diff --git a/CVE-2019/CVE-2019-197xx/CVE-2019-19755.json b/CVE-2019/CVE-2019-197xx/CVE-2019-19755.json index b9dc3ec817b..4cccc9629d1 100644 --- a/CVE-2019/CVE-2019-197xx/CVE-2019-19755.json +++ b/CVE-2019/CVE-2019-197xx/CVE-2019-19755.json @@ -2,7 +2,7 @@ "id": "CVE-2019-19755", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.557", - "lastModified": "2024-08-15T19:35:01.400", + "lastModified": "2024-10-25T20:35:00.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-300" + "value": "CWE-639" } ] } diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json index bb95a5c0d3f..a72a83198d4 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30357.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30357", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:03.450", - "lastModified": "2024-10-25T17:15:03.450", + "lastModified": "2024-10-25T20:35:01.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30357", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json index b51e79b5abe..7c98b3b6233 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48684.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48684", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-27T23:15:06.110", - "lastModified": "2024-07-03T01:39:07.940", + "lastModified": "2024-10-25T20:35:02.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -44,10 +44,6 @@ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ - { - "lang": "en", - "value": "CWE-1336" - }, { "lang": "en", "value": "CWE-78" diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48946.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48946.json index fca603b74f8..fa8677b2247 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48946.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48946.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48946", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.020", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:13:39.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,175 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: Se corrige el descarte de preasignaci\u00f3n en el l\u00edmite de extensi\u00f3n indirecta. Cuando la extensi\u00f3n de preasignaci\u00f3n es la primera en el bloque de extensi\u00f3n, el c\u00f3digo corromper\u00eda el encabezado del \u00e1rbol de extensi\u00f3n. Corrija el problema y use udf_delete_aext() para eliminar la extensi\u00f3n y evitar la duplicaci\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.337", + "matchCriteriaId": "9FFBA9B5-26DC-4802-9A86-F7B886954E4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.303", + "matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.270", + "matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.229", + "matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.161", + "matchCriteriaId": "6CD83369-DB79-46EF-B731-E327A63A4E1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.85", + "matchCriteriaId": "E0D49B1E-E996-4A13-9C5C-23C64BBD0E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.15", + "matchCriteriaId": "3E66ABBB-C60E-481F-88C6-ED81661DFC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB047947-8B25-46FD-8AEA-A916F4A3DC71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DFB454D-4F85-4BE2-8CC9-70245EAE4D31" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/12a88f572d6d94b5c0b72e2d1782cc2e96ac06cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a075f4a549481ce6e8518d8379f193ccec6b746", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d835efd561dfb9bf5409f11f4ecd428d5d29226", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/63dbbd8f1499b0a161e701a04aa50148d60bd1f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72f651c96c8aadf087fd782d551bf7db648a8c2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7665857f88557c372da35534165721156756f77f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae56d9a017724f130cf1a263dd82a78d2a6e3852", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8b6fa4511a7900db9fb0353b630d4d2ed1ba99c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfe4c1b25dd6d2f056afc00b7c98bcb3dd0b1fc3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48947.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48947.json index 2e10e5442ac..d825dcc2550 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48947.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48947.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48947", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.150", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:11:45.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,198 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: L2CAP: Corregir desbordamiento de u8 Al seguir enviando paquetes L2CAP_CONF_REQ, chan->num_conf_rsp aumenta varias veces y eventualmente alcanzar\u00e1 el n\u00famero m\u00e1ximo (es decir, 255). Este parche evita esto a\u00f1adiendo una comprobaci\u00f3n de los l\u00edmites con L2CAP_MAX_CONF_RSP Btmon log: Bluetooth monitor ver 5.64 = Nota: Linux versi\u00f3n 6.1.0-rc2 (x86_64) 0.264594 = Nota: Subsistema Bluetooth versi\u00f3n 2.22 0.264636 @ MGMT Open: btmon (privilegiado) versi\u00f3n 1.22 {0x0001} 0.272191 = Nuevo \u00edndice: 00:00:00:00:00:00 (Principal,Virtual,hci0) [hci0] 13.877604 @ RAW Open: 9496 (privilegiado) versi\u00f3n 2.22 {0x0002} 13.890741 = Abierto \u00cdndice: 00:00:00:00:00:00 [hci0] 13.900426 (...) > ACL Data RX: Manejar 200 indicadores 0x00 dlen 1033 #32 [hci0] 14.273106 tama\u00f1o de paquete no v\u00e1lido (12 != 1033) 08 00 01 00 02 01 04 00 01 10 ff ff ............ > ACL Data RX: Manejar 200 indicadores 0x00 dlen 1547 #33 [hci0] 14.273561 tama\u00f1o de paquete no v\u00e1lido (14 != 1547) 0a 00 01 00 04 01 06 00 40 00 00 00 00 00 ........@..... > ACL Data RX: Manejar 200 indicadores 0x00 dlen 2061 #34 [hci0] 14.274390 tama\u00f1o de paquete no v\u00e1lido (16 != 2061) 0c 00 01 00 04 01 08 00 40 00 00 00 00 00 00 04 ........@....... > ACL Data RX: Manejar 200 indicadores 0x00 dlen 2061 #35 [hci0] 14.274932 tama\u00f1o de paquete no v\u00e1lido (16 != 2061) 0c 00 01 00 04 01 08 00 40 00 00 00 07 00 03 00 ........@....... = bluetoothd: Daemon Bluetooth 5.43 14.401828 > ACL Data RX: Manejar 200 indicadores 0x00 dlen 1033 #36 [hci0] 14.275753 tama\u00f1o de paquete no v\u00e1lido (12 != 1033) 08 00 01 00 04 01 04 00 40 00 00 00 ........@..." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.337", + "matchCriteriaId": "9FFBA9B5-26DC-4802-9A86-F7B886954E4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.303", + "matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.270", + "matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.229", + "matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.161", + "matchCriteriaId": "6CD83369-DB79-46EF-B731-E327A63A4E1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.85", + "matchCriteriaId": "E0D49B1E-E996-4A13-9C5C-23C64BBD0E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.15", + "matchCriteriaId": "3E66ABBB-C60E-481F-88C6-ED81661DFC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19a78143961a197de8502f4f29c453b913dc3c29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/49d5867819ab7c744852b45509e8469839c07e0e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5550bbf709c323194881737fd290c4bada9e6ead", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95f1847a361c7b4bf7d74c06ecb6968455082c1a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9fdc79b571434af7bc742da40a3405f038b637a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad528fde0702903208d0a79d88d5a42ae3fc235b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcd70260ef56e0aee8a4fc6cd214a419900b0765", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f3fe6817156a2ad4b06f01afab04638a34d7c9a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48950.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48950.json index 5d92bb7f7df..f6415c508c7 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48950.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48950.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48950", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.440", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:02:03.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,128 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf: Fix perf_pending_task() UaF Por syzbot es posible que perf_pending_task() se ejecute despu\u00e9s de que el evento sea free(). Hay dos casos relacionados pero distintos: - el task_work ya estaba en cola antes de destruir el evento; - destruir el evento en s\u00ed mismo pone en cola el task_work. El primero no se puede resolver usando task_work_cancel() ya que perf_release() en s\u00ed mismo podr\u00eda ser llamado desde un task_work (____fput), lo que significa que la lista current->task_works ya est\u00e1 vac\u00eda y task_work_cancel() no podr\u00e1 encontrar la entrada perf_pending_task(). La alternativa m\u00e1s simple es extender la duraci\u00f3n de perf_event para cubrir el task_work. El segundo es simplemente una tonter\u00eda, poner en cola una tarea_trabajo mientras sabes que el evento va a desaparecer no tiene sentido y se evita f\u00e1cilmente reorganizando c\u00f3mo se marca el evento como STATE_DEAD y asegur\u00e1ndose de que pase por STATE_OFF en el camino hacia abajo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.84", + "matchCriteriaId": "8F012D68-F8BC-4FEE-9203-10B77967371C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.14", + "matchCriteriaId": "8761B6C5-F658-46D1-92B8-4ED28F931D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/517e6a301f34613bff24a8e35b5455884f2d83d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78e1317a174edbfd1182599bf76c092a2877672c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8bffa95ac19ff27c8261904f89d36c7fcf215d59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48951.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48951.json index 5f0020824e1..6a2b1d5cfa6 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48951.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48951.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48951", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.530", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:01:24.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,198 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: ops: Verificar l\u00edmites para el segundo canal en snd_soc_put_volsw_sx() Las comprobaciones de los l\u00edmites en snd_soc_put_volsw_sx() solo se aplican al primer canal, lo que significa que es posible escribir valores fuera de los l\u00edmites en el segundo canal en controles est\u00e9reo. Agregue las comprobaciones adecuadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.337", + "matchCriteriaId": "9FFBA9B5-26DC-4802-9A86-F7B886954E4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.303", + "matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.270", + "matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.228", + "matchCriteriaId": "B4C9B19E-CA7E-4B02-ADDD-4D572867804E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.160", + "matchCriteriaId": "C4AE0903-0CA6-451B-AA7C-0F4B588FFB8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.84", + "matchCriteriaId": "1926D676-6FAF-4772-8DD6-796AFC3FC120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.14", + "matchCriteriaId": "8761B6C5-F658-46D1-92B8-4ED28F931D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1798b62d642e7b3d4ea3403914c3caf4e438465d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/18a168d85eadcfd45f015b5ecd2a97801b959e43", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/50b5f6d4d9d2d69a7498c44fd8b26e13d73d3d98", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/56288987843c3cb343e81e5fa51549cbaf541bd0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9796d07c753164b7e6b0d7ef23fb4482840a9ef8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97eea946b93961fffd29448dcda7398d0d51c4b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf1c225f1927891ae388562b78ced7840c3723b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf611d786796ec33da09d8c83d7d7f4e557b27de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48952.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48952.json index 3af39d3d27c..998f4e8ae9e 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48952.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48952.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48952", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.617", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:09:39.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,106 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: mt7621: Agregar centinela a la tabla de peculiaridades Al controlador actual le falta un centinela en la matriz struct soc_device_attribute, lo que provoca un error cuando se eval\u00faa mediante la llamada soc_device_match(mt7621_pcie_quirks_match). Esto solo se expuso una vez que se arregl\u00f3 CONFIG_SOC_MT7621 mt7621 soc_dev_attr para registrar el SOC como un dispositivo, en: commit 7c18b64bba3b (\"mips: ralink: mt7621: no use kzalloc demasiado pronto\") Arr\u00e9glelo agregando el centinela requerido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.17", + "versionEndExcluding": "5.15.86", + "matchCriteriaId": "2C490AF3-5FE0-4883-A850-AB2007E13585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.15", + "matchCriteriaId": "3E66ABBB-C60E-481F-88C6-ED81661DFC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB047947-8B25-46FD-8AEA-A916F4A3DC71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DFB454D-4F85-4BE2-8CC9-70245EAE4D31" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19098934f910b4d47cb30251dd39ffa57bef9523", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e9c395ef2d52975b2c2894d2da09d6db2958bc6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4997bae1b5b012c8a6e2643e26578a7bc2cae36", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb7323ece786f243f6d6ccf2e5b2b27b736bdc04", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48953.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48953.json index d46e42060ff..0f6c438b453 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48953.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48953.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48953", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.700", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:07:48.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,143 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtc: cmos: Fix event handler registration ordering issue Debido a que acpi_install_fixed_event_handler() habilita el evento autom\u00e1ticamente en caso de \u00e9xito, es incorrecto llamarlo antes de que la rutina del controlador que se le pasa est\u00e9 lista para manejar eventos. Desafortunadamente, el controlador rtc-cmos hace exactamente lo incorrecto al llamar a cmos_wake_setup(), que pasa rtc_handler() a acpi_install_fixed_event_handler(), antes de cmos_do_probe(), porque rtc_handler() usa dev_get_drvdata() para llegar al puntero del objeto cmos y el puntero de datos del controlador solo se completa en cmos_do_probe(). Esto conduce a una desreferencia de puntero NULL en rtc_handler() en el arranque si el evento RTC fixed est\u00e1 activo en el momento de inicializaci\u00f3n. Para solucionar este problema, cambie el orden de inicializaci\u00f3n del controlador de modo que cmos_wake_setup() siempre se llame despu\u00e9s de una llamada a cmos_do_probe() exitosa. Mientras tanto, cambie cmos_pnp_probe() para llamar a cmos_do_probe() despu\u00e9s de la declaraci\u00f3n if () inicial utilizada para calcular el argumento IRQ que se pasar\u00e1 a cmos_do_probe(), lo que es m\u00e1s limpio que llamarlo en cada rama de ese if () (la variable local \"irq\" puede ser de tipo int, porque se pasa a esa funci\u00f3n como un argumento de tipo int). Tenga en cuenta que el commit 6492fed7d8c9 (\"rtc: rtc-cmos: No marque ACPI_FADT_LOW_POWER_S0\") provoc\u00f3 que este problema afectara a una mayor cantidad de sistemas, porque anteriormente solo afectaba a los sistemas con ACPI_FADT_LOW_POWER_S0 configurado, pero est\u00e1 presente independientemente de esa confirmaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.28", + "versionEndExcluding": "5.10.163", + "matchCriteriaId": "D2853A0C-C4B1-4484-864A-7B42421570AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.86", + "matchCriteriaId": "47237296-55D1-4ED4-8075-D00FC85A61EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.14", + "matchCriteriaId": "8761B6C5-F658-46D1-92B8-4ED28F931D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0bcfccb48696aba475f046c2021f0733659ce0ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ba745fce13d19775100eece30b0bfb8b8b10ea6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4919d3eb2ec0ee364f7e3cf2d99646c1b224fae8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/60c6e563a843032cf6ff84b2fb732cd8754fc10d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48965.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48965.json index 28fef1e5563..0af3e8602e2 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48965.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48965.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48965", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:08.470", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:06:45.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,129 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio/rockchip: se corrige la p\u00e9rdida de recuento de referencias en rockchip_gpiolib_register(). El nodo devuelto por of_get_parent() con el recuento de referencias incrementado, se debe llamar a of_node_put() cuando se termina de usarlo. Por lo tanto, agr\u00e9guelo al final de of_pinctrl_get()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "596123A2-9BD2-4865-9AD9-98254B11C8C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/033c79b7ee8a7bf1c1a13ac3addc91184425cbae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cb8f1a784fd6115be58282fe15105572319d8be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/63ff545af73f759d1bd04198af8ed8577fb739fc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48966.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48966.json index 67d00b46c60..08f7f3cfd33 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48966.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48966.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48966", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:08.573", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:05:42.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,199 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: mvneta: Impedir lectura fuera de los l\u00edmites en mvneta_config_rss() El valor pp->indir[0] proviene del usuario. Se pasa a: if (cpu_online(pp->rxq_def)) dentro de la funci\u00f3n mvneta_percpu_elect(). Necesita una comprobaci\u00f3n de los l\u00edmites para garantizar que no est\u00e9 m\u00e1s all\u00e1 del final del mapa de bits de la CPU." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.336", + "matchCriteriaId": "7C5A6448-26F0-4A50-AF9C-F13B71B0ED77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.302", + "matchCriteriaId": "FB3E1F82-01A3-456E-9C83-D567B9A75815" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.269", + "matchCriteriaId": "1185B8E3-712E-4BFB-BD01-78D47F7EF1F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.227", + "matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.159", + "matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/146ebee8fcdb349d7ec0e49915e6cdafb92544ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ceffb8f410b93553fb16fe7e84aa0d35b3ba79b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47a1a2f6cd5ec3a4f8a2d9bfa1e0605347cdb92c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a142486a0db6b0b85031f22d69acd0cdcf8f72b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ca0a506dddc3e1d636935eef339576b263bf3d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a6b30598fec84f8809f5417cde73071ca43e8471", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8b4fc13900b8e8be48debffd0dfd391772501f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eec1fc21edc2bb99c9e66cf66f0b5d4d643fbb50", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48967.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48967.json index f71d2e00d62..91a671d8efe 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48967.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48967.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48967", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:08.757", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:27:46.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,199 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFC: nci: Comprobaci\u00f3n de los l\u00edmites de matrices struct nfc_target Mientras se ejecutaba bajo CONFIG_FORTIFY_SOURCE=y, syzkaller inform\u00f3: memcpy: se detect\u00f3 una escritura que abarcaba campos (tama\u00f1o 129) de un solo campo \"target->sensf_res\" en net/nfc/nci/ntf.c:260 (tama\u00f1o 18) Esto parece ser una falta leg\u00edtima de comprobaci\u00f3n de los l\u00edmites en nci_add_new_protocol(). Agregue las comprobaciones faltantes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4", + "versionEndExcluding": "4.9.336", + "matchCriteriaId": "3BEFC972-1632-47E4-8880-E7069D4615A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.302", + "matchCriteriaId": "FB3E1F82-01A3-456E-9C83-D567B9A75815" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.269", + "matchCriteriaId": "1185B8E3-712E-4BFB-BD01-78D47F7EF1F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.227", + "matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.159", + "matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/27eb2d7a1b9987b6d0429b7716b1ff3b82c4ffc9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6778434706940b8fad7ef35f410d2b9929f256d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b37f0dc0638d13a006f2f24d2f6ca61e83bc714", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/908b2da426fe9c3ce74cf541ba40e7a4251db191", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cff35329070b96b4484d23f9f48a5ca2c947e750", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dbdcfb9f6748218a149f62468d6297ce3f014e9c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e329e71013c9b5a4535b099208493c7826ee4a64", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f41547546db9af99da2c34e3368664d7a79cefae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48968.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48968.json index 069fe29fa59..f9d176e94eb 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48968.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48968.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48968", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:08.897", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:26:01.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,129 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: corrige una posible p\u00e9rdida de memoria en otx2_init_tc(). En otx2_init_tc(), si rhashtable_init() fallo, no libera tc->tc_entries_bitmap que est\u00e1 asignado en otx2_tc_alloc_ent_bitmap()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "596123A2-9BD2-4865-9AD9-98254B11C8C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/db5ec358cf4ef0ab382ee733d05f018e8bef9462", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eefd8953a74822cb72006632b9ee9dd95f92c146", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fbf33f5ac76f2cdb47ad9763f620026d5cfa57ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48969.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48969.json index 7e07ddc7637..3dd592e5103 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48969.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48969.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48969", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:09.037", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:22:10.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,171 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xen-netfront: Reparar sring NULL despu\u00e9s de la migraci\u00f3n en vivo Se configura un NAPI para cada sring de red para sondear los datos al kernel El sring con el host de origen se destruye antes de la migraci\u00f3n en vivo y se configura el nuevo sring con el host de destino despu\u00e9s de la migraci\u00f3n en vivo. El NAPI para el sring antiguo no se elimina hasta que se configura el nuevo sring con el host de destino despu\u00e9s de la migraci\u00f3n. Con busy_poll/busy_read habilitado, el NAPI se puede sondear antes de que se elimine cuando se reanuda la VM. ERROR: no se puede manejar la desreferencia del puntero NULL del n\u00facleo en 0000000000000008 IP: xennet_poll+0xae/0xd20 PGD 0 P4D 0 Oops: 0000 [#1] Seguimiento de llamadas PTI de SMP: finish_task_switch+0x71/0x230 timerqueue_del+0x1d/0x40 hrtimer_try_to_cancel+0xb5/0x110 xennet_alloc_rx_buffers+0x2a0/0x2a0 napi_busy_loop+0xdb/0x270 sock_poll+0x87/0x90 do_sys_poll+0x26f/0x580 tracing_map_insert+0x1d4/0x2f0 evento_hist_trigger+0x14a/0x260 finalizar_cambio_tarea+0x71/0x230 __schedule+0x256/0x890 recalc_sigping+0x1b/0x50 xen_sched_clock+0x15/0x20 __rb_reserve_next+0x12d/0x140 reserva_bloqueo_buffer_anillo+0x123/0x3d0 llamada_activadores_evento+0x87/0xb0 confirmaci\u00f3n_buffer_evento_trace+0x1c4/0x210 xen_clocksource_get_cycles+0x15/0x20 ktime_get_ts64+0x51/0xf0 SyS_ppoll+0x160/0x1a0 SyS_ppoll+0x160/0x1a0 do_syscall_64+0x73/0x130 entry_SYSCALL_64_after_hwframe+0x41/0xa6 ... RIP: xennet_poll+0xae/0xd20 RSP: ffffb4f041933900 CR2: 0000000000000008 ---[ fin del seguimiento f8601785b354351c ]--- la interfaz de xen debe eliminar las NAPI de los antiguos srings antes de la migraci\u00f3n en vivo, ya que los srings de enlace se destruyen. Hay una peque\u00f1a ventana entre los srings que se establecen en NULL y los NAPI que se deshabilitan. Es seguro ya que los subprocesos NAPI todav\u00eda est\u00e1n congelados en ese momento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.24", + "versionEndExcluding": "4.19.269", + "matchCriteriaId": "15C7931B-DA37-4374-B1A0-AE4E0F69FB92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.227", + "matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.159", + "matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/99859947517e446058ad7243ee81d2f9801fa3dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d50b7914fae04d840ce36491d22133070b18cca9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e6860c889f4ad50b6ab696f5ea154295d72cf27a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e6e897d4fe2f89c0bd94600a40bedf5e6e75e050", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed773dd798bf720756d20021b8d8a4a3d7184bda", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f2dd60fd3fe98bd36a91b0c6e10bfe9d66258f84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24486.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24486.json index d54ba9e5a2b..cabcb87bf0b 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24486.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24486.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24486", "sourceIdentifier": "secure@citrix.com", "published": "2023-07-10T21:15:10.600", - "lastModified": "2023-07-18T17:33:38.713", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-25T20:35:02.937", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26248.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26248.json index 5b3e38f537e..38f7121e9fd 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26248.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26248.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26248", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:09.500", - "lastModified": "2024-10-25T16:15:09.500", + "lastModified": "2024-10-25T20:35:03.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the content ID. This allows an attacker to censor content by generating many Sybil peers whose peer IDs have a small distance from the content ID, thus hijacking the content resolution process." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://arxiv.org/abs/2307.12212", diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28899.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28899.json index d12a425d2b4..ec80451cb24 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28899.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28899.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28899", "sourceIdentifier": "cve@asrg.io", "published": "2024-01-12T17:15:09.000", - "lastModified": "2024-01-22T19:52:12.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-25T21:35:00.957", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32647.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32647.json index 58575de7549..8d1fea87bf1 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32647.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32647.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32647", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:54.320", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:12:10.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.12.0.29", + "matchCriteriaId": "F68E64E6-DBCF-431D-B5D8-8A4AFF38143E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json index 824b4c4e396..61b590ccdef 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38297.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38297", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T15:15:47.043", - "lastModified": "2024-07-03T01:40:46.927", + "lastModified": "2024-10-25T20:35:04.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json index 3cca0440a75..34bdefaeb93 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51791.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51791", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-19T17:15:52.183", - "lastModified": "2024-07-03T01:43:19.107", + "lastModified": "2024-10-25T20:35:04.603", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52026.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52026.json index 8d019f72b29..fbc2aafd36f 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52026.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52026.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52026", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T13:15:11.860", - "lastModified": "2024-01-18T20:20:30.330", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-25T21:35:02.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52533.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52533.json index 2052c36d4de..ab292aae823 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52533.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52533.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52533", "sourceIdentifier": "security@unisoc.com", "published": "2024-04-08T03:15:08.827", - "lastModified": "2024-08-26T18:35:02.780", + "lastModified": "2024-10-25T21:35:02.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-391" - } - ] - } - ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1777148475750809602", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json index 4c3a8983e5f..737b5f4093a 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6395", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T15:15:08.657", - "lastModified": "2024-02-09T02:15:08.047", + "lastModified": "2024-10-25T20:35:05.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0429.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0429.json index ad44c82c9fe..34bf6f6885f 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0429.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0429.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0429", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-11T16:15:54.683", - "lastModified": "2024-01-18T17:26:20.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-25T21:35:03.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10002.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10002.json index de63fedabf2..70e91f694be 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10002.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10002", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T05:15:03.513", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:20:39.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,22 +61,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:roveridx:rover_idx:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.0.2906", + "matchCriteriaId": "0D609616-B6C5-48C4-BD10-0B83AC2E2706" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-social.php#L153", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/rover-social-common.php#L148", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3173032/rover-idx/trunk/rover-social-common.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cf6a9fb-3c3b-48ad-a39b-77a529b89901?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10003.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10003.json index a163234918d..49708758258 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10003.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10003", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T05:15:05.163", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:19:19.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,42 +51,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:roveridx:rover_idx:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.0.2905", + "matchCriteriaId": "0562AF08-7324-42C0-BD03-208AF3EA934E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L120", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L152", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L199", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L225", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L240", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L270", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/rover-panel-setup.php#L76", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3171681/rover-idx", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cdf67099-5514-45ba-9a4c-10af984bf593?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json index 6eaff17788f..b21286c63ec 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22014", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T18:15:10.143", - "lastModified": "2024-08-22T21:35:02.417", + "lastModified": "2024-10-25T21:35:05.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-61" - } - ] - } - ], "references": [ { "url": "https://github.com/mansk1es/CVE_360TS", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json index 525ea28711a..2e4c5a76f57 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22811.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22811", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T12:15:07.427", - "lastModified": "2024-07-03T01:47:25.797", + "lastModified": "2024-10-25T20:35:06.727", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://gist.github.com/VcuCyber/51075894d1728db07fc2df286c003df9", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json index c10611700f1..8d70966135d 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23076.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23076", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T12:15:09.190", - "lastModified": "2024-08-22T19:35:12.810", + "lastModified": "2024-10-25T21:35:05.413", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -53,7 +53,7 @@ "description": [ { "lang": "en", - "value": "CWE-395" + "value": "CWE-476" } ] } diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30804.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30804.json index 4934023710b..1eb77314488 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30804.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30804.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30804", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T22:15:08.017", - "lastModified": "2024-08-22T19:35:22.260", + "lastModified": "2024-10-25T20:35:07.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-782" - } - ] - } - ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-30804", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json index d0fae82ff86..8b76ad32964 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31994.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31994", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T22:15:07.747", - "lastModified": "2024-08-15T16:35:08.717", + "lastModified": "2024-10-25T20:35:07.467", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 2.0, - "impactScore": 4.0 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-400" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-400" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json index 16456135449..e2a08b9733f 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32211.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32211", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T18:15:23.987", - "lastModified": "2024-07-03T01:55:51.973", + "lastModified": "2024-10-25T20:35:07.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-328" - } - ] - } - ], "references": [ { "url": "https://gainsec.com/2024/04/28/cve-2024-32210-cve-2024-32211-cve-2024-32212-cve-2024-32213-lomag-integrator-ce-warehouse-management/", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json index 9fb3ac76e08..78aabeb58ca 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32286.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32286", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T14:15:08.793", - "lastModified": "2024-07-03T01:55:58.927", + "lastModified": "2024-10-25T20:35:07.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json index 42ff81c2ef9..548343ee62c 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32301.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32301", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T13:15:08.293", - "lastModified": "2024-07-03T01:56:03.403", + "lastModified": "2024-10-25T21:35:06.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json index 1dc1ac48e83..f7341bbc6a9 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32407.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32407", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-22T19:15:46.680", - "lastModified": "2024-07-03T01:56:33.310", + "lastModified": "2024-10-25T20:35:08.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-1336" + "value": "CWE-918" } ] } diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46478.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46478.json index d1ec67a9d17..be78c3dbf0a 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46478.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46478.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46478", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T18:15:08.863", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T20:35:09.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "HTMLDOC v1.9.18 contiene un desbordamiento de b\u00fafer en la funci\u00f3n parse_pre, ps-pdf.cxx:5681." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/michaelrsweet/htmldoc/commit/683bec548e642cf4a17e003fb34f6bbaf2d27b98", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48204.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48204.json index 1de9508a215..c523f18af2d 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48204.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48204.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48204", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:09.873", - "lastModified": "2024-10-25T16:15:09.873", + "lastModified": "2024-10-25T20:35:11.130", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SQL injection vulnerability in Hanzhou Haobo network management system 1.0 allows a remote attacker to execute arbitrary code via a crafted script." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/NasYangh/161618e4552ca40ad1ac25b4d673bfcf", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json new file mode 100644 index 00000000000..d31e6857087 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48218", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:03.603", + "lastModified": "2024-10-25T21:15:03.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/list." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/21", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json new file mode 100644 index 00000000000..4be609ad47b --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48222", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:03.680", + "lastModified": "2024-10-25T21:15:03.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/edit." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/22", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json new file mode 100644 index 00000000000..706901ecc9a --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48223", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:03.740", + "lastModified": "2024-10-25T21:15:03.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/fieldlist." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/23", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json new file mode 100644 index 00000000000..3a069c8607d --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48224", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:03.793", + "lastModified": "2024-10-25T21:15:03.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/24", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48225.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48225.json new file mode 100644 index 00000000000..9e79f1c18fc --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48225.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48225", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:03.893", + "lastModified": "2024-10-25T21:15:03.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin v5.0.2 has an arbitrary file deletion vulnerability in /curd/index/delfile." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/25", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48226.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48226.json new file mode 100644 index 00000000000..aae274c8dd5 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48226.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48226", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:03.953", + "lastModified": "2024-10-25T21:15:03.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin 5.0.2 is vulnerable to SQL Injection in curd/table/savefield." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/26", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48227.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48227.json new file mode 100644 index 00000000000..afc05b1dc76 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48227.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48227", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:04.010", + "lastModified": "2024-10-25T21:15:04.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Funadmin 5.0.2 has a logical flaw in the Curd one click command deletion function, which can result in a Denial of Service (DOS)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/27", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48229.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48229.json new file mode 100644 index 00000000000..9bd81ad4c49 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48229.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48229", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:04.063", + "lastModified": "2024-10-25T21:15:04.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "funadmin 5.0.2 has a SQL injection vulnerability in the Curd one click command mode plugin." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/28", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48230.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48230.json new file mode 100644 index 00000000000..f9f28d363f3 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48230.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48230", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:04.123", + "lastModified": "2024-10-25T21:15:04.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "funadmin 5.0.2 is vulnerable to SQL Injection via the parentField parameter in the index method of \\backend\\controller\\auth\\Auth.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/funadmin/funadmin/issues/30", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48232.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48232.json new file mode 100644 index 00000000000..47c028182f7 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48232.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48232", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:04.170", + "lastModified": "2024-10-25T21:15:04.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was found in mipjz 5.0.5. In the mipPost method of \\app\\setting\\controller\\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sansanyun/mipjz/issues/17", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48233.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48233.json new file mode 100644 index 00000000000..eb7bd2fd5aa --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48233.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48233", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:04.243", + "lastModified": "2024-10-25T21:15:04.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "mipjz 5.0.5 is vulnerable to Cross Site Scripting (XSS) in \\app\\setting\\controller\\ApiAdminSetting.php via the ICP parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sansanyun/mipjz/issues/16", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48396.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48396.json new file mode 100644 index 00000000000..7d0ce75d423 --- /dev/null +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48396.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48396", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T21:15:04.300", + "lastModified": "2024-10-25T21:15:04.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AIML Chatbot 1.0 (fixed in 2.0) is vulnerable to Cross Site Scripting (XSS). The vulnerability is exploited through the message input field, where attackers can inject malicious HTML or JavaScript code. The chatbot fails to sanitize these inputs, leading to the execution of malicious scripts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/sohelamin/chatbot", + "source": "cve@mitre.org" + }, + { + "url": "https://jacobmasse.medium.com/reflected-xss-in-popular-ai-chatbot-application-79de74ea0cc8", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48440.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48440.json index c41bf218cf1..66279d1709f 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48440.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48440.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48440", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T18:15:09.190", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T20:35:11.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que el enrutador CPE 5G NR500-EA RG500UEAABxCOMSLICv3.2.2543.12.18 de Shenzhen Tuoshi Network Communications Co., Ltd. conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del componente at_command.asp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40sengkyaut/unauthenticated-factory-mode-reset-and-at-command-injection-in-jboneos-or-jbonecloud-firmware-1dec156b7ddd", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48441.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48441.json index 5fae1680e7b..31097876655 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48441.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48441.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48441", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T18:15:09.583", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T20:35:12.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que el enrutador CPE Tianyu CommonCPExCPETS_v3.2.468.11.04_P4 de Wuhan Tianyu Information Industry Co., Ltd conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del componente at_command.asp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40sengkyaut/unauthenticated-factory-mode-reset-and-at-command-injection-in-jboneos-or-jbonecloud-firmware-1dec156b7ddd", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48442.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48442.json index f30b103f565..17898986b6c 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48442.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48442.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48442", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T18:15:09.890", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T20:35:13.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en el enrutador CPE 5G NR500-EA RG500UEAABxCOMSLICv3.2.2543.12.18 de Shenzhen Tuoshi Network Communications Co., Ltd. permite a los atacantes acceder al protocolo SSH sin autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40sengkyaut/unauthenticated-factory-mode-reset-and-at-command-injection-in-jboneos-or-jbonecloud-firmware-1dec156b7ddd", diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json index 8601a02d11c..fb01b46f454 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48579", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:09.940", - "lastModified": "2024-10-25T16:15:09.940", + "lastModified": "2024-10-25T20:35:14.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SQL Injection vulnerability in Best House rental management system project in php v.1.0 allows a remote attacker to execute arbitrary code via the username parameter of the login request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/baineoli/CVE/blob/main/2024/house%20rental%20management%20system%20-%20SQL%20Injection%20%28Admin%20Login%29.md", diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48580.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48580.json index b255e9ba012..2330af8a945 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48580.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48580.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48580", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:09.993", - "lastModified": "2024-10-25T16:15:09.993", + "lastModified": "2024-10-25T20:35:15.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SQL Injection vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the email parameter of the login request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/baineoli/CVE/blob/main/2024/courier%20management%20system%20-%20SQL%20Injection%20%28Admin%20Login%29.md", diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48581.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48581.json index 2cadac198d4..e5f1fa1886b 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48581.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48581.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48581", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:10.047", - "lastModified": "2024-10-25T16:15:10.047", + "lastModified": "2024-10-25T20:35:15.810", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "File Upload vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the admin_class.php component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/baineoli/CVE/blob/main/2024/courier%20management%20system%20-%20Unrestricted%20File%20Upload%20to%20RCE%20%28Sign%20Up%29.md", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48654.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48654.json index 5d95f4fe219..03a6e3dff4a 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48654.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48654.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48654", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T17:15:04.763", - "lastModified": "2024-10-25T17:15:04.763", + "lastModified": "2024-10-25T21:35:07.310", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Cross Site Scripting vulnerability in Blood Bank v.1 allows a remote attacker to execute arbitrary code via a crafted script to the login.php component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Prabhatsk7/CVE/blob/main/CVE-2024-48654", diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49208.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49208.json index c85fc11a021..d011520a0e2 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49208.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49208.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49208", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:04.503", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:18:20.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -39,14 +59,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2024.03", + "versionEndExcluding": "2024.08", + "matchCriteriaId": "40BBDFF3-B311-4110-B76B-C8FBAFE714A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49209.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49209.json index 27f2bde6b57..b7146ee6e32 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49209.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49209.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49209", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:05.763", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:17:36.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -39,14 +59,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2024.03", + "versionEndExcluding": "2024.09", + "matchCriteriaId": "56B90029-B002-417A-9005-61BC67B69217" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49766.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49766.json new file mode 100644 index 00000000000..b0b282826b8 --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49766.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-49766", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-25T20:15:04.410", + "lastModified": "2024-10-25T20:15:04.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Werkzeug is a Web Server Gateway Interface web application library. On Python < 3.11 on Windows, os.path.isabs() does not catch UNC paths like //server/share. Werkzeug's safe_join() relies on this check, and so can produce a path that is not safe, potentially allowing unintended access to data. Applications using Python >= 3.11, or not using Windows, are not vulnerable. Werkzeug version 3.0.6 contains a patch." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pallets/werkzeug/commit/2767bcb10a7dd1c297d812cc5e6d11a474c1f092", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-f9vj-2wh5-fj8j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49767.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49767.json new file mode 100644 index 00000000000..91d5f6c9c68 --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49767.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2024-49767", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-25T20:15:04.530", + "lastModified": "2024-10-25T20:15:04.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pallets/werkzeug/releases/tag/3.0.6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49969.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49969.json index 114c9e11913..c33d8d473ca 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49969.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49969", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:17.910", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:15:51.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,144 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Correcci\u00f3n de \u00edndice fuera de los l\u00edmites en transformaci\u00f3n de color DCN30 Esta confirmaci\u00f3n aborda un posible problema de \u00edndice fuera de los l\u00edmites en la funci\u00f3n `cm3_helper_translate_curve_to_hw_format` en el m\u00f3dulo de administraci\u00f3n de color DCN30. El problema podr\u00eda ocurrir cuando el \u00edndice 'i' excede la cantidad de puntos de funci\u00f3n de transferencia (TRANSFER_FUNC_POINTS). La correcci\u00f3n agrega una verificaci\u00f3n para garantizar que 'i' est\u00e9 dentro de los l\u00edmites antes de acceder a los puntos de funci\u00f3n de transferencia. Si 'i' est\u00e1 fuera de los l\u00edmites, la funci\u00f3n devuelve falso para indicar un error. cm3_helper_translate_curve_to_hw_format() error: desbordamiento de b\u00fafer 'output_tf->tf_pts.red' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:181 cm3_helper_translate_curve_to_hw_format() error: desbordamiento de b\u00fafer 'output_tf->tf_pts.green' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:182 Error de cm3_helper_translate_curve_to_hw_format(): desbordamiento de b\u00fafer 'output_tf->tf_pts.blue' 1025 <= s32max" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f1e222a4b41d77c442901d166fbdca967af0d86", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/578422ddae3d13362b64e77ef9bab98780641631", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ab69af56a23859b647dee69fa1052c689343621", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/929506d5671419cffd8d01e9a7f5eae53682a838", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9d8b94ec7e67f0cae228c054f77b73967c389a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c13f9c62015c56a938304cef6d507227ea3e0039", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d81873f9e715b72d4f8d391c8eb243946f784dfc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49975.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49975.json index 7c125193f37..b24f89ea4ec 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49975.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49975", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:18.287", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:15:21.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,150 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uprobes: se corrige la fuga de informaci\u00f3n del kernel a trav\u00e9s de \"[uprobes]\" vma xol_add_vma() asigna la p\u00e1gina no inicializada asignada por __create_xol_area() al espacio de usuario. En algunas arquitecturas (x86), esta memoria se puede leer incluso sin VM_READ, VM_EXEC da como resultado el mismo pgprot_t que VM_EXEC|VM_READ, aunque esto realmente no importa, el depurador puede leer esta memoria de todos modos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "F8F34E94-54BD-4509-83CE-8416B1B0CCDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/21cb47db1ec9765f91304763a24565ddc22d2492", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/24141df5a8615790950deedd926a44ddf1dfd6d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2aa45f43709ba2082917bd2973d02687075b6eee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/34820304cc2cd1804ee1f8f3504ec77813d29c8e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b981d8335e18aef7908a068529a3287258ff6d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9634e8dc964a4adafa7e1535147abd7ec29441a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f561b48d633ac2e7d0d667020fc634a96ade33a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49976.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49976.json index f4e5c9ea7e6..f35bb014b96 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49976.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:18.353", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:14:03.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,108 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracing/timerlat: eliminar interface_lock en stop_kthread() stop_kthread() es la devoluci\u00f3n de llamada fuera de l\u00ednea para \"trace/osnoise:online\", desde el commit 5bfbcd1ee57b (\"tracing/timerlat: agregar interface_lock alrededor de la limpieza de kthread en stop_kthread()\"), se introduce el siguiente escenario de bloqueo ABBA: T1 | T2 [BP] | T3 [AP] osnoise_hotplug_workfn() | work_for_cpu_fn() | cpuhp_thread_fun() | _cpu_down() | osnoise_cpu_die() mutex_lock(&interface_lock) | | stop_kthread() | cpus_write_lock() | mutex_lock(&interface_lock) cpus_read_lock() | cpuhp_kick_ap() | Como interface_lock aqu\u00ed solo sirve para proteger el campo \"kthread\" de osn_var, utilice xchg() en su lugar para solucionar este problema. Utilice tambi\u00e9n for_each_online_cpu() en stop_per_cpu_kthreads(), ya que puede volver a activar cpu_read_lock()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.51", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "588DF926-B51D-4153-8125-8F56DE5B5A54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10.10", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "E2915A66-5936-4016-8869-18BC9109593F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09cb44cc3d3df7ade2cebc939d6257a2fa8afc7a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4a05ceffe8fad68b45de38fe2311bda619e76e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b484a02c9cedf8703eff8f0756f94618004bd165", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db8571a9a098086608c11a15856ff585789e67e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49977.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49977.json index 314349a2068..ddcf36da3ec 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49977.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49977", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:18.417", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:03:36.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: stmmac: Fix zero-division error when disabling tc cbs el commit b8c43360f6e4 (\"net: stmmac: No need to calculate speed divider when offload is disabled\") permite que \"port_transmit_rate_kbps\" se establezca en un valor de 0, que luego se pasa a la funci\u00f3n \"div_s64\" cuando tc-cbs est\u00e1 deshabilitado. Esto conduce a un error de divisi\u00f3n por cero. Cuando tc-cbs est\u00e1 deshabilitado, no es necesario configurar los valores idleslope, sendslope y credit. Por lo tanto, agregar una declaraci\u00f3n de retorno despu\u00e9s de establecer el modo txQ en DCB cuando tc-cbs est\u00e1 deshabilitado evitar\u00eda un error de divisi\u00f3n por cero." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.221", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "D7180F0F-394B-4ABD-991F-58AB9D90F314" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.162", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "99F757B5-48A7-4EB4-AA02-72DAFF9A9814" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.96", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "0A2FE2CA-C4B3-41E4-8DBD-D5F345CA4FCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.36", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "75DA43B5-E344-4A3A-A3FC-4ABAD4317D58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9.7", + "versionEndExcluding": "6.10", + "matchCriteriaId": "FA5E7970-A460-40EE-9BDE-6FFF21149DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "20A9A1A8-B921-4FB1-BC2B-00E240DE3643" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03582f4752427f60817d896f1a827aff772bd31e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d43e1ad4567d67af2b42d3ab7c14152ffed25c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/675faf5a14c14a2be0b870db30a70764df81e2df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/837d9df9c0792902710149d1a5e0991520af0f93", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0da9504a528f05f97d926b4db74ff21917a33e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e297a2bf56d12fd7f91a0c209eb6ea84361f3368", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e33fe25b1efe4f2e6a5858786dbc82ae4c44ed4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49986.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49986.json index 98ce9201d4b..52cd519579b 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49986.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49986", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:19.020", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:02:54.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,108 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: platform/x86: x86-android-tablets: Se corrige el use after free en errores platform_device_register() x86_android_tablet_remove() libera la matriz pdevs[], por lo que no se debe utilizar despu\u00e9s de llamar a x86_android_tablet_remove(). cuando falla platform_device_register(), almacena el valor PTR_ERR() de pdevs[x] en la variable ret local antes de llamar a x86_android_tablet_remove() para evitar usar pdevs[] despu\u00e9s de que se haya liberado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "9FF70C11-2F8C-4CF4-9F56-2966C90CAD37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2fae3129c0c08e72b1fe93e61fd8fd203252094a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73a98cf79e4dbfa3d0c363e826c65aae089b313c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aac871e493fc8809e60209d9899b1af07e9dbfc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f08adc5177bd4343df09033f62ab562c09ba7f7d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49989.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49989.json index a205c6668a2..9662057b682 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49989.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49989", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:19.207", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:02:16.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -12,26 +12,105 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se soluciona el problema de doble liberaci\u00f3n durante la descarga del m\u00f3dulo amdgpu Los puntos finales flexibles usan DIG de puntos finales inflexibles disponibles, por lo que solo es necesario liberar los codificadores de enlaces inflexibles. De lo contrario, puede ocurrir un problema de doble liberaci\u00f3n al descargar el m\u00f3dulo amdgpu. [ 279.190523] RIP: 0010:__slab_free+0x152/0x2f0 [ 279.190577] Seguimiento de llamadas: [ 279.190580] [ 279.190582] ? show_regs+0x69/0x80 [ 279.190590] ? die+0x3b/0x90 [ 279.190595] ? do_trap+0xc8/0xe0 [279.190601]? do_error_trap+0x73/0xa0 [279.190605]? __slab_free+0x152/0x2f0 [279.190609]? exc_invalid_op+0x56/0x70 [ 279.190616] ? __slab_free+0x152/0x2f0 [ 279.190642] ? asm_exc_invalid_op+0x1f/0x30 [ 279.190648] ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191096] ? __slab_free+0x152/0x2f0 [279.191102]? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191469] kfree+0x260/0x2b0 [ 279.191474] dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191821] /0x130 [amdgpu] [ 279.192248] dc_destruct+0x90/0x270 [amdgpu] [ 279.192666] dc_destroy+0x19/0x40 [amdgpu] [ 279.193020] amdgpu_dm_fini+0x16e/0x200 [amdgpu] [ 279.193432] dm_hw_fini+0x26/0x40 [amdgpu] [ 279.193795] amdgpu_device_fini_hw+0x24c/0x400 [amdgpu] [ 279.194108] amdgpu_driver_unload_kms+0x4f/0x70 [amdgpu] [ 279.194436] amdgpu_pci_remove+0x40/0x80 [amdgpu] [ 279.194632] pci_device_remove+0x3a/0xa0 [ 279.194638] device_remove+0x40/0x70 [ 279.194642] device_release_driver_internal+0x1ad/0x210 [ 279.194647] driver_detach+0x4e/0xa0 [ 279.194650] bus_remove_driver+0x6f/0xf0 [ 279.194653] driver_unregister+0x33/0x60 [ 279.194657] ister_driver+0x44/0x90 [ 279.194662] amdgpu_exit+0x19/0x1f0 [amdgpu] [ 279.194939 ] __do_sys_delete_module.isra.0+0x198/0x2f0 [ 279.194946] __x64_sys_delete_module+0x16/0x20 [ 279.194950] do_syscall_64+0x58/0x120 [ 279.194954] Entry_SYSCALL_64_after_hwframe+0x6e/0x76 [ 279.194980] " + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se soluciona el problema de doble liberaci\u00f3n durante la descarga del m\u00f3dulo amdgpu Los endpoints flexibles usan DIG de endpoints inflexibles disponibles, por lo que solo es necesario liberar los codificadores de enlaces inflexibles. De lo contrario, puede ocurrir un problema de doble liberaci\u00f3n al descargar el m\u00f3dulo amdgpu. [ 279.190523] RIP: 0010:__slab_free+0x152/0x2f0 [ 279.190577] Seguimiento de llamadas: [ 279.190580] [ 279.190582] ? show_regs+0x69/0x80 [ 279.190590] ? die+0x3b/0x90 [ 279.190595] ? do_trap+0xc8/0xe0 [279.190601]? do_error_trap+0x73/0xa0 [279.190605]? __slab_free+0x152/0x2f0 [279.190609]? exc_invalid_op+0x56/0x70 [ 279.190616] ? __slab_free+0x152/0x2f0 [ 279.190642] ? asm_exc_invalid_op+0x1f/0x30 [ 279.190648] ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191096] ? __slab_free+0x152/0x2f0 [279.191102]? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191469] kfree+0x260/0x2b0 [ 279.191474] dcn10_link_encoder_destroy+0x19/0x30 [amdgpu] [ 279.191821] /0x130 [amdgpu] [ 279.192248] dc_destruct+0x90/0x270 [amdgpu] [ 279.192666] dc_destroy+0x19/0x40 [amdgpu] [ 279.193020] amdgpu_dm_fini+0x16e/0x200 [amdgpu] [ 279.193432] dm_hw_fini+0x26/0x40 [amdgpu] [ 279.193795] amdgpu_device_fini_hw+0x24c/0x400 [amdgpu] [ 279.194108] amdgpu_driver_unload_kms+0x4f/0x70 [amdgpu] [ 279.194436] amdgpu_pci_remove+0x40/0x80 [amdgpu] [ 279.194632] pci_device_remove+0x3a/0xa0 [ 279.194638] device_remove+0x40/0x70 [ 279.194642] device_release_driver_internal+0x1ad/0x210 [ 279.194647] driver_detach+0x4e/0xa0 [ 279.194650] bus_remove_driver+0x6f/0xf0 [ 279.194653] driver_unregister+0x33/0x60 [ 279.194657] ister_driver+0x44/0x90 [ 279.194662] amdgpu_exit+0x19/0x1f0 [amdgpu] [ 279.194939 ] __do_sys_delete_module.isra.0+0x198/0x2f0 [ 279.194946] __x64_sys_delete_module+0x16/0x20 [ 279.194950] do_syscall_64+0x58/0x120 [ 279.194954] Entry_SYSCALL_64_after_hwframe+0x6e/0x76 [ 279.194980] " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "8B527B5F-BDDA-424E-932E-16FCAAB575E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/20b5a8f9f4670a8503aa9fa95ca632e77c6bf55d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c0ff4de45ce2c5f7997a1ffa6eefee4b79e6b58", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7af9e6fa63dbd43a61d4ecc8f59426596a75e507", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf6f3ebd6312d465fee096d1f58089b177c7c67f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json index b6064273000..85f839a145c 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50017", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T19:15:05.043", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:15:50.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/mm/ident_map: Utilizar gbpages solo cuando se deba mapear una p\u00e1gina GB completa. Cuando ident_pud_init() utiliza solo p\u00e1ginas GB para crear mapas de identidad, se pueden incluir en la tabla resultante grandes rangos de direcciones que no se solicitaron realmente; una solicitud de 4K mapear\u00e1 un GB completo. Esto puede incluir una gran cantidad de espacio de direcciones adicional m\u00e1s all\u00e1 del solicitado, incluidas las \u00e1reas marcadas como reservadas por el BIOS. Eso permite la especulaci\u00f3n del procesador en regiones reservadas, que en sistemas UV puede causar paradas del sistema. Utilice solo p\u00e1ginas GB cuando las solicitudes de creaci\u00f3n de mapas incluyan la p\u00e1gina GB completa de espacio. Vuelva a utilizar p\u00e1ginas m\u00e1s peque\u00f1as de 2M cuando solo se incluyan partes de una p\u00e1gina GB en la solicitud. No se intenta fusionar las solicitudes de mapeo. Si una solicitud requiere una entrada de mapa en el nivel 2M (pmd), las solicitudes de mapeo posteriores dentro de la misma regi\u00f3n 1G tambi\u00e9n estar\u00e1n en el nivel pmd, incluso si dichas solicitudes adyacentes o superpuestas podr\u00edan haberse combinado para mapear una p\u00e1gina GB completa. El uso actual comienza con regiones m\u00e1s grandes y luego agrega regiones m\u00e1s peque\u00f1as, por lo que esto no deber\u00eda tener grandes consecuencias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "652638C5-5F25-4DF3-AD42-DD3252A97152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a23823098ab2c277c14fc110b97d8d5c83597195", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc31744a294584a36bf764a0ffa3255a8e69f036", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d80a99892f7a992d103138fa4636b2c33abd6740", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50018.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50018.json index 45b17c6b02d..8a1bd9bc8fc 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50018.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50018.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50018", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T19:15:05.123", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T20:14:30.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -12,22 +12,91 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: napi: Prevenir el desbordamiento de napi_defer_hard_irqs En la confirmaci\u00f3n 6f8b12d661d0 (\"net: napi: agregar caracter\u00edstica de aplazamiento de irqs duras\") se agreg\u00f3 napi_defer_irqs a net_device y napi_defer_irqs_count a napi_struct, ambos como tipo int. Este valor nunca baja de cero, por lo que no hay raz\u00f3n para que sea un int con signo. Cambie el tipo para ambos de int a u32 y agregue una comprobaci\u00f3n de desbordamiento a sysfs para limitar el valor a S32_MAX. El l\u00edmite de S32_MAX se eligi\u00f3 porque el l\u00edmite pr\u00e1ctico antes de este parche era S32_MAX (cualquier valor mayor era un desbordamiento) y, por lo tanto, no se introdujeron cambios de comportamiento. Si se necesita el bit adicional en el futuro, se puede aumentar el l\u00edmite. Antes de este parche: $ sudo bash -c 'echo 2147483649 > /sys/class/net/eth4/napi_defer_hard_irqs' $ cat /sys/class/net/eth4/napi_defer_hard_irqs -2147483647 Despu\u00e9s de este parche: $ sudo bash -c 'echo 2147483649 > /sys/class/net/eth4/napi_defer_hard_irqs' bash: l\u00ednea 0: echo: error de escritura: resultado num\u00e9rico fuera de rango De manera similar, /sys/class/net/XXXXX/tx_queue_len se define como unsigned: include/linux/netdevice.h: unsigned int tx_queue_len; Y tiene una comprobaci\u00f3n de desbordamiento: dev_change_tx_queue_len(..., unsigned long new_len): if (new_len != (unsigned int)new_len) return -ERANGE;" + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: napi: Prevenir el desbordamiento de napi_defer_hard_irqs En el commit 6f8b12d661d0 (\"net: napi: agregar caracter\u00edstica de aplazamiento de irqs duras\") se agreg\u00f3 napi_defer_irqs a net_device y napi_defer_irqs_count a napi_struct, ambos como tipo int. Este valor nunca baja de cero, por lo que no hay raz\u00f3n para que sea un int con signo. Cambie el tipo para ambos de int a u32 y agregue una comprobaci\u00f3n de desbordamiento a sysfs para limitar el valor a S32_MAX. El l\u00edmite de S32_MAX se eligi\u00f3 porque el l\u00edmite pr\u00e1ctico antes de este parche era S32_MAX (cualquier valor mayor era un desbordamiento) y, por lo tanto, no se introdujeron cambios de comportamiento. Si se necesita el bit adicional en el futuro, se puede aumentar el l\u00edmite. Antes de este parche: $ sudo bash -c 'echo 2147483649 > /sys/class/net/eth4/napi_defer_hard_irqs' $ cat /sys/class/net/eth4/napi_defer_hard_irqs -2147483647 Despu\u00e9s de este parche: $ sudo bash -c 'echo 2147483649 > /sys/class/net/eth4/napi_defer_hard_irqs' bash: l\u00ednea 0: echo: error de escritura: resultado num\u00e9rico fuera de rango De manera similar, /sys/class/net/XXXXX/tx_queue_len se define como unsigned: include/linux/netdevice.h: unsigned int tx_queue_len; Y tiene una comprobaci\u00f3n de desbordamiento: dev_change_tx_queue_len(..., unsigned long new_len): if (new_len != (unsigned int)new_len) return -ERANGE;" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "652638C5-5F25-4DF3-AD42-DD3252A97152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/08062af0a52107a243f7608fd972edb54ca5b7f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e753b743d3b38a3e10be666c32c5434423d0093", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d694ad8b7e5004df86ecd415cb2320d543723672", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50583.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50583.json index 91c16c25687..01180d207b5 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50583.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50583.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50583", "sourceIdentifier": "cve@navercorp.com", "published": "2024-10-25T07:15:05.063", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T21:35:08.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El instalador del navegador Whale anterior a la versi\u00f3n 3.1.0.0 permite a un atacante ejecutar una DLL maliciosa en el entorno del usuario debido a configuraciones de permisos incorrectas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "cve@navercorp.com", diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8852.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8852.json index 037c566e455..2667b2cb6bf 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8852.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8852", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T06:15:04.890", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:20:11.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,18 +61,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servmask:all-in-one_wp_migration:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "7.87", + "matchCriteriaId": "4B408AEB-9F3D-45C2-8AB2-85329DE6CF85" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/all-in-one-wp-migration/tags/7.86/functions.php#L297", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3168605%40all-in-one-wp-migration&new=3168605%40all-in-one-wp-migration&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c4901d9d-7b37-40d5-a42b-59c80bbbe8ff?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9541.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9541.json index 614414b6f63..21cc4ec10af 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9541.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9541", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T08:15:02.920", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:16:12.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blazethemes:news_kit_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.2", + "matchCriteriaId": "BC5FD280-0211-43E3-B682-0810B293B5D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3169975/news-kit-elementor-addons", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ffc5408c-ca31-4cb6-8cb5-063acbbad01e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9588.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9588.json index 52739ae0b9f..0e2ebc9454e 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9588.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9588.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9588", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T08:15:03.563", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:15:39.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aftabhusain:category_and_taxonomy_meta_fields:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "A6683605-6A12-4A0C-AAE1-8ACDCE8E3B3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-custom-taxonomy-meta/trunk/includes/options.php?rev=1196908#L103", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2dc9c744-6ffb-4d7a-94ce-ba576d7b6d47?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9627.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9627.json index 496a9628457..155d662b0b1 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9627.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9627.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9627", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T07:15:02.687", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T21:19:48.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:te-st:teplobot:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3", + "matchCriteriaId": "885767C1-EF75-481F-BD1A-1C599EECB1BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/green-wp-telegram-bot-by-teplitsa/trunk/inc/core.php?rev=1754863#L266", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/091dadcb-71ac-4321-b3aa-72b5fbbd9163?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 444d083d05a..09b55ac56cc 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-25T20:00:18.737714+00:00 +2024-10-25T22:00:18.929491+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-25T19:59:00.933000+00:00 +2024-10-25T21:35:08.253000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267105 +267119 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `14` -- [CVE-2024-37844](CVE-2024/CVE-2024-378xx/CVE-2024-37844.json) (`2024-10-25T19:15:03.897`) -- [CVE-2024-37845](CVE-2024/CVE-2024-378xx/CVE-2024-37845.json) (`2024-10-25T19:15:03.973`) -- [CVE-2024-37846](CVE-2024/CVE-2024-378xx/CVE-2024-37846.json) (`2024-10-25T19:15:04.027`) -- [CVE-2024-37847](CVE-2024/CVE-2024-378xx/CVE-2024-37847.json) (`2024-10-25T19:15:04.087`) -- [CVE-2024-48343](CVE-2024/CVE-2024-483xx/CVE-2024-48343.json) (`2024-10-25T18:15:04.250`) -- [CVE-2024-48448](CVE-2024/CVE-2024-484xx/CVE-2024-48448.json) (`2024-10-25T18:15:04.330`) -- [CVE-2024-48450](CVE-2024/CVE-2024-484xx/CVE-2024-48450.json) (`2024-10-25T19:15:04.373`) -- [CVE-2024-48700](CVE-2024/CVE-2024-487xx/CVE-2024-48700.json) (`2024-10-25T18:15:04.407`) -- [CVE-2024-9584](CVE-2024/CVE-2024-95xx/CVE-2024-9584.json) (`2024-10-25T18:15:04.673`) -- [CVE-2024-9585](CVE-2024/CVE-2024-95xx/CVE-2024-9585.json) (`2024-10-25T18:15:04.907`) +- [CVE-2024-48218](CVE-2024/CVE-2024-482xx/CVE-2024-48218.json) (`2024-10-25T21:15:03.603`) +- [CVE-2024-48222](CVE-2024/CVE-2024-482xx/CVE-2024-48222.json) (`2024-10-25T21:15:03.680`) +- [CVE-2024-48223](CVE-2024/CVE-2024-482xx/CVE-2024-48223.json) (`2024-10-25T21:15:03.740`) +- [CVE-2024-48224](CVE-2024/CVE-2024-482xx/CVE-2024-48224.json) (`2024-10-25T21:15:03.793`) +- [CVE-2024-48225](CVE-2024/CVE-2024-482xx/CVE-2024-48225.json) (`2024-10-25T21:15:03.893`) +- [CVE-2024-48226](CVE-2024/CVE-2024-482xx/CVE-2024-48226.json) (`2024-10-25T21:15:03.953`) +- [CVE-2024-48227](CVE-2024/CVE-2024-482xx/CVE-2024-48227.json) (`2024-10-25T21:15:04.010`) +- [CVE-2024-48229](CVE-2024/CVE-2024-482xx/CVE-2024-48229.json) (`2024-10-25T21:15:04.063`) +- [CVE-2024-48230](CVE-2024/CVE-2024-482xx/CVE-2024-48230.json) (`2024-10-25T21:15:04.123`) +- [CVE-2024-48232](CVE-2024/CVE-2024-482xx/CVE-2024-48232.json) (`2024-10-25T21:15:04.170`) +- [CVE-2024-48233](CVE-2024/CVE-2024-482xx/CVE-2024-48233.json) (`2024-10-25T21:15:04.243`) +- [CVE-2024-48396](CVE-2024/CVE-2024-483xx/CVE-2024-48396.json) (`2024-10-25T21:15:04.300`) +- [CVE-2024-49766](CVE-2024/CVE-2024-497xx/CVE-2024-49766.json) (`2024-10-25T20:15:04.410`) +- [CVE-2024-49767](CVE-2024/CVE-2024-497xx/CVE-2024-49767.json) (`2024-10-25T20:15:04.530`) ### CVEs modified in the last Commit -Recently modified CVEs: `83` +Recently modified CVEs: `59` -- [CVE-2024-44099](CVE-2024/CVE-2024-440xx/CVE-2024-44099.json) (`2024-10-25T19:35:07.773`) -- [CVE-2024-44100](CVE-2024/CVE-2024-441xx/CVE-2024-44100.json) (`2024-10-25T19:35:08.533`) -- [CVE-2024-44101](CVE-2024/CVE-2024-441xx/CVE-2024-44101.json) (`2024-10-25T19:35:09.280`) -- [CVE-2024-46240](CVE-2024/CVE-2024-462xx/CVE-2024-46240.json) (`2024-10-25T19:00:20.737`) -- [CVE-2024-47012](CVE-2024/CVE-2024-470xx/CVE-2024-47012.json) (`2024-10-25T19:35:10.183`) -- [CVE-2024-47013](CVE-2024/CVE-2024-470xx/CVE-2024-47013.json) (`2024-10-25T19:35:10.947`) -- [CVE-2024-47014](CVE-2024/CVE-2024-470xx/CVE-2024-47014.json) (`2024-10-25T19:35:11.740`) -- [CVE-2024-48139](CVE-2024/CVE-2024-481xx/CVE-2024-48139.json) (`2024-10-25T19:35:12.730`) -- [CVE-2024-48140](CVE-2024/CVE-2024-481xx/CVE-2024-48140.json) (`2024-10-25T19:35:13.497`) -- [CVE-2024-48141](CVE-2024/CVE-2024-481xx/CVE-2024-48141.json) (`2024-10-25T19:35:14.257`) -- [CVE-2024-48142](CVE-2024/CVE-2024-481xx/CVE-2024-48142.json) (`2024-10-25T18:35:08.560`) -- [CVE-2024-48143](CVE-2024/CVE-2024-481xx/CVE-2024-48143.json) (`2024-10-25T18:35:09.327`) -- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-25T18:59:22.033`) -- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-25T18:58:35.380`) -- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-25T19:11:54.310`) -- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-25T19:10:08.457`) -- [CVE-2024-49996](CVE-2024/CVE-2024-499xx/CVE-2024-49996.json) (`2024-10-25T19:56:10.320`) -- [CVE-2024-50000](CVE-2024/CVE-2024-500xx/CVE-2024-50000.json) (`2024-10-25T19:55:55.357`) -- [CVE-2024-50012](CVE-2024/CVE-2024-500xx/CVE-2024-50012.json) (`2024-10-25T19:55:40.217`) -- [CVE-2024-50013](CVE-2024/CVE-2024-500xx/CVE-2024-50013.json) (`2024-10-25T19:49:36.863`) -- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-10-25T19:35:15.010`) -- [CVE-2024-5836](CVE-2024/CVE-2024-58xx/CVE-2024-5836.json) (`2024-10-25T19:35:15.787`) -- [CVE-2024-6611](CVE-2024/CVE-2024-66xx/CVE-2024-6611.json) (`2024-10-25T18:35:10.737`) -- [CVE-2024-9530](CVE-2024/CVE-2024-95xx/CVE-2024-9530.json) (`2024-10-25T18:52:10.810`) -- [CVE-2024-9987](CVE-2024/CVE-2024-99xx/CVE-2024-9987.json) (`2024-10-25T19:06:35.350`) +- [CVE-2024-32407](CVE-2024/CVE-2024-324xx/CVE-2024-32407.json) (`2024-10-25T20:35:08.740`) +- [CVE-2024-46478](CVE-2024/CVE-2024-464xx/CVE-2024-46478.json) (`2024-10-25T20:35:09.710`) +- [CVE-2024-48204](CVE-2024/CVE-2024-482xx/CVE-2024-48204.json) (`2024-10-25T20:35:11.130`) +- [CVE-2024-48440](CVE-2024/CVE-2024-484xx/CVE-2024-48440.json) (`2024-10-25T20:35:11.890`) +- [CVE-2024-48441](CVE-2024/CVE-2024-484xx/CVE-2024-48441.json) (`2024-10-25T20:35:12.680`) +- [CVE-2024-48442](CVE-2024/CVE-2024-484xx/CVE-2024-48442.json) (`2024-10-25T20:35:13.447`) +- [CVE-2024-48579](CVE-2024/CVE-2024-485xx/CVE-2024-48579.json) (`2024-10-25T20:35:14.227`) +- [CVE-2024-48580](CVE-2024/CVE-2024-485xx/CVE-2024-48580.json) (`2024-10-25T20:35:15.050`) +- [CVE-2024-48581](CVE-2024/CVE-2024-485xx/CVE-2024-48581.json) (`2024-10-25T20:35:15.810`) +- [CVE-2024-48654](CVE-2024/CVE-2024-486xx/CVE-2024-48654.json) (`2024-10-25T21:35:07.310`) +- [CVE-2024-49208](CVE-2024/CVE-2024-492xx/CVE-2024-49208.json) (`2024-10-25T20:18:20.550`) +- [CVE-2024-49209](CVE-2024/CVE-2024-492xx/CVE-2024-49209.json) (`2024-10-25T20:17:36.353`) +- [CVE-2024-49969](CVE-2024/CVE-2024-499xx/CVE-2024-49969.json) (`2024-10-25T20:15:51.520`) +- [CVE-2024-49975](CVE-2024/CVE-2024-499xx/CVE-2024-49975.json) (`2024-10-25T20:15:21.160`) +- [CVE-2024-49976](CVE-2024/CVE-2024-499xx/CVE-2024-49976.json) (`2024-10-25T20:14:03.387`) +- [CVE-2024-49977](CVE-2024/CVE-2024-499xx/CVE-2024-49977.json) (`2024-10-25T20:03:36.737`) +- [CVE-2024-49986](CVE-2024/CVE-2024-499xx/CVE-2024-49986.json) (`2024-10-25T20:02:54.517`) +- [CVE-2024-49989](CVE-2024/CVE-2024-499xx/CVE-2024-49989.json) (`2024-10-25T20:02:16.763`) +- [CVE-2024-50017](CVE-2024/CVE-2024-500xx/CVE-2024-50017.json) (`2024-10-25T20:15:50.067`) +- [CVE-2024-50018](CVE-2024/CVE-2024-500xx/CVE-2024-50018.json) (`2024-10-25T20:14:30.820`) +- [CVE-2024-50583](CVE-2024/CVE-2024-505xx/CVE-2024-50583.json) (`2024-10-25T21:35:08.253`) +- [CVE-2024-8852](CVE-2024/CVE-2024-88xx/CVE-2024-8852.json) (`2024-10-25T21:20:11.410`) +- [CVE-2024-9541](CVE-2024/CVE-2024-95xx/CVE-2024-9541.json) (`2024-10-25T21:16:12.447`) +- [CVE-2024-9588](CVE-2024/CVE-2024-95xx/CVE-2024-9588.json) (`2024-10-25T21:15:39.970`) +- [CVE-2024-9627](CVE-2024/CVE-2024-96xx/CVE-2024-9627.json) (`2024-10-25T21:19:48.757`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cb3d0b3f538..3fb8fe7c102 100644 --- a/_state.csv +++ b/_state.csv @@ -136736,7 +136736,7 @@ CVE-2019-19751,0,0,333e2228e5359aa9aa6607b9b93a13db1e1e4a3afd8a27e1b0809b961a7ad CVE-2019-19752,0,0,ca1be8726247421589be653e6b118d85fb80821e3a23f9fa9ad5253805bdcc1d,2024-04-30T19:35:36.960000 CVE-2019-19753,0,0,52a2eda005171f44f58b41fc51a75b87a28c32216d9047f516bbb7dcadc26132,2024-08-01T13:41:49.557000 CVE-2019-19754,0,0,cea16ae880519bbe1d98fa9bfa11e9d2b0fb7aed20d6d73373e4fe599034df53,2024-07-03T01:35:48.790000 -CVE-2019-19755,0,0,3b97901c49f784d257918947dc2314cb49f75323594fa7abf658f7cee8cf116d,2024-08-15T19:35:01.400000 +CVE-2019-19755,0,1,b945bd729beeb7f08aa3173263d137e176cb37e1a5fbb8e3bb355be1b5b5311b,2024-10-25T20:35:00.763000 CVE-2019-19756,0,0,1ac0bdab62e30eb5ab1a78699b860a548408938df444dc2031b32d44e57bf16c,2021-11-02T19:16:30.403000 CVE-2019-19757,0,0,6c08333c002f3e1b918b084afd5e3199189401eb1cffc5772a8ec918e1cd505b,2020-02-24T17:53:03.400000 CVE-2019-19758,0,0,f3cf0ee2a978417eaa68c2b04df4207f79bbea00f53f54a34da27466d93768b8,2020-02-27T14:16:50.720000 @@ -176776,7 +176776,7 @@ CVE-2021-33141,0,0,e0a065c9925276699eb5f8937853ed461086d29f7a31aeec1551cbb7f5460 CVE-2021-33142,0,0,6b6d2e7a3593474e941a48c0e0a86b2afdb88e9d637d16ea56105561edab726b,2024-05-17T18:36:31.297000 CVE-2021-33143,0,0,d33bc31405c694174d143c612f45f6bb45da8c342a10f9e04e8fe9e0b4afac47,2024-05-17T01:57:50.467000 CVE-2021-33144,0,0,9a9f4bc57e199cf457d3114610bce4b7cdb0bca10058a5af438e8b02d657b104,2024-05-17T01:57:50.507000 -CVE-2021-33145,0,1,f6fedb7ea0ffd4f9b5854891de3ec3bf7fcad1994b7d5fcf04fe5f8486d8999c,2024-10-25T19:35:00.780000 +CVE-2021-33145,0,0,f6fedb7ea0ffd4f9b5854891de3ec3bf7fcad1994b7d5fcf04fe5f8486d8999c,2024-10-25T19:35:00.780000 CVE-2021-33146,0,0,1b10b1154ea12dfba2ef43c2271cc4baf012ccc3e3f0df488ec84bb305233130,2024-07-03T01:36:46.133000 CVE-2021-33147,0,0,4fd910e8850035a7c5a60833e30ea5134ba4be70dca5cf5c934dfae1565347c4,2022-02-15T16:51:32.753000 CVE-2021-33148,0,0,a6a0f8af441e615c4cab080b9ae7f289c149d473f5d60c819201878714dd3401,2024-05-17T01:57:50.630000 @@ -198414,9 +198414,9 @@ CVE-2022-30350,0,0,18d3001ce63cdc43cde8480b95b699a5a0a5ecb7deba51d4dc72c0d86c640 CVE-2022-30351,0,0,2df1fcff158bfaa98e8e388cc82c7b76555d1068f7cfc1016565d9f0f49748dd,2023-04-10T16:42:49.510000 CVE-2022-30352,0,0,9c99852cab9cb3dba12ad494a32dc9a161c396d474ce4e7a613cf8447766b558,2022-06-10T02:33:25.820000 CVE-2022-30354,0,0,7cba051f8dce4545bb466640a9f5c05e0372bd088683a3405bf2a27c2cce1974,2024-10-25T16:15:08.663000 -CVE-2022-30355,0,1,5dc1531b708befb320f7d2b9c4c4c759ee5636e9d0af320547d51d8dc9a1901c,2024-10-25T19:35:01.173000 +CVE-2022-30355,0,0,5dc1531b708befb320f7d2b9c4c4c759ee5636e9d0af320547d51d8dc9a1901c,2024-10-25T19:35:01.173000 CVE-2022-30356,0,0,9308385fcbcb801d9c8b00db22c0630d9b3e8c8ae137f0fed3bf5630f60767fa,2024-10-25T17:15:03.387000 -CVE-2022-30357,0,0,69ac61555cbd98d1a0a5e01a94a9884cf5cfab9c5fac56dd7704263164771904,2024-10-25T17:15:03.450000 +CVE-2022-30357,0,1,c63b19992a852d55d32743550935367ffb417bdb96dbe98ae5172f1f5354bfac,2024-10-25T20:35:01.917000 CVE-2022-30358,0,0,09934a292607f0f0fec4c9584ccd370034b961e333a8196f11a9642776345e47,2024-10-25T17:15:03.507000 CVE-2022-30359,0,0,cd098a9a0befa2548cd8f1a5cc248bfe7beae08baa1c613c2049e59c36272bdf,2024-10-25T17:15:03.570000 CVE-2022-3036,0,0,c4abe10251774bed45d05e8655ab46440316bc2da3c56604182cb58b05d9789f,2022-09-21T15:01:39.933000 @@ -212277,7 +212277,7 @@ CVE-2022-4868,0,0,de8ed75e13886b935b9010c58d4bf944210c807882b1811aaef0c24bb30f18 CVE-2022-48681,0,0,fcf7cb340908d491cd75b625cd54b5cf245a127526adf8317a0395aafbd2bf2e,2024-05-28T12:39:28.377000 CVE-2022-48682,0,0,2e52457fc9bbe7887b71e5b817d10f33e0f540cef64c328e2f03240ccf514b9f,2024-04-26T12:58:17.720000 CVE-2022-48683,0,0,4621581937065a2132f268979a2992d0d4d1788908ca660df5cb46257e067c07,2024-08-01T13:43:07.780000 -CVE-2022-48684,0,0,4f92efa369cdee66d6f53eb185220c289dbd6040fa52ad2a4c427379f363d035,2024-07-03T01:39:07.940000 +CVE-2022-48684,0,1,b22a74c5a88e004438b78eba8897de00e89d8b985db752548d67a6b910efda7a,2024-10-25T20:35:02.740000 CVE-2022-48685,0,0,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bbbff,2024-07-03T01:39:08.670000 CVE-2022-48686,0,0,653933df85aeb53741c4da508441bc4178f22de8ca5ed91694baaa41b1db130d,2024-05-23T20:33:45.640000 CVE-2022-48687,0,0,0ec523c7f518c54f1476367451f0187184c8bdd6245e5a7032af6a4d4908842f,2024-05-23T20:33:49.117000 @@ -212564,15 +212564,15 @@ CVE-2022-48942,0,0,2cf46354691478839d2223efa2eaa869b06a9729fd72ecdcbb1c9e9660f0a CVE-2022-48943,0,0,a7018e1dbe7c5677e235ba4ed082a73fce76282052204bd38ca850f621dffe72,2024-08-22T18:27:42.807000 CVE-2022-48944,0,0,78b35f4e96175b0acbd7eb76c8fc345abc146c0623b459d55b4bfe903afbd190,2024-09-03T14:26:56.393000 CVE-2022-48945,0,0,04e7494c867d2745065a695f3c050464fcd7db6e245bb13442273deff488e24a,2024-09-26T13:32:55.343000 -CVE-2022-48946,0,0,1df7137dee6b4c4a5e3f8613084121272ab068dbfc5c217e4e46dd75cef501fa,2024-10-23T15:13:25.583000 -CVE-2022-48947,0,0,8eac4b90177e0cee64005b8271cce50edbdecd0feb9b6ba4c912157e57fa25cd,2024-10-23T15:13:25.583000 +CVE-2022-48946,0,1,cfefbc7d174c777888e72ac65260eb61ba1bda7b72b2bde12ab6cdecb8dd5105,2024-10-25T20:13:39.847000 +CVE-2022-48947,0,1,6aa8ae8b892b41abda0533803253735a337d5901b14281670a2ddf65e9421084,2024-10-25T20:11:45.473000 CVE-2022-48948,0,0,0df7ff89bc20e6d14a730310fe00121f0b4c3b94433557dadb35b55179bf0d80,2024-10-23T15:13:25.583000 CVE-2022-48949,0,0,2d06b0ddc43a1d6ceef8a0ad6d5012e53b15c9ea3ed8f9cf12049c67291c9b36,2024-10-23T15:13:25.583000 CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000 -CVE-2022-48950,0,0,df7cdcc43adc0fe4790bfeee6795f91b28a4c15b10566f630a78891552ade293,2024-10-23T15:13:25.583000 -CVE-2022-48951,0,0,ba9d8cef5379b0ff4a935922614acdd38174cd969734d165c8703c7601b1f6a8,2024-10-23T15:13:25.583000 -CVE-2022-48952,0,0,cf21a0255246b5b3ab6d95e6ea99d72bc42c2b56c4888d478133ad8ae4632324,2024-10-23T15:13:25.583000 -CVE-2022-48953,0,0,037e26b090bc3b5c06ab9dffbf7de850a858e5fc3604925c0be082d71471c418,2024-10-23T15:13:25.583000 +CVE-2022-48950,0,1,1b3d55ca4ab6e70eb975939cd1542c8de3ef56155c29da3ff8cb8057a4e2b24e,2024-10-25T20:02:03.240000 +CVE-2022-48951,0,1,8553eeb6fe1b212af16ae6d4d7032df2e5b6cc4fac9ad15dcd53ba648d3e070f,2024-10-25T20:01:24.943000 +CVE-2022-48952,0,1,9685dbaecf9fe350910d38747c1ce393e19bbddaa4f2ab12fc31a3d4cc1d82e3,2024-10-25T20:09:39.900000 +CVE-2022-48953,0,1,071e6b7d356a6c189493fb8a165d3ef14e949bd2fd09b3ec361e7c7ff7252a3b,2024-10-25T20:07:48.127000 CVE-2022-48954,0,0,739575e3093a499b0052cdcdfb603ce436f9aa9028374fc974a8acd1648a7210,2024-10-24T19:57:39 CVE-2022-48955,0,0,86162b259bd0edabf491f8d7ac9901887414111ced735b0c7ce8d9a40e920beb,2024-10-24T19:58:17.230000 CVE-2022-48956,0,0,7b71de397ebb97c317a78adf75e7c6d21e7a987b6ee245bfd5c45d538640e7d3,2024-10-24T19:59:47.737000 @@ -212585,26 +212585,26 @@ CVE-2022-48961,0,0,74d18016dfde0cb8a0047a37ab2c07bf8c19a292b832e4231d1a582e56923 CVE-2022-48962,0,0,3e9352cb14da09460dabd4c4ed0ebf1fe375e3760484bb430b88096f74fb87ff,2024-10-24T19:27:13.900000 CVE-2022-48963,0,0,2cc67ac27a70e3eaf4305fbb0c71925d0a7c77e13764203ad9a8a86e3f22ee89,2024-10-24T19:27:58.603000 CVE-2022-48964,0,0,13bd5cdda7ac4f5878a520e8c12bce36b9b8e913c0c74c77b4e8a6c22e52198f,2024-10-24T19:28:48.867000 -CVE-2022-48965,0,0,5c2d1d54d8b3c46630fcded2c16f38c7fffd2383699aeb72a69572ed1749a87e,2024-10-23T15:13:25.583000 -CVE-2022-48966,0,0,7b5ea2cdb27342c6837b1d63b8ed702b4c34ea924734529cc736266041c3d692,2024-10-23T15:13:25.583000 -CVE-2022-48967,0,0,9a4dff8791ae44e4087bbdddb5fbc68f8736e971375d2e967fe26661594f6b57,2024-10-23T15:13:25.583000 -CVE-2022-48968,0,0,017a1d2b13f226f7bddbc210b2bd3cf757d1f0d39cf99f216cca9b576a19e95d,2024-10-23T15:13:25.583000 -CVE-2022-48969,0,0,9d5e3023502dbcf73cf247c9ccac819ef4bcc5ebe125f185e7eeef2c89ccaf31,2024-10-23T15:13:25.583000 +CVE-2022-48965,0,1,45395c7638ae47b88368375ccbb9f51019bb45fca3778803b582dc8df90499dd,2024-10-25T20:06:45.190000 +CVE-2022-48966,0,1,b5adf231a2de76a72b305b28aaffbecec7b8bcb362c54dfb69b75a2f7b317b2a,2024-10-25T20:05:42.373000 +CVE-2022-48967,0,1,2a2d0bb2de678c84e10e4398cbfee5474e40e161ce28d93d5e8ae376a9b8b18e,2024-10-25T21:27:46.017000 +CVE-2022-48968,0,1,66e195149500c0d1097be8f1441ce5f4072f579bdb483df1bd5658816b7ea10d,2024-10-25T21:26:01.523000 +CVE-2022-48969,0,1,d30dc89beec8bac8070d33c2de038c9e7c6f6b9672274b7965f698710f5f74d2,2024-10-25T21:22:10.087000 CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000 CVE-2022-48970,0,0,40b192859836fb9e4b4ff740c2d192f1bd91b2f3915520635abf192612070d19,2024-10-25T15:24:22.060000 CVE-2022-48971,0,0,998975336af1feca0df2eeedd516faed136509784fd2222bb672c33e3083f72f,2024-10-25T15:23:38.807000 CVE-2022-48972,0,0,1b38bc5eab69345ffacf3735f7c4d7a21942b008815acccb4048e2196ca88ff8,2024-10-25T15:22:33.897000 CVE-2022-48973,0,0,976ef450614292c62923177c314a4b2aa5b18418ae239de605da93f276c749ea,2024-10-25T15:35:54.687000 CVE-2022-48974,0,0,665d9c03b3d3f1f2b3e7ecc5cabdfc4e26418e7914055dc95137c3a3c52dd1bf,2024-10-25T15:25:54.433000 -CVE-2022-48975,0,1,e1fb3e2bc7f9ba54b7ee65fa841ac29a199874f317e3d17428ca1b5f9402dbe2,2024-10-25T18:48:57.490000 -CVE-2022-48976,0,1,bbbf0bdfd942edca0508c3b6adeeebc2a07f64cf4a932ca62327eb55c9a12c1c,2024-10-25T18:47:40.823000 -CVE-2022-48977,0,1,eff713f1e22ab6714c388c4b46d09006813ee4d3c2ac4f34360f0c12818df52d,2024-10-25T18:47:07.357000 -CVE-2022-48978,0,1,63d84a3101a74198d1a57d7e01f661d8ddede015533d663af8fbf98cad6e5e89,2024-10-25T18:46:23.317000 -CVE-2022-48979,0,1,6e293a7d4d94801184b43db15d0a018f7d2d54654b239c95c385d82bf055453d,2024-10-25T18:40:16.227000 +CVE-2022-48975,0,0,e1fb3e2bc7f9ba54b7ee65fa841ac29a199874f317e3d17428ca1b5f9402dbe2,2024-10-25T18:48:57.490000 +CVE-2022-48976,0,0,bbbf0bdfd942edca0508c3b6adeeebc2a07f64cf4a932ca62327eb55c9a12c1c,2024-10-25T18:47:40.823000 +CVE-2022-48977,0,0,eff713f1e22ab6714c388c4b46d09006813ee4d3c2ac4f34360f0c12818df52d,2024-10-25T18:47:07.357000 +CVE-2022-48978,0,0,63d84a3101a74198d1a57d7e01f661d8ddede015533d663af8fbf98cad6e5e89,2024-10-25T18:46:23.317000 +CVE-2022-48979,0,0,6e293a7d4d94801184b43db15d0a018f7d2d54654b239c95c385d82bf055453d,2024-10-25T18:40:16.227000 CVE-2022-4898,0,0,45b8fe73140eae686f75256e6a033fa7f76a1c506314cc4b83a596aba96b02bc,2023-02-21T15:15:12.023000 -CVE-2022-48980,0,1,847f9f7949c9e624eef3c5211fe6f9f34a42f62c669ae41cbeca15bb8a3e49f0,2024-10-25T18:36:00.703000 -CVE-2022-48981,0,1,edbe50226f61eeb3964ee5f01c48ece48013ec7f030ccd46e06c058038ce5163,2024-10-25T18:33:18.783000 -CVE-2022-48982,0,1,58fbd0b9b2a1580dc158a88315d6703348749f40d4fc009911acc30aa732771b,2024-10-25T18:12:52.270000 +CVE-2022-48980,0,0,847f9f7949c9e624eef3c5211fe6f9f34a42f62c669ae41cbeca15bb8a3e49f0,2024-10-25T18:36:00.703000 +CVE-2022-48981,0,0,edbe50226f61eeb3964ee5f01c48ece48013ec7f030ccd46e06c058038ce5163,2024-10-25T18:33:18.783000 +CVE-2022-48982,0,0,58fbd0b9b2a1580dc158a88315d6703348749f40d4fc009911acc30aa732771b,2024-10-25T18:12:52.270000 CVE-2022-48983,0,0,dfa67a553ef1fa3c57f719e3548ad9b975bf5a0f74df240dd01055c881443dcd,2024-10-25T15:58:02.297000 CVE-2022-48984,0,0,e51fd7e8de77f3a8cf163611cb2f09fc6b7014335c2a9168caf96cf9450b0b0f,2024-10-25T15:53:53.890000 CVE-2022-48985,0,0,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000 @@ -218385,7 +218385,7 @@ CVE-2023-24482,0,0,6c32cf12341531b0652a27ee9d708ebe2edf4eb372830c6ca7843cd64a3d3 CVE-2023-24483,0,0,911fe608335ab8f98794e01cca66be320ab453e365d2ecbb8325edaa3c579cfa,2023-02-24T19:44:41.067000 CVE-2023-24484,0,0,dd8de6aa3440219adf79a79684619e217480bb8ef75da13f9a5e8d3139feb157,2023-02-24T19:28:17.107000 CVE-2023-24485,0,0,6494677a4bd712d6f0a9ffed1c8ddd51327c987a092edd2087959b419e3603c9,2023-02-24T18:32:53.893000 -CVE-2023-24486,0,0,30cfee870c828e8c5af4ef0999f48c23f41ec83d58890598288f5bb81f75ab65,2023-07-18T17:33:38.713000 +CVE-2023-24486,0,1,4e289f4ce15e1fa48a89e539afdba553815de4090d535a3f8b0faa96eeab135e,2024-10-25T20:35:02.937000 CVE-2023-24487,0,0,f83dfdcc0c8b28bae14a00706768386aa3ea635fab75971621e961eed8e914b0,2023-11-07T04:08:30.043000 CVE-2023-24488,0,0,361d8b29d2b6d09eb524b04a9b7bb7e3104a27552e4785f2fba6b71468fd2d07,2023-11-07T04:08:30.117000 CVE-2023-24489,0,0,e5589514b259a78b09bc73bf3491e56001b0278ff520bc65f33d5912c19c99c5,2023-07-18T18:19:45.773000 @@ -219837,7 +219837,7 @@ CVE-2023-26243,0,0,48cb445983df6e845460de44bcefe9b053ee215782ea6fb71062113286d3e CVE-2023-26244,0,0,3e14139b3a5d244c793fcf72da7c9d561b05de05bc6b4a0cc6be5180c7f30def,2023-05-08T14:15:15.390000 CVE-2023-26245,0,0,755add3a1550f5f231ae6bc72bcb3689b3591a566d528b68a135543809ea17f8,2023-05-08T14:15:48.107000 CVE-2023-26246,0,0,3968ee2416178f3373b173158130de8333d79f4b30871ec73ef61f489c3ad845,2023-05-08T14:15:42.497000 -CVE-2023-26248,0,0,1226826808b3a14467514cae889974b976a1cc373f34617329f41e9945ca0855,2024-10-25T16:15:09.500000 +CVE-2023-26248,0,1,f6694c1f6a47421d3c77d8d096bc5177fba41bbf8855e6cc201bc797e85ba041,2024-10-25T20:35:03.280000 CVE-2023-26249,0,0,67d1d0c7cd14c3e554469121f96a8b736060705fef121074c7fbb5229e25b180,2023-03-02T23:20:03.390000 CVE-2023-2625,0,0,9986d8092e79a4b295b9781284b5a771179624be994dd8d9e9634af08ab34626,2023-07-06T16:10:43.413000 CVE-2023-26253,0,0,1ae34e99a0e17ae55380be2767abcad6c3e45c70e14babf83d8ba52ebd904367,2023-11-07T04:09:31.830000 @@ -222048,7 +222048,7 @@ CVE-2023-28895,0,0,8293b592e9a4e3d7ff5660f498e452fa88192247942b9e98b172b92de9877 CVE-2023-28896,0,0,6cf7340adaa051f2b162aeee0637bb26dd756884d0d895be3c1eecd06d35c11b,2024-04-24T15:15:46.220000 CVE-2023-28897,0,0,47643bc169f81e122fe54567135c8ffad248ebf2a94a7549cc66b13ff34a1253,2024-01-22T19:53:52 CVE-2023-28898,0,0,9bdb5de24800226bb2b073b3d218d05d018daa70ee447e9eccbce6e2278211c0,2024-01-22T19:52:50.280000 -CVE-2023-28899,0,0,db80352ecb672c967d631329f885f4d8cc37a098adc9dd47f553a73bf2921861,2024-01-22T19:52:12.817000 +CVE-2023-28899,0,1,ccb5ac71c6ca96a93cce6aca86acce6a9199973c2db88d83d2dccada5278d406,2024-10-25T21:35:00.957000 CVE-2023-28900,0,0,f4c150d17d90ccf9c75225e0ce72e4003b2e8749d755bbf5f4b8444e18858d37,2024-01-26T18:10:41.627000 CVE-2023-28901,0,0,77436dae63fb3b26c51c09bf0be72d9395b6fe8e17e8158fac27e411f3fcbf17,2024-01-26T15:01:23.443000 CVE-2023-2891,0,0,789e243ec81fdf75c170a8bbb9f3b265c045a59f2af5491cf0d7b57f65905e80,2023-11-07T04:13:29.260000 @@ -224847,7 +224847,7 @@ CVE-2023-32643,0,0,d9aaa87dfc0b26a97d073d7950e12f1b9ce4ce7f2b4c69d5a00ae687ddb03 CVE-2023-32644,0,0,a354953f4dc4989b7b46cb55cf08179c3a1e29618db34fa29ce42ae9c36e21d4,2024-02-14T15:01:51.137000 CVE-2023-32645,0,0,857d6cc902eefc1d9512ca3bece7549ec7eef38c002db86a230c5d650c8de20d,2023-10-12T22:27:09.257000 CVE-2023-32646,0,0,a0e89ebe4d85458421245d42892ba840a989aa0a3ab5ac0c5b07fd3fb2b868da,2024-10-25T13:54:38.737000 -CVE-2023-32647,0,0,4e49ef2dce5500c3745634f186eda67b3ba6efb3ab14954d1408922ffebd0d1b,2024-02-14T15:01:51.137000 +CVE-2023-32647,0,1,d4be98a2699461c5cf8ecfffa4244f2c965da061cb23b2d8520d4bcc880a524d,2024-10-25T21:12:10.953000 CVE-2023-32649,0,0,22b9514becd10eb679dd28ac11c5883dd073215affaee5996a16965af56cdacc,2024-09-20T11:15:13.117000 CVE-2023-3265,0,0,471c4818cf3d140a8514e2ffc1948be656fcb1771a62c82080073ff1643bcfa6,2023-08-22T16:20:24.977000 CVE-2023-32650,0,0,bebe035dcd601dd36e4c165904cd4a21f7ee809614ac45add18da3be91ede908,2024-04-09T21:15:08.027000 @@ -227576,7 +227576,7 @@ CVE-2023-36487,0,0,4ee451a0564756ffd2f87667dd3e053ca883a586efcb5e3646d6db8c84bbd CVE-2023-36488,0,0,8a8c94d3e56d54aa8236dd81881b8fd4e3b6cf6358546f3bd01ade2f9809eb94,2023-07-07T17:17:29.997000 CVE-2023-36489,0,0,dc3b2a16fb93102da57c7283fbace2014f377f0bd7bc62fc2588a28c19875238,2023-09-11T13:36:35.507000 CVE-2023-3649,0,0,e5601b17dd56710e279a251177061f0fafab9b420c2e2a77a3dbf0de88036ac3,2023-07-25T18:20:46.537000 -CVE-2023-36490,0,1,212625366332af3d57eec534d617401802f3ed4def9de6e9a6bbc60e2168ff1f,2024-10-25T19:40:43.417000 +CVE-2023-36490,0,0,212625366332af3d57eec534d617401802f3ed4def9de6e9a6bbc60e2168ff1f,2024-10-25T19:40:43.417000 CVE-2023-36492,0,0,a6fdf1b6c1920694305ae38a0209cc3b60add5c0d6876bff239d05fef669fc26,2023-09-08T16:48:06.590000 CVE-2023-36493,0,0,0616934dcaec5abb5bed6dc7f46ba3e7e0347b94b99ba052265b2e8e478656d0,2024-02-14T15:01:46.050000 CVE-2023-36494,0,0,11b002c7660baf795f5041a7c39da6a423e11c613352f9cd1ef2e12fe703cd9a,2023-08-07T20:03:35.267000 @@ -228026,7 +228026,7 @@ CVE-2023-3703,0,0,068e0b1f7843fd3f40e1bbb100dd81035cac75a5a96efe260c2bf4520dd681 CVE-2023-3704,0,0,793d9220d2da7f9b3fa1a1422d71c1aea286d4f76d2d1332891021d1253c90f6,2023-09-01T17:12:08.027000 CVE-2023-37049,0,0,5bb9a8e44ea747874aa62b6c776677530d8780a6d693b25786035510152b5bb7,2023-07-31T18:12:44.960000 CVE-2023-3705,0,0,dd535da15bc24d4772bb9fea1dd1db9053b8e85cfda0d0123768f455a693d9fa,2024-10-02T21:35:11.020000 -CVE-2023-37057,0,1,cb4dabaa18f8952e184ff41a265048d993a683ef833689b31804b434bc233812,2024-10-25T19:35:02.943000 +CVE-2023-37057,0,0,cb4dabaa18f8952e184ff41a265048d993a683ef833689b31804b434bc233812,2024-10-25T19:35:02.943000 CVE-2023-37058,0,0,eff855c03dbccfeeb722602f8747e282673b8e0d20673a6a13b2384c9bf3aeea,2024-08-26T13:21:34.693000 CVE-2023-3706,0,0,bf0c4659730cc64b8185baa2687b08807130d9eec2e6a62373b00bff897cec78,2023-11-07T04:19:25.570000 CVE-2023-37061,0,0,ae38a5d48720b8f86c566ccc68715d9acf86f46115f38bfd0cd8f1590bd4a3ab,2023-07-12T20:58:22.373000 @@ -228887,7 +228887,7 @@ CVE-2023-38130,0,0,a4d937a40ab1906cc70a377b2965fb97adc8d21f6a7f14d60e6427d2863f3 CVE-2023-38131,0,0,f92c1cb176fd142005f4dc8e0e46e473f799f5268800d2a119ca21923a92c65b,2023-11-17T04:12:48.530000 CVE-2023-38132,0,0,2e29d7e4390895d75db8d14175ecf954c2b73938ed2c37d00fe12fa95aed044a,2024-10-08T15:35:11.083000 CVE-2023-38133,0,0,af06ef913649a6ee499e8e12b5e3cc4498907d0af745e1aa77e34a778995abf1,2024-01-05T14:15:47.027000 -CVE-2023-38135,0,1,b66dcf3e36b08e5b13174eb7fed300f364e2b75f26ae57383f7f638fe3f07136,2024-10-25T19:41:09.790000 +CVE-2023-38135,0,0,b66dcf3e36b08e5b13174eb7fed300f364e2b75f26ae57383f7f638fe3f07136,2024-10-25T19:41:09.790000 CVE-2023-38136,0,0,554f39e979a0861d4175b39a9164da3690299a760aaac82981d94d1c4d3b2c13,2023-08-03T16:56:20.357000 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000 CVE-2023-38138,0,0,f3ec9c077a05429868cf76734f4c4d6cff4d508294e155ff19fe386e5f02db74,2023-08-07T19:11:51.917000 @@ -229039,7 +229039,7 @@ CVE-2023-38293,0,0,8a3a9f3603aafbba92f85eed0067f39063fea016c09336499fe81a22b69b6 CVE-2023-38294,0,0,6642016e9c35eca41ad55d980d0ac770a91a7a4b697ceb355a9905981b081247,2024-04-22T19:24:06.727000 CVE-2023-38295,0,0,4016d9baae518bf0696b020435affdc349f967568dc7494a3b5a7127ee5a64df,2024-07-03T01:40:45.300000 CVE-2023-38296,0,0,1f7e0b083f1ca97eb24702c1e157c0da38ead63f125398b9dc376080776135ab,2024-07-03T01:40:46.110000 -CVE-2023-38297,0,0,f3b4925769f6f90cc376d3161e09dafe9ca0c7a3591573719fd3fa874dde872e,2024-07-03T01:40:46.927000 +CVE-2023-38297,0,1,8252e63d0f592b7dcb5bb032ee0e2a17a136ef8adb27f39de20b5e59c80191cb,2024-10-25T20:35:04.400000 CVE-2023-38298,0,0,debb3ed1b34bb88369bd697dc12620e2bb1654e7205a7f55c40fcc1ad550c50a,2024-07-03T01:40:47.743000 CVE-2023-38299,0,0,5e6da062082ac71d03dfb9eac5b123bdb10baafd569b1952dc362f7baad1d835,2024-04-22T19:24:06.727000 CVE-2023-3830,0,0,cb6f641473bf3274cab69477038a72d6fdbebf532851a9d48054ad057fdda1f8,2024-05-17T02:27:51.403000 @@ -229298,7 +229298,7 @@ CVE-2023-38558,0,0,41531cacb1de233098d32b79fd9efecebdba07a9595f0a633638e81ec8b2c CVE-2023-38559,0,0,f4de074d6255bba1adaf1a2af72abedea97811f23e11ff71de6632665bc659e7,2024-09-16T13:15:05.667000 CVE-2023-3856,0,0,31b604aceaf14703f21a8b47a664ff4f650adc31c83b4a1251209c844c970874,2024-05-17T02:27:54.067000 CVE-2023-38560,0,0,247e24b5ab5349d123f13aa4bc5ee89bef8684469506b9c7e635be9f6283daaa,2023-11-07T04:17:21.293000 -CVE-2023-38561,0,1,ff406c0079fec6c6ff77b3655776dbd132debe9e16a7e020eb07ce8fdc933cca,2024-10-25T19:58:38.973000 +CVE-2023-38561,0,0,ff406c0079fec6c6ff77b3655776dbd132debe9e16a7e020eb07ce8fdc933cca,2024-10-25T19:58:38.973000 CVE-2023-38562,0,0,127d1a2b630856d5538c1ca38a31578c3089871c39c5f3a8684c910dd7a424b2,2024-02-20T19:50:53.960000 CVE-2023-38563,0,0,cd5653006ddb237fe74acb1487f8018dcc309b748db7c43e87d0e1655d65393a,2023-09-11T13:39:23.730000 CVE-2023-38564,0,0,b6614995561f59800bbe304c9a4bb6f0df0678257f2d10dccc98201621f1d3d9,2023-08-03T16:48:13.720000 @@ -230512,7 +230512,7 @@ CVE-2023-40152,0,0,dcacc5b44050cb59d212435fbba4b589e052e87e87f7f380cddbb6affa05e CVE-2023-40153,0,0,68082b8d0b1cd673ce13fc831779593073884ad14dff8278795b2977ab85be34,2023-10-25T13:39:43.797000 CVE-2023-40154,0,0,0c21ee8c4fe867d7637a5b5eae7ca984d29457115dd9276ce93b2b7de45045a8,2024-10-23T14:07:44.730000 CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 -CVE-2023-40156,0,1,bfae4b687c53df49e6861b02d4b223c8701c3005138ddfe5fc25e8f5f182b643,2024-10-25T19:59:00.933000 +CVE-2023-40156,0,0,bfae4b687c53df49e6861b02d4b223c8701c3005138ddfe5fc25e8f5f182b643,2024-10-25T19:59:00.933000 CVE-2023-40158,0,0,f5c33dd671eaea6944f90c9c2dcc1f233b63eb3f3d167e9fce8fa1f154c769a3,2024-10-11T22:35:00.770000 CVE-2023-40159,0,0,f23653787b2c8d1c7ab49dff62eab2cb6aa12e31e549c1c4d79a1506883bf305,2024-09-05T20:41:09.723000 CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000 @@ -237965,7 +237965,7 @@ CVE-2023-5080,0,0,e74b710ac5ce55c8b64e5a605db4534fb958b292680076cb58f4eecbcfdcbd CVE-2023-50803,0,0,39b8457e6689f19cf0cfb42bf6f8f9bc85c44a7256b507e6e2e5e4502e82fde8,2024-06-25T21:15:51.453000 CVE-2023-50804,0,0,39f75e54eac34ee2309659a8b63ea3ce44f3663e0d436459f4acb23eb679f665,2024-06-27T16:42:15.310000 CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 -CVE-2023-50806,0,1,ecfb4db274c5901b7304546aec7b66276cb9bab5714351e0c4fb60a29c3cf84b,2024-10-25T18:35:02.050000 +CVE-2023-50806,0,0,ecfb4db274c5901b7304546aec7b66276cb9bab5714351e0c4fb60a29c3cf84b,2024-10-25T18:35:02.050000 CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 CVE-2023-50808,0,0,eb111853188ca06e9540385134be25115b61d3ae24652382189ac577efef0822,2024-10-17T14:35:01.797000 CVE-2023-50809,0,0,bc071172f4263c6ad714cd837284dbe1dad1416a743fc7cfef6ab03d74ce787e,2024-10-24T20:35:04.223000 @@ -238688,7 +238688,7 @@ CVE-2023-51786,0,0,ff2ae0afd5896bfcccd08328ace3cce896bcb8fbd8728c747c3e38d3deae4 CVE-2023-51787,0,0,32045d14c29a8e094b6fc542eae69fe0fa1d19c1ca4a4442151912591cfe915f,2024-08-01T13:45:32.003000 CVE-2023-5179,0,0,ad8ed58fdb4084553e041d0d1d973d60d06712443de8134346a8a8ead34c4da1,2023-11-14T21:29:41.243000 CVE-2023-51790,0,0,edec2966f862ac428116e4ceaa6692f22a64b8089d15af6bb6c63e0fe09db359,2024-01-18T19:47:57.360000 -CVE-2023-51791,0,0,87766c92c59658db618453044f42ccf339cd6c1b3df114431d44a1d21e1cad84,2024-07-03T01:43:19.107000 +CVE-2023-51791,0,1,c48372c11c68bd13e28ebe99871f09be432ff5dbac19be3e9f527e7b26b8feb9,2024-10-25T20:35:04.603000 CVE-2023-51792,0,0,7d8f3e64f0e3a253e4c7a397ca38ef25dc0134afeebb28d2f1443032c2248e98,2024-07-03T01:43:19.913000 CVE-2023-51793,0,0,f16336383b20e4486ab2bdbaee11737ed89ba61bef56cc3fe1951b13c7e9c182,2024-07-03T01:43:20.733000 CVE-2023-51794,0,0,3dbaa64894af93ed976ad967b8587961f3000f1e04a75da897f91d63088f107b,2024-08-01T13:45:32.210000 @@ -238785,7 +238785,7 @@ CVE-2023-51989,0,0,51a8735327f14248ca8d0313a5d951206f526a9a0bb783a1dd4c2cb5a2174 CVE-2023-5199,0,0,0c4b4db21429561c6f827c579500ed73b179e7c980e44ef0a10ef8f9113c3a9f,2023-11-13T14:45:56.803000 CVE-2023-5200,0,0,72b971c98cea6f05a4f693d3f4794fa8b7a0e4f340b5bdd498447159c844ce84,2023-11-07T04:23:35.897000 CVE-2023-5201,0,0,831a710291e333bf4b7fbb4a11835569970d38cb9f760e34952dee3499ddb239,2023-11-07T04:23:36.027000 -CVE-2023-52026,0,0,97e210a7f595754664d5ef40b6d2d6bfd47bf2efe0c39fc35540e8b01a98e106,2024-01-18T20:20:30.330000 +CVE-2023-52026,0,1,6cb981832e9863d5be1c9cc86bb455e24bd3883ad1354e0136355fe90303f375,2024-10-25T21:35:02.133000 CVE-2023-52027,0,0,193fcb4723dbc6f6df50c2a741f36f147bcc58cbe679fe018cd81ab06f835b7b,2024-01-17T21:46:49.123000 CVE-2023-52028,0,0,ca649cf6420af6a916d4ff6f573aa07e9755fff5083ddd89cad045dc95f8ab11,2024-01-17T18:26:49.623000 CVE-2023-52029,0,0,f273d8a19ed98bb890b6fbda29808d2fc4a9593a969a333209d93a879cc5dbf8,2024-01-17T18:26:18.677000 @@ -239211,7 +239211,7 @@ CVE-2023-5253,0,0,c4802b58efe25a55292e2d6161746d1a3fe4c3cf13d24e9ae30c1e6051f46d CVE-2023-52530,0,0,5dfdd9ed8b100e234def8ab6e010dd78e03325be3a4ad9ebc534334c0163f6c2,2024-10-22T15:15:04.720000 CVE-2023-52531,0,0,139c545d33ba10eb3343fe2ebed8bb6f85f222cd821926b67d690a1cf30ff498,2024-03-04T13:58:23.447000 CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbfcfe,2024-03-04T13:58:23.447000 -CVE-2023-52533,0,0,87288d9acffdcc3f04e0528abc716d93f9a78d72735b2ac13e2dfefa20c9889c,2024-08-26T18:35:02.780000 +CVE-2023-52533,0,1,fb87020ed7c8b21a162b2fc06e0a8d5d89d218140fec502190c9fad28717e9e6,2024-10-25T21:35:02.863000 CVE-2023-52534,0,0,561b04782ad233f3a992132df8769a7ea9cca6fb96df63b18027307d5770e0c6,2024-04-08T18:48:40.217000 CVE-2023-52535,0,0,a8b46149ce833cf00e265bd878fbc4e9f6f9152b7344f1759d13bc7224de07eb,2024-09-06T22:35:00.460000 CVE-2023-52536,0,0,31a4fc764ec17dfd98dd3f2041aa9cf3362d0496d5ba27ab57e1ac620a9f85cd,2024-04-08T18:48:40.217000 @@ -240657,7 +240657,7 @@ CVE-2023-6390,0,0,99adee0c0316dbc352d6c7dd50407ee58ab46369582299a48ec3ab82aa01d4 CVE-2023-6391,0,0,279a4d664d3cc69681c4bb685b5d08df2bbedc452de8b7c806828cb38143205b,2024-02-02T23:52:28.397000 CVE-2023-6393,0,0,6d7e8bbcc7e345314eca15cecd908a4e295cf26332778cc371877e22efd5dbed,2024-08-02T13:15:54.917000 CVE-2023-6394,0,0,c971446b58c68df52def3ba4e0b0341b1168864e5cc445441afb645147a69ff2,2024-08-02T13:15:55.083000 -CVE-2023-6395,0,0,22928975fd2cb0aec79b1e0c6885c122e19f10467795b989743fb94866052570,2024-02-09T02:15:08.047000 +CVE-2023-6395,0,1,8443e6b40140a1343d4aa5175d190117264f5a7f55948ccfd0af6ebe374c8863,2024-10-25T20:35:05.450000 CVE-2023-6397,0,0,d1d5980250d34b64c74909aaf2f2f695806ccb98af5124cdceac85a84cf394c9,2024-02-20T19:50:53.960000 CVE-2023-6398,0,0,d4b563a1967d392ac15e46fb555ccbbfac693780b8ec8c9f3af330461d50b196,2024-02-21T10:15:42.770000 CVE-2023-6399,0,0,8beb2bfd5e97b0504ed17bc376ae892aa6685e76e91d31d5548ef9d99d81b99b,2024-02-21T10:15:42.900000 @@ -241412,7 +241412,7 @@ CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2e CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 CVE-2023-7260,0,0,320b55d1f034809d79e51e192994ba6b2fe9aaa6c60b445d7c661747328ccbb2,2024-10-16T12:53:08.807000 -CVE-2023-7261,0,1,d82bd77293e7c621816dc935a927a719f351e834364e213cfbe4997d396227f8,2024-10-25T19:35:03.273000 +CVE-2023-7261,0,0,d82bd77293e7c621816dc935a927a719f351e834364e213cfbe4997d396227f8,2024-10-25T19:35:03.273000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 CVE-2023-7265,0,0,fb43e2fc7ead32f16ab1a40e592be4835649042e83490e66c86a7fe9f44ca4b0,2024-09-06T16:38:04.533000 CVE-2023-7268,0,0,cddf00fb75fb363308068c92d4a58df3d516324074a1a2ced29fd3b08d0ccedc,2024-08-01T13:45:52.747000 @@ -241792,7 +241792,7 @@ CVE-2024-0425,0,0,e91dce6ebce527b8da69dfce734c2ea9d1bf03b7b638b45a77c41a64a40ea6 CVE-2024-0426,0,0,6c87c27eec6bdff8726deaee2ac4006b9ca139c7f9654db9e5036f29b4032e88,2024-05-17T02:34:37.057000 CVE-2024-0427,0,0,338dfef85682a70527a72a07e776fc139be85a70c6b9744e2d313fea8de1af4c,2024-07-03T01:44:43.070000 CVE-2024-0428,0,0,59046c58c869f2e3d0a77dcd24ef034a08368b741a69e62012468daf0bcca0ab,2024-02-13T16:02:08.357000 -CVE-2024-0429,0,0,755d313659b84c93458ca09500b47ea1ea0e75803ea879d5ee6a79472a662991,2024-01-18T17:26:20.573000 +CVE-2024-0429,0,1,2792e95d00ba078e8e414f34b99fc42aaae0d0ee9f60d4dce358743700b11b96,2024-10-25T21:35:03.350000 CVE-2024-0430,0,0,0e3b82c57be127339581213e5c277f955c2c5750d48c955e5e11ffb1d4d226af,2024-09-05T22:15:03.903000 CVE-2024-0431,0,0,11b98e423cb5de69d59eb9aad00a8649a5dac28adea6147a0acd6d96a57e44b4,2024-02-28T14:06:45.783000 CVE-2024-0432,0,0,da1b603646aed06857e39bc327358cfd990ddff33e9b08d7efa5418297deeb91,2024-02-28T14:06:45.783000 @@ -242328,8 +242328,8 @@ CVE-2024-0997,0,0,40cbe7d07647cf304a8bc3bc11787b58a8f50582e3e8b65316a7ae7fa59c2b CVE-2024-0998,0,0,f7933578d5dbeb3f77563ebf1f5420d4cf36180b38c1c7cf760eedcdac974d39,2024-05-17T02:35:08.490000 CVE-2024-0999,0,0,84034800a287889c8e66f3ba01c1d930a06538aadfe1b375cfd8893390aed6f7,2024-05-17T02:35:08.593000 CVE-2024-1000,0,0,60c836cbd4d96144c97b06caa16452d33dc82172b5cc2c653a7406010f53b5df,2024-05-17T02:35:08.790000 -CVE-2024-10002,0,0,5edc9992c96bddffc59b658ba4018e947312c70ae5ecd37f00776e6aca84fcbd,2024-10-23T15:12:34.673000 -CVE-2024-10003,0,0,7ac769c9b6f213d999f9907a6b5f6a438cde86170274ef0088cef2f9496da509,2024-10-23T15:12:34.673000 +CVE-2024-10002,0,1,b8ac1697c0b5dbe076b29d09227535990b771bd408babdf1ec6b4eb8a74fb84f,2024-10-25T21:20:39.167000 +CVE-2024-10003,0,1,ef2c3c73bdb9c4390d998f61684e3cffa9d7cb4391873d2339bfd0892ebc38b9,2024-10-25T21:19:19.743000 CVE-2024-10004,0,0,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530ed3,2024-10-16T20:35:08.850000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10011,0,0,b82cad7a266ac941493a6589c7af0eff273fe2e36d28fba66b1420614eed8185,2024-10-25T12:56:07.750000 @@ -242347,7 +242347,7 @@ CVE-2024-10033,0,0,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 -CVE-2024-10045,0,1,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 +CVE-2024-10045,0,0,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 CVE-2024-10050,0,0,d8b5aaf0fed099523fa2ba7c0c86d11fc479440388170ed27b77f7313b983d74,2024-10-25T12:56:07.750000 @@ -242472,11 +242472,11 @@ CVE-2024-10293,0,0,97810b693c214de7eba440fa721337a0acab1625229c9faa2817690aeba72 CVE-2024-10295,0,0,05be2217733c9dc82e0ab847a99213d443b6eb2416a14b489bddd760491fe8e9,2024-10-25T12:56:07.750000 CVE-2024-10296,0,0,3731dd63766ea164d82646758d87e47e2e2d1ca9061034b26ec431458662311d,2024-10-25T12:56:36.827000 CVE-2024-10297,0,0,7059e1e2bb8cf8e51a328b566020cbc23abd446f188f444527bfee9442b2adad,2024-10-25T12:56:36.827000 -CVE-2024-10298,0,1,a0e9f6b5e6c68ad8ada3edbba009974fda145ba113b49020fdab65d252296669,2024-10-25T18:51:44.370000 -CVE-2024-10299,0,1,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9cb42,2024-10-25T18:51:17.047000 +CVE-2024-10298,0,0,a0e9f6b5e6c68ad8ada3edbba009974fda145ba113b49020fdab65d252296669,2024-10-25T18:51:44.370000 +CVE-2024-10299,0,0,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9cb42,2024-10-25T18:51:17.047000 CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884fe0,2024-05-17T02:35:11.737000 -CVE-2024-10300,0,1,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000 -CVE-2024-10301,0,1,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 +CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000 +CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 @@ -243127,7 +243127,7 @@ CVE-2024-1690,0,0,43710398ffbfd97fd2d2298464d22f4652f5075ca69bcdcca56d9f56aad3c2 CVE-2024-1691,0,0,2ef9826de93209d069c81e6ab358d8eb246774f7a80e6c411cef0c396fac265e,2024-03-13T18:15:58.530000 CVE-2024-1692,0,0,e629a44d67e992e57af157f5aea9a741f288cdc07f581fddcf0fc8e93b27323f,2024-04-01T01:12:59.077000 CVE-2024-1693,0,0,7d3cbcfec88fed9681b32070817b963b8ddcb473d92ad7474c8d67a492ce3782,2024-05-14T16:13:02.773000 -CVE-2024-1694,0,1,4e4bca9b1ddbeb95cb8c742cbf6cbd0b885366c38f0d6f8f8d4aaf7488401fd4,2024-10-25T19:35:03.987000 +CVE-2024-1694,0,0,4e4bca9b1ddbeb95cb8c742cbf6cbd0b885366c38f0d6f8f8d4aaf7488401fd4,2024-10-25T19:35:03.987000 CVE-2024-1695,0,0,040d25b8839514ef94a30e51fac7a9ab85a44004216413bd5b5709553eab9e32,2024-08-15T19:35:04.110000 CVE-2024-1696,0,0,a663827cac86b281a6bafba3681725496e03564ad841117e5d12a480311031fd,2024-03-12T12:40:13.500000 CVE-2024-1697,0,0,122d0b7b2464b5cdb9c8634ff2a556f4e654f017fc1c1b4f9f5a42e2fdd2fc2b,2024-03-25T01:51:01.223000 @@ -244868,7 +244868,7 @@ CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000 CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000 CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000 -CVE-2024-21741,0,1,276c90d557a1ddbd7ef0f820219f4441d781301bc74a468f8ee48dc1b2e4d8b9,2024-10-25T18:35:03.493000 +CVE-2024-21741,0,0,276c90d557a1ddbd7ef0f820219f4441d781301bc74a468f8ee48dc1b2e4d8b9,2024-10-25T18:35:03.493000 CVE-2024-21742,0,0,fae1ce375f3fcebe0111b56738c6b02117d77d438c12e42f2ce0251b9cb2427c,2024-02-29T01:44:04.040000 CVE-2024-21743,0,0,0796f228a255a8494ca4bcb581e49158cafa8b24400e4f1dc60b4a4d36771963,2024-09-20T12:30:51.220000 CVE-2024-21744,0,0,2932a891b0379b8b90b4b42aa5b769696f0f306f989668b0b1182de9207b4937,2024-01-11T18:45:53.040000 @@ -244944,7 +244944,7 @@ CVE-2024-21824,0,0,7aa5726f0c5574af74e9f5a3cf3ffd6696b10e95ff2f5e13938ce9966974f CVE-2024-21825,0,0,d4fc704324754f387b029d9f0684cd28f1fe50758fd7d66af26180f7c807a125,2024-02-26T18:15:07.390000 CVE-2024-21826,0,0,e4665c6424ea4b61934e3bcd1ab7ddf62869802487f99534f2a3f3dd7a0149b4,2024-03-04T13:58:23.447000 CVE-2024-21827,0,0,8263bac5597e4519006a0d1acc911f20f09ec3c50860f85a35f4c00493288d2b,2024-06-25T18:50:42.040000 -CVE-2024-21828,0,1,0198d53936750e8cf0a58e2c2aae43911345deb4d12d37a3a779e588c3b4ab30,2024-10-25T19:35:04.160000 +CVE-2024-21828,0,0,0198d53936750e8cf0a58e2c2aae43911345deb4d12d37a3a779e588c3b4ab30,2024-10-25T19:35:04.160000 CVE-2024-21829,0,0,baceae2e87b9c4b6697075d910bfce042bad89e889f8ed957911e0763d7f587d,2024-09-16T18:03:16.707000 CVE-2024-2183,0,0,b1a8bdb0521ceaa401c4ef49664ed1eca0fdb532f6e98da751ce529fa93d2e00,2024-04-10T13:23:38.787000 CVE-2024-21831,0,0,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000 @@ -245058,14 +245058,14 @@ CVE-2024-22010,0,0,48bb31cd9fda5132d6bf173e5f25a90e9963e9143797f12960e4a1affd527 CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000 CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000 CVE-2024-22013,0,0,7f532e6900797141a60e66fca5bd8ac368c382be95753f2e15222fe6285acb11,2024-09-20T12:31:20.110000 -CVE-2024-22014,0,0,c5bff26c435087f5079304a805aa4d4c0115cfcca173e494a6205154db70b18c,2024-08-22T21:35:02.417000 +CVE-2024-22014,0,1,b059d091724833d1bb51d32eadbd1be8dce585949d29de43319d8d8ddaed06d9,2024-10-25T21:35:05.193000 CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000 CVE-2024-22017,0,0,bd2434479505f25ba61ded39e252a137caec1b8140356d38e69aae2c52d440c2,2024-08-15T19:35:04.510000 CVE-2024-22018,0,0,4fae4a09ff6c97462c219a17730a6b02641ce527ea4e228be02726c5015758d3,2024-07-19T14:15:05.763000 CVE-2024-22019,0,0,5ea5d0f669fc75d99f03776806b9fffc572153dc1c8ef34725dc8bf55b3cedce,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,07ee8ffdc3e2c6571649a2da17705092fde8ccafb25f9e28d35a275c632c563a,2024-03-25T01:51:01.223000 -CVE-2024-22020,0,1,b8b8fb44696fc1f3b47b955eac0aff79a4a0b20e8a4ef5f07ba12dfc66d0b5d4,2024-10-25T18:35:03.697000 +CVE-2024-22020,0,0,b8b8fb44696fc1f3b47b955eac0aff79a4a0b20e8a4ef5f07ba12dfc66d0b5d4,2024-10-25T18:35:03.697000 CVE-2024-22021,0,0,638048027337936cbd408ce99df3409e0af8fc4be0132d034339cad92c33270d,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,520151bf342f8e1b6d0df34d3bdc80dc16c1dfc15f7f487e84d9dadfaf67b99c,2024-02-15T18:45:30.887000 CVE-2024-22023,0,0,11d74a9331c831e739405cc0841308e5bee17f7f9ac670af4c4e9f14b6af019b,2024-10-03T22:35:01.533000 @@ -245610,7 +245610,7 @@ CVE-2024-22807,0,0,a580199af0b24a15f866ec5a74a185471ee1f26b8c57c1b2fc09fc1c09da3 CVE-2024-22808,0,0,b7a5aa8a22094453a9d6da6ca906feec6515eab5ea3c97e56f8c2898e1e92f7b,2024-07-03T01:47:24.097000 CVE-2024-22809,0,0,afebd17c1e8cd42b36ec9ebebc6c487b6a24e5a21164f1b103a87d2176ee2be1,2024-07-03T01:47:24.930000 CVE-2024-2281,0,0,28a6d2bb7defeefe319d72043b7fcc81c0375947843422843f06e67ba4c7d837,2024-05-17T02:38:08.820000 -CVE-2024-22811,0,0,7fd67adbf482683e7c42965a6d24dc2241e5261fbe35e982d93c2d300a43b572,2024-07-03T01:47:25.797000 +CVE-2024-22811,0,1,d2a6c53ff50cd65e035b8dda373cf7a4191f5c237ac900101315251c1673860e,2024-10-25T20:35:06.727000 CVE-2024-22813,0,0,d84c3545183972fb46dbe44d2e2d57fc4a1c3e486bb78d857906c2011155d504,2024-07-03T01:47:26.623000 CVE-2024-22815,0,0,ee087337930e11018ffcef6c1087bd381adf7141f63872cbdf5df42f054b9f7e,2024-07-03T01:47:27.470000 CVE-2024-22817,0,0,9254c7bc85037f18bba34556a6d50036973c87b51bc4035413db86469ed7e955,2024-01-23T14:23:18.990000 @@ -245627,7 +245627,7 @@ CVE-2024-22851,0,0,bca50b43839bb5a9440c8cbeb408fd89f180d58427aad27d09e9a965c6eb8 CVE-2024-22852,0,0,8ae9b682c67cb845884ddd035899d91b91d18dec5a1d45bf6dc8c5eb275039b7,2024-02-13T18:16:51.790000 CVE-2024-22853,0,0,bc89e715c02ccddcdd7224ca8b312fb06ea03063bc4da2eba5ae6389033cf42c,2024-02-12T17:50:31.950000 CVE-2024-22854,0,0,fe4766229122c652e0af3232fbea71e93fb7b09fb4336c021b2a5471e8b1a0a8,2024-08-16T18:35:04.633000 -CVE-2024-22855,0,1,8ee1e01d04ee73e5ce31c7f7bbb3f977167c1250df872de067e1d7cdf4762aa8,2024-10-25T18:41:33.187000 +CVE-2024-22855,0,0,8ee1e01d04ee73e5ce31c7f7bbb3f977167c1250df872de067e1d7cdf4762aa8,2024-10-25T18:41:33.187000 CVE-2024-22856,0,0,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000 CVE-2024-22857,0,0,90837a66d9e6be33e61afe64f3e09fe9073b2ba728f4bd27a877f40b8e8bec96,2024-08-27T20:35:09.263000 CVE-2024-22859,0,0,c789fd1319ae29200cfda38411ba15b951620161f2106b97557558350eee1281,2024-08-01T23:15:38.057000 @@ -245707,7 +245707,7 @@ CVE-2024-2306,0,0,dba4619c77c06715e90d6a0a9c40f646be88098100eb784089d749ef57adff CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000 CVE-2024-23061,0,0,4bc85ee93751bdf2ecee1ac20f811b6d9a6f53cf85093d58751326cdb25cc0ec,2024-01-18T15:18:14.357000 CVE-2024-2307,0,0,6e1c015f3d6c569a19e33c3b29b1ee5858f1aa7b73f614547925fd730d9ad323,2024-05-22T17:16:14.610000 -CVE-2024-23076,0,0,8b4a3aa99e4b0016eb04a2f21af25c778dfbd8defa93aacee4f93410e13a8292,2024-08-22T19:35:12.810000 +CVE-2024-23076,0,1,9cc2c28cefabea273070bf7e7250bcdaeefdd0b641f60be2a4ba85c81952af87,2024-10-25T21:35:05.413000 CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4456,2024-08-21T14:35:02.117000 CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000 CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000 @@ -246240,7 +246240,7 @@ CVE-2024-23705,0,0,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768 CVE-2024-23706,0,0,babe5ff56a1d4a28f81247fdfc7205f6cd9fa2ddbe2826f5bdf18ddb36d0d2f0,2024-07-03T01:48:01.407000 CVE-2024-23707,0,0,de06c54b01b50c7ee8eaf57e83c8e50f0519388a760daadedf65fa62d4cccb8c,2024-07-03T01:48:02.287000 CVE-2024-23708,0,0,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68d06,2024-07-03T01:48:03.097000 -CVE-2024-23709,0,1,6083bf0f0d1ceb0cc50a3d0ad67764af70d38b4988ab6d8b3fcba635f794c892,2024-10-25T19:35:04.277000 +CVE-2024-23709,0,0,6083bf0f0d1ceb0cc50a3d0ad67764af70d38b4988ab6d8b3fcba635f794c892,2024-10-25T19:35:04.277000 CVE-2024-2371,0,0,c0989400ce8a0213fb359b764ed40ca0a5e234cbe2249418689e4cdb3beac647,2024-03-12T12:40:13.500000 CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 @@ -246288,7 +246288,7 @@ CVE-2024-23762,0,0,dccea0d0f4f72e935db3cd4738ae0afc7e81200fb78885cb904f8f8d8505b CVE-2024-23763,0,0,fd6bb7068b643be895795866753868b545c9ff02dc3b3575d3900d3b7ddc29be,2024-02-15T04:49:47.153000 CVE-2024-23764,0,0,e6776799806671e89b40fb29cea011f49ce6380839da8b1fc02e631b1db62327,2024-02-15T17:57:25.633000 CVE-2024-23765,0,0,06c410fc3cf16eeddff78c760088188768ab51319095babe2779c4b543e1454d,2024-06-27T12:47:19.847000 -CVE-2024-23766,0,1,5f5a0ec5e5d0bbb4ae98974aaf53d329daaf5cd414e4b4f2a2a0e897689a4b74,2024-10-25T18:35:03.847000 +CVE-2024-23766,0,0,5f5a0ec5e5d0bbb4ae98974aaf53d329daaf5cd414e4b4f2a2a0e897689a4b74,2024-10-25T18:35:03.847000 CVE-2024-23767,0,0,6f43d09d7d5e03bec0de213ab6d6435f3d55689189694bafd3c00cc2823ce4ac,2024-07-11T15:05:27.593000 CVE-2024-23768,0,0,cfab380f6caada116bf310137e7bf68190f1658747da2207737dea42a2db4a9c,2024-01-26T19:15:05.400000 CVE-2024-23769,0,0,dda5f503e252df13be658288b8df8a7c295023d6b8d6a36e330610bd6bb10025,2024-02-15T15:40:20.690000 @@ -249881,7 +249881,7 @@ CVE-2024-28798,0,0,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a52481 CVE-2024-28799,0,0,7b5116d22118620746e99fb01d2c120abfeb878a1b857004ae9b1cd3fd81fff2,2024-09-21T10:15:05.253000 CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9d1,2024-07-12T16:55:30.137000 CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000 -CVE-2024-28805,0,1,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000 +CVE-2024-28805,0,0,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000 CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000 CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000 CVE-2024-28808,0,0,e2707d0256028ba4fdef94248719fe3b54bec857fab5ab8ef9c9d36dc0c8edcd,2024-10-04T13:51:25.567000 @@ -249895,7 +249895,7 @@ CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af CVE-2024-28816,0,0,75a949219f8a896ffef945213a1610d3de2a2cf64da977b1d4287b567e2864da,2024-09-06T17:35:06.960000 CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000 CVE-2024-2882,0,0,ac3db032a55af245aeee4f2522d2c10c01bd50b8ed58cf00aeea2dd39d0cf75d,2024-06-27T19:25:12.067000 -CVE-2024-28820,0,1,0570fa594a35dba860ba454a62deb89787849f22b04a2bbfc96e6ee6293fe6a9,2024-10-25T18:35:04.300000 +CVE-2024-28820,0,0,0570fa594a35dba860ba454a62deb89787849f22b04a2bbfc96e6ee6293fe6a9,2024-10-25T18:35:04.300000 CVE-2024-28823,0,0,637bac634141463600503c91e4b5796abd8273b1efd793dd400cf02a2e3fa972,2024-03-11T12:47:42.653000 CVE-2024-28824,0,0,eef4aea08ae10a65f9268e3694b2e67d70c352841b8880eff507640248495160,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383f90,2024-04-24T13:39:42.883000 @@ -251400,7 +251400,7 @@ CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000 CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000 CVE-2024-30802,0,0,1376f3b4e3d1d6ed6e73bef87767a1a17df2d57663c8be14203281e52f5ae9c3,2024-09-06T23:35:00.597000 -CVE-2024-30804,0,0,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000 +CVE-2024-30804,0,1,dd10458412d3521d15e3678824d59c04de028b22e6295f81ee6095b0ff10efe7,2024-10-25T20:35:07.267000 CVE-2024-30806,0,0,d64ba375e8a4aee4aa1348cdd3ca4e1493d138147be36aa2ff70b6291ff84259,2024-09-04T16:35:07.870000 CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000 CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000 @@ -251778,7 +251778,7 @@ CVE-2024-31325,0,0,a9bcdbd792a6ed8c686901e49872aa0bea6152484f11f86c22b43dfd437d3 CVE-2024-31326,0,0,97d123c2aa1e1e9a7489aadcba3a4341ca3ee3d2d31afc6659975d4411771d64,2024-08-19T16:35:12.080000 CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000 CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000 -CVE-2024-31331,0,1,1e74e89a9634cca12a894d6fde78d348f2e1f0a48ba44578aea7a1fe82acc729,2024-10-25T18:35:04.490000 +CVE-2024-31331,0,0,1e74e89a9634cca12a894d6fde78d348f2e1f0a48ba44578aea7a1fe82acc729,2024-10-25T18:35:04.490000 CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000 CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 @@ -252220,7 +252220,7 @@ CVE-2024-31990,0,0,72cb5cc313e4561a05fc6fc85ec9ccda61e5a6eb3e7e23249a97cf8d4c46c CVE-2024-31991,0,0,e0b67c6835ae7078f05f5ffbd42a809f9c19aebd3ea8ac6a5ca8acc810f57775,2024-04-22T13:28:50.310000 CVE-2024-31992,0,0,37118cd26e9418699402e7004b2b0a2514cbb927a1eb33ec749eb997567a656b,2024-04-22T13:28:50.310000 CVE-2024-31993,0,0,0e8bafb998d558fb89ad7c62802dae18f3e9fbe2d7e3203cb2593213fe9353a4,2024-04-22T13:28:50.310000 -CVE-2024-31994,0,0,ef8c765927c65a562013951aca165202b1642f8ed98e51d4ed20c9cdc3fce570,2024-08-15T16:35:08.717000 +CVE-2024-31994,0,1,b6431ba9eb98a129f7ea944227dac9ddb97bf9b9d2004f094a695efb8594f8e9,2024-10-25T20:35:07.467000 CVE-2024-31995,0,0,602bd03775c89a6cb4e10470ceb1298f833e8948d6090002643943868c01e068,2024-04-11T12:47:44.137000 CVE-2024-31996,0,0,d4a1c5956655b3691b734adb2cb789f7840abf7ea392691d056f3eeb40cd8aea,2024-04-11T12:47:44.137000 CVE-2024-31997,0,0,e22174bdf45016db847f83f67a9d66c204301d7e1d4c9d7c29d7666820ceb71c,2024-04-11T12:47:44.137000 @@ -252364,7 +252364,7 @@ CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d80 CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000 CVE-2024-32210,0,0,3e183c290a7a863cff98e9adea9bcd14a8de15a40933b2aaf5b4f479fa7592bc,2024-08-01T13:51:22.850000 -CVE-2024-32211,0,0,84e4b5826602163d039517450331f03278990516e0626af786de559d752b5412,2024-07-03T01:55:51.973000 +CVE-2024-32211,0,1,aa195dd193eb4e530718e0b969ea65b90297cc78c0148f8cf43fbb0bea1c8636,2024-10-25T20:35:07.747000 CVE-2024-32212,0,0,f6aba6b5a0388dc6cc8b07b61804546c09da8a05399de65b74351bf95fbbbb88,2024-07-03T01:55:52.740000 CVE-2024-32213,0,0,41eb62ef3b9a2dab94a557aba3b39a317eb9e5981c9ad6e215d6c756107a42bd,2024-07-03T01:55:53.503000 CVE-2024-3222,0,0,57632d7e58038bae9be25dcea3482f307de0a31f331213554dd2d325ef21099b,2024-05-17T02:39:47.540000 @@ -252389,7 +252389,7 @@ CVE-2024-32281,0,0,2089769d5a8dd576a3c4cba2a6d21b0b986a7a5b7c0a620f0513ace1e68a0 CVE-2024-32282,0,0,643e4b9de6b86730118a9854bcd19cfc42c613c79fb4335a0a79f4c595ca1f48,2024-08-01T13:51:24.047000 CVE-2024-32283,0,0,c72ca6989168ee21133166c85a18b30a403543bd2802d4602b360f26e8ac9c38,2024-07-03T01:55:58.170000 CVE-2024-32285,0,0,26a90aae98bf009c1cc0ed27f6e4157872c7ccd590e843e6831096733dd28188,2024-08-01T13:51:24.843000 -CVE-2024-32286,0,0,1db83aa9b55edb8231744756cf042cd8c4416ff23dccabd1d06f4f496f58980c,2024-07-03T01:55:58.927000 +CVE-2024-32286,0,1,624b2cc881438f2646ca5450553e096f34764fc1c63d36b62df648cb96b48ca7,2024-10-25T20:35:07.950000 CVE-2024-32287,0,0,932347149029d6eabd46a68bc6a82fe6d2945f3ac8f01e10c1833424637fa873,2024-07-03T01:55:59.670000 CVE-2024-32288,0,0,7055160525b404850576c1742924748c1165c5d71099b65aab18ff60fdfe9b17,2024-08-01T13:51:25.653000 CVE-2024-3229,0,0,a686f59b7de8883a045334c433d61077a26800fc92a6d32c4cec468053294836,2024-06-20T12:44:01.637000 @@ -252399,7 +252399,7 @@ CVE-2024-32292,0,0,7d196aa8ee2ad410c3e453bbba317943102958b600dd9e6a6c1d957762e0e CVE-2024-32293,0,0,61cbc01dc494d7da31f3709d1c0e3e6ca7041194baefdcbd78260ef3c407b59f,2024-08-01T13:51:26.453000 CVE-2024-32299,0,0,d0a23aa31c0a2313e06327805357771e661b42ede7c77d86066b4cb57786b994,2024-07-03T01:56:02.733000 CVE-2024-3230,0,0,eecee83995bffa0c7057e3fda1f43ad336332e5244900dd85e5490610f2a522d,2024-06-04T16:57:41.053000 -CVE-2024-32301,0,0,4d4519a12ab144b213a6b233124e45a37b5f8337a2689aea47ff3693c4ac9546,2024-07-03T01:56:03.403000 +CVE-2024-32301,0,1,0c0ebf0edbfb8781cf3c608cb1c32e3b8289cc4b1242588359512d2fce94904f,2024-10-25T21:35:06.520000 CVE-2024-32302,0,0,bd1ac90688cfcc6be84f8824a7ca0d43ddb624d319b101804bb272446e0e3b78,2024-08-01T13:51:27.897000 CVE-2024-32303,0,0,f0bc1654c3d620aa1be591d810cc4b864298fb65d4403b208969a299da948b54,2024-08-01T13:51:28.717000 CVE-2024-32305,0,0,54019115d1050a8e7a6d5cd1d49afa66fdb4c41b3a834537b9695d1e6b1d3b78,2024-07-03T01:56:04.160000 @@ -252462,7 +252462,7 @@ CVE-2024-3240,0,0,e61f4b77912675383d7d032b658b78735a120d07550c32644110f1bc804101 CVE-2024-32404,0,0,eb80f6787a363279634a5db4d277d494ac5dc1f2539325374b050a4c28b7d13b,2024-07-03T01:56:30.957000 CVE-2024-32405,0,0,bc9991f960c5c51d23d0756dabed902418fdca4bc0036a9a8f03079b2256af7b,2024-07-03T01:56:31.770000 CVE-2024-32406,0,0,73ac1f19b303163472b3c975415e4f499599d5740977837d587aebd96ab50699,2024-07-03T01:56:32.550000 -CVE-2024-32407,0,0,fbfaf7068ca597095592e38589ff8309655659ac5408bc5050ead219b55bbfea,2024-07-03T01:56:33.310000 +CVE-2024-32407,0,1,1df6d28e3ee9d38677711ef2283005c5e1de5158402682dbc25b6fec25c334a2,2024-10-25T20:35:08.740000 CVE-2024-32409,0,0,6ab92e40fc5e6ae8f6002eb3cc0277e6ffae2eb1ca20e07c184697681f83d11f,2024-08-01T13:51:32.040000 CVE-2024-3241,0,0,30b752b6ef5f38382b5d572e3de76b73f3f6fe3c9ee69699b564850e70a0c6b3,2024-05-14T19:17:55.627000 CVE-2024-32418,0,0,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000 @@ -253205,7 +253205,7 @@ CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48 CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000 CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000 CVE-2024-33374,0,0,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000 -CVE-2024-33375,0,1,de8e1352d7131bede7a3e7df21528b3c50d741bdac0f3347d0114838c7b14af2,2024-10-25T19:35:05.053000 +CVE-2024-33375,0,0,de8e1352d7131bede7a3e7df21528b3c50d741bdac0f3347d0114838c7b14af2,2024-10-25T19:35:05.053000 CVE-2024-33377,0,0,5c66eca70fd229829a7599a954669068b1cb2c9f37ae66f1e849ed753dd8febc,2024-09-06T17:35:09.517000 CVE-2024-3338,0,0,b2327c11e1d762220f8764f83498076a393d83520a65cf1a3ec9854d72e0d01a,2024-05-02T18:00:37.360000 CVE-2024-33382,0,0,dc1b896c815bbb6d05d98ce7170409486d331681fef4f2caee5818b69d11fbd6,2024-05-09T13:05:45.620000 @@ -253480,7 +253480,7 @@ CVE-2024-33774,0,0,6f292020d7adae9637fe533dad1837a596af7348622d3ee140dd37eaf1c8c CVE-2024-33775,0,0,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000 CVE-2024-3378,0,0,8befaa6be8f3b8c8430cad46a1e49c322e7c667fd428df502463d5be35761acf,2024-06-06T19:43:40.377000 CVE-2024-33780,0,0,c16faa38fa2e3cb315427d6e5330ce2610c63349f4a81ec54bc650473e873a60,2024-07-03T01:58:44.400000 -CVE-2024-33781,0,1,f25247eaf0d169b3289142514410c6853680fdc2b7e71bcacdd07bcc75733002,2024-10-25T19:35:05.260000 +CVE-2024-33781,0,0,f25247eaf0d169b3289142514410c6853680fdc2b7e71bcacdd07bcc75733002,2024-10-25T19:35:05.260000 CVE-2024-33782,0,0,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000 CVE-2024-33783,0,0,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000 CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9f9d,2024-08-01T13:52:06.273000 @@ -253876,7 +253876,7 @@ CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70 CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000 CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000 CVE-2024-3432,0,0,e551b49681f8859ae36cb659ecb1c23b498009c34da11d9120924e791a83c404,2024-05-17T02:39:55.693000 -CVE-2024-34329,0,1,41a7f5395746b238b78024ca151752d8fbac15716c701f047eb67a43590b2636,2024-10-25T18:35:04.677000 +CVE-2024-34329,0,0,41a7f5395746b238b78024ca151752d8fbac15716c701f047eb67a43590b2636,2024-10-25T18:35:04.677000 CVE-2024-3433,0,0,edcd29ee74449d6852e66c4b5448756dccce5e71a9bad9a5025cf08aebadb09b,2024-05-17T02:39:55.780000 CVE-2024-34331,0,0,e9e9c5dfb1f97d7d959d603e7ca8311b7235683652ebe96931c8c00fed413160,2024-09-26T13:32:55.343000 CVE-2024-34332,0,0,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000 @@ -254239,7 +254239,7 @@ CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0f CVE-2024-34721,0,0,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b7e5,2024-07-11T13:05:54.930000 CVE-2024-34722,0,0,cf8aa681488fcb61e6053338c1005fbdb8a07b1c3e2be30881c9597f7f06ab3b,2024-07-12T16:11:37.803000 CVE-2024-34723,0,0,9ee1e9ea0079333d8123e1479d0c1b548d28a892d3601137f6e64ded9880a7ff,2024-07-12T16:11:38.633000 -CVE-2024-34724,0,1,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d94441ca,2024-10-25T18:35:04.870000 +CVE-2024-34724,0,0,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d94441ca,2024-10-25T18:35:04.870000 CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000 @@ -254586,7 +254586,7 @@ CVE-2024-35304,0,0,6034918ad52f93d1da2bc26a38d2a41af1cec6e4b2633afd9a4c11faed3e6 CVE-2024-35305,0,0,e31f5a2153df0748351b63d3b29145f978c7628ebc2659ea3282a1f078dca5e0,2024-06-10T18:06:22.600000 CVE-2024-35306,0,0,ad90645c7ad3fc3d00a11af0348fe264fd3520d218ef28c934a8abfa42cbedb9,2024-06-10T18:06:22.600000 CVE-2024-35307,0,0,b73247d3e5b323866c011ccf7e1f39f41293535811b1ef82260b19c7e0a4c21f,2024-06-10T18:06:22.600000 -CVE-2024-35308,0,1,6321cc28d6dd78c933cd913b6aa72a191bb42ebafe4f0197b96f22ae54b8e1a2,2024-10-25T19:06:14.100000 +CVE-2024-35308,0,0,6321cc28d6dd78c933cd913b6aa72a191bb42ebafe4f0197b96f22ae54b8e1a2,2024-10-25T19:06:14.100000 CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb071134,2024-05-17T02:39:59.430000 CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000 CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b3e3,2024-05-20T13:00:34.807000 @@ -255172,7 +255172,7 @@ CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000 CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000 CVE-2024-36036,0,0,7da0ef0412625002a493959e0f4b9d5a2d61be8a7aa9a2a45b491bb215f046f7,2024-05-28T12:39:28.377000 -CVE-2024-36037,0,1,38e293cc8c09dc94fd987a33e5a092088fcec9402eddbf56938ce37dd2a7c640,2024-10-25T19:35:06.023000 +CVE-2024-36037,0,0,38e293cc8c09dc94fd987a33e5a092088fcec9402eddbf56938ce37dd2a7c640,2024-10-25T19:35:06.023000 CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000 CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db70a,2024-06-24T07:15:15.230000 CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45cbd,2024-08-01T17:39:33.907000 @@ -255545,9 +255545,9 @@ CVE-2024-36537,0,0,5f930f9ed55795838127e0e3777c1d69912524f2615f541a92461ae3dca81 CVE-2024-36538,0,0,2c2f89c6add65eaa7fe73370f2b6ea6e66fa3976602a2c3fae08fdc086d59130,2024-08-01T13:53:02.957000 CVE-2024-36539,0,0,4a0be599c84b4fdc4a373e9fea743448da6ea5dfc7c56ce644077bbc1d54be9e,2024-08-01T13:53:03.723000 CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000 -CVE-2024-36540,0,1,de534e526837cb522fb82cf562565010fe73cf9fd1bef920aea8b6c454f1800b,2024-10-25T18:35:05.643000 +CVE-2024-36540,0,0,de534e526837cb522fb82cf562565010fe73cf9fd1bef920aea8b6c454f1800b,2024-10-25T18:35:05.643000 CVE-2024-36541,0,0,b5291ecad28b9af4ed1704c2ed0f9af422de7d38da1fbc69723e312c6c52ab9c,2024-08-01T13:53:05.347000 -CVE-2024-36542,0,1,dc63b890116e2af8ac1d66c7a9bd57fd6a0a3a86d9dc76224890314ebd97a04e,2024-10-25T18:35:05.827000 +CVE-2024-36542,0,0,dc63b890116e2af8ac1d66c7a9bd57fd6a0a3a86d9dc76224890314ebd97a04e,2024-10-25T18:35:05.827000 CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000 CVE-2024-36547,0,0,1b4cc0318f47a7d1f45dacca15d9b24343df7af637add62667d3afc6feef36f0,2024-08-19T17:35:18.467000 CVE-2024-36548,0,0,e144d04945e12f1b5c400dc40c85f1ddfbf9c8356b7dd5897c3f62cd196828a6,2024-08-19T16:35:18.257000 @@ -256022,7 +256022,7 @@ CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000 CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000 -CVE-2024-37289,0,1,c2aed8b5e160df798b39cb68c5926e3d1a79953e1858659f2c8710785015aa57,2024-10-25T19:35:06.150000 +CVE-2024-37289,0,0,c2aed8b5e160df798b39cb68c5926e3d1a79953e1858659f2c8710785015aa57,2024-10-25T19:35:06.150000 CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000 CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000 CVE-2024-37294,0,0,b35339309cfb6110892ba6e3580c3b860149dc89948cc54efd20172fbcf6cac8,2024-06-13T18:36:45.417000 @@ -256241,7 +256241,7 @@ CVE-2024-37565,0,0,e464b9f5d1b6751d8f05b2f30904029569bd814d202d52a27f0ddb9877153 CVE-2024-37568,0,0,f2cf556c58317250bc2c2e32d55d7d2250f892a6ccdb5a364803d78d5a6c2fd9,2024-08-15T16:35:12.900000 CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000 -CVE-2024-37570,0,1,3d4360fa9467e8eab1b52b173ed2069d0c82ea4d63ef454bbfc16c6908108d82,2024-10-25T19:35:06.277000 +CVE-2024-37570,0,0,3d4360fa9467e8eab1b52b173ed2069d0c82ea4d63ef454bbfc16c6908108d82,2024-10-25T19:35:06.277000 CVE-2024-37571,0,0,67e7b2412f8af956bea28aab4c57aae5f7e196be8f9b19162aa5c75b5cf90c89,2024-06-27T12:47:19.847000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 @@ -256261,7 +256261,7 @@ CVE-2024-37630,0,0,b73fafa23f6f8f8d3f613797e56521f00b8303c2808cdb99d411fdd5c8f71 CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74926,2024-07-03T02:04:24.127000 CVE-2024-37632,0,0,d01b52b8e66490156eb3a16ca33b4814211737a83815b462a53e59e26de8e387,2024-08-07T16:43:37.570000 CVE-2024-37633,0,0,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000 -CVE-2024-37634,0,1,4081cc7ab580a9299c7ffef215ba137926eeb6d1f981e2078cdbabf89132ed38,2024-10-25T19:35:07.043000 +CVE-2024-37634,0,0,4081cc7ab580a9299c7ffef215ba137926eeb6d1f981e2078cdbabf89132ed38,2024-10-25T19:35:07.043000 CVE-2024-37635,0,0,bc407e83f05b7c8f9bd8802eae4a82a8e6966063def27bcc1e49acc27f521f01,2024-08-13T15:35:11.883000 CVE-2024-37637,0,0,4382c3c11477cb9c0c98c6b36d4d6a080861c8e7a12e5a542c24ab931706be1f,2024-07-03T02:04:26.567000 CVE-2024-37639,0,0,faac05558a999374b477194ccded752579ad2da62ef52225a1808c93fa007076,2024-07-03T02:04:27.370000 @@ -256275,7 +256275,7 @@ CVE-2024-37645,0,0,34d8cced57780441610f62d6af434c6d9470f47af1755e23758fa357fcc20 CVE-2024-3765,0,0,c051b63b3dec9d4081d844e4544651061bce58c568511d432e52d12af5fb8047,2024-05-17T02:40:06.923000 CVE-2024-37654,0,0,7407bd364d22c8dcd819097303b9dde5a80019ad44dcc6e140b90521c8753ce7,2024-06-24T12:57:36.513000 CVE-2024-3766,0,0,0b2c4eb9631c7021b81225c2fb00e637faa5f43f79bca7f1f91ab6ad96dfad12,2024-06-20T16:15:14.380000 -CVE-2024-37661,0,1,c74e63bb441fb8171e408570fea34647bbe045e761d33fb25f185e1128ad10b0,2024-10-25T19:35:07.220000 +CVE-2024-37661,0,0,c74e63bb441fb8171e408570fea34647bbe045e761d33fb25f185e1128ad10b0,2024-10-25T19:35:07.220000 CVE-2024-37662,0,0,bb6f8e7d075ce8cc2661f5a874a4a5a881cd67a10164dc149927e6fe92640579,2024-08-14T14:35:29.050000 CVE-2024-37663,0,0,01b3999a296dc990f7de7601c48f66af39da90c049c2b0eec4443d6e5080ce32,2024-08-01T13:54:09.780000 CVE-2024-37664,0,0,262d89efd9586f8d9685582ca4f4936d4d0dff4dc96c611162b38556aa6e87b4,2024-08-01T13:54:10.727000 @@ -256346,10 +256346,10 @@ CVE-2024-37831,0,0,84d591b6c62e8531ddd444b16a032f0bcaaa039fd0dd2bdc2becb030b994a CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 -CVE-2024-37844,1,1,496b512bef97f12eeb3644f6875825f2babb3858bb5fa5b7bffaf9db215b4234,2024-10-25T19:15:03.897000 -CVE-2024-37845,1,1,e98c32bfb9d88e11b762acb88da42827a928d6fa1e210271b9fe28c035c83b61,2024-10-25T19:15:03.973000 -CVE-2024-37846,1,1,0df8407e8fb222721efdef46d431e9c16574ef2c1695bc50f4ed6a17403d40ae,2024-10-25T19:15:04.027000 -CVE-2024-37847,1,1,3e1a8bc941b9a408ca7d14276a75304e177fbf7e2a356cc57572be4e1f77546e,2024-10-25T19:15:04.087000 +CVE-2024-37844,0,0,496b512bef97f12eeb3644f6875825f2babb3858bb5fa5b7bffaf9db215b4234,2024-10-25T19:15:03.897000 +CVE-2024-37845,0,0,e98c32bfb9d88e11b762acb88da42827a928d6fa1e210271b9fe28c035c83b61,2024-10-25T19:15:03.973000 +CVE-2024-37846,0,0,0df8407e8fb222721efdef46d431e9c16574ef2c1695bc50f4ed6a17403d40ae,2024-10-25T19:15:04.027000 +CVE-2024-37847,0,0,3e1a8bc941b9a408ca7d14276a75304e177fbf7e2a356cc57572be4e1f77546e,2024-10-25T19:15:04.087000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 @@ -256988,7 +256988,7 @@ CVE-2024-38572,0,0,51daba4ae3afcf7c5fe55b093c1a3f72e1a3bceba37dea337e218e2c66da7 CVE-2024-38573,0,0,ca8898dfb11b5dd535a57345209c5053ecbd565ef57ea10dbb17683dd19ec64e,2024-07-03T02:05:13.393000 CVE-2024-38574,0,0,6afdc30adbe5999044de1cc76d2cc76289f74910e8879e6f74197c6ff1a2b954,2024-06-20T12:44:01.637000 CVE-2024-38575,0,0,2bb1d17f38c40f1a364165b77b7ca5fceadcc7cb4b05f83746adb6eb31d29aa9,2024-06-20T12:44:01.637000 -CVE-2024-38576,0,1,477d4b02867a8a6171e5c0098a90e5077b46001fce931cc0647d4f2611054e40,2024-10-25T19:35:07.410000 +CVE-2024-38576,0,0,477d4b02867a8a6171e5c0098a90e5077b46001fce931cc0647d4f2611054e40,2024-10-25T19:35:07.410000 CVE-2024-38577,0,0,1efc1e7397f24359bd6439871f08b63ff432bc413f747234aacf9ee77a51c8fb,2024-09-12T12:15:47.620000 CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000 CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000 @@ -257209,7 +257209,7 @@ CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000 CVE-2024-38871,0,0,57edf361883e1d6a8acb97285bfd5cacdef0784f3b2cf35520ec84b56f0b6341,2024-09-11T15:29:50.230000 CVE-2024-38872,0,0,6a652d0f00754e6ed4c8f746ec78ed9435eea30377e39cffec01179ba6a9a283,2024-09-11T15:29:16.677000 -CVE-2024-38873,0,1,e9e8d1dba6eafaf915ddebcc080a55b1cc67bf8a1cbc318ab456e405181b2bdc,2024-10-25T19:35:07.527000 +CVE-2024-38873,0,0,e9e8d1dba6eafaf915ddebcc080a55b1cc67bf8a1cbc318ab456e405181b2bdc,2024-10-25T19:35:07.527000 CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000 CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000 CVE-2024-38876,0,0,25480756813f020fa50f173d621e9d6fe38555b94130c33f850eba69c0fb613c,2024-09-17T14:45:04.577000 @@ -257235,9 +257235,9 @@ CVE-2024-38895,0,0,716e59d18f64015676dc141eff408f11adbd22a4a66efb34ed2b5a79bef7b CVE-2024-38896,0,0,e949d7f0d604812e0c7b71a22b8e4f3e31cd0c4c5e0e9ab86180bc45c3e0d030,2024-07-03T02:05:24.560000 CVE-2024-38897,0,0,d5624b84699009a260fe1a98237ae1687fc4d1ba5c6044d2e051c4d97cd50e55,2024-07-03T02:05:25.367000 CVE-2024-3890,0,0,e12639d0080d409836c0239fc937b27c8c64796cc206deb32f0595f7d19e1777,2024-04-26T12:58:17.720000 -CVE-2024-38902,0,1,1c3e99761119af86bfc08c133d200d98145139b24546fb36382532918e199885,2024-10-25T18:35:06 +CVE-2024-38902,0,0,1c3e99761119af86bfc08c133d200d98145139b24546fb36382532918e199885,2024-10-25T18:35:06 CVE-2024-38903,0,0,2b94b77610c8a043c9d0ea06696528fdc7d9d24aef31329270a0121bf4f56367,2024-07-03T02:05:26.943000 -CVE-2024-38909,0,1,f6a5b574aebed08039f44fd76bb05493334edfb3318746bc09e1f467a2df0529,2024-10-25T18:35:06.223000 +CVE-2024-38909,0,0,f6a5b574aebed08039f44fd76bb05493334edfb3318746bc09e1f467a2df0529,2024-10-25T18:35:06.223000 CVE-2024-3891,0,0,f9d0b3848969a1acfea7b9a20331b02cfc9759078e69f46c5576c9e3267f4690,2024-05-02T18:00:37.360000 CVE-2024-3892,0,0,635a0a9dff99d68a800a0815fade3930f3dac436f84c87dcff7c11db25dc6686,2024-05-15T18:35:11.453000 CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000 @@ -257360,7 +257360,7 @@ CVE-2024-39210,0,0,a6968325552cf6cb6c7f302a071accd1facda0c07b9843340635e35e5b596 CVE-2024-39211,0,0,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000 CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000 CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 -CVE-2024-39223,0,1,f54ba99b81aef6a1a473e3f0b32cd7be01aae3fd33418d38ef44eeff204ead38,2024-10-25T18:35:06.463000 +CVE-2024-39223,0,0,f54ba99b81aef6a1a473e3f0b32cd7be01aae3fd33418d38ef44eeff204ead38,2024-10-25T18:35:06.463000 CVE-2024-39225,0,0,967bd0a79163136bba6e3e394c24ab42a107f2cade4053bebd45ebbe7a971cdb,2024-08-15T16:15:19.317000 CVE-2024-39226,0,0,795af5d2bfe7e0b32f75745d1bcb51aae69a7d95811f3267e75c2594cf597057,2024-08-15T16:15:19.493000 CVE-2024-39227,0,0,9b9dd0fff6f6efe1b1b7968ed33a92edd9262d57a609d9726e0c0ac59c14becb,2024-08-15T16:15:19.650000 @@ -257376,7 +257376,7 @@ CVE-2024-39248,0,0,bd438370022685a4151ebf84eacd73dcdc5ba59d6ceb4a7e44b285f898cf5 CVE-2024-39249,0,0,55419fdc735f4b5d3c5b1e858306972036cffb58a6300e012da45bf6f04a8bc8,2024-08-26T15:35:13.893000 CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000 CVE-2024-39250,0,0,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67fb2c,2024-08-01T13:55:47.607000 -CVE-2024-39251,0,1,64af2157392d57f79850089f97cd12b9961f6851a323e46fd70206b4bebea7d4,2024-10-25T18:35:07.280000 +CVE-2024-39251,0,0,64af2157392d57f79850089f97cd12b9961f6851a323e46fd70206b4bebea7d4,2024-10-25T18:35:07.280000 CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000 @@ -258719,7 +258719,7 @@ CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000 CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000 CVE-2024-41460,0,0,c083c888decef1f6a25386395c954e7130328fe40eb807fb48aeb706487a4b23,2024-08-01T13:58:43.920000 -CVE-2024-41461,0,1,aae828816594ac85aaa8be9fd3dede24e13fe31d859c851e8cc5b1861ae37720,2024-10-25T18:35:07.473000 +CVE-2024-41461,0,0,aae828816594ac85aaa8be9fd3dede24e13fe31d859c851e8cc5b1861ae37720,2024-10-25T18:35:07.473000 CVE-2024-41462,0,0,7dbe5aff525bed125a538ee4652d679dba96e46bb328711bc0224d78949e0a92,2024-08-01T13:58:45.997000 CVE-2024-41463,0,0,a153f77c3b8e8afae6003ca7f5efd2bc999f5bab94d5319580e03183eccf746b,2024-08-01T13:58:46.833000 CVE-2024-41464,0,0,fb783471109de1fb41b0e999af63416fe9b60360e3d7ca49fc0b68889080f79c,2024-08-01T13:58:47.627000 @@ -258778,7 +258778,7 @@ CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9df CVE-2024-41599,0,0,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000 CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000 CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000 -CVE-2024-41601,0,1,4221cd1e430017fd47307441fb25a646ed9deb7bd75e8490c865278249c927d4,2024-10-25T18:35:08.280000 +CVE-2024-41601,0,0,4221cd1e430017fd47307441fb25a646ed9deb7bd75e8490c865278249c927d4,2024-10-25T18:35:08.280000 CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000 CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000 CVE-2024-41605,0,0,bb255aac120d8e7bcca665451b615d0034f2513afeb2d3aeb08551ca63d9661a,2024-09-30T12:46:20.237000 @@ -260140,8 +260140,8 @@ CVE-2024-43567,0,0,b1aa8d4eda561d64c2d6cb4a7fbba0f5a1685cba00aff4889ad4b33556da9 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 CVE-2024-43570,0,0,cb1ebdbcc9f463b489680ee7f906a1b002e658802f44b1edfc93e77479cd3deb,2024-10-16T21:53:41.207000 CVE-2024-43571,0,0,fa36d8639880a909bc9227e28caa319904ee146b710e8465c63988bc833161f8,2024-10-16T21:53:47.887000 -CVE-2024-43572,0,1,257e329a7c7fcc1c3aa59295d878c66b1ff93d840d2da33e0c77b5b8eb2e3746,2024-10-25T18:17:28.223000 -CVE-2024-43573,0,1,99c4b510e413885843aeaba4bd6f60319242cb24f5b664274f7f6f8822356c2d,2024-10-25T18:17:35.217000 +CVE-2024-43572,0,0,257e329a7c7fcc1c3aa59295d878c66b1ff93d840d2da33e0c77b5b8eb2e3746,2024-10-25T18:17:28.223000 +CVE-2024-43573,0,0,99c4b510e413885843aeaba4bd6f60319242cb24f5b664274f7f6f8822356c2d,2024-10-25T18:17:35.217000 CVE-2024-43574,0,0,27cb32f4bd91a68a1d79359c4fa56d2ab297703b1b8d3a2c872a415c852b6007,2024-10-17T18:58:37.100000 CVE-2024-43575,0,0,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000 CVE-2024-43576,0,0,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000 @@ -260290,10 +260290,10 @@ CVE-2024-43840,0,0,23c960f08c72e92672042c1b393c21288af5920aee8a16c3fbfc5fa814adb CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd3eb,2024-08-19T12:59:59.177000 CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000 CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000 -CVE-2024-43844,0,1,f8e0e9c6309b78819993f04abd3f0fabe15d23e7d433454c8fc7a70ef34d9adc,2024-10-25T19:49:05.987000 -CVE-2024-43845,0,1,caaa023c02e31720553b20117af210f2452fe00e9e2b31c2df183843a916f65c,2024-10-25T19:51:07.187000 -CVE-2024-43846,0,1,f266cac61831a851876149b3774436f495d75f984b51eb837eba29752a3f1863,2024-10-25T19:52:01.380000 -CVE-2024-43847,0,1,4e65a4d22ff6510c288db589631fb202b95ed61e906a43d1b3d8af8c2605b147,2024-10-25T19:55:53.963000 +CVE-2024-43844,0,0,f8e0e9c6309b78819993f04abd3f0fabe15d23e7d433454c8fc7a70ef34d9adc,2024-10-25T19:49:05.987000 +CVE-2024-43845,0,0,caaa023c02e31720553b20117af210f2452fe00e9e2b31c2df183843a916f65c,2024-10-25T19:51:07.187000 +CVE-2024-43846,0,0,f266cac61831a851876149b3774436f495d75f984b51eb837eba29752a3f1863,2024-10-25T19:52:01.380000 +CVE-2024-43847,0,0,4e65a4d22ff6510c288db589631fb202b95ed61e906a43d1b3d8af8c2605b147,2024-10-25T19:55:53.963000 CVE-2024-43848,0,0,574ca28c6f6f9483be8c689a91acf3081f69bbcf361ca8233d166c12381f4f93,2024-10-25T13:57:51.800000 CVE-2024-43849,0,0,c09809025deb42d3e16ffa77bdd804cd5a554e28cbe29839183c2ce44189d8b9,2024-10-24T16:02:21.587000 CVE-2024-4385,0,0,218d1e7a4ca055c9cc2f26803db027cb337ddeafcf5f646e236db9e9e217180d,2024-05-16T13:03:05.353000 @@ -260519,10 +260519,10 @@ CVE-2024-44095,0,0,b00dc9986da442410ed4230403c0d5027e748adf40134501c33f35c9b4d16 CVE-2024-44096,0,0,9e10fae26ac71a12ed9f5239ac873ac3368309ebde15657c2661c84b3db39f54,2024-10-15T14:35:04.383000 CVE-2024-44097,0,0,965cf9d05fda49947baa77cde6164ca7e937d7f38563ab41cd3e9e9bd0e5a36b,2024-10-04T13:50:43.727000 CVE-2024-44098,0,0,1168004266a8f5e54e269c18ca4a45508b8876128dba4e929319900254f0936c,2024-10-25T17:35:01.100000 -CVE-2024-44099,0,1,8b5d0671cd3c07c2e2fdb1ba85a34b0fab024886d0499cf4b6e612e91b95d5dd,2024-10-25T19:35:07.773000 +CVE-2024-44099,0,0,8b5d0671cd3c07c2e2fdb1ba85a34b0fab024886d0499cf4b6e612e91b95d5dd,2024-10-25T19:35:07.773000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 -CVE-2024-44100,0,1,20d0415dcd9cbb9ed7789457496bacac14a274719770af0b32fd0cba6d6500f9,2024-10-25T19:35:08.533000 -CVE-2024-44101,0,1,38a10de066362f808ab5201dce6c06e3469b38a2adfd796214f3d1e7a2c50419,2024-10-25T19:35:09.280000 +CVE-2024-44100,0,0,20d0415dcd9cbb9ed7789457496bacac14a274719770af0b32fd0cba6d6500f9,2024-10-25T19:35:08.533000 +CVE-2024-44101,0,0,38a10de066362f808ab5201dce6c06e3469b38a2adfd796214f3d1e7a2c50419,2024-10-25T19:35:09.280000 CVE-2024-44103,0,0,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000 CVE-2024-44104,0,0,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000 CVE-2024-44105,0,0,6ace8c54c3fc6c9b1684fd8d42f178f1cce19bf6d08f58b02fdc3857633db641,2024-09-18T17:48:11.193000 @@ -261526,7 +261526,7 @@ CVE-2024-46237,0,0,89c70f938f955e8f8794daf2309e374bb81a18bcff912f949189945353ae1 CVE-2024-46238,0,0,c0b3aa1e64f4a91b9c4da7e2401f4fe18d33534691ef378a47cfa822f9a55266,2024-10-23T15:13:25.583000 CVE-2024-46239,0,0,725c4cefa2ca2647a32f2bf2b322ce53dedacf1976287dda499bc36c65d5a603,2024-10-23T15:13:25.583000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 -CVE-2024-46240,0,1,3dfb8006578d7ba4d6d34c3d67455dcd6450605a9bdc241e6a377f0c41b90870,2024-10-25T19:00:20.737000 +CVE-2024-46240,0,0,3dfb8006578d7ba4d6d34c3d67455dcd6450605a9bdc241e6a377f0c41b90870,2024-10-25T19:00:20.737000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,8bf470a14240bc761051ec27ff055fa64e8fa7727cdd73b13c40b5c555057a54,2024-10-24T17:15:16.690000 CVE-2024-46257,0,0,77ff81579b9686846d30b6279f2f3ca51486f319de7ee8b1a0a61768d1f232f7,2024-10-24T18:15:08.617000 @@ -261600,7 +261600,7 @@ CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1b CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000 CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000 CVE-2024-46475,0,0,6dd32d21b34d5ed62fc4d47e4e31b7806525d2f693fc3da0c33e5fca3fe88762,2024-10-04T13:51:25.567000 -CVE-2024-46478,0,0,61ce286632a90c340e60c73ecdd02386b342d763e9f2ffafdf9469245b088409,2024-10-25T12:56:07.750000 +CVE-2024-46478,0,1,f6590a2175e533d23bbd8eab4a587250df66923484fc6a9e2f6747abac9d8657,2024-10-25T20:35:09.710000 CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000 CVE-2024-46482,0,0,0bd11529577a79bda1c61c449bff3d306490c152de71c2fae5d4eea05925babd,2024-10-23T18:35:03.670000 CVE-2024-46483,0,0,efd1621b21138809f35625ddb77fc021e753097710878e96af20d908574d610c,2024-10-23T19:35:11.493000 @@ -261979,9 +261979,9 @@ CVE-2024-47009,0,0,264b3f36a46fb3043a7ff13a0518523aa897b1a061a2770490e43d56fad1b CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000 CVE-2024-47010,0,0,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000 CVE-2024-47011,0,0,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000 -CVE-2024-47012,0,1,51b296eca2295acd5a1d0247cca9b894804b420f2f6637dab75d64e90b1a99f2,2024-10-25T19:35:10.183000 -CVE-2024-47013,0,1,c79edd60fa0cb1b64b4333b41bac8a25c3b687d03a9279b3c4a732c53b04973e,2024-10-25T19:35:10.947000 -CVE-2024-47014,0,1,2588aa48a53d7f12c66f0a23d0984f4a68a355479a0bdb5afb4d6899e7323bbd,2024-10-25T19:35:11.740000 +CVE-2024-47012,0,0,51b296eca2295acd5a1d0247cca9b894804b420f2f6637dab75d64e90b1a99f2,2024-10-25T19:35:10.183000 +CVE-2024-47013,0,0,c79edd60fa0cb1b64b4333b41bac8a25c3b687d03a9279b3c4a732c53b04973e,2024-10-25T19:35:10.947000 +CVE-2024-47014,0,0,2588aa48a53d7f12c66f0a23d0984f4a68a355479a0bdb5afb4d6899e7323bbd,2024-10-25T19:35:11.740000 CVE-2024-47015,0,0,ff96cfa0d9f88263fbfdd79733732a9ff330d97dcf8ab9375596378f10ba09df,2024-10-25T15:35:13.317000 CVE-2024-47016,0,0,5bb480ec0e9fd631ee64eb7e86f79fadf399ca14a987be83ebc334f12731b432,2024-10-25T15:35:14.487000 CVE-2024-47017,0,0,ec48a73c66b69cfdbd33128fb6e18b5a985fdcc5efbe00cd3212f49f8adb9439,2024-10-25T15:35:16.170000 @@ -262655,12 +262655,12 @@ CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 -CVE-2024-48139,0,1,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000 +CVE-2024-48139,0,0,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 -CVE-2024-48140,0,1,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000 -CVE-2024-48141,0,1,cc4782a8f0951c87e98422618b067d64816a658947d4a8eca9697f1d8a5b003c,2024-10-25T19:35:14.257000 -CVE-2024-48142,0,1,cae437d6fee1555558b712ee6c06f3021c0f2d9f12fdcac6beaa6daa4a343e39,2024-10-25T18:35:08.560000 -CVE-2024-48143,0,1,5545db23ed22335df1a529c388d9711e2b5fcb2994cec0953d6220a72ae8ba76,2024-10-25T18:35:09.327000 +CVE-2024-48140,0,0,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000 +CVE-2024-48141,0,0,cc4782a8f0951c87e98422618b067d64816a658947d4a8eca9697f1d8a5b003c,2024-10-25T19:35:14.257000 +CVE-2024-48142,0,0,cae437d6fee1555558b712ee6c06f3021c0f2d9f12fdcac6beaa6daa4a343e39,2024-10-25T18:35:08.560000 +CVE-2024-48143,0,0,5545db23ed22335df1a529c388d9711e2b5fcb2994cec0953d6220a72ae8ba76,2024-10-25T18:35:09.327000 CVE-2024-48144,0,0,fdb4eecf8121a078afe76760eccc74cd2b7d4a296fa77eb553646edbcf93e74b,2024-10-25T12:56:07.750000 CVE-2024-48145,0,0,a7822e773b5e8b97e44909da5983b8285f14b3b7031fc690fa121b3e6000150c,2024-10-25T12:56:07.750000 CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000 @@ -262674,13 +262674,24 @@ CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f4 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 -CVE-2024-48204,0,0,2d0833879720aba0f189d98abf08c386855c552d12207fd3da114e189cd9f34d,2024-10-25T16:15:09.873000 +CVE-2024-48204,0,1,33fd29403b3782a1d97429cd31e4963d75fb7e580aa05096e562b561ae3c189f,2024-10-25T20:35:11.130000 CVE-2024-48208,0,0,b02f86f1b335b3183358f07d84617fba93d01a0b465de0ef3561929c34125b92,2024-10-25T12:56:07.750000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000 +CVE-2024-48218,1,1,29443aeca1113bac6cebe02676c249fdf5d89f8b6a33c4e5b530300e1ff1ca04,2024-10-25T21:15:03.603000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 +CVE-2024-48222,1,1,764f6bd72f2c9124c4af5cfef42ea9da4395a1bc9010684003a94c7edb12d214,2024-10-25T21:15:03.680000 +CVE-2024-48223,1,1,5af39d28aef04e56766991d2118d421e69c7d1b29d94e804e62c5c826d05540f,2024-10-25T21:15:03.740000 +CVE-2024-48224,1,1,a45ee5cb5732359281cedc87de8793a0d997b6af6e845cf6c61e822a9ad78470,2024-10-25T21:15:03.793000 +CVE-2024-48225,1,1,7447228144ad62da10b13a259b73bbb5cb9b25f24a843b6b5f152f2a3c81e1cb,2024-10-25T21:15:03.893000 +CVE-2024-48226,1,1,52e5d0c559977a067f06e0ba306722964197e747a5e7d24fe8e076a2cc14103a,2024-10-25T21:15:03.953000 +CVE-2024-48227,1,1,15c2803e5490ca46a698bc4a24c869454a861c63481454edd0aa2c4058162838,2024-10-25T21:15:04.010000 +CVE-2024-48229,1,1,70a4c96c4c9e210e57c12ca8a1040f590d00e435a1d84eea11045ea03b04ff75,2024-10-25T21:15:04.063000 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 +CVE-2024-48230,1,1,1196999c3967b999da514d10cf930037f7a60834ee7298288e7abecdc6778735,2024-10-25T21:15:04.123000 CVE-2024-48231,0,0,937449141a6aa1a64ac6ee0f623969ee8c2a56a4e76a3e216a9b1fafdd881546,2024-10-21T19:35:06.217000 +CVE-2024-48232,1,1,39f10b4170970b450e3ce7109454d2f0b8e2e8e813f6b1ab9131272c0f1b9068,2024-10-25T21:15:04.170000 +CVE-2024-48233,1,1,b8f9584f29322ef3869dc1d165f55a0b7b7a0a231b1c61bdf1d030385e7f6df0,2024-10-25T21:15:04.243000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 @@ -262696,12 +262707,13 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48343,1,1,5656db22df2b3676700d39c69c4e1b01dffc629287daa5fe07ebec03a2fcdc3a,2024-10-25T18:15:04.250000 +CVE-2024-48343,0,0,5656db22df2b3676700d39c69c4e1b01dffc629287daa5fe07ebec03a2fcdc3a,2024-10-25T18:15:04.250000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000 +CVE-2024-48396,1,1,35065f2e32dc37e5ec7eb03768b9deb01044a9fb2fa3d9753ad510d16904a7e1,2024-10-25T21:15:04.300000 CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000 CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000 @@ -262715,12 +262727,12 @@ CVE-2024-48427,0,0,b7bd032e8bdf5711752138acdb68e40d7f3b7f526e0c14aa289eef0dcf1c4 CVE-2024-48428,0,0,445242dfb5fe2d8ffbd80ecefca24e9fb7c015e45d9fda28b70a454257506766,2024-10-25T15:15:18.827000 CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000 CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000 -CVE-2024-48440,0,0,5219db498a563dd1c6489094539901c4defdd8cd94636f8687a9af5fa80de2ee,2024-10-25T12:56:07.750000 -CVE-2024-48441,0,0,224bc247fd5f1747eb1e946da5b3115767d16a53740175a2dfcb73dea07b1575,2024-10-25T12:56:07.750000 -CVE-2024-48442,0,0,084bb62aa7e367eaa572c5f66b2188f35788a01f98625b5dbdc0959d7e2c72e8,2024-10-25T12:56:07.750000 -CVE-2024-48448,1,1,aab36c7efa4d3cefca6b8cb68026c1ed9e940d94877b0f17e3d7005f8bd77c6c,2024-10-25T18:15:04.330000 +CVE-2024-48440,0,1,3e5da93f3d98711cf31668d28b9aca8f0ae7e630b3695e355db661d67a615b49,2024-10-25T20:35:11.890000 +CVE-2024-48441,0,1,0654b9dd55ae76fc0291b5e3f1733c53dba57da1f585ef3f25d9b16fb1239962,2024-10-25T20:35:12.680000 +CVE-2024-48442,0,1,8c11f1c25a6833ad5a393ceb433b879650d57f4732d58a76a083ef9977191df7,2024-10-25T20:35:13.447000 +CVE-2024-48448,0,0,aab36c7efa4d3cefca6b8cb68026c1ed9e940d94877b0f17e3d7005f8bd77c6c,2024-10-25T18:15:04.330000 CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000 -CVE-2024-48450,1,1,c87cb9a823527d7ad40eff56b320ed10998d734b68c031022d699dd9986e1481,2024-10-25T19:15:04.373000 +CVE-2024-48450,0,0,c87cb9a823527d7ad40eff56b320ed10998d734b68c031022d699dd9986e1481,2024-10-25T19:15:04.373000 CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000 CVE-2024-48459,0,0,a7d1ee8f457b4cb4b257b6751d2a0c81826e21b458157c0b6ac00441abd5283c,2024-10-25T17:15:04.703000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 @@ -262745,11 +262757,11 @@ CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 -CVE-2024-48570,0,1,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000 -CVE-2024-48579,0,0,050bf08496731e9fa01ddddf10f6c383539d6e884fee1d3101c51c157c56909c,2024-10-25T16:15:09.940000 +CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000 +CVE-2024-48579,0,1,f074f962cc3dacfa8364b4c4320121924751269a753f3c367f12a048bf39e8cd,2024-10-25T20:35:14.227000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 -CVE-2024-48580,0,0,38c4000b35372237ef9186873e78fb7b43739235dd7422171df3719331b79af0,2024-10-25T16:15:09.993000 -CVE-2024-48581,0,0,7e02d80033b3f21fbfe923c81e59e73fdce925d6814b23c4e7dbaf3d3da8d2ec,2024-10-25T16:15:10.047000 +CVE-2024-48580,0,1,a056c6ca3b36a90a8c5e3d62dda1bb1ab18d79aa04d0a0c5094ca6efad894b97,2024-10-25T20:35:15.050000 +CVE-2024-48581,0,1,ff1fa0872c098eccbdd31051d7fb6452f09ee536dac9125ccb762c1a0c3a75ae,2024-10-25T20:35:15.810000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 @@ -262773,7 +262785,7 @@ CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000 -CVE-2024-48654,0,0,e34310090447184f0e074f6a144ad626d589255dd6d7d0c385a44ba8bdec3cb5,2024-10-25T17:15:04.763000 +CVE-2024-48654,0,1,3b51deb20824a920814e8c7012962da03f87b3810f65880ca7c65c2718ef5309,2024-10-25T21:35:07.310000 CVE-2024-48655,0,0,01169986f94a33ed859c0940866e2417c4a2c0d0d0863258a06e31477c3e9a96,2024-10-25T17:15:04.817000 CVE-2024-48656,0,0,7991ecc43dfce32475e8e1d32ee086228d1cf510284114bf3bd76e22363c0bc1,2024-10-24T14:37:36.353000 CVE-2024-48657,0,0,92137caf7714ad77e1f5fbc8130edf53e1c7b0ac9e690fd892c8d5cb42ccb1b6,2024-10-24T14:38:41.620000 @@ -262782,10 +262794,10 @@ CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 -CVE-2024-48700,1,1,9be6619a603858f176cb422702afce112f0c83e8f944ab9cb6b18eb6af3ba813,2024-10-25T18:15:04.407000 -CVE-2024-48706,0,1,e747f2815f744d2574a2c914482979e92abcb175ce526e54d28ad054b049d395,2024-10-25T18:58:35.380000 -CVE-2024-48707,0,1,fd9b1d38f6684577739099dad2b9e541d52b6b52c575d76793119672c0ee0220,2024-10-25T19:11:54.310000 -CVE-2024-48708,0,1,117d10f4a9b96b209a6f5e6f3097728d8a65264e256ad998e6bda4d438b21882,2024-10-25T19:10:08.457000 +CVE-2024-48700,0,0,9be6619a603858f176cb422702afce112f0c83e8f944ab9cb6b18eb6af3ba813,2024-10-25T18:15:04.407000 +CVE-2024-48706,0,0,e747f2815f744d2574a2c914482979e92abcb175ce526e54d28ad054b049d395,2024-10-25T18:58:35.380000 +CVE-2024-48707,0,0,fd9b1d38f6684577739099dad2b9e541d52b6b52c575d76793119672c0ee0220,2024-10-25T19:11:54.310000 +CVE-2024-48708,0,0,117d10f4a9b96b209a6f5e6f3097728d8a65264e256ad998e6bda4d438b21882,2024-10-25T19:10:08.457000 CVE-2024-48709,0,0,09a0506fcee26889d94982710596f7bcc50ff18fa38b0b5a0230c066edc673cb,2024-10-23T15:13:25.583000 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000 CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000 @@ -262911,8 +262923,8 @@ CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d8 CVE-2024-49193,0,0,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000 CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714d45,2024-10-17T18:35:13.253000 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 -CVE-2024-49208,0,0,28d2e992b35e2e1ef94ebf877a0d80afe91b36d68188c2e8154f71c6c78a8978,2024-10-23T15:12:34.673000 -CVE-2024-49209,0,0,ab6c3083b5b8fa47a4348dad42de9ce31362f8f34855825cd8b57b8bf5b7437d,2024-10-23T15:12:34.673000 +CVE-2024-49208,0,1,3a58d346a6ade89e8c0020a10a544403e4226ebcc2dc44aeebe9f12dc5b80439,2024-10-25T20:18:20.550000 +CVE-2024-49209,0,1,7815188905707c2f76092b0250e46fa9658c3c02368a05bd7a2ebfc97747dcec,2024-10-25T20:17:36.353000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49210,0,0,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000 CVE-2024-49211,0,0,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000 @@ -263165,6 +263177,8 @@ CVE-2024-49757,0,0,c6362d09c2d574e1f0ce09934d73589118196613bc86ccad430e266a30927 CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000 CVE-2024-49760,0,0,73350c3c15eb518e634dec8ba3e2da01f8968eca1d80c5872e6dfc5d4ab4dd78,2024-10-25T12:56:07.750000 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 +CVE-2024-49766,1,1,19caf4988abca034b9c9c331e5306d900e0b36aac0cb228160ed86b52695c614,2024-10-25T20:15:04.410000 +CVE-2024-49767,1,1,bb6b33b1ba9c07d7a0b8a03b74ab6615175e4c86f80bc6ec57b3564ef5821aa9,2024-10-25T20:15:04.530000 CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 @@ -263294,16 +263308,16 @@ CVE-2024-49965,0,0,5017e4bbea441f34bb1695a3b7704c83c90f6308e3baa7512dac279c00198 CVE-2024-49966,0,0,3dd9d402aa195283567134637b94ebf05fd7aa88c1f417600ffa5b4bb2fa6e42,2024-10-23T15:13:25.583000 CVE-2024-49967,0,0,f92f6192704c8d30fb1b877d6399c880863ff64783a228d60dfdd51b9d90f359,2024-10-23T15:13:25.583000 CVE-2024-49968,0,0,19a93f4a6384a37e0e479ce1fc4610aee20a39bc275896118b96ca5904112124,2024-10-23T15:13:25.583000 -CVE-2024-49969,0,0,3f4b1951d217c2369704bd79d60ccf2c9671a1780f98d22e3235419fbb3c673d,2024-10-23T15:13:25.583000 +CVE-2024-49969,0,1,87996c90e1672445fe5815f19cbdae838e57430f8b66f0e3e569e0c7abd0a9cb,2024-10-25T20:15:51.520000 CVE-2024-4997,0,0,8869d8cee41a7f38be4f03ad1383841d0fd18dd2f92c0e8b0f0fd7c6f2096580,2024-06-04T16:57:41.053000 CVE-2024-49970,0,0,05aca179b29c638548a8f21052c8ccbafdc943e81b23beda746307887e7bcbaf,2024-10-23T15:13:25.583000 CVE-2024-49971,0,0,60c83f32ab70eca3cd14f38dc4040565edae34a7c11d6016f53aaf212ad0bc15,2024-10-23T15:13:25.583000 CVE-2024-49972,0,0,985809352bdfeb655e911cb32258e8e8a65029ce7fe386242f6e0bc275afc60f,2024-10-23T15:13:25.583000 CVE-2024-49973,0,0,cbc8317e69e991b61b33286118a69f0b5499d236a65e0770daff1dbdf352cd5d,2024-10-23T15:13:25.583000 CVE-2024-49974,0,0,4d1ad9e69552c2546e3ebc37028a81d020f8c81c7e81067843bb3e0268b54a37,2024-10-23T15:13:25.583000 -CVE-2024-49975,0,0,77496d71dbdb1011dc9ff94c3d0cd336344267f57fcfac6b98755dbc72bb5eee,2024-10-23T15:13:25.583000 -CVE-2024-49976,0,0,13e58887358e60c5ecd8c88e2ec609c29a2b4dfca716f3d2e2465eaccc20989f,2024-10-23T15:13:25.583000 -CVE-2024-49977,0,0,d404101d9ba30145a428525398d400ce54caae55b8fe029e10181362c4f21c12,2024-10-23T15:13:25.583000 +CVE-2024-49975,0,1,de9d4372aecbebb1ac36a8d6bd20891e93dd433b503ae45f7f641c708149f769,2024-10-25T20:15:21.160000 +CVE-2024-49976,0,1,7d789ab3b505b06d9a92626022d239eccb66342a26f5e0408c14647cf8cd1540,2024-10-25T20:14:03.387000 +CVE-2024-49977,0,1,1fa968b4b6ffe89f61827f270e7cc697b9e8aa1241eadd73e01f50d4c563edc5,2024-10-25T20:03:36.737000 CVE-2024-49978,0,0,d1d022627966490e425b664f8063a108568b0f5033ee2065467ad5efe1a2a3e8,2024-10-23T15:13:25.583000 CVE-2024-49979,0,0,af031dedc92de72c54d427a92e62fc2853294f38d0fdf026f9d854688a1c6e3a,2024-10-23T15:13:25.583000 CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000 @@ -263313,10 +263327,10 @@ CVE-2024-49982,0,0,1ae51728dfad6dc77da9a9af15e226c1ee61eeb30c84012b23419f82a9161 CVE-2024-49983,0,0,a8ab82f4196f5cdde113b23acc0e392f7ce69758223b37afd8356b634ec56e89,2024-10-23T15:13:25.583000 CVE-2024-49984,0,0,52132884d98254bcf3670a6c5035fab9415ac6c1e9ca87fbf0878fa15bfb5d0a,2024-10-23T15:13:25.583000 CVE-2024-49985,0,0,6505f687f4eb9245242570ba51d30471acb035977a44ab969f22173c754f5a44,2024-10-23T15:13:25.583000 -CVE-2024-49986,0,0,6b9117399ead2b415f726daa5f92aa72211afcf4379d55baefe074f1577e4e88,2024-10-23T15:13:25.583000 +CVE-2024-49986,0,1,1069db2199b30e02a56c3460641141ec41e9f11ee8af8a2794866b64042f2043,2024-10-25T20:02:54.517000 CVE-2024-49987,0,0,83561d5aa41b3c98ac3da73906c8dc7e2c585f0470372fd90d93ee13a1235673,2024-10-23T15:13:25.583000 CVE-2024-49988,0,0,c7a60174b0a2907e13494050fdcc3cf96f4fcf64b06f52d88c7b2176f07fad68,2024-10-23T15:13:25.583000 -CVE-2024-49989,0,0,b0266992e9e68cde51259a4c15d0630c79796c1acece427b6a30c5a2dc4e9d03,2024-10-23T15:13:25.583000 +CVE-2024-49989,0,1,ba31bc9dcd130506ee60107032631b6a472eb6b930860822ae9abcf34569a023,2024-10-25T20:02:16.763000 CVE-2024-4999,0,0,aeea1ad154336e8cbd739fb19642e978908300b067641ea9bc4ea587cb0b31ba,2024-05-16T15:44:44.683000 CVE-2024-49990,0,0,e1d70beb5c3ac0c9d76d00adce179924ec0e97ef68d2e89f39fbefb01b11d6b7,2024-10-23T15:13:25.583000 CVE-2024-49991,0,0,2fb930d0a7a3c2773f0499a4ac914a761eade3a99dfddc4271f3a9d058939c0f,2024-10-23T15:13:25.583000 @@ -263324,12 +263338,12 @@ CVE-2024-49992,0,0,552b9e8ee31b9d2986b015547bb9a5ad1516a945b66e9c2d1491a0c82371c CVE-2024-49993,0,0,173745e8fc0b2f51f6583b765f43b75fc7379f37eeab514e19093d1e0bbc2187,2024-10-25T14:52:19.167000 CVE-2024-49994,0,0,b259470c6938b01fe0b06a9ea53deb1f1b59fb7f77762cb60813754903d6329f,2024-10-25T14:52:32.877000 CVE-2024-49995,0,0,b14274080bc6cde5e18285c4271101e0fd75dd4ad1b68ac92642bd34920a24f9,2024-10-23T15:13:25.583000 -CVE-2024-49996,0,1,81c0545f780fa695d599970a227ba85a22409c164ec567cfb530b43ba7149524,2024-10-25T19:56:10.320000 +CVE-2024-49996,0,0,81c0545f780fa695d599970a227ba85a22409c164ec567cfb530b43ba7149524,2024-10-25T19:56:10.320000 CVE-2024-49997,0,0,4f0d5cbc938668da4cca12e8619053d4fe51e93b90646e0ffb3c7559200d809e,2024-10-23T15:13:25.583000 CVE-2024-49998,0,0,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000 CVE-2024-49999,0,0,78b6148f41a15652bfa26256a49a5e5917d5dbd35564ac4e51ba7d691f423879,2024-10-23T15:13:25.583000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 -CVE-2024-50000,0,1,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182c42,2024-10-25T19:55:55.357000 +CVE-2024-50000,0,0,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182c42,2024-10-25T19:55:55.357000 CVE-2024-50001,0,0,886b8a582aeed728b3b4fd74e088fd22423f5fc4d8231c2d820afabe46d603d5,2024-10-23T15:13:25.583000 CVE-2024-50002,0,0,7e826e0b3de3d65693e9dcc09edb35c05892be528b111a68d82dd8a04b1f2994,2024-10-23T15:13:25.583000 CVE-2024-50003,0,0,318b4134c29bf882eea2c3b90b36a6f001c79495854be1fa1cd17567830c7826,2024-10-23T15:13:25.583000 @@ -263342,13 +263356,13 @@ CVE-2024-50009,0,0,b25c89b587ef8f767a118a888203f26c1813b03ccfac66d7b88c177a8b952 CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000 CVE-2024-50010,0,0,719c9dfbef8438b722e214bb4144425701839515de68fd900ca2439cbf367998,2024-10-23T15:13:25.583000 CVE-2024-50011,0,0,980130793609ba85d978ac3897743b36e06d03e5578449cd8463c6a50ef6140e,2024-10-23T15:13:25.583000 -CVE-2024-50012,0,1,0b464fdf78181eaa99a743288b56773d15a2abd5d273a31aea10de63165e8299,2024-10-25T19:55:40.217000 -CVE-2024-50013,0,1,eefeead007890563f349e532e89dba096326c5095afb27c53d3f32df4440455c,2024-10-25T19:49:36.863000 +CVE-2024-50012,0,0,0b464fdf78181eaa99a743288b56773d15a2abd5d273a31aea10de63165e8299,2024-10-25T19:55:40.217000 +CVE-2024-50013,0,0,eefeead007890563f349e532e89dba096326c5095afb27c53d3f32df4440455c,2024-10-25T19:49:36.863000 CVE-2024-50014,0,0,1b9d9129c629d7a256ee3df690e7fe663397d99e76b77d5144d84fc7840136c0,2024-10-23T15:13:25.583000 CVE-2024-50015,0,0,6d4bf18cde3e91eef710a5b6ca23cc98ba4179d8758cab4bc07f83164bcd0fab,2024-10-23T15:13:25.583000 CVE-2024-50016,0,0,150cc155a5101207172a6ab21de9b50c216ceecbad4a50f73bb2b1561ac16362,2024-10-23T15:13:25.583000 -CVE-2024-50017,0,0,4fcef121f58bca52e096970b6b422944c415a23596af63574c5ac44a02eb4de0,2024-10-23T15:13:25.583000 -CVE-2024-50018,0,0,0ab552b7de0854c620630fdbc4c5dd46fd08e7915ae706c165d1b10fd64bea68,2024-10-23T15:13:25.583000 +CVE-2024-50017,0,1,d0ba5ecf114d5b94f6c83b407caa6c5a52eb749609412d1653363891f2c3dfed,2024-10-25T20:15:50.067000 +CVE-2024-50018,0,1,59ff690491bf2a2875b4d5118dae05862ef89b806ba7d6818150c213090b01b4,2024-10-25T20:14:30.820000 CVE-2024-50019,0,0,d8994edc51fb202404bc99651a5a3068f2ced8d7ea559aa9a79a920af775bb92,2024-10-25T14:45:56.190000 CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf875190207207,2024-08-01T13:59:37.720000 CVE-2024-50020,0,0,6661d43351c3469f03e20f3e76c98c07a0ed5f6d6c8216674628fc4e4b1c99b7,2024-10-25T14:50:42.230000 @@ -263447,7 +263461,7 @@ CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635e CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 CVE-2024-5057,0,0,6ac23c507e757b24b72de98245da87576f9a2b62e0f8d57278541740a6070ccf,2024-09-20T19:31:39.437000 CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000 -CVE-2024-50583,0,0,33844ee6f70d1904cf415aeef3ae5427d33b82005ac29860bbe96ab9f0ec2058,2024-10-25T12:56:07.750000 +CVE-2024-50583,0,1,db2a2ad9d7e60027a7a0abb846b837f27b8194afb56c33e89ab55cbf708c9a52,2024-10-25T21:35:08.253000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 CVE-2024-5061,0,0,acb15fde0f7701ee7d55862ecbc276a299a2eba41aa60a0bce397763155cd902,2024-09-03T15:11:56.787000 @@ -263539,7 +263553,7 @@ CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d7 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000 -CVE-2024-5159,0,1,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 +CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 @@ -264144,7 +264158,7 @@ CVE-2024-5832,0,0,fcc8d912e6c8c38175ccea7150b16b62e2ce7eae3dd1539b01b9bf831f40b8 CVE-2024-5833,0,0,a74d6cce3a1790ef74d3836450506e9a7e306cd07532907e8300bc8d9a8bd7ba,2024-07-03T02:09:19.737000 CVE-2024-5834,0,0,3eaebe678be109cf432cf27c742c2b9362970e430c21bfb473c7c2fbeada267f,2024-07-03T02:09:20.643000 CVE-2024-5835,0,0,3e524b82e8ed0b84d2c482cdc0cfce05ebf5d76c695278d4bcb9110adcb244b7,2024-07-03T02:09:21.673000 -CVE-2024-5836,0,1,2445453ac51184d720119a34e3e0f2d4a922733fec600942629d4a7fb75a8f4b,2024-10-25T19:35:15.787000 +CVE-2024-5836,0,0,2445453ac51184d720119a34e3e0f2d4a922733fec600942629d4a7fb75a8f4b,2024-10-25T19:35:15.787000 CVE-2024-5837,0,0,a3430952c8e48f90bf943b78b484234954723d493f275584419eeb04849b7796,2024-07-03T02:09:22.720000 CVE-2024-5838,0,0,7c76efe71220708ee702a73816746926766b357630940d525e4a60a2a76d2e61,2024-07-03T02:09:23.820000 CVE-2024-5839,0,0,9130876cb95f097dbdaed8649c52744f55bb9ad261dd630433bc625ccdf7d124,2024-07-03T02:09:24.927000 @@ -264814,7 +264828,7 @@ CVE-2024-6607,0,0,e0f051eabf509802774447af80a0c738a4502496130b70b32bcf3185bbfd56 CVE-2024-6608,0,0,246c9ba89ed8e01f5cf842e2ef0777e6ce9e95831d341293bd5aa49bcd990f4d,2024-08-29T18:34:20.043000 CVE-2024-6609,0,0,e0015ee4b4061bd74c9f14d02e039fc61e2646b8b8a922c9f2cb851cbba76ddf,2024-08-29T18:32:56.240000 CVE-2024-6610,0,0,e7175b3f300966611850e9b1403e59c253bcbbb5dce9d539450c19b2bca9cfd3,2024-08-29T18:22:37.277000 -CVE-2024-6611,0,1,102d605bb189ea442954feec50cbc1b79d4cb5728b389bfc836cc71d32e19f50,2024-10-25T18:35:10.737000 +CVE-2024-6611,0,0,102d605bb189ea442954feec50cbc1b79d4cb5728b389bfc836cc71d32e19f50,2024-10-25T18:35:10.737000 CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520a0,2024-07-16T18:15:09.667000 CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000 CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000 @@ -266482,7 +266496,7 @@ CVE-2024-8802,0,0,8bf5ff4db31e0529cbd08652ac36154d0a1e65a032bdeeb095aa4e8638ac05 CVE-2024-8803,0,0,1e0c20c4da3042f287bedde6aa980588230b643699023347d741bb81db132ef8,2024-10-02T17:15:12.677000 CVE-2024-8804,0,0,08d968e195b0f36220a0a723a12b9b939996510ce1ddcb52b8152a63b9728d80,2024-10-10T20:56:49.403000 CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000 -CVE-2024-8852,0,0,6e707f169e582bf83d369eb398c611abfab4370a43b37b2dee2a472eac3455de,2024-10-23T15:12:34.673000 +CVE-2024-8852,0,1,4c29aa9b59fffc51165fcfe6324e59328792cc2858478a0eeda39ebd10055ec2,2024-10-25T21:20:11.410000 CVE-2024-8853,0,0,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000 CVE-2024-8858,0,0,a55a2b45b2b7a3f3c60e0d8077307a88defc4d63f2b498893a25b1463c90c22f,2024-10-02T18:41:29.067000 CVE-2024-8861,0,0,d76e122800aa09ccce1d9be4ecd54fe7a1857f12f95213a173e1ba2fbaa723db,2024-10-01T13:41:27.213000 @@ -266876,7 +266890,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296 CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000 CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000 -CVE-2024-9530,0,1,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000 +CVE-2024-9530,0,0,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,2d32cff16aa07ef9767a12c3b335b7a483cb4a13b1ba87080414d4508df82841,2024-10-25T12:56:07.750000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000 @@ -266887,7 +266901,7 @@ CVE-2024-9537,0,0,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794a CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000 CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000 CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000 -CVE-2024-9541,0,0,fbfc6bf257239e94a920ef8216e53bcd44e7b1a868cd0ef0ec6d341767434436,2024-10-23T15:12:34.673000 +CVE-2024-9541,0,1,54c1df5f396c57f877a5cd4cb59c8edc81b18e3e67e601f49a4b9fc18ad0b5e9,2024-10-25T21:16:12.447000 CVE-2024-9543,0,0,2a7de8e1e43a15761699f58c8b8bbb57c7e560a2fb555c13127ead0f3f3c7fd9,2024-10-15T12:58:51.050000 CVE-2024-9546,0,0,ea5318b51e997216e9c0b4c2992b7385f781b09c9935f9fcf746ecd59aedacb8,2024-10-17T13:34:27.890000 CVE-2024-9548,0,0,23f20b2ca80b43ded081582273555d31a6ef11043d80544e9c344a73e21ef886,2024-10-17T13:46:07.997000 @@ -266922,11 +266936,11 @@ CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa38 CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000 CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000 CVE-2024-9583,0,0,04369671dcdc0ba41b402439013a80918f2a6c5ddfb5fc47088dd1f892929f97,2024-10-25T16:28:17.497000 -CVE-2024-9584,1,1,a992d61a5cdd03ad2d3b77cb6df10059852a63ac606a482384dba94358966cf7,2024-10-25T18:15:04.673000 -CVE-2024-9585,1,1,9855271ce8249d7c27d8b4a0f9f33c61ad619d88deb5f63a9da742af390b07ae,2024-10-25T18:15:04.907000 +CVE-2024-9584,0,0,a992d61a5cdd03ad2d3b77cb6df10059852a63ac606a482384dba94358966cf7,2024-10-25T18:15:04.673000 +CVE-2024-9585,0,0,9855271ce8249d7c27d8b4a0f9f33c61ad619d88deb5f63a9da742af390b07ae,2024-10-25T18:15:04.907000 CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000 -CVE-2024-9588,0,0,65aff2b1cd3b1280d8083f78d790697b85257a07a6c6e6516ccebd73625a92dc,2024-10-23T15:12:34.673000 +CVE-2024-9588,0,1,17edfb44b6dceb63c8cfe98df84bd537badbdd9e7eab4717bc301aff2d50d2c8,2024-10-25T21:15:39.970000 CVE-2024-9589,0,0,12420b2f38d2c93f0b54cb162fd986b1e3bc035cb82aa25afa709b3dca72935b,2024-10-23T15:12:34.673000 CVE-2024-9590,0,0,f04908a66c8eee122a17cc23cd10db8f2eac72ab6acc6c9d623f58ed2f5d06ed,2024-10-23T15:12:34.673000 CVE-2024-9591,0,0,18f850846f634f78ac97108e7dec46e1c5c5e29d9be70684269dc0702592824d,2024-10-23T15:12:34.673000 @@ -266946,7 +266960,7 @@ CVE-2024-9620,0,0,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf7 CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000 CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000 CVE-2024-9623,0,0,86dd85464498f6d194e548538328537f5fc627208085718de66c1a06e69de686,2024-10-16T16:59:36.817000 -CVE-2024-9627,0,0,ab5726be759a332c53fc28be3ad1e688481f8077248af16a587354d8ff7a5b98,2024-10-23T15:12:34.673000 +CVE-2024-9627,0,1,2b255751ca76c819864c389a91dcfc3f65321be83e43cc5abce958b149b5f5f2,2024-10-25T21:19:48.757000 CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 @@ -267102,5 +267116,5 @@ CVE-2024-9983,0,0,05b40e9cfe77e2a0c57e66e13edd76f3cb7232b22c3913645dde67dce84859 CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539a9,2024-10-16T22:03:23.407000 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000 -CVE-2024-9987,0,1,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000 +CVE-2024-9987,0,0,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000 CVE-2024-9991,0,0,135856d748c7daa954bd600476aafa57f64f806d190f4c4bca162ba71620ec7a,2024-10-25T13:15:18.250000