diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46979.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46979.json index 40dbc2d4135..f06575ad4a4 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46979.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46979.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46979", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.230", - "lastModified": "2024-11-21T06:35:06.310", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:02:49.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,115 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: core: arreglar la eliminaci\u00f3n de los controladores ioctl Actualmente, los controladores ioctl se eliminan dos veces. Por primera vez durante iio_device_unregister() y luego dentro de iio_device_unregister_eventset() y iio_buffers_free_sysfs_and_mask(). La doble liberaci\u00f3n conduce al p\u00e1nico en el kernel. Para solucionar este problema, no toque directamente la lista de controladores ioctl, sino que permita que el c\u00f3digo responsable del registro llame a la rutina de limpieza coincidente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46980.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46980.json index 2c967dc74ae..8ed1a450339 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46980.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46980.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46980", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.273", - "lastModified": "2024-11-21T06:35:06.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:06:11.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,136 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: recupera todos los PDO en lugar de solo los primeros 4 commits 4dbc6a4ef06d (\"usb: typec: ucsi: guarda objetos de datos de energ\u00eda en modo PD\") introdujo la recuperaci\u00f3n de los PDO cuando se conectan a una fuente compatible con PD. Pero solo se reciben los primeros 4 PDO, ya que ese es el n\u00famero m\u00e1ximo que se puede recuperar a la vez dada la limitaci\u00f3n de longitud de MESSAGE_IN (16 bytes). Sin embargo, seg\u00fan las especificaciones de PD, una fuente conectada puede anunciar hasta un m\u00e1ximo de 7 PDO. Si dicha fuente est\u00e1 conectada, es posible que el PPM haya negociado un contrato de energ\u00eda con uno de los PDO con un \u00edndice mayor que 4, y se reflejar\u00eda en el campo de posici\u00f3n del objeto del objeto de datos de solicitud (RDO). Esto dar\u00eda como resultado un acceso fuera de los l\u00edmites cuando se usa rdo_index() para indexar en la matriz src_pdos en ucsi_psy_get_voltage_now(). Con la ayuda del verificador UBSAN -fsanitize=array-bounds habilitado, este problema exacto se revela cuando se conecta a un adaptador de fuente PD que anuncia 5 PDO y el PPM firma un contrato despu\u00e9s de seleccionar el quinto. [ 151.545106][ T70] Excepci\u00f3n inesperada de BRK del kernel en EL1 [ 151.545112][ T70] Error interno: controlador BRK: f2005512 [#1] SMP PREEMPT ... [ 151.545499][ T70] pc : ucsi_psy_get_prop+0x208/0x20c [ 151.545507 ] [ T70] lr : power_supply_show_property+0xc0/0x328 ... [ 151.545542][ T70] Rastreo de llamadas: [ 151.545544][ T70] ucsi_psy_get_prop+0x208/0x20c [ 151.545546][ T70] power_supply_uevent+0x1a4/0x 2f0 [151.545550][T70] dev_uevent+0x200/0x384 [ 151.545555][ T70] kobject_uevent_env+0x1d4/0x7e8 [ 151.545557][ T70] power_supply_changed_work+0x174/0x31c [ 151.545562][ T70] Process_one_work+0x244/0 x6f0 [ 151.545564][ T70] work_thread+0x3e0/0xa64 Nosotros Puede resolver esto recuperando y almacenando hasta un m\u00e1ximo de 7 PDO en la matriz con->src_pdos. Esto implicar\u00eda dos llamadas al comando GET_PDOS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "48EEEAD2-D08A-422C-8830-6CCF86E89E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46982.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46982.json index c028fc5b5a5..a528f9cf982 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46982.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46982.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.367", - "lastModified": "2024-11-21T06:35:06.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:08:54.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,136 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: comprimir: corregir la condici\u00f3n de ejecuci\u00f3n de sobrescritura frente a truncar pos_fsstress testcase presenta un p\u00e1nico como se muestra a continuaci\u00f3n: ------------[ cortar aqu\u00ed ]--- --------- \u00a1ERROR del kernel en fs/f2fs/compress.c:1082! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] SMP PTI CPU: 4 PID: 2753477 Comm: kworker/u16:2 Contaminado: G OE 5.12.0-rc1-custom #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-2 01/04/2014 Cola de trabajo: reescritura wb_workfn (flush-252:16) RIP: 0010:prepare_compress_overwrite+0x4c0/0x760 [f2fs] Seguimiento de llamadas: f2fs_prepare_compress_overwrite+0x5f/0x80 [f2fs] f2fs_write_cache_pages+ 0x468/0x8a0 [f2fs] f2fs_write_data_pages+0x2a4/0x2f0 [f2fs] do_writepages+0x38/0xc0 __writeback_single_inode+0x44/0x2a0 writeback_sb_inodes+0x223/0x4d0 __writeback_inodes_wb+0x56/0xf0 wb_writeback+0x1dd/0 x290 wb_workfn+0x309/0x500 proceso_one_work+0x220/0x3c0 trabajador_thread+0x53/ 0x420 kthread+0x12f/0x150 ret_from_fork+0x22/0x30 La causa principal es que truncate() puede correr con sobrescritura como se muestra a continuaci\u00f3n, por lo que un recuento de referencias restante en la p\u00e1gina no puede garantizar que la p\u00e1gina se adjunte en el \u00e1rbol de mapeo todo el tiempo, despu\u00e9s del truncamiento, m\u00e1s adelante find_lock_page() puede devolver un puntero NULL. - prepare_compress_overwrite - f2fs_pagecache_get_page - unlock_page - f2fs_setattr - truncate_setsize - truncate_inode_page - delete_from_page_cache - find_lock_page Solucione este problema evitando hacer referencia a la p\u00e1gina actualizada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "E13DFC88-3633-414B-8409-9272DE29A99C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46986.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46986.json index bf3112e525e..c1de8ec1467 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46986.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46986.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46986", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.540", - "lastModified": "2024-11-21T06:35:07.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:14:55.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,136 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: dwc3: gadget: estructura de gadget libre solo despu\u00e9s de liberar los puntos finales. Como parte de el commit e81a7018d93a (\"usb: dwc3: asignar estructura de gadget din\u00e1micamente\"), se agreg\u00f3 dwc3_gadget_release() que libere la estructura dwc->gadget al retirar el dispositivo cuando se llama a usb_del_gadget_udc() en dwc3_gadget_exit(). Sin embargo, simplemente liberar el gadget da como resultado una situaci\u00f3n de puntero colgante: los puntos finales creados en dwc3_gadget_init_endpoints() tienen sus miembros dep->endpoint.ep_list encadenados fuera del list_head anclado en dwc->gadget->ep_list. Por lo tanto, cuando se libera dwc->gadget, el primer dwc3_ep de la lista ahora tiene un puntero anterior colgante y lo mismo ocurre con el siguiente puntero de dwc3_ep al final de la lista. El dwc3_gadget_free_endpoints() que sigue dar\u00e1 como resultado un use-after-free cuando llame a list_del(). Esto se detect\u00f3 habilitando KASAN y realizando una desvinculaci\u00f3n del controlador. La reciente confirmaci\u00f3n 568262bf5492 (\"usb: dwc3: core: Add Shutdown Callback for dwc3\") tambi\u00e9n expone esto como un p\u00e1nico durante el apagado. Hay algunas posibilidades para solucionar este problema. Una podr\u00eda ser realizar un list_del() del propio gadget->ep_list que lo elimine del resto de la cadena dwc3_ep. Otro enfoque es lo que hace este parche, al dividir la llamada usb_del_gadget_udc() en sus componentes separados \"del\" y \"put\". Esto permite llamar a dwc3_gadget_free_endpoints() antes de que el gadget se libere finalmente con usb_put_gadget()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "8051E54C-C4D7-4B79-90C8-3C0B5A772262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json index 3a7b884e8af..40a583b5a21 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43842.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43842", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-23T19:15:08.243", - "lastModified": "2024-11-21T07:27:15.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T15:32:22.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -51,22 +71,105 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4.0", + "versionEndExcluding": "3.4.2", + "matchCriteriaId": "36E8C5AD-1A02-4D0D-8D77-3D7E0CA5E9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "85E41019-C6D4-4CE6-8560-63697E22D30F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_1:*:*:*:*:*:*", + "matchCriteriaId": "04A1A613-67C4-4980-A707-D43638F9108D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_2:*:*:*:*:*:*", + "matchCriteriaId": "00824D6B-F2FD-4E2B-A8E9-9552883D190C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_3:*:*:*:*:*:*", + "matchCriteriaId": "C0D15741-C6AD-45A9-A6C8-1848A51FC630" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_4:*:*:*:*:*:*", + "matchCriteriaId": "833812B2-9142-437C-8EF7-8B27D0AC4D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_5:*:*:*:*:*:*", + "matchCriteriaId": "E6F2E6AB-3865-4CCD-96C6-55A0C9065EB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_6:*:*:*:*:*:*", + "matchCriteriaId": "D16849BE-F970-45E9-AF1D-C60125D19AA1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239079", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7122632", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239079", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7122632", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6602.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6602.json new file mode 100644 index 00000000000..6753d9d4e87 --- /dev/null +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6602.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-6602", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-12-31T15:15:06.240", + "lastModified": "2024-12-31T15:15:06.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration via improper parsing of non-TTY-compliant input files in HLS playlists." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334338", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334338", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6603.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6603.json new file mode 100644 index 00000000000..3b3be7d0bac --- /dev/null +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6603.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-6603", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-12-31T15:15:07.490", + "lastModified": "2024-12-31T15:15:07.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability allows a denial of service via a maliciously crafted HLS playlist that triggers a null pointer dereference during initialization." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334335", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334335", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13067.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13067.json index d445b559608..2377050b271 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13067.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13067.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13067", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T09:15:05.307", - "lastModified": "2024-12-31T09:15:05.307", + "lastModified": "2024-12-31T16:15:25.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/all_users.php of the component All Users Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en CodeAstro Online Food Ordering System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/all_users.php del componente All Users Page. La manipulaci\u00f3n conduce a controles de acceso inadecuados. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.472081", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/shaturo1337/POCs/blob/main/Broken%20Access%20Control%20in%20Online%20Food%20Ordering%20System.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13069.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13069.json index f31fecbb7b6..6bd99db9a1f 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13069.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13069.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13069", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-31T11:15:06.933", - "lastModified": "2024-12-31T11:15:06.933", + "lastModified": "2024-12-31T16:15:25.580", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -111,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -144,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Multi%20Role%20Login%20System.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13070.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13070.json new file mode 100644 index 00000000000..28c25e671ef --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13070.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-13070", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-31T15:15:07.853", + "lastModified": "2024-12-31T15:15:07.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/update_users.php of the component Update User Page. The manipulation of the argument user_upd leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://codeastro.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/shaturo1337/POCs/blob/main/RCE%20via%20SQL%20Injection%20in%20Online%20Food%20Ordering%20System.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289825", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289825", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.472104", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/shaturo1337/POCs/blob/main/RCE%20via%20SQL%20Injection%20in%20Online%20Food%20Ordering%20System.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13072.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13072.json new file mode 100644 index 00000000000..f280bdc8a90 --- /dev/null +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13072.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-13072", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-31T15:15:08.083", + "lastModified": "2024-12-31T15:15:08.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add-customer-services.php of the component Customer Detail Handler. The manipulation of the argument sids[] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://1000projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/lings3346/CVE/blob/main/SQL_Injection_in_Beauty_Parlour_Management_System.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289826", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289826", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.472165", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json index 60e88d96477..0c0c230e8e9 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1317", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:47.307", - "lastModified": "2024-11-21T08:50:19.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:57:11.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,80 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeisle:rss_aggregator_by_feedzy:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.4.2", + "matchCriteriaId": "30EF6728-3376-474E-8319-6C8576696B5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L2623", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf57aeaa-e37e-4b22-aeaa-f0a9f4877484?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L2623", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf57aeaa-e37e-4b22-aeaa-f0a9f4877484?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json index 705d082c506..e2aea9ff606 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1318", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:47.457", - "lastModified": "2024-11-21T08:50:19.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:56:50.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,94 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeisle:rss_aggregator_by_feedzy:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.4.2", + "matchCriteriaId": "30EF6728-3376-474E-8319-6C8576696B5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-admin.php#L1053", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L1022", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/181edcec-a57d-4516-935d-6777d2de77ae?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-admin.php#L1053", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L1022", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/181edcec-a57d-4516-935d-6777d2de77ae?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json index c201205d8be..8913dc18373 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1334", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:47.793", - "lastModified": "2024-11-21T08:50:21.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:48:40.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.14", + "matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0318ec4a-185a-405d-90f8-008ba373114b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0318ec4a-185a-405d-90f8-008ba373114b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json index b5752d61716..32f2332ed99 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1335", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:47.953", - "lastModified": "2024-11-21T08:50:21.630", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:50:11.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.14", + "matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json index e2be90ba1eb..5dcd962afe5 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1336", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:48.137", - "lastModified": "2024-11-21T08:50:21.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:51:04.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.14", + "matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4cf299-9dee-4ebf-83f3-4c3471bd9fb0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4cf299-9dee-4ebf-83f3-4c3471bd9fb0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json index 63ecf293422..33af6ba235f 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1338.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1338", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:48.430", - "lastModified": "2024-11-21T08:50:21.963", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:51:41.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.14", + "matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3dd131-dbd8-431c-96f4-4ab2c3be4dbd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3dd131-dbd8-431c-96f4-4ab2c3be4dbd?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json index d450f5e454c..d87aa2efe3f 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1339.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1339", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:48.603", - "lastModified": "2024-11-21T08:50:22.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:52:24.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.14", + "matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json index c47eea92f94..47809039475 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1749.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1749", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-22T20:15:56.403", - "lastModified": "2024-11-21T08:51:13.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T15:00:58.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdtask:bhojon:2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CD16B0BF-878A-4CCE-A2C7-96D0ACF1566B" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1oM1h3E9G17lgkbSnhq7FQjfAtEojDNFo/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.254531", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254531", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://drive.google.com/file/d/1oM1h3E9G17lgkbSnhq7FQjfAtEojDNFo/view?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.254531", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254531", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json index ae5e61b6ebf..49665c382e3 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1750", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-22T20:15:56.643", - "lastModified": "2024-11-21T08:51:13.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T15:08:18.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:temmokumvc:temmokumvc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "6F43AE9A-800E-462C-81B2-AE1560CFA41B" + } + ] + } + ] + } + ], "references": [ { "url": "https://note.zhaoj.in/share/OrBH8zLKUPOA", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.254532", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.254532", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://note.zhaoj.in/share/OrBH8zLKUPOA", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.254532", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.254532", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24772.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24772.json index 54d4bafb659..b4b59c9d5f8 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24772.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24772", "sourceIdentifier": "security@apache.org", "published": "2024-02-28T12:15:47.273", - "lastModified": "2024-11-21T08:59:40.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:22:12.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,75 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/5", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24773.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24773.json index 938ae4312dd..7dedc6e40e4 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24773.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24773", "sourceIdentifier": "security@apache.org", "published": "2024-02-28T12:15:47.477", - "lastModified": "2024-11-21T08:59:40.423", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:23:25.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,24 +69,75 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/4", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/h66fy6nj41cfx07zh7l552w6dmtjh501", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/h66fy6nj41cfx07zh7l552w6dmtjh501", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json index 6f1c7e739f5..3b1e5c7ce56 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24779", "sourceIdentifier": "security@apache.org", "published": "2024-02-28T12:15:47.660", - "lastModified": "2024-11-21T08:59:41.143", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:26:31.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,22 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.0.4", + "matchCriteriaId": "F5D1642C-2CB9-43A0-B816-4E44354F1521" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/6", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/xzhz1m5bb9zxhyqgoy4q2d689b3zp4pq", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/xzhz1m5bb9zxhyqgoy4q2d689b3zp4pq", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25133.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25133.json new file mode 100644 index 00000000000..bcd93b9a700 --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25133.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-25133", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-12-31T15:15:08.283", + "lastModified": "2024-12-31T15:15:08.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the Hive ClusterDeployments resource in OpenShift Dedicated. In certain conditions, this issue may allow a developer account on a Hive-enabled cluster to obtain cluster-admin privileges by executing arbitrary commands on the hive/hive-controllers pod." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260372", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/openshift/hive/pull/2306", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json index a269f187fa9..c6fb05db714 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26016", "sourceIdentifier": "security@apache.org", "published": "2024-02-28T12:15:47.850", - "lastModified": "2024-11-21T09:01:46.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:27:58.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -51,22 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/7", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/76v1jjcylgk4p3m0258qr359ook3vl8s", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/76v1jjcylgk4p3m0258qr359ook3vl8s", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27087.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27087.json index 6bae01d33cd..bc51b53dc5f 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27087.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27087", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-26T17:15:10.783", - "lastModified": "2024-11-21T09:03:49.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T15:34:15.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.1.1", + "matchCriteriaId": "E14BEE12-BE86-4527-9BCA-194ACE2C2050" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json index 98a5a2d54c2..60ed13d716a 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27315", "sourceIdentifier": "security@apache.org", "published": "2024-02-28T10:15:09.650", - "lastModified": "2024-11-21T09:04:18.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-31T16:16:15.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,18 +71,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/qcwbx7q2s3ynsd405895bx3wcwq32j7z", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/28/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/qcwbx7q2s3ynsd405895bx3wcwq32j7z", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52047.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52047.json new file mode 100644 index 00000000000..09fd3d9b1ad --- /dev/null +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52047.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-52047", + "sourceIdentifier": "security@trendmicro.com", + "published": "2024-12-31T16:15:25.923", + "lastModified": "2024-12-31T16:15:25.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A widget local file inclusion vulnerability in Trend Micro Apex One could allow a remote attacker to execute arbitrary code on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://success.trendmicro.com/en-US/solution/KA-0016669", + "source": "security@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52048.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52048.json new file mode 100644 index 00000000000..453a1b54e90 --- /dev/null +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52048.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52048", + "sourceIdentifier": "security@trendmicro.com", + "published": "2024-12-31T16:15:26.063", + "lastModified": "2024-12-31T16:15:26.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52049.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://success.trendmicro.com/en-US/solution/KA-0018217", + "source": "security@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52049.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52049.json new file mode 100644 index 00000000000..028045051b9 --- /dev/null +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52049.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52049", + "sourceIdentifier": "security@trendmicro.com", + "published": "2024-12-31T16:15:26.193", + "lastModified": "2024-12-31T16:15:26.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52048.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://success.trendmicro.com/en-US/solution/KA-0018217", + "source": "security@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52050.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52050.json new file mode 100644 index 00000000000..ec496e87bd3 --- /dev/null +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52050.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52050", + "sourceIdentifier": "security@trendmicro.com", + "published": "2024-12-31T16:15:26.313", + "lastModified": "2024-12-31T16:15:26.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A LogServer arbitrary file creation vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://success.trendmicro.com/en-US/solution/KA-0018217", + "source": "security@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53647.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53647.json new file mode 100644 index 00000000000..15e9e5dedbf --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53647.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-53647", + "sourceIdentifier": "security@trendmicro.com", + "published": "2024-12-31T16:15:26.437", + "lastModified": "2024-12-31T16:15:26.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Trend Micro ID Security, version 3.0 and below contains a vulnerability that could allow an attacker to send an unlimited number of email verification requests without any restriction, potentially leading to abuse or denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + }, + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://helpcenter.trendmicro.com/en-us/article/tmka-06710", + "source": "security@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56198.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56198.json new file mode 100644 index 00000000000..099d06834c6 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56198.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-56198", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-31T16:15:27.247", + "lastModified": "2024-12-31T16:15:27.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "path-sanitizer is a simple lightweight npm package for sanitizing paths to prevent Path Traversal. Prior to 3.1.0, the filters can be bypassed using .=%5c which results in a path traversal. This vulnerability is fixed in 3.1.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cabraviva/path-sanitizer/commit/b6d2319eac910dffdfacc8460f5b5cc5a1518ead", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cabraviva/path-sanitizer/security/advisories/GHSA-94p5-r7cc-3rpr", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.loom.com/share/b766ece5193842848ce7562fcd559256?sid=fd826eb6-0eee-4601-bf0e-9cfee5c56e9d", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56802.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56802.json new file mode 100644 index 00000000000..1875945c5f6 --- /dev/null +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56802.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-56802", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-31T16:15:28.240", + "lastModified": "2024-12-31T16:15:28.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tapir is a private Terraform registry. Tapir versions 0.9.0 and 0.9.1 are facing a critical issue with scope-able Deploykeys where attackers can guess the key to get write access to the registry. User must upgrade to 0.9.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PacoVK/tapir/commit/c36360b611fa0ba4f5e250fa43ecf8a294785a03", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PacoVK/tapir/security/advisories/GHSA-rj9m-qf65-f5gg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 40d27e7df6d..87ac9b6222d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-31T15:00:19.927646+00:00 +2024-12-31T17:00:20.640076+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-31T14:50:15.207000+00:00 +2024-12-31T16:57:11.080000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275274 +275286 ``` ### CVEs added in the last Commit -Recently added CVEs: `31` +Recently added CVEs: `12` -- [CVE-2024-51667](CVE-2024/CVE-2024-516xx/CVE-2024-51667.json) (`2024-12-31T14:15:23.827`) -- [CVE-2024-55991](CVE-2024/CVE-2024-559xx/CVE-2024-55991.json) (`2024-12-31T13:15:07.170`) -- [CVE-2024-55995](CVE-2024/CVE-2024-559xx/CVE-2024-55995.json) (`2024-12-31T14:15:23.963`) -- [CVE-2024-56002](CVE-2024/CVE-2024-560xx/CVE-2024-56002.json) (`2024-12-31T14:15:24.120`) -- [CVE-2024-56031](CVE-2024/CVE-2024-560xx/CVE-2024-56031.json) (`2024-12-31T13:15:07.343`) -- [CVE-2024-56039](CVE-2024/CVE-2024-560xx/CVE-2024-56039.json) (`2024-12-31T13:15:07.517`) -- [CVE-2024-56040](CVE-2024/CVE-2024-560xx/CVE-2024-56040.json) (`2024-12-31T14:15:24.333`) -- [CVE-2024-56041](CVE-2024/CVE-2024-560xx/CVE-2024-56041.json) (`2024-12-31T13:15:07.670`) -- [CVE-2024-56042](CVE-2024/CVE-2024-560xx/CVE-2024-56042.json) (`2024-12-31T13:15:07.823`) -- [CVE-2024-56043](CVE-2024/CVE-2024-560xx/CVE-2024-56043.json) (`2024-12-31T14:15:24.497`) -- [CVE-2024-56044](CVE-2024/CVE-2024-560xx/CVE-2024-56044.json) (`2024-12-31T14:15:24.680`) -- [CVE-2024-56045](CVE-2024/CVE-2024-560xx/CVE-2024-56045.json) (`2024-12-31T14:15:24.827`) -- [CVE-2024-56046](CVE-2024/CVE-2024-560xx/CVE-2024-56046.json) (`2024-12-31T13:15:07.997`) -- [CVE-2024-56061](CVE-2024/CVE-2024-560xx/CVE-2024-56061.json) (`2024-12-31T14:15:24.970`) -- [CVE-2024-56064](CVE-2024/CVE-2024-560xx/CVE-2024-56064.json) (`2024-12-31T13:15:08.157`) -- [CVE-2024-56066](CVE-2024/CVE-2024-560xx/CVE-2024-56066.json) (`2024-12-31T14:15:25.117`) -- [CVE-2024-56067](CVE-2024/CVE-2024-560xx/CVE-2024-56067.json) (`2024-12-31T13:15:08.323`) -- [CVE-2024-56068](CVE-2024/CVE-2024-560xx/CVE-2024-56068.json) (`2024-12-31T13:15:08.483`) -- [CVE-2024-56070](CVE-2024/CVE-2024-560xx/CVE-2024-56070.json) (`2024-12-31T14:15:25.257`) -- [CVE-2024-56071](CVE-2024/CVE-2024-560xx/CVE-2024-56071.json) (`2024-12-31T13:15:08.633`) -- [CVE-2024-56203](CVE-2024/CVE-2024-562xx/CVE-2024-56203.json) (`2024-12-31T14:15:25.400`) -- [CVE-2024-56204](CVE-2024/CVE-2024-562xx/CVE-2024-56204.json) (`2024-12-31T14:15:25.547`) -- [CVE-2024-56205](CVE-2024/CVE-2024-562xx/CVE-2024-56205.json) (`2024-12-31T13:15:08.803`) -- [CVE-2024-56206](CVE-2024/CVE-2024-562xx/CVE-2024-56206.json) (`2024-12-31T14:15:25.680`) -- [CVE-2024-56207](CVE-2024/CVE-2024-562xx/CVE-2024-56207.json) (`2024-12-31T14:15:25.830`) +- [CVE-2023-6602](CVE-2023/CVE-2023-66xx/CVE-2023-6602.json) (`2024-12-31T15:15:06.240`) +- [CVE-2023-6603](CVE-2023/CVE-2023-66xx/CVE-2023-6603.json) (`2024-12-31T15:15:07.490`) +- [CVE-2024-13070](CVE-2024/CVE-2024-130xx/CVE-2024-13070.json) (`2024-12-31T15:15:07.853`) +- [CVE-2024-13072](CVE-2024/CVE-2024-130xx/CVE-2024-13072.json) (`2024-12-31T15:15:08.083`) +- [CVE-2024-25133](CVE-2024/CVE-2024-251xx/CVE-2024-25133.json) (`2024-12-31T15:15:08.283`) +- [CVE-2024-52047](CVE-2024/CVE-2024-520xx/CVE-2024-52047.json) (`2024-12-31T16:15:25.923`) +- [CVE-2024-52048](CVE-2024/CVE-2024-520xx/CVE-2024-52048.json) (`2024-12-31T16:15:26.063`) +- [CVE-2024-52049](CVE-2024/CVE-2024-520xx/CVE-2024-52049.json) (`2024-12-31T16:15:26.193`) +- [CVE-2024-52050](CVE-2024/CVE-2024-520xx/CVE-2024-52050.json) (`2024-12-31T16:15:26.313`) +- [CVE-2024-53647](CVE-2024/CVE-2024-536xx/CVE-2024-53647.json) (`2024-12-31T16:15:26.437`) +- [CVE-2024-56198](CVE-2024/CVE-2024-561xx/CVE-2024-56198.json) (`2024-12-31T16:15:27.247`) +- [CVE-2024-56802](CVE-2024/CVE-2024-568xx/CVE-2024-56802.json) (`2024-12-31T16:15:28.240`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `22` -- [CVE-2022-41737](CVE-2022/CVE-2022-417xx/CVE-2022-41737.json) (`2024-12-31T14:19:48.027`) -- [CVE-2022-41738](CVE-2022/CVE-2022-417xx/CVE-2022-41738.json) (`2024-12-31T14:21:08.167`) -- [CVE-2024-1297](CVE-2024/CVE-2024-12xx/CVE-2024-1297.json) (`2024-12-31T14:28:27.090`) -- [CVE-2024-1644](CVE-2024/CVE-2024-16xx/CVE-2024-1644.json) (`2024-12-31T14:30:42.993`) -- [CVE-2024-1748](CVE-2024/CVE-2024-17xx/CVE-2024-1748.json) (`2024-12-31T14:50:15.207`) -- [CVE-2024-26284](CVE-2024/CVE-2024-262xx/CVE-2024-26284.json) (`2024-12-31T14:39:53.067`) +- [CVE-2021-46979](CVE-2021/CVE-2021-469xx/CVE-2021-46979.json) (`2024-12-31T16:02:49.137`) +- [CVE-2021-46980](CVE-2021/CVE-2021-469xx/CVE-2021-46980.json) (`2024-12-31T16:06:11.213`) +- [CVE-2021-46982](CVE-2021/CVE-2021-469xx/CVE-2021-46982.json) (`2024-12-31T16:08:54.203`) +- [CVE-2021-46986](CVE-2021/CVE-2021-469xx/CVE-2021-46986.json) (`2024-12-31T16:14:55.390`) +- [CVE-2022-43842](CVE-2022/CVE-2022-438xx/CVE-2022-43842.json) (`2024-12-31T15:32:22.737`) +- [CVE-2024-13067](CVE-2024/CVE-2024-130xx/CVE-2024-13067.json) (`2024-12-31T16:15:25.280`) +- [CVE-2024-13069](CVE-2024/CVE-2024-130xx/CVE-2024-13069.json) (`2024-12-31T16:15:25.580`) +- [CVE-2024-1317](CVE-2024/CVE-2024-13xx/CVE-2024-1317.json) (`2024-12-31T16:57:11.080`) +- [CVE-2024-1318](CVE-2024/CVE-2024-13xx/CVE-2024-1318.json) (`2024-12-31T16:56:50.763`) +- [CVE-2024-1334](CVE-2024/CVE-2024-13xx/CVE-2024-1334.json) (`2024-12-31T16:48:40.290`) +- [CVE-2024-1335](CVE-2024/CVE-2024-13xx/CVE-2024-1335.json) (`2024-12-31T16:50:11.167`) +- [CVE-2024-1336](CVE-2024/CVE-2024-13xx/CVE-2024-1336.json) (`2024-12-31T16:51:04.857`) +- [CVE-2024-1338](CVE-2024/CVE-2024-13xx/CVE-2024-1338.json) (`2024-12-31T16:51:41.113`) +- [CVE-2024-1339](CVE-2024/CVE-2024-13xx/CVE-2024-1339.json) (`2024-12-31T16:52:24.407`) +- [CVE-2024-1749](CVE-2024/CVE-2024-17xx/CVE-2024-1749.json) (`2024-12-31T15:00:58.700`) +- [CVE-2024-1750](CVE-2024/CVE-2024-17xx/CVE-2024-1750.json) (`2024-12-31T15:08:18.000`) +- [CVE-2024-24772](CVE-2024/CVE-2024-247xx/CVE-2024-24772.json) (`2024-12-31T16:22:12.747`) +- [CVE-2024-24773](CVE-2024/CVE-2024-247xx/CVE-2024-24773.json) (`2024-12-31T16:23:25.093`) +- [CVE-2024-24779](CVE-2024/CVE-2024-247xx/CVE-2024-24779.json) (`2024-12-31T16:26:31.327`) +- [CVE-2024-26016](CVE-2024/CVE-2024-260xx/CVE-2024-26016.json) (`2024-12-31T16:27:58.487`) +- [CVE-2024-27087](CVE-2024/CVE-2024-270xx/CVE-2024-27087.json) (`2024-12-31T15:34:15.493`) +- [CVE-2024-27315](CVE-2024/CVE-2024-273xx/CVE-2024-27315.json) (`2024-12-31T16:16:15.510`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f6253538fa2..592e0719661 100644 --- a/_state.csv +++ b/_state.csv @@ -187166,14 +187166,14 @@ CVE-2021-46975,0,0,379ee4cd812bfdbb2fdb73351c9c5db9b3f393ba3702c95ca5be896799b9e CVE-2021-46976,0,0,e1a10dcaf0ca218c08f2f984000603635b5a62d77a616e1c0588f5d4012ca1ec,2024-11-21T06:35:05.727000 CVE-2021-46977,0,0,abaefec21bb41f64086d5f605340075c6e9256ac541d13045f609ae6a6ea143f,2024-11-21T06:35:05.900000 CVE-2021-46978,0,0,7632bd72af74ec52ab23e8393618f1c9e0bd62aa29238b1cbf24fe508f87bc32,2024-11-21T06:35:06.053000 -CVE-2021-46979,0,0,531de05bbc8ad6efe1fbafbf466163775d426cc7b4be7151c7d6528b9725a804,2024-11-21T06:35:06.310000 -CVE-2021-46980,0,0,e219ad1d8c6deb10790768406f1eda9c91628230504231f3150f7d138bf87fd2,2024-11-21T06:35:06.453000 +CVE-2021-46979,0,1,05df5f108a7023926f84cc70e853c6e15ebcff4fd26aafd819986e545f0e2bb9,2024-12-31T16:02:49.137000 +CVE-2021-46980,0,1,29ac8bbf5f73a90878471644d925c41e8453bf7f55274777895600ed9f7abcdc,2024-12-31T16:06:11.213000 CVE-2021-46981,0,0,281b8d3bd5246febb07b2f37e1e28153bb01deea8dd3565580ccf7e81f7832ef,2024-12-06T15:59:55.120000 -CVE-2021-46982,0,0,bb878d503654868c0717fbf5b1fa1e14a56b4780ede186a2e70c46577c95e9c9,2024-11-21T06:35:06.777000 +CVE-2021-46982,0,1,17e362745f95948871744d5a1829fc78fe60c616101b3031eb5d1b76b89e5fbf,2024-12-31T16:08:54.203000 CVE-2021-46983,0,0,7623a46cfb41eb0accdf877d2048554768c69745b1a465c2891d4276d6274c99,2024-12-06T16:02:03.857000 CVE-2021-46984,0,0,d9cce9d726ee3d6403e2144a0618518d03488b8f6aa8580231d506cf0d7c311a,2024-12-06T15:00:58.083000 CVE-2021-46985,0,0,b55f7da4d8af6b538e5342c699879b38a7eac54f39c8d2da26b510610f029cd8,2024-12-06T15:02:17.187000 -CVE-2021-46986,0,0,e8bf96e7d68a0a39498049c9247d2d34f593bd8c73d1f880d85fb602a45b9951,2024-11-21T06:35:07.760000 +CVE-2021-46986,0,1,708b085c0fe7c0bf61a17323e3c4ab1e77b1149488de2d24b27351080a4f664b,2024-12-31T16:14:55.390000 CVE-2021-46987,0,0,8b30e27b6b209d80685bed3bea9ab3c4c2b966757291dae1784881a91a36c579,2024-12-06T15:07:49.483000 CVE-2021-46988,0,0,de8d73a57494caab48e725962c4418d3d631d0723f1dc9c9f4d6cd417f6dc70a,2024-12-26T15:01:37.110000 CVE-2021-46989,0,0,600337192eb6414d45bda3482618305f3b218774e0cae5d5e975853340f7b41b,2024-11-21T06:35:08.167000 @@ -207715,8 +207715,8 @@ CVE-2022-41733,0,0,a33bad2d096cfabf94fd96ab2c15c910567f83330493f202c0337dfe5fa35 CVE-2022-41734,0,0,3d9bdafd545e87b6f7b40b5fae82e1bbe3202ea7063823ef45692f74c3a5138a,2024-11-21T07:23:45.457000 CVE-2022-41735,0,0,79ae46b378050f3063db7f1e154eb6fd129e1b507178a4589652afc913d1565f,2024-11-21T07:23:45.580000 CVE-2022-41736,0,0,b9fa7599a6edb105accb67d3ed449e8a41a61f0a60f4e25331e041b5266671d5,2024-11-21T07:23:45.713000 -CVE-2022-41737,0,1,bd3495393ed0eb9d03402d761c345751e872f1a1d5dc29dd84adc370983bc2ab,2024-12-31T14:19:48.027000 -CVE-2022-41738,0,1,f0537fd1bb25c514424cbd88901c97cb7b1b9c51dd793956eeebf732e75a12c0,2024-12-31T14:21:08.167000 +CVE-2022-41737,0,0,bd3495393ed0eb9d03402d761c345751e872f1a1d5dc29dd84adc370983bc2ab,2024-12-31T14:19:48.027000 +CVE-2022-41738,0,0,f0537fd1bb25c514424cbd88901c97cb7b1b9c51dd793956eeebf732e75a12c0,2024-12-31T14:21:08.167000 CVE-2022-41739,0,0,0927b42a7e6f4842bb1aafcdc53a502c11511d195af4c6bfbd7e78cd3eccf651,2024-11-21T07:23:46.063000 CVE-2022-4174,0,0,6639057865298a59c68ab0005d05cdf41270faddb234659455633202cd6b8187,2024-11-21T07:34:43.140000 CVE-2022-41740,0,0,0b6f76e30c7e215c2244d6260926569cff33efa87e81c9bff42cc0279fcdbf83,2024-11-21T07:23:46.190000 @@ -209388,7 +209388,7 @@ CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6 CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000 CVE-2022-4384,0,0,25f24049ccb5584ac2286059b580466c788619146479cad249f1b9e96586286f,2024-11-21T07:35:10.520000 CVE-2022-43841,0,0,5e658697ccfadbb9f98074078502198ab979b928c36ff4bdaf8f2f2a83f1efff,2024-11-21T07:27:15.813000 -CVE-2022-43842,0,0,cb0c5f963bf2c360020d575c325e3e7f8de6c8b39159aff8e8bf2aeecc9d860e,2024-11-21T07:27:15.937000 +CVE-2022-43842,0,1,6e561483c3801b15ff00dd2bfb39984ef10bf648e6925ca1d605d91b8d4bb1e3,2024-12-31T15:32:22.737000 CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000 CVE-2022-43844,0,0,12fe96ea4e7f35e34da57a23786e8679400ecf390c193dcfa13dea7351d25cce,2024-11-21T07:27:16.227000 CVE-2022-43845,0,0,4dd0555a0d80dc6547097d2325e631aae8cc1a25ed03e0c104688f7fd5b7e883,2024-09-30T15:53:01.643000 @@ -237357,7 +237357,7 @@ CVE-2023-48771,0,0,a4a424861e0d7acc67ca6d05c1c28418c8585c100a79b9b63aab858158b6a CVE-2023-48772,0,0,0c43ac47883d8df1dd3af913749f86f550e73578fea685085738b693f50aa21c,2024-11-21T08:32:25.287000 CVE-2023-48773,0,0,69c2d10ce53d5bed5abbbabd5452f88c034b79ad27513b7475e9a369aba8c011,2024-11-21T08:32:25.420000 CVE-2023-48774,0,0,df67987526796cf9139d3a58e2031842a7b4119a36678e2120d6525442d00f66,2024-12-09T13:15:33.937000 -CVE-2023-48775,1,1,774bced3459c83730c54539a34e01f9d304231fd886b3f930056e1a5effa8a40,2024-12-31T13:15:05.650000 +CVE-2023-48775,0,0,774bced3459c83730c54539a34e01f9d304231fd886b3f930056e1a5effa8a40,2024-12-31T13:15:05.650000 CVE-2023-48776,0,0,60422db6013f51551677e22d94d4d864bd4aac472b3cb692bc594e8b25dde16d,2024-12-09T13:15:34.077000 CVE-2023-48777,0,0,da2fb312c81f4d39e1f6b619e89a76e40c7e69d7c2693339a128d1645085873b,2024-11-21T08:32:25.547000 CVE-2023-48778,0,0,65cedce3479eb1a4b909913b713ad810f6c269d477fecb40f5921fedfb5b424e,2024-11-21T08:32:25.667000 @@ -238694,7 +238694,7 @@ CVE-2023-50847,0,0,8af88a86a3973ffb9b180f3688093f1185c41115fba9de24528f2281cbaca CVE-2023-50848,0,0,03098ffc01df1a6f925be974e2b8b2896eb8309e51fcdf8dbc50d422b690e589,2024-11-21T08:37:24.307000 CVE-2023-50849,0,0,d5fdca61f99f1dbfefeff38bb6cfb6fd829f36ca030c93562f4c6219bc386f41,2024-11-21T08:37:24.440000 CVE-2023-5085,0,0,c3dc096463ec9767731a311106d0ff3749acd54e0bded3788615c36bbd3edb19,2024-11-21T08:41:02.137000 -CVE-2023-50850,1,1,8ca7c1ebf08daa8c3797d045750434034b7121f316e1dc7d8b1bbe6fdbd397a8,2024-12-31T13:15:06.940000 +CVE-2023-50850,0,0,8ca7c1ebf08daa8c3797d045750434034b7121f316e1dc7d8b1bbe6fdbd397a8,2024-12-31T13:15:06.940000 CVE-2023-50851,0,0,b23caecb559751b1d7c39c8e23f07629189c7f211a209dc78210c3aab52fd434,2024-11-21T08:37:24.553000 CVE-2023-50852,0,0,07e31b4498bb410dbcfd349d83d51403c44c3e6184f018d4c847cae472dc96c2,2024-11-21T08:37:24.673000 CVE-2023-50853,0,0,132512219726e09d089c7105fb3a1079c0f04772601a90b12042f17457979fc7,2024-11-21T08:37:24.797000 @@ -241572,6 +241572,8 @@ CVE-2023-6597,0,0,89b58fa3929cae1473acd78809c36d26c8296660b8913ae3a27336303cbd49 CVE-2023-6598,0,0,6053f14e270dc7076cdc46c9acbd31f7f0ee707160eb4a14b11a84dc8ad71002,2024-11-21T08:44:10.607000 CVE-2023-6599,0,0,b0308b9ca19634b3fb537e54bec970bdcf5229a8d791c9c7b7b83a8cf17b1088,2024-11-21T08:44:10.740000 CVE-2023-6600,0,0,2434010c942a6205776298fb5a7e14d80ba060213c80be479cc1c00dcc02dd91,2024-11-21T08:44:10.873000 +CVE-2023-6602,1,1,ff6032b5f30c87b074d8cc9771855adb5de988c336a4516bc6c8c8438fbc5efa,2024-12-31T15:15:06.240000 +CVE-2023-6603,1,1,b6c173a7c5257b96a51f84fa889a1cc7499c1e0d4eb844cace7688371ad7a964,2024-12-31T15:15:07.490000 CVE-2023-6606,0,0,8c51965fe5b8c0f5bc9f15f26c28d2f6ae9ab77217ae35702f9542ba8aa7d3dd,2024-11-21T08:44:11 CVE-2023-6607,0,0,b26de4c0815d9e5bfb034470256846caa6d64731defe9bbb333e33aa5af35930,2024-11-21T08:44:11.200000 CVE-2023-6608,0,0,e345741cecbf23cc4076c5f2284f1330a317f8731383fc6e8c7c4d9d02af8e3a,2024-11-21T08:44:11.360000 @@ -245226,7 +245228,7 @@ CVE-2024-12966,0,0,2b9f12982839474c2e9bdcaa35313f34a8e49674ee4c820004a347386206e CVE-2024-12967,0,0,373940667d19816c3418d961d099af60d3af6231ff28cd91d7af64f003be34e3,2024-12-30T15:15:08.143000 CVE-2024-12968,0,0,0365cfa50aed25aedb7b14e0121254d6a1ab1fc0b7f758bc56f083b331d8bb13,2024-12-27T17:15:07.867000 CVE-2024-12969,0,0,11cb52c0f3a8d2b5e3f9f455e34a756b2b5e55ad686d92ced4ed9827b4f944c8,2024-12-27T17:15:07.993000 -CVE-2024-1297,0,1,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 +CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 CVE-2024-12976,0,0,d8d82f821858178cd7d8f1c6b845051fdd1295a5c139d430dc7de27604806bc6,2024-12-27T19:15:08 CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000 CVE-2024-12978,0,0,04a59dc4b363139238466108de9e8a94b7678b4462324185368dbf91da408f7c,2024-12-27T04:15:05.603000 @@ -245305,9 +245307,11 @@ CVE-2024-13051,0,0,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c6321150 CVE-2024-13058,0,0,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 CVE-2024-13061,0,0,b03feaa2f4fc804226d0585c376accf3d822de2d58d31f55dfdc314d7922b688,2024-12-31T12:15:22.967000 -CVE-2024-13067,0,0,dac89381ddeb2bd239b81d96b3005b135a2a8c3e5a25d9e952411ecf22b373e9,2024-12-31T09:15:05.307000 -CVE-2024-13069,0,0,b4e1c0fcfc5a6354256ed66051b3e6362f182a10b32b325ebc3e8293696eb528,2024-12-31T11:15:06.933000 +CVE-2024-13067,0,1,e9d43e6d22a143227a87a6afa965695645cbe92ac8a9cc3c1dbae98beb301933,2024-12-31T16:15:25.280000 +CVE-2024-13069,0,1,59f5977c5ed98428bf813528205c28472dbe30bb8d317db36e1c6f0f99974166,2024-12-31T16:15:25.580000 CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000 +CVE-2024-13070,1,1,1cf6b1571384c6cecb57fe9aaf4aa9da6835f5a35960878853e71f5290759cba,2024-12-31T15:15:07.853000 +CVE-2024-13072,1,1,72b084e261b2ef9878198bf1cc32f04fdebebb613fd4a06e3be4b4d0925fd51d,2024-12-31T15:15:08.083000 CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 @@ -245316,8 +245320,8 @@ CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000 CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 -CVE-2024-1317,0,0,c43eeac6c69ecfd7572b7752e05e682d40594f9ea3c3cac0cd3f4003dc2eccb7,2024-11-21T08:50:19.267000 -CVE-2024-1318,0,0,fde1fbfc24445712414dff4d6b39226e039c928c18378a7d09fd1053c7b83b76,2024-11-21T08:50:19.403000 +CVE-2024-1317,0,1,a1d296c91e245cb27c998bff4f84250fb1101a61ebac429b7ce35a2ceb239c73,2024-12-31T16:57:11.080000 +CVE-2024-1318,0,1,875ffbabaf295988fe72077a5574dbe20799a2a8618e7dc53ba31731145c671a,2024-12-31T16:56:50.763000 CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000 CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000 CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000 @@ -245333,12 +245337,12 @@ CVE-2024-1330,0,0,502ca86aa36ef0d9cec38bb132d44e809a7c14b6c55791005f8847665ecf98 CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000 CVE-2024-1332,0,0,43a2cb0465d1ed7fa77b51d32b9ef650ccc5cd8e8f972f53915014a8e37bc428,2024-11-21T08:50:21.220000 CVE-2024-1333,0,0,7e67218d34e52c77cd12091eb7bec4820751f8a3faacd15e7977a33b9d658d65,2024-11-21T08:50:21.337000 -CVE-2024-1334,0,0,0613abe7a6a12de7526cdee66002829a8024bc47889fe9b623e296fb796d9613,2024-11-21T08:50:21.517000 -CVE-2024-1335,0,0,abf8e6ad525915bfc67a77b3c5fd0980595573fd7a4f428b7c29c4c6d0861ecf,2024-11-21T08:50:21.630000 -CVE-2024-1336,0,0,ff8d23c2576b494586c958bbd456a985212a02c5849b17a753892e91b82b2235,2024-11-21T08:50:21.747000 +CVE-2024-1334,0,1,8823bf53da4897f18ca7daefd05e524ce4cfc11c398467ab7dbcaff8bf5ff61a,2024-12-31T16:48:40.290000 +CVE-2024-1335,0,1,ea54176718e6f94079a9e0779ed189aee51a9a9a11d01cd222ee449cf90ad29f,2024-12-31T16:50:11.167000 +CVE-2024-1336,0,1,e5af9edfda730c68424d9af5f33f1559bbd76b64d2169dc5b805af38e3d13bae,2024-12-31T16:51:04.857000 CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000 -CVE-2024-1338,0,0,3fcdf8a66a7215a5acd568dd784fa9c45ae47f77dd7d23fc0d2d2fdb76828154,2024-11-21T08:50:21.963000 -CVE-2024-1339,0,0,f8c0eb6dea9c8e68c0d26e34db2db9091e3f6b5b569c33422017e7810a3fda3b,2024-11-21T08:50:22.077000 +CVE-2024-1338,0,1,ab4982baab3aa45d716862f735c7d62f5694d660c186b3fec0b7b79ca0d36280,2024-12-31T16:51:41.113000 +CVE-2024-1339,0,1,d43b3428c44a61ce6aa9affeac8c926c01429483d88c5e02ec9790aec2a3254f,2024-12-31T16:52:24.407000 CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000 CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 @@ -245620,7 +245624,7 @@ CVE-2024-1640,0,0,5a1a433d9c4fff99641db26e31a901ba05b22ce24bea862e61bd65501e5ebe CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000 CVE-2024-1642,0,0,212f14be7d8459e9a508bd3a70180152c6bcf203731c8036b94fea507b9fac7b,2024-11-21T08:50:59.280000 CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a3990120,2024-11-21T08:50:59.403000 -CVE-2024-1644,0,1,ca5626d9cf912b2ce4bee93299ee7b5c513887bff992bcfcb23fbacc3bb135ea,2024-12-31T14:30:42.993000 +CVE-2024-1644,0,0,ca5626d9cf912b2ce4bee93299ee7b5c513887bff992bcfcb23fbacc3bb135ea,2024-12-31T14:30:42.993000 CVE-2024-1645,0,0,fc2db15dc582e529d4e2d85af443e9dede47328e7ae86a8af4f691034414bd50,2024-11-21T08:50:59.670000 CVE-2024-1646,0,0,5059540515ce7eb8ae68b15c4eec4ff01ea4b884936486b4b6938c6175d66543,2024-11-21T08:50:59.783000 CVE-2024-1647,0,0,61673824377e23ed6345f1ce2d3e2dfdab70aa35a8f57fa1b19d6f80febcb2a6,2024-11-21T08:50:59.913000 @@ -245720,9 +245724,9 @@ CVE-2024-1744,0,0,e57e89c1c38c1b4f16fac07cd4c094af44c29de3b59f0a0effddbbf171558f CVE-2024-1745,0,0,abd8adfe6df8d51ddd96937437915d89e70976d02fbf70da9c7aba7a8dc30da2,2024-11-21T08:51:13.010000 CVE-2024-1746,0,0,d737ae6f99df6e75b9f9e494f5de9d239aa5dc5be6bc3fd9000ad7db33bb4a0d,2024-11-21T08:51:13.197000 CVE-2024-1747,0,0,27286aec8fdbaab5a8f39768113911219c8413c899f355e1ed4f720cbf58b487,2024-08-01T15:35:05.150000 -CVE-2024-1748,0,1,74d4cea0e1c1e4a98588fa2c5afc3a34ad68ccf8b3cd99bacd857379be149895,2024-12-31T14:50:15.207000 -CVE-2024-1749,0,0,5f1973c08e03b3504b8d096510f87ce22f1dbb3adac8d6616bb05d53cb66da89,2024-11-21T08:51:13.700000 -CVE-2024-1750,0,0,aa85da8d40a8b0e8c87075f8f689437cd6e5b4ef5d1d026d29db099b9d4714e2,2024-11-21T08:51:13.837000 +CVE-2024-1748,0,0,74d4cea0e1c1e4a98588fa2c5afc3a34ad68ccf8b3cd99bacd857379be149895,2024-12-31T14:50:15.207000 +CVE-2024-1749,0,1,07e2a36d9ad03d4437e74380edf301acc801a649896e27c665ad7589dcbb493c,2024-12-31T15:00:58.700000 +CVE-2024-1750,0,1,fef6cbfaa97593c57d704c7e0fa8c0ee9d4eefb72692ba6adb5d415e3678f776,2024-12-31T15:08:18 CVE-2024-1751,0,0,ab01569a5cf06f449728e9489242c171643dba40d6c01524f77775fddd5807fc,2024-11-21T08:51:13.987000 CVE-2024-1752,0,0,899790f65b6ea36fdaaec55cf9cba5c9e8120dada21d406f68487a9d2bb0a9d3,2024-11-21T08:51:14.110000 CVE-2024-1753,0,0,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f64503d,2024-11-26T20:15:26.237000 @@ -249542,13 +249546,13 @@ CVE-2024-24768,0,0,f4716eea5cbfdded2fe5819f0fafcdfc1765e4a8285654efd5160f3d68471 CVE-2024-2477,0,0,d4fbb6a7199582203d04c57c4a507f5e44f438036cba94fbb2367befe030bb8a,2024-11-21T09:09:50.353000 CVE-2024-24770,0,0,edfb7c51cf2941d43343c18f1e3c5112e25a691c8b6403b153771dc1a6637c61,2024-11-21T08:59:39.977000 CVE-2024-24771,0,0,7009a7a317e9017a3c8d089f11274418ce8fa0caca973c650c21be34c755d8be,2024-11-21T08:59:40.127000 -CVE-2024-24772,0,0,3dd1b6911ebf1a17c00e496994e0b6469a35aa320b403d1b3c8ca5a81c7035db,2024-11-21T08:59:40.283000 -CVE-2024-24773,0,0,8be4988cc91b9f4e26bab950161608100de67117a3260bd71fad5696b221b5d4,2024-11-21T08:59:40.423000 +CVE-2024-24772,0,1,fa8d8afa3e6ee94ef81794f1afdf8fa58557e5bb82b8f60f170c5a1ad8ce93e7,2024-12-31T16:22:12.747000 +CVE-2024-24773,0,1,be5dbf7a6261cbe0532f99bcba9db1f6241b8c06edacadc478f7c52545d83eb5,2024-12-31T16:23:25.093000 CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a593984303eb,2024-11-21T08:59:40.547000 CVE-2024-24775,0,0,5fbf4068aee5b4a63d5bc8c27165baed12b61ed8648f8952c732695b9d7ee9dd,2024-11-21T08:59:40.720000 CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000 CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000 -CVE-2024-24779,0,0,913c8b0ca6161d3799afa1173ae119ae45044a093b0e95b6abda7e691a02e6f2,2024-11-21T08:59:41.143000 +CVE-2024-24779,0,1,f7bc46f29c0a12895669fc7cc6a9283783810500702236b348f45b5c02f935f9,2024-12-31T16:26:31.327000 CVE-2024-2478,0,0,e85196d894b10e02f1a421f833798ced2a47eb5d6f2dba4c90c6c4ecef4da3bf,2024-11-21T09:09:50.483000 CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000 CVE-2024-24782,0,0,80499092009d98ba529bfca673a7ac4275b61ad8394a4890122e575a7c7e8097,2024-11-21T08:59:41.467000 @@ -249860,6 +249864,7 @@ CVE-2024-25129,0,0,2604b0d083aa6b811ce626d5e0d68fa8a4d20df83b064e942d8925d782144 CVE-2024-2513,0,0,36a2204c3fd6b7b0d5979029682413ad27d7399117bcab08af84ed0f3129ba46,2024-11-21T09:09:54.893000 CVE-2024-25130,0,0,857561f7163809aaab52302af2067a400725f38d7068fc40b7911a37097dbdc8,2024-11-21T09:00:19.023000 CVE-2024-25131,0,0,ceb8f79a596f7dfcc1a6c1d7239611c1edcfd90538f3aabea1606b25009f15f3,2024-12-19T15:15:07.070000 +CVE-2024-25133,1,1,54a24b7a0d6c8ade3e83aafb0186b534bbf4b25fcc368eefe5f6bd50e4143e04,2024-12-31T15:15:08.283000 CVE-2024-25136,0,0,fd3e659838fe8e60e31caed167fe0a2ee44d58da08a3516e05cbf377e2acecc5,2024-11-21T09:00:19.150000 CVE-2024-25137,0,0,551f3b541fbbc9dcd6b47f5c71c8a46148d1a721582998d20fa87f2cf6578d35,2024-11-21T09:00:19.287000 CVE-2024-25138,0,0,1698c5f2bc9a0b670f8c6e4fc5e4345882415f9bfce2ea6fa639d6363cc0ad04,2024-11-21T09:00:19.407000 @@ -250461,7 +250466,7 @@ CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01 CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 -CVE-2024-26016,0,0,9e0dd0c92fd9be6b95f7f1bc21dbcc0d708f36282cade5ecfae3de9213ad30e7,2024-11-21T09:01:46.090000 +CVE-2024-26016,0,1,dd632393ecfda7bcefa8170ded33d72e8e2f0339866b8ccf741d814fe6f9ab75,2024-12-31T16:27:58.487000 CVE-2024-26017,0,0,11d040a25f5c2d5c2e1e2401973b3159ea6e8ba153c9a2238d873c2f164fc160,2024-11-15T14:00:09.720000 CVE-2024-26018,0,0,2ce937190f1a3d6a5b32ac3dc44844a76544d21abc3c13edb30e7e9f1ae3e868,2024-11-21T09:01:46.343000 CVE-2024-26019,0,0,47740102c6ff96f7cdf82a61ec34d114a985da5f23a4590422c0d7ffc1d08c5f,2024-11-25T19:15:08.683000 @@ -250737,7 +250742,7 @@ CVE-2024-26280,0,0,4dba0b4b9e72b2f6fda48443a2b6037b4825bda1db2a34cc5aafddc35a399 CVE-2024-26281,0,0,107386b8a39e0d33b9b54932351e82ca730a36737855b38bfd913716a0abc880,2024-11-21T09:02:17.870000 CVE-2024-26282,0,0,2cc47a64c57207c0b4b1555e1dbd660936d462eb1025057272aa17e84ed0cc58,2024-11-21T09:02:18.053000 CVE-2024-26283,0,0,67727c15898ca0345e0ba65415a8a83e2c55a918f47c457090dc0b76ef2f95ab,2024-11-21T09:02:18.220000 -CVE-2024-26284,0,1,572db44ab010fc15f514ad94f364d0e8fa76b6e5465b3fd409004443f7ab1ec5,2024-12-31T14:39:53.067000 +CVE-2024-26284,0,0,572db44ab010fc15f514ad94f364d0e8fa76b6e5465b3fd409004443f7ab1ec5,2024-12-31T14:39:53.067000 CVE-2024-26287,0,0,a6aa5e3005a08ad2bdeb88cca399334d57123c9b3cf8d04b234e0711a3fc2654,2024-02-22T12:15:46.420000 CVE-2024-26288,0,0,d914eed56ced35579f60a9694d621623fae12b5d0fc07aba61628a768aebea04,2024-11-21T09:02:18.523000 CVE-2024-26289,0,0,48a7a7a5fafdfa8d5f7dbc61909a6d99dc01723526113e644f30f0e41ba2dc35,2024-11-21T09:02:18.637000 @@ -251408,7 +251413,7 @@ CVE-2024-27083,0,0,0a867c69f0761d5202838e0d6673017855748c22aaa12a5775e2cc9879208 CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416e16,2024-02-26T18:15:07.920000 CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000 CVE-2024-27086,0,0,31b4ebe2efce4a28ab0b8bcfc7f002678828a55ea41b5b1acf463da459be833a,2024-11-21T09:03:49.830000 -CVE-2024-27087,0,0,a30c4a0842d0b884edc7eac3501ad7dbd544f92e50a229796f2cadcb24f253a9,2024-11-21T09:03:49.970000 +CVE-2024-27087,0,1,cc4f44d5158441803a17a794aacfbc4914f18711058d4d238e9a570fec7d2a9b,2024-12-31T15:34:15.493000 CVE-2024-27088,0,0,f43c66360a7c9299381d0e299f4816628fffeea3c5fa73c594ae9d718302efbe,2024-11-21T09:03:50.097000 CVE-2024-27089,0,0,32c5f647bd4542a63d3920acbc84f8120e07a411286d59ab2a36ed9130fb3505,2024-02-26T20:19:06.073000 CVE-2024-2709,0,0,297c40d248d51ec740c7403fb26c5d03674e102d285a860c91e917ac0e61ced7,2024-12-12T17:29:29.930000 @@ -251629,7 +251634,7 @@ CVE-2024-27311,0,0,0c755bcc622ed9c321ec0b34f3a1b0b3952780668adba0a01799036912b6a CVE-2024-27312,0,0,950a896b01dadefd880d8932f3955c9f66315651b266e13635b82b30b52a3a82,2024-11-25T15:14:53.217000 CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000 CVE-2024-27314,0,0,c7800ff43b3dde4e64855ff4c8e9e09054f2d9523de2c8225fcf94e9bdda5465,2024-11-21T09:04:18.717000 -CVE-2024-27315,0,0,be98118c04322eb8e07da5f2e25cc656385ab6d4aad67832c37271985f9488bb,2024-11-21T09:04:18.873000 +CVE-2024-27315,0,1,69876f0445be2a257463a9ba8aea4c576cbe92cff0d007bfe9a7f96610752dec,2024-12-31T16:16:15.510000 CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079f16,2024-11-21T09:04:18.993000 CVE-2024-27317,0,0,b8cb397c1dd25df8528d924f4a62d807beeea4e76cb88f463ebe43293b5fadac,2024-11-21T09:04:19.237000 CVE-2024-27318,0,0,a39bb4bb6ceefb9dab21937c537b420423d8cb9a6ce6d647023eb496b3d6b5b8,2024-11-21T09:04:19.373000 @@ -267603,19 +267608,19 @@ CVE-2024-49682,0,0,1be8ca92696fefc2dbcfcb6321a4e4bba71eb7e99599246dbba19a2990e0e CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000 CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000 CVE-2024-49685,0,0,caea3f86fb77aaa3e3026aa8a74adcd66d73ae057e76042ddf5cfe89f39cb8d6,2024-11-01T12:57:03.417000 -CVE-2024-49686,1,1,b09a989fa167ab1ce18532d3f65453d6c2aa0cd048c77a99694ea7a0211f1ccc,2024-12-31T14:15:23.137000 -CVE-2024-49687,1,1,d32ef769baab79f9a783c3a7ba1875acf663f6989de09a3ed4f0c110fc5e4904,2024-12-31T14:15:23.430000 +CVE-2024-49686,0,0,b09a989fa167ab1ce18532d3f65453d6c2aa0cd048c77a99694ea7a0211f1ccc,2024-12-31T14:15:23.137000 +CVE-2024-49687,0,0,d32ef769baab79f9a783c3a7ba1875acf663f6989de09a3ed4f0c110fc5e4904,2024-12-31T14:15:23.430000 CVE-2024-49689,0,0,5b95dcb1b308ac9918618c653b8d612d05dba2416c0a5caade9d4ff079c39dcd,2024-11-19T21:57:32.967000 CVE-2024-4969,0,0,590a42a007878875f8821a8461ae21649b587614d8fa87d6d7abc856a4793907,2024-11-21T09:43:58.430000 CVE-2024-49690,0,0,e7d1fbeec3ae6b3b41207427caf7ef895bb3e2f53a7a24c5af615a4c19bee7df,2024-10-25T12:56:36.827000 CVE-2024-49691,0,0,2f3c33899873b4bca45696103bf1bbca6b35f2f5e193db4c70c0b540bc208ed1,2024-10-25T12:56:07.750000 CVE-2024-49692,0,0,63f1db65001fdd89311c7274cad5fd7c03efa214b1be9bf8dfe49d3d0c423ea9,2024-11-08T14:55:56.947000 CVE-2024-49693,0,0,44d78874f13d80a90e8b1d3381135df2d470fd44cf95ccececddf651f87dfe70,2024-11-08T15:19:50.400000 -CVE-2024-49694,1,1,6e0f0d9798d01bf3abec9994165635447a13247b6e1041947298899e65232b56,2024-12-31T14:15:23.567000 +CVE-2024-49694,0,0,6e0f0d9798d01bf3abec9994165635447a13247b6e1041947298899e65232b56,2024-12-31T14:15:23.567000 CVE-2024-49695,0,0,83cd58e8b597dad6e6c36cfc6ae43f6a32a1a4af5eeaeb26b9996a7c576928f1,2024-11-08T15:20:33.257000 CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766ec9,2024-11-08T15:21:12.533000 CVE-2024-49697,0,0,530eb2f42eba87aaffb73d54c4b9e27dfb5194483cfcc3edf311ece4f08a0142,2024-11-19T21:57:32.967000 -CVE-2024-49698,1,1,cc5f3b18b4d3442e78743a42c4c6d5e28454ee6e32e659bae8ddcbc3df2e8c9f,2024-12-31T14:15:23.697000 +CVE-2024-49698,0,0,cc5f3b18b4d3442e78743a42c4c6d5e28454ee6e32e659bae8ddcbc3df2e8c9f,2024-12-31T14:15:23.697000 CVE-2024-4970,0,0,ceae782189e36ea72b2794d871ba0e98c5d8d6d33670b120902bfb4e771c4acb,2024-11-21T09:43:58.627000 CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000 CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000 @@ -268974,7 +268979,7 @@ CVE-2024-51662,0,0,238aef4ec3bb2103208d2571b222a192ce1bc63b5768c596b0550f9a53024 CVE-2024-51663,0,0,23de5c091a55aa24b19c5d5920ebb2a18811a61b1cfb0c1e54c00fb912be0326,2024-11-18T16:54:02.457000 CVE-2024-51664,0,0,7c9d89a93636181c0db5f633dce66403f4afe72a6f264ac128d68991d43b436b,2024-11-18T16:55:08.183000 CVE-2024-51665,0,0,ca0d2b7081d27d1deb85dc534f4acbfcf953445abd78727c39ccd205fd72c238,2024-11-06T22:07:10.707000 -CVE-2024-51667,1,1,7894353927f6dba7e43d2daffdcd82bc4ea644f0c896c9845d5e282557fbe100,2024-12-31T14:15:23.827000 +CVE-2024-51667,0,0,7894353927f6dba7e43d2daffdcd82bc4ea644f0c896c9845d5e282557fbe100,2024-12-31T14:15:23.827000 CVE-2024-51668,0,0,14a8d783e672310bba3467db772e216d308161cfb0eb152a89517fa6214249c8,2024-11-18T16:51:31.227000 CVE-2024-51669,0,0,82aa3c5d679c42aa50b8bb219111bca86e29e8d5f223b00587efeaee0978ad5f,2024-11-25T14:46:27.873000 CVE-2024-5167,0,0,fe77c2bef4dda4bcd8edc49a185a6194f97f2f334490811a5fdb0dbedfde855f,2024-11-21T09:47:06.823000 @@ -269296,7 +269301,11 @@ CVE-2024-52034,0,0,8072163119d29e3d7cc1af6d3ff22d184e9e2263ebc70094a6b8e6922599c CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000 CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000 CVE-2024-52046,0,0,226283db324e2d9b866e00b93c22fb02aa41377a5347123e63df9758cf7f6088,2024-12-25T11:15:05.293000 +CVE-2024-52047,1,1,e05cbf7f7684d528fa05d3d1e73490e32a72a3a9217677f0d70f0354095e58e7,2024-12-31T16:15:25.923000 +CVE-2024-52048,1,1,f9102a06b7d67d9a10d4aa5f95dc0bd9007fd9888890ffe133800481335c4e30,2024-12-31T16:15:26.063000 +CVE-2024-52049,1,1,31ef03240011d8abebb1ffeb24543c7eda748e4370012b7b8574e64ec5842205,2024-12-31T16:15:26.193000 CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c1576079,2024-11-21T09:47:11.033000 +CVE-2024-52050,1,1,c02644a595d1c2b09bf55ac4e9a01181114da0a0f5df878f77119e37bc62a76f,2024-12-31T16:15:26.313000 CVE-2024-52051,0,0,2a88c8f9f62c39002493c9459b82ce96cec1cb4b6741ecfb88f77d798525819b,2024-12-10T14:30:44.957000 CVE-2024-52052,0,0,5eeeac48f24ac467a2621d7950234ff504286fc9da5b2ff1ce8d348695057bf0,2024-11-21T23:15:04.520000 CVE-2024-52053,0,0,634822104ec4d4af8aa9cf0854397b2e2ea6f5f55e9fc999886a29a44842f7b3,2024-11-21T23:15:05.387000 @@ -270200,6 +270209,7 @@ CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d828 CVE-2024-5363,0,0,26d4875386ad8c3215b4c09e1b67dd8ce62939d9e762298e9b8ac4e18d0732aa,2024-11-21T09:47:30.223000 CVE-2024-53635,0,0,69eb99ebd3cc8f0f627f786197a00b6b987c88368caf03b14418ba15ea7b94e4,2024-11-27T18:15:18.130000 CVE-2024-5364,0,0,70608899f95aca150ea63ad11d46a4a5108c90127a7a301ace82188c2357f63e,2024-11-21T09:47:30.357000 +CVE-2024-53647,1,1,6aca2ff09386897ac522c375bf181a9919ad06f06064d2a47f457ead377101ad,2024-12-31T16:15:26.437000 CVE-2024-5365,0,0,1cfce3a239d45132ff3721a342529a7c8292cbd269d61639965b045e1105a397,2024-11-21T09:47:30.490000 CVE-2024-5366,0,0,3d4708898dde8c46157274fab31aec2bb1d6d4355897d80e5ba83e77521494aa,2024-11-21T09:47:30.617000 CVE-2024-5367,0,0,a7221799367d103e649a718fec766a2c3243ad87477c7760cdab4ba0815d2580,2024-11-21T09:47:30.747000 @@ -271152,18 +271162,18 @@ CVE-2024-55988,0,0,29432b6415b04c94a8d0eb1b75a845ef08e4008189b66c52efa14e8cba241 CVE-2024-55989,0,0,e707f533a0988b2bfc57216e816a527d20614cdc90c948dd911308abe1511f6b,2024-12-16T15:15:26.073000 CVE-2024-5599,0,0,f3e32e76596c8dfbbbc9f620e9218f469ed68b0de9d9b75b168201bc4595067e,2024-11-21T09:47:59.700000 CVE-2024-55990,0,0,70f1199a2919622861e5a195578358ac645b32788dd8f22871a4f0f6544e2cfc,2024-12-16T15:15:26.223000 -CVE-2024-55991,1,1,2b6d2a3b225da208b08cf2e053300f940a5081a46e0134ada17e746c11ce3341,2024-12-31T13:15:07.170000 +CVE-2024-55991,0,0,2b6d2a3b225da208b08cf2e053300f940a5081a46e0134ada17e746c11ce3341,2024-12-31T13:15:07.170000 CVE-2024-55992,0,0,3a92a53b1b28088a747dc25e51b5a5298ed8fdee5a7752908d383f0e1e0fd152,2024-12-16T15:15:26.377000 CVE-2024-55993,0,0,ae36d342f4e92c3c91fa789f8952d6e3879ec56feb7ffab543c711907e566de3,2024-12-16T15:15:26.523000 CVE-2024-55994,0,0,7e04714a38a4c38bb08df1f7ab727dd23504a238fc0c7a013bceb4c7eef3a1ac,2024-12-16T15:15:26.677000 -CVE-2024-55995,1,1,fc49e8e56aad5b2b05dbca0f97ad93b25c41309b5542c10c7bcc4aa919bf50ae,2024-12-31T14:15:23.963000 +CVE-2024-55995,0,0,fc49e8e56aad5b2b05dbca0f97ad93b25c41309b5542c10c7bcc4aa919bf50ae,2024-12-31T14:15:23.963000 CVE-2024-55996,0,0,051525527c437967b20b933fdd4a5eda5562774a9c966611224281057a9b5a40,2024-12-16T15:15:26.820000 CVE-2024-55997,0,0,4ddd75ddbd7e8cba6002090848d5f28f908b98196d746d4696bd512d6e85dc00,2024-12-18T12:15:11.477000 CVE-2024-55998,0,0,d76278d3c46a1747090a2639250ffe1cfc4ff55a8d82cdf9add0285b6a55398c,2024-12-16T15:15:26.957000 CVE-2024-55999,0,0,55efb565e9f4beedd46b3a3d41fbf23eb559d384546ca63d9e1d7ea34eac926b,2024-12-16T16:15:08.973000 CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000 CVE-2024-56001,0,0,5139231e1834dfdb01fa94db9cdc4fd99b8a1cdda6840a89cc6d0fd5e49e75db,2024-12-16T15:15:27.090000 -CVE-2024-56002,1,1,98ef174125c58d4077496bb09ec9806035cfd38b1b8fcc4064fa5eba6c4bdd43,2024-12-31T14:15:24.120000 +CVE-2024-56002,0,0,98ef174125c58d4077496bb09ec9806035cfd38b1b8fcc4064fa5eba6c4bdd43,2024-12-31T14:15:24.120000 CVE-2024-56003,0,0,00f6c93c049c9977ecf4fe9b8499c83382c15c3e34f2e2e2e82b604ea04338d0,2024-12-16T16:15:09.113000 CVE-2024-56004,0,0,24e2c56dce37d20761feaa3ae43804a7a5a5da718efe84028cf96e0063b8d0d3,2024-12-16T15:15:27.233000 CVE-2024-56005,0,0,41e3f9524fba561942e40759337ee83ef99e503ed528828be049c8240cca65aa,2024-12-16T15:15:27.370000 @@ -271179,16 +271189,16 @@ CVE-2024-56015,0,0,dfe5c22265c2efda8e516b0d8c875d07a90e2f08f73621c0911a45a6859c2 CVE-2024-56016,0,0,72352c145c24e5c7235f05940e5baa008585f6941c1f5a0f55cd9079c6cdfebe,2024-12-18T12:15:11.940000 CVE-2024-56017,0,0,712e189d98a2fef52195f7721a474e0e74c8371658ef85b000d5f3fb7476b956,2024-12-16T23:15:06.923000 CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000 -CVE-2024-56031,1,1,164d110e676e1c7a453ddbd792f4656e271b4b29a8622a61c1824848da1a39d7,2024-12-31T13:15:07.343000 -CVE-2024-56039,1,1,b478b593c841086df3059cb687969d54e2e0fc84360d19ab1d6fab2484be0468,2024-12-31T13:15:07.517000 +CVE-2024-56031,0,0,164d110e676e1c7a453ddbd792f4656e271b4b29a8622a61c1824848da1a39d7,2024-12-31T13:15:07.343000 +CVE-2024-56039,0,0,b478b593c841086df3059cb687969d54e2e0fc84360d19ab1d6fab2484be0468,2024-12-31T13:15:07.517000 CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000 -CVE-2024-56040,1,1,f74b3aa9cc0036aa1c48534068a22cf04f07572eb2bdb25711b867d8aa5ae75d,2024-12-31T14:15:24.333000 -CVE-2024-56041,1,1,803939e50272a57b84f1198de5f2c20f11b30050b0ff6368477bf471d9f262fe,2024-12-31T13:15:07.670000 -CVE-2024-56042,1,1,f41ed15c0bbf35b125fd87b3110d680e49a36ea7adf1e3f761462be13596960c,2024-12-31T13:15:07.823000 -CVE-2024-56043,1,1,7b6dbdaa2f9c8b9c5038038ef6bb0012a89be6e5534807cc5c85e6e9633d4b4d,2024-12-31T14:15:24.497000 -CVE-2024-56044,1,1,e335382a2f943bd89f97e542c8944917c115e64cb78fc7b2c557008b11740a04,2024-12-31T14:15:24.680000 -CVE-2024-56045,1,1,8970223aa8bae9e142b25e5ceffb0deb537010a30612651ccf0c3c715db9ec9c,2024-12-31T14:15:24.827000 -CVE-2024-56046,1,1,0ea6d4d6e776d8a38c35dd5765e9562f6fe89d60e1c3da8a991aef5f5d3536b0,2024-12-31T13:15:07.997000 +CVE-2024-56040,0,0,f74b3aa9cc0036aa1c48534068a22cf04f07572eb2bdb25711b867d8aa5ae75d,2024-12-31T14:15:24.333000 +CVE-2024-56041,0,0,803939e50272a57b84f1198de5f2c20f11b30050b0ff6368477bf471d9f262fe,2024-12-31T13:15:07.670000 +CVE-2024-56042,0,0,f41ed15c0bbf35b125fd87b3110d680e49a36ea7adf1e3f761462be13596960c,2024-12-31T13:15:07.823000 +CVE-2024-56043,0,0,7b6dbdaa2f9c8b9c5038038ef6bb0012a89be6e5534807cc5c85e6e9633d4b4d,2024-12-31T14:15:24.497000 +CVE-2024-56044,0,0,e335382a2f943bd89f97e542c8944917c115e64cb78fc7b2c557008b11740a04,2024-12-31T14:15:24.680000 +CVE-2024-56045,0,0,8970223aa8bae9e142b25e5ceffb0deb537010a30612651ccf0c3c715db9ec9c,2024-12-31T14:15:24.827000 +CVE-2024-56046,0,0,0ea6d4d6e776d8a38c35dd5765e9562f6fe89d60e1c3da8a991aef5f5d3536b0,2024-12-31T13:15:07.997000 CVE-2024-56047,0,0,83f2a6b23cf66f0a3517133f72c396641a8fcb2654419d1243a68e7351e0c8e2,2024-12-18T19:15:12.197000 CVE-2024-56048,0,0,704a7c76e471adab013ca3860c8d3d086c9ab580904e503d2d9e9c3e8cd3fe40,2024-12-18T19:15:12.333000 CVE-2024-56049,0,0,2a3abf0d0029b2c8d81ded058c8d6dd0c0a2c30acc0773a6a3fa87493498baa2,2024-12-18T19:15:12.470000 @@ -271203,14 +271213,14 @@ CVE-2024-56057,0,0,52ab628951e1d719b316ba7abe1325c61108c1e1b94190c530d208ac2916e CVE-2024-56058,0,0,acc256b72c6ddf178feafe627688e78f25a5d2961313a94b4eed1089cb116425,2024-12-18T12:15:12.087000 CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39fdfb,2024-12-18T12:15:12.237000 CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000 -CVE-2024-56061,1,1,a927c092dd0f95397e0b307c4e1af3e8d5bb91f2a179bdfbffe24b5ff58f5233,2024-12-31T14:15:24.970000 -CVE-2024-56064,1,1,c92953f604dbab61878ff679cbb2e798705688f7ee2ce65f0fa32fe474bb539d,2024-12-31T13:15:08.157000 -CVE-2024-56066,1,1,01aedb23e256a17287f4e2685f8a139aa0bf4d7c2cd9e70526b093041a5fc74c,2024-12-31T14:15:25.117000 -CVE-2024-56067,1,1,5767ad166f2dc6b99e9b5333bee9e51f87f01f4372cdb6bfa1bf5c9bbf869a41,2024-12-31T13:15:08.323000 -CVE-2024-56068,1,1,b15e0be15a5e6c7166470b5c00fff2521399d614dad3a6d77dcd89cfa369f5f9,2024-12-31T13:15:08.483000 +CVE-2024-56061,0,0,a927c092dd0f95397e0b307c4e1af3e8d5bb91f2a179bdfbffe24b5ff58f5233,2024-12-31T14:15:24.970000 +CVE-2024-56064,0,0,c92953f604dbab61878ff679cbb2e798705688f7ee2ce65f0fa32fe474bb539d,2024-12-31T13:15:08.157000 +CVE-2024-56066,0,0,01aedb23e256a17287f4e2685f8a139aa0bf4d7c2cd9e70526b093041a5fc74c,2024-12-31T14:15:25.117000 +CVE-2024-56067,0,0,5767ad166f2dc6b99e9b5333bee9e51f87f01f4372cdb6bfa1bf5c9bbf869a41,2024-12-31T13:15:08.323000 +CVE-2024-56068,0,0,b15e0be15a5e6c7166470b5c00fff2521399d614dad3a6d77dcd89cfa369f5f9,2024-12-31T13:15:08.483000 CVE-2024-5607,0,0,2f2e883967a2421396c2c72ed671760bd1b0ce90e12a34d10be305825ec8d97f,2024-11-21T09:48:00.667000 -CVE-2024-56070,1,1,cdda6b10584d633f8db0ff2915b492bb06809767c9f02d72ebcbfca8ba566624,2024-12-31T14:15:25.257000 -CVE-2024-56071,1,1,ab621aad8232ade06424a85f2d8ed086951040fe7cf9a05e25eb8e2d8dbf5542,2024-12-31T13:15:08.633000 +CVE-2024-56070,0,0,cdda6b10584d633f8db0ff2915b492bb06809767c9f02d72ebcbfca8ba566624,2024-12-31T14:15:25.257000 +CVE-2024-56071,0,0,ab621aad8232ade06424a85f2d8ed086951040fe7cf9a05e25eb8e2d8dbf5542,2024-12-31T13:15:08.633000 CVE-2024-56072,0,0,2f21e51bf736a459519872f37115b6d7b720b5912764e3d8251d315755964ab0,2024-12-16T17:15:13.500000 CVE-2024-56073,0,0,a6e397ff32d75ae8a3c1cdd7aec666fbdab955f0ddcd3e039f43dae421674c4b,2024-12-16T17:15:13.700000 CVE-2024-56074,0,0,a14415b5ae296cd11e2e04c1575df9e68986e1feed991423320ce9c846af3c6a,2024-12-16T16:15:09.250000 @@ -271244,14 +271254,15 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 +CVE-2024-56198,1,1,ac6612cbcb1f1d330025bdf013693d4c97ad1bd5a42a86f11eae0185ae408070,2024-12-31T16:15:27.247000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56201,0,0,8a150a16c59122912c829dcd4ae74581ec42a93463074adfa3bf7e42e1708846,2024-12-24T02:15:06.580000 -CVE-2024-56203,1,1,87cd3e25a9eb36f353b5ede7cce12e80474d5fa0d0e800dada2c68b85a91c38c,2024-12-31T14:15:25.400000 -CVE-2024-56204,1,1,eec426f5396455f118a0a267bf1fd4ab4987d5297285510170ff16fa0e6391b5,2024-12-31T14:15:25.547000 -CVE-2024-56205,1,1,9a0f3841073ebbf89dec55ba2314d59c466225592306299e8d627596adb9be68,2024-12-31T13:15:08.803000 -CVE-2024-56206,1,1,09037a1d42773fe86cf8ab52ec9fc54de9650f782c5a7d16fb472459344c664a,2024-12-31T14:15:25.680000 -CVE-2024-56207,1,1,1a69ed56edb9e5f7f1f5307f542fb58b13690e6b6d5b15f16ee8ed26df80a564,2024-12-31T14:15:25.830000 +CVE-2024-56203,0,0,87cd3e25a9eb36f353b5ede7cce12e80474d5fa0d0e800dada2c68b85a91c38c,2024-12-31T14:15:25.400000 +CVE-2024-56204,0,0,eec426f5396455f118a0a267bf1fd4ab4987d5297285510170ff16fa0e6391b5,2024-12-31T14:15:25.547000 +CVE-2024-56205,0,0,9a0f3841073ebbf89dec55ba2314d59c466225592306299e8d627596adb9be68,2024-12-31T13:15:08.803000 +CVE-2024-56206,0,0,09037a1d42773fe86cf8ab52ec9fc54de9650f782c5a7d16fb472459344c664a,2024-12-31T14:15:25.680000 +CVE-2024-56207,0,0,1a69ed56edb9e5f7f1f5307f542fb58b13690e6b6d5b15f16ee8ed26df80a564,2024-12-31T14:15:25.830000 CVE-2024-56209,0,0,af796ddb1e278686af452acab93e48795e8ac6892478f6485dfcd1bf2a1f79d9,2024-12-31T11:15:07.173000 CVE-2024-56210,0,0,85c79aee6f65dc95344949ff91273158b7de13483e8e1dff247bdafd0f574e29,2024-12-31T11:15:07.337000 CVE-2024-56211,0,0,2561ac63bcd02a4c3d6e2563fe50f290b21325c58f8548dae7eb232bdf996af3,2024-12-31T10:15:09.390000 @@ -271613,6 +271624,7 @@ CVE-2024-56799,0,0,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9 CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000 CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000 CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000 +CVE-2024-56802,1,1,da728ab84e76725e7f1ed6578c989f7ec589be40d92bd30231bd6257f075c533,2024-12-31T16:15:28.240000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000 CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000