc969a908cc22819ae619148 CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000 CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44f6,2024-02-13T19:44:28.620000 CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000 -CVE-2024-10730,0,1,8808b0788cc1226811ed98f049f4208abdd990eebdc310df0fd93dc6dcaba5d0,2024-11-04T16:42:33.607000 -CVE-2024-10731,0,1,93de8ba16d95746d2c9a168c7c655af07635c6e59127c536c13182d794a3dcbf,2024-11-04T16:43:04.747000 -CVE-2024-10732,0,1,e6bfaf0c25b1163c3dc89f2bfe63b5fb94f717498333b7777e76f171f8ea4960,2024-11-04T16:43:49.787000 +CVE-2024-10730,0,0,8808b0788cc1226811ed98f049f4208abdd990eebdc310df0fd93dc6dcaba5d0,2024-11-04T16:42:33.607000 +CVE-2024-10731,0,0,93de8ba16d95746d2c9a168c7c655af07635c6e59127c536c13182d794a3dcbf,2024-11-04T16:43:04.747000 +CVE-2024-10732,0,0,e6bfaf0c25b1163c3dc89f2bfe63b5fb94f717498333b7777e76f171f8ea4960,2024-11-04T16:43:49.787000 CVE-2024-10733,0,0,ecfa611fffa7dda7b20a60257897e0fb58b1e425e94f2e6ec6ece37368bae70d,2024-11-04T01:35:50.083000 CVE-2024-10734,0,0,4bdf3d9933efb7c2036a96af2289bb842795f8b5d58b3a97064506aeabfba048,2024-11-04T01:35:50.083000 CVE-2024-10735,0,0,a16cccc151e9f2bcc15c729d193af752b598e5a499de6cc85f10b7387b0a41fd,2024-11-04T01:35:50.083000 @@ -242752,21 +242752,22 @@ CVE-2024-10747,0,0,65defe3ce03d4e7029fc0dc81fec58dc74e785c46c902e5a5dc8cb2b4c82c CVE-2024-10748,0,0,046d3079c4eb2e3a10c0f9284d1ec682329dd55d91d1ebf1b461964671cc9500,2024-11-04T01:35:50.083000 CVE-2024-10749,0,0,ced9684eb6bbdaaa8891bf4946486b251511fc0da6f635e33f3c9a1ae41d6b8e,2024-11-04T01:35:50.083000 CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000 -CVE-2024-10750,0,0,a5ab38ab4e0a30803b76cb92f36d106e28cb9646c5f450e7b359c617fa79db89,2024-11-04T02:15:14.667000 -CVE-2024-10751,0,0,ece80e95a2cea401caf01f16c80e716d345300d1a9937ae65bf2b9b198d7fbdc,2024-11-04T02:15:14.993000 -CVE-2024-10752,0,0,1088609a81df0cd0486574664ea46da4e7ffbb44175dc38671e69077b9e38459,2024-11-04T13:17:04.067000 -CVE-2024-10753,0,0,bba63f6afd5c7db41ec944ca9e3254b1565ead11d9f0f9c2936fcd3fdd183f4d,2024-11-04T02:15:15.613000 -CVE-2024-10754,0,0,016ef701d7c69b529eb18fd8ed82404dc42714da0860044ae592468ce5e54716,2024-11-04T03:15:03.513000 -CVE-2024-10755,0,0,2c1547538aa19f33bfb8ab269f8c5de9accf18db53f0c38af0fdd2224a47abdd,2024-11-04T03:15:03.800000 -CVE-2024-10756,0,0,1734d7c6860835ec5fd594c365496c8bc60607d9c8dfdf93f1bd68e80a64f827,2024-11-04T03:15:04.107000 -CVE-2024-10757,0,0,513ddaeb765e10d55f4e446466726a7990128dbf7a5f480b895888b3c8d46a19,2024-11-04T03:15:04.400000 -CVE-2024-10758,0,0,2924398b36195839f05c27f30f0725070d4ebf30d1c28448bd0beb3b8614ec33,2024-11-04T04:15:02.970000 -CVE-2024-10759,0,0,2090035a24a06a2d3a108f47d883fe4483d74d7ca2e479a8d375879b9d69a296,2024-11-04T04:15:03.273000 +CVE-2024-10750,0,1,ac7291ff4e0ba9d18676e979fd2056600eeebf8de907e9707b37f8db746edc27,2024-11-04T18:50:05.607000 +CVE-2024-10751,0,1,708cf1d3706f9ba54f476d4dd9f247daa4104b854e08fb2539fd4f30c5245f0e,2024-11-04T18:50:05.607000 +CVE-2024-10752,0,1,f60f4b54a5588808d722929f40e2432d1cd618a09d2c214409b59f1e0b2fdcfd,2024-11-04T18:50:05.607000 +CVE-2024-10753,0,1,75eb25a3f070d044828578f0975e7509cf6e558ad84421cac13ede388c274730,2024-11-04T18:50:05.607000 +CVE-2024-10754,0,1,175c8df0d861733db53ca3cbd1c635f8edaa6f80546862105f2762de78b06078,2024-11-04T18:50:05.607000 +CVE-2024-10755,0,1,e166b13c7b091561a5ebd76b2bcc487a59926be42fba83e9e2f2ad6e8c7b22d2,2024-11-04T18:50:05.607000 +CVE-2024-10756,0,1,0f2dc3188f21b7cc9823003ff7556003105661c0335b8158caf8e2018e903e0a,2024-11-04T18:50:05.607000 +CVE-2024-10757,0,1,973ef513b065b4649f38b445bc7bb0e95ae6f462f426f8f5f7f5b52cc77126e8,2024-11-04T18:50:05.607000 +CVE-2024-10758,0,1,7904160229d44463548d6bdba164ef19928fb9c1f5f2973a8c086726375421c8,2024-11-04T18:50:05.607000 +CVE-2024-10759,0,1,7f190d62da81d90c587aeb92a7a4e997d7a9fcae93943d6d0e097fcb2da0d128,2024-11-04T18:50:05.607000 CVE-2024-1076,0,0,1eec5a2aed6def26ca78a00c90cdc2a9e26a823100b6419a30b16c630a915a03,2024-08-30T13:15:12.257000 -CVE-2024-10760,0,0,c1b97cdc012b2f50785c2e0167af3453e98e8cc5ee57d3d44f5455b7ef0a2f33,2024-11-04T05:15:03.810000 -CVE-2024-10761,0,0,9288dc676b065e3f8e0c2484129230875701fe3d6245fb761db657811119c167,2024-11-04T07:15:06.913000 -CVE-2024-10764,1,1,3a2b885fc1cd708ea0bb850bd5673cc2f29a71cbff518f1f28b7cdd7e57e3408,2024-11-04T16:15:04.497000 -CVE-2024-10765,1,1,5f93636babafd30a9bb7d6b09b4c5e7493f7268d0311ecc1d76b403e6585bae9,2024-11-04T16:15:04.890000 +CVE-2024-10760,0,1,6bdd52886ec00384959eb6af738c45b4575c45b728fc6ef0812e38c91365ff56,2024-11-04T18:50:05.607000 +CVE-2024-10761,0,1,e55627ca0aefeb59987656a92ae2fe0920723534c3676e4833cbe2ebfab1f89e,2024-11-04T18:50:05.607000 +CVE-2024-10764,0,1,ec3f49d125cf2e2f9f040e77955c901db8d4fc081c2a5a3c578e4d10b68b11ee,2024-11-04T18:50:05.607000 +CVE-2024-10765,0,1,f94f39587334d404980a388e9dfd9fb9115fae8b2ac1d9ff2a13bbe026583b18,2024-11-04T18:50:05.607000 +CVE-2024-10766,1,1,1b1319bb6e0bee622c046653104b00240692805524f9a93d49c4c9f821fef751,2024-11-04T18:50:05.607000 CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 @@ -243684,7 +243685,7 @@ CVE-2024-20048,0,0,20f0a9f9a5cb818fc2b8e857bf930b064e9ba7c6112710d3c0a129a489a82 CVE-2024-20049,0,0,e07d96190b9fb659d93c083b6d4ed267ea2541dbf11f25ef34e322f46f361bc3,2024-04-01T12:49:00.877000 CVE-2024-2005,0,0,29cfa78c41bb5efa2e0f2373e627610aea0de98e344329360428bcff0cb9be4c,2024-04-03T17:15:55.773000 CVE-2024-20050,0,0,0da7e1cbf3bea72df14de3a1fbe1444d0fa09d8126d8e2338b8595a0ef2bd31f,2024-10-30T20:35:07.260000 -CVE-2024-20051,0,1,3a7423be445e0e7c7bd0607c2dbf112122237250b4e6982ee6a7756480bb3f73,2024-11-04T15:35:27.250000 +CVE-2024-20051,0,0,3a7423be445e0e7c7bd0607c2dbf112122237250b4e6982ee6a7756480bb3f73,2024-11-04T15:35:27.250000 CVE-2024-20052,0,0,35c271c48ba244a5c0003fd2207bca5a8ecd7ef30b0f86b7fd787bcf3389c4a8,2024-10-29T21:35:02.937000 CVE-2024-20053,0,0,029e5b2ad2abf5e766d734dceb6d55f903a4b3644467cad36d2c8b5267d2d63b,2024-07-03T01:45:55.163000 CVE-2024-20054,0,0,3b350a0abc5b4af719ed6067f2b39a6126acf9aa30ac8e3ae176e3781b70163c,2024-07-03T01:45:55.993000 @@ -243696,7 +243697,7 @@ CVE-2024-20059,0,0,bedf8c8a83210553fdb049bb347fe1aeab5103a83fd906a7c3c2f1c3c4792 CVE-2024-2006,0,0,ee3410ade2c3c8dacc01ba73d8d41ecd43b79e73687217517da6a323962d5e14,2024-03-13T18:15:58.530000 CVE-2024-20060,0,0,1a165448639136f79c7222211c1b8753dc3275bb2ff129e40ee1359f9915fdda,2024-05-06T12:44:56.377000 CVE-2024-20064,0,0,e5c050fe53180ee62d6e64cb19a33ecd3d4b81557e94dfb2ccf3b8740f1e7661,2024-05-06T12:44:56.377000 -CVE-2024-20065,0,1,96b44aebabddf9d9e964240995f37c96eb0c6004a93c6c11d06470a7bd96dac0,2024-11-04T15:35:27.450000 +CVE-2024-20065,0,0,96b44aebabddf9d9e964240995f37c96eb0c6004a93c6c11d06470a7bd96dac0,2024-11-04T15:35:27.450000 CVE-2024-20066,0,0,9acd743ae0739d0105b8f29fb9d4ae5e2d28c957df392539618dc63926de0ee0,2024-06-03T14:46:24.250000 CVE-2024-20067,0,0,1f8b2f8c715bdcaed434516377e7c3641986c19edc4e9bc14558e6ec2383790e,2024-07-03T01:45:57.883000 CVE-2024-20068,0,0,679bf43563d4114fa5098e0c9b0aa62c3a9922c68431f8362f508d44bd4491dd,2024-06-03T14:46:24.250000 @@ -243739,27 +243740,27 @@ CVE-2024-20100,0,0,6232a5e349fb938dfde44a6272036d8fcab6eb82e3b395e905d1ef444c94e CVE-2024-20101,0,0,4ab31b8617124baf5a584f677af857db4f34ad707839e76bd0c5af95515b24c2,2024-10-07T19:36:43.247000 CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000 CVE-2024-20103,0,0,db42d95d798d4c29343c261aa8a039b0877035c0ce319208cb5d6e304467accf,2024-10-07T19:36:43.530000 -CVE-2024-20104,0,0,45c809ac6162c4e05882736204468b7604b268fcecb575ea35a726c1f40bb50a,2024-11-04T11:35:00.850000 -CVE-2024-20106,0,0,8ef03444fcadee887b6cdacec80d5c57e8b53b0ebc0243512555a2e06ca86afb,2024-11-04T11:35:01.303000 -CVE-2024-20107,0,0,d16bcf7d79e84d79ad389f39a67dc3897c001584eaa45d9be09034808cf5dc36,2024-11-04T11:35:01.503000 -CVE-2024-20108,0,0,4fb0f307408bb0bab0c0abf5d092259198ef8bf3a978408a05b1c49e524f86fe,2024-11-04T11:35:01.713000 -CVE-2024-20109,0,0,803cb7f180f80e5f4367c9b6d8edfa6d8204206640b251ff6fa4ace38f00019a,2024-11-04T11:35:01.923000 +CVE-2024-20104,0,1,0eb0f6cec63790bfe271dccde21717eef40ef09e4c0ada0a9bf3281e03a25b78,2024-11-04T18:50:05.607000 +CVE-2024-20106,0,1,e802badf719ee91193f39dabfeacc6f7402cce3fb9882581725eeb664eb99531,2024-11-04T18:50:05.607000 +CVE-2024-20107,0,1,ea573850b5f7813350717c222c9395da828f3387988dd71fe57f2afa8cfb7bd2,2024-11-04T18:50:05.607000 +CVE-2024-20108,0,1,51ff38ef9a8e206454f1a52cdc9dd02a8ef9e6b5f51f357d4ca22814a544ffd1,2024-11-04T18:50:05.607000 +CVE-2024-20109,0,1,329be716d8c17779a789d6c54f4067532328a67503ee51f1f4b82135d7e12d0a,2024-11-04T18:50:05.607000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 -CVE-2024-20110,0,0,d33a1064d503b6715a82be89b34c40506dcb42d667d41c620b8b6ec2164325b9,2024-11-04T11:35:02.163000 -CVE-2024-20111,0,0,27d22f9b268a8c3b7284649bfde84bce31ffe5554c53de51675e4fad0516fe32,2024-11-04T02:15:16.567000 -CVE-2024-20112,0,0,db36823c0b3640c4e0de914fed2d7a92d82b06b0e824143e8f9ab8f5876c726e,2024-11-04T11:35:02.463000 -CVE-2024-20113,0,0,467020ed7a920960df41acd449936938b2eb150c50e3e82931c7b284f64b30b4,2024-11-04T11:35:02.667000 -CVE-2024-20114,0,0,3ab633082fb562a27e5d95e86318ac3b18818e40ff24ad66240303d146fc57ff,2024-11-04T02:15:16.830000 -CVE-2024-20115,0,0,f0ff0cce78d30bde9bd1d0350a0a555277fd1c21cf66ee9e3c865391e2e296f2,2024-11-04T11:35:02.960000 -CVE-2024-20117,0,0,1aea438f1c0264b65dc3e0a9de2924ab7383f972e1bfd114ceeb6a71b1e4d9fb,2024-11-04T11:35:03.160000 -CVE-2024-20118,0,0,2f6f8e4ce215eb142b011da6bc9ebde19dd7a5b081fc86fdecedcee116ece248,2024-11-04T11:35:03.373000 -CVE-2024-20119,0,0,91dfa9db771a818fbd869ed9bd354d33cf0e492191b26ccb4975de35686acdc6,2024-11-04T11:35:03.570000 +CVE-2024-20110,0,1,d13a75bdef54b371678ab968b24e1cb1378ea02b8b1a291a79a5da9527360805,2024-11-04T18:50:05.607000 +CVE-2024-20111,0,1,3844afaec43e3f605de336de14e66397c560619827b4d232056aa90853fd8817,2024-11-04T18:50:05.607000 +CVE-2024-20112,0,1,aec8632268d53801bf3178030c0292363106fc55fd291b0c2de72254739cc579,2024-11-04T18:50:05.607000 +CVE-2024-20113,0,1,4b3e3a28a486c5a45ce9574225e84f39bc329878375ecc2f9f9de82a6e46dcff,2024-11-04T18:50:05.607000 +CVE-2024-20114,0,1,d4f9a6acd3671850ccdda364ad16fd101e957fe83ffdb2706267187949fed4af,2024-11-04T18:50:05.607000 +CVE-2024-20115,0,1,c210a51884bef6a1021f758530f4f2a5de02bc2b0a43406dea8d3ae0d73674a7,2024-11-04T18:50:05.607000 +CVE-2024-20117,0,1,7c37e16d78d22bbe6f6d816bf60aa223bf61c98fcf370ee47f184ded8c807678,2024-11-04T18:50:05.607000 +CVE-2024-20118,0,1,de415887ee6c076f946c02490cb02f573f7494398e53c6bece76bed9a2427926,2024-11-04T18:50:05.607000 +CVE-2024-20119,0,1,8a55961b12bffbd749551c2a476d60889049504d4a0fed2b30ad593cc3811eea,2024-11-04T18:50:05.607000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 -CVE-2024-20120,0,0,54396fe8743b2c55fd0b51961df3a3e312c0e6082189be18cad52480522fa682,2024-11-04T11:35:03.770000 -CVE-2024-20121,0,0,94e0b86184bb65522fa186a737523d5dd91c6d28397016bee886ee138253b705,2024-11-04T11:35:03.967000 -CVE-2024-20122,0,0,7f3da73d1063726b36c15c2eead085208e001c249ada6692b5a0ead1ef2dd874,2024-11-04T02:15:17.473000 -CVE-2024-20123,0,0,9b68c731406733af9a44b203ef3d5673712ba7920f56e9493b90726c9eb6a7a7,2024-11-04T11:35:04.170000 -CVE-2024-20124,0,0,6982b16a81e7b21b585ce1f2f7e4c403a4dd0fd01f80887a90f81bdb2e544487,2024-11-04T11:35:04.363000 +CVE-2024-20120,0,1,abdf5fe0d9826449777afa803e667b5ff503d4bb09586c1271d9e77a7810a3dd,2024-11-04T18:50:05.607000 +CVE-2024-20121,0,1,64ee137ec6d4da89e8765ec85d8ed9256cab3d56dc912845aa26341810bbd9fc,2024-11-04T18:50:05.607000 +CVE-2024-20122,0,1,e91f0e64d1765b100ddb7c2a6a3253904ec619055693864d1573423b8b66fadf,2024-11-04T18:50:05.607000 +CVE-2024-20123,0,1,a6fa45d61f9a55f13ce8b7b5374adc77483c99447c1733b2f283a6b6bfd3450c,2024-11-04T18:50:05.607000 +CVE-2024-20124,0,1,f0fd554760cd299dfc56b4ac50a1e92ea4b3de134a0428b7867adeb4defad70e,2024-11-04T18:50:05.607000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000 @@ -245512,7 +245513,7 @@ CVE-2024-22251,0,0,5b1c78977e7a04eeaf6535ae42017a6a1e82ea208698ccd587ea5ce800725 CVE-2024-22252,0,0,52a85737ba1a2dd683ca2f0e723c2e638bb6ffce616a3bc6c60dd13cc85e813c,2024-03-05T18:50:18.333000 CVE-2024-22253,0,0,99373fd467fe1494c70def9a33c277abe9ef8000626bb6e83f26af7d49c26664,2024-08-16T20:35:05.110000 CVE-2024-22254,0,0,20d7e9ec4979d70b7eb4baedee6a35555829a7b91aea3c15baf85c60eb6e51bf,2024-08-14T19:35:18.467000 -CVE-2024-22255,0,0,7bd905294a10324f1aed00fc1daf99a722a3540b7bdbb8eab5f6dc68c2a848fb,2024-03-05T18:50:18.333000 +CVE-2024-22255,0,1,8e7a40c5bf54cf100359b6bd89ec7ed5b7b9b1826e219d741464964078f159ff,2024-11-04T18:35:06.477000 CVE-2024-22256,0,0,dcbf1bed6a2eb60ed505918b467b6ef5ef784547429273c505574abd3ae01acd,2024-03-12T15:01:32.347000 CVE-2024-22257,0,0,83d5592ba2658b12f45fdbdc1fa843be7cd4148ccfa8d90acba9b43bfc7d1437,2024-04-19T07:15:09.223000 CVE-2024-22258,0,0,4b97201062488eaff51b24fbc9ae28b1f946f20fc4b3f47d5337472a99498617,2024-03-20T13:00:16.367000 @@ -245811,7 +245812,7 @@ CVE-2024-22718,0,0,fdbc5618325a454d8b333a1e48c28cf1aecdc2c23be645f7cd092c43b90b9 CVE-2024-22719,0,0,d06df3a20984b7352ed99c9ea20fe633d52636fb422692c036df9cd11f0dede6,2024-04-12T12:43:57.400000 CVE-2024-2272,0,0,bc7fc0edef953b8e6907a8afb1963293ca16cc15ca659728d50442893cc6726e,2024-05-17T02:38:08.237000 CVE-2024-22720,0,0,9b189ed7ed41dddb5c89809962586573f4f56f2a5e75240cf2e0c1b185b206be,2024-01-30T20:51:16.247000 -CVE-2024-22721,0,1,599536e6bd03ad42ae83138e0bdfa882c8390700e254105fa71cba40ba36ebcd,2024-11-04T15:35:27.650000 +CVE-2024-22721,0,0,599536e6bd03ad42ae83138e0bdfa882c8390700e254105fa71cba40ba36ebcd,2024-11-04T15:35:27.650000 CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0813,2024-07-03T01:47:20.897000 CVE-2024-22723,0,0,5e0104614f79979231b68cb0938b4f8c78660f8d758e8dd4467e139288dfbdc1,2024-08-01T13:47:01.343000 CVE-2024-22724,0,0,933dc01fb2520f6f9ab9fa4754177aa8d3c42e94e77de3e74dc91468db49f71f,2024-08-06T15:35:08.610000 @@ -246225,7 +246226,7 @@ CVE-2024-23373,0,0,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa CVE-2024-23374,0,0,f4c6d02700b6a8420aafee41d5598362caa782be31e75b6b5a2be4f35376a456,2024-10-16T20:26:47.983000 CVE-2024-23375,0,0,6c40f68c93a67061204173a720ea1a7d00eaefa497b28279e14abbb274c64d60,2024-10-16T20:26:01.167000 CVE-2024-23376,0,0,53f5fbcb9e7022eaed6b3b110c6c4a497cb456faf848338c012c4a394e4a25a1,2024-10-16T20:07:45.260000 -CVE-2024-23377,0,0,2af0edd4fbca6b4662484e85894cde68e3c7fca10b6f801b29cf444600ffb2b9,2024-11-04T10:15:04.100000 +CVE-2024-23377,0,1,c3e4833903ad95d45a0469d4c22fd5cc0841672de66b1257aafc9b065e02c3ac,2024-11-04T18:50:05.607000 CVE-2024-23378,0,0,cb12f7c9d19ce7e2f02f7f248035e9b955e6980ec80efbda1175620e9584e886,2024-10-16T20:00:29.503000 CVE-2024-23379,0,0,d83d42193b183369769000f98e3afdec4ada9e1be3c04ea1a4b9166a0e8b650f,2024-10-16T19:58:40.227000 CVE-2024-2338,0,0,97ed9304e53653e5f2f6be84ec656ed42a5ae14786266fb81f31dd764d99c05c,2024-03-08T21:19:43.127000 @@ -246234,8 +246235,8 @@ CVE-2024-23381,0,0,c05f9cee58e223ab89c0d0d7ff884408a74aec6ab8924761148e9dbc59968 CVE-2024-23382,0,0,ff24d6020e14bb69f781982e2cd1ca969bdc34877498b5f427eb6708619a0e83,2024-08-06T16:30:24.547000 CVE-2024-23383,0,0,a47dc771e576435c08fbf1cb6343f6cdccefbb6dc18c0aec3a268a581496d75f,2024-08-06T16:30:24.547000 CVE-2024-23384,0,0,af1a2c186017dbfb51721f232ecb63b5ddf276ff15ce1bbe6f03cf143cb8fb6c,2024-08-06T16:30:24.547000 -CVE-2024-23385,0,0,33b6e9651bacc870f703d4fe4ac427c2a601100f5e2d9a6b8b31e352e94a912c,2024-11-04T10:15:04.500000 -CVE-2024-23386,0,0,56197f2ac8e3f02c1dfc96e31e382f2df4e29585708ed881471cc9e0af2710e3,2024-11-04T10:15:04.760000 +CVE-2024-23385,0,1,1f5bb106cd97ab1ac033c9191c514307f12907c8dfae5ce4b77d7260477f3310,2024-11-04T18:50:05.607000 +CVE-2024-23386,0,1,926827ad8dc70c1b893f2c93658b56e57a60f148b9a66ffe113f1eea7140ec55,2024-11-04T18:50:05.607000 CVE-2024-23387,0,0,a7f1916ac284cf0c8474af6b9f638254f5287c7c53a3c81d95bafc7f75d51a82,2024-01-25T02:00:29.210000 CVE-2024-23388,0,0,752c714a44aeac9cd8289b285e00a882944a95b977a7bc2b41dab87372ead843,2024-02-05T15:18:21.920000 CVE-2024-2339,0,0,f035f933b58c40751abb3c3284c6f139c7da6609ba017eef7b1ce8ff891fae95,2024-03-08T21:19:43.127000 @@ -246370,7 +246371,7 @@ CVE-2024-23584,0,0,25f43dde9216afa9143a8cf07755b8e095a8ff52fd4b037e0c34ead99c4a7 CVE-2024-23586,0,0,e4206382e7df5acbc3ee4909b5c9a721999892cd76df40fca8a357be2a4aa16c,2024-10-07T15:30:56.227000 CVE-2024-23588,0,0,616193c58804c0df33f02bbe918628fdff6c0cb92f6852ea08810ac3765e566c,2024-07-08T15:28:10.993000 CVE-2024-2359,0,0,92a91458fa3e30e1d3793add182cf3e1250c0ae608aace7f3a538586001a9a55,2024-10-17T15:39:03.397000 -CVE-2024-23590,0,0,71335ca35da53b5dd982e024626184a89930a2ddd1ec0e5e326f2e94a22a4da4,2024-11-04T10:15:04.990000 +CVE-2024-23590,0,1,a4a0ae6a5507a67e43b415a2e8c2ed8ea7bb4c3a6b430f230868b89baf523790,2024-11-04T18:50:05.607000 CVE-2024-23591,0,0,65ea9c151d9d7befc9470a956acb00d512d494f9281b48487341988483da52d2,2024-02-20T22:15:08.353000 CVE-2024-23592,0,0,f4db45b7df227186690b3d790e263099b74eb1bd23d5be604658bff5249e373d,2024-04-08T18:49:25.863000 CVE-2024-23593,0,0,b769409d07b1567757ec72b7cfa17a7cda228a62e52806c62239b600efd08769,2024-04-15T19:12:25.887000 @@ -246757,7 +246758,7 @@ CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f377 CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f8187d,2024-08-27T21:35:10.387000 CVE-2024-24043,0,0,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000 CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000 -CVE-2024-24050,0,1,ee5c3af93ac39c1d9242e4e77bb6e2faff5b394550cb3ee7c80d2d31c43d8a98,2024-11-04T16:35:03.377000 +CVE-2024-24050,0,0,ee5c3af93ac39c1d9242e4e77bb6e2faff5b394550cb3ee7c80d2d31c43d8a98,2024-11-04T16:35:03.377000 CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000 CVE-2024-24059,0,0,cc5e7807b112ca0c0cee68be0235e3c2f7d399e66c70ee9eee946a6792853ade,2024-02-03T00:40:43.793000 CVE-2024-2406,0,0,87c2a8b3896489a9b03a37a228da22ed5ee51ad5268683466cf776b61ae5f9e1,2024-05-17T02:38:12.963000 @@ -248138,7 +248139,7 @@ CVE-2024-26151,0,0,e1dc838a6d430f2f3bb000afc8645752ee52070eab909d9c789d043adb639 CVE-2024-26152,0,0,be8646b007362130f2d7e4b19e1e011379a1ee505dd31fab682fd492bc0e9a97,2024-02-23T02:42:54.547000 CVE-2024-26158,0,0,e4eb67f7a9ef1e95f05f830527e292892249634485474776f5ca55a98fc6f945,2024-04-10T13:24:00.070000 CVE-2024-26159,0,0,56810e72f38b92040811a5204d542af9b722ff356135b225ffab76f56a28e7fb,2024-04-11T20:15:33.460000 -CVE-2024-2616,0,0,1385cb9569594cd22733fda3d363fb5e951c88bf4d7a63b7528570c25b647921,2024-03-25T17:15:52.007000 +CVE-2024-2616,0,1,9b15179cd9c13063a987e4bea66929da17ee47340fd2e08c233e9c68e7f7a332,2024-11-04T17:35:14.147000 CVE-2024-26160,0,0,a5ba5256c33bdbaacb3171d5280616afee8699c566f2ab3b8302aeb6de79cfee,2024-04-11T20:15:33.553000 CVE-2024-26161,0,0,144d4a9b4e8ed125dc2cdb23e80f565db560f7b039446d2c7eefd4f94fae90fd,2024-04-11T20:15:33.647000 CVE-2024-26162,0,0,24caa669816ecfa4cc8d90aff433766fa488343cde50be56e3b76ed5fb36afaa,2024-04-11T20:15:33.750000 @@ -248479,7 +248480,7 @@ CVE-2024-26662,0,0,4690da5f07bb4f5e40786063116ee764b660c850faf8c8d2effbea2f2fef6 CVE-2024-26663,0,0,d714e15cc9607ab844dd5f108c583e6fa158b855e51f0984ba2d0b1b59099cb2,2024-06-27T12:15:19.617000 CVE-2024-26664,0,0,89a417a13d785ad8325335d250bf1b0d19023246e19cb5ddc76946cbcac78ba0,2024-06-27T12:15:19.777000 CVE-2024-26665,0,0,95b558ab2a7d651a73090bb16cc70f3f1b7091635999816322baea48fdd6527f,2024-06-25T22:15:20.357000 -CVE-2024-26666,0,0,2a9f9914a9bcfd8f7eb8f19ed7704fec87e5e6f0db266c2b4eb8b2bb7167e931,2024-04-02T12:50:42.233000 +CVE-2024-26666,0,1,dba6407ca84bc6fce032abfb8ba38b81cf3c08823061c0b0f1d367639de1d8f9,2024-11-04T17:35:11.477000 CVE-2024-26667,0,0,9a1ea0e4ac9bf10d6568a6b8d7ce40bf22c9e05c2998d5540cc717ab017e057e,2024-04-02T12:50:42.233000 CVE-2024-26668,0,0,582f7a605a28f8d79a9b901b29ab8b643dbe0a75bef6fc5eda07e1d84212be81,2024-04-02T12:50:42.233000 CVE-2024-26669,0,0,a6fd5b0b0b3d84e69818d552f2361b002d90e9c67b18c3d40b35bce20ef4408e,2024-04-02T12:50:42.233000 @@ -248580,7 +248581,7 @@ CVE-2024-26754,0,0,1d4838500a8c252b0cbc8626cdb75e403c6b4035abdfb90db28910573033c CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000 CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000 CVE-2024-26757,0,0,6034152e03c1ca661ffc06ef00b2bfd06031f7a425df0cd8c48af8de3fbaa9da,2024-04-03T17:24:18.150000 -CVE-2024-26758,0,0,c89f23a7152fa70f014ba103a2ae360647c2feb166abe1a472a326232830e7c5,2024-04-03T17:24:18.150000 +CVE-2024-26758,0,1,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000 CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000 CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000 CVE-2024-26760,0,0,160226d81fdca2c84eeb6d46729122b3c80deb78aaa248984920bedee820af65,2024-04-03T17:24:18.150000 @@ -248611,7 +248612,7 @@ CVE-2024-26782,0,0,a8f0edf206263b3c9eba58e0fb3861d3e660f94765ec36c7016ad2ad14997 CVE-2024-26783,0,0,2af6ae94e0862d9e4c8fd1dd01e9d9533df487005b3632bcc9e5cde226324207,2024-04-04T12:48:41.700000 CVE-2024-26784,0,0,3a3f9b64e77aea2ce61d08fe6ae8aad422b3d40e30ce83138a1e05ab32d7f913,2024-04-04T12:48:41.700000 CVE-2024-26785,0,0,492d91066ad796fd42a81d8353bd8f9a1d6609491204ab2e4afcd38caad744f6,2024-10-10T12:15:03.027000 -CVE-2024-26786,0,0,29f52e2c0a0f5b7aecb70f0756ea16c51e362ca0c8e31235a1f9a3735487e914,2024-04-04T12:48:41.700000 +CVE-2024-26786,0,1,f0d42ff714fdbdea6cad40254a7441c39ad23ba1d0f464ffbc3844c541dc2469,2024-11-04T17:35:11.680000 CVE-2024-26787,0,0,f985833eabc0b397db214dacc58c7e104cc79adde180c68c036e584aadedd282,2024-06-25T22:15:22.630000 CVE-2024-26788,0,0,50c90a7eb339f42da123055401cf03e57c42ac2878a6117d1ce68ecb98eebf96,2024-06-25T22:15:22.697000 CVE-2024-26789,0,0,7c68fd88d24a4175acc760683158a137f5ffc24de13af7d41ca7d2836f860294,2024-11-01T15:35:10.487000 @@ -248798,7 +248799,7 @@ CVE-2024-26952,0,0,47ebebbcdab3581e41cc5107a6b3f0472a8676645b0ea70ac7b8109d2eee0 CVE-2024-26953,0,0,c78b027cc863e48e94803cf491dfd64d2b764ce43e7ab23c2049c026f6922d49,2024-05-01T13:02:20.750000 CVE-2024-26954,0,0,90522f0664a4f93930ef5e09349c88689f646e2b4950f2cccd0234d76688f7c7,2024-05-01T13:02:20.750000 CVE-2024-26955,0,0,d6c4dd38abc9cb6e2db5afbc36cceadc1e078a55c8b63140b9d735b176a08307,2024-06-27T13:15:57.220000 -CVE-2024-26956,0,0,cd2295f4814b18c6f948ccfbfcf63d43207f91295a7eaffb56f7449b821fb875,2024-06-27T13:15:57.290000 +CVE-2024-26956,0,1,fea0bf0ba118fc3ddb3c1fe4c7041c831a08d3585f9194b7857b3ee7bd208329,2024-11-04T17:35:12.510000 CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000 CVE-2024-26958,0,0,0204f95c1db119c3fdfb8c5eaf476d8d5ccb6d4b2400dbedcca1b1f17820f449,2024-06-25T22:15:26.937000 CVE-2024-26959,0,0,893220db683cffdedd47243299be24ddf9c990960c64139a7f4d9714f8f2a89b,2024-05-01T13:02:20.750000 @@ -248839,7 +248840,7 @@ CVE-2024-26990,0,0,9b9558e43e20b1e28e693fba8f5f27330fefe2730d26184929c933061c05b CVE-2024-26991,0,0,66926c26b51c284f243472cb3f664262b27cf6deea347654af7e2043ce601936,2024-05-13T08:15:11.137000 CVE-2024-26992,0,0,bc997639d6a66fb5cfcdd14535f30d9f82ab75003f826aec82dcbbc4fae8a036,2024-05-13T08:15:11.193000 CVE-2024-26993,0,0,ff5240fa452f930fb75917ee79875aa8e99da9ef202f89fcf5f48f1578532103,2024-06-27T13:15:57.563000 -CVE-2024-26994,0,0,d4fce4ca7d8875a79f5954d5f6c7314b6d36cedf997ffdefd42a46bde37078d1,2024-06-27T12:15:23.573000 +CVE-2024-26994,0,1,f8c2416e0a156737ed5b408a04e59be19808cb5f338ca5ce09f59583e7c1a06c,2024-11-04T17:35:12.723000 CVE-2024-26995,0,0,5042ea3b1305da8b8c54adadb58dd73a742218d3dd1a3f59f6d3449bce3bacd3,2024-05-13T08:15:11.270000 CVE-2024-26996,0,0,f13300a99169a38a9b0787aa8393009120551c7b98f04ab9b92ca6acb9849b2f,2024-05-13T08:15:11.327000 CVE-2024-26997,0,0,454540311fe5335a43e8980f30eaa156ee7f28db2700fe42f0a36241f9986681,2024-06-27T13:15:57.663000 @@ -249089,7 +249090,7 @@ CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f1 CVE-2024-27231,0,0,cb6c833d389f9377c9592e3868a50b649339743a051bcf66fdda4f2a40b61535,2024-04-08T18:49:25.863000 CVE-2024-27232,0,0,64ecd9a830c9b30b766707b244dd77aa970adc2152fb16fddd12d23820aced02,2024-04-08T18:49:25.863000 CVE-2024-27233,0,0,4f805b66de1371a2d4417bd116c04ac1324a59b0f4fedad25c9d0195537442f4,2024-08-05T18:35:11.120000 -CVE-2024-27234,0,0,7f9c430bb757ad526adb7918516acd55f167ec46b27604bd9833832e0b615b90,2024-03-12T12:40:13.500000 +CVE-2024-27234,0,1,1b0ad16da90d4d5fdb81d47fff8f9573f537fbee16c19c1920ac4110156ba7b1,2024-11-04T17:35:12.957000 CVE-2024-27235,0,0,ca7df1b3186edf63083ffa451556ee8cef5481ef83fd54ad47ed09114ed183d0,2024-03-15T20:15:09.253000 CVE-2024-27236,0,0,42db3b0d6114a0f284786f77acfa731b447b1bbb3d017aeb40a796e6668e1514,2024-08-27T15:35:10.943000 CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000 @@ -249537,7 +249538,7 @@ CVE-2024-27860,0,0,d2ada260a0f416b8135571c1e45d10be69427322f3131e7a10c0d5033233c CVE-2024-27861,0,0,cca63a4409c0dfb6463d7594f0d5aa4410a9cfaf92d1700fbbea8e32f52422f8,2024-10-10T13:13:53.450000 CVE-2024-27862,0,0,6a1c629c4e6507b4b49035253caa6ee93e62b8be69739e75e90d1bcc9a884e42,2024-08-01T14:35:05.210000 CVE-2024-27863,0,0,508019dee070d0b71d963cf0aca914f810083800bc171b0f57fa8f39de1cbc93,2024-08-12T15:07:03.157000 -CVE-2024-27867,0,1,21ea07e2e71a41398504bffe79b1f6368c860b7fe8185de9ca25ab9fc1b77f4e,2024-11-04T15:35:28.613000 +CVE-2024-27867,0,0,21ea07e2e71a41398504bffe79b1f6368c860b7fe8185de9ca25ab9fc1b77f4e,2024-11-04T15:35:28.613000 CVE-2024-27869,0,0,ab86b588e6108c96e921287e926d0b0e0be022111ca064fae2e3a77e61276c34,2024-09-20T12:31:20.110000 CVE-2024-2787,0,0,2d4ec32358f3e4fff4e28d01c0d898cc511d2c65fccc3f39ec557fb8f116ac98,2024-04-10T13:23:38.787000 CVE-2024-27871,0,0,aa889bfaf64951ad81b8eaff6e3ebab3a984b1a00b69f7afbb60904dbe5078f9,2024-08-12T15:03:12.533000 @@ -249902,7 +249903,7 @@ CVE-2024-28283,0,0,8c964af2debb02be4bf42774a10a108d98f03db965bff337f64552cf0b90d CVE-2024-28285,0,0,4045fc42010a554d78239b5a74d9843bfb763180c56aacbbd24a218d49d23b0e,2024-08-29T20:36:34.603000 CVE-2024-28286,0,0,4f67e5d2b8d61419daa7b3eeda1ea695486dcdadf2fd66eaccee73d47ef998e4,2024-08-05T19:35:04.997000 CVE-2024-28287,0,0,c72517617c937d8706d1cec057e532900c4a5dfe1c22dbd1a9afc7a4eff4dadc,2024-08-27T20:35:23.683000 -CVE-2024-28288,0,1,c02f42c922b64569e67530342effd61ceb150c65a8d723bd07c85521d75c49c8,2024-11-04T15:35:28.810000 +CVE-2024-28288,0,0,c02f42c922b64569e67530342effd61ceb150c65a8d723bd07c85521d75c49c8,2024-11-04T15:35:28.810000 CVE-2024-2829,0,0,4f1dc75fbaa6c7e0302644e52c87d5a2d6337bff694f0286043f01755fd9ab5e,2024-10-03T07:15:30.397000 CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 CVE-2024-28297,0,0,a4b240f33a30c881b1a926a2c492c4fd59edb741a84b1b986f2bad529bc90472,2024-08-05T12:41:45.957000 @@ -249918,7 +249919,7 @@ CVE-2024-28322,0,0,57353b76141adc1a21b7e127ac12f2564b2d714c61135c271a9cb49aa77ef CVE-2024-28323,0,0,dbd3a74720d58aa3fa77631da4a047c1bc6da784094a38fb22aadd903e0d0d40,2024-08-26T20:35:17.217000 CVE-2024-28325,0,0,829f2b24ef0e6298df0e0a7317814ea224b3bc37dd5467e253067497a5469b95,2024-07-03T01:51:36.767000 CVE-2024-28326,0,0,855dd245e209741ecd5af54aacc58610e12585c0f397bf5c5a4820ffc845584e,2024-07-03T01:51:37.560000 -CVE-2024-28327,0,1,26492667bf28c0f745a3046cfe77c91b3b3eea337e3c1ecb92ecf26b5af66860,2024-11-04T15:35:29.603000 +CVE-2024-28327,0,0,26492667bf28c0f745a3046cfe77c91b3b3eea337e3c1ecb92ecf26b5af66860,2024-11-04T15:35:29.603000 CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000 CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000 CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000 @@ -250145,7 +250146,7 @@ CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af CVE-2024-28816,0,0,75a949219f8a896ffef945213a1610d3de2a2cf64da977b1d4287b567e2864da,2024-09-06T17:35:06.960000 CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000 CVE-2024-2882,0,0,ac3db032a55af245aeee4f2522d2c10c01bd50b8ed58cf00aeea2dd39d0cf75d,2024-06-27T19:25:12.067000 -CVE-2024-28820,0,0,0570fa594a35dba860ba454a62deb89787849f22b04a2bbfc96e6ee6293fe6a9,2024-10-25T18:35:04.300000 +CVE-2024-28820,0,1,59630a2ec384f5cee96f56aaa85aea5162ded435ca23f64ff656b699864e52c3,2024-11-04T18:35:08.457000 CVE-2024-28823,0,0,927067da9fdc9e5e8a46b927c68553c4b240f8e12b50935e3045e657acce74ef,2024-11-01T19:35:21.633000 CVE-2024-28824,0,0,eef4aea08ae10a65f9268e3694b2e67d70c352841b8880eff507640248495160,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383f90,2024-04-24T13:39:42.883000 @@ -250430,7 +250431,7 @@ CVE-2024-29129,0,0,022433b928b77b4e11df8137329a8e805ce777a51e5c390569874776ed9f1 CVE-2024-2913,0,0,f13b68719789b0ec1d0ac3f00293efe13ae2d2476f7393cb029a386c10b9d5fb,2024-05-07T13:39:32.710000 CVE-2024-29130,0,0,3c5ab042ef8fedd1c9b8f15ab543cc07d9c157ccb5fa600e78e62121be1aee44,2024-03-19T14:31:27.883000 CVE-2024-29131,0,0,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000 -CVE-2024-29133,0,0,36561ecc1d25beeebffdfe71774843942f6f7498bb13fffd291f6157a4b0ff67,2024-05-01T17:15:31.283000 +CVE-2024-29133,0,1,214f6bd706e630814a4edccbf96364fc85b0c9198fcca91c066dcd7a72b84cbe,2024-11-04T17:35:13.290000 CVE-2024-29134,0,0,64d7104dca1a7039d75ee2143ca2d6681014df1f5270f4434e5925abd69f5cba,2024-03-19T14:31:27.883000 CVE-2024-29135,0,0,82b1b4a3f7dec94f8bbc60ae3c283e311437a5e9bda89959429180db805aaa10,2024-03-19T14:31:27.883000 CVE-2024-29136,0,0,36fd1ab95c6fd5ca82b508b8182dde2cefa5ccf077499c888b13d02963a90641,2024-03-19T14:31:27.883000 @@ -251150,7 +251151,7 @@ CVE-2024-30200,0,0,c455a1dbb6f9d915db0da82c73cca8bc6fa2d78acc476d7a8456fd9d1e2ea CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735ecd,2024-03-27T12:29:30.307000 CVE-2024-30202,0,0,2545347c9158a3f795ad08e02fee2783f83a0102d3b3c6cd088e6c61c3ec608b,2024-05-01T18:15:19.553000 CVE-2024-30203,0,0,2528811fe998684170944fb8e77607f511d271cfeb505996a2be8c30f142c13c,2024-05-01T18:15:19.610000 -CVE-2024-30204,0,0,ba1e68f6cb26b454c1e78887a27fffa1190767affd2a0ece3b15e4c95cdee55a,2024-05-01T18:15:19.670000 +CVE-2024-30204,0,1,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000 CVE-2024-30205,0,0,59ff5e238770a16ac12a044b9f567826327ea645bd7ddc5284c92e9966a63ace,2024-05-01T17:15:32.820000 CVE-2024-30206,0,0,a7d0521ef088000b8f51cc15715463c9e26ba3441057ea1a5875859d791a61b9,2024-06-11T12:15:14.390000 CVE-2024-30207,0,0,93b801e8c0cb837d34644b282b92dd26d7a86790e6531becad283497647bbd2d,2024-06-11T12:15:14.520000 @@ -251690,13 +251691,13 @@ CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5 CVE-2024-30879,0,0,93839d92eafd1cfae5881afc220b2fbe0e3f01fdcdacee7a1692cd18e78fca03,2024-10-27T03:35:03.670000 CVE-2024-3088,0,0,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000 CVE-2024-30880,0,0,96833c6da8b722f149fb59bda052ae3acf51b2dbf7db685f3dd13fb70ea6d96a,2024-08-01T13:50:31.417000 -CVE-2024-30883,0,1,5a7f1114e3e9b94f96cedf200fa1928d7b7b9ce8f182208f09ccd0ae6594d5cb,2024-11-04T15:35:30.403000 +CVE-2024-30883,0,0,5a7f1114e3e9b94f96cedf200fa1928d7b7b9ce8f182208f09ccd0ae6594d5cb,2024-11-04T15:35:30.403000 CVE-2024-30884,0,0,453cca54472a26a8ca3d84c4d89a94e0d61ec7afc409128696362f32ae3d409b,2024-08-01T13:50:32.180000 CVE-2024-30885,0,0,5d637d2cb10d1a5f777b4a3791f8cb9cec659a4c7018d52c2dcd138b02d2c578,2024-10-30T18:35:09.460000 CVE-2024-30886,0,0,3f62f85f345458e571bc5d6599576ec911abf1641e0ba6b07f58563bdc308215,2024-08-07T15:35:01.500000 CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7ed09,2024-08-15T16:35:07.067000 CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000 -CVE-2024-30890,0,1,0f772534d2f25b8992cdb2b7f1614a9b1113da3447c153b6e6f711939289b199,2024-11-04T15:35:31.227000 +CVE-2024-30890,0,0,0f772534d2f25b8992cdb2b7f1614a9b1113da3447c153b6e6f711939289b199,2024-11-04T15:35:31.227000 CVE-2024-30891,0,0,396e17014fd3175e72a9c0a6ece22b5363c9ba81b8e8ea154f79fa53fb440cca,2024-08-19T20:35:15.447000 CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b613,2024-05-17T02:39:43.047000 CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000 @@ -252289,7 +252290,7 @@ CVE-2024-3174,0,0,cc93afb1fba4ed5cb1d1b58e07131fbee1642590e2326d02f843f51030b35a CVE-2024-31741,0,0,f78c52375cd180ef5690711784580d11ad07d5a273b816fcd715c6a8fa7113c2,2024-08-01T13:51:06.003000 CVE-2024-31744,0,0,fb9aa7a38c780f352284188ba5594185fd9278eb672cdcc53bb5f1def8b1306f,2024-07-03T01:55:18.993000 CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7eb7c,2024-04-25T16:15:11.227000 -CVE-2024-31747,0,0,9e923843304f2199cb691a558a210fd6981c69363d19b38d078cfd1ec801e120,2024-04-30T13:11:16.690000 +CVE-2024-31747,0,1,f997c395f027e3a1010cca523d5ab63cbd3e10983b00bf83d28a303728938662,2024-11-04T17:35:15.230000 CVE-2024-3175,0,0,e1a78d7c87de5412e17091578d745df9c9852450742733cfce5d89ae459bf460,2024-08-01T13:56:26.597000 CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff874,2024-07-03T01:55:19.837000 CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000 @@ -252366,7 +252367,7 @@ CVE-2024-31864,0,0,dd401fd2f9c38e157d115772d6fe233b1887a6b2c7d0eb5183b48c430298b CVE-2024-31865,0,0,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000 CVE-2024-31866,0,0,4d372d14b7807ced8e821f43a5c883c03fa5dbca9edfba0af795f01513fe30b5,2024-08-21T15:35:08.187000 CVE-2024-31867,0,0,7c90191082994197ce09c1b6019992176f2d76072856e8d65beb1a7b6ded7916,2024-05-01T18:15:23.740000 -CVE-2024-31868,0,0,703c16597751f17fba32c3b61a2e58921496411599e95e2472502f1bbb33ada3,2024-10-03T13:15:14.833000 +CVE-2024-31868,0,1,d3c844e6a3dbbedb810459c41bb5637ffa155cba2e17be6dddb0e1f19a739f3c,2024-11-04T17:35:15.470000 CVE-2024-31869,0,0,683e8c771fda682074fc448ea32be7db8fcec1e782121eb87243bff930796032,2024-05-01T18:15:23.843000 CVE-2024-3187,0,0,9daa4400efbb95cf28ef1942a813d3b40029e3093ff205104e53b1461d32309f,2024-10-18T12:52:33.507000 CVE-2024-31870,0,0,089cc53c4c4bda98698ee28fa3173d546c896f43008726ca3e29a627fc47e14b,2024-08-01T20:37:52.127000 @@ -252435,7 +252436,7 @@ CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6 CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000 CVE-2024-3195,0,0,54895de1b254f44ccb4469ba2b74594e6a91af91f3d85ccfdb05ae95c48717c5,2024-06-04T19:20:17.337000 CVE-2024-31950,0,0,eb45ca7adae95d9eeac606348ca2077ad73db009d4eb3ae0e3b3f28067f4639f,2024-04-08T18:48:40.217000 -CVE-2024-31951,0,0,b251f1577f50282fe90266ab8c20a58dd7e6f3cc651d794f33ba3516646b4940,2024-04-08T18:48:40.217000 +CVE-2024-31951,0,1,7fc3bdf022f9b125cc27ae75fabfcaec7e87c8ecab18ef2ce5effcefee4503ca,2024-11-04T17:35:15.700000 CVE-2024-31952,0,0,3d77ea42e3c6b71ca78bc5c0c7985e6bde91a46241e6b9004033a640e8da9c8d,2024-09-06T19:35:20.623000 CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 @@ -252458,7 +252459,7 @@ CVE-2024-31971,0,0,a1f4b42965419df8f210a326f6ff82813b583045274127c94e5e4f5a032a0 CVE-2024-31972,0,0,f9241b9f06175c965ad284b5c2136f1f7f8e377bc5d6b68f231b17656172b319,2024-11-01T12:57:03.417000 CVE-2024-31973,0,0,c3480f733abb332799fc1f07ef143103e9de0ed931d381c037c7e12d5a9eb78d,2024-11-01T12:57:03.417000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 -CVE-2024-31975,0,0,922e7441c75c29832cf3420140aade8ac8465d99f6c0a33af1645c47fc641e80,2024-11-01T12:57:03.417000 +CVE-2024-31975,0,1,eb324a6bedd4b93ad2ac0707b00b07dfad728d7f39959adabc810317189eae1a,2024-11-04T17:15:07.030000 CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000 CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000 CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 @@ -253207,8 +253208,8 @@ CVE-2024-32911,0,0,3a0fef0abd5eab29360573b4c903482bbebef01629598c289909e1af8d4e6 CVE-2024-32912,0,0,fd994f36adaadcf11decff8c54cb9ed9dfd2529041b080833bc870baeef2b9e7,2024-07-16T14:56:26.787000 CVE-2024-32913,0,0,996f6595bdd5fe8c40fd4536473f9753d8a3be1f0d10e2434d28fb6144612388,2024-08-19T14:35:08.433000 CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c36e,2024-06-17T12:43:31.090000 -CVE-2024-32915,0,0,ce3c0f63e7c4b15b4980a52ade118f9c0799ed8303c4569ce9e259a0da82edf0,2024-06-17T12:43:31.090000 -CVE-2024-32916,0,0,b886661caf70d7fd3c261e90c0f590c6eca5af4ee25ade8b0972d2baebb2ff9c,2024-06-17T12:43:31.090000 +CVE-2024-32915,0,1,4c1d20a9ebe8b814b723ab8c358028576e2a48f20441baee31fe76310539badc,2024-11-04T18:35:09.293000 +CVE-2024-32916,0,1,d8831ef74b688a9a11e24f411d0b273555821e16e14587caff484bd0789da6eb,2024-11-04T17:35:16.763000 CVE-2024-32917,0,0,6d583d8ab79c5333a5d03cc2ab6bba8eb02ee95c890cd04661d7dbc4855b1773,2024-08-15T16:35:09.653000 CVE-2024-32918,0,0,19b6831a0d6fc35e011db4c7518c1e532ce5203d93c6f41b5ff75941ff046014,2024-08-19T14:35:09.183000 CVE-2024-32919,0,0,f0aa26802459bcc1e57c74adfaef7d72c48e702e9fd1db0d49dae70c6bb3b2a9,2024-08-01T13:51:40.153000 @@ -253320,11 +253321,11 @@ CVE-2024-33025,0,0,b2224958808cef69179c29751ac5699dda8398fa1ca6d6be644feb0949d64 CVE-2024-33026,0,0,298d33f6a8bfb6f36fcf1be4fa982f6af985ae195af9a3a0c45ae097558f81f9,2024-08-06T16:30:24.547000 CVE-2024-33027,0,0,cc2e5aea91d0b51c006f2b36474a376cee8428cecc94d1a162b764842c335f3c,2024-08-06T16:30:24.547000 CVE-2024-33028,0,0,9632bd9093b259716a8b9578d714120e37db12b0d16b9cf18505d5f86f8aeb5e,2024-08-06T16:30:24.547000 -CVE-2024-33029,0,0,00cabf5b51d586bfdd5375d2c4f8da9c3c39ac669eac39b82a12540cd1f14403,2024-11-04T10:15:05.147000 -CVE-2024-33030,0,0,8654092c5541bae99e2a6d7db79b10912a6286e12292a2d784204d2023080b2a,2024-11-04T10:15:05.370000 -CVE-2024-33031,0,0,4bb633cb83fc249745f74fad357509ef249a964fb005f68ba15168709a8b14d4,2024-11-04T10:15:05.603000 -CVE-2024-33032,0,0,369e20d7b8f46342f1e66a6dc378dd327afd841b4dafc30df473622f01324621,2024-11-04T10:15:05.827000 -CVE-2024-33033,0,0,d402b7d068356be526b518056375c692091b8adab6d7b39a75e6a19ca6e0cdb5,2024-11-04T10:15:06.057000 +CVE-2024-33029,0,1,70c2e343ba148f13ed11376116209ab84d1710635b4c1c97363fef474712e62b,2024-11-04T18:50:05.607000 +CVE-2024-33030,0,1,8b58689698c4a3e507a90b69666f459bcec9ee75e9ccdf551395d704be91e56c,2024-11-04T18:50:05.607000 +CVE-2024-33031,0,1,5f62d621d51befde20ba7b911726eca7a4eb2a07c2cb8f65c875eb73379fa78d,2024-11-04T18:50:05.607000 +CVE-2024-33032,0,1,63242e7f018d21d9f71a363b6ade6f06646e4f13dc1093ae9290fad9e15a8f23,2024-11-04T18:50:05.607000 +CVE-2024-33033,0,1,7df657d4c4289fb6f347187638edbe10a37c5398cf3a670ce1c3ea784cdae4d6,2024-11-04T18:50:05.607000 CVE-2024-33034,0,0,54ed6e7d2fd983f237005bb3e1f82ed940ac2231de49deea5f0abbc3e6097779,2024-08-06T16:30:24.547000 CVE-2024-33035,0,0,a2cbf1ac3ca408060419991a03b24932660c70b02e16b8809b1fde0e9b502e88,2024-09-03T12:59:02.453000 CVE-2024-33038,0,0,d174e8cb32f352bb37d4cf42fb06ed39c66af4e6d398e5501824f9508319fcd5,2024-09-04T17:21:28.943000 @@ -253345,7 +253346,7 @@ CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b7 CVE-2024-33064,0,0,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000 CVE-2024-33065,0,0,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000 CVE-2024-33066,0,0,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000 -CVE-2024-33068,0,0,8625c1f56eae4743b411171b8a8b45feb937afa0d6a66d735188cb91befd325d,2024-11-04T10:15:06.283000 +CVE-2024-33068,0,1,b547540c6e6fff4ddb6c4b5ad1b6c00cd676f2da25e54d35e18fa3cb6df96772,2024-11-04T18:50:05.607000 CVE-2024-33069,0,0,43c56f0e9b4f42c73eddbe695dc23769c84225eafe9aba7ea54e0211778b7147,2024-10-16T19:48:32.207000 CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000 CVE-2024-33070,0,0,5c227e83ae052fa89b8d8522db931e95887b68320f2416daace5ac118cc217ce,2024-10-16T19:47:04.547000 @@ -253557,7 +253558,7 @@ CVE-2024-33522,0,0,99fcc369cb1d7d030860e4a6a89738f8fddd8cc3ac74b8b631e1a59fe3215 CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000 CVE-2024-33526,0,0,d9fbb2bf90f7562deb9562daceb1447ff20e85e1306478b1fbaa885f49f02b18,2024-08-01T13:52:03.173000 CVE-2024-33527,0,0,c58cd3ff1861491b9e0aa8bd55b935a0ffef7224152b2ec75ba8d15461542ccb,2024-05-23T17:15:29.103000 -CVE-2024-33528,0,0,bd8e62823b19e08579fd691ac970898928cb9497618db630c36d8b639e2f1c92,2024-05-23T17:15:29.213000 +CVE-2024-33528,0,1,6d38b7704a361913efde540c7527f28cdaa52176f9b6f83eaffe6b959e019e75,2024-11-04T17:35:17 CVE-2024-33529,0,0,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000 CVE-2024-3353,0,0,ce0bc328455f80cf14b93a65517c4acf833c7c445bb8d7418f958bb30757f2de,2024-08-01T13:56:31.790000 CVE-2024-33530,0,0,06dbd90020910883fd649aabf3091f4012b6024bee39b35744993f4679188732,2024-07-03T01:58:25.043000 @@ -253791,7 +253792,7 @@ CVE-2024-33848,0,0,69c0f4a8be4c8d5c0399959bef7d530406c623ab26c3f10eeeec98ba62281 CVE-2024-33849,0,0,711285af88da51034d770e4f7dba4f259d947b941ed83e4d1af2a2b96823faae,2024-08-01T13:52:09.410000 CVE-2024-3385,0,0,03cc8ffda52ed4e2edaa3b64d6bdd7f374b9f551bbb95bbcd327b07dd9ef471a,2024-04-10T19:49:51.183000 CVE-2024-33850,0,0,95f27d9d9e057348262bcab0b02347c6a14020e669eb08e0851a75b104d83e3c,2024-06-11T13:54:12.057000 -CVE-2024-33851,0,1,a059e78ef23ce543101b0db424a2ac63d36f2a6c2e94c37328b7dbf805a5046f,2024-11-04T15:35:31.737000 +CVE-2024-33851,0,0,a059e78ef23ce543101b0db424a2ac63d36f2a6c2e94c37328b7dbf805a5046f,2024-11-04T15:35:31.737000 CVE-2024-33852,0,0,a5de2c209fb86af39aeec67eb4ad30a500b196fe1f95932bdf5d894564bf2750,2024-08-23T18:46:51.787000 CVE-2024-33853,0,0,586b3cf22980fbb4ce9b3686c4819cb8d883df6be9c57bb563fbf9076c09d046,2024-08-23T18:46:51.787000 CVE-2024-33854,0,0,e971789f9ae144ac14fcf2f73161fa0d84a31aed93c8200ce470051cc6c47989,2024-08-27T20:35:31.627000 @@ -254070,7 +254071,7 @@ CVE-2024-34149,0,0,bc997c41063649e77025e7b523e84ecd9251e3e152bcf881c50ffb65d2530 CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000 CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000 CVE-2024-34153,0,0,e95099655513585da61ae60b19c6138c76d9a4480ba77c6aabc7e79515d4cada,2024-09-23T14:35:48.157000 -CVE-2024-34155,0,0,64e37c460754676e7cbab8f7ec11f790f32eeb0f21648d98691b68ee9a0deda9,2024-09-09T13:03:38.303000 +CVE-2024-34155,0,1,1f73cc746ff0c26792b640822af084b364cbd0bb7e6ac962ddcc060520d1590f,2024-11-04T17:35:17.887000 CVE-2024-34156,0,0,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295f7d,2024-09-09T15:35:07.573000 CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000 CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000 @@ -254615,6 +254616,9 @@ CVE-2024-34854,0,0,6f71aaf23a02a63a600f0bcc65e36559492677e420248555c46cf3409591d CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000 CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000 CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000 +CVE-2024-34882,1,1,414bf162499af104af9e3ac918dba0d5046535587e72d8bc01c02fcf53c2126c,2024-11-04T18:50:05.607000 +CVE-2024-34883,1,1,8cef556fd6ed557941a27afa1209a5a7329727230a916eab9bc05cc044ac6260,2024-11-04T18:50:05.607000 +CVE-2024-34887,1,1,d22116c2ae31cab92f7a56e7512a45389f55722ab02edbebae92352923fda0c2,2024-11-04T18:50:05.607000 CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000 @@ -254860,7 +254864,7 @@ CVE-2024-35307,0,0,b73247d3e5b323866c011ccf7e1f39f41293535811b1ef82260b19c7e0a4c CVE-2024-35308,0,0,6321cc28d6dd78c933cd913b6aa72a191bb42ebafe4f0197b96f22ae54b8e1a2,2024-10-25T19:06:14.100000 CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb071134,2024-05-17T02:39:59.430000 CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000 -CVE-2024-35312,0,1,5c0137295efd7b46d9385f932a15699e773a9b408740a19574eb9907d25745fe,2024-11-04T15:35:31.940000 +CVE-2024-35312,0,0,5c0137295efd7b46d9385f932a15699e773a9b408740a19574eb9907d25745fe,2024-11-04T15:35:31.940000 CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000 CVE-2024-35314,0,0,dd6af0f66de20db386ca5e2b413231717b44ab4a64aa857fe87b8a5b714ae4c5,2024-10-23T15:12:34.673000 CVE-2024-35315,0,0,31fa8a7e665c8db5f766edb029a5be575d5f1bd96401af0ef626172849a06796,2024-10-23T21:35:04.820000 @@ -254928,7 +254932,7 @@ CVE-2024-35432,0,0,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c5 CVE-2024-35433,0,0,f81c77793e6b4ae7b0491b15530e15eb48456cdd61c3fc22182d06ed972d41be,2024-09-04T20:35:18.400000 CVE-2024-35434,0,0,21d86b1029a00b97e65dc0e9f829fff58cf55d0aa50fabcc94705f59669d3cd5,2024-08-22T20:35:11.130000 CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000 -CVE-2024-3545,0,0,d9f283192ab8f986c7e851f9b58a13c1438e2ebb25fe23225197629fde187eac,2024-04-10T13:23:38.787000 +CVE-2024-3545,0,1,8572c3ccec0c267251b3f9351679ce5114a5e3088ae0469b492154e558f9687c,2024-11-04T17:35:20.247000 CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000 CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000 CVE-2024-35469,0,0,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000 @@ -255344,7 +255348,7 @@ CVE-2024-35943,0,0,b04e983e56e1c9d7081132a05bf0f0262e78b88cb4f2fd9952b8a83736f04 CVE-2024-35944,0,0,0b8fa1460b20d6ae41d4689dcd9629878bd9a25ab0d2ab9ccb19600028fdb51f,2024-06-27T12:15:26.637000 CVE-2024-35945,0,0,0185bd4cabd6e0a379e9ebc2bedca4e6c5d5d2c2f77ee4a77ecd1c628a97c866,2024-05-20T13:00:04.957000 CVE-2024-35946,0,0,00f10c1a184b3e4406a5f235832a88832bc9c4296d0f1672f7ba0e34dcfe4d40,2024-05-20T13:00:04.957000 -CVE-2024-35947,0,0,5a8b61fdbb6833fc8b322e2916e7e8275a456deaf4fa798bd843eef984fcc653,2024-06-27T14:15:13.860000 +CVE-2024-35947,0,1,8390bf97224de35b2ead2fe9b18589ecb6a8a4b66969e2ea8f853894464d35be,2024-11-04T17:35:18.283000 CVE-2024-35948,0,0,b46d9803032a3127456ee310c36bf3cedd17b0d7a11fbe27dab4bfc37a02fd78,2024-07-03T02:02:27.897000 CVE-2024-35949,0,0,1ccc3097c7a8990efd529a399603a472cca264bffe2e92a6e9359510e7d5185e,2024-06-10T16:15:16.563000 CVE-2024-3595,0,0,077cbbbd2e6db33a2d0b909dee1e47b9db04619d27b5534acb08f47c2c565c8f,2024-05-14T16:11:39.510000 @@ -255689,7 +255693,7 @@ CVE-2024-36376,0,0,9a27434ef5883d727baddbf1e021940c1f4b2a295230df160913ffae79dbc CVE-2024-36377,0,0,fed13c03878e3f3eaedb891e290180d41f088a5875828ca11ab182ae9d3f0b1e,2024-05-29T15:18:26.427000 CVE-2024-36378,0,0,ca258e9b594af616c42b58f8248851951bbd7b3ba86b1f4eba271688d3b210ab,2024-05-29T15:18:26.427000 CVE-2024-3638,0,0,620fdccfcdbef1110695fe5f4df8efef5a2f6320fb9175c618899b2ed73206f0,2024-07-05T17:14:22.140000 -CVE-2024-36383,0,0,704c11fae61ffab18896fcd0b88a4a07df25fa4f00949b9cc4efd8a21311fcea,2024-05-28T12:39:28.377000 +CVE-2024-36383,0,1,2c9cf4016aaf0711836c59164d1d46e4509eac95f6ae137d172050d33955d4ae,2024-11-04T17:35:18.540000 CVE-2024-36384,0,0,94068a38f09a54b32734b72e88f07dbe37a23dc81abe40c24fae8278840e51b9,2024-05-28T12:39:28.377000 CVE-2024-36387,0,0,a2bf37a0e64575b7db49c720ef2f1af1931a4f978873dbf393d59870fa3eb3f3,2024-07-12T14:15:11.670000 CVE-2024-36388,0,0,e13152636423c6e93176d03b27ba8c5b0397bbb97d42aaccd55001a4d2861e72,2024-06-03T14:46:24.250000 @@ -255779,7 +255783,7 @@ CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e80 CVE-2024-36480,0,0,8cfe7316f6ef17d7594f0f48ea5faff4d266af61040753ef41d7dc8fbca2c04f,2024-08-01T13:52:55.747000 CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910b77,2024-06-24T18:35:33.157000 CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 -CVE-2024-36485,0,0,92202d06fa75250350cc7ccd55d63f5aa5a5432c5db41d65643d8862b0aa2c8b,2024-11-04T12:16:09.507000 +CVE-2024-36485,0,1,a947f55c90ed783a077826539e0e76d5e963683ade514150d6f12222f7e4fb4c,2024-11-04T18:50:05.607000 CVE-2024-36489,0,0,2f34b177a387259c170db7b91a53518947ffa720aa7b598baba9b38f62a0e242,2024-09-09T13:32:13.087000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 CVE-2024-36491,0,0,0594f931fd7fcba21d9716595a57f83c241ce75441ab3d963604c9fb9792c871,2024-09-27T14:05:54.037000 @@ -256036,7 +256040,7 @@ CVE-2024-36959,0,0,fc3d9d9926c226cf4906037cfce0a2bd712e2b24c0670fe1694f9fe8618f8 CVE-2024-3696,0,0,2ce74e73d58684ac12265567b6f3042de841c097e7899c73ac3f7d1082bbff20,2024-05-17T02:40:04.613000 CVE-2024-36960,0,0,b95b26866e47237dc2fc66a84de293d780a8db9b870d76a7a8442f137192d806,2024-07-03T02:03:55.203000 CVE-2024-36961,0,0,4e4b446649db320a139f4aa3bca09c9bc55ac839253094093faf8717c16691c5,2024-06-03T14:46:24.250000 -CVE-2024-36962,0,0,59e83fa3c9b67ee4ca190998e86f2192864a4ec787e1574961ab1bfb7f8942b2,2024-06-03T14:46:24.250000 +CVE-2024-36962,0,1,070df5cd30920983625abc537c28c209768df157460fac85a83a609a7868d4f2,2024-11-04T17:35:18.780000 CVE-2024-36963,0,0,9babc41f15278c97e25649f1d781a93b01c025406e91090bbc0d7680e835d154,2024-06-03T14:46:24.250000 CVE-2024-36964,0,0,49af3173fdbcf36d2da73042cc4bf87777abec14f46c8d6af8dee65266d543cb,2024-06-27T12:15:28.493000 CVE-2024-36965,0,0,f3145e6076d1b300dfd59296285f95e07925904a4fe3d12b79e2e88ad523ab1d,2024-07-17T17:32:46.323000 @@ -256402,7 +256406,7 @@ CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9 CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000 CVE-2024-37382,0,0,a8a740545d65ebc631499231db822baee95a9596af82e521bd493b8948bb2169,2024-08-29T14:29:32.920000 CVE-2024-37383,0,0,749376f10dc0a15dd5d224c633d6641b07e533f7f05a91ed9e4f71b969f627db,2024-10-25T13:56:29.010000 -CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 +CVE-2024-37384,0,1,0086f0275bbb16b57a0d27b673b7a7c537e6b89023ec0f40bc361623760123c5,2024-11-04T17:35:19.013000 CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000 CVE-2024-37386,0,0,e26fe4180478658f5d7116e982a44893b27c0547f48ec9e4efebd50f599527d1,2024-08-01T13:53:36.410000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 @@ -257167,20 +257171,20 @@ CVE-2024-38399,0,0,2b771b5ba490c62bc791d46a0084f1ef76097271953e34800c189edde8b5e CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000 CVE-2024-38401,0,0,49e5f353e979551d81ba913b1959baf9c9c3b65372fddd5de7583edefa3b0302,2024-09-04T17:05:39.320000 CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41c81,2024-09-05T21:43:22.677000 -CVE-2024-38403,0,0,6f7cb6f7f2613742b2a472f1f41d502d07c980b6e6b2a06d07dc143f17783724,2024-11-04T10:15:06.547000 -CVE-2024-38405,0,0,4688977c45b146b3258480de4b776d105a064db29d778eba3c0820f2a325f674,2024-11-04T10:15:06.793000 -CVE-2024-38406,0,0,029738d3f22cb1face98edbfe4dc71b4880ca94d0a3f09bff89edabff58774d2,2024-11-04T10:15:07.020000 -CVE-2024-38407,0,0,798ccf493ebb0cff3bc1202e0cb0dfde91b78b6b81c1f6a8c0d8cff798728949,2024-11-04T10:15:07.247000 -CVE-2024-38408,0,0,9cc2ad8a222151644c13a9380ef72c1fd1551b8b553af1f0bd05986580dec609,2024-11-04T10:15:07.460000 -CVE-2024-38409,0,0,10be7e67c444007a9c7b56f29c35abdbfa8355c0c1d11d7ef7c1b0726a402370,2024-11-04T10:15:07.713000 +CVE-2024-38403,0,1,8958dc3a4f5cdd79df6af4290ff070c00d33a2e9f2ac4533573ff2a008e3ab81,2024-11-04T18:50:05.607000 +CVE-2024-38405,0,1,a505a4fd4be7afede4c2da1495f4422ab46c3c0d63d8c7bde8b6c1f39542a75a,2024-11-04T18:50:05.607000 +CVE-2024-38406,0,1,1f1228db5aad2a69e9cb6a79ea695c633e1fff91ade5a48327f7c4a370e83d7b,2024-11-04T18:50:05.607000 +CVE-2024-38407,0,1,c850df793301d63956ea2de95c1da7612354dfaf09d9aa5d87951a991bddc10b,2024-11-04T18:50:05.607000 +CVE-2024-38408,0,1,a71bf42758bad0648f05b420ec4b22d43a2840f9e4a82ce92b42e9e5aad98757,2024-11-04T18:50:05.607000 +CVE-2024-38409,0,1,1c5215f692c2bc0e6ae37b7b32421c66545eacf9ecc84b96bba23930fffdb7b8,2024-11-04T18:50:05.607000 CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000 -CVE-2024-38410,0,0,901aff8dd8aaba171b125a9fd1843a5c5da772f462abf5050169fec012961f5d,2024-11-04T10:15:07.933000 -CVE-2024-38415,0,0,95c4c872cf513cc24afcc8d8801496965c51885a753add567b2e2fb2ac74796e,2024-11-04T10:15:08.173000 -CVE-2024-38419,0,0,a0721438ffa0a7fc6699ea71a3427d6176354e8e8b3975dbc5783085be8b2f32,2024-11-04T10:15:08.420000 -CVE-2024-38421,0,0,511dbbdb793be5527229eda662d232ee1cc8ee8500b0069224b37df6215321e3,2024-11-04T10:15:08.673000 -CVE-2024-38422,0,0,fc710b29aabee8ad8195cb2f3901b04dcc6bb6e513d5044744ada865397d61ab,2024-11-04T10:15:08.917000 -CVE-2024-38423,0,0,621dc5179c7a250535cd4eb37878abe62f34a31725d9e9061a7dec78a6d3485b,2024-11-04T10:15:09.183000 -CVE-2024-38424,0,0,e854bd3df5c166b6cf0b47f1c83cb09f7c6c64775a508bb0d40a7f28b1eaf09f,2024-11-04T10:15:09.440000 +CVE-2024-38410,0,1,5cea5cfb4bc439ce832f92d9c6fd8fffb08294b97be59c2eeb49f06244a7b422,2024-11-04T18:50:05.607000 +CVE-2024-38415,0,1,496a43169afbfbd87ce1e50594aead25e503d0a73f46766803db5f72848ec51d,2024-11-04T18:50:05.607000 +CVE-2024-38419,0,1,f9c0d718f5c27040e1ac989a2728e9885b61af1af81b5baaa6098039685c0f74,2024-11-04T18:50:05.607000 +CVE-2024-38421,0,1,aad14f85b88e77a4170da6d063782d327d4bbef7c623d2319afa5deee071a16d,2024-11-04T18:50:05.607000 +CVE-2024-38422,0,1,e92abdff4637938f6aa11bc12bba25c477ccc43ca20d8cc02d2a1ebd434dd66d,2024-11-04T18:50:05.607000 +CVE-2024-38423,0,1,3bf7fdaa66125afc30eccef1cbb9ef74bd13212938c90821434b074e17838e49,2024-11-04T18:50:05.607000 +CVE-2024-38424,0,1,06340bbf66d2a6342f7a5ee8dbfa160e63170339b13f4014ebbb43ba3d347571,2024-11-04T18:50:05.607000 CVE-2024-38425,0,0,d6a49b1b2867bcbd4e1afebc1d8cce3ff52f15da8a3ae6e1386a8acb3cf0ae32,2024-10-16T17:34:41.633000 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,452d54ed820ff08b69aa9d520f4026807b45be623e70313c52b21d33bd87b5b0,2024-10-28T21:35:09.643000 @@ -257796,7 +257800,7 @@ CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c2 CVE-2024-39339,0,0,fe161151f8e005b87f748c729f84f5d922c0d07dafc4c5760d37acbd5c309b7f,2024-09-20T12:30:17.483000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000 -CVE-2024-39341,0,0,d5fbaff258b4a9b17c1169d39f34ff02664ef8db45025acbdddc6d5a414cd640,2024-09-26T13:32:55.343000 +CVE-2024-39341,0,1,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000 CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000 CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000 @@ -258537,10 +258541,10 @@ CVE-2024-40650,0,0,84d69f74023b7625d57fbc8106fe861d15f00562153a0ec27f968621fa8a1 CVE-2024-40652,0,0,0dc9a34620355d1a82f6409ecc9e9411449a2ec7843cc6a278a0f0f3b1b9a70e,2024-09-11T21:35:09.017000 CVE-2024-40654,0,0,21790eceed7e02cb65e578306828cdf9a6e19465650f92e825f1c3f87473b28c,2024-10-16T16:35:03.940000 CVE-2024-40655,0,0,f9e742a073d4783d6e3e69c7c29dfc537f097ccbb827a6e63290bf1fc0f97f80,2024-09-11T16:26:11.920000 -CVE-2024-40656,0,0,9008b1d1ace8817d85179a1c374bd2763172380c7573a0abf96739f5a66daa5d,2024-09-11T16:26:11.920000 +CVE-2024-40656,0,1,840dc94a7b68cd7ee3975215db9701e55f31bca5dde918908ee00bfb81643af5,2024-11-04T17:35:21.163000 CVE-2024-40657,0,0,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b92ab,2024-09-11T16:26:11.920000 CVE-2024-40658,0,0,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000 -CVE-2024-40659,0,0,0e81ac2fd56546b02f24d926e423376d8f26fac8c41041469b21cab23328deb3,2024-09-11T16:26:11.920000 +CVE-2024-40659,0,1,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 @@ -261555,7 +261559,7 @@ CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 CVE-2024-45160,0,0,5448512f93e2c872a5532bb6e7925e6443ae5601b38aa00ad59c4de27ffce9e0,2024-10-10T12:51:56.987000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 -CVE-2024-45164,0,0,64679efc5a6cce5e28f4c4eb222f0e13fb2ecb259e8009a5a3f977fe58022535,2024-11-04T14:15:14.677000 +CVE-2024-45164,0,1,8cb398eb84123906b5632a4d2bb59ecadf3f1bb550e2a7fa85685ab1d859daed,2024-11-04T18:50:05.607000 CVE-2024-45165,0,0,c95c37e8403c42b6535ee3db172ebed1de2af8ddabba72579971a9771877b8f5,2024-10-31T19:35:08.327000 CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000 CVE-2024-45167,0,0,6f3847a892b75be18a24e1374ef352424a8d56284d9550373f08d0a52ea49aa9,2024-08-22T20:35:24.417000 @@ -261794,7 +261798,7 @@ CVE-2024-45490,0,0,06cbc4e334c584d891c3ace1d9b2615373ad498dcf0899c8b0a88252c7eed CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 CVE-2024-45496,0,0,cb4145e26d358c15cb434585f9bcb20449ce473167aa6d60e18e039ff47cf458,2024-09-20T12:31:20.110000 -CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000 +CVE-2024-45498,0,1,ead799fee90d0be791c926b84a8db9a257cc85e76c202f16fed08488baf7d590,2024-11-04T17:35:22.900000 CVE-2024-4550,0,0,ea2693a2208898e22f1b33bfbea2ea7879154431a660b6be5aad9a2659ccd071,2024-09-14T11:47:14.677000 CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000 CVE-2024-45506,0,0,53228a9659d8b3663e59f7b6cd3ffdc01b4518a34e19971e095f98575a886619,2024-10-14T03:15:10.123000 @@ -261985,16 +261989,16 @@ CVE-2024-45873,0,0,c49a27b891c2cba5f20315647687fde4c837ff4206eca9eaffb57a4f0d790 CVE-2024-45874,0,0,2e0e68e484da1ec476bcb0982736db7f6eddfb72b06a902a4960817b887d973a,2024-10-10T12:57:21.987000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 CVE-2024-45880,0,0,cea99cab279728fefb1cf99178e03e8166f7f71fb61ca1ac6100aefdaeff9258,2024-10-10T12:56:30.817000 -CVE-2024-45882,1,1,33264644053dfd0da301864f0fc4e85fc47dd122c543614d1026f06f0a410d29,2024-11-04T15:15:21.837000 -CVE-2024-45884,1,1,c13c10c17a0ee29acf5afc8a9e05d1cefbe9ed0b2cdb6056b030bd4d28fec92e,2024-11-04T15:15:21.937000 -CVE-2024-45885,1,1,8d4037d339fb3382dcd3d26d2013d2cf9a7a315bd2164abef5079108f8e47607,2024-11-04T15:15:22.040000 -CVE-2024-45887,1,1,f25223d628cc46de2fae93628a550db08b185ba038490dcd1635d6e7c32dd706,2024-11-04T15:15:22.123000 -CVE-2024-45888,1,1,9aa2d8f825759ea901f99469d6bd0f868316d5d02d3d584cb8783c06f6164976,2024-11-04T15:15:22.210000 -CVE-2024-45889,1,1,8ed14c9988715363240a9cda316f1b9cbcaa424be7cff72e3eb9aa844ba5bd86,2024-11-04T15:15:22.297000 +CVE-2024-45882,0,1,4a977af8fdd839cd4f9ec7d626404754a20e280136cd0957d74d6ce36952a6fa,2024-11-04T18:50:05.607000 +CVE-2024-45884,0,1,4248abe1b6b5044f680879e90513283a5706ec504fd510f598fa028423e0546c,2024-11-04T18:50:05.607000 +CVE-2024-45885,0,1,c7673dac95f2e274f0c52351a0724f70812d1f0f53eb28fd104408c9752ab424,2024-11-04T18:50:05.607000 +CVE-2024-45887,0,1,ad0f4d71217154c00e00009f5378adccb0c580a79b8d13e096670b39627ca3af,2024-11-04T18:50:05.607000 +CVE-2024-45888,0,1,b79efdd075a61a01f7126c4c1da549cf5602389dbc7aef8dc7b2347a51647d3c,2024-11-04T18:50:05.607000 +CVE-2024-45889,0,1,512ef2d3caaade1639f221d9a87472c7147b7a39f2b32d901ecfd06ba58ed97c,2024-11-04T18:50:05.607000 CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000 -CVE-2024-45890,1,1,7eb2b7d73b3a41bd31fa1f4a424aec3e022199ca96184c6d688c9c5008af7993,2024-11-04T15:15:22.400000 -CVE-2024-45891,1,1,1fa54c95417ac8b928483fe69afff813e5a2160a6763ff1819025b9504c8397e,2024-11-04T15:15:22.477000 -CVE-2024-45893,1,1,9d34ea6cf38a8a984f3a500446747f0fe691b7e14ad97574fc0c47449d2f7932,2024-11-04T15:15:22.560000 +CVE-2024-45890,0,1,9691f342b540a5c558f2871c8e7e44faa16ec59d64e890b9fbf5fea35d30b539,2024-11-04T18:50:05.607000 +CVE-2024-45891,0,1,50fff6697f014ddbc5f2b6ba55857b27bdd1629ef94c1d57793dde287bc51282,2024-11-04T18:50:05.607000 +CVE-2024-45893,0,1,5f10b85050f43cff47e43a959f8c7947ba6467dcbd117fb999c03d320bfccf01,2024-11-04T18:50:05.607000 CVE-2024-45894,0,0,740550dc5a86649aa0fe59728cae8a43ea99cf049e7478afa6af433b67b6e7ff,2024-10-10T12:57:21.987000 CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000 CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000 @@ -262947,7 +262951,7 @@ CVE-2024-47656,0,0,4a7b40727fe0bc16fd3cab3d10ee814920e8818b1c83af2c468f34cc9e39f CVE-2024-47657,0,0,708576a218ada67737fc2a655868a1f777fbac283ee172e5336c76140e63933f,2024-10-16T15:44:16.807000 CVE-2024-47658,0,0,947a688b2a86da9457477de88fb5bff9df9a2e5d87371477ab4988d2ebf34f8c,2024-10-23T16:14:46.213000 CVE-2024-47659,0,0,731051564fdd9abc181845d3e50137cbdca7b1a84c7236a873f8e213b5f1af37,2024-10-23T16:29:14.800000 -CVE-2024-4766,0,1,ff609e4dde87340f1890030d226207d6e980e4e397af75c4c1c3e16359554990,2024-11-04T15:35:35.123000 +CVE-2024-4766,0,0,ff609e4dde87340f1890030d226207d6e980e4e397af75c4c1c3e16359554990,2024-11-04T15:35:35.123000 CVE-2024-47660,0,0,e2ac446e9523902ead466409c8feba83110dd39b410ed7aaabcc96633073d26b,2024-10-23T17:00:47.747000 CVE-2024-47661,0,0,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000 CVE-2024-47662,0,0,920f325626eb85508758136f5394582e182e91aad17f6b7b72068d65db6d25e8,2024-10-23T16:53:12.973000 @@ -263315,6 +263319,7 @@ CVE-2024-48289,0,0,955f59fc9322ac810e4c17e1fa6f43db031535f27434f509f94fb29bac5c8 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000 CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 +CVE-2024-48336,1,1,95191449bb04b318838888182067870ab2800ab58e75f33b07339892bd30632d,2024-11-04T18:50:05.607000 CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 CVE-2024-48346,0,0,9cadc94f91da6becfc880372821212f6fb47778feb19564283e0a19072e428a5,2024-11-01T12:57:03.417000 @@ -263472,6 +263477,7 @@ CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000 CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000 +CVE-2024-48809,1,1,43781c77abeaa6728314eec20171832d8fdf9834357c279579011e6dc318148f,2024-11-04T18:50:05.607000 CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000 CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 @@ -263488,7 +263494,7 @@ CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b2 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 CVE-2024-4887,0,0,a9fcb128c464af9b649411220acdd6815488462c8e19ba3fbbc0069b693c8d04,2024-10-29T19:52:44.863000 CVE-2024-48870,0,0,9db15b771a088b28bd1f0b1772504cda9cfbd6a68039dc698e13b987df9abdfe,2024-10-25T12:56:07.750000 -CVE-2024-48878,0,0,32bb4f691a87605448f0feb62d8796899b738178c1c06587b132da736ce63d57,2024-11-04T11:15:06.417000 +CVE-2024-48878,0,1,15151d9fd204d808e0708bc64472f5337fc68b353c187de2111b889c9dad41c7,2024-11-04T18:50:05.607000 CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000 CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000 CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000 @@ -264049,7 +264055,7 @@ CVE-2024-50020,0,0,6661d43351c3469f03e20f3e76c98c07a0ed5f6d6c8216674628fc4e4b1c9 CVE-2024-50021,0,0,57898aec5b1884b47d938a7c111f0959d068fd1db827ee35c06871b16a31f2f4,2024-10-25T14:52:13.890000 CVE-2024-50022,0,0,d347f317ab0388be7e02e3c067a725743f4f4a2ec5fe9c3616767a56611772d5,2024-10-25T15:05:57.403000 CVE-2024-50023,0,0,67f390b3621c869ad7858ff2cf441444955c6d93a2b1b8f79163356225513f54,2024-10-25T15:07:10.487000 -CVE-2024-50024,0,0,60b10f77c40cd33e6bb0c36c232abbcb5b954e0ca64e6e3e63daeff17d1f716d,2024-10-25T15:08:58.293000 +CVE-2024-50024,0,1,6b15a13db214b0d135537b06f13a1f560c5d24158a817a49698224e28b6616ab,2024-11-04T18:34:56.237000 CVE-2024-50025,0,0,996c9003bb36be85d02a1f00c0b7117f395f6400ba523ac2e3036745eb98fc43,2024-10-25T15:12:00.453000 CVE-2024-50026,0,0,2ea88617c927e9b4efea5125e99e0520462e67a640d28198604f210d9ecb47e7,2024-10-25T15:13:04.783000 CVE-2024-50027,0,0,911e9c91ef791dfbec8fa7d37f12e0e3766dc424c106bb3bfff768993b582c21,2024-10-25T15:19:07.347000 @@ -264062,7 +264068,7 @@ CVE-2024-50032,0,0,637e150873829d1b7c3d3a118914d460721e34274ed685e063d54b031f3cb CVE-2024-50033,0,0,31b01ea83bcca81918c070b63b5485c88672f34d727199970bc597721f06bb09,2024-10-24T19:56:04.097000 CVE-2024-50034,0,0,ef0ee6c054fa6d95d82a1cc5e3a063aef10790efa19e561bb55f1a0df403b297,2024-10-24T19:56:29.170000 CVE-2024-50035,0,0,9397571eb914efebc6686d6fee86d3765ca656654c3527a13621032f6dad372b,2024-10-24T19:54:01.987000 -CVE-2024-50036,0,0,60a1a4b858213092d68cae7308e6acf0703fdf96f5ea416b5148c342d060a7b6,2024-10-25T15:41:31.273000 +CVE-2024-50036,0,1,1d0df25807361a32d6b4d5f2b739fdb90a97c7801e06c67c2be03fc4ff1ca693,2024-11-04T18:34:21.040000 CVE-2024-50037,0,0,7b8bd0ced0d5a92e759859fc7f266b7f65512be91ea2b7830f75e01b13b64dae,2024-10-25T15:43:07.520000 CVE-2024-50038,0,0,5139188422bfac2a9578e368c33cca37aad41d76348b8b556e0dc9e15f35e6c4,2024-10-25T15:45:51.340000 CVE-2024-50039,0,0,7079ea2b935dafa93e7976f635f7aad3260c3b73e52698f049796deadf4fedf6,2024-10-25T15:47:04.950000 @@ -264093,7 +264099,7 @@ CVE-2024-50063,0,0,1d1881a47d554fc29d203efb6c8521669e1b28611f2bbf99ab231399dab59 CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7eab,2024-10-23T21:49:29.423000 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 -CVE-2024-50067,0,0,cb4e9cdbe7b706c2d9146006e5eedce3652ba4f5a8b6dda5577de4f0740d6b40,2024-11-04T12:16:09.967000 +CVE-2024-50067,0,1,0cfc9c6ccaccce00b2a6e12271047c38492efba30a1cd4007e0e0ce196ff1010,2024-11-04T18:34:01.667000 CVE-2024-50068,0,0,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000 CVE-2024-50069,0,0,f0efb37fce406b5577ae6affb711463f72093df862fef1ce6ec787e41a622262,2024-10-30T16:58:19.983000 CVE-2024-50070,0,0,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d64b,2024-10-30T16:59:39.013000 @@ -264265,15 +264271,15 @@ CVE-2024-50510,0,0,c20bcf79645964cfe7d1f097e44f43edf8fcb1f8c86258043a8f25edf3a0b CVE-2024-50511,0,0,d2405bceb5490caa25d48c9eaccd1b135c0f31fb2801d8eda1baf830c34ba921,2024-11-01T12:57:03.417000 CVE-2024-50512,0,0,d3eb5beba15659e24233a17e23ff12b2ae18a8a0e2a2662e84998527ef3378d4,2024-11-01T12:57:03.417000 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 -CVE-2024-50523,0,0,584308907b9d23d3efc05f4d5d6123e6c64aa6f82b2fb8af993559844e66db13,2024-11-04T14:15:14.770000 -CVE-2024-50525,0,0,efd1c12241078f740cfd4b3c37e2f9b2da458bcf8995cebd16d9e218b1d31c12,2024-11-04T14:15:14.983000 -CVE-2024-50526,0,0,d33e4e8b77f4151cde0d9f79efa3f983aaf2acd98c666559b14aa74f21ddb3d8,2024-11-04T14:15:15.170000 -CVE-2024-50527,0,0,41d9bfa8a95eca9d2e46403ae300b067b4088cd33d42c96067aaeef6051324e5,2024-11-04T14:15:15.367000 -CVE-2024-50528,0,0,7cbe672bda99aa1bf1ab78ad6df74e01b81bca174a4aca02aa5547a36c933e4c,2024-11-04T14:15:15.560000 -CVE-2024-50529,0,0,44d73e958cfe65ca431fcbe8d311188d3446252182a2ccbe2b11ddc5cdc2b709,2024-11-04T14:15:15.750000 +CVE-2024-50523,0,1,c6a70c2337ad1a08c0cf9c9287bb46dc5b836dcc56d2aebc19936a029550cb52,2024-11-04T18:50:05.607000 +CVE-2024-50525,0,1,3f8111347df6931458c9f7e4ac41644caed172420e9dab26d30bbb3227d96198,2024-11-04T18:50:05.607000 +CVE-2024-50526,0,1,03a7d9df8f257120dfb13e4d6b00d372da8f716ca3024e20226448de93f04a84,2024-11-04T18:50:05.607000 +CVE-2024-50527,0,1,b40bbc326cd3bb104307caa75aac26386f5b990c97a95e2ad88fd937af33800f,2024-11-04T18:50:05.607000 +CVE-2024-50528,0,1,735185d7fb10e77bade7bb3697db3987e43d0912aefe11cadcd5d03af3be0d8d,2024-11-04T18:50:05.607000 +CVE-2024-50529,0,1,9454ba0143df47276a2a2afdadcf79fd69d6699ca42e671d69642156f7b867e3,2024-11-04T18:50:05.607000 CVE-2024-5053,0,0,85ba036ea0ce8a641df5f4bb0e9116ce37b7603e5543e179441180f635dd17ca,2024-10-04T16:02:22.037000 -CVE-2024-50530,0,0,b91d84c8de2a79c5b22e3476f2dab06a647db471ece1e9700200e8cc9ab7dd87,2024-11-04T14:15:15.937000 -CVE-2024-50531,0,0,5ad20ca4e31c17ba68fbe0926c638e75d6e7800e484381fe627ede21daac3938,2024-11-04T14:15:16.117000 +CVE-2024-50530,0,1,63e06adfa4fafa8114bfe1b8a141066c3ff787daf64f4e571e9b63ebb6d24141,2024-11-04T18:50:05.607000 +CVE-2024-50531,0,1,8b27635a00d9bdcfd48a2eda16060f69efabc3f323a06bf6e7ec076598185a58,2024-11-04T18:50:05.607000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 CVE-2024-50550,0,0,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 @@ -264358,7 +264364,9 @@ CVE-2024-5109,0,0,ceb18a5d96497e9a6ac7740a19ad17f4e12924c64b1533f15150f5dd2571e3 CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000 CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf9232b,2024-06-04T19:20:59.907000 CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000 +CVE-2024-51127,1,1,af77c41f3e695b35e5d7d2a014102e22ccd34cd96f4a1eb4289d1e174ab59ec8,2024-11-04T18:50:05.607000 CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000 +CVE-2024-51136,1,1,01065aa01300ba3069b8f78f5cc816bb7c27734cd0ce5e01b4fe90b7b78cc901,2024-11-04T18:50:05.607000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 @@ -264374,15 +264382,15 @@ CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000 CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000 -CVE-2024-51244,0,0,20f1c6d1df6b67cb7880efeb2b5e23c2124d4b8cbb9e2764d5f6f31d89d1ac27,2024-11-01T20:24:53.730000 -CVE-2024-51245,0,0,ffcd734e014af01bdfab4e4f973477e52bc8062d8814277e5af8605ede52930c,2024-11-01T20:24:53.730000 -CVE-2024-51246,0,0,f0536666e8281d4a7a340b06e63446e8bdd7a2cf9aa4b894621f8a8aa5c8d4ea,2024-11-04T14:15:16.303000 -CVE-2024-51247,0,0,dc8de27a0f069e3947c817bae62d97bf01fbfe0253768ddb6b0ce2be5beaf884,2024-11-01T20:24:53.730000 -CVE-2024-51248,0,0,cca4c2d1a27dd4071da4f4cf6407e612864bc07f9c1e5b411558114de1488b5d,2024-11-01T20:24:53.730000 -CVE-2024-51249,0,0,065db56966d1194dcd9919b366d6b37a9fe11abdfcd4402dd5ba240e1ec97c20,2024-11-04T14:15:16.383000 -CVE-2024-51251,0,0,d86a49cc4a5c8b4dbd3b88af9e50bcc4e704f5b7be615791bdcc9873b0ce8255,2024-11-04T14:15:16.453000 +CVE-2024-51244,0,1,5d9d30a0365fb32e6b113bd67e8734073fd6e1f3f97c744a334090e5db6f0da5,2024-11-04T17:35:31.740000 +CVE-2024-51245,0,1,926fc5df0e3a81877ebbb0bdd4104f807040dd23ea5b5d543c69607ee68487af,2024-11-04T17:35:33.130000 +CVE-2024-51246,0,1,90f14622f67d4bb93742ef4444188b35626331bc6bf6eef7e29707c6ff25b53c,2024-11-04T18:50:05.607000 +CVE-2024-51247,0,1,f91aabdacc19911e686cb0a70b4fe352fe5b7223ce99b8d8bbb7be0048cad2b8,2024-11-04T17:35:35.743000 +CVE-2024-51248,0,1,5b1f2d7395fc3935207664d4c3fab29f0abf14a36ed23190b3643b6f2344c487,2024-11-04T17:35:37.110000 +CVE-2024-51249,0,1,3d0cc9c67b7b5023c7f9e10f06a152021d08c28671660933aadd4bf75e0be323,2024-11-04T18:50:05.607000 +CVE-2024-51251,0,1,c4c34718f73bd23a2f11b62312d57fb9837cb268511a72fa7d6e908990a99a5e,2024-11-04T18:50:05.607000 CVE-2024-51252,0,0,f4f3cc5383a6a1f58f9ea84c21f6a507fb680ae234f6b29b5a0b0272d72878d3,2024-11-01T20:24:53.730000 -CVE-2024-51253,0,0,77700c16616ead18a52e46566468856724f8d10de6d8a41d7c591b317ba27772,2024-11-04T14:15:16.530000 +CVE-2024-51253,0,1,096fa2cabcaa44b92f571ac0967480e4fabe4fb9873c51a9dbe9e95ead4dc4ec,2024-11-04T18:50:05.607000 CVE-2024-51254,0,0,223d23065b28f9aecf516c7169cb923513ae1f39fc52963cc50e2cab41350206,2024-11-01T12:57:03.417000 CVE-2024-51255,0,0,09c7dedf943104113335c71594438f15e0e67937d27a8d621ad19f82c6566163,2024-11-01T12:57:03.417000 CVE-2024-51257,0,0,5bc43acf86cf6a149a1c82df6d74466de1800bed5ebde1393a814b2e71c1f732,2024-11-01T12:57:03.417000 @@ -264402,6 +264410,10 @@ CVE-2024-51301,0,0,50e23c850160cb1168fecb7636516cc977715139705058d2de9e569c4aa7d CVE-2024-51304,0,0,7a3dee26145f52820ecad3ae3aa1a89e8c75c8ec87878c3a22e391c73ebfd301,2024-11-01T12:57:03.417000 CVE-2024-5131,0,0,9b223a3704656a88e804c16f004e4517a5aad70b85be149c86a7a2071dad5534,2024-11-03T17:15:14.743000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 +CVE-2024-51326,1,1,f88ded964298acbc6e9a32974022511c8e8484cd2422cb2a7910953f3b963a4b,2024-11-04T18:50:05.607000 +CVE-2024-51327,1,1,9e8435fa7a61ae04c5765f958337ed383ed068434cbfa132e59dc833305d80cc,2024-11-04T18:50:05.607000 +CVE-2024-51328,1,1,c7cf0173e7c6be178e6812998247eaf9a492b58431acaf7d7d05b6a5bafa50bd,2024-11-04T18:50:05.607000 +CVE-2024-51329,1,1,fe9fe6fee70bf7f535cc859756a1487466d3af982f47aeef778ab1863ee2a417,2024-11-04T18:50:05.607000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 @@ -264414,7 +264426,7 @@ CVE-2024-51398,0,0,e38b939d0a6ada1e8acc966a58f2c362a310a99f3df73314a118d336cca6e CVE-2024-51399,0,0,885aca9993ad625251b3194b60c099bbab5438db620967daab647ff77bcb67d2,2024-11-01T20:24:53.730000 CVE-2024-51406,0,0,23a8b017382413f62cc228eaff5bcfccc7c502c9b9323c87944a90639cb253e6,2024-11-01T20:25:15.673000 CVE-2024-51407,0,0,cdf72967db2c69b5defcb1138df761cb190d06df523f018741079aa6438aa512,2024-11-01T20:24:53.730000 -CVE-2024-51408,0,0,8a93bd0b3e8ab73ee08afb1e0644466d3476f8f9cabda44be977c7f8ca9e5b82,2024-11-04T14:15:16.603000 +CVE-2024-51408,0,1,9a1949f2d560a68fd2bb3d1dbdd350dc06e2d41859fb297a38dbe2b5ea7ec1ed,2024-11-04T18:50:05.607000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 @@ -264446,38 +264458,38 @@ CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b30 CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000 CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000 CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000 -CVE-2024-51556,0,0,6575994a2b3a0b243caf9e93a4f3705aa212ee4f8c02d7262b2c06bd1cec929e,2024-11-04T13:17:04.850000 -CVE-2024-51557,0,0,52c0e2e032dd08765448eba3ebcff8d34252e192bf66c11dd95a160476a20a59,2024-11-04T13:17:05.167000 -CVE-2024-51558,0,0,0919510390e48883dc14db801ad35b53486159e1ad482c1838585562b5658e1a,2024-11-04T13:17:05.450000 -CVE-2024-51559,0,0,2cbef3f467e964043902e47b27fbe5a594b89f11db7819444dbabfdd970f1e7d,2024-11-04T13:17:05.650000 +CVE-2024-51556,0,1,b55d82bf90fdb78e33d2cf1f00dfc8aa7bcfecbd3a990a1f45f070aee8579330,2024-11-04T18:50:05.607000 +CVE-2024-51557,0,1,409b8b71c02c1a6156ffb9b30f82adf7f482e618bbb534233192bb45e1ba4f5d,2024-11-04T18:50:05.607000 +CVE-2024-51558,0,1,a77ea5523c72e594fcc04a4ffd32e7543c28774ad7dad1bb59369369d2e3ce28,2024-11-04T18:50:05.607000 +CVE-2024-51559,0,1,c67bedfc7d7a4c2ba774f93c80aec83ca69ade0ef57eca0543a1b55b832734bb,2024-11-04T18:50:05.607000 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 -CVE-2024-51560,0,0,7f3528899cb767763b2a0eb47387d3329cf2b4db598a9ad52b9a26005c2203e8,2024-11-04T13:17:05.810000 -CVE-2024-51561,0,0,38269206a41ab165473ed65d3930c1f2cda486ef2ef2d6fcadf50c6db66121fb,2024-11-04T13:17:05.963000 +CVE-2024-51560,0,1,9f02ceb8504d368daba1c91c898aa5843478addd73c9ec30709d112c4db8e01d,2024-11-04T18:50:05.607000 +CVE-2024-51561,0,1,b9addf6f8f743df7f500c086a533d7514ad18f577d4214bc1734d73b73a31401,2024-11-04T18:50:05.607000 CVE-2024-51567,0,0,fb22eca2665672d2aff69a30826055432e216f3624d9c34f21d445174b67e450,2024-11-01T12:57:03.417000 CVE-2024-51568,0,0,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000 -CVE-2024-51582,0,0,36464fad3b886b59fe4c66746e51dbc7b184b957f2fe27e055a1e0038b532e42,2024-11-04T14:15:16.797000 +CVE-2024-51582,0,1,adeac09c227642ad1bc8ba17d895b54bc0538dfe6fe9de82acb4c2b8e5e86b22,2024-11-04T18:50:05.607000 CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 -CVE-2024-51626,1,1,2b1b2dd9038634db2e0b5c6e8df23af671ba9682950e87b13638b113f507976c,2024-11-04T15:15:22.730000 +CVE-2024-51626,0,1,18e5c511939be2558be617df0507b9f12fa7d0e50de2af2ea7459c488b192636,2024-11-04T18:50:05.607000 CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 -CVE-2024-51661,0,0,aeddd02573d9e95b6bd6707c33db0da4aeda9b919f6a0f2caf31e130cc8940da,2024-11-04T11:15:06.700000 -CVE-2024-51665,0,0,07a994e65cc8e29ffb5657c46a8642c7ab6d87b789758beef471faf1a0c2637d,2024-11-04T14:15:16.987000 +CVE-2024-51661,0,1,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000 +CVE-2024-51665,0,1,56bf9fcd202b3ea9001e454522be11bd5978f32ce441602f00aa1bbb031128ad,2024-11-04T18:50:05.607000 CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 -CVE-2024-51672,0,0,bb5cdb0390eacd47895ab9c27875ce5d3154c3c44417b9bc333aa0bf6ff1c111,2024-11-04T14:15:17.190000 -CVE-2024-51677,1,1,9006f9d3b493983e5fa57ee5c2a690de127893b12be92e619e7422a94c944ac3,2024-11-04T15:15:22.947000 -CVE-2024-51678,1,1,e37a2031f88fe715dd65b36dc3e9598eb9af8063a60fcde560a5597b91f39163,2024-11-04T15:15:23.163000 +CVE-2024-51672,0,1,02f34342c7a243fc55088e6039256e7de98338fcdc98f8b95fb11a31d6c364d4,2024-11-04T18:50:05.607000 +CVE-2024-51677,0,1,3a3f242a7ff6f80c9e763fd44464d5f149926414812ec89ee8be44bce14d131b,2024-11-04T18:50:05.607000 +CVE-2024-51678,0,1,ca8e2772685847dbfa010764deeffa0341c2b977902afc49a77a90e54643e432,2024-11-04T18:50:05.607000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 -CVE-2024-51680,1,1,7986ec47e3c388163364d27fbae2ddc877752b73b5a4eade5f32c3eb69e75225,2024-11-04T15:15:23.367000 -CVE-2024-51681,1,1,2ae101a8c2ecdaa062c75c60518cf7387d65f41c8d2ed62d9c2e7cdada7e1610,2024-11-04T15:15:23.577000 -CVE-2024-51682,1,1,78a8db4787a6f25536040d4ae5b56ad85a830e3f70dbe21a512a4d83b61639db,2024-11-04T15:15:23.787000 -CVE-2024-51683,1,1,f2a99d89a7dc1f584bf64e9bd6bb462febf78d867165dbd80b8985adadca7ee1,2024-11-04T15:15:24.013000 -CVE-2024-51685,1,1,ca9a171f2e6f70bdd08c1fd4793dc603b59f4d8a6e6f39a61a355037ae2e3a51,2024-11-04T15:15:24.230000 +CVE-2024-51680,0,1,6a0e4dc35b32086a537bd54899180c80ad01a8c6290d199cc8c4684b6784a87c,2024-11-04T18:50:05.607000 +CVE-2024-51681,0,1,b2240f3aac7cf521a8583b6a4f2d4157a3e0c7b650f696a8fe56bed46dd560b4,2024-11-04T18:50:05.607000 +CVE-2024-51682,0,1,12881b8ca373787a3c057bd1e8d9525a2539983e5a3ed6d65b201c2ff661d1fb,2024-11-04T18:50:05.607000 +CVE-2024-51683,0,1,0f4d7566656d1bf0660d68c0ecfc6656f45f0a02e4da79c690f191f19760df22,2024-11-04T18:50:05.607000 +CVE-2024-51685,0,1,7b28dffec4e6705aaec1bb56354bbb1411bb79518c9cb091d87049e01af7b433,2024-11-04T18:50:05.607000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 @@ -265686,7 +265698,7 @@ CVE-2024-6532,0,0,34d446197f804dcbdd8feccdfe721cd1c46fe7ee3b5e0da65e1be9d287c7b6 CVE-2024-6533,0,0,66400252f24e50c2d9b1e3ed6e622d7f7b7af745f22a620964464c66ff668430,2024-08-19T18:13:59.457000 CVE-2024-6534,0,0,0cc2422c4acf0879987370c9bde0fddfc0c65c819154f83a709538e35fb27fca,2024-08-19T18:17:15.110000 CVE-2024-6535,0,0,3933087fb45ecc6b0ecc9b074f4274211c579214228b2b0b3595456c11ddf683,2024-09-18T09:15:06.037000 -CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000 +CVE-2024-6536,0,1,5e444df1a0fc212775b8c0c5f4ed6bdaab41fc9aad6351cde84edfd09cbddff8,2024-11-04T17:35:41.007000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000 CVE-2024-6542,0,0,bb318408eda9e57d4fba1c49251ffc615a87c88f77b6516a9b3efcf954de0990,2024-08-14T16:32:34.753000 @@ -265792,7 +265804,7 @@ CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000 CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 -CVE-2024-6657,0,1,f0f99d433013d36173a76c2d6f29d8b00e049abe2c9619ab26aa1901dbe42314,2024-11-04T15:15:24.440000 +CVE-2024-6657,0,0,f0f99d433013d36173a76c2d6f29d8b00e049abe2c9619ab26aa1901dbe42314,2024-11-04T15:15:24.440000 CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000 CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000 @@ -267661,7 +267673,7 @@ CVE-2024-9142,0,0,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc1 CVE-2024-9143,0,0,72af6f2ce64369da19b732394a82c347f40298441d275f9835e3a379d1574e5a,2024-10-18T12:53:04.627000 CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000 CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000 -CVE-2024-9147,0,0,a9b0a2002b1db7fc709bf98ff118e842a1515a436da942177d9e9da62cb01c05,2024-11-04T13:17:06.120000 +CVE-2024-9147,0,1,af3a18dc56636dcac9819b544ade5f1c66419f69c2dffcac870f8567de9095b4,2024-11-04T18:50:05.607000 CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000 CVE-2024-9156,0,0,a219412140ed669efa4745f4f28cc6c7900dfc19ec3ad1e09069c0d323d2ba8e,2024-10-15T14:40:45.093000 @@ -267672,7 +267684,7 @@ CVE-2024-9162,0,0,19849f839379b431640de2681a2a308ff729e739d32bd6a2055cb38e03920e CVE-2024-9164,0,0,22a852044a02fa2bf2a1f004c8f4e0e1dbd359605b1a68593f6ac0ec4a57bdec,2024-10-15T12:58:51.050000 CVE-2024-9165,0,0,ea3f0f55660903ccb5b8258083c04d454fbc2904c6c551c0c30cae6774f4ac71,2024-11-01T12:57:03.417000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 -CVE-2024-9167,0,1,a63bad47c245df04f6e571315a9e75816f82c8546280f04bf8a5adc032aef6d8,2024-11-04T15:15:24.557000 +CVE-2024-9167,0,0,a63bad47c245df04f6e571315a9e75816f82c8546280f04bf8a5adc032aef6d8,2024-11-04T15:15:24.557000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 CVE-2024-9172,0,0,061cdfe5504cd57ff23c615d7882c5ec428decc2bc25b474b7bdd44e1c6c93b4,2024-10-08T18:05:10.863000 @@ -267738,7 +267750,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000 -CVE-2024-9287,0,0,0f86ab1cffe327e8f075f779612d5e540dfae80c2e1ed7753f609a96564d1250,2024-10-30T16:15:05.100000 +CVE-2024-9287,0,1,c2a7f3a505d28ef46ad4e1f9eb56973bf151ebebc64c28ba273663c28e99f565,2024-11-04T18:15:05.627000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000