Auto-Update: 2024-12-02T13:01:29.638877+00:00

This commit is contained in:
cad-safe-bot 2024-12-02 13:04:40 +00:00
parent be6f0392d1
commit ba65a84894
16 changed files with 817 additions and 7 deletions

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "An \u201cAuthentication Bypass Using an Alternate Path or Channel\u201d vulnerability in the OPC UA Server configuration required for B&R mapp Cockpit before 6.0, B&R mapp View before 6.0, B&R mapp Services before 6.0, B&R mapp Motion before 6.0 and B&R mapp Vision before 6.0 may be used by an unauthenticated network-based attacker to cause information disclosure, unintended change of data, or denial of service conditions.\nB&R mapp Services is only affected, when mpUserX or mpCodeBox are used in the Automation Studio project."
},
{
"lang": "es",
"value": "Una vulnerabilidad de \u201cOmisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo\u201d en la configuraci\u00f3n del servidor OPC UA requerida para B&R mapp Cockpit anterior a la versi\u00f3n 6.0, B&R mapp View anterior a la versi\u00f3n 6.0, B&R mapp Services anterior a la versi\u00f3n 6.0, B&R mapp Motion anterior a la versi\u00f3n 6.0 y B&R mapp Vision anterior a la versi\u00f3n 6.0 puede ser utilizada por un atacante no autenticado basado en la red para provocar la divulgaci\u00f3n de informaci\u00f3n, un cambio no intencionado de datos o condiciones de denegaci\u00f3n de servicio. B&R mapp Services solo se ve afectado cuando se utilizan mpUserX o mpCodeBox en el proyecto de Automation Studio."
}
],
"metrics": {

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33036",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:06.840",
"lastModified": "2024-12-02T11:15:06.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while parsing sensor packets in camera driver, user-space variable is used while allocating memory in kernel and parsing which can lead to huge allocation or invalid memory access."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al analizar paquetes de sensores en el controlador de la c\u00e1mara, se utiliza una variable de espacio de usuario al asignar memoria en el kernel y analizar, lo que puede generar una asignaci\u00f3n enorme o un acceso a memoria no v\u00e1lido."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-823"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33037",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:07.753",
"lastModified": "2024-12-02T11:15:07.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure as NPU firmware can send invalid IPC message to NPU driver as the driver doesn`t validate the IPC message received from the firmware."
},
{
"lang": "es",
"value": " La divulgaci\u00f3n de informaci\u00f3n ya que el firmware de la NPU puede enviar un mensaje IPC no v\u00e1lido al controlador de la NPU ya que el controlador no valida el mensaje IPC recibido del firmware."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33039",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:07.920",
"lastModified": "2024-12-02T11:15:07.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when PAL client calls PAL service APIs by passing a random value as handle and the handle is not validated by the service."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria cuando el cliente PAL llama a las API del servicio PAL pasando un valor aleatorio como identificador y el servicio no valida el identificador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33040",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:08.070",
"lastModified": "2024-12-02T11:15:08.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while invoking redundant release command to release one buffer from user space as race condition can occur in kernel space between buffer release and buffer access."
},
{
"lang": "es",
"value": " Puede ocurrir corrupci\u00f3n de memoria al invocar el comando de liberaci\u00f3n redundante para liberar un b\u00fafer del espacio del usuario como condici\u00f3n de ejecuci\u00f3n en el espacio del n\u00facleo entre la liberaci\u00f3n del b\u00fafer y el acceso al b\u00fafer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33044",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:08.233",
"lastModified": "2024-12-02T11:15:08.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while Configuring the SMR/S2CR register in Bypass mode."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al configurar el registro SMR/S2CR en modo Bypass."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33053",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:08.423",
"lastModified": "2024-12-02T11:15:08.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when multiple threads try to unregister the CVP buffer at the same time."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria cuando varios subprocesos intentan anular el registro del b\u00fafer CVP al mismo tiempo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33056",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:08.600",
"lastModified": "2024-12-02T11:15:08.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when allocating and accessing an entry in an SMEM partition continuously."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al asignar y acceder a una entrada en una partici\u00f3n SMEM de forma continua."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-33063",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:08.783",
"lastModified": "2024-12-02T11:15:08.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while parsing the ML IE when a beacon with common info length of the ML IE greater than the ML IE inside which this element is present."
},
{
"lang": "es",
"value": " DOS transitorio mientras se analiza el ML IE cuando una baliza con una longitud de informaci\u00f3n com\u00fan del ML IE es mayor que el ML IE dentro del cual est\u00e1 presente este elemento."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43048",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:08.960",
"lastModified": "2024-12-02T11:15:08.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when invalid input is passed to invoke GPU Headroom API call."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria cuando se pasa una entrada no v\u00e1lida para invocar la llamada GPU Headroom API."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43049",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:09.120",
"lastModified": "2024-12-02T11:15:09.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al invocar llamadas IOCTL desde el espacio del usuario para establecer un comando privado gen\u00e9rico dentro del controlador WLAN."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43050",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:09.280",
"lastModified": "2024-12-02T11:15:09.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al invocar llamadas IOCTL desde el espacio del usuario para emitir un comando de prueba de f\u00e1brica dentro del controlador WLAN."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43052",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:09.443",
"lastModified": "2024-12-02T11:15:09.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing API calls to NPU with invalid input."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al procesar llamadas API a NPU con entrada no v\u00e1lida."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43053",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-12-02T11:15:09.603",
"lastModified": "2024-12-02T11:15:09.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information."
},
{
"lang": "es",
"value": " Corrupci\u00f3n de memoria al invocar llamadas IOCTL desde el espacio del usuario para leer informaci\u00f3n de diagn\u00f3stico del objetivo WLAN."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-02T11:01:05.006227+00:00
2024-12-02T13:01:29.638877+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-02T09:15:04.613000+00:00
2024-12-02T11:15:09.603000+00:00
```
### Last Data Feed Release
@ -33,20 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271770
271783
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `13`
- [CVE-2024-10490](CVE-2024/CVE-2024-104xx/CVE-2024-10490.json) (`2024-12-02T09:15:04.613`)
- [CVE-2024-33036](CVE-2024/CVE-2024-330xx/CVE-2024-33036.json) (`2024-12-02T11:15:06.840`)
- [CVE-2024-33037](CVE-2024/CVE-2024-330xx/CVE-2024-33037.json) (`2024-12-02T11:15:07.753`)
- [CVE-2024-33039](CVE-2024/CVE-2024-330xx/CVE-2024-33039.json) (`2024-12-02T11:15:07.920`)
- [CVE-2024-33040](CVE-2024/CVE-2024-330xx/CVE-2024-33040.json) (`2024-12-02T11:15:08.070`)
- [CVE-2024-33044](CVE-2024/CVE-2024-330xx/CVE-2024-33044.json) (`2024-12-02T11:15:08.233`)
- [CVE-2024-33053](CVE-2024/CVE-2024-330xx/CVE-2024-33053.json) (`2024-12-02T11:15:08.423`)
- [CVE-2024-33056](CVE-2024/CVE-2024-330xx/CVE-2024-33056.json) (`2024-12-02T11:15:08.600`)
- [CVE-2024-33063](CVE-2024/CVE-2024-330xx/CVE-2024-33063.json) (`2024-12-02T11:15:08.783`)
- [CVE-2024-43048](CVE-2024/CVE-2024-430xx/CVE-2024-43048.json) (`2024-12-02T11:15:08.960`)
- [CVE-2024-43049](CVE-2024/CVE-2024-430xx/CVE-2024-43049.json) (`2024-12-02T11:15:09.120`)
- [CVE-2024-43050](CVE-2024/CVE-2024-430xx/CVE-2024-43050.json) (`2024-12-02T11:15:09.280`)
- [CVE-2024-43052](CVE-2024/CVE-2024-430xx/CVE-2024-43052.json) (`2024-12-02T11:15:09.443`)
- [CVE-2024-43053](CVE-2024/CVE-2024-430xx/CVE-2024-43053.json) (`2024-12-02T11:15:09.603`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-10490](CVE-2024/CVE-2024-104xx/CVE-2024-10490.json) (`2024-12-02T09:15:04.613`)
## Download and Usage

View File

@ -243033,7 +243033,7 @@ CVE-2024-10486,0,0,6b6a9c7c1d7688efbd788cfa89c1b8eec85247981e0e8dab673908aaadf96
CVE-2024-10487,0,0,78655a991e24aa9dd082cd3faff3773a1cc1b0ed3ddfc55ae09b7e96ee30ac89,2024-11-01T12:57:35.843000
CVE-2024-10488,0,0,045961a4da52daca0a2cd9eefa7cb2efdc030f8f660cedb82c9b820a312a0393,2024-11-01T12:57:35.843000
CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000
CVE-2024-10490,1,1,540e3d433c2a7b5c13078c69c944691f837d8e34471f02dddb654091c4fc6fe5,2024-12-02T09:15:04.613000
CVE-2024-10490,0,1,abae587613dea9a6dbb3f017687200a71977d37a7c7f2121132f96d39bada6dd,2024-12-02T09:15:04.613000
CVE-2024-10491,0,0,e248bde85b2f7fd1287809048c400717455f435ea164b73bd377fe9febeb3eb0,2024-11-06T23:08:49.780000
CVE-2024-10492,0,0,a604e2796b006c65216b1c0eacba3562048fb386350f20f059e5d64c58a4853f,2024-11-25T08:15:08.453000
CVE-2024-10493,0,0,8b36ab5511eb3bbf88fe3b986fb9a2e12d56937db7b6e071f13b5eb806dc7131,2024-11-29T16:15:08.583000
@ -254538,9 +254538,14 @@ CVE-2024-33032,0,0,98ee54090123171615e158b27044fae77331db53953631f8b90c74c1f7493
CVE-2024-33033,0,0,4ecde980d061a097abb6c1ea846d9ab81a0ba801acd0bcdb214e87c679daef4c,2024-11-07T19:39:24.863000
CVE-2024-33034,0,0,e88e5493c643619d79b7a0e6414306006539dc4b0eb6352ed218b58798008272,2024-11-20T13:54:40.360000
CVE-2024-33035,0,0,a2cbf1ac3ca408060419991a03b24932660c70b02e16b8809b1fde0e9b502e88,2024-09-03T12:59:02.453000
CVE-2024-33036,1,1,6f25ea2f9c4bb2d4d0f04cb269c78494099c96655f7a7e16ea958b5dbc87ecaf,2024-12-02T11:15:06.840000
CVE-2024-33037,1,1,68cf0e606e759d8048c47a1a58c833190e6481c5b3bff36a2ff0a2574775fa75,2024-12-02T11:15:07.753000
CVE-2024-33038,0,0,d174e8cb32f352bb37d4cf42fb06ed39c66af4e6d398e5501824f9508319fcd5,2024-09-04T17:21:28.943000
CVE-2024-33039,1,1,321101db0fe412b92320a4c7971351343c5da08861c2971314eafcf40a94c74f,2024-12-02T11:15:07.920000
CVE-2024-33040,1,1,557d3c60435c4de81954a3cc1ef65d7bb745ea24893ed069ded6749d1fe2ed8b,2024-12-02T11:15:08.070000
CVE-2024-33042,0,0,4b177417250f6f5481ff89aae684855afcf48f2fdcb2418d54c43ca978dae432,2024-09-04T17:08:07.433000
CVE-2024-33043,0,0,e440b5c9b2a1727157025810ce1b92ddb45351842873f98e286f1378d612b47c,2024-09-03T12:59:02.453000
CVE-2024-33044,1,1,579c36860147f181fc923fd62199d7d8dcb0c2ef676cd46f5480f4491cc20c6d,2024-12-02T11:15:08.233000
CVE-2024-33045,0,0,c750be85f91783e59cd18e60c65725c2f8e2b0f2771fc29ca9f691ba1ec0dcfe,2024-09-04T17:20:55.297000
CVE-2024-33047,0,0,cb0eb88ac7f41a9c98cf0d3c8ebd2b1f66d8a5c56732d8ae21823446d39c74ab,2024-09-04T17:07:31.877000
CVE-2024-33048,0,0,f9f67875b847da24eb9cf137e9f097d769cd7f8f3d65d24eb4619818f972d900,2024-09-04T17:20:01.083000
@ -254549,10 +254554,13 @@ CVE-2024-3305,0,0,60cb4bdd6aab216e8dcee2531752f4a05622ff14e3e073fcab37d9212a2d0c
CVE-2024-33050,0,0,90923f1d1865d88057676c94e2b893aea7270f8731add142aed38ad6597070db,2024-09-04T17:07:13.930000
CVE-2024-33051,0,0,1fd409b2ba830a4d68baa6f497a6e4704a55e16bd6f855473d9753382be831b5,2024-09-04T17:18:10.950000
CVE-2024-33052,0,0,13554474bfa747d124854139f3134a9830507865a3c50c094520491b9689b9b9,2024-09-04T17:18:07.783000
CVE-2024-33053,1,1,14690055ae147c383e68cd73b5110438c5a3e366507cb1f3475694b5bc488b63,2024-12-02T11:15:08.423000
CVE-2024-33054,0,0,67fa57bf4b27f2520026aaaf6b13807e21cefd1307528e92c6c6a61d930ac6dc,2024-09-04T17:06:47.337000
CVE-2024-33056,1,1,df4ec0f261a0ae4864165c553dc06cc6012d32ac431b99867b1541d1ea954cef,2024-12-02T11:15:08.600000
CVE-2024-33057,0,0,fc38afeaa7486b0a5aebc4f1315319ab783e3abf0a4193027aaf853eaf32aed0,2024-09-04T17:06:24.843000
CVE-2024-3306,0,0,395196a450f14ac42a9c4c7d5b943f8723d96e3f07723d87dcdff36c939bae9a,2024-09-19T14:43:51.830000
CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b78e7,2024-09-04T17:06:08.407000
CVE-2024-33063,1,1,c0f5ff1c34636507c2a8fc61ff59f5ba1f578c53cf4eac7955002a5a74a16022,2024-12-02T11:15:08.783000
CVE-2024-33064,0,0,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000
CVE-2024-33065,0,0,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000
CVE-2024-33066,0,0,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000
@ -261626,7 +261634,12 @@ CVE-2024-43042,0,0,d94e46af540f49a4f3c40e5f52dafd9243317a2003df44ac76bccf484c7ee
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000
CVE-2024-43047,0,0,0d74f1bcc5dc754e35ff59d035ec7a934e6a0f15d06acedd36f35069ccd0e437,2024-10-09T14:39:06.540000
CVE-2024-43048,1,1,12ab5658c6dc9f8e6451ae0126e5d91f20dfb5810c0021f63e3d0783f6e9e308,2024-12-02T11:15:08.960000
CVE-2024-43049,1,1,afb5241eb91645f4eee2c10d59701cd1ac23510a32165c2b11aac0a04d3fb792,2024-12-02T11:15:09.120000
CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000
CVE-2024-43050,1,1,1d6b3d0f4543f84f03bf2f16e40dc88adb35b5a08599678f58cf9e1c1b190a63,2024-12-02T11:15:09.280000
CVE-2024-43052,1,1,14f3e857f33c22a8433386e59a6e95ce8612c123b8ec9eb3196c6be7caa30f46,2024-12-02T11:15:09.443000
CVE-2024-43053,1,1,6408912b985709e7cc41d2bc00a03a756e0c4452731e8948f4d262d555ee5e19,2024-12-02T11:15:09.603000
CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000
CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000
CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000

Can't render this file because it is too large.