Auto-Update: 2024-09-18T18:00:18.842448+00:00

This commit is contained in:
cad-safe-bot 2024-09-18 18:03:17 +00:00
parent b84c21a834
commit 9044c68e19
58 changed files with 3553 additions and 452 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3156",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T21:15:12.987",
"lastModified": "2024-07-09T18:27:53.967",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-18T17:15:13.843",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2022-04-06",
"cisaActionDue": "2022-04-27",
@ -757,6 +757,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4439",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:10.447",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:34:18.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,183 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: isdn: cpai: verifique ctr->cnr para evitar que el \u00edndice de matriz est\u00e9 fuera de l\u00edmite. cmtp_add_connection() agregar\u00eda una sesi\u00f3n cmtp a un controlador y ejecutar\u00eda un subproceso del kernel para procesar cmtp. __module_get(ESTE_M\u00d3DULO); sesi\u00f3n->tarea = kthread_run(cmtp_session, sesi\u00f3n, \"kcmtpd_ctr_%d\", sesi\u00f3n->num); Durante este proceso, el hilo del n\u00facleo llamar\u00eda a detach_capi_ctr() para desconectar un controlador de registro. Si el controlador a\u00fan no estaba conectado, detach_capi_ctr() desencadenar\u00eda un error de los l\u00edmites de \u00edndice de matriz. [ 46.866069][ T6479] UBSAN: \u00edndice de matriz fuera de los l\u00edmites en drivers/isdn/capi/kcapi.c:483:21 [ 46.867196][ T6479] el \u00edndice -1 est\u00e1 fuera de rango para el tipo 'capi_ctr *[ 32]' [ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 No contaminado 5.15.0-rc2+ #8 [ 46.869002][ T6479] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14. 0-2 01/04/2014 [ 46.870107][ T6479] Seguimiento de llamadas: [ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d [ 46.870974][ T6479] ubsan_epilogue+0x5/0x40 [ 46.871458][ T6479 ] __ubsan_handle_out_of_bounds.cold+0x43 /0x48 [ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0 [ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0 [ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60 [ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120 [ 46.874256][ T6479] kthread+0x147/0x170 [ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40 [ 46.875248][ T6479] ret_from_fork+0x1f/0x30 [ 46.875773][ T6479]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.290",
"matchCriteriaId": "C56A8089-600C-4D13-B0BD-0B3B87CAAAEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.288",
"matchCriteriaId": "F99C0BFE-2803-4525-BA2B-EA4F42F8CADE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.253",
"matchCriteriaId": "1830428A-CB40-4E7F-A4F9-177A0B9614D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.214",
"matchCriteriaId": "8491C8F9-93D0-4314-BD59-65E3038494EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.156",
"matchCriteriaId": "03015A9C-56AA-4210-9491-CF2FB0F45B9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.76",
"matchCriteriaId": "E61528CE-9083-425B-AE36-3791232BF780"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.14.15",
"matchCriteriaId": "63BD46C4-473F-45F9-93E9-F67D955321D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E46C74C6-B76B-4C94-A6A4-FD2FFF62D644"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "60134C3A-06E4-48C1-B04F-2903732A4E56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0460DA88-8FE1-46A2-9DDA-1F1ABA552E71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*",
"matchCriteriaId": "AF55383D-4DF2-45DC-93F7-571F4F978EAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9E9481B2-8AA6-4CBD-B5D3-C10F51FF6D01"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/24219a977bfe3d658687e45615c70998acdbac5a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/285e9210b1fab96a11c0be3ed5cea9dd48b6ac54",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7d91adc0ccb060ce564103315189466eb822cc6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f221ccbee4ec662e2292d490a43ce6c314c4594",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b6b2db77bc3121fe435f1d4b56e34de443bec75",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cc20226e218a2375d50dd9ac14fb4121b43375ff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e8b8de17e164c9f1b7777f1c6f99d05539000036",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47617",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T11:15:54.317",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T17:46:30.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: pciehp: soluciona el bucle infinito en el controlador IRQ ante un fallo de alimentaci\u00f3n. El bit de fallo de alimentaci\u00f3n detectado en el registro de estado de la ranura se diferencia de todos los dem\u00e1s eventos de conexi\u00f3n en caliente en que es fijo: solo puede borrarse despu\u00e9s de apagar la alimentaci\u00f3n de la ranura. Por PCIe r5.0, seg. 6.7.1.8: Si un controlador de energ\u00eda detecta una falla de energ\u00eda principal en la ranura de conexi\u00f3n en caliente, debe configurar autom\u00e1ticamente su pestillo interno de falla de energ\u00eda principal [...]. El bloqueo de fallo de alimentaci\u00f3n principal se borra cuando el software corta la alimentaci\u00f3n a la ranura de conexi\u00f3n en caliente. La rigidez sol\u00eda causar tormentas de interrupci\u00f3n y bucles infinitos que se solucionaron en 2009 mediante los commits 5651c48cfafe (\"PCI pciehp: solucionar el problema de la tormenta de interrupci\u00f3n por falla de energ\u00eda\") y 99f0169c17f3 (\"PCI: pciehp: habilitar la notificaci\u00f3n de software en ranuras vac\u00edas\"). Desafortunadamente, en 2020, el problema del bucle infinito se reintrodujo inadvertidamente mediante el commit 8edf5332c393 (\"PCI: pciehp: arreglar carrera de interrupci\u00f3n MSI\"): el controlador hardirq pciehp_isr() borra el bit PFD hasta que se establece el indicador power_fault_detected de pciehp. Eso sucede en el hilo IRQ pciehp_ist(), que nunca se entera del evento porque el controlador hardirq est\u00e1 atrapado en un bucle infinito. Para solucionarlo, configure el indicador power_fault_detected que ya est\u00e1 en el controlador hardirq."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.149",
"versionEndExcluding": "4.19.233",
"matchCriteriaId": "4C4F4C94-0B11-4523-8E15-6809491F03E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.69",
"versionEndExcluding": "5.4.177",
"matchCriteriaId": "CC6656B0-C3FE-4435-AE38-F8C01F20D481"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "5.10.97",
"matchCriteriaId": "AE8E786E-EFD7-410D-96DA-B24D81B51B12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.20",
"matchCriteriaId": "C68FC5B4-CC13-45E9-8050-EF9025F7A9B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.6",
"matchCriteriaId": "6739D89E-32C3-479D-B5F6-6865C5061FA5"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1db58c6584a72102e98af2e600ea184ddaf2b8af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/23584c1ed3e15a6f4bfab8dc5a88d94ab929ee12",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b4c966fb156ff3e70b2526d964952ff7c1574d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/464da38ba827f670deac6500a1de9a4f0f44c41d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6d6f1f0dac3e3441ecdb1103d4efb11b9ed24dd5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff27f7d0333cff89ec85c419f431aca1b38fb16a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47619",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T11:15:54.560",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T17:08:45.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,136 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i40e: Arreglar la reserva de colas para XDP Cuando se configur\u00f3 XDP en un sistema con una gran cantidad de CPU y NIC X722, hubo un seguimiento de llamada con desreferencia de puntero NULL. i40e 0000:87:00.0: no se pudo obtener el seguimiento de 256 colas para VSI 0 err -12 i40e 0000:87:00.0: fall\u00f3 la configuraci\u00f3n de VSI PRINCIPAL ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000000 RIP: 0010:i40e_xdp+0xea/ 0x1b0 [i40e] Seguimiento de llamadas:? i40e_reconfig_rss_queues+0x130/0x130 [i40e] dev_xdp_install+0x61/0xe0 dev_xdp_attach+0x18a/0x4c0 dev_change_xdp_fd+0x1e6/0x220 do_setlink+0x616/0x1030 ? ahci_port_stop+0x80/0x80? ata_qc_issue+0x107/0x1e0? lock_timer_base+0x61/0x80? __mod_timer+0x202/0x380 rtnl_setlink+0xe5/0x170 ? bpf_lsm_binder_transaction+0x10/0x10? capacidad_seguridad+0x36/0x50 rtnetlink_rcv_msg+0x121/0x350 ? rtnl_calcit.isra.0+0x100/0x100 netlink_rcv_skb+0x50/0xf0 netlink_unicast+0x1d3/0x2a0 netlink_sendmsg+0x22a/0x440 sock_sendmsg+0x5e/0x60 __sys_sendto+0xf0/0x160 ? __sys_getsockname+0x7e/0xc0 ? _copia_de_usuario+0x3c/0x80 ? __sys_setsockopt+0xc8/0x1a0 __x64_sys_sendto+0x20/0x30 do_syscall_64+0x33/0x40 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f83fa7a39e0 Esto fue causado por la fragmentaci\u00f3n de la pila de cola PF debido al flujo La cola VSI del director se coloca justo despu\u00e9s de la VSI principal. Debido a esto, la VSI principal no pudo cambiar el tama\u00f1o de su asignaci\u00f3n de cola para XDP, lo que provoc\u00f3 que no se asignaran colas para la VSI principal cuando se activ\u00f3 XDP. Solucione este problema asignando siempre la \u00faltima cola en la pila de colas PF para una VSI de director de flujo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.12",
"versionEndExcluding": "4.19.228",
"matchCriteriaId": "0177A6E3-0FFC-45AB-AD5C-41704A375FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.176",
"matchCriteriaId": "581D4C61-D3FC-4DB2-85E3-EE596EEBA89E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.96",
"matchCriteriaId": "27A6621A-A196-4220-957F-334B9124E477"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.19",
"matchCriteriaId": "DF69DD7C-FD57-4914-ABB0-FAEF87B0289D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.5",
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/00eddb0e4ea115154581d1049507a996acfc2d3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4b3aa858268b7b9aeef02e5f9c4cd8f8fac101c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/768eb705e6381f0c70ca29d4e66f19790d5d19a1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/92947844b8beee988c0ce17082b705c2f75f0742",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/be6998f232b8e4ca8225029e305b8329d89bfd59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d46fa4ea9756ef6cbcf9752d0832cc66e2d7121b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47620",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T11:15:54.653",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T17:07:27.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,43 +15,172 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: refactorizaci\u00f3n de verificaci\u00f3n de datos publicitarios maliciosos. Se estaba realizando una verificaci\u00f3n de lectura fuera de los l\u00edmites al final del bucle while num_reports y llenar\u00eda el diario con falsos positivos. Se agreg\u00f3 una verificaci\u00f3n al comienzo del procesamiento del bucle para que no se verifique despu\u00e9s de que se haya avanzado ptr."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.302",
"matchCriteriaId": "09609993-CA3F-47E6-ABB6-BF512D8AFF65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.300",
"matchCriteriaId": "A3BD638C-9597-4C2B-8024-32F57E1B53E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.265",
"matchCriteriaId": "4F849B5B-93E9-438A-AE05-0380EC168436"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.228",
"matchCriteriaId": "87288F16-8DE4-4680-95D9-8601B47620D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.176",
"matchCriteriaId": "581D4C61-D3FC-4DB2-85E3-EE596EEBA89E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.96",
"matchCriteriaId": "27A6621A-A196-4220-957F-334B9124E477"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.19",
"matchCriteriaId": "DF69DD7C-FD57-4914-ABB0-FAEF87B0289D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.5",
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/305e92f525450f3e1b5f5c9dc7eadb152d66a082",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5a539c08d743d9910631448da78af5e961664c0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5c968affa804ba98c3c603f37ffea6fba618025e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7889b38a7f21ed19314f83194622b195d328465c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/835d3706852537bf92eb23eb8635b8dee0c0aa67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8819f93cd4a443dfe547aa622b21f723757df3fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/899663be5e75dc0174dc8bda0b5e6826edf0b29a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bcea886771c3f22a590c8c8b9139a107bd7f1e1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-25777",
"sourceIdentifier": "security@mautic.org",
"published": "2024-09-18T16:15:04.980",
"lastModified": "2024-09-18T16:15:04.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prior to the patched version, an authenticated user of Mautic could read system files and access the internal addresses of the application due to a Server-Side Request Forgery (SSRF) vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@mautic.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@mautic.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-mgv8-w49f-822w",
"source": "security@mautic.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48718",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T11:15:55.373",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:59:04.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,99 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm: mxsfb: corrige la desreferencia del puntero NULL. mxsfb nunca deber\u00eda desreferenciar el puntero NULL que drm_atomic_get_new_bridge_state puede devolver. En su lugar, asuma un formato fijo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.27",
"matchCriteriaId": "90FEE683-4391-493D-BA9C-23143EEBF6C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/622c9a3a7868e1eeca39c55305ca3ebec4742b64",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6f9267e01cca749137349d8ffb0d0ebbadf567f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/86a337bb803040e4401b87c974a7fb92efe3d0e1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48719",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T11:15:55.470",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:58:08.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,85 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net, neigh: no activar sondas inmediatas en NUD_FAILED desde neigh_managed_work syzkaller pudo activar un punto muerto para las entradas NTF_MANAGED [0]: kworker/0:16/14617 est\u00e1 intentando adquirir bloqueo: ffffffff8d4dd370 (&tbl->lock){++-.}-{2:2}, en: ___neigh_create+0x9e1/0x2990 net/core/neighbour.c:652 [...] pero la tarea ya mantiene el bloqueo: ffffffff8d4dd370 (&tbl->lock){++-.}-{2:2}, en: neigh_managed_work+0x35/0x250 net/core/neighbour.c:1572 La entrada del vecino pas\u00f3 al estado NUD_FAILED, donde __neigh_event_send() desencaden\u00f3 una Sondeo inmediato seg\u00fan el commit cd28ca0a3dd1 (\"relincho: reducir la latencia de arp\") a trav\u00e9s de neigh_probe() dado que se mantuvo el bloqueo de la tabla. Una opci\u00f3n para solucionar esta situaci\u00f3n es posponer neigh_probe() nuevamente a neigh_timer_handler() de manera similar a como se hac\u00eda antes de cd28ca0a3dd1. Para el caso de NTF_MANAGED, este aplazamiento es aceptable dado que esto solo ocurre en el estado de falla real y el estado normal/esperado es NUD_VALID con la entrada ya presente. La soluci\u00f3n agrega un par\u00e1metro a __neigh_event_send() para comunicar si se permite o no la sonda inmediata. Los sitios de llamadas existentes de neigh_event_send() est\u00e1n predeterminados tal cual para la investigaci\u00f3n inmediata. Sin embargo, neigh_managed_work() lo desactiva mediante el uso de neigh_event_send_probe(). [0] __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_deadlock_bug kernel/locking/lockdep.c:2956 [en l\u00ednea] check_deadlock kernel/locking/lockdep.c :2999 [en l\u00ednea] validar_chain kernel/locking/lockdep.c:3788 [en l\u00ednea] __lock_acquire.cold+0x149/0x3ab kernel/locking/lockdep.c:5027 lock_acquire kernel/locking/lockdep.c:5639 [en l\u00ednea] lock_acquire+0x1ab /0x510 kernel/locking/lockdep.c:5604 __raw_write_lock_bh include/linux/rwlock_api_smp.h:202 [en l\u00ednea] _raw_write_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:334 ___neigh_create+0x9e1/0x2990 net/core/neighbour.c :652 ip6_finish_output2+0x1070/0x14f0 net/ipv6/ip6_output.c:123 __ip6_finish_output net/ipv6/ip6_output.c:191 [en l\u00ednea] __ip6_finish_output+0x61e/0xe90 net/ipv6/ip6_output.c:170 poner+0x32/0x200 neto/ ipv6/ip6_output.c:201 NF_HOOK_COND include/linux/netfilter.h:296 [en l\u00ednea] ip6_output+0x1e4/0x530 net/ipv6/ip6_output.c:224 dst_output include/net/dst.h:451 [en l\u00ednea] NF_HOOK include/ linux/netfilter.h:307 [en l\u00ednea] ndisc_send_skb+0xa99/0x17f0 net/ipv6/ndisc.c:508 ndisc_send_ns+0x3a9/0x840 net/ipv6/ndisc.c:650 ndisc_solicit+0x2cd/0x4f0 net/ipv6/ndisc.c :742 neigh_probe+0xc2/0x110 net/core/neighbour.c:1040 __neigh_event_send+0x37d/0x1570 net/core/neighbour.c:1201 neigh_event_send include/net/neighbour.h:470 [en l\u00ednea] neigh_managed_work+0x162/0x250 net/ core/neighbour.c:1574 Process_one_work+0x9ac/0x1650 kernel/workqueue.c:2307 trabajador_thread+0x657/0x1110 kernel/workqueue.c:2454 kthread+0x2e9/0x3a0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 arch/ x86/entry/entry_64.S:295 "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/203a35ebb49cdce377416b0690215d3ce090d364",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4a81f6da9cb2d1ef911131a6fd8bd15cb61fc772",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48723",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T11:15:55.820",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T17:46:50.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,113 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spi: uniphier: corrige la fuga del recuento de referencias en uniphier_spi_probe() El problema ocurre en varias rutas de error en uniphier_spi_probe(). Cuando dma_get_slave_caps() o devm_spi_register_master() devuelven un c\u00f3digo de error, la funci\u00f3n se olvida de disminuir el recuento de los objetos `dma_rx` y `dma_tx`, lo que puede provocar fugas de recuento. Corr\u00edjalo disminuyendo el recuento de referencias de objetos espec\u00edficos en esas rutas de error."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.6",
"versionEndExcluding": "5.10.99",
"matchCriteriaId": "B69CC532-C65F-4966-A226-22878B182DF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.22",
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/37c2c83ca4f1ef4b6908181ac98e18360af89b42",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/447c3d4046d7b54052d07d8b27e15e6edea5662c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dd00b4f8f768d81c3788a8ac88fdb3d745e55ea3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e895e067d73e154b1ebc84a124e00831e311d9b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48724",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:10.900",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:19:25.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,162 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/vt-d: soluciona una posible p\u00e9rdida de memoria en intel_setup_irq_remapping() despu\u00e9s del commit e3beca48a45b (\"irqdomain/treewide: mantiene el nodo de firmware asignado incondicionalmente\"). Para el escenario de desmontaje, fn solo se libera despu\u00e9s de que no se puede asignar ir_domain, aunque tambi\u00e9n debe liberarse en caso de que dmar_enable_qi devuelva un error. Adem\u00e1s de free fn, irq_domain e ir_msi_domain tambi\u00e9n deben eliminarse si intel_setup_irq_remapping no logra habilitar la invalidaci\u00f3n en cola. Mejore la ruta de rebobinado agregando las etiquetas out_free_ir_domain y out_free_fwnode seg\u00fan la sugerencia de Baolu."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.190",
"versionEndExcluding": "4.14.265",
"matchCriteriaId": "BA40F961-E64D-4826-AEA2-A045C11BF07B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.135",
"versionEndExcluding": "4.19.228",
"matchCriteriaId": "22AF2090-4DCE-439F-BEA5-21158821FA0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.54",
"versionEndExcluding": "5.4.178",
"matchCriteriaId": "0ECB3887-292E-4352-91FF-5A9DAF2DB2F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7.11",
"versionEndExcluding": "5.8",
"matchCriteriaId": "4BA1C188-F80B-4209-9D5D-6AA4BAFB916B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.99",
"matchCriteriaId": "539F713A-F940-4698-BC87-245228B4AB3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.22",
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48725",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:10.997",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:10:22.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,99 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/siw: corrige la fuga de recuento en siw_create_qp() Atomic_inc() debe emparejarse con atomic_dec() en la ruta de error."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.22",
"matchCriteriaId": "45FC18C9-B41A-4F4B-B072-1DEBBF661BB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2989ba9532babac66e79997ccff73c015b69700c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a75badebfdc0b3823054bedf112edb54d6357c75",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fa3b844a50845c817660146c27c0fc29b08d3116",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48726",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:11.077",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:09:15.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,113 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/ucma: protege mc durante las salidas simult\u00e1neas de multidifusi\u00f3n. Revierta parcialmente la confirmaci\u00f3n mencionada en la l\u00ednea Correcciones para asegurarse de que la asignaci\u00f3n y el borrado de la estructura de multidifusi\u00f3n est\u00e9n bloqueados. ERROR: KASAN: use-after-free en ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [en l\u00ednea] ERROR: KASAN: use-after-free en ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c: 579 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88801bb74b00 mediante la tarea syz-executor.1/25529 CPU: 0 PID: 25529 Comm: syz-executor.1 No contaminado 5.16.0-rc7-syzkaller #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan /report.c:247 __kasan_report mm/kasan/report.c:433 [en l\u00ednea] kasan_report.cold+0x83/0xdf mm/kasan/report.c:450 ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [en l\u00ednea] ucma_destroy_private_ctx+0x914/0xb70 controladores/infiniband/core/ucma.c:579 ucma_destroy_id+0x1e6/0x280 controladores/infiniband/core/ucma.c:614 ucma_write+0x25c/0x350 controladores/infiniband/core/ucma.c:1732 vfs_write+ 0x28e/0xae0 fs/read_write.c:588 ksys_write+0x1ee/0x250 fs/read_write.c:643 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x35/0xb0 arch/x86/entry/common. c:80 Entry_SYSCALL_64_after_hwframe+0x44/0xae Actualmente, la b\u00fasqueda de xarray puede tocar un mc que se libera simult\u00e1neamente ya que xa_for_each() no est\u00e1 rodeado por ning\u00fan candado. En lugar de mantener el bloqueo durante un escaneo completo, mant\u00e9ngalo solo para los elementos afectados, que generalmente son una lista vac\u00eda."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.99",
"matchCriteriaId": "3E812CCF-4A89-422A-B105-BAD11567643C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.22",
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2923948ffe0835f7114e948b35bcc42bc9b3baa1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/36e8169ec973359f671f9ec7213547059cae972e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/75c610212b9f1756b9384911d3a2c347eee8031c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ee2477e8ccd3d978eeac0dc5a981b286d9bb7b0a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48728",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:11.253",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:07:21.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,113 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: IB/hfi1: corrige el p\u00e1nico de inicio temprano de AIP Una falla temprana en hfi1_ipoib_setup_rn() puede provocar el siguiente p\u00e1nico: ERROR: no se puede manejar la desreferencia del puntero NULL del kernel en 00000000000001b0 PGD 0 P4D 0 Vaya: 0002 [#1] Cola de trabajo SMP NOPTI: eventos work_for_cpu_fn RIP: 0010:try_to_grab_pending+0x2b/0x140 C\u00f3digo: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 4 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c RSP 0018:ffffb6b3cf7 cfa48 EFLAGS: 00010046 RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000 RDX: 0000000000000246 RSI: 00000000000000000 RDI: 00000000000001b0 RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001 R10: 0000000000000000 R11: 00000000000000001 R12: 0000000000000000 R13: b6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690 FS: 0000000000000000(0000) GS :ffff8a527f400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000001b0 CR3: CR4: 00000000007706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000000000000 DR6: 00000000ffe0ff0 DR7: 000 0000000000400 PKRU: 55555554 Seguimiento de llamadas: __cancel_work_timer+0x42/0x190 ? dev_printk_emit+0x4e/0x70 iowait_cancel_work+0x15/0x30 [hfi1] hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1] ? dev_err+0x6c/0x90 hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1] hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1] rdma_init_netdev+0x5a/0x80 [ib_core] ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1] ipoib_intf_init+0x6c/0x350 [ib_ipoib] ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib] ipoib_add_one+0xbe/0x300 [ib_ipoib] 0x1a0 [ib_core] enable_device_and_get+0xdc/0x1d0 [ib_core] ib_register_device+ 0x572/0x6b0 [ib_core] rvt_register_device+0x11b/0x220 [rdmavt] hfi1_register_ib_device+0x6b4/0x770 [hfi1] do_init_one.isra.20+0x3e3/0x680 [hfi1] local_pci_probe+0x41/0x90 cpu_fn+0x16/0x20 proceso_one_work+0x1a7/0x360 ? create_worker+0x1a0/0x1a0 trabajador_thread+0x1cf/0x390? create_worker+0x1a0/0x1a0 kthread+0x116/0x130? kthread_flush_work_fn+0x10/0x10 ret_from_fork+0x1f/0x40 El p\u00e1nico ocurre en hfi1_ipoib_txreq_deinit() porque hay una deref NULL cuando se llama a hfi1_ipoib_netdev_dtor() en este caso de error. hfi1_ipoib_txreq_init() y hfi1_ipoib_rxq_init() se desenrollan autom\u00e1ticamente, as\u00ed que corrija ajustando las rutas de error en consecuencia. Otros cambios: - hfi1_ipoib_free_rdma_netdev() se elimina incluyendo free_netdev() ya que el c\u00f3digo central de netdev elimina las llamadas free_netdev() - El cambio a las entradas aceleradas se mueve a la ruta de \u00e9xito."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.99",
"matchCriteriaId": "539F713A-F940-4698-BC87-245228B4AB3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.22",
"matchCriteriaId": "74528AA6-B524-4C3F-B188-1194235FE47D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1899c3cad265c4583658aed5293d02e8af84276b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4a9bd1e6780fc59f81466ec3489d5ad535a37190",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f8f55b92edd621f056bdf09e572092849fabd83",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a3dd4d2682f2a796121609e5f3bbeb1243198c53",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48729",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:11.343",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:06:21.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,85 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: IB/hfi1: Corrija el p\u00e1nico con ipoib send_queue_size m\u00e1s grande Cuando ipoib send_queue_size aumenta respecto del valor predeterminado, ocurre el siguiente p\u00e1nico: RIP: 0010:hfi1_ipoib_drain_tx_ring+0x45/0xf0 [hfi1] C\u00f3digo: 31 e4 eb 0f 8b 85 c8 02 00 00 41 83 c4 01 44 39 e0 76 60 8b 8d cc 02 00 00 44 89 e3 be 01 00 00 00 d3 e3 48 03 9d c0 02 00 00 83 8 01 00 00 00 00 00 00 48 8b bb 30 01 00 00 e8 25 af a7 e0 RSP: 0018:ffffc9000798f4a0 EFLAGS: 00010286 RAX: 00000000000008000 RBX: ffffc9000aa0f000 RCX: 000000000000000f RDX: 00000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffff88810ff08000 R08: ffff88889476d900 R09: 0000000000000101 R10: 0000000000000000 R11: ffffc90006590ff8 R12: 0000000000000200 R13: ffffc9000798fba8 R14: 0000000000000000 R15: 00000000000001 FS: 00007fd0f79cc3c0(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR 2: ffffc9000aa0f118 CR3 : 0000000889c84001 CR4: 00000000001706e0 Seguimiento de llamadas: hfi1_ipoib_napi_tx_disable+0x45/0x60 [hfi1] hfi1_ipoib_dev_stop+0x18/0x80 [hfi1] [ib_ipoib] ipoib_stop+0x48/0xc0 [ib_ipoib] __dev_close_many+0x9e/0x110 __dev_change_flags+ 0xd9/0x210 dev_change_flags+0x21/0x60 do_setlink+0x31c/0x10f0? __nla_validate_parse+0x12d/0x1a0 ? __nla_parse+0x21/0x30? inet6_validate_link_af+0x5e/0xf0? cpumask_next+0x1f/0x20 ? __snmp6_fill_stats64.isra.53+0xbb/0x140 ? __nla_validate_parse+0x47/0x1a0 __rtnl_newlink+0x530/0x910 ? pskb_expand_head+0x73/0x300? __kmalloc_node_track_caller+0x109/0x280 ? __nla_put+0xc/0x20 ? cpumask_next_and+0x20/0x30? update_sd_lb_stats.constprop.144+0xd3/0x820? _raw_spin_unlock_irqrestore+0x25/0x37? __wake_up_common_lock+0x87/0xc0? kmem_cache_alloc_trace+0x3d/0x3d0 rtnl_newlink+0x43/0x60 El problema ocurre cuando el cambio que deber\u00eda haber sido una funci\u00f3n del tama\u00f1o del elemento txq us\u00f3 por error el tama\u00f1o del anillo. Arreglar usando el tama\u00f1o del elemento."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.8",
"matchCriteriaId": "0623892A-E3E4-44E6-8A5E-39A0B47AF782"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1530d84fba1e459ba55f46aa42649b88773210e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c83d39cc730378bbac64d67a551897b203a606e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48749",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:13.143",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:05:04.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,108 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/msm/dpu: comprobaci\u00f3n de par\u00e1metro no v\u00e1lido en dpu_setup_dspp_pcc La funci\u00f3n realiza una comprobaci\u00f3n del par\u00e1metro de entrada \"ctx\", sin embargo, se utiliza antes de la comprobaci\u00f3n. Inicialice la variable \"base\" despu\u00e9s de la verificaci\u00f3n de cordura para evitar una posible desreferencia del puntero NULL. Direcciones-Coverity-ID: 1493866 (\"Desreferencia de puntero nulo\")"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.96",
"matchCriteriaId": "109892DA-3CB1-4C6F-9865-8B8B5EC444F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.19",
"matchCriteriaId": "DF69DD7C-FD57-4914-ABB0-FAEF87B0289D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.5",
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,28 +2,93 @@
"id": "CVE-2022-48750",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:13.223",
"lastModified": "2024-06-24T16:15:10.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:04:21.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775) Fix crash in clear_caseopen\n\nPawe\u0142 Marciniak reports the following crash, observed when clearing\nthe chassis intrusion alarm.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000028\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 3 PID: 4815 Comm: bash Tainted: G S 5.16.2-200.fc35.x86_64 #1\nHardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Z97 Extreme4, BIOS P2.60A 05/03/2018\nRIP: 0010:clear_caseopen+0x5a/0x120 [nct6775]\nCode: 68 70 e8 e9 32 b1 e3 85 c0 0f 85 d2 00 00 00 48 83 7c 24 ...\nRSP: 0018:ffffabcb02803dd8 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000\nRDX: ffff8e8808192880 RSI: 0000000000000000 RDI: ffff8e87c7509a68\nRBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a\nR10: 000000000000000a R11: f000000000000000 R12: 000000000000001f\nR13: ffff8e87c7509828 R14: ffff8e87c7509a68 R15: ffff8e88494527a0\nFS: 00007f4db9151740(0000) GS:ffff8e8ebfec0000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000028 CR3: 0000000166b66001 CR4: 00000000001706e0\nCall Trace:\n <TASK>\n kernfs_fop_write_iter+0x11c/0x1b0\n new_sync_write+0x10b/0x180\n vfs_write+0x209/0x2a0\n ksys_write+0x4f/0xc0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe problem is that the device passed to clear_caseopen() is the hwmon\ndevice, not the platform device, and the platform data is not set in the\nhwmon device. Store the pointer to sio_data in struct nct6775_data and\nget if from there if needed."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775) Fix crash in clear_caseopen\n\nPawe? Marciniak reports the following crash, observed when clearing\nthe chassis intrusion alarm.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000028\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 3 PID: 4815 Comm: bash Tainted: G S 5.16.2-200.fc35.x86_64 #1\nHardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Z97 Extreme4, BIOS P2.60A 05/03/2018\nRIP: 0010:clear_caseopen+0x5a/0x120 [nct6775]\nCode: 68 70 e8 e9 32 b1 e3 85 c0 0f 85 d2 00 00 00 48 83 7c 24 ...\nRSP: 0018:ffffabcb02803dd8 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000\nRDX: ffff8e8808192880 RSI: 0000000000000000 RDI: ffff8e87c7509a68\nRBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a\nR10: 000000000000000a R11: f000000000000000 R12: 000000000000001f\nR13: ffff8e87c7509828 R14: ffff8e87c7509a68 R15: ffff8e88494527a0\nFS: 00007f4db9151740(0000) GS:ffff8e8ebfec0000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000028 CR3: 0000000166b66001 CR4: 00000000001706e0\nCall Trace:\n <TASK>\n kernfs_fop_write_iter+0x11c/0x1b0\n new_sync_write+0x10b/0x180\n vfs_write+0x209/0x2a0\n ksys_write+0x4f/0xc0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe problem is that the device passed to clear_caseopen() is the hwmon\ndevice, not the platform device, and the platform data is not set in the\nhwmon device. Store the pointer to sio_data in struct nct6775_data and\nget if from there if needed."
},
{
"lang": "es",
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: hwmon: (nct6775) \u00bfReparar fallo en clear_caseopen Pawe? Marciniak informa del siguiente accidente, observado al borrar la alarma de intrusi\u00f3n en el chasis. ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000028 PGD 0 P4D 0 Ups: 0000 [#1] PREEMPT SMP PTI CPU: 3 PID: 4815 Comm: bash Contaminado: GS 5.16.2-200.fc35.x86_64 #1 Nombre de hardware: Para ser completado por OEM Para ser completado por OEM/Z97 Extreme4, BIOS P2.60A 03/05/2018 RIP: 0010:clear_caseopen+0x5a/0x120 [nct6775] C\u00f3digo: 68 70 e8 e9 32 b1 e3 85 c0 0f 85 d2 00 00 00 48 83 7c 24 ... RSP: 0018:ffffabcb02803dd8 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 00000000000000002 RCX: 0000000000000000 RDX: 8808192880 RSI: 0000000000000000 RDI: ffff8e87c7509a68 RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a R10: 000000a R11: f000000000000000 R12: 000000000000001f R13: ffff8e87c7509828 R14: ffff8e87c7509a68 R15: ffff8e88494527a0 FS: 00007f4db9151740(0000) GS:ffff8e8ebfec0000(0000) nlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000028 CR3: 0000000166b66001 CR4: 00000000001706e0 : kernfs_fop_write_iter+0x11c/0x1b0 new_sync_write+0x10b/0x180 vfs_write+0x209/0x2a0 ksys_write+0x4f/0xc0 do_syscall_64+0x3b/0x90 Entry_SYSCALL_64_after_hwframe+0x44/0xae El problema es que el dispositivo pasado a clear_caseopen() es el dispositivo hwmon, no el dispositivo de plataforma y los datos de la plataforma no est\u00e1n configurados en el dispositivo hwmon. Guarde el puntero a sio_data en la estructura nct6775_data y obtengalo desde all\u00ed si es necesario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.5",
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/79da533d3cc717ccc05ddbd3190da8a72bc2408b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cfb7d12f2e4a4d694f49e9b4ebb352f7b67cdfbb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48753",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:13.480",
"lastModified": "2024-06-20T12:43:25.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T16:03:25.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,80 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: corrige la p\u00e9rdida de memoria en disk_register_independent_access_ranges kobject_init_and_add() toma referencia incluso cuando falla. Seg\u00fan el documento de kobject_init_and_add() Si esta funci\u00f3n devuelve un error, se debe llamar a kobject_put() para limpiar adecuadamente la memoria asociada con el objeto. Solucione este problema agregando kobject_put(). La funci\u00f3n de devoluci\u00f3n de llamada blk_ia_ranges_sysfs_release() en kobject_put() puede manejar el puntero \"iars\" correctamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.5",
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/83114df32ae779df57e0af99a8ba6c3968b2ba3d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe4214a07e0b53d2af711f57519e33739c5df23f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37233",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-10T16:15:18.570",
"lastModified": "2024-09-10T21:35:02.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:10:23.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.6_hf14",
"matchCriteriaId": "5CE63328-FC1D-43B9-89DD-428A271559F3"
}
]
}
]
}
],
"references": [
{
"url": "https://code-white.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37234",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-10T16:15:18.647",
"lastModified": "2024-09-11T15:35:04.903",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:05:50.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.6",
"matchCriteriaId": "A52A66B4-E2ED-498B-8D00-FCC80577738A"
}
]
}
]
}
],
"references": [
{
"url": "https://code-white.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44093",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T11:15:13.423",
"lastModified": "2023-10-16T19:18:41.647",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-18T16:35:02.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44106",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T12:15:11.570",
"lastModified": "2023-10-15T01:47:39.467",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-18T16:35:04.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-47105",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T17:15:18.277",
"lastModified": "2024-09-18T17:15:18.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/chaosblade-io/chaosblade/blob/0a07380c9899febb2b544132783b376b44226cca/exec/os/executor.go#L68",
"source": "cve@mitre.org"
},
{
"url": "https://narrow-oatmeal-0c0.notion.site/ChaosBlade-Remote-Command-Execution-CVE-2023-47105-4f5459046488436caaec2bced6ff26d7",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39628",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:23.430",
"lastModified": "2024-08-27T13:02:05.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:59:33.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.8.7",
"matchCriteriaId": "0D048C93-62B6-4AC0-A8E4-668736E658C6"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ninja-forms/wordpress-ninja-forms-plugin-3-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39641",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:23.657",
"lastModified": "2024-08-27T13:02:05.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:57:25.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.2.6.9",
"matchCriteriaId": "3DCD3576-A5FB-4E56-8281-F179E05E3817"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/learnpress/wordpress-learnpress-plugin-4-2-6-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39645",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:23.873",
"lastModified": "2024-08-27T13:02:05.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:46:57.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.7.3",
"matchCriteriaId": "1EB20081-939F-4B43-A6AC-6A572C2DEBE0"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-7-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39657",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:24.083",
"lastModified": "2024-08-27T13:02:05.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:25:32.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sender:sender:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.19",
"matchCriteriaId": "4EAE99D6-BDFA-4669-AE30-D3B571DE709B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sender-net-automated-emails/wordpress-sender-newsletter-sms-and-email-marketing-automation-for-woocommerce-plugin-2-6-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41929",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-18T07:15:02.847",
"lastModified": "2024-09-18T07:15:02.847",
"lastModified": "2024-09-18T16:35:07.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Improper authentication vulnerability in multiple digital video recorders provided by TAKENAKA ENGINEERING CO., LTD. allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU90142679/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42404",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-18T06:15:02.223",
"lastModified": "2024-09-18T06:15:02.223",
"lastModified": "2024-09-18T16:35:08.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN19766555/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-42795",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T20:15:46.830",
"lastModified": "2024-09-16T20:15:46.830",
"lastModified": "2024-09-18T16:35:09.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control vulnerability was found in /music/view_user.php?id=3 and /music/controller.php?page=edit_user&id=3 in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to view valid user details."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /music/view_user.php?id=3 y /music/controller.php?page=edit_user&amp;id=3 en Kashipara Music Management System v1.0. Esta vulnerabilidad permite que un atacante no autenticado vea detalles v\u00e1lidos de un usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User.pdf",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-42796",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T20:15:46.890",
"lastModified": "2024-09-16T20:15:46.890",
"lastModified": "2024-09-18T16:35:09.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control vulnerability was found in /music/ajax.php?action=delete_genre in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to delete the valid music genre entries."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /music/ajax.php?action=delete_genre en Kashipara Music Management System v1.0. Esta vulnerabilidad permite que un atacante no autenticado elimine las entradas v\u00e1lidas de g\u00e9nero musical."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Genre.pdf",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-42798",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T20:15:46.957",
"lastModified": "2024-09-16T20:15:46.957",
"lastModified": "2024-09-18T16:35:10.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control vulnerability was found in /music/index.php?page=user_list and /music/index.php?page=edit_user in Kashipara Music Management System v1.0. This allows a low privileged attacker to take over the administrator account."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad de control de acceso incorrecto en /music/index.php?page=user_list y /music/index.php?page=edit_user en Kashipara Music Management System v1.0. Esto permite que un atacante con pocos privilegios tome el control de la cuenta de administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Priv%20Esc%20-%20Save%20Edit%20User%20-%20AC%20Takeover.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43116",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:24.360",
"lastModified": "2024-08-27T13:02:05.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:22:14.880",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:10up:simple_local_avatars:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.7.11",
"matchCriteriaId": "329BD9EE-E55B-4A1F-807A-0E2080C94163"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-local-avatars/wordpress-simple-local-avatars-plugin-2-7-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43117",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:24.560",
"lastModified": "2024-08-27T13:02:05.683",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:15:04.373",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmudev:hummingbird:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.9.2",
"matchCriteriaId": "766C4431-7453-4416-BBAA-1A174BEC104C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hummingbird-performance/wordpress-hummingbird-plugin-3-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43230",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T21:15:24.987",
"lastModified": "2024-08-27T13:01:52.723",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T16:10:30.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sharedfilespro:shared_files:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.29",
"matchCriteriaId": "2ADD092B-555C-4950-92F2-8C093BE76F85"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/shared-files/wordpress-shared-files-premium-download-manager-secure-file-sharing-with-frontend-file-upload-plugin-1-7-28-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43327",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-18T14:15:07.197",
"lastModified": "2024-08-19T12:59:59.177",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:07:45.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:teleogistic:invite_anyone:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.8",
"matchCriteriaId": "9CEC5D99-6625-4FCF-8712-C2E735EA8EDF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/invite-anyone/wordpress-invite-anyone-plugin-1-4-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43967",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-26T16:15:10.107",
"lastModified": "2024-08-26T19:10:09.607",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:00:57.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:starkdigital:wp_testimonial_widget:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.1",
"matchCriteriaId": "D8AEB3E2-E2D8-4EDC-B5D7-E8160A8DB97A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-testimonial-widget/wordpress-wp-testimonial-widget-plugin-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44103",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-10T21:15:13.547",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:18:39.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.18.99.0",
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44104",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-10T21:15:13.727",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:33:06.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.18.99.0",
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44105",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-10T21:15:13.917",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:48:11.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.18.99.0",
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44106",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-10T21:15:14.110",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:50:40.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.18.99.0",
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44107",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-10T21:15:14.283",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:52:50.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.18.99.0",
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45041",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-09T15:15:11.940",
"lastModified": "2024-09-09T18:30:12.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T17:31:53.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:external-secrets:external_secrets_operator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.10.2",
"matchCriteriaId": "E9FE8A81-3B52-4ACB-A0C0-32008302E35A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/external-secrets/external-secrets/commit/428a452fd2ad45935312f2c2c0d40bc37ce6e67c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/external-secrets/external-secrets/security/advisories/GHSA-qwgc-rr35-h4x9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45298",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-18T17:15:18.570",
"lastModified": "2024-09-18T17:15:18.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wiki.js is an open source wiki app built on Node.js. A disabled user can still gain access to a wiki by abusing the password reset function. While setting up SMTP e-mail's on my server, I tested said e-mails by performing a password reset with my test user. To my shock, not only did it let me reset my password, but after resetting my password I can get into the wiki I was locked out of. The ramifications of this bug is a user can **bypass an account disabling by requesting their password be reset**. All users of wiki.js version `2.5.303` who use any account restrictions and have disabled user are affected. This issue has been addressed in version 2.5.304 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-670"
}
]
}
],
"references": [
{
"url": "https://github.com/requarks/wiki/commit/b9fb17d4d4a0956ec35e8c73cc85192552fb8d16",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/requarks/wiki/security/advisories/GHSA-vwww-c5vg-xgfc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-45413",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T21:15:45.833",
"lastModified": "2024-09-16T21:15:45.833",
"lastModified": "2024-09-18T16:35:11.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in rsa_decrypt function. This function is an API wrapper for LUA to decrypt RSA encrypted ciphertext, the decrypted data is stored on the stack without checking its length. An authenticated attacker can get RCE as root by exploiting this vulnerability."
},
{
"lang": "es",
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n rsa_decrypt. Esta funci\u00f3n es un contenedor de API para LUA para descifrar texto cifrado RSA; los datos descifrados se almacenan en la pila sin verificar su longitud. Un atacante autenticado puede obtener RCE como superusuario al explotar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-45414",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T21:15:45.890",
"lastModified": "2024-09-16T21:15:45.890",
"lastModified": "2024-09-18T16:35:12.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in webPrivateDecrypt function. This function is responsible for decrypting RSA encrypted ciphertext, the encrypted data is supplied base64 encoded. The decoded ciphertext is stored on the stack without checking its length. An unauthenticated attacker can get RCE as root by exploiting this vulnerability."
},
{
"lang": "es",
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n webPrivateDecrypt. Esta funci\u00f3n es responsable de descifrar el texto cifrado RSA; los datos cifrados se suministran codificados en base64. El texto cifrado descodificado se almacena en la pila sin verificar su longitud. Un atacante no autenticado puede obtener RCE como superusuario explotando esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-45415",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T21:15:45.943",
"lastModified": "2024-09-16T21:15:45.943",
"lastModified": "2024-09-18T16:35:12.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HTTPD binary in multiple ZTE routers has a stack-based buffer overflow vulnerability in check_data_integrity function. This function is responsible for validating the checksum of data in post request. The checksum is sent encrypted in the request, the function decrypts it and stores the checksum on the stack without validating it. An unauthenticated attacker can get RCE as root by exploiting this vulnerability."
},
{
"lang": "es",
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila en la funci\u00f3n check_data_integrity. Esta funci\u00f3n es responsable de validar la suma de comprobaci\u00f3n de los datos en la solicitud posterior. La suma de comprobaci\u00f3n se env\u00eda cifrada en la solicitud, la funci\u00f3n la descifra y almacena la suma de comprobaci\u00f3n en la pila sin validarla. Un atacante no autenticado puede obtener RCE como superusuario explotando esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-45416",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T21:15:46.003",
"lastModified": "2024-09-16T21:15:46.003",
"lastModified": "2024-09-18T16:35:13.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root."
},
{
"lang": "es",
"value": "El binario HTTPD en varios enrutadores ZTE tiene una vulnerabilidad de inclusi\u00f3n de archivos locales en la funci\u00f3n session_init. Los archivos de sesi\u00f3n -LUA- se almacenan en el directorio /var/lua_session, la funci\u00f3n itera sobre todos los archivos de este directorio y los ejecuta utilizando la funci\u00f3n dofile sin ninguna validaci\u00f3n si es un archivo de sesi\u00f3n v\u00e1lido o no. Un atacante que pueda escribir un archivo malicioso en el directorio sessions puede obtener RCE como superusuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wr3nchsr.github.io/zte-multiple-routers-httpd-vulnerabilities-advisory/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45679",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-18T04:15:42.080",
"lastModified": "2024-09-18T04:15:42.080",
"lastModified": "2024-09-18T16:35:14.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.3 allows a local attacker to execute arbitrary code by importing a specially crafted file into the product."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://github.com/assimp/assimp/releases/tag/v5.4.3",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-45813",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-18T17:15:19.163",
"lastModified": "2024-09-18T17:15:19.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "find-my-way is a fast, open source HTTP router, internally using a Radix Tree (aka compact Prefix Tree), supports route params, wildcards, and it's framework independent. A bad regular expression is generated any time one has two parameters within a single segment, when adding a `-` at the end, like `/:a-:b-`. This may cause a denial of service in some instances. Users are advised to update to find-my-way v8.2.2 or v9.0.1. or subsequent versions. There are no known workarounds for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://blakeembrey.com/posts/2024-09-web-redos",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/delvedor/find-my-way/commit/5e9e0eb5d8d438e06a185d5e536a896572dd0440",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/delvedor/find-my-way/security/advisories/GHSA-rrr8-f88r-h8q6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46086",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T16:15:06.160",
"lastModified": "2024-09-18T16:15:06.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/plugin/file_manager/delete/123"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/PG2Stom/cms/tree/main/12/readme.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-46990",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-18T17:15:19.687",
"lastModified": "2024-09-18T17:15:19.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directus is a real-time API and App dashboard for managing SQL database content. When relying on blocking access to localhost using the default `0.0.0.0` filter a user may bypass this block by using other registered loopback devices (like `127.0.0.2` - `127.127.127.127`). This issue has been addressed in release versions 10.13.3 and 11.1.0. Users are advised to upgrade. Users unable to upgrade may block this bypass by manually adding the `127.0.0.0/8` CIDR range which will block access to any `127.X.X.X` ip instead of just `127.0.0.1`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/directus/directus/commit/4aace0bbe57232e38cd6a287ee475293e46dc91b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/commit/769fa22797bff5a9231599883b391e013f122e52",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/commit/8cbf943b65fd4a763d09a5fdbba8996b1e7797ff",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/commit/c1f3ccc681595038d094ce110ddeee38cb38f431",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/directus/directus/security/advisories/GHSA-68g8-c275-xf2m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47001",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-18T07:15:04.220",
"lastModified": "2024-09-18T07:15:04.220",
"lastModified": "2024-09-18T16:35:16.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Hidden functionality issue in multiple digital video recorders provided by TAKENAKA ENGINEERING CO., LTD. allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-912"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU90142679/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8012",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-10T21:15:14.510",
"lastModified": "2024-09-11T16:26:11.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-18T17:53:47.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.18.99.0",
"matchCriteriaId": "21D83B80-CA53-4122-864F-7CD27A212A4A"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Workspace-Control-IWC",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8611",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-09T21:15:13.377",
"lastModified": "2024-09-10T12:09:50.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-18T17:24:34.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -109,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +150,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/elegant228/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.276841",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276841",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.404875",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-8904",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-17T21:15:12.980",
"lastModified": "2024-09-17T21:15:12.980",
"lastModified": "2024-09-18T16:35:17.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 129.0.6668.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.58 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +49,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-8905",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-17T21:15:13.080",
"lastModified": "2024-09-17T21:15:13.080",
"lastModified": "2024-09-18T16:35:18.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in V8 in Google Chrome prior to 129.0.6668.58 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "Una implementaci\u00f3n inadecuada en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.58 permiti\u00f3 que un atacante remoto pudiera explotar la corrupci\u00f3n de la pila a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_17.html",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-18T16:00:48.018437+00:00
2024-09-18T18:00:18.842448+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-18T15:59:50.983000+00:00
2024-09-18T17:53:47.860000+00:00
```
### Last Data Feed Release
@ -33,69 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263381
263387
```
### CVEs added in the last Commit
Recently added CVEs: `98`
Recently added CVEs: `6`
- [CVE-2024-46571](CVE-2024/CVE-2024-465xx/CVE-2024-46571.json) (`2024-09-18T15:15:17.530`)
- [CVE-2024-46580](CVE-2024/CVE-2024-465xx/CVE-2024-46580.json) (`2024-09-18T15:15:17.580`)
- [CVE-2024-46581](CVE-2024/CVE-2024-465xx/CVE-2024-46581.json) (`2024-09-18T15:15:17.630`)
- [CVE-2024-46582](CVE-2024/CVE-2024-465xx/CVE-2024-46582.json) (`2024-09-18T15:15:17.680`)
- [CVE-2024-46583](CVE-2024/CVE-2024-465xx/CVE-2024-46583.json) (`2024-09-18T15:15:17.723`)
- [CVE-2024-46584](CVE-2024/CVE-2024-465xx/CVE-2024-46584.json) (`2024-09-18T15:15:17.790`)
- [CVE-2024-46585](CVE-2024/CVE-2024-465xx/CVE-2024-46585.json) (`2024-09-18T15:15:17.847`)
- [CVE-2024-46586](CVE-2024/CVE-2024-465xx/CVE-2024-46586.json) (`2024-09-18T15:15:17.900`)
- [CVE-2024-46588](CVE-2024/CVE-2024-465xx/CVE-2024-46588.json) (`2024-09-18T15:15:17.957`)
- [CVE-2024-46589](CVE-2024/CVE-2024-465xx/CVE-2024-46589.json) (`2024-09-18T15:15:18.007`)
- [CVE-2024-46590](CVE-2024/CVE-2024-465xx/CVE-2024-46590.json) (`2024-09-18T15:15:18.067`)
- [CVE-2024-46591](CVE-2024/CVE-2024-465xx/CVE-2024-46591.json) (`2024-09-18T15:15:18.117`)
- [CVE-2024-46592](CVE-2024/CVE-2024-465xx/CVE-2024-46592.json) (`2024-09-18T15:15:18.170`)
- [CVE-2024-46593](CVE-2024/CVE-2024-465xx/CVE-2024-46593.json) (`2024-09-18T15:15:18.220`)
- [CVE-2024-46594](CVE-2024/CVE-2024-465xx/CVE-2024-46594.json) (`2024-09-18T15:15:18.263`)
- [CVE-2024-46595](CVE-2024/CVE-2024-465xx/CVE-2024-46595.json) (`2024-09-18T15:15:18.307`)
- [CVE-2024-46596](CVE-2024/CVE-2024-465xx/CVE-2024-46596.json) (`2024-09-18T15:15:18.353`)
- [CVE-2024-46597](CVE-2024/CVE-2024-465xx/CVE-2024-46597.json) (`2024-09-18T15:15:18.400`)
- [CVE-2024-46598](CVE-2024/CVE-2024-465xx/CVE-2024-46598.json) (`2024-09-18T15:15:18.453`)
- [CVE-2024-5958](CVE-2024/CVE-2024-59xx/CVE-2024-5958.json) (`2024-09-18T15:15:18.510`)
- [CVE-2024-5959](CVE-2024/CVE-2024-59xx/CVE-2024-5959.json) (`2024-09-18T15:15:18.623`)
- [CVE-2024-5960](CVE-2024/CVE-2024-59xx/CVE-2024-5960.json) (`2024-09-18T15:15:18.740`)
- [CVE-2024-6877](CVE-2024/CVE-2024-68xx/CVE-2024-6877.json) (`2024-09-18T15:15:18.860`)
- [CVE-2024-6878](CVE-2024/CVE-2024-68xx/CVE-2024-6878.json) (`2024-09-18T15:15:18.970`)
- [CVE-2024-8891](CVE-2024/CVE-2024-88xx/CVE-2024-8891.json) (`2024-09-18T14:15:20.187`)
- [CVE-2022-25777](CVE-2022/CVE-2022-257xx/CVE-2022-25777.json) (`2024-09-18T16:15:04.980`)
- [CVE-2023-47105](CVE-2023/CVE-2023-471xx/CVE-2023-47105.json) (`2024-09-18T17:15:18.277`)
- [CVE-2024-45298](CVE-2024/CVE-2024-452xx/CVE-2024-45298.json) (`2024-09-18T17:15:18.570`)
- [CVE-2024-45813](CVE-2024/CVE-2024-458xx/CVE-2024-45813.json) (`2024-09-18T17:15:19.163`)
- [CVE-2024-46086](CVE-2024/CVE-2024-460xx/CVE-2024-46086.json) (`2024-09-18T16:15:06.160`)
- [CVE-2024-46990](CVE-2024/CVE-2024-469xx/CVE-2024-46990.json) (`2024-09-18T17:15:19.687`)
### CVEs modified in the last Commit
Recently modified CVEs: `39`
Recently modified CVEs: `50`
- [CVE-2024-37991](CVE-2024/CVE-2024-379xx/CVE-2024-37991.json) (`2024-09-18T15:29:44.390`)
- [CVE-2024-37992](CVE-2024/CVE-2024-379xx/CVE-2024-37992.json) (`2024-09-18T15:31:27.597`)
- [CVE-2024-37993](CVE-2024/CVE-2024-379xx/CVE-2024-37993.json) (`2024-09-18T15:32:26.037`)
- [CVE-2024-37994](CVE-2024/CVE-2024-379xx/CVE-2024-37994.json) (`2024-09-18T15:35:17.403`)
- [CVE-2024-37995](CVE-2024/CVE-2024-379xx/CVE-2024-37995.json) (`2024-09-18T15:37:15.130`)
- [CVE-2024-38018](CVE-2024/CVE-2024-380xx/CVE-2024-38018.json) (`2024-09-18T15:04:58.240`)
- [CVE-2024-38045](CVE-2024/CVE-2024-380xx/CVE-2024-38045.json) (`2024-09-18T15:04:07.700`)
- [CVE-2024-38046](CVE-2024/CVE-2024-380xx/CVE-2024-38046.json) (`2024-09-18T15:02:15.300`)
- [CVE-2024-38366](CVE-2024/CVE-2024-383xx/CVE-2024-38366.json) (`2024-09-18T15:22:55.753`)
- [CVE-2024-38367](CVE-2024/CVE-2024-383xx/CVE-2024-38367.json) (`2024-09-18T15:16:27.733`)
- [CVE-2024-38368](CVE-2024/CVE-2024-383xx/CVE-2024-38368.json) (`2024-09-18T15:23:00.507`)
- [CVE-2024-42501](CVE-2024/CVE-2024-425xx/CVE-2024-42501.json) (`2024-09-18T15:35:05.747`)
- [CVE-2024-42502](CVE-2024/CVE-2024-425xx/CVE-2024-42502.json) (`2024-09-18T15:35:06.550`)
- [CVE-2024-42503](CVE-2024/CVE-2024-425xx/CVE-2024-42503.json) (`2024-09-18T15:35:10.277`)
- [CVE-2024-43482](CVE-2024/CVE-2024-434xx/CVE-2024-43482.json) (`2024-09-18T14:11:50.303`)
- [CVE-2024-43487](CVE-2024/CVE-2024-434xx/CVE-2024-43487.json) (`2024-09-18T14:10:20.320`)
- [CVE-2024-43778](CVE-2024/CVE-2024-437xx/CVE-2024-43778.json) (`2024-09-18T15:35:11.213`)
- [CVE-2024-4639](CVE-2024/CVE-2024-46xx/CVE-2024-4639.json) (`2024-09-18T15:46:04.960`)
- [CVE-2024-4640](CVE-2024/CVE-2024-46xx/CVE-2024-4640.json) (`2024-09-18T15:48:43.557`)
- [CVE-2024-4641](CVE-2024/CVE-2024-46xx/CVE-2024-4641.json) (`2024-09-18T15:52:41.237`)
- [CVE-2024-5682](CVE-2024/CVE-2024-56xx/CVE-2024-5682.json) (`2024-09-18T14:35:06.033`)
- [CVE-2024-8144](CVE-2024/CVE-2024-81xx/CVE-2024-8144.json) (`2024-09-18T15:31:17.277`)
- [CVE-2024-8145](CVE-2024/CVE-2024-81xx/CVE-2024-8145.json) (`2024-09-18T15:34:47.007`)
- [CVE-2024-8242](CVE-2024/CVE-2024-82xx/CVE-2024-8242.json) (`2024-09-18T15:47:56.553`)
- [CVE-2024-8269](CVE-2024/CVE-2024-82xx/CVE-2024-8269.json) (`2024-09-18T15:20:44.553`)
- [CVE-2024-42404](CVE-2024/CVE-2024-424xx/CVE-2024-42404.json) (`2024-09-18T16:35:08.267`)
- [CVE-2024-42795](CVE-2024/CVE-2024-427xx/CVE-2024-42795.json) (`2024-09-18T16:35:09.097`)
- [CVE-2024-42796](CVE-2024/CVE-2024-427xx/CVE-2024-42796.json) (`2024-09-18T16:35:09.880`)
- [CVE-2024-42798](CVE-2024/CVE-2024-427xx/CVE-2024-42798.json) (`2024-09-18T16:35:10.637`)
- [CVE-2024-43116](CVE-2024/CVE-2024-431xx/CVE-2024-43116.json) (`2024-09-18T16:22:14.880`)
- [CVE-2024-43117](CVE-2024/CVE-2024-431xx/CVE-2024-43117.json) (`2024-09-18T16:15:04.373`)
- [CVE-2024-43230](CVE-2024/CVE-2024-432xx/CVE-2024-43230.json) (`2024-09-18T16:10:30.317`)
- [CVE-2024-43327](CVE-2024/CVE-2024-433xx/CVE-2024-43327.json) (`2024-09-18T17:07:45.553`)
- [CVE-2024-43967](CVE-2024/CVE-2024-439xx/CVE-2024-43967.json) (`2024-09-18T17:00:57.497`)
- [CVE-2024-44103](CVE-2024/CVE-2024-441xx/CVE-2024-44103.json) (`2024-09-18T17:18:39.040`)
- [CVE-2024-44104](CVE-2024/CVE-2024-441xx/CVE-2024-44104.json) (`2024-09-18T17:33:06.413`)
- [CVE-2024-44105](CVE-2024/CVE-2024-441xx/CVE-2024-44105.json) (`2024-09-18T17:48:11.193`)
- [CVE-2024-44106](CVE-2024/CVE-2024-441xx/CVE-2024-44106.json) (`2024-09-18T17:50:40.660`)
- [CVE-2024-44107](CVE-2024/CVE-2024-441xx/CVE-2024-44107.json) (`2024-09-18T17:52:50.990`)
- [CVE-2024-45041](CVE-2024/CVE-2024-450xx/CVE-2024-45041.json) (`2024-09-18T17:31:53.903`)
- [CVE-2024-45413](CVE-2024/CVE-2024-454xx/CVE-2024-45413.json) (`2024-09-18T16:35:11.470`)
- [CVE-2024-45414](CVE-2024/CVE-2024-454xx/CVE-2024-45414.json) (`2024-09-18T16:35:12.227`)
- [CVE-2024-45415](CVE-2024/CVE-2024-454xx/CVE-2024-45415.json) (`2024-09-18T16:35:12.983`)
- [CVE-2024-45416](CVE-2024/CVE-2024-454xx/CVE-2024-45416.json) (`2024-09-18T16:35:13.743`)
- [CVE-2024-45679](CVE-2024/CVE-2024-456xx/CVE-2024-45679.json) (`2024-09-18T16:35:14.530`)
- [CVE-2024-47001](CVE-2024/CVE-2024-470xx/CVE-2024-47001.json) (`2024-09-18T16:35:16.540`)
- [CVE-2024-8012](CVE-2024/CVE-2024-80xx/CVE-2024-8012.json) (`2024-09-18T17:53:47.860`)
- [CVE-2024-8611](CVE-2024/CVE-2024-86xx/CVE-2024-8611.json) (`2024-09-18T17:24:34.163`)
- [CVE-2024-8904](CVE-2024/CVE-2024-89xx/CVE-2024-8904.json) (`2024-09-18T16:35:17.877`)
- [CVE-2024-8905](CVE-2024/CVE-2024-89xx/CVE-2024-8905.json) (`2024-09-18T16:35:18.640`)
## Download and Usage

View File

@ -175554,7 +175554,7 @@ CVE-2021-31555,0,0,7de5df80bc06456a2bd06cb1ed2fa6bf25b8a0e66ee1e2ceff5a7504cc2b9
CVE-2021-31556,0,0,93b949700d04612fa67f7aa21454bcfa0dedb54b45feb534dfde6a346bbdbf4e,2023-11-07T03:34:58.647000
CVE-2021-31558,0,0,ceed4d2a05c41f9fdd58ce2921315e67a6e46f1c89b4c2da0bce257ffbc7f901,2021-12-28T14:54:32.527000
CVE-2021-31559,0,0,c056101e3a724e5296c3096cffa3217710e8d3f22622b1fbc675682800b56fdf,2022-10-25T16:42:38.307000
CVE-2021-3156,0,0,806c2a3a0ff7fe53659d566e9bdf18f925a9ebcb66e6a0ff40da7c6bfa4c4f40,2024-07-09T18:27:53.967000
CVE-2021-3156,0,1,756a4c61ba757c306e336a56d1a3eabd3a978cd9871d60b7e3550598effb17de,2024-09-18T17:15:13.843000
CVE-2021-31562,0,0,ac50e4387893ec363455949ced3c17ca407e9a27f3f2c3f523390c3482b094df,2022-01-28T15:55:53.923000
CVE-2021-31566,0,0,801f1236a607222712dc7741b61bbdda3061d826b7fd22f878d0c5c45a130a15,2024-03-27T16:04:30.260000
CVE-2021-31567,0,0,0da3da305c7b1718259a905dc09c36fc318ae57a531df276f807be7858b88fad,2022-02-03T17:09:44.553000
@ -185165,7 +185165,7 @@ CVE-2021-44386,0,0,c7a8e786c9ce5934fc402773c471d2a12262151e8fc565444fc2144ac181f
CVE-2021-44387,0,0,fabc139e1f85cfa88528c19fca0f1bc78eb0fe30fe316bdfaa7f89835abfac5f,2022-10-25T17:43:35.947000
CVE-2021-44388,0,0,3dcfd88f5acdaf90a435be2f8258f09ae02ea037b0a541345e60e2924e1ecb14,2022-10-25T17:43:28.293000
CVE-2021-44389,0,0,eab304468bce6b27476ecc311a2d45e089d60148a6143553219ed0a865fd93f0,2022-10-25T17:43:23.320000
CVE-2021-4439,0,0,2877623506623609eaaf429f2f2cf99ff5181f0c0c48124e542d3322f8097bb1,2024-06-20T12:43:25.663000
CVE-2021-4439,0,1,7496e4c229713a1108169323523b60c6f81ce22d5aa6968a0e27470dbbd3ded0,2024-09-18T16:34:18.960000
CVE-2021-44390,0,0,66390a2bd3a7fe49801e32199ec52e7a2aefb72b4413e531f48a71660b19bcab,2022-10-25T17:43:18.373000
CVE-2021-44391,0,0,5b977c68bde6a7b9ce717e629efa137c50bc8bdf7ace5dcd740bb98570d1f8ce,2022-10-25T17:43:13.387000
CVE-2021-44392,0,0,df0247b73a347802891c2a1a6ad5403f865c16563cfef3bcb1fb92386b0bcdfd,2022-10-25T17:43:02.037000
@ -187485,10 +187485,10 @@ CVE-2021-47613,0,0,642703d9671fc407abe219c3770e567651dc20dc07d591d5ba5177a9d5d4e
CVE-2021-47614,0,0,ef802c1c34c90a0409b0849796fe5ab3fdfe8e1064cf9d9b5bcc370d68a7918d,2024-08-27T16:14:06.177000
CVE-2021-47615,0,0,3bc3df92b69fdab3bdde99978f3d8804c002c34343decddd85839db0c37e920e,2024-06-20T12:43:25.663000
CVE-2021-47616,0,0,df02274307ce6160ecca6b3896e04e852b158704d05111c568a6cd060f1afb3e,2024-08-27T16:13:59.120000
CVE-2021-47617,0,0,174885baf195ea856ab0f44445ac6a3f70dd31281a9cea4d13f0e12108a3d3c2,2024-06-20T12:43:25.663000
CVE-2021-47617,0,1,f701c4b9ceb190096ace90035e3ee735a9ba3198d4f5aae57c90972417326e44,2024-09-18T17:46:30.413000
CVE-2021-47618,0,0,2a314532463f641de5a1abcd70cc0a94c3a5563bdb37f6cd3ebfada5f84160e6,2024-06-20T12:43:25.663000
CVE-2021-47619,0,0,3423ea9cbab93af03ecb9855e0285f5e2851c0e4b6812bafeb4e82921247592c,2024-06-20T12:43:25.663000
CVE-2021-47620,0,0,fb48237cc161b8d736f32b3c4687ae5c6d236eb8a2b8089bbf75bcca0c16df9e,2024-06-20T12:43:25.663000
CVE-2021-47619,0,1,038ae55e86cea289a2c13d6822057614864308e714603d25972607093ce9572c,2024-09-18T17:08:45.593000
CVE-2021-47620,0,1,eb4d580227848fa1a691113178ce258643d92e4b77639d956836ec159d2f88f5,2024-09-18T17:07:27.603000
CVE-2021-47621,0,0,e2a12dc01cb26b616b467be0797cdc4becade42dc6473a1cfae1a845981be942,2024-08-19T17:35:03.327000
CVE-2021-47622,0,0,1d63636624695cdf93325419218fd644932a974f7e674106d3329295d563b92a,2024-08-21T17:31:30.087000
CVE-2021-47623,0,0,51281b2f0091c3f4d7a64df3b524258b3de520fa994b2caf678cd311e53f80eb,2024-07-16T13:43:58.773000
@ -194663,12 +194663,13 @@ CVE-2022-25763,0,0,f36a89526be5572d2d9c611d221dd3b3c258194aac38cd956d5c0a334ae80
CVE-2022-25765,0,0,bc5460bb4643fd4c858b78ef1f90248807fe33e394e3b9ca3e1285b35c5a0727,2023-11-07T03:44:49.920000
CVE-2022-25766,0,0,9c9eff15468e46e0d8fd364a8a8ff59474a4c5800e69ce89b7195191e92ce00f,2023-08-08T14:21:49.707000
CVE-2022-25767,0,0,9c7e47a7f32ad24819f31562ff54850c26f7314d814cab84c6713ce436000d52,2022-05-11T16:19:05.967000
CVE-2022-25769,1,1,49c2fe6bbcc4dd18d3ac4c13713a4ad2cfb810bf9c9a1e9e202814edcb46964d,2024-09-18T15:15:13.060000
CVE-2022-25769,0,0,49c2fe6bbcc4dd18d3ac4c13713a4ad2cfb810bf9c9a1e9e202814edcb46964d,2024-09-18T15:15:13.060000
CVE-2022-2577,0,0,87c803484cf61dec9e54055b4599e6f4b1ddfe755fed9fabbd2408fb332046f5,2023-11-07T03:46:40.493000
CVE-2022-25772,0,0,95d681186a9c51133bf3638b33bba1dd8f63cdc4f434660afa0e726ca2c437ec,2023-05-09T19:15:11.413000
CVE-2022-25774,1,1,d128421aa7601ab16044dac15490c25c6c2e690412ad3801950f706eb5056b33,2024-09-18T15:15:13.253000
CVE-2022-25775,1,1,2d1d71ffaee7c477f923babb3051dba7e000633b4437cb8d189bac24751d255c,2024-09-18T15:15:13.440000
CVE-2022-25776,1,1,9fbe8029aae3d5b21da2ffbfb3fcbb3c0b1cccf869457ebde978fe0e2ec23da5,2024-09-18T15:15:13.620000
CVE-2022-25774,0,0,d128421aa7601ab16044dac15490c25c6c2e690412ad3801950f706eb5056b33,2024-09-18T15:15:13.253000
CVE-2022-25775,0,0,2d1d71ffaee7c477f923babb3051dba7e000633b4437cb8d189bac24751d255c,2024-09-18T15:15:13.440000
CVE-2022-25776,0,0,9fbe8029aae3d5b21da2ffbfb3fcbb3c0b1cccf869457ebde978fe0e2ec23da5,2024-09-18T15:15:13.620000
CVE-2022-25777,1,1,49e0e38926654b75fb3f04a59e2899d0c331df0eddbdcebb6c3062ad4ede895e,2024-09-18T16:15:04.980000
CVE-2022-25778,0,0,d33a6c464736dc83925f8894577efd1831139b6d537692d92f0faae224736b0b,2022-05-11T18:44:34.810000
CVE-2022-25779,0,0,4cc25f73bf46ee90d0c51c55921c8d5948f913da4b37f33496b30f1a0b932974,2022-05-11T18:46:38.337000
CVE-2022-2578,0,0,b5c8c05b6b5124894234e43a50f3c3ee7f866a667a1b26bbcfea5883e5cf23dd,2022-08-05T15:57:17.487000
@ -212253,19 +212254,19 @@ CVE-2022-48714,0,0,d3e55637265824378aa3c7bae71a7fa48c76755872399adfb8504da466ec1
CVE-2022-48715,0,0,f18f19ec8c35a04457834d24c1dea742a22a4a63333ab01494f99ae0f13cdfc2,2024-06-20T12:43:25.663000
CVE-2022-48716,0,0,1288d286656db17c43b8e3c9f6eb25225ae1da1a6ef842eb6115eda843ed17f2,2024-07-03T01:39:11.570000
CVE-2022-48717,0,0,86a2a3ebc53327241887d545f56bda97dca42955623d95429ba56e19538b7f24,2024-06-20T12:43:25.663000
CVE-2022-48718,0,0,29d0bc28b04857e3904355fbdbb3a7f30c84b05120a226cf7aa7386304ca27af,2024-06-20T12:43:25.663000
CVE-2022-48719,0,0,f4d51b48d0dceb84a522e3aacc839d18f98a71faf7abac46c5bbdcfdb4b5afdf,2024-06-20T12:43:25.663000
CVE-2022-48718,0,1,7640e71d116145a3f3baf171d8d00574222355d0ce42a26218a607f2bdb73992,2024-09-18T16:59:04.887000
CVE-2022-48719,0,1,316edab43602fc55750f273da69e714df52365401eb5ac657e2fe8a4bcfe1f73,2024-09-18T16:58:08.113000
CVE-2022-4872,0,0,9a9357361bb7ab0b9cd8fd203b7948e3be5bc59908cc06b6955da5855c1684a0,2023-11-07T03:59:09.100000
CVE-2022-48720,0,0,90eecdc30f7ea6aa4c33f904804e5a2a970f90cd660766e7e51c0e99d0d283dc,2024-06-20T12:43:25.663000
CVE-2022-48721,0,0,050d67aa22d23f52c6bfdf27fb0dc60c5583d1190669a1dd29e753c31f9f5371,2024-06-20T12:43:25.663000
CVE-2022-48722,0,0,ea737430afb48ab135cc3263437bb0afa8bac793959b1846321b80c9fbaa56b9,2024-06-20T12:43:25.663000
CVE-2022-48723,0,0,74fc8411c4c047c20c11517d9586a3cbcfa15e2c7c8edd39563e37dfe8b56993,2024-06-20T12:43:25.663000
CVE-2022-48724,0,0,247d020517680aed066af9ab23965c200dc5d8430f0241c7ac512d609f9a87ee,2024-06-20T12:43:25.663000
CVE-2022-48725,0,0,bb33091cc6e03426d56dc75e8241d9fedd164f2b50b31af14d7aa34a115be593,2024-06-20T12:43:25.663000
CVE-2022-48726,0,0,13d9e26f791db435236ed77456318001cd395744c82ddac4d9bd60d5f2aaf8e9,2024-06-20T12:43:25.663000
CVE-2022-48723,0,1,31cdc2db64a35923c1a712c4774ac8edcb2377a04366b4a6056b99d2c47c0aca,2024-09-18T17:46:50.220000
CVE-2022-48724,0,1,7b6cf7dc90513be1fa438fe83b37531e293362add72b90daae0676b2be96e5bc,2024-09-18T16:19:25.430000
CVE-2022-48725,0,1,133e21ffa0572c196cd2e5655d8a14e74ebedf557d8de3be913efb6c476781f8,2024-09-18T16:10:22.077000
CVE-2022-48726,0,1,f0c473cd5b90d99544fd8497f3d5a186d1f94df3a66471f05e08b5c89f94da9f,2024-09-18T16:09:15.723000
CVE-2022-48727,0,0,f49ef1fb21fb3a5154a951dedd828fe63b6b99b0d08022a9c1020655344e026f,2024-06-20T12:43:25.663000
CVE-2022-48728,0,0,0ee1a9100f0733ab20840f81047b6476227058b77a458193e2d7dd0e521f2898,2024-06-20T12:43:25.663000
CVE-2022-48729,0,0,ad165dff3bcf3425e94d56121d561de71f8056af16b12ad5ad3979c56f1e6474,2024-06-20T12:43:25.663000
CVE-2022-48728,0,1,4a8f54abce7793b55609eeea23d6695dfc0efb1124e2970f715dffaecbf7ce80,2024-09-18T16:07:21.097000
CVE-2022-48729,0,1,2ec8bbf1a94ac413f484d3017e3caf03362964faaf54596abc7c0a0fcb29209f,2024-09-18T16:06:21.790000
CVE-2022-4873,0,0,9266192fd5e17bc961f9039902c555ad69216beb20dfd48249e4f37501df9445,2023-11-07T03:59:09.310000
CVE-2022-48730,0,0,927e7fae9500f7d1d76c595495e5d68ddde80a2da0a22ed9d01a96f4a588ddf8,2024-06-20T12:43:25.663000
CVE-2022-48731,0,0,f2137fdaa4becb4ed0190377e8df6f4b116a98b0fb57b5a4ce7886128d2a2fb4,2024-06-20T12:43:25.663000
@ -212287,15 +212288,15 @@ CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635
CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000
CVE-2022-48747,0,0,aa1cb9efcca7c13891b9cc3d8cd2d307d24734d06b6fc90bb25e227010e2f6e5,2024-07-03T01:39:13.487000
CVE-2022-48748,0,0,8ceaaf6df6e057efbae67972ff0fd4ea5b5ca2de3f69a0edbfbd5849c7be6738,2024-07-03T01:39:14.287000
CVE-2022-48749,0,0,00b215b6ee07fdcbfc058e227b96710b2be12391f1bea669a0a9b96b66e61bfa,2024-06-20T12:43:25.663000
CVE-2022-48749,0,1,a342016d18ed2373bdc88047bdeebb213977ad81378c82786c0d196af2420260,2024-09-18T16:05:04.623000
CVE-2022-4875,0,0,0248cb7e88a64eaf1154285e30f722a7ce5832425ab7216a34bbdccf82920b19,2024-05-17T02:17:00.353000
CVE-2022-48750,0,0,e83e1b8ccbc49d38eaf206de239f3f32cc3ed6a97c7ddcc921f710c0e2c28341,2024-06-24T16:15:10.050000
CVE-2022-48750,0,1,55afd22040c9a204644583104b9b0ba5a5b6f53a98ecd72808a82376e1affbba,2024-09-18T16:04:21.597000
CVE-2022-48751,0,0,be32087ff7da3afc8bbd26738891fe8c820998963c64317e4b1afedf242a7fee,2024-06-20T12:43:25.663000
CVE-2022-48752,0,0,38cf75d35e9d1cb0a011fd7ff84616d4bbbc7cc6cd1186a506f033bb40c015f3,2024-06-20T12:43:25.663000
CVE-2022-48753,0,0,37ca66b2c74f69f4b107b0ee874cb120fc105d7ed208fcf6a99eb46d7672250f,2024-06-20T12:43:25.663000
CVE-2022-48753,0,1,fee8018edcf35100134efb8c5bdeee9c5abc917f17d652dbef1321e8083108a6,2024-09-18T16:03:25.617000
CVE-2022-48754,0,0,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000
CVE-2022-48755,0,0,30010b42de97147ea0203eebb224554207374f1ac961584225a137f3aa742eee,2024-06-20T12:43:25.663000
CVE-2022-48756,0,1,ba335ca06870d086c208a4b61d6e4ff2c3db981eb9732fbe19a2518767ecf69b,2024-09-18T15:59:50.983000
CVE-2022-48756,0,0,ba335ca06870d086c208a4b61d6e4ff2c3db981eb9732fbe19a2518767ecf69b,2024-09-18T15:59:50.983000
CVE-2022-48757,0,0,67cd6f9d2cbeafd944b878e5f6949333e743aa9eebb191d8f592fea932734deb,2024-06-20T12:43:25.663000
CVE-2022-48758,0,0,2390cac20b5fb952629cce9f98f33922ffc2f9637f8248dc4bb4782f5e162dcc,2024-06-20T12:43:25.663000
CVE-2022-48759,0,0,7962889d3c432d97af1edc38f6b3670b53bb47c561e33f1c213dfd68840532fe,2024-06-20T12:43:25.663000
@ -221442,11 +221443,11 @@ CVE-2023-28447,0,0,6367186976f27827261c19bd8919f6ea82651685bddf6890d58adc5cfc17d
CVE-2023-28448,0,0,ebc63ef0aa5992d3b1b222c457f8387f360915a33d538a72c217fd6a5a4cb59f,2023-11-07T04:10:37.130000
CVE-2023-2845,0,0,0fa9122be7638e783829920da4cebd575a75f9f5dbfa9888210728f2e9226a90,2023-05-30T21:57:09.587000
CVE-2023-28450,0,0,5c2253d4a287fe441625ee366deb367c57e306635c3cd3c5dc9109a263b491de,2023-11-07T04:10:37.277000
CVE-2023-28451,1,1,170966e5e173d4e65f372992311e8581a69664e2757bb13f7362729781a9ce18,2024-09-18T15:15:13.900000
CVE-2023-28452,1,1,75ad47e85685d8552bee5909bb140451cfae4a0b1e8874a03a2dc5e39b6b73ec,2024-09-18T15:15:13.957000
CVE-2023-28455,1,1,ccfc9fec366d02b520fd6a525e39b67a89882c218eac90da8171f00b7cf8aae8,2024-09-18T15:15:14.020000
CVE-2023-28456,1,1,16af9b073234d9431a66dff2494f29e4e5942374fcaebea8a3e86268bc8de8ea,2024-09-18T15:15:14.083000
CVE-2023-28457,1,1,7c664c02f976855c7c8bb4e46f66badc003fbae5b354bb1525ddecad4d08db9e,2024-09-18T15:15:14.143000
CVE-2023-28451,0,0,170966e5e173d4e65f372992311e8581a69664e2757bb13f7362729781a9ce18,2024-09-18T15:15:13.900000
CVE-2023-28452,0,0,75ad47e85685d8552bee5909bb140451cfae4a0b1e8874a03a2dc5e39b6b73ec,2024-09-18T15:15:13.957000
CVE-2023-28455,0,0,ccfc9fec366d02b520fd6a525e39b67a89882c218eac90da8171f00b7cf8aae8,2024-09-18T15:15:14.020000
CVE-2023-28456,0,0,16af9b073234d9431a66dff2494f29e4e5942374fcaebea8a3e86268bc8de8ea,2024-09-18T15:15:14.083000
CVE-2023-28457,0,0,7c664c02f976855c7c8bb4e46f66badc003fbae5b354bb1525ddecad4d08db9e,2024-09-18T15:15:14.143000
CVE-2023-28458,0,0,ef73a1fa781dc427433a4344f064cf2c5d295719475229911a534302acd48e97,2023-05-04T12:38:48.727000
CVE-2023-28459,0,0,ff6d9b0d2a61636a2216f5ca3eebb22b60bf4cdf2177e93c8efd3097129af8b8,2023-05-04T12:38:31.430000
CVE-2023-2846,0,0,9aab683976373505e029cb617089a2ec5cce34a049b1b52d471de12eae663bf2,2023-07-10T18:51:01.550000
@ -227944,9 +227945,9 @@ CVE-2023-37228,0,0,643ba6d022c49330496a6c23ea43a1b4794516f1d1a88ce155ebc80364021
CVE-2023-37229,0,0,0bf9ee820ee2e4bae8a90eb97071f74d16b3541ed4020bba6ca4e1b6978a80cf,2024-09-10T17:35:05.483000
CVE-2023-37230,0,0,16174e82af28a8c8963476ae3fb392aa6acdeee683bd62908e45c74a0ebfcfa6,2024-09-10T17:35:06.247000
CVE-2023-37231,0,0,757cf6f1665639ceecb704c0774fd206eedf5d3bd12cf5ae4032e15afcc04854,2024-09-10T17:35:07.017000
CVE-2023-37232,0,1,9bbc1589348f85aa082942bf7fa6ae735252fd46b1bd07a607ac32b8b94abb97,2024-09-18T15:55:43.113000
CVE-2023-37233,0,0,120068bb041f7af670705dfe493d36e42df20bf51600bd27072eed84ea0e9b22,2024-09-10T21:35:02.950000
CVE-2023-37234,0,0,a4892170539d390c3ff9f5ad886d03b91d4cc152d6eb72dfb908c93a7af7b078,2024-09-11T15:35:04.903000
CVE-2023-37232,0,0,9bbc1589348f85aa082942bf7fa6ae735252fd46b1bd07a607ac32b8b94abb97,2024-09-18T15:55:43.113000
CVE-2023-37233,0,1,255b420d42e0ea95c75fa873cdfc752a4caaa6059c742b38d452988c30760f93,2024-09-18T16:10:23.187000
CVE-2023-37234,0,1,e11780f5438cafc52856a9c5ca2622f3b4e2e3fa3f837a68eb5e6fb9854bde46,2024-09-18T16:05:50.257000
CVE-2023-37237,0,0,29a5f3af5199aad5af4f0fdd6511141f4d2b435f709fd260dd5041911ad086ec,2023-07-07T16:00:14.390000
CVE-2023-37238,0,0,8c5d217b62a8efe0c30f15bea3a5d6293d9c6e0abe28ac04e3704ef99c34ccb0,2023-07-12T22:51:22.043000
CVE-2023-37239,0,0,2a2a4e372334e66e5f41ce012a4e3ce6edee956c498345781b72b50751b6e2f3,2023-07-12T18:57:30.653000
@ -233184,7 +233185,7 @@ CVE-2023-4409,0,0,b72041b7f9cdfeef3718fabf187518ca48bca6924a33bd70ada5c1504adb23
CVE-2023-44090,0,0,47c75449add0b7fa37849b999ed6e0e6a64eb722b158a9f4459f02eb302bcd2e,2024-03-20T13:00:16.367000
CVE-2023-44091,0,0,b03d92935285487dd076e8aadcfbe0c313379212aa4e98b4cdcf457770b8f294,2024-03-20T13:00:16.367000
CVE-2023-44092,0,0,aa6e6f00f8a3f49239128f4a154a6bec06baf6c601d319d2e607057c67bb62f3,2024-03-20T13:00:16.367000
CVE-2023-44093,0,0,13b01a23ebec6e0887a12824c4a172886d9269a32c136bffee22057cb7c6afc0,2023-10-16T19:18:41.647000
CVE-2023-44093,0,1,e6da90eaebeb20364420a7cc2f5826477bc43f97ab85f7cdf1d00f3dc4eafb81,2024-09-18T16:35:02.680000
CVE-2023-44094,0,0,2e86b5f5609b87be9f2024ac48f911303bc99dfc7d7b51a18450901077de9b3e,2023-10-17T20:15:37.950000
CVE-2023-44095,0,0,20cd361979a28419df77e65a9d79a673c474997897db21263296b74b0b7b429c,2023-10-18T19:56:03.400000
CVE-2023-44096,0,0,376479ad73f7acdbf488fb24d5d155cb6eaa77c417dfeb1a01ffe235128cbbed,2023-10-16T16:44:13.867000
@ -233198,7 +233199,7 @@ CVE-2023-44102,0,0,cb2c868cef22e209bfc7e8d44d79d4722862c6534c56fc66469929f763337
CVE-2023-44103,0,0,36561301bd440c63608dff916e3e1c64b9e4381f5d67ed6d05df42070870c437,2023-10-16T14:09:47.430000
CVE-2023-44104,0,0,741ba87bf07130e8062c2028b84be5fff78da6b429799f8e51783319789c4a54,2023-10-16T14:12:54.343000
CVE-2023-44105,0,0,48f70b07e55100e2c888adbd99b3bca701ceb55c7df33fd1d42bf5b1ee2317fe,2023-10-13T20:05:12.087000
CVE-2023-44106,0,0,f73d098de6ace271290166a7c33237e318dd36252000c469186fd9b47d0acac3,2023-10-15T01:47:39.467000
CVE-2023-44106,0,1,6213f30ff4b50712e15cd496746091d5f8c742003a5f8ddf4cabe372228cf928,2024-09-18T16:35:04.117000
CVE-2023-44107,0,0,539be1c7479f708064fe24db4c75d1cfe383994d92e0303441ac804c74817aa4,2023-10-15T01:38:58.053000
CVE-2023-44108,0,0,4d0e8048b91bebdd1711ad1e3a3e93e8b14e509db45311931d92fbfe7ac430a5,2023-10-15T01:44:06.033000
CVE-2023-44109,0,0,7c8fba7c91631df7d6a54ae11b9d62d838ed25609d02c64b3e08c5c02ad588df,2024-02-01T01:09:11.587000
@ -235246,6 +235247,7 @@ CVE-2023-47100,0,0,ff970e0bbee0da60d74f669b9fb5cb216763ce026187e12f8579e05200812
CVE-2023-47101,0,0,8e6edd25cda6a591046fe983528e0a18fc64caa5bb33128c51155cd1de08a87e,2024-09-09T21:35:04.033000
CVE-2023-47102,0,0,bb32c5cb2274f695bb77b1dcabc1de081035b480bea1daa5bd9c69bcfd55cd77,2024-09-05T15:35:18.967000
CVE-2023-47104,0,0,a37a236519348a3781a21a1de0f9441014abbe03c8d36d3b50f8a015a7854ef5,2024-09-09T21:35:05.027000
CVE-2023-47105,1,1,ed4d429e6fc34c3e324554afa56e02385162776339c8a283c4c19e5411e48ae3,2024-09-18T17:15:18.277000
CVE-2023-47106,0,0,274f9f8003b54fe6ff33410b194e51c238d7f0e1d1e6019e27d3ee23d36974d3,2023-12-07T21:01:57.647000
CVE-2023-47107,0,0,62b3eb30757fd38e881b6505c45a9191d7dd7c665bbdd43f636c7f315820da31,2023-11-16T14:27:03.320000
CVE-2023-47108,0,0,e1878aaf9ec42eaeb46d72dc6612bfb6a1c8ce4d93ded369cdc526dd853945a6,2023-11-20T19:34:26.493000
@ -236777,7 +236779,7 @@ CVE-2023-49195,0,0,239193d980cfd4324773344b0a932e91919adfb3eac7f01f4cac2dbd41501
CVE-2023-49197,0,0,87fee8cafa9bc5eebe7f1b14f5bce64e09cfb3c60a34a1183c07dca6faf91be6,2023-12-21T17:26:04.913000
CVE-2023-49198,0,0,ac19da202070e70cbe33e0e7f0d8ec06a1ef23f683cbf1d8c569adca8420cbd3,2024-08-23T16:56:50.683000
CVE-2023-4920,0,0,750757ff4ce213882eeb3b1cbdf16aac49f85b0688b4847bcc0bc2036d6471f3,2023-11-07T04:23:10.193000
CVE-2023-49203,1,1,5d66f4e0a7f6892566206caf2d40cd3786f36a7125124f48fe8018bd3fa054d9,2024-09-18T15:15:14.513000
CVE-2023-49203,0,0,5d66f4e0a7f6892566206caf2d40cd3786f36a7125124f48fe8018bd3fa054d9,2024-09-18T15:15:14.513000
CVE-2023-49208,0,0,2a9e047f121c5391d797b355b9800029d03397ffa5606d306303c89458886565,2023-11-30T20:47:45.190000
CVE-2023-4921,0,0,f6caa99aaa8bd9b77f1b8ba6041c425c337fb5660ab8fed5a711e5fb5a689b43,2024-08-26T16:06:55.377000
CVE-2023-49210,0,0,9b911dd5ab2028f37c1c50f777fb24f7d718b5c731a8746dbf32546fd1c0fe16,2024-08-02T22:16:01.363000
@ -241281,9 +241283,9 @@ CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf
CVE-2024-0104,0,0,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000
CVE-2024-0107,0,0,825deb4e82dfaf0b98f1fe2772df92223b06ae0e932511c6a748f272f8b997c9,2024-09-17T12:10:22.063000
CVE-2024-0108,0,0,66f975a41bb5f0143618b7229f9a8d90fdad314725e86f6c633b765a762e46f3,2024-09-16T19:27:19.833000
CVE-2024-0109,0,1,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000
CVE-2024-0110,0,1,9d3ea028d3dde672136c07e8d052ddc3ffee906b5f050cc97127e00fa31f77fb,2024-09-18T15:16:37.990000
CVE-2024-0111,0,1,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f20,2024-09-18T15:22:14.727000
CVE-2024-0109,0,0,e71ce20ade0f58519f6e876bddeb521bd39d5584f365e91fb0be43461eeae6aa,2024-09-18T15:18:06.117000
CVE-2024-0110,0,0,9d3ea028d3dde672136c07e8d052ddc3ffee906b5f050cc97127e00fa31f77fb,2024-09-18T15:16:37.990000
CVE-2024-0111,0,0,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f20,2024-09-18T15:22:14.727000
CVE-2024-0113,0,0,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000
CVE-2024-0115,0,0,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000
CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000
@ -243808,8 +243810,8 @@ CVE-2024-21140,0,0,4152c752f631d64c27b06e5115099663133590db63a2cfff7e518248f96c3
CVE-2024-21141,0,0,f6351581c68c52a0fcae66a77dd601ef15127184835385b5e0479a9d14461be6,2024-08-28T17:58:43.457000
CVE-2024-21142,0,0,f819d3a8ba6f5d3f6da22376ee3aac7e9c1012257d5ae28b11f63731d1547f92,2024-07-17T13:34:20.520000
CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000
CVE-2024-21144,0,1,47e09fd5fcc37ec82730b14b6c143601a9e80d79dcae6217efe43cc12a904fd4,2024-09-18T15:15:42.963000
CVE-2024-21145,0,1,a189157c8426d8ad6971ad9843f06a52e2ba533f8f4d8f95883f50413386394e,2024-09-18T15:16:36.450000
CVE-2024-21144,0,0,47e09fd5fcc37ec82730b14b6c143601a9e80d79dcae6217efe43cc12a904fd4,2024-09-18T15:15:42.963000
CVE-2024-21145,0,0,a189157c8426d8ad6971ad9843f06a52e2ba533f8f4d8f95883f50413386394e,2024-09-18T15:16:36.450000
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
CVE-2024-21148,0,0,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
@ -245791,8 +245793,8 @@ CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df9
CVE-2024-23912,0,0,210cf35daf58146f5a2ec254acd74292d26b1663729ba2d0483f8b346b0042f9,2024-05-03T12:48:41.067000
CVE-2024-23913,0,0,32316a55a8e1da81d9abb95b33e0db8e8724ab28f77e16dfed40dc690a6cb334,2024-05-03T12:48:41.067000
CVE-2024-23914,0,0,ef84d8471f9b2e6f74b964fa20e89b8542f1e03d544d051711757b2a10104df2,2024-05-03T12:48:41.067000
CVE-2024-23915,1,1,bfaf13cc3d81ee197c7c42941f9ada8654f71cd3575d80c6205f4892fac909df,2024-09-18T14:15:12.580000
CVE-2024-23916,1,1,e0f51db3387bcf7f07716f24446a7c339e129071ba14113b232fe38f391ff77d,2024-09-18T14:15:12.790000
CVE-2024-23915,0,0,bfaf13cc3d81ee197c7c42941f9ada8654f71cd3575d80c6205f4892fac909df,2024-09-18T14:15:12.580000
CVE-2024-23916,0,0,e0f51db3387bcf7f07716f24446a7c339e129071ba14113b232fe38f391ff77d,2024-09-18T14:15:12.790000
CVE-2024-23917,0,0,f3236f3886ac3a298029762564187aed866f84d01e9365abb654a21b0d966829,2024-02-09T01:05:22.180000
CVE-2024-2392,0,0,a1f238224b889878ea8101bb03eb85f7363cbe3f032b78dbb59584257d093c6d,2024-03-22T12:45:36.130000
CVE-2024-2393,0,0,df74eedb2cf97a7cc02bf0873514b7acec290c6b3a77795cc7def5200bf6c3d3,2024-05-17T02:38:12.530000
@ -249335,9 +249337,9 @@ CVE-2024-28978,0,0,4f3d3e4cd04d1637d7e0c8567c10bca3a3eac8362091f1c3bdfba2d85e114
CVE-2024-28979,0,0,94e9b6c95a24be8b1cdd5a15709ed8083c2893ee5b5273129b8771382be39a15,2024-08-20T17:15:18.597000
CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f396,2024-05-17T02:38:36.130000
CVE-2024-28981,0,0,cd4c5692c9a70928a3c82dd2dfe70b15e0b1849d79bf5c6ce297f02b6b1c1728,2024-09-12T12:35:54.013000
CVE-2024-28982,0,1,a19015356d660d2e2e0aa0476b84c95e664ecbb510badb624ee4eb55091f610d,2024-09-18T14:36:53.710000
CVE-2024-28983,0,1,703d0fea3e992e6c157faf14895b95484e69f73d18d43a1bdd6448ade19b1d58,2024-09-18T14:36:16.267000
CVE-2024-28984,0,1,061a156a04ab4e4c76d21331d25299f4cff837eab5762774bbd4e38e96a6350a,2024-09-18T15:22:51.163000
CVE-2024-28982,0,0,a19015356d660d2e2e0aa0476b84c95e664ecbb510badb624ee4eb55091f610d,2024-09-18T14:36:53.710000
CVE-2024-28983,0,0,703d0fea3e992e6c157faf14895b95484e69f73d18d43a1bdd6448ade19b1d58,2024-09-18T14:36:16.267000
CVE-2024-28984,0,0,061a156a04ab4e4c76d21331d25299f4cff837eab5762774bbd4e38e96a6350a,2024-09-18T15:22:51.163000
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
CVE-2024-28987,0,0,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
@ -250875,44 +250877,44 @@ CVE-2024-31160,0,0,df48ab606466bd66cd539890b6337283ccfce4c5ec6123b8878b9c85f80b7
CVE-2024-31161,0,0,e2a703e9c6723f5d19e07dd73456c0b2e468812b0ceb5c32a330b1990e29f3ea,2024-08-16T20:25:11.357000
CVE-2024-31162,0,0,927e844bb935e8a83ed32cc3c84a6f15334c1e57e0cf01b6b414adaae6ba411c,2024-06-17T12:42:04.623000
CVE-2024-31163,0,0,4c747f1ff7fba8b05c1cafd42ad5f820c8955e2e4c4106c43c9e7bc300a75bf4,2024-06-17T12:42:04.623000
CVE-2024-31164,1,1,c31b82645418851da3e0edabc7e4d5071eabe5f845fbd8f4f6b205109747c4b6,2024-09-18T14:15:12.967000
CVE-2024-31165,1,1,9d05742e13e78115d4d423bb99553d2fe3001a9e5466a8b01f0828e634ebacd7,2024-09-18T14:15:13.147000
CVE-2024-31166,1,1,4bea6bd1219047d024cc0579e0b9437ed45429ed986b56a128972b83fbbc9f2b,2024-09-18T14:15:13.327000
CVE-2024-31167,1,1,15a65f49b8557ea77743da49f4df4c0dc27f1439a2be849fb2c9af7d7f116de2,2024-09-18T14:15:13.507000
CVE-2024-31168,1,1,540cfb1c83f1df566d69c3293f51799c1b055bd30a97afbddbbe0c9121df35e5,2024-09-18T14:15:13.683000
CVE-2024-31169,1,1,af81bab79f7fabeaef003625021ed74f5891103d1fe91b0ecbf45dc1e74e94a6,2024-09-18T14:15:13.860000
CVE-2024-31164,0,0,c31b82645418851da3e0edabc7e4d5071eabe5f845fbd8f4f6b205109747c4b6,2024-09-18T14:15:12.967000
CVE-2024-31165,0,0,9d05742e13e78115d4d423bb99553d2fe3001a9e5466a8b01f0828e634ebacd7,2024-09-18T14:15:13.147000
CVE-2024-31166,0,0,4bea6bd1219047d024cc0579e0b9437ed45429ed986b56a128972b83fbbc9f2b,2024-09-18T14:15:13.327000
CVE-2024-31167,0,0,15a65f49b8557ea77743da49f4df4c0dc27f1439a2be849fb2c9af7d7f116de2,2024-09-18T14:15:13.507000
CVE-2024-31168,0,0,540cfb1c83f1df566d69c3293f51799c1b055bd30a97afbddbbe0c9121df35e5,2024-09-18T14:15:13.683000
CVE-2024-31169,0,0,af81bab79f7fabeaef003625021ed74f5891103d1fe91b0ecbf45dc1e74e94a6,2024-09-18T14:15:13.860000
CVE-2024-3117,0,0,35e12b7e221f89a241b3455a68aa778ef5d3a027d9a06e657b81a15f70aaf730,2024-05-17T02:39:43.503000
CVE-2024-31170,1,1,ca418f5911b1e212ec8914bce681c4686729e9c3db178f57fec894c541a1840b,2024-09-18T14:15:14.037000
CVE-2024-31171,1,1,d768219951f605bd690e1e7d362d130553932e51a761b64fc6d5a7dbab9a2760,2024-09-18T14:15:14.210000
CVE-2024-31172,1,1,01c25fc4a52950f8612e98e64d2b01a58f3b33c5aa8f48f4c31bdf2c4705584f,2024-09-18T14:15:14.387000
CVE-2024-31173,1,1,4a949cd93d1a79573ff33bf547957ff75f4ecffdaf5b2a19916f002234bb2062,2024-09-18T14:15:14.557000
CVE-2024-31174,1,1,d27a64f748aeadd7bfe99d4647b6e68131695ff559348e3b46a20768f7159d5d,2024-09-18T14:15:14.730000
CVE-2024-31175,1,1,6cde8b626cae2eb202493369da7ff4bbbe87b3b81dde198d24fbae8afe4345f5,2024-09-18T14:15:14.927000
CVE-2024-31176,1,1,b8a95593f7db06f8652a428962955cffc0e1a960bf44c175d377ef6605d8618c,2024-09-18T14:15:15.100000
CVE-2024-31177,1,1,51670217cf9d2ae9f802d269dc598f80bf1f0f2ba1915d8ba50dd6275d98c0bf,2024-09-18T14:15:15.283000
CVE-2024-31178,1,1,9d0f2245d96562f70f54ac79257cfc07d1f77e249c9ed1d245c44226a6cae37c,2024-09-18T14:15:15.460000
CVE-2024-31179,1,1,70619dc93c7aede9d3ae9833f26080d27bca0532d07260995432933a0d055494,2024-09-18T14:15:15.633000
CVE-2024-31170,0,0,ca418f5911b1e212ec8914bce681c4686729e9c3db178f57fec894c541a1840b,2024-09-18T14:15:14.037000
CVE-2024-31171,0,0,d768219951f605bd690e1e7d362d130553932e51a761b64fc6d5a7dbab9a2760,2024-09-18T14:15:14.210000
CVE-2024-31172,0,0,01c25fc4a52950f8612e98e64d2b01a58f3b33c5aa8f48f4c31bdf2c4705584f,2024-09-18T14:15:14.387000
CVE-2024-31173,0,0,4a949cd93d1a79573ff33bf547957ff75f4ecffdaf5b2a19916f002234bb2062,2024-09-18T14:15:14.557000
CVE-2024-31174,0,0,d27a64f748aeadd7bfe99d4647b6e68131695ff559348e3b46a20768f7159d5d,2024-09-18T14:15:14.730000
CVE-2024-31175,0,0,6cde8b626cae2eb202493369da7ff4bbbe87b3b81dde198d24fbae8afe4345f5,2024-09-18T14:15:14.927000
CVE-2024-31176,0,0,b8a95593f7db06f8652a428962955cffc0e1a960bf44c175d377ef6605d8618c,2024-09-18T14:15:15.100000
CVE-2024-31177,0,0,51670217cf9d2ae9f802d269dc598f80bf1f0f2ba1915d8ba50dd6275d98c0bf,2024-09-18T14:15:15.283000
CVE-2024-31178,0,0,9d0f2245d96562f70f54ac79257cfc07d1f77e249c9ed1d245c44226a6cae37c,2024-09-18T14:15:15.460000
CVE-2024-31179,0,0,70619dc93c7aede9d3ae9833f26080d27bca0532d07260995432933a0d055494,2024-09-18T14:15:15.633000
CVE-2024-3118,0,0,b601d08053b91d1b775fc21940190bf1fa2c378ab81a4eb84232fb172e159127,2024-05-17T02:39:43.597000
CVE-2024-31180,1,1,cfacdba32ba604792dde61ea5192bd3f0a68f3fbb29ed64cf58dfe7831d1f419,2024-09-18T14:15:15.820000
CVE-2024-31181,1,1,835c2c118ecc75a224ce2ae148955df018fed2deac0092ed030ea33c2a75721d,2024-09-18T14:15:16
CVE-2024-31182,1,1,c950fadc93e3ea16ef98cfe6a331915a214b53e804ba89a6f7ab843515de72d6,2024-09-18T14:15:16.193000
CVE-2024-31183,1,1,35c375a6d68274d7c3eb49021a7356a3af376af0ffc335c06845584d31d29b26,2024-09-18T14:15:16.377000
CVE-2024-31184,1,1,b7c59920550422dd2bd0d8e2e7ffe3978ae0b9d37ba35120d4fca1e99fe9546a,2024-09-18T14:15:16.550000
CVE-2024-31185,1,1,11d4d1e3baafe683ba9ec71aae73f9602dfc15b6d6ba9731880b66695bd26581,2024-09-18T14:15:16.727000
CVE-2024-31186,1,1,3dfad5d77e47c755381a80fcf6aef35eccd2a92f4143249975a0b864eebf2297,2024-09-18T14:15:16.953000
CVE-2024-31187,1,1,826688efd6bf65a94bf2ee884e30740211a6e5f630a046477f540511e2f38366,2024-09-18T14:15:17.173000
CVE-2024-31188,1,1,13bd237d18c099469e9d00bce8c8a046b9f3c5286d7ad8a0cd9a1cc0397c165e,2024-09-18T14:15:17.403000
CVE-2024-31189,1,1,6858f5708e98abf5595fb2684a87eb00c16f0ed553e5fd3ffcbc43256f89c04e,2024-09-18T14:15:17.593000
CVE-2024-31180,0,0,cfacdba32ba604792dde61ea5192bd3f0a68f3fbb29ed64cf58dfe7831d1f419,2024-09-18T14:15:15.820000
CVE-2024-31181,0,0,835c2c118ecc75a224ce2ae148955df018fed2deac0092ed030ea33c2a75721d,2024-09-18T14:15:16
CVE-2024-31182,0,0,c950fadc93e3ea16ef98cfe6a331915a214b53e804ba89a6f7ab843515de72d6,2024-09-18T14:15:16.193000
CVE-2024-31183,0,0,35c375a6d68274d7c3eb49021a7356a3af376af0ffc335c06845584d31d29b26,2024-09-18T14:15:16.377000
CVE-2024-31184,0,0,b7c59920550422dd2bd0d8e2e7ffe3978ae0b9d37ba35120d4fca1e99fe9546a,2024-09-18T14:15:16.550000
CVE-2024-31185,0,0,11d4d1e3baafe683ba9ec71aae73f9602dfc15b6d6ba9731880b66695bd26581,2024-09-18T14:15:16.727000
CVE-2024-31186,0,0,3dfad5d77e47c755381a80fcf6aef35eccd2a92f4143249975a0b864eebf2297,2024-09-18T14:15:16.953000
CVE-2024-31187,0,0,826688efd6bf65a94bf2ee884e30740211a6e5f630a046477f540511e2f38366,2024-09-18T14:15:17.173000
CVE-2024-31188,0,0,13bd237d18c099469e9d00bce8c8a046b9f3c5286d7ad8a0cd9a1cc0397c165e,2024-09-18T14:15:17.403000
CVE-2024-31189,0,0,6858f5708e98abf5595fb2684a87eb00c16f0ed553e5fd3ffcbc43256f89c04e,2024-09-18T14:15:17.593000
CVE-2024-3119,0,0,16d9b0b62041b85fa76fcca7b5e07a91c83d46800d8aa92445727479f196ac02,2024-04-10T13:23:38.787000
CVE-2024-31190,1,1,ce0c3e890053515769f29fa22e74a8de151d8da0147f071125c0db25f36d69dc,2024-09-18T14:15:18.017000
CVE-2024-31191,1,1,a4d10ca4c696a3db04b0edfc419cdbca368aaa4b4c78e9ba6c345dff8f10a6a9,2024-09-18T14:15:18.290000
CVE-2024-31192,1,1,289f5e2d106293ea39c4810610d87921d25d6ab088db17fe30bd25565068942d,2024-09-18T14:15:18.470000
CVE-2024-31193,1,1,7ab06ff6e25bfd3f3867ff9470327d461530eb5f3894616027e85a54b55e94de,2024-09-18T14:15:18.647000
CVE-2024-31194,1,1,3fc4e91387ff8533e1fa478f0f6bd1752499fcbcddbae2a0d9a2149c2752f6b2,2024-09-18T14:15:18.827000
CVE-2024-31195,1,1,15b3500d03e4e5504f75e47d8733a1e8bcd30b5d1408093425f409afc2d48fe4,2024-09-18T14:15:19
CVE-2024-31196,1,1,9382617c194e077793340f8ac2054c713e5a71348db2cce2af098cd753f9cb51,2024-09-18T14:15:19.190000
CVE-2024-31197,1,1,7680017e7ce340cf67fbf325ac8633257516c0b4e2c22c2a148f3f99845bc099,2024-09-18T14:15:19.367000
CVE-2024-31198,1,1,71ac53ff8bb624763e7a7bc93361d32bf31ce4455cab897dd0f84546125b6a01,2024-09-18T14:15:19.550000
CVE-2024-31190,0,0,ce0c3e890053515769f29fa22e74a8de151d8da0147f071125c0db25f36d69dc,2024-09-18T14:15:18.017000
CVE-2024-31191,0,0,a4d10ca4c696a3db04b0edfc419cdbca368aaa4b4c78e9ba6c345dff8f10a6a9,2024-09-18T14:15:18.290000
CVE-2024-31192,0,0,289f5e2d106293ea39c4810610d87921d25d6ab088db17fe30bd25565068942d,2024-09-18T14:15:18.470000
CVE-2024-31193,0,0,7ab06ff6e25bfd3f3867ff9470327d461530eb5f3894616027e85a54b55e94de,2024-09-18T14:15:18.647000
CVE-2024-31194,0,0,3fc4e91387ff8533e1fa478f0f6bd1752499fcbcddbae2a0d9a2149c2752f6b2,2024-09-18T14:15:18.827000
CVE-2024-31195,0,0,15b3500d03e4e5504f75e47d8733a1e8bcd30b5d1408093425f409afc2d48fe4,2024-09-18T14:15:19
CVE-2024-31196,0,0,9382617c194e077793340f8ac2054c713e5a71348db2cce2af098cd753f9cb51,2024-09-18T14:15:19.190000
CVE-2024-31197,0,0,7680017e7ce340cf67fbf325ac8633257516c0b4e2c22c2a148f3f99845bc099,2024-09-18T14:15:19.367000
CVE-2024-31198,0,0,71ac53ff8bb624763e7a7bc93361d32bf31ce4455cab897dd0f84546125b6a01,2024-09-18T14:15:19.550000
CVE-2024-31199,0,0,f3513dbb2e38c737351617d6df9633ea3366e0b40c895fa30b09af179d75918a,2024-08-12T18:21:54.667000
CVE-2024-3120,0,0,d7f7bfc68dc8954b2db64a2bd8494c9672b3ed1aa5b73de4b1ce504de0f2d9cd,2024-04-10T13:23:38.787000
CVE-2024-31200,0,0,3e257c032de46c54255a51950a6b372e410cf7a344a9022e8fd6b6600c793cf5,2024-08-12T18:25:44.547000
@ -252923,7 +252925,7 @@ CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff4
CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000
CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000
CVE-2024-34025,0,0,edd2792f368696b38d90328f1c1ccaaade65bc2e70f896834331ba779fb27dd0,2024-05-16T13:03:05.353000
CVE-2024-34026,1,1,58ee2841a850b4e76f28c7c90f2fd356dc26d929a71043daf3fbccab680e8ad9,2024-09-18T15:15:14.623000
CVE-2024-34026,0,0,58ee2841a850b4e76f28c7c90f2fd356dc26d929a71043daf3fbccab680e8ad9,2024-09-18T15:15:14.623000
CVE-2024-34027,0,0,a46473315ff7fae435c2b21f290e2c9550c38dfa46dbd2afc2165efc005d2aa6,2024-06-24T19:26:47.037000
CVE-2024-34029,0,0,f5d25bd32468c541a51740035f23234d8d5f3f16a79d2529894430e4831fa01a,2024-05-28T12:39:28.377000
CVE-2024-3403,0,0,b6e0e9c5c8bbba14526747c5960a7a5699ede8dea782a1ab2b3e6a77206d4587,2024-05-16T13:03:05.353000
@ -253750,7 +253752,7 @@ CVE-2024-35229,0,0,eaa6af525ef117788c7c2de550a028a47738c31d4d17cd7f70ecf3b93005c
CVE-2024-3523,0,0,7df45990ada619b152a3f8bd7779ad1da608ef93087816155d547c3076b3dd2d,2024-05-17T02:39:58.793000
CVE-2024-35231,0,0,ca19bcc2576ba8b0f106295303d1b03d4d67477db1ee11ed30e35ba727239d12,2024-05-28T12:39:28.377000
CVE-2024-35232,0,0,14685d83263ebe7a96d6e60b653269bedfa54d5fdd442776bc8a5c4f98b8d414,2024-05-28T12:39:42.673000
CVE-2024-35234,0,1,6b803788194fa17ee1a73887dd959902c34169c216412c7e21055156960ebdc1,2024-09-18T14:47:38.370000
CVE-2024-35234,0,0,6b803788194fa17ee1a73887dd959902c34169c216412c7e21055156960ebdc1,2024-09-18T14:47:38.370000
CVE-2024-35235,0,0,f2d8f8caa4850f8384544159cf6299dc7619d54c9571e0f4f4f09c37444ceffb,2024-06-14T03:15:13.393000
CVE-2024-35236,0,0,64a53255024cbec5e616dbed7137d09a4d9af28ca23ba225de34ffc5dc323a19,2024-05-28T12:39:28.377000
CVE-2024-35237,0,0,d0692c9b636c1dac1f0b0323a67ffda842c0f89267a4c70f57e28d02bdbab234,2024-05-28T12:39:28.377000
@ -253886,7 +253888,7 @@ CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c77071
CVE-2024-35510,0,0,caaffeb522a9243cb4a1bb41637eced11d63455c55d5f889189d39467161eb6a,2024-07-03T02:01:46.810000
CVE-2024-35511,0,0,0925e571054fff897af51a6c91c2579c2749b26c74104183a16b37d4fa6c6517,2024-07-03T02:01:47.583000
CVE-2024-35512,0,0,b896e4527afcecfdf8ee8b9a5d8645a7997efcebb8181c42302f1215247b04ab,2024-08-22T21:35:05.483000
CVE-2024-35515,1,1,9a5b085b0e8562065965ac0ac128d7b82a96100a6af3e3ce88a5ba2a2f78dbfd,2024-09-18T15:15:14.843000
CVE-2024-35515,0,0,9a5b085b0e8562065965ac0ac128d7b82a96100a6af3e3ce88a5ba2a2f78dbfd,2024-09-18T15:15:14.843000
CVE-2024-3552,0,0,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000
CVE-2024-35526,0,0,45f791392c66ed8c499767ccc3e4221d8293b29407aac62d7317c3cd0f64f171,2024-06-26T12:44:29.693000
CVE-2024-35527,0,0,72600462defbad3d94b9b914561cd106abcd4f14940c552d4d0bd67292ce0acb,2024-08-12T19:35:08.817000
@ -254426,7 +254428,7 @@ CVE-2024-3611,0,0,b6dd7cd7d7815f4cbb48b9149fec55f286cfb6042c7393dd23d868b1e93589
CVE-2024-36110,0,0,ae199b3fa22fadc918d8c236ca5c5c8f2be6b34351afd72d5f50bac8a0f84267,2024-05-29T13:02:09.280000
CVE-2024-36111,0,0,e4ed842e7daf22cadca9568503ece6f7b8750cda7f44279b6399e91b52a76ea7,2024-07-26T12:38:41.683000
CVE-2024-36112,0,0,3d827ea0c3eaea362d7174c518f3ef1a48183f26c82b6430e889bcf33729a066,2024-05-29T13:02:09.280000
CVE-2024-36113,0,1,bd0f172ed061f2563f819d35f44c783c215c944968e504df51b3e976b592c55a,2024-09-18T14:44:33.187000
CVE-2024-36113,0,0,bd0f172ed061f2563f819d35f44c783c215c944968e504df51b3e976b592c55a,2024-09-18T14:44:33.187000
CVE-2024-36114,0,0,5e400f6e1accfe4ee34afe11a2ba03b10596fa4481251b5d420288b4320d1b3a,2024-05-30T13:15:41.297000
CVE-2024-36115,0,0,f8ba661b18a24aa8a9d37cbb77cc6240a2c56bf800de38ea5defb142197d0446,2024-06-20T12:43:25.663000
CVE-2024-36116,0,0,3e18cd044e5ac4fbf5437d214cb9f9e5fd21bda7e634efa12dbd7a1ca2e9815a,2024-06-20T12:43:25.663000
@ -254823,7 +254825,7 @@ CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96
CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000
CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000
CVE-2024-36735,0,0,77219f23e41303fab14d55459858c38b6f21ffff484d41fa2056fc07bdcb508f,2024-06-07T14:56:05.647000
CVE-2024-36736,0,1,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000
CVE-2024-36736,0,0,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000
CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000
CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000
CVE-2024-36740,0,0,b8d6e8bca7b91dd7c523241570682574ea3e2e1025716afa76fbc7a7c4de936f,2024-08-22T20:35:15.900000
@ -254984,8 +254986,8 @@ CVE-2024-36977,0,0,2fe5f328cd77d8e3e2ff7d8822b2b0f7e95a6c6361c8a1a46715f250c7c3d
CVE-2024-36978,0,0,dcc0f04e3fc2821d8402c617b55b3d37be597fffff7df9cf9ec9b8398c9978a0,2024-08-19T18:31:13.670000
CVE-2024-36979,0,0,74019e1aa595a3039a2ef9ada77a4c2c93d1adcdba69fbae833dd0529f479347,2024-08-26T12:48:19.597000
CVE-2024-3698,0,0,1636f30943e700f62090e4fa161d7d9dd9aa51f3d552ed312bd5146a81f86c91,2024-05-17T02:40:04.800000
CVE-2024-36980,1,1,d87fcd7202fe440666e3cf046b80bfe9a91078ba660326153ae920da5896640b,2024-09-18T15:15:14.903000
CVE-2024-36981,1,1,29a4084fb1d51ae1956ba3b6937f0912bb9fb3b3053c7e9358f1e243c79a81fe,2024-09-18T15:15:15.110000
CVE-2024-36980,0,0,d87fcd7202fe440666e3cf046b80bfe9a91078ba660326153ae920da5896640b,2024-09-18T15:15:14.903000
CVE-2024-36981,0,0,29a4084fb1d51ae1956ba3b6937f0912bb9fb3b3053c7e9358f1e243c79a81fe,2024-09-18T15:15:15.110000
CVE-2024-36982,0,0,aa7c6f6fb5fb0c2be2ff96348e0ea696169b845aaba61abec5ab8d5dad3d35cc,2024-08-02T15:27:14.607000
CVE-2024-36983,0,0,e2f2eb32ae3cfffdff5d7dfbfdef5f12a2b42788ca5c6f7f7a02f6e1986f58cd,2024-07-08T14:18:39.520000
CVE-2024-36984,0,0,e0e9241900a224e3ad6fe1ba063f84bef1aef3bc909574846a1878b8e10e5d08,2024-07-03T02:03:57.773000
@ -255653,12 +255655,12 @@ CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd
CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000
CVE-2024-37989,0,0,3b94113ccd1695e55c704a3f38d763d5ec54c44f354e4b1fe1efc7884dacd2de,2024-07-12T18:52:38.387000
CVE-2024-3799,0,0,099fb34e0ee28d9311fbf29cfaad6b5950bd5e198b1ff9c15d8b2a88d4538973,2024-07-12T10:15:02.353000
CVE-2024-37990,0,1,97bfcbe2fc9ad088748ecc04df4e6487dea35480acf15f9326483cf77afb402d,2024-09-18T15:27:53.563000
CVE-2024-37991,0,1,d1a99a969a61e1b8353d8aaaec469508eb439ea1684668c0de80a1e79299b131,2024-09-18T15:29:44.390000
CVE-2024-37992,0,1,6cf5910b8bbfc6e4bbf8511b3622b0bb295aa3b8b1ce93a159c1abe8bc1e57e2,2024-09-18T15:31:27.597000
CVE-2024-37993,0,1,ccdbccfd8d20c45e847ed3305bd3d1d68f634bb8b22e3e08af2c388cfb81c3e4,2024-09-18T15:32:26.037000
CVE-2024-37994,0,1,f6c2b537912c7f76236be34918e554ed4af1a8005c652c14c816895c9d7442f1,2024-09-18T15:35:17.403000
CVE-2024-37995,0,1,7823f83a92d1c5d9fcab4eff076ef9a6f54ea81c7f492fff881334a568a7b5e6,2024-09-18T15:37:15.130000
CVE-2024-37990,0,0,97bfcbe2fc9ad088748ecc04df4e6487dea35480acf15f9326483cf77afb402d,2024-09-18T15:27:53.563000
CVE-2024-37991,0,0,d1a99a969a61e1b8353d8aaaec469508eb439ea1684668c0de80a1e79299b131,2024-09-18T15:29:44.390000
CVE-2024-37992,0,0,6cf5910b8bbfc6e4bbf8511b3622b0bb295aa3b8b1ce93a159c1abe8bc1e57e2,2024-09-18T15:31:27.597000
CVE-2024-37993,0,0,ccdbccfd8d20c45e847ed3305bd3d1d68f634bb8b22e3e08af2c388cfb81c3e4,2024-09-18T15:32:26.037000
CVE-2024-37994,0,0,f6c2b537912c7f76236be34918e554ed4af1a8005c652c14c816895c9d7442f1,2024-09-18T15:35:17.403000
CVE-2024-37995,0,0,7823f83a92d1c5d9fcab4eff076ef9a6f54ea81c7f492fff881334a568a7b5e6,2024-09-18T15:37:15.130000
CVE-2024-37996,0,0,e39e1581961cad8f5d5dd910100078a11657ad2090cbed7264c9a8bad1310bf5,2024-07-09T18:19:14.047000
CVE-2024-37997,0,0,880ea769e8919f97f57b9878ce449ed40b5cbca31c8883be4629ac4f6a893243,2024-07-09T18:19:14.047000
CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
@ -255671,7 +255673,7 @@ CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162a
CVE-2024-38014,0,0,667a2ca3aa42729c9c1f636c1bc19b21cfc3cbfc4eb15603accaad3e335421c5,2024-09-12T01:00:01.133000
CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000
CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000
CVE-2024-38018,0,1,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000
CVE-2024-38018,0,0,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000
CVE-2024-38019,0,0,da6757aee92bad96249ea36fde1018805a15808ac2fa25fa1dd2f958ebdbe19f,2024-07-11T16:21:19.367000
CVE-2024-3802,0,0,1c8b217f2decaf0481a00e93032897e3d653a5edca1ed0ff18938471d432312f,2024-06-04T02:15:49.290000
CVE-2024-38020,0,0,25b61b5f1a6adfe4617d71f8aaecdffc9abacbc0c88d9ab31bd18a3dd6ca187d,2024-07-11T16:49:29.490000
@ -255692,8 +255694,8 @@ CVE-2024-3804,0,0,670259bb9deba1dd09e2fd5f21b522d9251378214c2f8d4e9a81f125a92ebb
CVE-2024-38041,0,0,f4a3a12f8b0083cabe34ce18f7650953aa9c869c7e1908b1e136d7159a58fbbc,2024-07-11T16:25:14.153000
CVE-2024-38043,0,0,678d7239712daaa20be0694f0d9a87623bf13f4e650f026e0e7dc828486931e4,2024-07-11T16:25:00.517000
CVE-2024-38044,0,0,c3503c93ef40bb7d47f5a9bf23be6e47e665166216973f3f0d25fcf29360c08f,2024-07-11T18:11:30.147000
CVE-2024-38045,0,1,671bc130f79e1b331825df7116cb434d38876967c34de9b7e84df83242353575,2024-09-18T15:04:07.700000
CVE-2024-38046,0,1,3da08d85ebd439a78b5e62e70a3a96810d562bf4c5e0e78ddd293ae1d6453887,2024-09-18T15:02:15.300000
CVE-2024-38045,0,0,671bc130f79e1b331825df7116cb434d38876967c34de9b7e84df83242353575,2024-09-18T15:04:07.700000
CVE-2024-38046,0,0,3da08d85ebd439a78b5e62e70a3a96810d562bf4c5e0e78ddd293ae1d6453887,2024-09-18T15:02:15.300000
CVE-2024-38047,0,0,523e9f5be841cdbc7f183589a93ba548dfc85d0135f48313667d43c75a93c4e3,2024-07-11T18:11:42.987000
CVE-2024-38048,0,0,4d0004e4afcbac434a57cc09e10ac783b3b4c06f9c1cc3d469f5712885a25ea0,2024-07-11T18:12:40.407000
CVE-2024-38049,0,0,5c24278de8ab02f50a0b9861aad4792c351b7c4acdb29064e6a1be3719e07cf4,2024-07-11T18:13:53.890000
@ -255966,9 +255968,9 @@ CVE-2024-38360,0,0,62fab844597ca879d16a5f3bb413c82dd98eca8f8a8f42f5a5f8581c90bd1
CVE-2024-38361,0,0,f382ebba7fc984c6e86107cb94ceaca8dedca184f9f6123ffedcd7094bb741b0,2024-06-21T11:22:01.687000
CVE-2024-38363,0,0,4ba5b34714c88cf806284a26eaf8261d70f03ee7392713aa1b260c885e54e80f,2024-07-09T18:19:14.047000
CVE-2024-38364,0,0,2279d9d422aa31a74e603806d16ace0153ff248c4a5fbe8796ad93e25cd4d53d,2024-06-26T12:44:29.693000
CVE-2024-38366,0,1,da439faf5ff6d8122b959647a313a26dc3be85c3289475c82985c89c575c78f2,2024-09-18T15:22:55.753000
CVE-2024-38367,0,1,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc7ac,2024-09-18T15:16:27.733000
CVE-2024-38368,0,1,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000
CVE-2024-38366,0,0,da439faf5ff6d8122b959647a313a26dc3be85c3289475c82985c89c575c78f2,2024-09-18T15:22:55.753000
CVE-2024-38367,0,0,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc7ac,2024-09-18T15:16:27.733000
CVE-2024-38368,0,0,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000
CVE-2024-38369,0,0,8244568cb54133bd4b7c000807714a4126c5f985c9bed4f8d225a3d939b43204,2024-06-26T14:47:05.077000
CVE-2024-3837,0,0,83b07e73fbcd3bdc07d74ecd9200ace8bc3f655fb5ef786e0fb5447a3f989592,2024-07-03T02:06:37.303000
CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
@ -256445,7 +256447,7 @@ CVE-2024-3907,0,0,60bf8190dbda2edec5350cbb8e8b6403fcf0516c947d67022ad2b560cf30b6
CVE-2024-39071,0,0,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26f77,2024-07-11T15:06:07.560000
CVE-2024-39072,0,0,59efd5c73004670f8c574450bf52f5ef6a3e1b857b7881899bb9399c029104b4,2024-08-01T13:55:22.510000
CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d810f,2024-06-04T19:20:26.660000
CVE-2024-39081,1,1,8b2b4e7e422c554909306a37995905327ab813ab04e65228f24375905f38d918,2024-09-18T14:15:19.757000
CVE-2024-39081,0,0,8b2b4e7e422c554909306a37995905327ab813ab04e65228f24375905f38d918,2024-09-18T14:15:19.757000
CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000
CVE-2024-39090,0,0,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000
CVE-2024-39091,0,0,f4a8f0933c6d25f598eacdb963a85c2dcd7a3357118123548313549391b5d7d0,2024-08-13T21:35:02.617000
@ -256773,9 +256775,9 @@ CVE-2024-39582,0,0,6ec9b04450f9c5ce2a1563682764e2f7b34da0f9eb482017ce73088ac186f
CVE-2024-39583,0,0,ac1320c69e7204d43ee10370ec071062ec88b9a1106bd39584f09ed060befd2b,2024-09-16T15:42:06.347000
CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000
CVE-2024-39585,0,0,b162f39d96cc79baeee026e4bc649d0b5cf545dfb2bc7af993a786e27782c34f,2024-09-17T02:15:49.397000
CVE-2024-39589,1,1,4dda280d459f2c83fb515eb738c1769721cc7bda40bbc4958283b700ad43213e,2024-09-18T15:15:15.333000
CVE-2024-39589,0,0,4dda280d459f2c83fb515eb738c1769721cc7bda40bbc4958283b700ad43213e,2024-09-18T15:15:15.333000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39590,1,1,417ce99ee91588e3028d6edcab9748cbf8e9952d8643590fbef8107932c73210,2024-09-18T15:15:15.540000
CVE-2024-39590,0,0,417ce99ee91588e3028d6edcab9748cbf8e9952d8643590fbef8107932c73210,2024-09-18T15:15:15.540000
CVE-2024-39591,0,0,7234f5f72639a034d956dd5df541035bcac3a09d36d7ba9ed10f23ab4dd7d7f9,2024-09-12T13:29:47.207000
CVE-2024-39592,0,0,541b14c1914f7693bac69344218050bd21bf7511f9226d6471041f73dd5bbff5,2024-08-29T19:25:41.740000
CVE-2024-39593,0,0,f64d4a9107e758157cf94d8020a15d87354768c39cc9030a607faa8c819f82ce,2024-08-29T19:08:19.200000
@ -256800,7 +256802,7 @@ CVE-2024-39622,0,0,5e7d7bcbe4d60960bcc7d0a35a948631371ae2277c1c9eb9831f372ee1fb9
CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000
CVE-2024-39626,0,0,1b1d91def172e0cc6e757efcafa7943028f614721770775c3d1407b25fc30784,2024-09-17T15:07:49.433000
CVE-2024-39627,0,0,07e13c8e7805345d34bba365100ff9d8fb4b41c5994c06908b9aa5fcd6462ce6,2024-09-11T17:35:37.523000
CVE-2024-39628,0,0,8abf80664dfce5db89bc155c2700a612a9b6bae119e72b4395dc2ca2da475311,2024-08-27T13:02:05.683000
CVE-2024-39628,0,1,21626311e4f7b272abd1ea9e299b3f571edb31807e706badf26ecd129be6fd97,2024-09-18T16:59:33.293000
CVE-2024-39629,0,0,69d55baba09f40a0592a3b91cd4c35fb4ccff70560751062aa75ee5152b4ad51,2024-09-11T17:35:06.743000
CVE-2024-3963,0,0,51376b7b644c18cc44faec2c04d1e94caccf8dc59a8984cdfb5fb430015f77f8,2024-08-01T13:56:47.180000
CVE-2024-39630,0,0,b9a415bc4650f8f2437ab21ad7881d5052dc8b427d419e2888cd7dd33acceea7,2024-08-02T12:59:43.990000
@ -256811,11 +256813,11 @@ CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
CVE-2024-39638,0,0,cf36aae6a91cc72ba13b071b9e149e2fa798a9f572f58ede9d761408ecfcdde9,2024-09-13T21:00:44.173000
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
CVE-2024-39641,0,0,82efe19acefcd120a9c9ff4b95bce8c452c5423902a3f6b1c0041639db255e62,2024-08-27T13:02:05.683000
CVE-2024-39641,0,1,ca72e5c4e3f4eb62161dc132924c5912f001d38eb9b77d0e12deb21361b22d88,2024-09-18T16:57:25.417000
CVE-2024-39642,0,0,a5907a7ba9601cb47d5213c09a225012a1c028d8945a3fe4fa6d61abfa537ebb,2024-08-13T12:58:25.437000
CVE-2024-39643,0,0,1dded6874da74e5afbb63537b6a34aae6868db25023597eaaaf8ae23d994ee0d,2024-09-11T17:33:14.787000
CVE-2024-39644,0,0,c5dc47fbf8d1981e87e457a3ee41781a683fa403d50a7465ba17272c13e17f0d,2024-09-11T17:31:27.760000
CVE-2024-39645,0,0,9d264356cb3c50b50ea46e6a6a0ecae0e3898eabe4f8946365594a1394079519,2024-08-27T13:02:05.683000
CVE-2024-39645,0,1,d170ecd8e413b5eeda4dbeb25d9b709e95c517b112d5e6fc26c8b8ee1c85901c,2024-09-18T16:46:57.470000
CVE-2024-39646,0,0,ebb1a6c9a40f2bab7c106d16a488a2c959fc892d9540eb6de01a5701473447cf,2024-09-11T17:31:00.847000
CVE-2024-39647,0,0,76302d6bbf2afe03f0e6f6bafa6326bb4eb55afa326a015b16287c96fa3fb250,2024-09-11T17:30:17.807000
CVE-2024-39648,0,0,ab9faea09f5f33bcf9880e5ab21b0ae5b90092067a818bd60c5199b0cda605b7,2024-08-02T12:59:43.990000
@ -256826,7 +256828,7 @@ CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b
CVE-2024-39653,0,0,0026393f263db329d590d78b1320546a7038443749754db62f750d848ebdd5ca,2024-09-13T21:03:21.327000
CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000
CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000
CVE-2024-39657,0,0,5011bc23ca38c6d5baf0733a7f30352cc204af31d9e0f5e595f8e34352825b69,2024-08-27T13:02:05.683000
CVE-2024-39657,0,1,c6d102523d8502c5965e9c05065be9a6968ad4f166e3ac731a39908b2a4154bb,2024-09-18T16:25:32.703000
CVE-2024-39658,0,0,59024863d94402504392beec22150a3bf1bdca7d2eb9671b61535a10b50beb2c,2024-09-13T21:04:24.760000
CVE-2024-39659,0,0,a80d18e493149233fc317020eaf978d1056512cfa7b08cba1fd89af8c4735b0a,2024-08-02T12:59:43.990000
CVE-2024-3966,0,0,f4286335c18162e5dbc573cbc605017489ac12efad77a1ff38ff47be3739d726,2024-07-29T16:52:33.533000
@ -258033,7 +258035,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
CVE-2024-41926,0,0,d7564816d433232552fda23a5f10a79963d6c502f628c4841f8484c17aa4f54f,2024-09-04T16:55:35.570000
CVE-2024-41927,0,0,f4ba4a6c9a9886f976121a9d30837f6ba4dc4ccf9fc0f7a56ac6b8acaf04eb66,2024-09-04T13:05:36.067000
CVE-2024-41928,0,0,fac45a5eba953351f64e8420aefaa828221c1e8b109e75da05d07c8ee7a8c443,2024-09-06T17:35:13.400000
CVE-2024-41929,0,0,25f7e24f5bee5963e177d6e85983211e56e869e6611a491dedac239b6f50e148,2024-09-18T07:15:02.847000
CVE-2024-41929,0,1,f66edb594830fee28d517259603e349f287170e8380c3a0dd626c454c5a95631,2024-09-18T16:35:07.527000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000
CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000
@ -258414,7 +258416,7 @@ CVE-2024-42398,0,0,ecec97745a6273f6b5e5720bfa1d0ff4b8e46532c92273931272e35e326b7
CVE-2024-42399,0,0,b2d8d291d138c04491424e6796bb04940f5bfb5f03fc0a00b681faa84689b158,2024-08-23T15:06:13.350000
CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000
CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac65a5,2024-08-23T15:06:00
CVE-2024-42404,0,0,c54f40e946bc7f12e50d8450bfb496ff304e1510d799bbbe2fb7fc352b6de97f,2024-09-18T06:15:02.223000
CVE-2024-42404,0,1,c3d405c66f64f609aeb5baff872af9267b9c990f0513561cef9ea13fa0b12c83,2024-09-18T16:35:08.267000
CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000
@ -258481,9 +258483,9 @@ CVE-2024-42495,0,0,ec6874fdfc9b12ec8ef1020de6e62e8d7226ab1ffee9b169624f6e5854e00
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000
CVE-2024-42501,0,1,55667a47577b4f33bade3778f805c6b25ee72bbe08adc8c60302f0e4a051bbca,2024-09-18T15:35:05.747000
CVE-2024-42502,0,1,286a9e13771c1363a765da26fcc8ddd07276a18a92df69ef87a1dce41a5bad6c,2024-09-18T15:35:06.550000
CVE-2024-42503,0,1,e6317a3d02a192c10f37b8028a1025f7e876d341b9032ffb250619df7d81df4d,2024-09-18T15:35:10.277000
CVE-2024-42501,0,0,55667a47577b4f33bade3778f805c6b25ee72bbe08adc8c60302f0e4a051bbca,2024-09-18T15:35:05.747000
CVE-2024-42502,0,0,286a9e13771c1363a765da26fcc8ddd07276a18a92df69ef87a1dce41a5bad6c,2024-09-18T15:35:06.550000
CVE-2024-42503,0,0,e6317a3d02a192c10f37b8028a1025f7e876d341b9032ffb250619df7d81df4d,2024-09-18T15:35:10.277000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
@ -258651,9 +258653,9 @@ CVE-2024-42791,0,0,873fa7cb6896c8581c416ecabe3256bd4629f0e8a1bc57f85a270c46751d9
CVE-2024-42792,0,0,3d5171455e36c62db86c3f1d03eab38bfdac82c0ed4f595e590432a1180621b9,2024-09-05T18:35:24.220000
CVE-2024-42793,0,0,c34b0c01a33da3f3b96951729540996987faac6763a3b4211067000d740419d1,2024-08-30T15:56:51.510000
CVE-2024-42794,0,0,4471ffaa94a53e2c1d0bf1c485dce30ffce070e4aeb3674c8eb03f6213838ad4,2024-09-16T20:15:46.770000
CVE-2024-42795,0,0,8d41d5d69dadb883fa6e8ee8789613671c5e71d13695226dafbc334c122236f6,2024-09-16T20:15:46.830000
CVE-2024-42796,0,0,6ae6d20749a7a5a140772e646ff6b0393306bc0a7a63ded8e6162aa502c5b171,2024-09-16T20:15:46.890000
CVE-2024-42798,0,0,bb6fd3a17239923a3b1354b11e7bd8934e1dfed5fb6fb21be20a8115850331bd,2024-09-16T20:15:46.957000
CVE-2024-42795,0,1,1d997e9d14176ef254b42c361912cf5551190a9f849a5555e9c4177c4c0cc790,2024-09-18T16:35:09.097000
CVE-2024-42796,0,1,16f5cd05439d1b237921448aa907dc570179b25700b07d315993f5965c2c174a,2024-09-18T16:35:09.880000
CVE-2024-42798,0,1,768baaf558340f9c8a5ae318b32d8a63bdf51ca24716c46c177a94e6fed69da4,2024-09-18T16:35:10.637000
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000
@ -258767,8 +258769,8 @@ CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd07
CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000
CVE-2024-43113,0,0,7e6f0ba01b475bb6cfca73e8eda2423288e38b8146984d081803bef7596c3140,2024-08-29T16:51:33.367000
CVE-2024-43114,0,0,00a7e03d6d46ea413486af76a04e2163909eb9aea862c173dd501cac60ab9e3d,2024-09-11T19:11:11.257000
CVE-2024-43116,0,0,94cb738117c364125cdbbaaf42fcfa3d1fe11aaa7081e49de319178ad8cee60b,2024-08-27T13:02:05.683000
CVE-2024-43117,0,0,05a8c9c88ed7d8baa1ba7cda12219cce1f916317ccf5f0825de6fdf0716e21e8,2024-08-27T13:02:05.683000
CVE-2024-43116,0,1,cc0346e2fffb3d2e9e7819fd9105c9b799a7ef170e103991490ffc5ef5ca8367,2024-09-18T16:22:14.880000
CVE-2024-43117,0,1,745d28d8f65b32535ad91ee9bfd0009d1fb808a4a68c830aa6c4c6c97d69d777,2024-09-18T16:15:04.373000
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
CVE-2024-43121,0,0,884448e43dc9ae9d5a0252fdc685aaca71ba0c463694388bbaecb1cd420cb155,2024-08-13T12:58:25.437000
CVE-2024-43123,0,0,c02677ef8b7b9e2229cb24b37119fdc9650c80bd850d720e8d21ae9a3d07a645,2024-08-13T12:58:25.437000
@ -258834,7 +258836,7 @@ CVE-2024-43225,0,0,785bc4278a6946ee9d6c10021191a3cce1fc98e617438c82e5e4e3f2e0cd0
CVE-2024-43226,0,0,a338b4ee27e9fc08682f17c2b31584264a82f90f5a7fca9fd60ce6764ef33c2e,2024-08-13T12:58:25.437000
CVE-2024-43227,0,0,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000
CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000
CVE-2024-43230,0,0,28e16fe103499ce33c930eb9da10b803f85344eab6eada981abbfacdedf0e7a1,2024-08-27T13:01:52.723000
CVE-2024-43230,0,1,6e32073c9e6e9999512638555ce6fd7c64bd9478a9ea47e2925b530a1a97b393,2024-09-18T16:10:30.317000
CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000
CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
@ -258916,7 +258918,7 @@ CVE-2024-43322,0,0,e2ca647ab771c590c5e49dd4792b17cb2a82d2c1efaab05806782389dbebd
CVE-2024-43324,0,0,3fca11ef3a0d0aca94e1720b1500c02c9dcd66fee91e5ec95a4010a171418c83,2024-09-17T20:04:28.360000
CVE-2024-43325,0,0,c7e71f31efef4adfd7b652340fa8f95169ea702400525766f98d28f2dbed3aec,2024-09-12T21:28:20.137000
CVE-2024-43326,0,0,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000
CVE-2024-43327,0,0,acd099b8109083e63b5d816040ddc307da420ff33ea37d9f6c3f5b17cd1e029a,2024-08-19T12:59:59.177000
CVE-2024-43327,0,1,8c996e6da0b19402c98e43e1219ae705f2e7b89a77f2de30ee9e74c1e4aa4a90,2024-09-18T17:07:45.553000
CVE-2024-43328,0,0,45b76704130d3d162b10a10d0e1610ea82761ed70e22ff8c701dd47566965f65,2024-08-20T15:44:20.567000
CVE-2024-43329,0,0,2d889991c7054adfc3510a6f2a36341cd1187c790fca1d7653a4d88b7b6182fe,2024-09-17T19:59:39.933000
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
@ -259023,8 +259025,8 @@ CVE-2024-43476,0,0,91c0c8137c4b1b747f13b499f046afb02d7a7bef84fdde3fa148c5435a3aa
CVE-2024-43477,0,0,d50cbeb6e00e9871b6577501fc388e557638d61c564a40e04e41a194af066632,2024-09-10T18:15:13.970000
CVE-2024-43479,0,0,313bbcabdd9b44fdcc219a1bba9045a367d02f58a01b8953aabace95c227c905,2024-09-13T14:38:13.873000
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
CVE-2024-43482,0,1,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000
CVE-2024-43487,0,1,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000
CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000
CVE-2024-43487,0,0,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
CVE-2024-43491,0,0,66848b924ef1e3bbbd3e0b208cbe28d68dfcc77f6e79bf211914ea2a59716ae8,2024-09-12T01:00:01.133000
CVE-2024-43492,0,0,af0e73844988f19d42832ecb20006b5ce23817c5aa51bd592ac57ea711827c4a,2024-09-18T13:57:22.880000
@ -259070,7 +259072,7 @@ CVE-2024-43773,0,0,8c0c6d6cc6b93c34cfa09ef3705fb324f136fe885f1952674b354433c7d54
CVE-2024-43774,0,0,8a1a7395e0266f26fabce42b3d201bdd365872f3bb986b16a4813718545afbb5,2024-09-04T12:26:42.387000
CVE-2024-43775,0,0,386009b272e00dd7e320eaa82eec20a93bfce64d4bcdb8a26930d34c6fe0dc22,2024-09-04T12:27:22.670000
CVE-2024-43776,0,0,27e4419e8ce01901c27e76cb21d9618c21e34d6a14d012499c61adf6cf980a12,2024-09-04T12:27:40.113000
CVE-2024-43778,0,1,7561834736f08cf1293ccbd41f2cf3fda7ff5c7b5aaf1c8e3860ee5f6b05470f,2024-09-18T15:35:11.213000
CVE-2024-43778,0,0,7561834736f08cf1293ccbd41f2cf3fda7ff5c7b5aaf1c8e3860ee5f6b05470f,2024-09-18T15:35:11.213000
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000
CVE-2024-43781,0,0,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000
@ -259252,7 +259254,7 @@ CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26
CVE-2024-43964,0,0,a296e79bf666a02822318fa0afa97e1b25cabc20d3cd08936c2b6152e8d8f9a3,2024-09-03T18:30:23.437000
CVE-2024-43965,0,0,878d660798d5f5ce29d081268f89e41be6b018fcbed5e4625677b64fd6bbb9af,2024-09-04T16:02:57.427000
CVE-2024-43966,0,0,2901acb1eb63b7a55cb46d133ca8742f966f34bb1db4feb1259a3cd63030f204,2024-09-13T16:01:42.997000
CVE-2024-43967,0,0,058d81312da48659f7d07dbe37562102bf6a7259028130f2d17364cdc71b5244,2024-08-26T19:10:09.607000
CVE-2024-43967,0,1,efb5ab215f4087a53f8dcd252d52ef141005b5764a5e2b6c3ee9faa1675f0e1c,2024-09-18T17:00:57.497000
CVE-2024-43969,0,0,e26f311e05eb6990dcc6348fd6e980e4dcceb0042db2094a3923d85c868f6220,2024-09-17T23:15:18.253000
CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000
CVE-2024-43970,0,0,c88394c37ec2dcfe0730bc24e755f0a41287abbc542ba8a5971f52b1fece2bd4,2024-09-18T00:15:06.683000
@ -259320,11 +259322,11 @@ CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb99
CVE-2024-44095,0,0,e0006363027abcd9487b2555f5c10f6b2763af7e9102189a399193814a56d2b1,2024-09-18T13:34:31.617000
CVE-2024-44096,0,0,d8c4df36682fa8ff2c29981f1e88279da6a08cd48c4fd6b3719d80ee95e04fe2,2024-09-18T13:33:37.863000
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
CVE-2024-44103,0,0,403f28363473fe16513a32f4bbf3e3e9147062f1518a63808c0d4d4119c7e973,2024-09-11T16:26:11.920000
CVE-2024-44104,0,0,e8fd670a684426b8559a3a5d3eab3a06a900216e6d9ef789bdb8ae5bbf1f43cd,2024-09-11T16:26:11.920000
CVE-2024-44105,0,0,732efd8b7b918ab23d0e2a071a94c93fdba681f2365382a534af5bafc6e773f9,2024-09-11T16:26:11.920000
CVE-2024-44106,0,0,3c50b4b5c0e6d1f0435f895c3826f50e9a92d18d859ecefef1e7c93db6dccb98,2024-09-11T16:26:11.920000
CVE-2024-44107,0,0,644000594cec0b1adbbf9e9faad5bbcf891d9610a285582e61915e4d6806c350,2024-09-11T16:26:11.920000
CVE-2024-44103,0,1,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000
CVE-2024-44104,0,1,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000
CVE-2024-44105,0,1,6ace8c54c3fc6c9b1684fd8d42f178f1cce19bf6d08f58b02fdc3857633db641,2024-09-18T17:48:11.193000
CVE-2024-44106,0,1,e983d995182598f38184dac72eed7851e8d11230fc7bd4aeffd6778b0b4524e5,2024-09-18T17:50:40.660000
CVE-2024-44107,0,1,6f5162177bce60f39767687033803f63e81f183af4eb4e7c061e6f2de6ca1db7,2024-09-18T17:52:50.990000
CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000
CVE-2024-44112,0,0,0b8bf5761fae1061c83dd7332f5b3027481f791877934ad1d55322c5110d025b,2024-09-16T14:19:24.917000
CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000
@ -259446,7 +259448,7 @@ CVE-2024-4452,0,0,8393f4e948f53b2fbde25aaf7f55c55c1f0989c48fbd4a40cb4c1f768b7a8d
CVE-2024-4453,0,0,bc1bfc8908fbb505485206b11e5cc2278d2416192493c6c78b1ac2e39a46d4c3,2024-06-10T17:16:33.460000
CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88fa2,2024-05-24T01:15:30.977000
CVE-2024-44541,0,0,3a1e561d6510cb46fc3025d4e567327c4a8fc313204436661e66190b9e443f5d,2024-09-12T12:35:54.013000
CVE-2024-44542,1,1,f93229d37283118781232129d8f9c882e16cd0c21ad787838ba28665ebb68239,2024-09-18T15:15:16.137000
CVE-2024-44542,0,0,f93229d37283118781232129d8f9c882e16cd0c21ad787838ba28665ebb68239,2024-09-18T15:15:16.137000
CVE-2024-44549,0,0,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000
CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000
CVE-2024-44550,0,0,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000
@ -259679,7 +259681,7 @@ CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1
CVE-2024-45039,0,0,de4a003efa5d5cc4fff1702d34e9342efe96cd22e4f37086455d2a3139d95387,2024-09-06T16:46:26.830000
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
CVE-2024-45040,0,0,a463c1b68aa3e0a6cac5952f8376f49671ce87f0c4707125eaab268596a57de6,2024-09-06T16:46:26.830000
CVE-2024-45041,0,0,4d6fb0ce5785ad504b9620b1d4a73974bd0ebe4cf6991515fde24c1123f91bea,2024-09-09T18:30:12.050000
CVE-2024-45041,0,1,1e2da4c1302b38fb57fb38280037032da391876c3275a0d8eb8672700cab0b97,2024-09-18T17:31:53.903000
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
CVE-2024-45044,0,0,2ed42d19dae2f6825c5977ea48282a4184680e7c5fcc5191852ec831d989e86c,2024-09-10T15:50:47.237000
CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000
@ -259797,6 +259799,7 @@ CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834
CVE-2024-45294,0,0,571ccadaa63af3685b6ee82cf020ce004878004e5a04088787ea6924189ffc78,2024-09-06T17:15:16.977000
CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000
CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000
CVE-2024-45298,1,1,6778b5969d1a96041077fbe293ccb84a0a03abbad60216232d94385551983c96,2024-09-18T17:15:18.570000
CVE-2024-45299,0,0,1dc20bab2e5804f3b833440e86d8fa4e2d640a2a31779b302ea51c7be7ad4d71,2024-09-06T16:46:26.830000
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
CVE-2024-45300,0,0,371ea055cbd370f2315f57d501b2d8bde7fe9993dc271953659e5b000db99936,2024-09-06T16:46:26.830000
@ -259849,10 +259852,10 @@ CVE-2024-45409,0,0,e8a57f681223d5d4d86ed3700b6bbf47ebb91cc7ae4b5cd7db2b29b0bb144
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-45411,0,0,73f9cc9a45fb9019dfacefd1c32caeadc6f839e3ee71584e1458f0e26c536208,2024-09-10T12:09:50.377000
CVE-2024-45412,0,0,68bd5e75f1c3c7017abcc752fdd96b826ed1ef4251ed03428fdbd5051759e5da,2024-09-10T17:43:14.410000
CVE-2024-45413,0,0,ec02e46e9e7fd029707aa2a2bf4f3c28dd5fd70bed3505501350c9438fad6e58,2024-09-16T21:15:45.833000
CVE-2024-45414,0,0,a9f08eb10c4590024ebfde45cfdf2d42aead345785d68ee11ce8ca32cb324c57,2024-09-16T21:15:45.890000
CVE-2024-45415,0,0,78a82d63f13c77794c18e94aeb534cc6676f865ce6cd73bf302a9bb8065c6818,2024-09-16T21:15:45.943000
CVE-2024-45416,0,0,853a5d5c6bc98cf813ea817f38e987a82cef00775e62ddfd842c6fb99f24abe1,2024-09-16T21:15:46.003000
CVE-2024-45413,0,1,3cc285414744f60efccd03699e55ff34dac4157bc03bfc377bc6534ddca8a4f3,2024-09-18T16:35:11.470000
CVE-2024-45414,0,1,ea9e5d910110decb98e2bd5c89cc9f29dc679ec390f973c1296ad46e2bbe0d8f,2024-09-18T16:35:12.227000
CVE-2024-45415,0,1,a6fabe6bf38a72092e23cb8ceb357418f175cf0c07979f8a62bb321584367184,2024-09-18T16:35:12.983000
CVE-2024-45416,0,1,714211c19307b08eb58a343ae24c2a0b4c29773c82270b525ccb56dae3192098,2024-09-18T16:35:13.743000
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
CVE-2024-45429,0,0,cb79d4cb1119eef526a53ffe42933f2c5d8ecfb1b3eb67e65dd167ddf505fc2d,2024-09-13T20:48:05.387000
CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000
@ -259944,7 +259947,7 @@ CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2f
CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
CVE-2024-45679,0,0,a78fe9a0c393ad2299db108df7105d5af9c75d4303ab21775725a885720a997b,2024-09-18T04:15:42.080000
CVE-2024-45679,0,1,24fe5e8b07957bef72ba6b8d0da3520fbc3692507139f06d451cd33c077c5a94,2024-09-18T16:35:14.530000
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
CVE-2024-45682,0,0,0a3a96f00baaac84815943dcdccfa17287729c7fa491cf17cf5846701260505e,2024-09-17T18:15:04.893000
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
@ -259981,6 +259984,7 @@ CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
CVE-2024-45811,0,0,f0df0a439acb31f6186bb710f50e08de1db9507a40924c9c8e01331981994a78,2024-09-17T20:15:05.800000
CVE-2024-45812,0,0,5296a33ded9dac212f5f77eaf6bb8e39d45694864c0a4631f697e8131e868b30,2024-09-17T20:15:06.037000
CVE-2024-45813,1,1,0eadbef1de308ef8515c0af27022620f76b7b1a7b20031c5ee8c246824fc0e60,2024-09-18T17:15:19.163000
CVE-2024-45815,0,0,6121c6708e592c490155dce1fe575882728b0a6c1af42d4541c312ae5b01ce7e,2024-09-17T21:15:12.320000
CVE-2024-45816,0,0,bd13ff224f761096d12293be0d33d1aab90974326ea62d89cf84a16485cf8833,2024-09-17T21:15:12.553000
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
@ -260006,7 +260010,7 @@ CVE-2024-45854,0,0,5f2ec656fa84647920a6b33fa5c2d62d11148d85f4c62c01feffe9bb5b57c
CVE-2024-45855,0,0,b8b3a725ae8bf0f62655fdebc48ac0030507baf797da7b56c3156e7506de5acf,2024-09-16T18:03:27.970000
CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54103,2024-09-16T18:04:07.503000
CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000
CVE-2024-45858,1,1,26e716964960a7625743254ab836d7c358ad6927670be1bca3f8d6e0ddda0dbf,2024-09-18T15:15:16.333000
CVE-2024-45858,0,0,26e716964960a7625743254ab836d7c358ad6927670be1bca3f8d6e0ddda0dbf,2024-09-18T15:15:16.333000
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
@ -260036,6 +260040,7 @@ CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
CVE-2024-46085,0,0,4bcdae61af1b4709b2602a60bed18e8d14f66a9e47eac90a75adf8f8594192f4,2024-09-17T18:35:01.317000
CVE-2024-46086,1,1,4af7903ddb29d8d7dc2f9165fb1ab2e72953018208f733aa4da3b701e8170b77,2024-09-18T16:15:06.160000
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
CVE-2024-4611,0,0,51a3d5438728b832e97210e2f9860d8c98e7a9272bd8319e6cdccdf57653adc1,2024-05-29T13:02:09.280000
@ -260063,9 +260068,9 @@ CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef
CVE-2024-46362,0,0,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
CVE-2024-4638,0,0,a819fdfba96fa18a2f7909a394b6447b878ef2488f2357c7db7b0cfcaa9db703,2024-06-25T12:24:17.873000
CVE-2024-4639,0,1,d09b63781578ea43d80f90bc1869913d7850dd4433262c761e06a825045658ac,2024-09-18T15:46:04.960000
CVE-2024-4640,0,1,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
CVE-2024-4641,0,1,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000
CVE-2024-4639,0,0,d09b63781578ea43d80f90bc1869913d7850dd4433262c761e06a825045658ac,2024-09-18T15:46:04.960000
CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
CVE-2024-4641,0,0,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000
CVE-2024-46419,0,0,75fafdfe43d678734223982a9d05d92176b9e138ef313759af24f79de1b289e9,2024-09-17T14:35:29.797000
CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000
CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe250aa,2024-09-17T14:35:30.557000
@ -260083,43 +260088,43 @@ CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a5
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
CVE-2024-46550,1,1,aa050264d9c75e0eaf28944c9ca950f4fef57fa00bd271bdc9470a72e8d92779,2024-09-18T15:15:16.533000
CVE-2024-46551,1,1,fcc68f84a59b25c736446d685841bc48e7e1c08b935a05835a527ba9f0068aad,2024-09-18T15:15:16.590000
CVE-2024-46552,1,1,4ae72437d53be5c53f87fd86447519952146284f253b00894fe6f6ee36afc075,2024-09-18T15:15:16.650000
CVE-2024-46553,1,1,a24adcaea8735b1c5bc528a60e7f02527cf2400261bfc7352812b8f5da038499,2024-09-18T15:15:16.720000
CVE-2024-46554,1,1,ff9a9a690bae5595b61975c9783973f24a76e4da8d91f653300ef9eb17ec908e,2024-09-18T15:15:16.783000
CVE-2024-46555,1,1,b2f0f82493457739a95559ebe2860e9b0a286a704737f1c4920620f2f735b473,2024-09-18T15:15:16.837000
CVE-2024-46556,1,1,6f237c3dcfeb013f44fd59ac69b0ed4c776bc80c4979643671f66c59014ebb6d,2024-09-18T15:15:16.910000
CVE-2024-46557,1,1,e72d40316a8dd14fd51f98ff60889639ed433426e9340d188fd5b0b9f865e394,2024-09-18T15:15:16.983000
CVE-2024-46558,1,1,1e4b9db0244226da4b652846ba62e062409aaa4336ec7927d034ecfdab1d030e,2024-09-18T15:15:17.033000
CVE-2024-46559,1,1,66ba1cadc0fa9983f2e6258b53180181a5940d101a31445d7c6382c8089bd458,2024-09-18T15:15:17.097000
CVE-2024-46550,0,0,aa050264d9c75e0eaf28944c9ca950f4fef57fa00bd271bdc9470a72e8d92779,2024-09-18T15:15:16.533000
CVE-2024-46551,0,0,fcc68f84a59b25c736446d685841bc48e7e1c08b935a05835a527ba9f0068aad,2024-09-18T15:15:16.590000
CVE-2024-46552,0,0,4ae72437d53be5c53f87fd86447519952146284f253b00894fe6f6ee36afc075,2024-09-18T15:15:16.650000
CVE-2024-46553,0,0,a24adcaea8735b1c5bc528a60e7f02527cf2400261bfc7352812b8f5da038499,2024-09-18T15:15:16.720000
CVE-2024-46554,0,0,ff9a9a690bae5595b61975c9783973f24a76e4da8d91f653300ef9eb17ec908e,2024-09-18T15:15:16.783000
CVE-2024-46555,0,0,b2f0f82493457739a95559ebe2860e9b0a286a704737f1c4920620f2f735b473,2024-09-18T15:15:16.837000
CVE-2024-46556,0,0,6f237c3dcfeb013f44fd59ac69b0ed4c776bc80c4979643671f66c59014ebb6d,2024-09-18T15:15:16.910000
CVE-2024-46557,0,0,e72d40316a8dd14fd51f98ff60889639ed433426e9340d188fd5b0b9f865e394,2024-09-18T15:15:16.983000
CVE-2024-46558,0,0,1e4b9db0244226da4b652846ba62e062409aaa4336ec7927d034ecfdab1d030e,2024-09-18T15:15:17.033000
CVE-2024-46559,0,0,66ba1cadc0fa9983f2e6258b53180181a5940d101a31445d7c6382c8089bd458,2024-09-18T15:15:17.097000
CVE-2024-4656,0,0,32c9d7e0c2f1168ca7d7381e4fab827ca08fdbd964272924da1671d43db7cf43,2024-05-15T16:40:19.330000
CVE-2024-46560,1,1,37da0c86e41fc40c51a23b7f6a7b240acdf885adb21893ecaa6f897d1dd88785,2024-09-18T15:15:17.160000
CVE-2024-46561,1,1,827610d713c85938edcd0a672f3b80989b8c1603e1ec2096d515c8f1170c5ad3,2024-09-18T15:15:17.210000
CVE-2024-46564,1,1,9c53abc4290095ef9c94b8caa6151b1582d026c56de5ba2cd9b9332a36672a98,2024-09-18T15:15:17.263000
CVE-2024-46565,1,1,561c47320a036b7b30a61f0ef3bbd0d90faf83f4491fcff8c9e4f46a1e316d4b,2024-09-18T15:15:17.313000
CVE-2024-46566,1,1,15038b0259be6ed1c83206e5ca18daab2195f1035bd94d1c801bed7080ca14e0,2024-09-18T15:15:17.367000
CVE-2024-46567,1,1,44339a18e76c5d329445112c0f2a519b76b8cc97c1f690731297cc4f99a31fa1,2024-09-18T15:15:17.420000
CVE-2024-46568,1,1,05fa5319f0d6b7344bf7591c14d218b1e6beee6ec4ddb07a35b64cced2067e93,2024-09-18T15:15:17.480000
CVE-2024-46571,1,1,e147345ced5c037c296665623edee70a8ff952e5f4fcfef2bee5357d86b43a4b,2024-09-18T15:15:17.530000
CVE-2024-46580,1,1,8a7cc23843ab7532bc4e099084ca1b38d8dfcf5f163b1bb3e99eab8c8ac72ae9,2024-09-18T15:15:17.580000
CVE-2024-46581,1,1,1a036e61c05d9d99887e7d746c30ab4284053b1827b71ef577771edfcec73f46,2024-09-18T15:15:17.630000
CVE-2024-46582,1,1,6ee4cb064a18113fc6425d973eefd431c1555a88498d2efdabc5b4d31b23f054,2024-09-18T15:15:17.680000
CVE-2024-46583,1,1,508d7037cd9a3fa45380a1ca74eaea66ed78dc6a2a8be1ffd7894b484b48a76f,2024-09-18T15:15:17.723000
CVE-2024-46584,1,1,34fa714c00f27ad0f9a3f20e7b04852da2c076b04a454c4756d287d37e8e355b,2024-09-18T15:15:17.790000
CVE-2024-46585,1,1,ba843aa332ed1b6f4d5a208bd96955eb825f18ff133704cd63952e11387f48bc,2024-09-18T15:15:17.847000
CVE-2024-46586,1,1,08a48d19535eb5815c7ce6f65e01510f51e72c874c4516a2435fa8010ff5b366,2024-09-18T15:15:17.900000
CVE-2024-46588,1,1,ff98a8a93245f9c4378c483d60cd2119fb71c96600bf3b5852f0b765014eb8fd,2024-09-18T15:15:17.957000
CVE-2024-46589,1,1,2ccd47f6dde4cb9bd5a952c0acce27bec1df77ff8e3ebd0de81f26c955d68dd3,2024-09-18T15:15:18.007000
CVE-2024-46590,1,1,3c98dd0cb0cdc1588f2b8481c088df10a5bb6b24dfe436e35ed185ca33e9d88b,2024-09-18T15:15:18.067000
CVE-2024-46591,1,1,7ff9db331a08522ac36f6b43693e46370b7012e0693f21c83b5069be6ac29210,2024-09-18T15:15:18.117000
CVE-2024-46592,1,1,e65fbc2fdacf3a4508ae490381ebfac511e16cad69e7ab7fe064e842b3950547,2024-09-18T15:15:18.170000
CVE-2024-46593,1,1,6cb9d636a3fe6e5a69f34f615afd793e995b7794da720f7ed13ee9358943e1d7,2024-09-18T15:15:18.220000
CVE-2024-46594,1,1,1427e388d15f33e0b70e916c025c4e148e9ed15a1c578a27a75c8212070e236a,2024-09-18T15:15:18.263000
CVE-2024-46595,1,1,c899a8cf55794b9fcb48be5696c7fdeeb5e92162dce0b2bdbbfc91e998231fe2,2024-09-18T15:15:18.307000
CVE-2024-46596,1,1,e16790bb87529e3fa3cb3cf96e2e3f0675ec1ed29d7419b87fded006ce573939,2024-09-18T15:15:18.353000
CVE-2024-46597,1,1,3b9086fd52147db347360741cdd07d08edd41d7cfccca81420fdb015dad854f8,2024-09-18T15:15:18.400000
CVE-2024-46598,1,1,b528b31684949ece420878ed09068cc05a18e9683ebc282b3aff4d118a5ba696,2024-09-18T15:15:18.453000
CVE-2024-46560,0,0,37da0c86e41fc40c51a23b7f6a7b240acdf885adb21893ecaa6f897d1dd88785,2024-09-18T15:15:17.160000
CVE-2024-46561,0,0,827610d713c85938edcd0a672f3b80989b8c1603e1ec2096d515c8f1170c5ad3,2024-09-18T15:15:17.210000
CVE-2024-46564,0,0,9c53abc4290095ef9c94b8caa6151b1582d026c56de5ba2cd9b9332a36672a98,2024-09-18T15:15:17.263000
CVE-2024-46565,0,0,561c47320a036b7b30a61f0ef3bbd0d90faf83f4491fcff8c9e4f46a1e316d4b,2024-09-18T15:15:17.313000
CVE-2024-46566,0,0,15038b0259be6ed1c83206e5ca18daab2195f1035bd94d1c801bed7080ca14e0,2024-09-18T15:15:17.367000
CVE-2024-46567,0,0,44339a18e76c5d329445112c0f2a519b76b8cc97c1f690731297cc4f99a31fa1,2024-09-18T15:15:17.420000
CVE-2024-46568,0,0,05fa5319f0d6b7344bf7591c14d218b1e6beee6ec4ddb07a35b64cced2067e93,2024-09-18T15:15:17.480000
CVE-2024-46571,0,0,e147345ced5c037c296665623edee70a8ff952e5f4fcfef2bee5357d86b43a4b,2024-09-18T15:15:17.530000
CVE-2024-46580,0,0,8a7cc23843ab7532bc4e099084ca1b38d8dfcf5f163b1bb3e99eab8c8ac72ae9,2024-09-18T15:15:17.580000
CVE-2024-46581,0,0,1a036e61c05d9d99887e7d746c30ab4284053b1827b71ef577771edfcec73f46,2024-09-18T15:15:17.630000
CVE-2024-46582,0,0,6ee4cb064a18113fc6425d973eefd431c1555a88498d2efdabc5b4d31b23f054,2024-09-18T15:15:17.680000
CVE-2024-46583,0,0,508d7037cd9a3fa45380a1ca74eaea66ed78dc6a2a8be1ffd7894b484b48a76f,2024-09-18T15:15:17.723000
CVE-2024-46584,0,0,34fa714c00f27ad0f9a3f20e7b04852da2c076b04a454c4756d287d37e8e355b,2024-09-18T15:15:17.790000
CVE-2024-46585,0,0,ba843aa332ed1b6f4d5a208bd96955eb825f18ff133704cd63952e11387f48bc,2024-09-18T15:15:17.847000
CVE-2024-46586,0,0,08a48d19535eb5815c7ce6f65e01510f51e72c874c4516a2435fa8010ff5b366,2024-09-18T15:15:17.900000
CVE-2024-46588,0,0,ff98a8a93245f9c4378c483d60cd2119fb71c96600bf3b5852f0b765014eb8fd,2024-09-18T15:15:17.957000
CVE-2024-46589,0,0,2ccd47f6dde4cb9bd5a952c0acce27bec1df77ff8e3ebd0de81f26c955d68dd3,2024-09-18T15:15:18.007000
CVE-2024-46590,0,0,3c98dd0cb0cdc1588f2b8481c088df10a5bb6b24dfe436e35ed185ca33e9d88b,2024-09-18T15:15:18.067000
CVE-2024-46591,0,0,7ff9db331a08522ac36f6b43693e46370b7012e0693f21c83b5069be6ac29210,2024-09-18T15:15:18.117000
CVE-2024-46592,0,0,e65fbc2fdacf3a4508ae490381ebfac511e16cad69e7ab7fe064e842b3950547,2024-09-18T15:15:18.170000
CVE-2024-46593,0,0,6cb9d636a3fe6e5a69f34f615afd793e995b7794da720f7ed13ee9358943e1d7,2024-09-18T15:15:18.220000
CVE-2024-46594,0,0,1427e388d15f33e0b70e916c025c4e148e9ed15a1c578a27a75c8212070e236a,2024-09-18T15:15:18.263000
CVE-2024-46595,0,0,c899a8cf55794b9fcb48be5696c7fdeeb5e92162dce0b2bdbbfc91e998231fe2,2024-09-18T15:15:18.307000
CVE-2024-46596,0,0,e16790bb87529e3fa3cb3cf96e2e3f0675ec1ed29d7419b87fded006ce573939,2024-09-18T15:15:18.353000
CVE-2024-46597,0,0,3b9086fd52147db347360741cdd07d08edd41d7cfccca81420fdb015dad854f8,2024-09-18T15:15:18.400000
CVE-2024-46598,0,0,b528b31684949ece420878ed09068cc05a18e9683ebc282b3aff4d118a5ba696,2024-09-18T15:15:18.453000
CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000
CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
@ -260294,8 +260299,9 @@ CVE-2024-46976,0,0,f3786e54e8d51b8dd39dbbbd9771974fd9112681cfc7638f96badfdf4c35d
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
CVE-2024-46982,0,0,ea2fe597553d263f2cd1280d984988f3dd8bd84e5f24bd16a84753abcca26655,2024-09-17T22:15:02.273000
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
CVE-2024-46990,1,1,0086cd506cde60b64c95cfd59e3cef371a66ac89f344398a809e570bfb502034,2024-09-18T17:15:19.687000
CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000
CVE-2024-47001,0,0,094e9aa8d79eefa5514e8d3a7817f886863a81c7b672996006f51769cece0126,2024-09-18T07:15:04.220000
CVE-2024-47001,0,1,83229a19d20eee81e566ef79ab83e90e0827d76bd000b5c84838a15b7c996890,2024-09-18T16:35:16.540000
CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000
CVE-2024-4702,0,0,dd020b59844aa3c2b904a852a1e5f578b8784127317756ef97f595c083848ea0,2024-05-15T16:40:19.330000
CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000
@ -261169,7 +261175,7 @@ CVE-2024-5678,0,0,afe74031d89f42a567cee8ccb637e89bb2adfa159544a8b4a6426bad0bf894
CVE-2024-5679,0,0,0839965cde25fea3aa350fa717eb81302bb5423efd743b60fd44dbd620732a01,2024-07-12T16:38:44.027000
CVE-2024-5680,0,0,4b89f5f26e3b07478091cc4705b6bf03eb5b6d7ef8a454176f219f6262119e02,2024-07-12T16:38:49.670000
CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a4020575,2024-07-12T16:37:40.303000
CVE-2024-5682,0,1,969b6f3cda4ea4b8882cd9ee8eb2594b87a5596afb164c53f79c5e3a897da379,2024-09-18T14:35:06.033000
CVE-2024-5682,0,0,969b6f3cda4ea4b8882cd9ee8eb2594b87a5596afb164c53f79c5e3a897da379,2024-09-18T14:35:06.033000
CVE-2024-5683,0,0,d868b38bbdf38c932e73ada9d6770c9e54d9ba7e4690e6e76a9813e02684500a,2024-06-24T12:57:36.513000
CVE-2024-5684,0,0,6dc10e55a9350eba996ce70432d644a2a60e5231b687551b107b8ab41fb44f1c,2024-06-11T18:13:30.163000
CVE-2024-5685,0,0,08c398f5d772f4e953acbb7297cc0e7eb76495399d04b916942753d822d0eb8a,2024-06-19T09:15:12.173000
@ -261399,9 +261405,9 @@ CVE-2024-5952,0,0,4b0244413edcc544ed5c05479b5dbc3eeb5d75652ce440b39e8ad3eb0aaa28
CVE-2024-5953,0,0,0b3a2e806b18666b2c6a15758894da60b95802ead709b5c7200c052eff2cbfed,2024-09-11T11:15:11.350000
CVE-2024-5956,0,0,420ebddf13dc6945f3b24acaba57b0a6b03370d22cfc4e076d52d9e45c18f699,2024-09-06T16:25:19.253000
CVE-2024-5957,0,0,c06bad62b3a76beb3abdcaffc89e2e904ca620c6e7deccb3fcebfda71eaf22f8,2024-09-06T16:24:23.317000
CVE-2024-5958,1,1,eb1f208f756febdf31da5f71c45b0e34465f30babc97c88a7e7c51e662e6457d,2024-09-18T15:15:18.510000
CVE-2024-5959,1,1,95bf313e7e72966f30a3e12fd340025779a485583f7f275e9527de048f4965de,2024-09-18T15:15:18.623000
CVE-2024-5960,1,1,3c93a6aa2927884a82438d1c0ef1d4ab36a1bcd826d98efeecd74446d52f871f,2024-09-18T15:15:18.740000
CVE-2024-5958,0,0,eb1f208f756febdf31da5f71c45b0e34465f30babc97c88a7e7c51e662e6457d,2024-09-18T15:15:18.510000
CVE-2024-5959,0,0,95bf313e7e72966f30a3e12fd340025779a485583f7f275e9527de048f4965de,2024-09-18T15:15:18.623000
CVE-2024-5960,0,0,3c93a6aa2927884a82438d1c0ef1d4ab36a1bcd826d98efeecd74446d52f871f,2024-09-18T15:15:18.740000
CVE-2024-5961,0,0,458be8cb6fdb0d558a4d51d11b5f294250dd9695661afd805b88290bb2df249d,2024-06-17T12:42:04.623000
CVE-2024-5963,0,0,a4cccf44b2eb0314cba658473713210aafeaf2066181b69f96f839930da4f321,2024-08-06T16:30:24.547000
CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71e9,2024-07-18T12:28:43.707000
@ -262137,8 +262143,8 @@ CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
CVE-2024-6874,0,0,805a0b27cbdf811d96209b292e2d5909e967f9d3161226db1f6fe45d6b995555,2024-09-10T15:27:04.190000
CVE-2024-6876,0,0,743577dc92893ad331003e5e7d748a3bee9fa96e904d71b602ea86d0aeed6917,2024-09-10T17:43:14.410000
CVE-2024-6877,1,1,c778de9272c5a8813b8beccd6fc852d9bef42e13437f5fac87efcad188a03490,2024-09-18T15:15:18.860000
CVE-2024-6878,1,1,db12157b937b7fc348973352c9cf8dbecbecf18ce1feaf5ec1dfd1582a4ca22f,2024-09-18T15:15:18.970000
CVE-2024-6877,0,0,c778de9272c5a8813b8beccd6fc852d9bef42e13437f5fac87efcad188a03490,2024-09-18T15:15:18.860000
CVE-2024-6878,0,0,db12157b937b7fc348973352c9cf8dbecbecf18ce1feaf5ec1dfd1582a4ca22f,2024-09-18T15:15:18.970000
CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000
CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000
CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000
@ -262964,7 +262970,7 @@ CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba966
CVE-2024-8006,0,0,092177f7b5a6e786b0c334d1c1238c9acce1b59320806ff7e04615edaed13d55,2024-09-03T12:59:02.453000
CVE-2024-8007,0,0,d4843ecbff9c18b0a3733961009c3b0a5fd18a5329783b13479a12d64d8f35f3,2024-09-18T08:15:06.990000
CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000
CVE-2024-8012,0,0,077057538036fd2de7e2ef46ba096dfeb2616c8d077a9c28a57acea505ab6056,2024-09-11T16:26:11.920000
CVE-2024-8012,0,1,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000
CVE-2024-8016,0,0,2657510d64afe84d5852969b1e9344475f01e752907a5430dff930bc1f486129,2024-09-03T14:51:16.470000
CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000
CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000
@ -263037,8 +263043,8 @@ CVE-2024-8139,0,0,30a28567f99fee6c1c6f825267497f95b5b28ab0436eee99757c8433aaff2e
CVE-2024-8140,0,0,5905102d90fa9e01c1c294a1e12efca1eb0a1890a608c263dfef788228e71855,2024-08-26T19:09:52.653000
CVE-2024-8141,0,0,d494eb4aa5e779d518a311786c18c827e0ced59860399587e09c025afdbaf176,2024-08-26T19:09:16.763000
CVE-2024-8142,0,0,d4b24d12d326b40d1c063c9a3edca906c8e404b0436fcc16715466b79bbf260c,2024-08-26T19:08:38.493000
CVE-2024-8144,0,1,b4ff9146db613e3c52e5250545428280bf39cf0da8707bed207da37f08dd2db5,2024-09-18T15:31:17.277000
CVE-2024-8145,0,1,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000
CVE-2024-8144,0,0,b4ff9146db613e3c52e5250545428280bf39cf0da8707bed207da37f08dd2db5,2024-09-18T15:31:17.277000
CVE-2024-8145,0,0,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000
CVE-2024-8146,0,0,502bd763591d1b91f8fa47be050033990936c92c3733fdcfd7eebfdf8d4cb42d,2024-08-26T12:47:20.187000
CVE-2024-8147,0,0,ec07f8c3276e9a222de07865fca93dea2ccb4507aaa042530afe8cfe5642dbe8,2024-09-11T18:37:20.670000
CVE-2024-8150,0,0,ec5d1f8699fbdf60c07977f622d12947268f6e6a471ea831b69250e74a2f851f,2024-09-12T21:01:57.790000
@ -263103,7 +263109,7 @@ CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff52
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000
CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000
CVE-2024-8242,0,1,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
CVE-2024-8246,0,0,a0ea161f5af79b55120d32f423f12e116b18daee2ae5761519d4b26baee6c795,2024-09-14T11:47:14.677000
CVE-2024-8247,0,0,36bcccbd4379b767a875eb8f1ec2f968d10cef13982c1f246ceec18e09fed9fa,2024-09-06T12:08:04.550000
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
@ -263113,7 +263119,7 @@ CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d
CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000
CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000
CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
CVE-2024-8269,0,1,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
CVE-2024-8271,0,0,3562c0d9d060a8b2f43387dce3941b2ee080bc34564191358e2afbabb30a0397,2024-09-14T11:47:14.677000
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000
@ -263274,7 +263280,7 @@ CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b3
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
CVE-2024-8610,0,0,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000
CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000
CVE-2024-8611,0,1,3d63bb09edc11ef6327fe857dfe381551fd3ed233dd119eaa741dce3b9b25e8e,2024-09-18T17:24:34.163000
CVE-2024-8622,0,0,8c0d8566c114d14578f376fb46a83dd09ecfc9aef59b4f73eead49a6f9d03ae6,2024-09-12T12:35:54.013000
CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000
CVE-2024-8635,0,0,7a33169aa1c56166fecdf7f4d906662353a5e22f1362c34800f026c91df08470,2024-09-14T15:24:45.657000
@ -263359,12 +263365,12 @@ CVE-2024-8887,0,0,3a4ee8c7c72402467690a1d5baf4ee46122c1a9bd1979c36a47f557846bba5
CVE-2024-8888,0,0,1e74f6eae96ea2bc3e4d1e807f25808d32b7d4278014e4cabc70fec925ff3214,2024-09-18T12:15:03.520000
CVE-2024-8889,0,0,d14885671be48487e73dc26a56497c68dd08124696a268e049900425bd24a291,2024-09-18T12:15:03.710000
CVE-2024-8890,0,0,855b827c685ae1eb47e1ce00665defd0cd149a05c8eda3283f4806fe62a00f74,2024-09-18T13:15:03.620000
CVE-2024-8891,1,1,66ee1e3a5770b3f6e09e8b032a6124a31192085197984368a464d9541bf3af69,2024-09-18T14:15:20.187000
CVE-2024-8891,0,0,66ee1e3a5770b3f6e09e8b032a6124a31192085197984368a464d9541bf3af69,2024-09-18T14:15:20.187000
CVE-2024-8892,0,0,b8b5b660b06202667c5cd07cec126cd880bab05613441d7293a44f11f3e1c023,2024-09-18T13:15:03.907000
CVE-2024-8897,0,0,b99b42e128a3a937599a5ee8c7a3b275ca81dee2198a043376f3ec3c0daeea34,2024-09-17T13:15:04.423000
CVE-2024-8900,0,0,f58f5185481b4f9d895145fbfe2d15f4fe9fa908c07bf76713d81ef85bc63469,2024-09-17T19:15:29.163000
CVE-2024-8904,0,0,ce74e59d7cc6aefa4bdd9474354070b40a396e35a6b9e3e411821983b2305342,2024-09-17T21:15:12.980000
CVE-2024-8905,0,0,42232b47781127da504ce11f730ec8a0335185eb290dfa96eacff6a9acc97c02,2024-09-17T21:15:13.080000
CVE-2024-8904,0,1,154b42e06b3eec9dd6263288069b5cac3c6ac5013e0c0ce81a0319625e4f3176,2024-09-18T16:35:17.877000
CVE-2024-8905,0,1,f4bcda9cc4c1bd1ffbda7130fd2d6fba2d07ae19df57b92968e0e6b8f6a2196a,2024-09-18T16:35:18.640000
CVE-2024-8906,0,0,a825cb604140b0e13ad78ca82d1d231a96e53bbe511215a792b4240c110540db,2024-09-17T21:15:13.140000
CVE-2024-8907,0,0,64dc4dc8a4d40c7e225809d67f10cc92608ae63c53341c28f0018040d67ff7cd,2024-09-17T21:15:13.193000
CVE-2024-8908,0,0,5ad2b20eaf7b11cce42e37ec1af63dc38b712b10d9cb0d1e4c7b4750e472beb6,2024-09-17T21:15:13.247000

Can't render this file because it is too large.