From bdc74a7bb47b84f1da46a543717a55c442b99e69 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 10 Oct 2024 18:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-10-10T18:00:18.882198+00:00 --- CVE-2021/CVE-2021-250xx/CVE-2021-25091.json | 6 +- CVE-2021/CVE-2021-250xx/CVE-2021-25092.json | 6 +- CVE-2021/CVE-2021-250xx/CVE-2021-25093.json | 6 +- CVE-2021/CVE-2021-391xx/CVE-2021-39118.json | 24 ++- CVE-2021/CVE-2021-391xx/CVE-2021-39122.json | 24 ++- CVE-2021/CVE-2021-391xx/CVE-2021-39123.json | 24 ++- CVE-2022/CVE-2022-41xx/CVE-2022-4199.json | 6 +- CVE-2023/CVE-2023-208xx/CVE-2023-20827.json | 34 +++- CVE-2023/CVE-2023-208xx/CVE-2023-20828.json | 34 +++- CVE-2023/CVE-2023-208xx/CVE-2023-20829.json | 34 +++- CVE-2023/CVE-2023-208xx/CVE-2023-20830.json | 34 +++- CVE-2023/CVE-2023-208xx/CVE-2023-20831.json | 34 +++- CVE-2023/CVE-2023-255xx/CVE-2023-25581.json | 90 +++++++++ CVE-2023/CVE-2023-257xx/CVE-2023-25773.json | 12 +- CVE-2023/CVE-2023-26xx/CVE-2023-2603.json | 20 +- CVE-2023/CVE-2023-421xx/CVE-2023-42135.json | 6 +- CVE-2023/CVE-2023-421xx/CVE-2023-42136.json | 6 +- CVE-2023/CVE-2023-421xx/CVE-2023-42137.json | 8 +- CVE-2023/CVE-2023-45xx/CVE-2023-4537.json | 6 +- CVE-2023/CVE-2023-45xx/CVE-2023-4540.json | 19 +- CVE-2023/CVE-2023-46xx/CVE-2023-4612.json | 8 +- CVE-2023/CVE-2023-48xx/CVE-2023-4818.json | 8 +- CVE-2023/CVE-2023-492xx/CVE-2023-49256.json | 6 +- CVE-2023/CVE-2023-492xx/CVE-2023-49257.json | 6 +- CVE-2023/CVE-2023-492xx/CVE-2023-49259.json | 6 +- CVE-2023/CVE-2023-492xx/CVE-2023-49261.json | 4 +- CVE-2023/CVE-2023-492xx/CVE-2023-49262.json | 6 +- CVE-2023/CVE-2023-53xx/CVE-2023-5378.json | 6 +- CVE-2023/CVE-2023-65xx/CVE-2023-6551.json | 8 +- CVE-2023/CVE-2023-69xx/CVE-2023-6998.json | 8 +- CVE-2024/CVE-2024-08xx/CVE-2024-0864.json | 6 +- CVE-2024/CVE-2024-16xx/CVE-2024-1604.json | 6 +- CVE-2024/CVE-2024-16xx/CVE-2024-1605.json | 6 +- CVE-2024/CVE-2024-27xx/CVE-2024-2759.json | 6 +- CVE-2024/CVE-2024-34xx/CVE-2024-3462.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35202.json | 39 +++- CVE-2024/CVE-2024-356xx/CVE-2024-35687.json | 6 +- CVE-2024/CVE-2024-418xx/CVE-2024-41817.json | 6 +- CVE-2024/CVE-2024-449xx/CVE-2024-44955.json | 69 ++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44958.json | 125 +++++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44959.json | 99 +++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44976.json | 90 ++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44977.json | 113 ++++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44979.json | 90 ++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44980.json | 90 ++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44982.json | 126 +++++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44984.json | 102 +++++++++- CVE-2024/CVE-2024-449xx/CVE-2024-44988.json | 164 +++++++++++++++- CVE-2024/CVE-2024-47xx/CVE-2024-4748.json | 6 +- CVE-2024/CVE-2024-72xx/CVE-2024-7265.json | 8 +- CVE-2024/CVE-2024-72xx/CVE-2024-7266.json | 8 +- CVE-2024/CVE-2024-97xx/CVE-2024-9793.json | 145 ++++++++++++++ CVE-2024/CVE-2024-97xx/CVE-2024-9794.json | 137 +++++++++++++ CVE-2024/CVE-2024-97xx/CVE-2024-9797.json | 141 ++++++++++++++ CVE-2024/CVE-2024-97xx/CVE-2024-9799.json | 141 ++++++++++++++ CVE-2024/CVE-2024-98xx/CVE-2024-9803.json | 141 ++++++++++++++ README.md | 74 ++++--- _state.csv | 204 ++++++++++---------- 58 files changed, 2324 insertions(+), 327 deletions(-) create mode 100644 CVE-2023/CVE-2023-255xx/CVE-2023-25581.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9793.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9794.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9797.json create mode 100644 CVE-2024/CVE-2024-97xx/CVE-2024-9799.json create mode 100644 CVE-2024/CVE-2024-98xx/CVE-2024-9803.json diff --git a/CVE-2021/CVE-2021-250xx/CVE-2021-25091.json b/CVE-2021/CVE-2021-250xx/CVE-2021-25091.json index 49611c3a8f7..a81209be31f 100644 --- a/CVE-2021/CVE-2021-250xx/CVE-2021-25091.json +++ b/CVE-2021/CVE-2021-250xx/CVE-2021-25091.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25091", "sourceIdentifier": "contact@wpscan.com", "published": "2022-02-01T13:15:09.410", - "lastModified": "2022-02-04T17:59:29.353", + "lastModified": "2024-10-10T16:59:04.827", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.2.9", - "matchCriteriaId": "DEA26EEA-A515-405C-963A-A1200053F9F0" + "matchCriteriaId": "B12E1682-0541-46FF-BCA6-D983C7223A52" } ] } diff --git a/CVE-2021/CVE-2021-250xx/CVE-2021-25092.json b/CVE-2021/CVE-2021-250xx/CVE-2021-25092.json index f3e785e738c..4b9ec5027c3 100644 --- a/CVE-2021/CVE-2021-250xx/CVE-2021-25092.json +++ b/CVE-2021/CVE-2021-250xx/CVE-2021-25092.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25092", "sourceIdentifier": "contact@wpscan.com", "published": "2022-02-01T13:15:09.460", - "lastModified": "2022-02-04T17:58:33.397", + "lastModified": "2024-10-10T16:59:04.827", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.2.8", - "matchCriteriaId": "4FCA212E-11B4-48F5-9E49-47013D294CE4" + "matchCriteriaId": "68E99884-F1E1-4F82-A97A-AA7E3293E319" } ] } diff --git a/CVE-2021/CVE-2021-250xx/CVE-2021-25093.json b/CVE-2021/CVE-2021-250xx/CVE-2021-25093.json index 5a013ed06ae..4dceb9bfe1e 100644 --- a/CVE-2021/CVE-2021-250xx/CVE-2021-25093.json +++ b/CVE-2021/CVE-2021-250xx/CVE-2021-25093.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25093", "sourceIdentifier": "contact@wpscan.com", "published": "2022-02-01T13:15:09.510", - "lastModified": "2022-02-04T17:57:27.240", + "lastModified": "2024-10-10T16:59:04.827", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.2.8", - "matchCriteriaId": "4FCA212E-11B4-48F5-9E49-47013D294CE4" + "matchCriteriaId": "68E99884-F1E1-4F82-A97A-AA7E3293E319" } ] } diff --git a/CVE-2021/CVE-2021-391xx/CVE-2021-39118.json b/CVE-2021/CVE-2021-391xx/CVE-2021-39118.json index e7abec49296..f1724c410c5 100644 --- a/CVE-2021/CVE-2021-391xx/CVE-2021-39118.json +++ b/CVE-2021/CVE-2021-391xx/CVE-2021-39118.json @@ -2,8 +2,8 @@ "id": "CVE-2021-39118", "sourceIdentifier": "security@atlassian.com", "published": "2021-09-14T05:15:09.900", - "lastModified": "2022-06-28T14:11:45.273", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:00.827", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-391xx/CVE-2021-39122.json b/CVE-2021/CVE-2021-391xx/CVE-2021-39122.json index 1e29e823e16..abc2e0f41c9 100644 --- a/CVE-2021/CVE-2021-391xx/CVE-2021-39122.json +++ b/CVE-2021/CVE-2021-391xx/CVE-2021-39122.json @@ -2,8 +2,8 @@ "id": "CVE-2021-39122", "sourceIdentifier": "security@atlassian.com", "published": "2021-09-08T02:15:06.787", - "lastModified": "2022-03-30T13:29:19.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:01.610", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-391xx/CVE-2021-39123.json b/CVE-2021/CVE-2021-391xx/CVE-2021-39123.json index c5d08610be3..bf094f3bb4f 100644 --- a/CVE-2021/CVE-2021-391xx/CVE-2021-39123.json +++ b/CVE-2021/CVE-2021-391xx/CVE-2021-39123.json @@ -2,8 +2,8 @@ "id": "CVE-2021-39123", "sourceIdentifier": "security@atlassian.com", "published": "2021-09-14T05:15:09.993", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:02.213", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json index ea3d6b04933..b1185fa87bb 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4199", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.143", - "lastModified": "2023-11-07T03:57:09.600", + "lastModified": "2024-10-10T16:59:04.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -48,9 +48,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.4.1", - "matchCriteriaId": "E12AA0BA-F7DB-4F44-AFC4-477CEA5DABE5" + "matchCriteriaId": "5F313B36-93A6-425A-83DE-8989001DA479" } ] } diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20827.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20827.json index a71eded169e..21a0e1fd725 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20827.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20827.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20827", "sourceIdentifier": "security@mediatek.com", "published": "2023-09-04T03:15:09.270", - "lastModified": "2023-09-07T19:13:24.850", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:03.543", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1298" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20828.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20828.json index 11bb756f97a..96d119cc38b 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20828.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20828.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20828", "sourceIdentifier": "security@mediatek.com", "published": "2023-09-04T03:15:09.413", - "lastModified": "2023-09-07T19:13:33.270", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:04.517", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20829.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20829.json index 329d9c12bea..52246e142f9 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20829.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20829.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20829", "sourceIdentifier": "security@mediatek.com", "published": "2023-09-04T03:15:09.527", - "lastModified": "2023-09-07T19:07:12.237", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:05.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20830.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20830.json index da88c95d8dd..6b310fc3057 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20830.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20830.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20830", "sourceIdentifier": "security@mediatek.com", "published": "2023-09-04T03:15:09.650", - "lastModified": "2023-09-07T19:07:25.423", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:07.153", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20831.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20831.json index e101543cbb7..4a50834b5ff 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20831.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20831.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20831", "sourceIdentifier": "security@mediatek.com", "published": "2023-09-04T03:15:09.770", - "lastModified": "2023-09-07T19:07:47.907", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:35:08.083", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25581.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25581.json new file mode 100644 index 00000000000..3702e9290ad --- /dev/null +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25581.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2023-25581", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-10T16:15:04.923", + "lastModified": "2024-10-10T16:15:04.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "pac4j is a security framework for Java. `pac4j-core` prior to version 4.0.0 is affected by a Java deserialization vulnerability. The vulnerability affects systems that store externally controlled values in attributes of the `UserProfile` class from pac4j-core. It can be exploited by providing an attribute that contains a serialized Java object with a special prefix `{#sb64}` and Base64 encoding. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. pac4j versions 4.0.0 and greater are not affected by this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/frohoff/ysoserial", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pac4j/pac4j/blob/5834aeb22ad3a4369dfa572be60d7b20f5784a8f/pac4j-core/src/main/java/org/pac4j/core/profile/InternalAttributeHandler.java#L95", + "source": "security-advisories@github.com" + }, + { + "url": "https://portswigger.net/web-security/deserialization", + "source": "security-advisories@github.com" + }, + { + "url": "https://securitylab.github.com/advisories/GHSL-2022-085_pac4j/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25773.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25773.json index 1507085a06a..63f66c1908a 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25773.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25773.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25773", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:18.820", - "lastModified": "2023-11-07T04:09:11.320", + "lastModified": "2024-10-10T16:35:09.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -75,6 +75,16 @@ "value": "CWE-284" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json index 812f3f3ac2a..f67ff0e286c 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2603.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2603", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-06T20:15:13.187", - "lastModified": "2023-11-30T05:15:08.800", - "vulnStatus": "Modified", + "lastModified": "2024-10-10T16:32:56.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:libcap_project:libcap:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2.66-4", - "matchCriteriaId": "6020DB67-8972-4BD9-8AF4-045C9E0B7AFA" + "versionEndExcluding": "2.69", + "matchCriteriaId": "93256DE7-08CA-4545-BF7E-2C916721F487" } ] } @@ -141,11 +141,19 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf", diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42135.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42135.json index 4a5b6be0238..ebe4df23031 100644 --- a/CVE-2023/CVE-2023-421xx/CVE-2023-42135.json +++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42135.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42135", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-15T14:15:24.413", - "lastModified": "2024-01-19T15:47:29.607", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:05.690", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-74" } ] } diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42136.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42136.json index aedaa3cc639..668e59f2a8d 100644 --- a/CVE-2023/CVE-2023-421xx/CVE-2023-42136.json +++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42136.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42136", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-15T14:15:24.670", - "lastModified": "2024-01-19T16:19:25.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:05.880", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-77" } ] } diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42137.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42137.json index 3742bf58f00..63f2c5de6ec 100644 --- a/CVE-2023/CVE-2023-421xx/CVE-2023-42137.json +++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42137.json @@ -2,13 +2,13 @@ "id": "CVE-2023-42137", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-15T14:15:24.900", - "lastModified": "2024-01-19T16:21:06.650", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:06.090", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks.\n\n\n\n\nThe attacker must have shell access to the device in order to exploit this vulnerability. \n\n\n" + "value": "PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks.\n\n\n\n\nThe attacker must have shell access to the device in order to exploit this vulnerability." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-59" } ] } diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4537.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4537.json index 698585a30fe..324647358dc 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4537.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4537.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4537", "sourceIdentifier": "cvd@cert.pl", "published": "2024-02-15T09:15:33.273", - "lastModified": "2024-02-15T14:28:31.380", + "lastModified": "2024-10-10T16:15:06.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-311" + "value": "CWE-755" } ] } @@ -57,7 +57,7 @@ "source": "cvd@cert.pl" }, { - "url": "https://cert.pl/posts/2023/02/CVE-2023-4537/", + "url": "https://cert.pl/posts/2024/02/CVE-2023-4537/", "source": "cvd@cert.pl" } ] diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json index 5ef804be1a6..986944e100e 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json @@ -2,13 +2,13 @@ "id": "CVE-2023-4540", "sourceIdentifier": "cvd@cert.pl", "published": "2023-09-05T08:15:40.017", - "lastModified": "2023-10-13T01:30:13.930", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:07.110", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \n\nThis issue affects lua-http: all versions before commit ddab283." + "value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \nSuch a request causes the program to enter an infinite loop. \n\nThis issue affects lua-http: all versions before commit ddab283." }, { "lang": "es", @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-755" + "value": "CWE-835" } ] } @@ -79,6 +79,10 @@ } ], "references": [ + { + "url": "https://cert.pl/en/posts/2023/09/CVE-2023-4540/", + "source": "cvd@cert.pl" + }, { "url": "https://cert.pl/posts/2023/09/CVE-2023-4540/", "source": "cvd@cert.pl", @@ -93,13 +97,6 @@ "tags": [ "Patch" ] - }, - { - "url": "https://https://cert.pl/en/posts/2023/09/CVE-2023-4540/", - "source": "cvd@cert.pl", - "tags": [ - "Broken Link" - ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4612.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4612.json index 26e5ee0485f..f7bddf6e8d7 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4612.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4612.json @@ -2,13 +2,13 @@ "id": "CVE-2023-4612", "sourceIdentifier": "cvd@cert.pl", "published": "2023-11-09T14:15:08.183", - "lastModified": "2023-11-17T17:42:18.630", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:07.260", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Authentication vulnerability in Apereo CAS in\u00a0jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability.\n\n\n\n\n\n\n\n\n" + "value": "Improper Authentication vulnerability in Apereo CAS in\u00a0jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability." }, { "lang": "es", @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-302" } ] } diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json index 8ffc58daba1..74e43737bf2 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4818.json @@ -2,13 +2,13 @@ "id": "CVE-2023-4818", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-15T14:15:25.180", - "lastModified": "2024-01-19T16:35:49.683", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:07.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.\u00a0\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability.\n\n" + "value": "PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.\u00a0\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability." }, { "lang": "es", @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-74" } ] } diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49256.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49256.json index b5efaca8b78..75ec5ef2ec9 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49256.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49256.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49256", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.160", - "lastModified": "2024-01-18T21:14:03.490", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:06.313", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-798" + "value": "CWE-321" } ] } diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49257.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49257.json index d72e6501893..15e099013b0 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49257.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49257.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49257", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.230", - "lastModified": "2024-01-18T21:13:51.623", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:06.553", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-732" + "value": "CWE-434" } ] } diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49259.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49259.json index c0bf9a8b30e..219666a70fd 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49259.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49259.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49259", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.380", - "lastModified": "2024-01-18T20:33:22.163", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:06.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-327" + "value": "CWE-341" } ] } diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49261.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49261.json index 193b44cbbe8..478d26e01f5 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49261.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49261", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.530", - "lastModified": "2024-09-04T20:35:12.553", + "lastModified": "2024-10-10T16:15:06.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-201" } ] }, diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json index 1b388dd43f9..884c2068550 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49262.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49262", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-12T15:15:09.593", - "lastModified": "2024-01-19T02:11:40.757", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:06.893", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-190" } ] } diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json index f9d06d9fccf..783d8974df1 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json @@ -2,13 +2,13 @@ "id": "CVE-2023-5378", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-29T12:15:07.860", - "lastModified": "2024-02-19T12:15:43.980", + "lastModified": "2024-10-10T16:15:07.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Input Validation vulnerability in MegaBIP and already unsupported SmodBIP software allows for Stored XSS.This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2.\u00a0MegaBIP 5.08 was tested and is not vulnerable. A precise range of vulnerable versions remains unknown.\n\n\n" + "value": "Improper Input Validation vulnerability in MegaBIP and already unsupported SmodBIP software allows for Stored XSS.This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2.\u00a0MegaBIP 5.08 was tested and is not vulnerable. A precise range of vulnerable versions remains unknown." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-79" } ] } diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json index a5a2bc27fbd..ecc8530591d 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6551.json @@ -2,13 +2,13 @@ "id": "CVE-2023-6551", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-04T16:15:09.380", - "lastModified": "2024-01-11T16:41:19.250", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:07.720", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. \n\n\nDevelopers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. \n\n\nThe README has been updated to include these guidelines.\n\n\n" + "value": "As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. \n\n\nDevelopers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. \n\n\nThe README has been updated to include these guidelines." }, { "lang": "es", @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-434" } ] } diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6998.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6998.json index 4df08fe9475..482d66fe299 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6998.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6998.json @@ -2,13 +2,13 @@ "id": "CVE-2023-6998", "sourceIdentifier": "cvd@cert.pl", "published": "2023-12-30T19:15:08.303", - "lastModified": "2024-01-11T20:25:14.163", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:07.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper privilege management vulnerability in CoolKit Technology eWeLink on Android and iOS allows application lockscreen bypass.This issue affects eWeLink before 5.2.0.\n\n" + "value": "Improper privilege management vulnerability in CoolKit Technology eWeLink on Android and iOS allows application lockscreen bypass.This issue affects eWeLink before 5.2.0." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-305" } ] } diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json index fdbb1bb8d0e..71aa56bf20c 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0864.json @@ -2,13 +2,13 @@ "id": "CVE-2024-0864", "sourceIdentifier": "cvd@cert.pl", "published": "2024-02-29T13:15:07.260", - "lastModified": "2024-08-29T20:35:57.690", + "lastModified": "2024-10-10T16:15:07.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.\nBy default, Laragon is not vulnerable until a user decides to use the\u00a0aforementioned plugin. \n" + "value": "Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.\nBy default, Laragon is not vulnerable until a user decides to use the\u00a0aforementioned plugin." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-434" } ] } diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json index 3c00952d7aa..6f3b16f1fda 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1604.json @@ -2,13 +2,13 @@ "id": "CVE-2024-1604", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-18T10:15:19.900", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-10-10T16:15:08.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper authorization in the report management and creation module of BMC Control-M branches\u00a09.0.20 and 9.0.21 allows logged-in users to read and make unauthorized changes to any reports available within the application, even without proper permissions. The attacker must know the unique identifier of the report they want to manipulate.\n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201. \n" + "value": "Improper authorization in the report management and creation module of BMC Control-M branches\u00a09.0.20 and 9.0.21 allows logged-in users to read and make unauthorized changes to any reports available within the application, even without proper permissions. The attacker must know the unique identifier of the report they want to manipulate.\n\n\n\n\n\n\n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "CWE-639" } ] } diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json index c0778040a02..1fc4c85b146 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1605.json @@ -2,13 +2,13 @@ "id": "CVE-2024-1605", "sourceIdentifier": "cvd@cert.pl", "published": "2024-03-18T10:15:20.583", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-10-10T16:15:08.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "BMC Control-M branches 9.0.20 and 9.0.21 upon user login load all Dynamic Link Libraries (DLL) from a directory that grants Write and Read permissions to all users. Leveraging it leads to loading of a potentially malicious libraries, which will execute with the application's privileges. \n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201. \n\n" + "value": "BMC Control-M branches 9.0.20 and 9.0.21 upon user login load all Dynamic Link Libraries (DLL) from a directory that grants Write and Read permissions to all users. Leveraging it leads to loading of a potentially malicious libraries, which will execute with the application's privileges. \n\n\n\n\n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-276" } ] } diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2759.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2759.json index fcd9ff8eccf..cac8930aa19 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2759.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2759.json @@ -2,13 +2,13 @@ "id": "CVE-2024-2759", "sourceIdentifier": "cvd@cert.pl", "published": "2024-04-04T14:15:10.220", - "lastModified": "2024-04-04T16:33:06.610", + "lastModified": "2024-10-10T16:15:08.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper access control vulnerability in Apaczka plugin for PrestaShop allows information gathering from saved templates without authentication.This issue affects Apaczka plugin for PrestaShop from v1 through v4.\n\n" + "value": "Improper access control vulnerability in Apaczka plugin for PrestaShop allows information gathering from saved templates without authentication.This issue affects Apaczka plugin for PrestaShop from v1 through v4." }, { "lang": "es", @@ -23,7 +23,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-552" } ] } diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3462.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3462.json index e16737444ab..aecbc2aadfe 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3462.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3462.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3462", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-14T15:41:14.040", - "lastModified": "2024-05-14T16:11:39.510", + "lastModified": "2024-10-10T16:15:08.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -23,7 +23,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "CWE-302" } ] } diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json index 5f9a3770d46..a869255424e 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35202.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35202", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-10T13:15:14.077", - "lastModified": "2024-10-10T13:15:14.077", + "lastModified": "2024-10-10T16:35:11.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35687.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35687.json index 2acb065ad1e..4dd2fcacc7d 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35687.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35687.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35687", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:51.000", - "lastModified": "2024-07-18T19:12:50.843", + "lastModified": "2024-10-10T16:59:04.827", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.6.4", - "matchCriteriaId": "B0156BD6-F412-4753-B5A5-F751F00BFAA7" + "matchCriteriaId": "28F5D46D-2ECE-4AD7-8B11-96D7EB6BAC0F" } ] } diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json index 7b465e61f1d..31bf52e0654 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41817", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T16:15:05.360", - "lastModified": "2024-09-11T16:16:23.090", + "lastModified": "2024-10-10T17:25:47.637", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,8 +91,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", - "versionEndExcluding": "7.11-36", - "matchCriteriaId": "0DB31638-1DA7-4EBE-B65D-E55D490107C5" + "versionEndExcluding": "7.1.1-36", + "matchCriteriaId": "77361F36-4709-4D0E-964D-DEF566899360" } ] } diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json index d417545728d..251d62076bf 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.423", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:57:00.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: No hacer referencia a dc_sink en is_dsc_need_re_compute [Por qu\u00e9] Cuando se desconecta uno de los monitores conectados despu\u00e9s del concentrador mst, se produce una desreferencia de puntero nulo. Esto se debe a que dc_sink se libera inmediatamente en early_unregister() o detect_ctx(). Cuando se confirma un nuevo estado que hace referencia directa a la informaci\u00f3n almacenada en dc_sink, se producir\u00e1 una desreferencia de puntero nulo. [C\u00f3mo] Eliminar la condici\u00f3n de comprobaci\u00f3n redundante. La condici\u00f3n relevante ya deber\u00eda estar cubierta comprobando si dsc_aux es nulo o no. Tambi\u00e9n se restablece dsc_aux a NULL cuando se desconecta el conector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "E4CB0927-C720-465B-99F2-3E47215515F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/39b217193729aa45eded8de24d9245468a0c0263", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fcf6a49d79923a234844b8efe830a61f3f0584e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44958.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44958.json index 253655630b8..63bc8ab073a 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44958.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44958.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44958", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.580", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:56:24.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,136 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched/smt: Corregir desequilibrio en sched_smt_present dec/inc Recib\u00ed el siguiente informe de advertencia mientras realizaba una prueba de estr\u00e9s: etiqueta de salto: \u00a1recuento negativo! ADVERTENCIA: CPU: 3 PID: 38 en kernel/jump_label.c:263 static_key_slow_try_dec+0x9d/0xb0 Seguimiento de llamadas: __static_key_slow_dec_cpuslocked+0x16/0x70 sched_cpu_deactivate+0x26e/0x2a0 cpuhp_invoke_callback+0x3ad/0x10d0 cpuhp_thread_fun+0x3f5/0x680 smpboot_thread_fn+0x56d/0x8d0 kthread+0x309/0x400 ret_from_fork+0x41/0x70 ret_from_fork_asm+0x1b/0x30 Porque cuando cpuset_cpu_inactive() falla en sched_cpu_deactivate(), la CPU fuera de l\u00ednea fall\u00f3, pero sched_smt_present se decrementa antes de llamar a sched_cpu_deactivate(), esto genera un dec/inc desequilibrado, por lo que debe solucionarlo incrementando sched_smt_present en la ruta de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.86", + "versionEndExcluding": "4.15", + "matchCriteriaId": "4B10ECDC-134F-409F-8DC5-1B38E76D5478" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.7", + "versionEndExcluding": "4.20", + "matchCriteriaId": "BFCE51A8-A708-49F5-B629-C107F587C29F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "4F2025E4-76F7-4500-8020-B236CD18654A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2a3548c7ef2e135aee40e7e5e44e7d11b893e7c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2cf7665efe451e48d27953e6b5bc627d518c902b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65727331b60197b742089855ac09464c22b96f66", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0c87a3c6be10a57aa3463c32c3fc6b2a47c3dab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e22f910a26cc2a3ac9c66b8e935ef2a7dd881117", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44959.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44959.json index 084a8459e19..21d54ef6a74 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44959.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44959.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44959", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.637", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:54:07.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,106 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracefs: usar RCU de inodo gen\u00e9rico para sincronizar la liberaci\u00f3n con la aleatorizaci\u00f3n del dise\u00f1o de la estructura habilitada para 'struct inode', debemos evitar superponer cualquiera de los miembros de RCU utilizados o inicializados solo una vez, por ejemplo, i_lru o i_sb_list para no da\u00f1ar los recorridos de listas relacionadas al hacer uso de rcu_head. En caso de una disposici\u00f3n desafortunada de la estructura 'struct inode', podemos terminar con el siguiente resultado al ejecutar las pruebas autom\u00e1ticas de ftrace: [<...>] corrupci\u00f3n de list_del, ffff888103ee2cb0->next (tracefs_inode_cache+0x0/0x4e0 [objeto slab]) es NULL (prev es tracefs_inode_cache+0x78/0x4e0 [objeto slab]) [<...>] ------------[ cortar aqu\u00ed ]------------ [<...>] \u00a1ERROR del kernel en lib/list_debug.c:54! [<...>] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP KASAN [<...>] CPU: 3 PID: 2550 Comm: mount Contaminado: GN 6.8.12-grsec+ #122 ed2f536ca62f28b087b90e3cc906a8d25b3ddc65 [<...>] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 [<...>] RIP: 0010:[] __list_del_entry_valid_or_report+0x138/0x3e0 [<...>] C\u00f3digo: 48 b8 99 fb 65 f2 ff ff ff es e9 03 5c d9 fc cc 48 b8 99 fb 65 f2 es ff es ff es ff e9 33 5a d9 fc cc 48 b8 99 fb 65 f2 es ff es ff es ff <0f> 0b 4c 89 e9 48 89 ea 48 89 ee 48 c7 c7 60 8f dd 89 31 c0 e8 2f [<...>] RSP: 0018:fffffe80416afaf0 EFLAGS: 00010283 [<...>] RAX: 000000000000098 RBX: ffff888103ee2cb0 RCX: 0000000000000000 [<...>] RDX: RSI: ffffffff89dd8b60 RDI: 0000000000000001 [<...>] RBP: ffff888103ee2cb0 R08: 0000000000000001 R09: fffffbd0082d5f25 [<...>] R10: fffffe80416af92f R11: 0000000000000001 R12: fdf99c16731d9b6d [<...>] R13: 000000000000000 R14: ffff88819ad4b8b8 R15: 0000000000000000 [<...>] RBX: tracefs_inode_cache+0x0/0x4e0 [objeto de losa] [<...>] RDX: __list_del_entry_valid_or_report+0x108/0x3e0 [<...>] RSI: __func__.47+0x4340/0x4400 [<...>] RBP: tracefs_inode_cache+0x0/0x4e0 [objeto de losa] [<...>] RSP: proceso kstack fffffe80416afaf0+0x7af0/0x8000 [montaje 2550 2550] [<...>] R09: sombra de kasan del proceso kstack fffffe80416af928+0x7928/0x8000 [montaje 2550 2550] [<...>] R10: proceso kstack fffffe80416af92f+0x792f/0x8000 [montaje 2550 2550] [<...>] R14: tracefs_inode_cache+0x78/0x4e0 [objeto de losa] [<...>] FS: 00006dcb380c1840(0000) GS:ffff8881e0600000(0000) knlGS:0000000000000000 [<...>] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [<...>] CR2: 000076ab72b30e84 CR3: 000000000b088004 CR4: 0000000000360ef0 sombra CR4: 0000000000360ef0 [<...>] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000000000 [<...>] DR3: 000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [<...>] ASID: 0003 [<...>] Pila: [<...>] ffffffff818a2315 00000000f5c856ee ffffffff896f1840 ffff888103ee2cb0 [<...>] ffff88812b6b9750 0000000079d714b6 fffffbfff1e9280b ffffffff8f49405f [<...>] 000000000000001 0000000000000000 ffff888104457280 ffffffff8248b392 [<...>] Rastreo de llamadas: [<...>] [<...>] [] ? liberaci\u00f3n_de_bloqueo+0x175/0x380 fffffe80416afaf0 [<...>] [] lista_lru_del+0x152/0x740 fffffe80416afb48 [<...>] [] lista_lru_del_obj+0x113/0x280 fffffe80416afb88 [<...>] [] ? __dentry_kill+0x23c/0xf00 fffffe80416afc40 [<...>] [] ? __esta_comprobaci\u00f3n_previa_de_cpu+0x1f/0xa0 fffffe80416afc48 [<...>] [] ? lista_de_reducci\u00f3n_dentry+0x1c5/0x760 fffffe80416afc70 [<...>] [] ? lista_dentry_shrink+0x51/0x760 fffffe80416afc78 [<...>] [] lista_dentry_shrink+0x288/0x760 fffffe80416afc80 [<...>] [] lista_dentry_shrink+0x155/0x420 fffffe80416afcc8 [<...>] [] ? id_procesador_smp_depuraci\u00f3n+0x23/0xa0 fffffe80416afce0 [<...>] [] ? do_one_tre ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.31", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "EB28F13B-5DD7-4C32-B506-0964915A6822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.10", + "versionEndExcluding": "6.9", + "matchCriteriaId": "DD26A649-FB0B-4A7B-A16B-A9D27807D7E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "F07BD0FF-07AF-4DAD-8EB1-09FB50ABDC47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/061da60716ce0cde99f62f31937b81e1c03acef6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0b6743bd60a56a701070b89fb80c327a44b7b3e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/726f4c241e17be75a9cf6870d80cd7479dc89e8f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44976.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44976.json index 203ea82443c..373c6bfc362 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44976.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.223", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:50:14.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: pata_macio: Fix DMA table overflow Kolbj\u00f8rn y Jon\u00e1\u0161 informaron que sus PowerMacs de 32 bits fallaban en pata-macio desde el commit 09fe2bfa6b83 (\"ata: pata_macio: Fix max_segment_size with PAGE_SIZE == 64K\"). Por ejemplo: \u00a1ERROR del kernel en drivers/ata/pata_macio.c:544! Ups: Excepci\u00f3n en modo kernel, firma: 5 [#1] BE PAGE_SIZE=4K MMU=Hash SMP NR_CPUS=2 DEBUG_PAGEALLOC PowerMac ... NIP pata_macio_qc_prep+0xf4/0x190 LR pata_macio_qc_prep+0xfc/0x190 Rastreo de llamadas: 0xc1421660 (no confiable) ata_qc_issue+0x14c/0x2d4 __ata_scsi_queuecmd+0x200/0x53c ata_scsi_queuecmd+0x50/0xe0 scsi_queue_rq+0x788/0xb1c __blk_mq_issue_directly+0x58/0xf4 blk_mq_plug_issue_direct+0x8c/0x1b4 blk_mq_flush_plug_list.part.0+0x584/0x5e0 __blk_flush_plug+0xf8/0x194 __submit_bio+0x1b8/0x2e0 submission_bio_noacct_nocheck+0x230/0x304 btrfs_work_helper+0x200/0x338 process_one_work+0x1a8/0x338 worker_thread+0x364/0x4c0 kthread+0x100/0x104 start_kernel_thread+0x10/0x14 Esa confirmaci\u00f3n aument\u00f3 max_segment_size a 64 KB, con la justificaci\u00f3n de que el n\u00facleo SCSI ya estaba usando ese tama\u00f1o cuando PAGE_SIZE == 64 KB, y que exist\u00eda una l\u00f3gica para dividir las solicitudes de gran tama\u00f1o. Sin embargo, con una solicitud lo suficientemente grande, la l\u00f3gica de divisi\u00f3n hace que cada sg se divida en dos comandos en la tabla DMA, lo que provoca un desbordamiento de la tabla DMA y activa el BUG_ON(). Con la configuraci\u00f3n predeterminada, el error no se activa, porque el tama\u00f1o de la solicitud est\u00e1 limitado por max_sectors_kb == 1280, sin embargo, max_sectors_kb se puede aumentar y, aparentemente, algunas distribuciones lo hacen de forma predeterminada utilizando reglas de udev. Corrija el error para los n\u00facleos de 4 KB volviendo al antiguo max_segment_size. Para los n\u00facleos de 64 KB, el sg_tablesize debe reducirse a la mitad, para permitir la posibilidad de que cada sg se divida en dos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "E55C1263-DF43-41EF-8DA8-2BA68DF4FFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/709e4c8f78e156ab332297bdd87527ec3da4e2d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/822c8020aebcf5804a143b891e34f29873fee5e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44977.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44977.json index a353f502555..3d9746be38a 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44977.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44977", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.290", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:47:59.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,122 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Validar el tama\u00f1o binario de TA Agregar validaci\u00f3n del tama\u00f1o binario de TA para evitar escritura OOB. (seleccionado de el commit c0a04e3570d72aaf090962156ad085e37c62e442)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.107", + "matchCriteriaId": "8F2CC1DB-35C3-4EA5-A949-B2693FE60222" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartExcluding": "6.2", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "2FB95FF7-B158-4D6C-896F-AD8F14E79ACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartExcluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "E84F5598-59B1-4D52-A342-22B5C73FBD41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/50553ea7cbd3344fbf40afb065f6a2d38171c1ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ab8793b9a6cc059f503cbe6fe596f80765e0f19", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c99769bceab4ecb6a067b9af11f9db281eea3e2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e562415248f402203e7fb6d8c38c1b32fa99220f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44979.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44979.json index 740263062da..675a1f7aa4d 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44979.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44979", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.400", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:44:36.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: Se corrige la falta de destrucci\u00f3n de la cola de trabajo en xe_gt_pagefault. Al recargar el controlador, nunca liberamos la memoria para las colas de trabajo del contador de acceso y de Pagefault. Agregue esas llamadas de destrucci\u00f3n aqu\u00ed. (seleccionadas de el commit 7586fc52b14e0b8edd0d1f8a434e0de2078b7b2b)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "E89DCAFA-7226-4A61-B500-1229E533B4BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a6f78359ac75f24cac3c1bdd753c49c1877bcd82", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b09ef3b762a7fc641fb2f89afd3ebdb65b8ba1b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44980.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44980.json index 1b020f5afa2..0c2cf513ef3 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44980.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44980", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.460", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:42:53.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: Fix opregion leak Como parte de la pantalla, lo ideal ser\u00eda que la configuraci\u00f3n y la limpieza las hiciera la propia pantalla. Sin embargo, se trata de una refactorizaci\u00f3n m\u00e1s grande que debe realizarse tanto en i915 como en xe. Por ahora, solo arregle la fuga: objeto sin referencia 0xffff8881a0300008 (tama\u00f1o 192): comm \"modprobe\", pid 4354, jiffies 4295647021 volcado hexadecimal (primeros 32 bytes): 00 00 87 27 81 88 ff ff 18 80 9b 00 00 c9 ff ff ...'............ 18 81 9b 00 00 c9 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 99260e31): [] kmemleak_alloc+0x4b/0x80 [] kmalloc_trace_noprof+0x312/0x3d0 [] intel_opregion_setup+0x89/0x700 [xe] [] xe_display_init_noirq+0x2f/0x90 [xe] [] xe_device_probe+0x7a3/0xbf0 [xe] [] xe_pci_probe+0x333/0x5b0 [xe] [] local_pci_probe+0x48/0xb0 [] pci_device_probe+0xc8/0x280 [] really_probe+0xf8/0x390 [] __driver_probe_device+0x8a/0x170 [] driver_probe_device+0x23/0xb0 [] __driver_attach+0xc7/0x190 [] bus_for_each_dev+0x7d/0xd0 [] driver_attach+0x1e/0x30 [] bus_add_driver+0x117/0x250 (seleccionado de el commit) 6f4e43a2f771b737d991142ec4f6d4b7ff31fbb4)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "E89DCAFA-7226-4A61-B500-1229E533B4BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/f4b2a0ae1a31fd3d1b5ca18ee08319b479cf9b5f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f7ecdd9853dd9f34e7cdfdadfb70b8f40644ebb4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44982.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44982.json index 3eeb29fd7d3..e624555ea80 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44982.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.593", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T17:09:54.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,137 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/dpu: limpiar FB si dpu_format_populate_layout falla Si dpu_format_populate_layout() falla, entonces FB se prepara, pero no se limpia. Esto termina filtrando el pin_count en el objeto GEM y provoca un splat durante el cierre del archivo DRM: msm_obj->pin_count ADVERTENCIA: CPU: 2 PID: 569 en drivers/gpu/drm/msm/msm_gem.c:121 update_lru_locked+0xc4/0xcc [...] Rastreo de llamadas: update_lru_locked+0xc4/0xcc put_pages+0xac/0x100 msm_gem_free_object+0x138/0x180 drm_gem_object_free+0x1c/0x30 drm_gem_object_handle_put_unlocked+0x108/0x10c drm_gem_object_release_handle+0x58/0x70 idr_for_each+0x68/0xec drm_gem_release+0x28/0x40 drm_file_free+0x174/0x234 drm_release+0xb0/0x160 __fput+0xc0/0x2c8 __fput_sync+0x50/0x5c __arm64_sys_close+0x38/0x7c anybody_syscall+0x48/0x118 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x4c/0x120 el0t_64_sync_handler+0x100/0x12c el0t_64_sync+0x190/0x194 marca de evento irq: 129818 hardirqs habilitados por \u00faltima vez en (129817): [] console_unlock+0x118/0x124 hardirqs deshabilitados por \u00faltima vez en (129818): [] el1_dbg+0x24/0x8c softirqs habilitados por \u00faltima vez en (129808): [] handle_softirqs+0x4c8/0x4e8 softirqs deshabilitados por \u00faltima vez en (129785): [] __do_softirq+0x14/0x20 Patchwork: https://patchwork.freedesktop.org/patch/600714/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "5.15.166", + "matchCriteriaId": "7EC1FEFC-7B3F-47B1-8D1F-6D6B04486321" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.107", + "matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/02193c70723118889281f75b88722b26b58bf4ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ecf85542169012765e4c2817cd3be6c2e009962", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b8b65211a880af8fe8330a101e1e239a2d4008f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3c5815b07f4ee19d0b7e2ddf91ff9f03ecbf27d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bfa1a6283be390947d3649c482e5167186a37016", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44984.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44984.json index 885e2f32e06..b8df3190a2b 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44984.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44984", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.717", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T16:48:56.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,109 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bnxt_en: Se ha corregido la doble anulaci\u00f3n de la asignaci\u00f3n de DMA para XDP_REDIRECT. Se ha eliminado la llamada dma_unmap_page_attrs() en la ruta de c\u00f3digo XDP_REDIRECT del controlador. Esto deber\u00eda haberse eliminado cuando dejamos que el grupo de p\u00e1ginas se encargara de la asignaci\u00f3n de DMA. Este error provoca la advertencia: ADVERTENCIA: CPU: 7 PID: 59 en drivers/iommu/dma-iommu.c:1198 iommu_dma_unmap_page+0xd5/0x100 CPU: 7 PID: 59 Comm: ksoftirqd/7 Contaminado: GW 6.8.0-1010-gcp #11-Ubuntu Nombre del hardware: Dell Inc. PowerEdge R7525/0PYVT1, BIOS 2.15.2 04/02/2024 RIP: 0010:iommu_dma_unmap_page+0xd5/0x100 C\u00f3digo: 89 ee 48 89 df e8 cb f2 69 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff 45 31 c0 e9 ab 17 71 00 <0f> 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 RSP: 0018:ffffab1fc0597a48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff99ff838280c8 RCX: 000000000000000 RDX: 0000000000000000 RSI: 00000000000000000 RDI: 0000000000000000 RBP: ffffab1fc0597a78 R08: 0000000000000002 R09: ffffab1fc0597c1c R10: ffffab1fc0597cd3 R11: ffff99ffe375acd8 R12: 00000000e65b9000 R13: 0000000000000050 R14: 0000000000001000 R15: 0000000000000002 FS: 000000000000000(0000) GS:ffff9a06efb80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000565c34c37210 CR3: 00000005c7e3e000 CR4: 0000000000350ef0 ? mostrar_regs+0x6d/0x80 ? __warn+0x89/0x150 ? iommu_dma_unmap_page+0xd5/0x100 ? informar_error+0x16a/0x190 ? manejar_error+0x51/0xa0 ? dma_unmap_page_attrs+0x55/0x220 ? bpf_prog_4d7e87c0d30db711_xdp_dispatcher+0x64/0x9f bnxt_rx_xdp+0x237/0x520 [bnxt_es] bnxt_rx_pkt+0x640/0xdd0 [bnxt_es] __bnxt_poll_work+0x1a1/0x3d0 [bnxt_es] bnxt_poll+0xaa/0x1e0 [bnxt_es] __napi_poll+0x33/0x1e0 net_rx_action+0x18a/0x2f0" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "F83B546B-6FA2-483D-A14D-3C7EB9CAD99D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8baeef7616d5194045c5a6b97fd1246b87c55b13", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95a305ba259b685780ed62ea2295aa2feb2d6c0c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa4e6ae38574d0fc5596272bee64727d8ab7052b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44988.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44988.json index 2c15744ecdc..bc2f04f1782 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44988.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44988", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.960", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T16:44:14.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,179 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: mv88e6xxx: Se corrige el acceso fuera de los l\u00edmites. Si una violaci\u00f3n de ATU fue causada por una operaci\u00f3n de carga de CPU, el SPID podr\u00eda ser mayor que DSA_MAX_PORTS (el tama\u00f1o de la matriz mv88e6xxx_chip.ports[])." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.21", + "versionEndExcluding": "4.20", + "matchCriteriaId": "F6FF0A3A-758D-43A0-A0F5-479C21D63D06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20.8", + "versionEndExcluding": "5.0", + "matchCriteriaId": "AB13970D-66FC-4BF4-9E1B-453377326244" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.4.283", + "matchCriteriaId": "07286026-9003-45BE-90E5-51F9AF983C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.225", + "matchCriteriaId": "C57B46A9-B105-4792-8481-1870DEFB436A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.166", + "matchCriteriaId": "913ED6CD-8ACF-48AF-AA18-7880881DD402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.107", + "matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4748.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4748.json index ad4e11e141b..5b37b574cae 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4748.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4748.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4748", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-24T14:15:13.030", - "lastModified": "2024-06-26T14:07:47.567", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:08.630", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-77" + "value": "CWE-78" } ] } diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7265.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7265.json index ce60a12b152..7ecc09a4595 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7265.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7265.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7265", "sourceIdentifier": "cvd@cert.pl", "published": "2024-08-07T11:15:45.757", - "lastModified": "2024-08-23T15:09:29.843", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:08.763", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie? Komputerowa - Pa?stwowy Instytut Badawczy EZD RP allows logged-in user to change the password of any user, including root user, which could lead to privilege escalation.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2." + "value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie\u0107 Komputerowa - Pa\u0144stwowy Instytut Badawczy EZD RP allows logged-in user to change the password of any user, including root user, which could lead to privilege escalation.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2." }, { "lang": "es", @@ -100,7 +100,7 @@ "description": [ { "lang": "en", - "value": "CWE-286" + "value": "CWE-863" } ] } diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7266.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7266.json index b9933c26134..ad3216a5410 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7266.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7266.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7266", "sourceIdentifier": "cvd@cert.pl", "published": "2024-08-07T11:15:46.077", - "lastModified": "2024-08-23T15:09:51.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T16:15:08.910", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie? Komputerowa - Pa?stwowy Instytut Badawczy EZD RP allows logged-in user to list all users in the system, including those from other organizations.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2." + "value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie\u0107 Komputerowa - Pa\u0144stwowy Instytut Badawczy EZD RP allows logged-in user to list all users in the system, including those from other organizations.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2." }, { "lang": "es", @@ -100,7 +100,7 @@ "description": [ { "lang": "en", - "value": "CWE-286" + "value": "CWE-863" } ] } diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9793.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9793.json new file mode 100644 index 00000000000..4c14f8071b6 --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9793.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-9793", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T16:15:09.080", + "lastModified": "2024-10-10T16:15:09.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Tenda AC1206 up to 15.03.06.23. This vulnerability affects the function ate_iwpriv_set/ate_ifconfig_set of the file /goform/ate. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ixout/iotVuls/blob/main/Tenda/ac1206_003/report.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ixout/iotVuls/blob/main/Tenda/ac1206_004/report.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279946", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279946", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.418061", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json new file mode 100644 index 00000000000..ba727a7176a --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-9794", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T16:15:09.350", + "lastModified": "2024-10-10T16:15:09.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Codezips Online Shopping Portal 1.0. This issue affects some unknown processing of the file /update-image1.php. The manipulation of the argument productimage1 leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ppp-src/CVE/issues/7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279947", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279947", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.417583", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json new file mode 100644 index 00000000000..cab1c311be3 --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9797", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T17:15:16.063", + "lastModified": "2024-10-10T17:15:16.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. Affected is an unknown function of the file register.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/siyuancn-hub/cve/blob/main/sql4-user.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279948", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279948", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.417586", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9799.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9799.json new file mode 100644 index 00000000000..800fe8fe2ae --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9799.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9799", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T17:15:16.390", + "lastModified": "2024-10-10T17:15:16.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Profile Registration without Reload Refresh 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file add.php. The manipulation of the argument email_address/address/company_name/job_title/jobDescriptionparameter leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/sechurity/07c5a3a15f21313ee657d05baadbee19", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279949", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279949", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.417589", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9803.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9803.json new file mode 100644 index 00000000000..2f13cdd6e47 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9803.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9803", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T17:15:16.730", + "lastModified": "2024-10-10T17:15:16.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file blooddetails.php. The manipulation of the argument Availibility leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/cookie5201314/CVE/blob/main/xss4-w.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279951", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279951", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.418615", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 493467ee92a..d175c470686 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-10T16:00:19.035045+00:00 +2024-10-10T18:00:18.882198+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-10T15:59:06.093000+00:00 +2024-10-10T17:57:00.267000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265244 +265250 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `6` -- [CVE-2024-44711](CVE-2024/CVE-2024-447xx/CVE-2024-44711.json) (`2024-10-10T14:15:04.777`) -- [CVE-2024-4658](CVE-2024/CVE-2024-46xx/CVE-2024-4658.json) (`2024-10-10T14:15:05.587`) -- [CVE-2024-9312](CVE-2024/CVE-2024-93xx/CVE-2024-9312.json) (`2024-10-10T14:15:05.863`) -- [CVE-2024-9787](CVE-2024/CVE-2024-97xx/CVE-2024-9787.json) (`2024-10-10T14:15:06.243`) -- [CVE-2024-9788](CVE-2024/CVE-2024-97xx/CVE-2024-9788.json) (`2024-10-10T14:15:06.537`) -- [CVE-2024-9789](CVE-2024/CVE-2024-97xx/CVE-2024-9789.json) (`2024-10-10T14:15:06.803`) -- [CVE-2024-9790](CVE-2024/CVE-2024-97xx/CVE-2024-9790.json) (`2024-10-10T15:15:15.457`) -- [CVE-2024-9792](CVE-2024/CVE-2024-97xx/CVE-2024-9792.json) (`2024-10-10T15:15:15.710`) +- [CVE-2023-25581](CVE-2023/CVE-2023-255xx/CVE-2023-25581.json) (`2024-10-10T16:15:04.923`) +- [CVE-2024-9793](CVE-2024/CVE-2024-97xx/CVE-2024-9793.json) (`2024-10-10T16:15:09.080`) +- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-10T16:15:09.350`) +- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-10T17:15:16.063`) +- [CVE-2024-9799](CVE-2024/CVE-2024-97xx/CVE-2024-9799.json) (`2024-10-10T17:15:16.390`) +- [CVE-2024-9803](CVE-2024/CVE-2024-98xx/CVE-2024-9803.json) (`2024-10-10T17:15:16.730`) ### CVEs modified in the last Commit -Recently modified CVEs: `41` +Recently modified CVEs: `50` -- [CVE-2023-39390](CVE-2023/CVE-2023-393xx/CVE-2023-39390.json) (`2024-10-10T14:35:04.077`) -- [CVE-2023-49069](CVE-2023/CVE-2023-490xx/CVE-2023-49069.json) (`2024-10-10T15:15:14.937`) -- [CVE-2023-49339](CVE-2023/CVE-2023-493xx/CVE-2023-49339.json) (`2024-10-10T15:47:52.090`) -- [CVE-2023-6681](CVE-2023/CVE-2023-66xx/CVE-2023-6681.json) (`2024-10-10T14:32:07.260`) -- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-10-10T14:22:28.617`) -- [CVE-2024-21338](CVE-2024/CVE-2024-213xx/CVE-2024-21338.json) (`2024-10-10T15:14:00.550`) -- [CVE-2024-22043](CVE-2024/CVE-2024-220xx/CVE-2024-22043.json) (`2024-10-10T15:44:13.010`) -- [CVE-2024-22126](CVE-2024/CVE-2024-221xx/CVE-2024-22126.json) (`2024-10-10T15:56:49.207`) -- [CVE-2024-24884](CVE-2024/CVE-2024-248xx/CVE-2024-24884.json) (`2024-10-10T14:04:13.600`) -- [CVE-2024-25360](CVE-2024/CVE-2024-253xx/CVE-2024-25360.json) (`2024-10-10T14:43:01.797`) -- [CVE-2024-25914](CVE-2024/CVE-2024-259xx/CVE-2024-25914.json) (`2024-10-10T15:57:37.980`) -- [CVE-2024-38259](CVE-2024/CVE-2024-382xx/CVE-2024-38259.json) (`2024-10-10T14:02:28.917`) -- [CVE-2024-43572](CVE-2024/CVE-2024-435xx/CVE-2024-43572.json) (`2024-10-10T15:25:33.310`) -- [CVE-2024-43573](CVE-2024/CVE-2024-435xx/CVE-2024-43573.json) (`2024-10-10T15:54:19.353`) -- [CVE-2024-44994](CVE-2024/CVE-2024-449xx/CVE-2024-44994.json) (`2024-10-10T15:59:06.093`) -- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-10-10T15:04:49.143`) -- [CVE-2024-46304](CVE-2024/CVE-2024-463xx/CVE-2024-46304.json) (`2024-10-10T14:15:05.100`) -- [CVE-2024-46503](CVE-2024/CVE-2024-465xx/CVE-2024-46503.json) (`2024-10-10T14:15:05.183`) -- [CVE-2024-7840](CVE-2024/CVE-2024-78xx/CVE-2024-7840.json) (`2024-10-10T15:15:15.237`) -- [CVE-2024-9156](CVE-2024/CVE-2024-91xx/CVE-2024-9156.json) (`2024-10-10T15:35:15.513`) -- [CVE-2024-9379](CVE-2024/CVE-2024-93xx/CVE-2024-9379.json) (`2024-10-10T15:53:20.427`) -- [CVE-2024-9380](CVE-2024/CVE-2024-93xx/CVE-2024-9380.json) (`2024-10-10T15:50:03.240`) -- [CVE-2024-9796](CVE-2024/CVE-2024-97xx/CVE-2024-9796.json) (`2024-10-10T15:35:16.310`) -- [CVE-2024-9798](CVE-2024/CVE-2024-97xx/CVE-2024-9798.json) (`2024-10-10T15:35:16.493`) -- [CVE-2024-9802](CVE-2024/CVE-2024-98xx/CVE-2024-9802.json) (`2024-10-10T15:35:17.230`) +- [CVE-2023-49262](CVE-2023/CVE-2023-492xx/CVE-2023-49262.json) (`2024-10-10T16:15:06.893`) +- [CVE-2023-5378](CVE-2023/CVE-2023-53xx/CVE-2023-5378.json) (`2024-10-10T16:15:07.540`) +- [CVE-2023-6551](CVE-2023/CVE-2023-65xx/CVE-2023-6551.json) (`2024-10-10T16:15:07.720`) +- [CVE-2023-6998](CVE-2023/CVE-2023-69xx/CVE-2023-6998.json) (`2024-10-10T16:15:07.850`) +- [CVE-2024-0864](CVE-2024/CVE-2024-08xx/CVE-2024-0864.json) (`2024-10-10T16:15:07.990`) +- [CVE-2024-1604](CVE-2024/CVE-2024-16xx/CVE-2024-1604.json) (`2024-10-10T16:15:08.103`) +- [CVE-2024-1605](CVE-2024/CVE-2024-16xx/CVE-2024-1605.json) (`2024-10-10T16:15:08.220`) +- [CVE-2024-2759](CVE-2024/CVE-2024-27xx/CVE-2024-2759.json) (`2024-10-10T16:15:08.360`) +- [CVE-2024-3462](CVE-2024/CVE-2024-34xx/CVE-2024-3462.json) (`2024-10-10T16:15:08.497`) +- [CVE-2024-35202](CVE-2024/CVE-2024-352xx/CVE-2024-35202.json) (`2024-10-10T16:35:11.390`) +- [CVE-2024-35687](CVE-2024/CVE-2024-356xx/CVE-2024-35687.json) (`2024-10-10T16:59:04.827`) +- [CVE-2024-41817](CVE-2024/CVE-2024-418xx/CVE-2024-41817.json) (`2024-10-10T17:25:47.637`) +- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2024-10-10T17:57:00.267`) +- [CVE-2024-44958](CVE-2024/CVE-2024-449xx/CVE-2024-44958.json) (`2024-10-10T17:56:24.467`) +- [CVE-2024-44959](CVE-2024/CVE-2024-449xx/CVE-2024-44959.json) (`2024-10-10T17:54:07.960`) +- [CVE-2024-44976](CVE-2024/CVE-2024-449xx/CVE-2024-44976.json) (`2024-10-10T17:50:14.863`) +- [CVE-2024-44977](CVE-2024/CVE-2024-449xx/CVE-2024-44977.json) (`2024-10-10T17:47:59.593`) +- [CVE-2024-44979](CVE-2024/CVE-2024-449xx/CVE-2024-44979.json) (`2024-10-10T17:44:36.417`) +- [CVE-2024-44980](CVE-2024/CVE-2024-449xx/CVE-2024-44980.json) (`2024-10-10T17:42:53.433`) +- [CVE-2024-44982](CVE-2024/CVE-2024-449xx/CVE-2024-44982.json) (`2024-10-10T17:09:54.350`) +- [CVE-2024-44984](CVE-2024/CVE-2024-449xx/CVE-2024-44984.json) (`2024-10-10T16:48:56.167`) +- [CVE-2024-44988](CVE-2024/CVE-2024-449xx/CVE-2024-44988.json) (`2024-10-10T16:44:14.767`) +- [CVE-2024-4748](CVE-2024/CVE-2024-47xx/CVE-2024-4748.json) (`2024-10-10T16:15:08.630`) +- [CVE-2024-7265](CVE-2024/CVE-2024-72xx/CVE-2024-7265.json) (`2024-10-10T16:15:08.763`) +- [CVE-2024-7266](CVE-2024/CVE-2024-72xx/CVE-2024-7266.json) (`2024-10-10T16:15:08.910`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c68bb0e3e47..7d0e2d40446 100644 --- a/_state.csv +++ b/_state.csv @@ -53307,7 +53307,7 @@ CVE-2012-1657,0,0,7462e3b7f0f867320cd68c6bbb80948d5e6dba653da622e7160eff7e5f62ef CVE-2012-1658,0,0,560e2e981abfe6f659323e61516988fffb3a37e7b67c4bef344d1bfc4a28d4bc,2017-08-29T01:31:21.197000 CVE-2012-1659,0,0,639034ca9f07c790ac2ef492bd5f3a40aa5601fef1156b2207387f576c231b4a,2017-08-29T01:31:21.257000 CVE-2012-1660,0,0,1a1fdc233e49b7e2a63c3ad5e101484443bfa62fa3d16cbf9d941cdc05dda569,2017-08-29T01:31:21.320000 -CVE-2012-1661,0,1,66338164131b46ea4354bd8bab41e9b1d37f24f7e8888b9af6e1fe51fb8593c3,2024-10-10T14:30:09.217000 +CVE-2012-1661,0,0,66338164131b46ea4354bd8bab41e9b1d37f24f7e8888b9af6e1fe51fb8593c3,2024-10-10T14:30:09.217000 CVE-2012-1662,0,0,2df8f900483fdb6e6d54cec6aaac270e11c4a2838e3af3b4f9303c89b71d90cd,2021-04-07T18:14:30.630000 CVE-2012-1663,0,0,00d8eac9ff6a370e8741d1cbc49fe92781178c0b399b9b789308565363c2dce3,2017-08-29T01:31:21.397000 CVE-2012-1664,0,0,e390080a910fcded0c4e326becb2176e4d6c58ba3c30d9da61282ae32886d178,2015-05-21T16:53:13.197000 @@ -170947,9 +170947,9 @@ CVE-2021-25087,0,0,19e5de177e018eddf6d5a6875036f53b78d429deae8efad633fa9b91298bb CVE-2021-25088,0,0,bee661c44eb6e65b60a9fe52fbaf1b4775a92328a5411f570fc6063c67f7c58f,2022-06-30T14:24:30.540000 CVE-2021-25089,0,0,05895cbf1b9443f106297e5a92634828df29f4af7bea5d81a44de2796a1dcd7d,2022-02-04T18:01:22.500000 CVE-2021-25090,0,0,26860aa3f36d9e491890e7d184049cf51fe3e428cd51d8077cad8e49275b8957,2022-04-15T17:47:52.203000 -CVE-2021-25091,0,0,8ab61558c876a955213e335796d5d7be0ae5efdbb0c673d958c977de226322bd,2022-02-04T17:59:29.353000 -CVE-2021-25092,0,0,ada9520ab536c9631c83fa4029cc9dab45890fe7e3c82abcb19c89de72dd4b73,2022-02-04T17:58:33.397000 -CVE-2021-25093,0,0,12b229ebecfdba5f06c6486fc8f629462148536eee8d9d87023e6e9c531821de,2022-02-04T17:57:27.240000 +CVE-2021-25091,0,1,8f745090ccc214dd2d75ed946d82ed1b8ab0a89279191b5a9c71a893e0773959,2024-10-10T16:59:04.827000 +CVE-2021-25092,0,1,7208f7393a679602468fe51538ce3b460fd0f12c45d7cc136ad2af27660acbff,2024-10-10T16:59:04.827000 +CVE-2021-25093,0,1,c497c0cbefa1ee70d7e5d10f8442a98df74e697472aa9c3039a2ca06c18921f7,2024-10-10T16:59:04.827000 CVE-2021-25094,0,0,dd533dc3cc92acef1f59bb6a4350acbdf9cca7aaabbf023b4f276daed6440190,2022-11-09T21:26:14.653000 CVE-2021-25095,0,0,8c78162e663a846060fb12d9533a13fc81591ecca36fca2f037661d2c2237d5e,2022-12-09T18:55:26.423000 CVE-2021-25096,0,0,fd5053d87489fe09b1d48cb8e7c1b0f4ca149e5e22ee43ef2fa1caa855f416a6,2022-02-10T22:07:50.717000 @@ -181126,12 +181126,12 @@ CVE-2021-39114,0,0,91bb300b928a2e7c1d42863cf149e080ec34fb17bb3f12f372376e10a70a3 CVE-2021-39115,0,0,3edadea3bb79510465312b5ed43b357dd9837c0ef0dbf8d050d2cfbe35d4b421,2022-04-25T18:16:18.227000 CVE-2021-39116,0,0,a42315d93d2fd10c554b2c15934daf6b946942b74ba2ba4fbf662199cd5b29b6,2022-03-28T16:18:14.047000 CVE-2021-39117,0,0,0f5bdd3a21f39c9eaa09674f49f313b346bf46d979c65d077a542c986dc638e1,2021-09-02T02:41:23.137000 -CVE-2021-39118,0,0,cfa44fb973040235d1d403e0d891bd636533414b5cf18b31edbab2917bfa225e,2022-06-28T14:11:45.273000 +CVE-2021-39118,0,1,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000 CVE-2021-39119,0,0,19d82c9ad15e2315e337669b0ea8aa57ac063c6e8f2ab13ad8070419810cfcfb,2022-07-12T17:42:04.277000 CVE-2021-3912,0,0,e8c5a6132b4c804f3ef396cb77b6bb9032c86570b20db73e367107d41f114ccb,2022-08-09T14:39:02.117000 CVE-2021-39121,0,0,633d5656fffda0e45c49d4bc8d151e90cce078ce60d3d369ea3f30579930e1fe,2022-03-30T13:29:49.280000 -CVE-2021-39122,0,0,c9981cfb918b68d6a12602ba73c7b1acc25021219d3d022a55745d72255b54c2,2022-03-30T13:29:19.573000 -CVE-2021-39123,0,0,d0e4c2c03b72a02ecdb7525c0e326d6b0d96a344de7caa87bc9349453372cd09,2022-07-12T17:42:04.277000 +CVE-2021-39122,0,1,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000 +CVE-2021-39123,0,1,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8aa41,2024-10-10T16:35:02.213000 CVE-2021-39124,0,0,2b58fd447d3cafa91334dabd9357b993b27ae7c16f1985b8ba8afc2558c4088b,2022-02-24T20:18:49.327000 CVE-2021-39125,0,0,4c8f1895e82d1bcd913a7b42e9a1b5d82429da426af796f023bfb884e96ba7ec,2024-10-09T17:35:02.380000 CVE-2021-39126,0,0,c5fcfc69aba84d73b9f8c74c936a36d81151cadeddc7fa2ff49085a699b83f32,2022-04-15T15:29:12.737000 @@ -182959,11 +182959,11 @@ CVE-2021-41305,0,0,c1ebdde2379fe23f7c43787afa73694bb283be765dba75893d579667592b2 CVE-2021-41306,0,0,912f08e64dfad95775b944cdd17d5dcacfb984ff7bca32afcb0eb812044cdcd8,2024-10-09T19:35:03.473000 CVE-2021-41307,0,0,0a85ebb78eaec36b97ea96c5ebf64a13b26ac00f0999ce8b9b238c2a8e6940a0,2024-10-09T20:35:10.230000 CVE-2021-41308,0,0,cfb1dc84f95dca98ea9db01ce0a047c8488867d52c4b6bc7f5724969a80a8bbf,2022-08-09T13:41:02.947000 -CVE-2021-41309,0,1,fee479a78a1c80a72f60651ae579f48966cd2679824b48142d9357149133ff0f,2024-10-10T14:35:00.837000 +CVE-2021-41309,0,0,fee479a78a1c80a72f60651ae579f48966cd2679824b48142d9357149133ff0f,2024-10-10T14:35:00.837000 CVE-2021-4131,0,0,4f7d3ba062434f9f457c9b2673730333ccdd0b0deef79cfedad8ece588fede90,2021-12-21T16:21:10.787000 CVE-2021-41310,0,0,96a7f0a3af760e8f782bf236d4bd2025e990ab72c1279bf78211c5c1341dae3b,2021-11-02T23:18:16.800000 -CVE-2021-41311,0,1,30b5666aaf7fa18e235a6c4a31a81b554087c89780d14cf889a0806be2cf0aab,2024-10-10T14:35:01.190000 -CVE-2021-41312,0,1,af076cb36001433ceb795978d5ff9824bf782e6b6e21a0e85f212ff3ecc365d8,2024-10-10T14:35:01.433000 +CVE-2021-41311,0,0,30b5666aaf7fa18e235a6c4a31a81b554087c89780d14cf889a0806be2cf0aab,2024-10-10T14:35:01.190000 +CVE-2021-41312,0,0,af076cb36001433ceb795978d5ff9824bf782e6b6e21a0e85f212ff3ecc365d8,2024-10-10T14:35:01.433000 CVE-2021-41313,0,0,89518e64ebac158fccd8f0ec7ad9d346b2cab73157d62d14e442a26c59a1ba1f,2022-11-16T16:47:19.750000 CVE-2021-41314,0,0,d0c32eb2851d45bc9d6d482f4132febadf03b787704b8a0463c1bd6590a848a3,2022-07-12T17:42:04.277000 CVE-2021-41315,0,0,46ac4fa176eeab97f0a56e95ed804ddf838df2e8377c475a7840f718a2c08010,2021-09-30T18:04:07.720000 @@ -201474,7 +201474,7 @@ CVE-2022-34307,0,0,338b12c62bad2e4a0eda57b50a8ad27206a92d39c87953a6bab08cfde445d CVE-2022-34308,0,0,72517e273cfc874b53e7020837bf9b331677635584e6cd68de357af3c120f8a1,2022-10-08T13:18:23.537000 CVE-2022-34309,0,0,e3adf5645c12963bf66511008bf8bd0d2b48b61c9b9629d499565330aa17f93b,2024-04-30T20:18:51.433000 CVE-2022-3431,0,0,89e3567eb73930c489cbcd122cdece28404497e84a1ec23a14bda2eca382111b,2023-10-14T02:23:44.330000 -CVE-2022-34310,0,1,e44de1dfbb26090f018ee65abbb9b72048b08e3a391acdea756403f47e41c066,2024-10-10T15:12:13.673000 +CVE-2022-34310,0,0,e44de1dfbb26090f018ee65abbb9b72048b08e3a391acdea756403f47e41c066,2024-10-10T15:12:13.673000 CVE-2022-34311,0,0,dee5018313c173aed72aa543a5661071e95212d1d53651caec216af2b2bc4a40,2024-04-30T20:19:51.123000 CVE-2022-34312,0,0,45e301dcc5a66dca95afd271cbf450e3989352cef5ff9b783b89d2260ac5226d,2023-11-07T03:48:31.727000 CVE-2022-34313,0,0,0d9ec88dde84ebfeeb30e977159987301d9ce4d0596cedcaa54b9f8d5721f8f5,2023-11-07T03:48:31.813000 @@ -205045,7 +205045,7 @@ CVE-2022-38708,0,0,781d609c9b3dc891552143ee435ef3e063fbe0b877a671a9cf817c94de5c1 CVE-2022-38709,0,0,7f3077c38854304042150d1d1a1c927d058013bb127b4d8270511cb4e453573a,2022-10-14T20:30:32.833000 CVE-2022-38710,0,0,76541b99bab0b9f82be0ed5eea11d8d59857d4fa70130aa00483a9682faa2549,2024-09-21T10:15:03.890000 CVE-2022-38712,0,0,efacb8e6b7af22915dcaad88def28008695f8ac120f0459e05383852abad5aa2,2022-11-04T15:16:45.807000 -CVE-2022-38714,0,1,b087b6a47c12b13cdb4852a0efc0b2a50238e6b6dcdd99138053137a8b014ae6,2024-10-10T15:32:29.487000 +CVE-2022-38714,0,0,b087b6a47c12b13cdb4852a0efc0b2a50238e6b6dcdd99138053137a8b014ae6,2024-10-10T15:32:29.487000 CVE-2022-38715,0,0,560f03ba50c9656a0b9b0e7f82b2ddc7a737af875f6c233628cc6ad5be254d04,2023-02-02T17:22:07.650000 CVE-2022-38716,0,0,74a54fb7cac47160e4bdc1cedc02000c796dd4aa4d33ffecd45836a7c084fcde,2023-05-31T22:47:16.617000 CVE-2022-3872,0,0,20d26b63a749ce414bf0c9834ab95bc6bbb3f61b07fb6dd62cd2285487e4b53f,2023-02-23T01:35:36.783000 @@ -207577,7 +207577,7 @@ CVE-2022-41986,0,0,ee6e9ef066ba8c5459920520ed62fd3d1ecc23c4fd518353f99769eb13ab0 CVE-2022-41987,0,0,973b71f1dab2e2d56c71d687723d5c44031c8553347583b75d1661405fd6e442,2023-05-31T22:47:06.207000 CVE-2022-41988,0,0,d84d73f7ebcefc94a40d46de0942ff010bc2553936ab9fef99b206cfa4aec137,2023-05-30T06:15:24.370000 CVE-2022-41989,0,0,3ac83e6f430f25af669f4a1c5f38227f6c1e7b17a93a5ca5588faf3f237ae764,2023-11-07T03:53:11.200000 -CVE-2022-4199,0,0,57559eaec31cf26247d4965947c5296286c4e093c8523b3302c651ffa4b0899a,2023-11-07T03:57:09.600000 +CVE-2022-4199,0,1,e8ddc903285ebf1515513113098cbd32df397061ee6caf54c2302be597b7fb65,2024-10-10T16:59:04.827000 CVE-2022-41990,0,0,9034b3c666ccb8516dcb1cb446205c1217b17de23ff758726eeef9b5ab2a0cb9,2024-01-24T18:44:19.600000 CVE-2022-41991,0,0,59d444d31b0a538de290798d8cadedf1819a417ebd6154c3e1e4a9a386d6b539,2023-02-06T17:28:53.793000 CVE-2022-41992,0,0,baf225fe84f3f52e61816c353969d1e421b989ba6be07e7177d1f64b7bd91e9f,2022-12-22T13:08:10.897000 @@ -214051,9 +214051,9 @@ CVE-2023-1527,0,0,411c7303cc31b219dbc4b0b1ac6c22a4cc1b0fc4ef9b3f82d4c227bf7f99e2 CVE-2023-1528,0,0,e387f07573074221f041db6eeacc85aa0313ac61d91b40a13b2cd15641653801,2024-10-09T20:35:11.607000 CVE-2023-1529,0,0,36bd6fbb1379271480531ba27f51074b6cd8a2c529341f8b40cd549e18592c5e,2024-10-09T21:35:05.160000 CVE-2023-1530,0,0,c897a67b35ef59fc0789ea1e6d0edf196d92841fc8ae71b92d0755fc583a4847,2023-10-20T20:46:04.377000 -CVE-2023-1531,0,1,036ad10166ac22c1be1b018401bc07be762a12cd0115c6e70b5b401bfd0970df,2024-10-10T15:35:04.080000 -CVE-2023-1532,0,1,da644232e8e6a3c7226b6f08124ed64860d7accd8086d2921e6c9b615b9621b5,2024-10-10T15:35:04.993000 -CVE-2023-1533,0,1,95f228fa5c0acf36a6c480b688f3431227fcbe5e2a77ebb583d60eb5b35f2092,2024-10-10T15:35:05.857000 +CVE-2023-1531,0,0,036ad10166ac22c1be1b018401bc07be762a12cd0115c6e70b5b401bfd0970df,2024-10-10T15:35:04.080000 +CVE-2023-1532,0,0,da644232e8e6a3c7226b6f08124ed64860d7accd8086d2921e6c9b615b9621b5,2024-10-10T15:35:04.993000 +CVE-2023-1533,0,0,95f228fa5c0acf36a6c480b688f3431227fcbe5e2a77ebb583d60eb5b35f2092,2024-10-10T15:35:05.857000 CVE-2023-1534,0,0,b80725c73df1ac8a3dcd1b6e8d6743020ace19e1a3bdb33286a0bad76f802a0d,2024-10-08T19:35:02.020000 CVE-2023-1535,0,0,214759b8e86e348cd6647c94c0700582828ff171cf71df4f59fe7aa4cce2dd25,2023-03-23T15:48:17.870000 CVE-2023-1536,0,0,b22d4f13421f92a82c89ae0cf4f4854b334bce8624a31264b3cf078f3411544d,2023-03-23T15:13:25.773000 @@ -215083,12 +215083,12 @@ CVE-2023-20823,0,0,e5030abbdc1b76a1fdf724e78a79e9447430af00d8598a10a707b12f48ab9 CVE-2023-20824,0,0,6caacf9d3f8a58027c0dab9caf4b9b264fdfa1d70dcd710a95edcc7d198dbed4,2023-09-07T19:06:55.563000 CVE-2023-20825,0,0,3b7e714e9925156ab37c943a82248f5bb6cc462ec9ffd9479518f0eaa72d4ea8,2023-09-07T19:14:16.880000 CVE-2023-20826,0,0,f19cc9ee6c42e884beea40f74b7dd27c757677880dca33965287532349a24c24,2023-09-07T19:13:15.787000 -CVE-2023-20827,0,0,c94fd0a8a61a7bec88a90e4cd437026cd13fafbd7af82cb801d6797c805bfe54,2023-09-07T19:13:24.850000 -CVE-2023-20828,0,0,ba8cf7ecdc8e2657806eb0ec453fabe867b6d584899270638f41072140f25560,2023-09-07T19:13:33.270000 -CVE-2023-20829,0,0,f605265cfe43d6b952781ee95d910e3219955dd13bd4519307313420737cdcde,2023-09-07T19:07:12.237000 +CVE-2023-20827,0,1,83bbd7748b521833d1c4e47e1d930c6efc13da73425f93940cd5870a89858ab8,2024-10-10T16:35:03.543000 +CVE-2023-20828,0,1,f7fc852afc53227ebfac9ed12d8d9bf27249e792c863286dbe616fd7f942976d,2024-10-10T16:35:04.517000 +CVE-2023-20829,0,1,dfa93302be3736a2d42f62642d511aa3a1c70f4594e227fe1b2a98e2c69bf4d9,2024-10-10T16:35:05.527000 CVE-2023-2083,0,0,cee4396e30e25258287b1e489d3bf3b3f1eef2f0033a51dfea6bffe2ec1286c2,2023-11-07T04:11:54.640000 -CVE-2023-20830,0,0,4f22d2e02b9718a10b47922faf9dbc8103f5219e55234ab4196e259f48bdf194,2023-09-07T19:07:25.423000 -CVE-2023-20831,0,0,43369e4a882734bb03e43eb27216eeac5a1c82e841f8246a44fad96b2d498c4b,2023-09-07T19:07:47.907000 +CVE-2023-20830,0,1,6a02392b6a6fe91a83233632455d7b661d82c5d0733c61d40940a5da6781c68c,2024-10-10T16:35:07.153000 +CVE-2023-20831,0,1,a7bd9cc2fd769f7a7f78cbf92dbd0df138f255abd6200025975d1d20633911f3,2024-10-10T16:35:08.083000 CVE-2023-20832,0,0,05c466968e672a55e813b676aa2e07e30bcd43922fbe2ea39969f9ca4c1ecc0c,2024-10-04T15:35:02.997000 CVE-2023-20833,0,0,0d4fbfbfcfca4b8d072b58089465cf19c7295168fffc28d5689dd850a4e87f39,2023-09-07T19:08:21.983000 CVE-2023-20834,0,0,2fa6eb5f722248d938b7f55db6fa9eb5c85a7a23b1dd1c297a61b4fbff51fb9d,2023-09-07T19:08:44.343000 @@ -219117,6 +219117,7 @@ CVE-2023-25577,0,0,5ee92e0558fbce9bd773a8afe897565bfdaa982c0f4ad7e71e954409a79ac CVE-2023-25578,0,0,a34c5a3bd74c9feff4c9c3173b48f4aebcbdb41926b496db508268725eb1d80a,2023-11-07T04:09:01.430000 CVE-2023-25579,0,0,a6c9e68a845dd568c2130b08183545a22df0a4df1e1473c0c5450b50e5f8d3f7,2023-03-03T15:09:20.680000 CVE-2023-2558,0,0,b36d9018fbad440af935b7a05f8181b9f5920728ee39953642c99c7cad89beda,2023-11-07T04:12:52.760000 +CVE-2023-25581,1,1,579c0aad7d867cae9a73ee2c9d8422836a716e4fd5e18a78c07bdbbb7a948afa,2024-10-10T16:15:04.923000 CVE-2023-25582,0,0,232d943891f8f503b5ec3e85110e47e18b7fb6075027f0a7fcc0c9807f79fac9,2023-07-12T15:05:19.617000 CVE-2023-25583,0,0,90cb5ae4facc7427ba0ec7a3aba488de3ea49316450585c3a592993efe3ec3d7,2023-07-12T15:18:34.447000 CVE-2023-25584,0,0,28b5e4e1071105b09a7a0fe37c814dcf7b81d264417fa64df5b4f0851185a205,2024-02-23T18:51:09.787000 @@ -219296,7 +219297,7 @@ CVE-2023-25769,0,0,198ca9c61d051c8c694de7cff750ffa8d39aeb715958a8ab2b3e781df2601 CVE-2023-25770,0,0,c196f3f59a9ed379f3033392f5332da695ce96226441cec597553d40d2c90803,2024-04-22T16:15:12.870000 CVE-2023-25771,0,0,0a40ade9e4b633e2e25c64b41412f6cf20b10475ee3b92ce849eec7e304b725e,2023-11-07T04:09:10.947000 CVE-2023-25772,0,0,a0a863d580e53f497e70eeff0d4bd28ff51b949ec7490c2b052c7aaa57fffae7,2023-11-07T04:09:11.190000 -CVE-2023-25773,0,0,968a444d55ca3d983c15ddeda13597fed46940726ab0afc57332a75accb84113,2023-11-07T04:09:11.320000 +CVE-2023-25773,0,1,c8a4a4c116ed5d896279b6cb93fadbf0a6a145a41b80291e643b9b92633bb181,2024-10-10T16:35:09.100000 CVE-2023-25774,0,0,50f00eb85c9a6f3939ad3ac3d2f8701f08cab7d7ec6691ef9981e83d63419194,2023-10-18T17:53:08.367000 CVE-2023-25775,0,0,9e0931d7bb83de9c26f9ad076dcda45420d6c5a1e995b56352243c3259380610,2024-01-11T21:15:10.030000 CVE-2023-25776,0,0,a5c9a6507e4e8061236842380ca8385e80281fc571d20401f84423392270b8fa,2023-11-07T04:09:11.693000 @@ -219524,7 +219525,7 @@ CVE-2023-26022,0,0,e0cd395060def6af839f53ca17359e6fe07ff5b74e3efa90c2588e10aba9c CVE-2023-26023,0,0,bf7f45eb43f656e5a2c0034397287ee8bde96ac526309a673ae112ef759ff9a6,2023-07-28T14:02:42.573000 CVE-2023-26024,0,0,db59bc89cdf9d3cbfb06338ac5b62513dd0547a1a4f051c439caafcace4d191b,2023-12-06T18:51:10.323000 CVE-2023-26026,0,0,9d4fc8ae77db69c6c04dc4dd3fae29dc591b099947fecb438ca71d1c94800582,2023-07-28T16:36:20.187000 -CVE-2023-2603,0,0,5c2edc4b230ab73934fa6df5aaecfabf8f1a7178b4f82823ba1cf427aa43726d,2023-11-30T05:15:08.800000 +CVE-2023-2603,0,1,4a60df169eea5dff83ba6df411dcf1103a34959027fdc74feb414d60c9098ed0,2024-10-10T16:32:56.777000 CVE-2023-26031,0,0,3c1225c9f1cc3a824a50548b415ab5a795739af789c2ff216b590967c4819438,2024-08-01T13:43:31.307000 CVE-2023-26032,0,0,73f981053207ef66bd42c47f91689994979ec8c8290fe7f9acad2a7d7aba765e,2023-11-07T04:09:17.300000 CVE-2023-26033,0,0,e9bef52edabfb15f3fd145610458b9c83a92e0d7fa6697fbaccc32ad54c639c0,2023-03-06T18:54:30.003000 @@ -225220,7 +225221,7 @@ CVE-2023-33228,0,0,29dfa574b2b575cb97b8521ab674749b0aaabf351bed111232835624b22ef CVE-2023-33229,0,0,81aa6f0cf7582dea8ca19016be9f8618ad64ab056bc36c3dda2d2769bc9139e9,2023-10-30T19:42:24.257000 CVE-2023-3323,0,0,5d041b778bd7002c0102efc1a53874ba30ce5ef86cf602c08c6258cba09747a1,2023-08-01T21:07:23.737000 CVE-2023-33231,0,0,09f86d8066d74c7874dbea9cc2ad06aac59a2df7122675bfda30672a291d4916,2023-08-03T21:15:14.363000 -CVE-2023-33234,0,1,8c3bc362e58c079b32d4a0791724c2c1cfa09349b40fca7b2ef6d10dc4db9437,2024-10-10T15:35:07.983000 +CVE-2023-33234,0,0,8c3bc362e58c079b32d4a0791724c2c1cfa09349b40fca7b2ef6d10dc4db9437,2024-10-10T15:35:07.983000 CVE-2023-33235,0,0,98d0a7eb19704063a78a382792254db430678a754513fb8bc0821026290e2114,2023-05-30T19:43:02.460000 CVE-2023-33236,0,0,4f9a68681c8de805fc0155196f19f195d6dec29aeda4ac774c34b5b3dd85bcb0,2023-05-30T19:29:08.573000 CVE-2023-33237,0,0,fc0463edc62e3d49a47d812193c4e183bc8b4a3e3b302f50593f49aa3aecc82b,2023-08-22T19:10:04.453000 @@ -229777,18 +229778,18 @@ CVE-2023-39377,0,0,4d90b5eceb5f584a241485f97a12c8816a725103cea0b53b1c41a09576d3f CVE-2023-39378,0,0,818da8692480b8c7f857fbaca678d0fbcd2ffcc1a3ac48218812fd2c104c191f,2023-09-27T18:42:38.813000 CVE-2023-39379,0,0,9f7e46dc100d810b1be2f3ea55a8f0b45783194c8729b6823b66663af22f9544,2023-08-09T12:25:04.040000 CVE-2023-3938,0,0,f544e7fbbebcf5018c1b842c359ba6f67f61f2e97528d09d37e4a4e3af4bc755,2024-05-21T12:37:59.687000 -CVE-2023-39380,0,1,047b870c1c6a5f603bffc321511ef6dfcdaf2e90e62bd0b06e976e05199b8938,2024-10-10T15:35:08.920000 -CVE-2023-39381,0,1,f9e170096e19507dba0831067a70cc22b32c49554118b7d309552ebd9585b3cb,2024-10-10T15:35:09.677000 -CVE-2023-39382,0,1,ef374e3a047ffd506cbacd3151b796fb42de4901d3595cbfb0100754bf1c61d8,2024-10-10T15:35:10.383000 +CVE-2023-39380,0,0,047b870c1c6a5f603bffc321511ef6dfcdaf2e90e62bd0b06e976e05199b8938,2024-10-10T15:35:08.920000 +CVE-2023-39381,0,0,f9e170096e19507dba0831067a70cc22b32c49554118b7d309552ebd9585b3cb,2024-10-10T15:35:09.677000 +CVE-2023-39382,0,0,ef374e3a047ffd506cbacd3151b796fb42de4901d3595cbfb0100754bf1c61d8,2024-10-10T15:35:10.383000 CVE-2023-39383,0,0,36b9d7ae7f9f63d22ead28158ce2dee347df00226f00b7bbb7f386995f234aa2,2023-08-17T02:20:13.110000 CVE-2023-39384,0,0,83515c704dc94d04e5e09da684d8584ccbdbe5913247a79d2f20db217d2c5e0d,2023-08-17T14:22:55.907000 CVE-2023-39385,0,0,5d2ae7e7bf9faaee9636f81726672dd8ae0435204c2dbb924972e6274c2b9969,2023-08-17T19:51:42.627000 -CVE-2023-39386,0,1,82cf70710c69e5b5f29f1a4103c38e910da8ad89c04b0f4f6486fe7104e5fef3,2024-10-10T14:35:03.147000 +CVE-2023-39386,0,0,82cf70710c69e5b5f29f1a4103c38e910da8ad89c04b0f4f6486fe7104e5fef3,2024-10-10T14:35:03.147000 CVE-2023-39387,0,0,1c057d6dcb781a1d30a44046fe206c3ec5b28a34b88028371661a459104c041f,2023-08-17T19:18:15.017000 -CVE-2023-39388,0,1,f6c4adf2f7caa39346a0676cf7f3d545ac7ada60da83fe18d59a2ac44a2d51b4,2024-10-10T15:35:11.660000 -CVE-2023-39389,0,1,76cc1a9013364c3a6427f4c7f1dfbbabf00045b11864910abaf4e61ef5462d54,2024-10-10T15:35:12.470000 +CVE-2023-39388,0,0,f6c4adf2f7caa39346a0676cf7f3d545ac7ada60da83fe18d59a2ac44a2d51b4,2024-10-10T15:35:11.660000 +CVE-2023-39389,0,0,76cc1a9013364c3a6427f4c7f1dfbbabf00045b11864910abaf4e61ef5462d54,2024-10-10T15:35:12.470000 CVE-2023-3939,0,0,25163a15e80808af2e68687cc6739d321eac4c9f550e324911c55f31802ef947,2024-05-21T12:37:59.687000 -CVE-2023-39390,0,1,3529adcfb60695d777c24c1b1bd700c2ceff9bad9e16d21a2aa6ff3d4655f750,2024-10-10T14:35:04.077000 +CVE-2023-39390,0,0,3529adcfb60695d777c24c1b1bd700c2ceff9bad9e16d21a2aa6ff3d4655f750,2024-10-10T14:35:04.077000 CVE-2023-39391,0,0,6618314ce18d355699f4f6da6666e67387a841860a731781dd72cc555ed84b3f,2023-08-17T14:01:09.233000 CVE-2023-39392,0,0,7a7d0aa31e3d4745cf3a480630de77fdcf37a29b05186be7db2d99c232791b0f,2023-08-17T13:49:52.153000 CVE-2023-39393,0,0,3b1b8de3eb296c24b3e2a3b4f84bc94a593e07f4cf00e538dbed9ca658cbf397,2023-08-17T14:27:23.250000 @@ -231956,9 +231957,9 @@ CVE-2023-42130,0,0,0241b38800c234ec8e4a2ff16f40e83d68c56ec86a9b4257cd78b46e40a43 CVE-2023-42131,0,0,4e0f01a335565af1d2caffbcb3515b0a5bc3abdb5520eb1e67adabde374601fe,2024-09-18T19:15:36.553000 CVE-2023-42132,0,0,b3614605e58c2ad6bb3381e3dd9a9ae21953bc0309c61010e3af35ddfe93114f,2023-10-03T20:56:24.067000 CVE-2023-42134,0,0,4ee57071d16fbebb2fd73b2c73a537f320f9d80ad77a4c87162327571d527be7,2024-01-19T16:14:39.460000 -CVE-2023-42135,0,0,821bba39ae16d97a24fd2a276b98c40666b66d2f666e958c2c85468b96464bbb,2024-01-19T15:47:29.607000 -CVE-2023-42136,0,0,731b0a7c0949a03c1da38a3e04556cc9f668abccfe65e5570c44682bb8657447,2024-01-19T16:19:25.047000 -CVE-2023-42137,0,0,8d8e84e081d27b7ad13a4ab4bcb8b03f542a6ac7c3dbb364cd003b7e7bd81d89,2024-01-19T16:21:06.650000 +CVE-2023-42135,0,1,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000 +CVE-2023-42136,0,1,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000 +CVE-2023-42137,0,1,c966cfe4f9f72b0b343b6e5bc55f130bed0f505de6f9e1585674a3d65dbc321f,2024-10-10T16:15:06.090000 CVE-2023-42138,0,0,229b19fe75a25194eeeceeed8dd7d2cb66ba39737de630ef3ead70362964246b,2023-10-18T19:57:05.243000 CVE-2023-4214,0,0,819da04ab354ee39aabca649e2dd617af7bc8556f065736471274ad51ec00604,2023-11-25T02:12:54.557000 CVE-2023-42143,0,0,6c09d38ca58ec27b89dd2edb91a7d385bfff81e0d5504c4d608be4afbef841ea,2024-01-31T16:57:18.603000 @@ -234031,7 +234032,7 @@ CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694 CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000 CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000 CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000 -CVE-2023-4537,0,0,d55e9c2ec2d6a309b7146da78217b22dabb54a472777f14cd37d2689a428a754,2024-02-15T14:28:31.380000 +CVE-2023-4537,0,1,eea3b8def9553f8b072fdf468cb4f4f9b040c5e8850ac6668a829484a8fdd935,2024-10-10T16:15:06.990000 CVE-2023-45370,0,0,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000 CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000 CVE-2023-45372,0,0,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000 @@ -234056,7 +234057,7 @@ CVE-2023-45391,0,0,9c0fd5516832886de6f7034699893261e3bea437e0ea5d4edc791da17fd46 CVE-2023-45393,0,0,c1fb02f3a6040b11d75e76a87aac1d917a2141d0d313b00964f7b7e953d37259,2023-10-20T17:09:10.553000 CVE-2023-45394,0,0,a4b4f063ff375dd7ab74a1a8d1c641e98ad0cb4a4cc340067fe632ab3db64424,2023-10-30T15:29:24.470000 CVE-2023-45396,0,0,a9c3245ef3981c277f6e35bb37ce5839a8934f2abfbc3e4742e599437dabb487,2023-11-07T04:21:45.490000 -CVE-2023-4540,0,0,df2b36fedeae1630c51e74f166d14d09eb3f5b86dabb1d9ce3dc74aa1fbaf07d,2023-10-13T01:30:13.930000 +CVE-2023-4540,0,1,454dcfbbb42131d02ef2de39e6b50d769b0e902beec03a837e810055e3fa53c4,2024-10-10T16:15:07.110000 CVE-2023-4541,0,0,e6c5b595e1802a5ff24ab31b4fe094c0626b7d35f33552e6362bd8cefaa24697,2024-01-08T18:49:41.183000 CVE-2023-4542,0,0,08b69d675d8a1c1e0ff7f35c28444e73725292dffb22cba8268ef60d8afdb0cd,2024-05-17T02:31:38.280000 CVE-2023-4543,0,0,dc1ba3a33cff31b8fca78e8cb21ccb021964ab63d67083a56dc6088e7b3319cb,2024-05-17T02:31:38.390000 @@ -234536,7 +234537,7 @@ CVE-2023-46116,0,0,32b4d7ad1ade33016b0db1435d5658983da94db4596e866b4681196d84a04 CVE-2023-46117,0,0,121f23ec03c8bfaf7add309657ccc2b1ffeb80e620568dd23fbae288673558b3,2023-10-28T03:48:19.117000 CVE-2023-46118,0,0,2aa54fb6f1645b23b925b0febacb85bd2e2906b6fd47ae5d3d57a7dea4fa70d4,2023-12-14T01:15:08.103000 CVE-2023-46119,0,0,188517dc1713ce67d106802c5ad12899f4256143eda10dbeb48b8cf0d28ac511,2023-11-01T17:09:01.520000 -CVE-2023-4612,0,0,a56ecda2c721d482fb9dd7cace991defff2fedc13314a40cf8df8c687c46ec72,2023-11-17T17:42:18.630000 +CVE-2023-4612,0,1,01d7a15f58bf2babc855c5767a299377da4c90f0f3df23aa6271c6ffec670599,2024-10-10T16:15:07.260000 CVE-2023-46120,0,0,6e468d84efc420bb6523b981da81618dcba67cf9ae9e183627575d464dc63c85,2023-11-01T16:42:03.003000 CVE-2023-46121,0,0,b7e0c927c4dcd3e846e6bd7603e2bace09835d7b7a24801aa9322bb54baaa1f8,2023-11-22T15:05:37.027000 CVE-2023-46122,0,0,77ece346cd29f8df5fbc9b6dc7a110d1754062db3ff45e353933b3597d9c5458,2023-10-31T14:52:24.573000 @@ -235947,7 +235948,7 @@ CVE-2023-4817,0,0,66b9317b8b341b3c6f85e7870e90748e4d6a86dfea30b64fc5b4019933f60d CVE-2023-48171,0,0,6326cb8d81d428a9f4381270fc2ce963d0ad0058312b77c3d694b3258e3a7cbb,2024-09-18T18:54:08.080000 CVE-2023-48172,0,0,0e78c6c737f4aa94c295f39e3b2f6c04b05dd97deb3b6a7475ffc20424f8ee86,2023-12-09T04:46:27.490000 CVE-2023-48176,0,0,5229479ea70d793012d98b28f5832b18c29ca0585926ac2e2e1991c088531620,2023-11-30T20:21:54.850000 -CVE-2023-4818,0,0,c99fef0e43e54a7e397a1f19b3703f45e3876ee2d790b03b384938f06570625f,2024-01-19T16:35:49.683000 +CVE-2023-4818,0,1,c9f685e7feb9907c1838dc5c22479dcdaf800947aa0e477285b5b32cee6e423c,2024-10-10T16:15:07.403000 CVE-2023-48183,0,0,e30177454f59bb0f06584d26feaa9f110fa0ec2af3bd7711cda6932b65226702,2024-07-03T01:42:18.010000 CVE-2023-48184,0,0,2a3c5af64fd53e932537ccff83557b108ba1700dbb22cbbe968d9532a829a3fb,2024-07-03T01:42:18.813000 CVE-2023-48185,0,0,fb1a8a21d098ed36db5f2ffae494f226b32c201c926520d79e5da8af6f3638dd,2023-12-02T00:21:40.093000 @@ -236695,7 +236696,7 @@ CVE-2023-49060,0,0,0f125d0d07dbe270a6f07b57aa641d1848f31c22fb855ca4bf11b4d5b4ef2 CVE-2023-49061,0,0,dc7136ec78ed5cf0b1889d9e499076dc7861b57a74e858b10a634425002df41f,2023-11-28T19:45:33.650000 CVE-2023-49062,0,0,1d72476c88fb45368b58247aec1688b0093de275b1093249720b62193de89ed0,2023-12-04T19:46:20.953000 CVE-2023-49068,0,0,182c6949abe2a827480e4301e5ed188cb126ad03424cd6905a2140b6a730140b,2023-12-01T13:53:23.050000 -CVE-2023-49069,0,1,d362233b8da3a6077c74a42f30d3dece5a08fdd053ad1fb23fa4128a346b7f8a,2024-10-10T15:15:14.937000 +CVE-2023-49069,0,0,d362233b8da3a6077c74a42f30d3dece5a08fdd053ad1fb23fa4128a346b7f8a,2024-10-10T15:15:14.937000 CVE-2023-4907,0,0,ee7fec7a11df58ff005b9b63ad49a50bb70f5f4e575258375cd0f49a03cc2ad7,2024-01-31T17:15:17.750000 CVE-2023-49070,0,0,631766166232ba486ccd48cb00f4afe564eec8aa0b473067715b1f04d1a8cd4e,2023-12-29T18:15:39.103000 CVE-2023-49073,0,0,2a69c4407ae45adf60baf11d8aa993141dc3f78b1f8dc71c70987fff6214c4d6,2024-07-11T16:00:30.427000 @@ -236867,14 +236868,14 @@ CVE-2023-49252,0,0,6696676ea138bbbe3898a0462d8349d55e4aa53c82758205c6683cad9207a CVE-2023-49253,0,0,39190be26437367f0cb128dcd19588699a00c78d11d0cabd94b801e94a74f9b6,2024-01-18T21:14:22.820000 CVE-2023-49254,0,0,f34419f08bdce6ccb5f0124295abfdffd452c9485f4a1c06bc7fd8b241598e11,2024-01-18T21:14:11.877000 CVE-2023-49255,0,0,bc83c3f00ff6ea1845ee64d5acf6a80c765b032e9814e7dcd665e4aa5a04acbc,2024-01-19T02:11:57.800000 -CVE-2023-49256,0,0,e3bc35420a35cf0a0a8b6dc3869c6abf5ae01099f2f89963f2fa6ec1fc60fd1f,2024-01-18T21:14:03.490000 -CVE-2023-49257,0,0,16d5106ac327700aa753d1b6d02c16f740e7dddd3031e69142bde57143428f01,2024-01-18T21:13:51.623000 +CVE-2023-49256,0,1,1fe21d50c5e8b0fde1b1aeab802f4db220d1674b9d434fbf5d6ee24127c69ec7,2024-10-10T16:15:06.313000 +CVE-2023-49257,0,1,c31f878e5552c04f8a82115b35872a15a6ed05c684d69a1210e2832df83e342b,2024-10-10T16:15:06.553000 CVE-2023-49258,0,0,a15e9f4b25aa211e384ddcd9096065a9180748cd045a91be89f41ec1efaa7319,2024-01-18T20:38:29.220000 -CVE-2023-49259,0,0,6924dfc81c2a6023f175e888f5718d5b4f1102a144570e76ad875ec2457c6878,2024-01-18T20:33:22.163000 +CVE-2023-49259,0,1,ec3adc3a7840a7661f1b002dec4a07aa624dd034829c5b4ec8b6632211624a03,2024-10-10T16:15:06.680000 CVE-2023-4926,0,0,f04445011a7b61f0239196a2a3d2a11a7cfa48d9f67d70f794613b5affd23cb6,2023-11-07T04:23:10.633000 CVE-2023-49260,0,0,eacaa360b74b478231fd0a67d27793e1aa2a71bc28ed6337e23a0f3affc2630c,2024-01-18T20:22:01.957000 -CVE-2023-49261,0,0,bb95820a1bbf7731e6ea6579ba6cdd3005ad5561f41805c8edcf0828900fdcd0,2024-09-04T20:35:12.553000 -CVE-2023-49262,0,0,be77953338847c472ae3266454952ff76c6c345f7ce213da5b94760693e5af8f,2024-01-19T02:11:40.757000 +CVE-2023-49261,0,1,ab12768ceb84db446d13551e51716c39b487b5e822d367a966090eb33f0ba06c,2024-10-10T16:15:06.787000 +CVE-2023-49262,0,1,274063e158f489d41be2d722570f9ed9c17604ee5dffa76726e2ba1ea7a07b0e,2024-10-10T16:15:06.893000 CVE-2023-49269,0,0,028a4e58082cf4ef8da9a9e284540f563d62594be00f2afffe30cf24bc0b64ca,2023-12-27T17:17:44.617000 CVE-2023-49270,0,0,b9649fb168337300fb031c39ff29926d549e641e684c52d7e7ff666ecb63d06e,2023-12-26T21:41:07.910000 CVE-2023-49271,0,0,b7b5bb763871877cb1dd0f84ec6ac0e1261e6246273abfbaba9879bbf625ed6c,2023-12-26T21:40:42.173000 @@ -236928,7 +236929,7 @@ CVE-2023-49334,0,0,9ad6eedcb03f7a172221bc2f6a0260009bbad50c9cbb4a0f5dbd937d290a6 CVE-2023-49335,0,0,e7d994af3bf6531f78fd36c6bf9b0b84ca46db68a74be45308869abcb571e682,2024-07-03T01:42:32.677000 CVE-2023-49337,0,0,e424406de5c43c131143c16d111e773c8556787e526b7f62d53e176ae0c6b011,2024-02-29T13:49:47.277000 CVE-2023-49338,0,0,fa3bf55d0b5318e101267d5f4c126776700bea84adfbb2e6dbc68fed8dd82145,2024-02-29T13:49:47.277000 -CVE-2023-49339,0,1,544cc18b99f9ed925d3edb5aad597827a3000589d248106d3004c4296636529b,2024-10-10T15:47:52.090000 +CVE-2023-49339,0,0,544cc18b99f9ed925d3edb5aad597827a3000589d248106d3004c4296636529b,2024-10-10T15:47:52.090000 CVE-2023-4934,0,0,5bda99711a1c7b5e53779ffb125b8e009708afa5e83126fe4dceceec3c818038,2023-10-02T16:39:41.720000 CVE-2023-49340,0,0,2fec675eb8e4c16f2410d6f1b888906e569c7e065980f36c37bb644d4c4fdee2,2024-08-01T13:45:10.687000 CVE-2023-49341,0,0,d7e8c79b8806628e204e114f4b555101d3f5cbaa1c0f55c651021629b1c5cc97,2024-08-26T21:35:03.467000 @@ -239556,7 +239557,7 @@ CVE-2023-5374,0,0,bbad172aa30166f85ca2e7d3ff515943900e68e6abf27c8173e4afc98be416 CVE-2023-5375,0,0,a64347362803998112e7738c159b01f9d4276db052cc0c20b8aec7e6633c0c07,2023-10-05T18:26:45.907000 CVE-2023-5376,0,0,990cd494edefb2d9c83b147909f1f06cb068f2eb4ba15f46e74b335e88c7a2b7,2024-01-17T17:46:40.297000 CVE-2023-5377,0,0,beec2be658ee2abf7a8172d160c87ff77ea1bb8ccb609f8c80ff98d55729625c,2023-10-05T17:07:40.813000 -CVE-2023-5378,0,0,0ea6a14bb690af069b538d4f5a80c36feec2eba038b507d154ff439f4b98e251,2024-02-19T12:15:43.980000 +CVE-2023-5378,0,1,609da6346e4b2cfb0c1b7e2a7e8f2a984ad4f64785ebe1bf6922b24e0ab439b8,2024-10-10T16:15:07.540000 CVE-2023-5379,0,0,2931e08b2d2958f825098c38b4e9fee27840063393b70d1f9dc8921e6c5fef26,2023-12-20T18:39:19.120000 CVE-2023-5380,0,0,cb08b877665112ae720bd7aafeb8d644ec13fe741b6b7e105c2ccf85e625dbc3,2024-09-16T16:15:08.980000 CVE-2023-5381,0,0,f4159bdba728827531b2d68c527e85df9c54a93da715a2ba38d9642e5e4ffa3f,2023-11-21T02:45:00.847000 @@ -240616,7 +240617,7 @@ CVE-2023-6546,0,0,4f4e46a35eb2a1cbc8c494030b87e8c4a5413a7fdef4268737b564917a093f CVE-2023-6547,0,0,4de5784377e5f9787f8338a046ec4c275ae6d29b8fb06be598377dd3ea6b3a4e,2023-12-14T19:31:10.497000 CVE-2023-6548,0,0,a93a0604081016c50f51b204cce97858e584569f5bc0432075c5fb69824b24a8,2024-01-25T16:45:58.287000 CVE-2023-6549,0,0,850161f4c77aa0f06b12ed2562bc348193320e4386ca4ea0ef325dd56db8dedc,2024-06-10T16:27:52.507000 -CVE-2023-6551,0,0,cd3f3ed873de505baad87dd3d7c9568fa07b86b6e65dabfc0c9c6711c4c193f5,2024-01-11T16:41:19.250000 +CVE-2023-6551,0,1,bf9ad9148b141f0ca977f2e13f6eef6a0137ca2b6186a2363f040e09df113981,2024-10-10T16:15:07.720000 CVE-2023-6552,0,0,280e58e9ed2dc80c0c0a43f67c21eed670b513dd1014a470571d49cccf0fc6ac,2024-01-11T21:13:09.007000 CVE-2023-6553,0,0,b5146d631beb06b07e5ca8b91ef438e8f5760824aa0920387c6fefb74ea914c5,2024-01-18T17:15:14.300000 CVE-2023-6554,0,0,2feb5ba088ff3e9dd4cf7fbd58c1eecc82f5eb18efcc3326d89df15d295f81d8,2024-01-18T17:35:46.637000 @@ -240720,7 +240721,7 @@ CVE-2023-6677,0,0,e8d7b2ac483abddd5fb5246b0ccb58f2167ff8c7d9bb3d75a435f4c19bbf40 CVE-2023-6678,0,0,1b6b891a0a4426afd1f075411ff63c2743633b69b418dac3850de8598da1bdb5,2024-10-03T07:15:25.903000 CVE-2023-6679,0,0,8a553df1f73da3c3f6a8806f65fbad51b05599efca34aa3bb086ca5c7375d091,2024-09-16T16:15:11.767000 CVE-2023-6680,0,0,c6542118c55ee22c9b7c10aee5216ffa75acaf15d09a32564befb52a8c8ef3f4,2023-12-19T20:51:03.237000 -CVE-2023-6681,0,1,d360fedbf0c997e91a93b42a556bffc4945068180194d5383c7ee98c6935bb41,2024-10-10T14:32:07.260000 +CVE-2023-6681,0,0,d360fedbf0c997e91a93b42a556bffc4945068180194d5383c7ee98c6935bb41,2024-10-10T14:32:07.260000 CVE-2023-6682,0,0,69333011d542843f9f8a1cff6b2418572503758c6c0e55bd5de3a41edb291769,2024-10-03T07:15:26.070000 CVE-2023-6683,0,0,b645b2687895ad9ffdd472ae3eb052dcc4d9790cb61e30172f134f068042e89a,2024-09-14T00:15:14.397000 CVE-2023-6684,0,0,da2814d561e54fcd1c06571b2900d34494328fc42cf13ea916a741c8e290cd99,2024-01-17T20:41:05.143000 @@ -241005,7 +241006,7 @@ CVE-2023-6993,0,0,58824562ab00139fd1065f90d459866d58a79c75a4afe1ed988bda594a97b5 CVE-2023-6994,0,0,98369af104a5f616fad5110292c6d21a84f6de7cb99223c15d3db3d8af92686a,2024-01-17T22:13:52.143000 CVE-2023-6996,0,0,fccc2168deda8e9a325faec73794d5557356b0d09dbb916af246ca96a67db2d3,2024-02-13T16:11:03.577000 CVE-2023-6997,0,0,6e27e5b63f0a87af454d1261575dc30b0f4ff5f301848e086587a6cca0abb399,2024-06-07T19:15:23.410000 -CVE-2023-6998,0,0,148626548a3b7b4ba32190715f2b33394cb592dd0ffc44a66575dc401f00c38f,2024-01-11T20:25:14.163000 +CVE-2023-6998,0,1,d47af9cb9500ce4c322dbabda800a0d285b36e94645b23c9df839f36c73319f9,2024-10-10T16:15:07.850000 CVE-2023-6999,0,0,105a70829f6eff53ac15a557cd0bd3f06555e4d64cccad8e6bdc880dc85be3d9,2024-04-10T13:24:00.070000 CVE-2023-7002,0,0,1f48f06eff9246f8921966d36b30d4b155872d4efce169cac69a0e04e201ed5d,2023-12-29T06:21:43.197000 CVE-2023-7003,0,0,e9402f475914886887087bf2c3bb459f6ae259bd32832a137b61739af9c3ed22,2024-09-25T01:15:39.957000 @@ -242015,7 +242016,7 @@ CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000 CVE-2024-0861,0,0,86ecba68491b7b81822881feb2da55a3f32a47f2022c25fb159df017410c6f17,2024-10-03T07:15:28.390000 CVE-2024-0862,0,0,cd566c8abfba0ca515f734ef4070df65c5856e9bf9b981d35c91f199e6054347,2024-05-14T19:17:55.627000 -CVE-2024-0864,0,0,8a8d358bdeda4e251f9de12891e26aa14503e300a3d835f742cbedccca9bc293,2024-08-29T20:35:57.690000 +CVE-2024-0864,0,1,5df0a42cefa6ce6ca871e243da3f4a295df398ecbf312afeac42b693671796d2,2024-10-10T16:15:07.990000 CVE-2024-0865,0,0,92ed612466d8a4d7183523d7500a321a95aa9e27cc826fa3fd89f2bb9954809a,2024-07-19T20:43:36.043000 CVE-2024-0866,0,0,fc759d49c9e441a8b12ab4ad1a997904eb8eb9894ecca01f95e8cb0572eecb6c,2024-03-26T12:55:05.010000 CVE-2024-0867,0,0,e359b89be2d490f4a35e658519a1716eaafc027d44d059518f42f8274899e25d,2024-05-24T13:03:11.993000 @@ -242200,7 +242201,7 @@ CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab32714 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000 CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000 -CVE-2024-1062,0,1,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000 +CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000 CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 @@ -242713,8 +242714,8 @@ CVE-2024-1600,0,0,361b3dac683b3a5ac546d616c21e4dc0f349290759dbe747906d2ebdb44b8f CVE-2024-1601,0,0,83cf4a8caabcc81e351705b7638f02b9b11f8845346f643cabf4d0eb108d61fe,2024-04-16T13:24:07.103000 CVE-2024-1602,0,0,424c7946b86609c0593c4ee4eb3ca817d37faadfd2bd290c5bce24c66955d72e,2024-04-10T19:49:51.183000 CVE-2024-1603,0,0,7560f4eb0fe2f104ec0cc7868f6032f1be714ae3fffcb6babc4d2b97acd948b5,2024-03-25T01:51:01.223000 -CVE-2024-1604,0,0,8b4498cdb20c150711bd944967e97a81c88350fa1df3333987400929c6bc12c9,2024-03-18T12:38:25.490000 -CVE-2024-1605,0,0,a0eba83f11cfc5277be8603fcd907e5e0ba11be2bc4df8af74fb8a87201e455f,2024-03-18T12:38:25.490000 +CVE-2024-1604,0,1,277105b8ea788ca74c9aed2acbcd50868e1b158a625c260553e18f1e3fc00dac,2024-10-10T16:15:08.103000 +CVE-2024-1605,0,1,1303820adefb05fc627f5a7ece6f248c68b2369966e9fc4c3087c505496a74aa,2024-10-10T16:15:08.220000 CVE-2024-1606,0,0,15a17e447d99df7418714d7ef94e3798f3d5d0e7ef6ca0dc3b7b341bddda711a,2024-03-18T12:38:25.490000 CVE-2024-1608,0,0,44224eee05265f6f7b8c8729d57dee56f28fe5925bde16e1c91e799aa3c2bf41,2024-07-03T01:45:25.227000 CVE-2024-1618,0,0,3886085aa0e530a3cd7ca87e86ea29f5f9d41baf4dd8dca3226a1b22f221980f,2024-03-12T16:02:33.900000 @@ -244035,7 +244036,7 @@ CVE-2024-21334,0,0,bb98735e0397eef282b3bf0c8a7f17fd1a894c0580516f67c50b6ae552edb CVE-2024-21335,0,0,d3be0da75c93e40dc74ef43532ac464e7457c464e235cbe682e70d325b6a979e,2024-07-09T18:18:38.713000 CVE-2024-21336,0,0,4632192569ed60af4d57d1dd58a5b140d682aa1d82fc677d5ec51bcb39be3541,2024-06-11T15:15:59.553000 CVE-2024-21337,0,0,1ed4e9ec6936be258d1de771e0acb5830541ca48fb0a246032f3c3930147d134,2024-05-29T00:15:20.793000 -CVE-2024-21338,0,1,3aa0124262ccd838e18fcb8d62fa84ec847253898437096a73d841c68b97cdf8,2024-10-10T15:14:00.550000 +CVE-2024-21338,0,0,3aa0124262ccd838e18fcb8d62fa84ec847253898437096a73d841c68b97cdf8,2024-10-10T15:14:00.550000 CVE-2024-21339,0,0,3b2246ef5e1d88b753a2538b4b172fb8ad25db9ef5e4dae729823984d67c0483,2024-05-29T00:15:21.830000 CVE-2024-2134,0,0,32f7b6769a3de1e870eb862cfbcf578418aa858e7cc01f11b7b77f4ab31882e5,2024-05-17T02:38:03.667000 CVE-2024-21340,0,0,54f8fce81fb3f01b0990ebeb93fb4090923de6185bd8f6ef3135f577fe07fabe,2024-05-29T00:15:22.083000 @@ -244591,7 +244592,7 @@ CVE-2024-2204,0,0,a1b09b74c91818340209a8ddf823ec1cf800d4476587d084b8cf03d19b7025 CVE-2024-22040,0,0,be358f199493e83f56d872322bfd43fdac4427b513b4fe755395a46f51c51b1d,2024-05-14T16:16:05.417000 CVE-2024-22041,0,0,b5443db0c86e6457cab6a387b03922b3d7f0b5665f00c0fc059d18dd37af355a,2024-05-14T16:16:06.063000 CVE-2024-22042,0,0,51e530b3f65717bb1e8010af0bda85338ccdaa265e736b5da43fcef129570895,2024-02-13T14:01:07.747000 -CVE-2024-22043,0,1,9e476139d6d724b0e5de7cce022f763d77f88747a669d7f1dbe27dfd871a9603,2024-10-10T15:44:13.010000 +CVE-2024-22043,0,0,9e476139d6d724b0e5de7cce022f763d77f88747a669d7f1dbe27dfd871a9603,2024-10-10T15:44:13.010000 CVE-2024-22044,0,0,eebeb23ba8a6b13727ce5f42031738195bd52d4a50bd5c3f51bde42fc8fdd786,2024-03-12T12:40:13.500000 CVE-2024-22045,0,0,0934b761764d7359e221a8250519572915febccdf4c0aa0b54ead29e97778d40,2024-03-25T16:24:56.037000 CVE-2024-22047,0,0,b48a64d9772f9484f6f883609c51e940b13757e9806b4287550205f9ae688a52,2024-01-10T20:02:53.583000 @@ -244656,7 +244657,7 @@ CVE-2024-22122,0,0,22b11101943a1c4b31c7e2bc3bb992e519d6c0c349adf117401cf85389b24 CVE-2024-22123,0,0,99933d3f598e6bb9a91d26b93e70d5c40c6c642d2f1f853d8b31928e38a1ad31,2024-08-12T13:41:36.517000 CVE-2024-22124,0,0,ae727126e60d9cde8ef5e51668c38a883080195512277d1a80e4217d8781fb3c,2024-01-22T19:17:13.050000 CVE-2024-22125,0,0,45e3a9c2ec5632f05c6eeeb6aeaaf2c6d04ed3da2f62c2fdc1ffee6c0b199240,2024-01-12T19:42:36.637000 -CVE-2024-22126,0,1,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6d37,2024-10-10T15:56:49.207000 +CVE-2024-22126,0,0,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6d37,2024-10-10T15:56:49.207000 CVE-2024-22127,0,0,a93c2036d31e75652d8f4eeafd412b70336432f9ad8255c87f034d5f74373945,2024-09-26T19:15:06.897000 CVE-2024-22128,0,0,867f07a0106f89603e780ece7b7a835f530d6c4dbff3b43b95585dfd576bd64e,2024-02-13T14:01:40.577000 CVE-2024-22129,0,0,f98c249f22037a19179779366a2c80b4076872a899c468771d964e4af4fceb0b,2024-02-13T14:01:40.577000 @@ -246476,7 +246477,7 @@ CVE-2024-24880,0,0,d33c65d2cd8280ebaa686b2fcc8fd218b13ad4aa68609a2777547b3bf6ac3 CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000 CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000 CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000 -CVE-2024-24884,0,1,af55aab316537bd504b6b6ea3895403cc0d0c1e7e14595579898db1923b7122d,2024-10-10T14:04:13.600000 +CVE-2024-24884,0,0,af55aab316537bd504b6b6ea3895403cc0d0c1e7e14595579898db1923b7122d,2024-10-10T14:04:13.600000 CVE-2024-24885,0,0,7a43d600d033d18ff5a631d3c78e01918ca77dcf41ffa14f3f93f7c9b4bb4ad4,2024-08-02T00:15:23.523000 CVE-2024-24886,0,0,07792f7aa43278f631451e24100471b838930227e2960a56c45baad7e36474f5,2024-02-15T05:03:32.117000 CVE-2024-24887,0,0,b91ba2c15170dd37eb83644d09105b152fe9fce4832e88e978eca355fc6a4e64,2024-10-08T16:48:35.663000 @@ -246804,7 +246805,7 @@ CVE-2024-25354,0,0,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560 CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000 CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6ca08,2024-08-02T20:35:24.740000 CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000 -CVE-2024-25360,0,1,6caf8fa41563275660a5cbd6a4cda6f930214e7d87293b674b62db1753cb154f,2024-10-10T14:43:01.797000 +CVE-2024-25360,0,0,6caf8fa41563275660a5cbd6a4cda6f930214e7d87293b674b62db1753cb154f,2024-10-10T14:43:01.797000 CVE-2024-25366,0,0,fcf0bd0bcec5d3ac613d0f087b722a9736b6c16fe60db374ab304707fd794e91,2024-08-16T18:35:06.990000 CVE-2024-25369,0,0,59ffb0bc2370235574d9929dc2e6276b267db724d8340eb583c27a6ab908bf38,2024-02-23T02:42:54.547000 CVE-2024-2537,0,0,ce9753e7852cdca037deeb9816f11b74c3d1bde3479050982fbbe15f57049a4a,2024-03-17T22:38:29.433000 @@ -247153,7 +247154,7 @@ CVE-2024-25910,0,0,928d48dc594e744f5fa97c70afcd77c815a0c3c31658eabf2781fdbf263d0 CVE-2024-25911,0,0,f9465290d28dcba85e6fa4f87ecd37cd0b8e17c3025445c3165a61ba0e85426f,2024-04-17T12:48:31.863000 CVE-2024-25912,0,0,9372b7ae5090799ba3301728cf8f4fbb7d0bd389adff9daf4b1e1d1a7bf7cf41,2024-04-11T12:47:44.137000 CVE-2024-25913,0,0,2eca2aef8ac97b5a992d9aa3c1345031dda8501c8ce091779f4e2778ef8c6417,2024-02-26T16:32:25.577000 -CVE-2024-25914,0,1,60b1b3c6a773bff9103aa6fa8644965c2c36b3e0f49444784ec5e0e3fa8c3f55,2024-10-10T15:57:37.980000 +CVE-2024-25914,0,0,60b1b3c6a773bff9103aa6fa8644965c2c36b3e0f49444784ec5e0e3fa8c3f55,2024-10-10T15:57:37.980000 CVE-2024-25915,0,0,6af4fccf980af39bb585f399c964cef04631f1cb23395cd472ba3e09ce83a91a,2024-02-23T16:14:43.447000 CVE-2024-25916,0,0,7c2094a0e33d9af2c6dae0b5fb17a51d90fad41de0a9f2cea5d22b783ccd08e6,2024-03-15T16:26:49.320000 CVE-2024-25917,0,0,8f1b78603cfc0f16aac41bf1a9d05d825248337645d9c39cfce4e7524b120c6e,2024-04-25T13:18:13.537000 @@ -248609,7 +248610,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000 CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 CVE-2024-2758,0,0,ec71169b8e8ae96bf24d772237af9a9c33e20fd447b06805225d467e622ae7a6,2024-05-01T18:15:19.300000 -CVE-2024-2759,0,0,f895adfc16a08410bca73fa13cf2db3485a9413616bcb45162729aeb14feb416,2024-04-04T16:33:06.610000 +CVE-2024-2759,0,1,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000 CVE-2024-27592,0,0,d1ab0f4f443cdfc3ef1bdb598e0eca6a6dd41bceb98b2d42145b4b52d872d5f3,2024-04-16T23:15:08.690000 CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000 @@ -253615,7 +253616,7 @@ CVE-2024-34616,0,0,c301260c315697c954fb2feafb31403c37229c06fbc1763a645c0b780c7d6 CVE-2024-34617,0,0,b1ee984b0fa2dc691ebab6e8249f2a4d4bb83e2ded6eba30678b4026e2d801bc,2024-08-12T18:40:21.090000 CVE-2024-34618,0,0,d83244a9f175d49a5d846a23c6fe10dd7ec1bbbbc81b439f7092f16730defc87,2024-08-12T18:40:38.963000 CVE-2024-34619,0,0,91b7e2ba5c8ef39243e26b3218dbb54a69ef40dbc6e2ee1a6dfc7635d1e06db4,2024-08-12T18:41:03.467000 -CVE-2024-3462,0,0,54779d92a3c6d70fd24721dad0ad60ea3e87e07e6060c4f8a8e7678e5dd7fd43,2024-05-14T16:11:39.510000 +CVE-2024-3462,0,1,cde69c32d1cfdddf84aad9bf072c1ff8f90df5fe6471a02399ac91c4d7da2bbd,2024-10-10T16:15:08.497000 CVE-2024-34620,0,0,18af99a16c151d48117fe4a9d6b46c84a917ab3823f5ed3fce7acc26205bcfe1,2024-08-12T18:41:21.593000 CVE-2024-34621,0,0,fbb4f55b8bb52c900dd8b6fb5e30a72cb1ea07a01b1c400b8d7287789fe61e97,2024-08-09T20:43:21.560000 CVE-2024-34622,0,0,aeda50f8bab0ac7ef960dd7444278eb4fda7645ea46e11099531591011c5f504,2024-08-09T20:15:32.807000 @@ -253974,7 +253975,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08 CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000 CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000 -CVE-2024-35202,0,0,0c067622ccaeabdace30507435f4a38bb860d320794b69a4ccb0eae8d222a96e,2024-10-10T13:15:14.077000 +CVE-2024-35202,0,1,307eeb0ba3a894c1f24169242df5b7772be5729599a16b2a6aaeb88e865b1b41,2024-10-10T16:35:11.390000 CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000 CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000 CVE-2024-35206,0,0,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000 @@ -254256,7 +254257,7 @@ CVE-2024-35683,0,0,35d7e7c403c9e1a0af5b15ee529f21dfe95dd77d68bca956781c650575c54 CVE-2024-35684,0,0,73ceea3685cab6d12bcc00b1be64bf260bc52647423fb13caa461de77b765285,2024-07-18T19:15:49.853000 CVE-2024-35685,0,0,139851b07c410dda78a8d072ad9e34deae44fbd00bd025834cea54049b4e0532,2024-06-11T13:54:12.057000 CVE-2024-35686,0,0,32ff2e600a9d8926049897296d1d6fe8809b6a2e4221afcb5a5a74815a856c9b,2024-08-19T12:59:59.177000 -CVE-2024-35687,0,0,79fce35ccd3e930bc208091f41ac29961dccd33e15189a2e1b06f3b46062b830,2024-07-18T19:12:50.843000 +CVE-2024-35687,0,1,b379fb6562e3ac3f0754d3c341db6054c4dc0eed9ed63187d866802f459ed76a,2024-10-10T16:59:04.827000 CVE-2024-35688,0,0,3002fd4b3fe5cc02b7654ca7bf43c572c5d7c5d95678447c325fe6a4dfea431c,2024-07-18T19:11:38.683000 CVE-2024-35689,0,0,a84697d9194d9eaca216c47abe16f4656da4cd35d0aca0020ad4375947ea31e4,2024-07-18T19:11:09.873000 CVE-2024-3569,0,0,9b80b9a87217b369759c7140d80dbd6082319d66e422964bf6b9aefb97f43369,2024-04-10T19:49:51.183000 @@ -256191,7 +256192,7 @@ CVE-2024-38254,0,0,51e07d963269d194219f11a7f07791c63d4b27fc12cb6d3b8ac346f9bf2c8 CVE-2024-38256,0,0,2716cfae0f1f9233f52a2225afa7ed0b6aac310a887e60636554d0b32b5b97e3,2024-09-13T15:05:30.070000 CVE-2024-38257,0,0,3a8b2af4adcb4bdfc01df1b0ecd23bc52fe1bc4f0791eb3347f047cb2790f5a2,2024-09-13T15:03:00.917000 CVE-2024-38258,0,0,6c786148de3caa551f00d4f5be537f09b4e147b1bb4e421666b8f6ad512325e1,2024-09-13T15:00:54.153000 -CVE-2024-38259,0,1,d7a118fae4649d7f9bd788f71eb172724667e7ef52a1e02ea9ee9eac2db2ad0a,2024-10-10T14:02:28.917000 +CVE-2024-38259,0,0,d7a118fae4649d7f9bd788f71eb172724667e7ef52a1e02ea9ee9eac2db2ad0a,2024-10-10T14:02:28.917000 CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000 CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2431,2024-09-13T14:53:26.410000 CVE-2024-38261,0,0,ebfdb8837e9ec46b0c59a92ae543c8a1bf9ca753f5c0c9f66ff763b497d2dbac,2024-10-10T12:56:30.817000 @@ -258327,7 +258328,7 @@ CVE-2024-41812,0,0,77d77d75e12a46a4096a7ded13c0631df5e5cdfd100a1bda9b1f75a9011ec CVE-2024-41813,0,0,91e03e36b9e87581405a8dd69398040d61a14fc0a45ce589d6f6ebdb2f6cab48,2024-09-30T20:02:25.837000 CVE-2024-41815,0,0,fa3c6b5fdaad718b40db16c805a164fa7a9b4ae5ba2f85a17caaeb17fb76200d,2024-09-19T14:36:12.677000 CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000 -CVE-2024-41817,0,0,9cb2153c741e308483085d8110b63401b0c640bfe3ba97ff298d16bc8f67bbb6,2024-09-11T16:16:23.090000 +CVE-2024-41817,0,1,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000 CVE-2024-41818,0,0,34e8576dcb1a1bd2ef0841435c6e4eb9b22f044d76175d55bfedd30532739326,2024-09-11T16:09:46.303000 CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 @@ -259537,8 +259538,8 @@ CVE-2024-43567,0,0,5254211d003cb9dfab5d0a0274d50ed06371d19404c4e47d666432ca57706 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 CVE-2024-43570,0,0,016b6e94609b530b65d5100c09249d20ef14a15a752087ce1bb1b7159fb57dc2,2024-10-10T12:56:30.817000 CVE-2024-43571,0,0,015df71595da42b0884946bd78c15bf74fc19709a1096441e42c8f5ef0b8f816,2024-10-10T12:56:30.817000 -CVE-2024-43572,0,1,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000 -CVE-2024-43573,0,1,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000 +CVE-2024-43572,0,0,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000 +CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000 CVE-2024-43574,0,0,30d4174ef4e94dde6f0aa7093742f8a5ba6bcc65556c31badec28200fce82b19,2024-10-10T12:56:30.817000 CVE-2024-43575,0,0,eec07e542dee921a9f44a423761686ae2ce04f8b4b0745d9fd5ba52addccbd98,2024-10-10T12:56:30.817000 CVE-2024-43576,0,0,d76a890bff782679827ca6165aa10af7abdcfc7817f90ed044c9e8a2ad69acdc,2024-10-10T12:56:30.817000 @@ -260079,7 +260080,7 @@ CVE-2024-44685,0,0,7f282f2a70785e8bb92c0556d0f098f6c6fb951f86f77bf4595504ac943bb CVE-2024-4469,0,0,8f4eafe1629cfec30e07bc480cd9bd60074526e695dc3e7699a9034cc841795d,2024-05-31T13:01:46.727000 CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037c4,2024-05-21T12:37:59.687000 CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000 -CVE-2024-44711,1,1,620599d0f9bccc5f0a82e6591e0e72db06771c1ec29da729120ba22a8704288d,2024-10-10T14:15:04.777000 +CVE-2024-44711,0,0,620599d0f9bccc5f0a82e6591e0e72db06771c1ec29da729120ba22a8704288d,2024-10-10T14:15:04.777000 CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000 CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 CVE-2024-4472,0,0,6cbabb06deec22e45817e31231db7dceeae03b03c30644b1dc19b42bb497afd7,2024-09-18T19:16:35.900000 @@ -260184,11 +260185,11 @@ CVE-2024-44951,0,0,d4df6b53659b4bf2ca95c9e72ed9fbab6343da2558ed206d0ca74ab614293 CVE-2024-44952,0,0,6abe9435eb01f0417ea6e45511928e929f498aad7a413484748a480c46e0c4ce,2024-09-06T16:37:38.370000 CVE-2024-44953,0,0,f2ec50e0309c43f7cf9bb2e776118a51e77c29a5f9b8c0285a1645b3f3d10a0b,2024-09-06T16:37:33.650000 CVE-2024-44954,0,0,31b5dfbb887da799bd2bd3ced4c927fc2ecea3232fc0eafa678eaf39c7e755f6,2024-09-05T12:53:21.110000 -CVE-2024-44955,0,0,2a6532accf02411787cbf424bddea1cf6a2c7506af16dac0f1dc27d82c748f26,2024-09-05T12:53:21.110000 +CVE-2024-44955,0,1,7ecd6df0a7fc728e9f1b78b619a80458c35c83df938799fdd53ee40a270e647d,2024-10-10T17:57:00.267000 CVE-2024-44956,0,0,6af1a87a6f61cb2e54a20c3401cc5debba4744f6ee0ebb8ac5c756a545a18cee,2024-09-06T16:37:11.777000 CVE-2024-44957,0,0,e09ae721dc946241eec9f81a8aaa6dbc034c414b1c1b70d35ec2e90777c333a8,2024-09-06T16:37:00.077000 -CVE-2024-44958,0,0,49c750c0a9b2f5b7b2c2c67e4181474af81d7c9d2786a41fdac4a4241460e7f1,2024-09-05T12:53:21.110000 -CVE-2024-44959,0,0,ce07f05b33b1296682d80c2098d95c4078dc762d4b2d2681cf75b77f51bfb848,2024-09-05T12:53:21.110000 +CVE-2024-44958,0,1,e4d3f1ed246cde0567507bcc647e05aeb172deedd04cdd90b68c843294cc3a64,2024-10-10T17:56:24.467000 +CVE-2024-44959,0,1,cdc6d6e75361aea84c95ea1414f5cfe7ea6483c758f03a0ec301cc000a1016f2,2024-10-10T17:54:07.960000 CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000 CVE-2024-44960,0,0,68277b730b7485e374cc6a581bba8cf7b2d42cf68316fea6befff6e677f25010,2024-10-04T16:44:05.497000 CVE-2024-44961,0,0,f953df8f16221e9fd81f9cf7e7b0f2354703b12926c99e78c21e8910d16a893b,2024-10-04T16:39:39.300000 @@ -260207,27 +260208,27 @@ CVE-2024-44972,0,0,9b4a601abf868742cc56845740bd2af5dc67b7e9f76c5e2e3815a329e7373 CVE-2024-44973,0,0,6da77340a818d4254bbf05ca91b8c65562f8d826d87a4df556d42cceb3d012ba,2024-10-03T14:23:09.147000 CVE-2024-44974,0,0,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000 CVE-2024-44975,0,0,259cddaa128c9efb6ec303816aae245e7b8378b15a62da050b41a2aa6ef90c6f,2024-10-03T14:32:31.677000 -CVE-2024-44976,0,0,8c7b930f69a8eac68da6855eedc8b3a97b1051cdf631749b93c2aaf1d2a28ef8,2024-09-05T12:53:21.110000 -CVE-2024-44977,0,0,8267c668040f19c89ab2180e788476dee75d30c69bd18b77721b380cd5039fc4,2024-09-05T12:53:21.110000 +CVE-2024-44976,0,1,bc18e50085e0996c22bd3875fde1d8b8546c02856815a998cf979827e572374f,2024-10-10T17:50:14.863000 +CVE-2024-44977,0,1,03172ad45dab614d5712c6aa7ef1d5d1de28df5518c80831856ede17b98f6602,2024-10-10T17:47:59.593000 CVE-2024-44978,0,0,86121d29302acc1da31190cefab002b1ff26f43dfa1aaefb7afb57e51681158d,2024-09-10T16:51:19.813000 -CVE-2024-44979,0,0,c564230a8b2dad8ceef7ebf62fdc806efd7fe79c5ccf1d638e23d29d49c547ed,2024-09-05T12:53:21.110000 +CVE-2024-44979,0,1,cecac389382680ea39a2d45161307db74c62b644cb6a1947cc1848191426c503,2024-10-10T17:44:36.417000 CVE-2024-4498,0,0,237405bb434f57b5ee3d93725ee504cc093cf6521d831301400a29eebde53ae2,2024-06-26T12:44:29.693000 -CVE-2024-44980,0,0,47cbb2b80b64a9e65a634f164af37fe8f9bbf35b2a4763627fcb954d1d43d5f1,2024-09-05T12:53:21.110000 +CVE-2024-44980,0,1,dea397cd74419967eeeec31ac4bb73b2fcd8298d78221f7ff8b71c505344cc1e,2024-10-10T17:42:53.433000 CVE-2024-44981,0,0,bc3bb172f7a0023a22356964618a5541429c999634289482e09bbe39c56b8053,2024-09-05T17:54:19.377000 -CVE-2024-44982,0,0,097b402de9531ebf5ca1f6aae63ba13bda02a74939ff8ca55ac9e7a6db69946f,2024-09-05T12:53:21.110000 +CVE-2024-44982,0,1,a05c0c5e6b282a95ebe731908435bbb3ecaa688dda76ce2904340585b7afa275,2024-10-10T17:09:54.350000 CVE-2024-44983,0,0,6dcccaf315345579e49205f3bdea80f9b0827330855785bb5774834968a11f76,2024-09-10T16:57:55.110000 -CVE-2024-44984,0,0,c055413ce64b83c18979ac6480bb0a27c5e68feb3d290ff4c7ff28dc7f6a5b89,2024-09-05T12:53:21.110000 +CVE-2024-44984,0,1,9f87dbbca170f6f4d252c6919ea7b3f286e8ff7024a06a22635aff0d47c02da1,2024-10-10T16:48:56.167000 CVE-2024-44985,0,0,89614f0dc5a1bc1e42d274d3ec6531500905f54e1226dc3d0cfa558fdaf45e82,2024-09-05T17:54:11.313000 CVE-2024-44986,0,0,7b1b7f962a5dde2e3112c86530d9327efd0060e0a73a92ec7225981af2f022b4,2024-09-05T17:54:04.127000 CVE-2024-44987,0,0,80c7ee92eb0c64e1bc51cb1cea659b21d515983723260d3a4a67be7790dea749,2024-09-05T17:53:54.687000 -CVE-2024-44988,0,0,88c9242491758cb5cb40dacc794baa4f1069a31af76a02349607187c0ed57054,2024-09-05T12:53:21.110000 +CVE-2024-44988,0,1,6a50a64461dde71a529e9e83bb0f9a6735ab909803f408460e79c8c9f655c334,2024-10-10T16:44:14.767000 CVE-2024-44989,0,0,f232cbe2cf85d26edc47089ff1f523369ffa3f6479342bd09b010a8ff52ddbe8,2024-09-06T16:31:22.253000 CVE-2024-4499,0,0,76c471af3c85399c41d057a036d2a12d52d3dc17ec6cbd4660af6d2299ed90b8,2024-09-13T16:01:19.483000 CVE-2024-44990,0,0,87bc0c256d1ef863849319b5a4078ee77f85507d6091a25f9ed554ccb2e112e7,2024-09-06T16:31:12.870000 CVE-2024-44991,0,0,69eec0bb380a8754aee628a5bf38db8d970f8f66da3bb74dd5662c2dae9dd51b,2024-10-09T14:36:15.790000 CVE-2024-44992,0,0,97ef2dd55e50d283d25cb375a53b1b9e4ced48005c60f251c68cb5bcbe063f3e,2024-09-06T16:29:28.963000 CVE-2024-44993,0,0,83c20e8055b5f920fb8768cd48edd51dee49d28189ff000654e3b9aceca5b744,2024-09-06T16:28:49.180000 -CVE-2024-44994,0,1,b3f61d72a38d9d8c80281898ad7104799056cdc59334f53bd829366071e8d80e,2024-10-10T15:59:06.093000 +CVE-2024-44994,0,0,b3f61d72a38d9d8c80281898ad7104799056cdc59334f53bd829366071e8d80e,2024-10-10T15:59:06.093000 CVE-2024-44995,0,0,197459857248206995b34d4054170be94eac94a6c36641a79619b26d39e0858c,2024-09-15T18:15:34.540000 CVE-2024-44996,0,0,e18967c4ab698ef45683375a8ae0d2c16fa28828098e111c232677530888b1a3,2024-09-16T12:21:47.370000 CVE-2024-44997,0,0,e3f86ed864785c36fda99f43974c4da9bece309546ba3123a45070f74f032602,2024-09-06T16:28:25.183000 @@ -260584,7 +260585,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000 CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000 -CVE-2024-45519,0,1,8cf7771886ee091236ac393f14fcd9299d951c1d8323e7c75b78becbb53a0cf0,2024-10-10T15:04:49.143000 +CVE-2024-45519,0,0,8cf7771886ee091236ac393f14fcd9299d951c1d8323e7c75b78becbb53a0cf0,2024-10-10T15:04:49.143000 CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000 CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000 CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000 @@ -260836,7 +260837,7 @@ CVE-2024-46292,0,0,16657deaed202158307b9cd348b1ae5a658eccdd4341dd38e21d8ab9f2e1a CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-46300,0,0,d1242a191b8ea8c2a0e9fbab7765f3d208830dd828d323e4edc4853d2473356e,2024-10-07T20:35:11.433000 -CVE-2024-46304,0,1,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000 +CVE-2024-46304,0,0,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000 CVE-2024-46307,0,0,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2b0a,2024-10-04T13:51:25.567000 @@ -260894,7 +260895,7 @@ CVE-2024-46488,0,0,41c2092a15aede67b224d6f9481dd8740d600089d5047373dfa98024a8d78 CVE-2024-46489,0,0,0556d6a2fec67f99959df88dbf0bb95ed9722504d8b825a29e35fd84905c2afd,2024-10-02T16:24:32.300000 CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000 CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000 -CVE-2024-46503,0,1,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000 +CVE-2024-46503,0,0,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000 CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0b9,2024-06-20T20:15:19.353000 CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000 CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000 @@ -260927,7 +260928,7 @@ CVE-2024-46567,0,0,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada CVE-2024-46568,0,0,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000 CVE-2024-4657,0,0,e4551eb50aadbad4e8d70da122e3e5b28a0bd348b1d5555c6dab0b92557cea7b,2024-09-26T13:32:02.803000 CVE-2024-46571,0,0,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000 -CVE-2024-4658,1,1,6b27f4629a4709da9f5df818e618a578d6df916d8a407726ce5dd45b44432682,2024-10-10T14:15:05.587000 +CVE-2024-4658,0,0,6b27f4629a4709da9f5df818e618a578d6df916d8a407726ce5dd45b44432682,2024-10-10T14:15:05.587000 CVE-2024-46580,0,0,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000 CVE-2024-46581,0,0,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000 CVE-2024-46582,0,0,4dc729b9802e75f61b77ace705aeb5edeb4d2f366d0a6bce4afc576e2ee3fa8e,2024-09-24T16:41:29.377000 @@ -261468,7 +261469,7 @@ CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000 CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000 -CVE-2024-4748,0,0,dc500bd2c271d3e2932961c6c29606d3774e3a53e6aec567d01cebdb2996b974,2024-06-26T14:07:47.567000 +CVE-2024-4748,0,1,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000 CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000 CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000 CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000 @@ -263733,8 +263734,8 @@ CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000 CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000 CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000 -CVE-2024-7265,0,0,7744849ec550e14a15ade5689dd13e89a671dd2d7872009d179abef8fe868c92,2024-08-23T15:09:29.843000 -CVE-2024-7266,0,0,6254ba9d278e387df53e686fa5a3601176a5b5e90ff24b9b7119a368e812b840,2024-08-23T15:09:51.707000 +CVE-2024-7265,0,1,f8d550c674039cce8f324746def751c860d87bd4ce8e1c453bd0781310abcf46,2024-10-10T16:15:08.763000 +CVE-2024-7266,0,1,e5f7907376447dca655b663fd7a74a213d7d563471c1ec60c07889df6ae132cf,2024-10-10T16:15:08.910000 CVE-2024-7267,0,0,d99f3d8b6ba6fe3542d0e70da6abdfbfdfd1dfb75ac1c1edca9979fafd8e77bc,2024-08-23T15:12:23.453000 CVE-2024-7269,0,0,7c73ca02cf2298b160a9951524082c8dd50257198d6ed0e474a4c364b69ef80a,2024-09-19T14:37:26.380000 CVE-2024-7272,0,0,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000 @@ -264199,7 +264200,7 @@ CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277 CVE-2024-7836,0,0,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 -CVE-2024-7840,0,1,4aff3ecdb957b98960e18b3a212dcb872645f04a254f3e9f7fb77b50392cee06,2024-10-10T15:15:15.237000 +CVE-2024-7840,0,0,4aff3ecdb957b98960e18b3a212dcb872645f04a254f3e9f7fb77b50392cee06,2024-10-10T15:15:15.237000 CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000 CVE-2024-7842,0,0,6f597ddda6138d9acc81d07fc2eafe7775fb8cb17d6e8df28c226b7f95417689,2024-08-21T14:13:38.923000 CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca1839,2024-08-21T14:13:11.157000 @@ -265025,7 +265026,7 @@ CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f3 CVE-2024-9146,0,0,093a84e73722aaf94583ed37757bead7a369f935148ee5112a4de416d29a94d3,2024-10-07T17:48:28.117000 CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000 -CVE-2024-9156,0,1,15471148679479d1c4996386b3c830796b4238e3e438030cfa3cd455d3b54335,2024-10-10T15:35:15.513000 +CVE-2024-9156,0,0,15471148679479d1c4996386b3c830796b4238e3e438030cfa3cd455d3b54335,2024-10-10T15:35:15.513000 CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000 CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000 CVE-2024-9161,0,0,64c617d54e278f215ea553b63862cfa05f613731871770da9abd12448d8f4117,2024-10-07T17:48:28.117000 @@ -265092,7 +265093,7 @@ CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961 CVE-2024-9301,0,0,8bd5a6d252ad4356c723578db918b42e690d26a3308bebd8024d27b2807bcd16,2024-10-07T13:12:48.953000 CVE-2024-9304,0,0,f4e2b697051bb54ba85260a74446cf2ab04e7ed5a9a99551a585b1547839152d,2024-10-04T13:51:25.567000 CVE-2024-9306,0,0,ac26ad903bb36889edec0c6ea9a2822945801fec7c4fdd4634c75606f4fc1bfd,2024-10-08T16:25:29.877000 -CVE-2024-9312,1,1,c61a24c6a6bc70e80ca2fa418b83401f0228ff97884f8f436dcd1153e4d73199,2024-10-10T14:15:05.863000 +CVE-2024-9312,0,0,c61a24c6a6bc70e80ca2fa418b83401f0228ff97884f8f436dcd1153e4d73199,2024-10-10T14:15:05.863000 CVE-2024-9313,0,0,8eab8e6a12fcb7dddda62f8c34fd34d547229d6ef4cec2e38f61189642da0e5f,2024-10-04T13:50:43.727000 CVE-2024-9314,0,0,a38936eed4619dcb3327257a1c570731c2950b1dc59439e66bd5a7e1f84786fb,2024-10-07T17:48:28.117000 CVE-2024-9315,0,0,dcae3590349756096f3149f913fcd278d961f7a38fe3ece525d39bf3aa5da14a,2024-10-01T13:33:59.480000 @@ -265125,8 +265126,8 @@ CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044a CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000 CVE-2024-9377,0,0,7e92c94153a671db6e3bc46a35701812779a3ebf2498b474df31292a74a22a6c,2024-10-10T12:51:56.987000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 -CVE-2024-9379,0,1,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 -CVE-2024-9380,0,1,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 +CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 +CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 CVE-2024-9381,0,0,38dc7b42bfe6f81a683e774fe86ddcbec5bce97b381af2229d40d440156c5086,2024-10-10T12:56:30.817000 CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000 CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000 @@ -265235,11 +265236,16 @@ CVE-2024-9783,0,0,712836b1436318ef30c4c9316757670b95113f358e845fe262e620150796b3 CVE-2024-9784,0,0,64a6c68ed42050536e19b6453db5b3e132a6112e07a448f7da505723942301c6,2024-10-10T12:51:56.987000 CVE-2024-9785,0,0,ee184b824fb4d6c43c3629feb69eb05004a7592fad511f98957566ebeb43d5af,2024-10-10T13:15:14.583000 CVE-2024-9786,0,0,e7875c706b86134a4356de16f7f39d3d03c8ad5b5439952fad2634c3220ea97a,2024-10-10T13:15:14.860000 -CVE-2024-9787,1,1,a419614d20c76506100e7560985e58b193a4ffc80500f031d6c39db1267dc50f,2024-10-10T14:15:06.243000 -CVE-2024-9788,1,1,d0cba3dcf7be8cbc54f9f640901b56842d2e022c0155404c088882514bb98ec3,2024-10-10T14:15:06.537000 -CVE-2024-9789,1,1,2b4090b026a79f14a56152956a62ce7d4cd34e80782abc00813a239529bb2e8c,2024-10-10T14:15:06.803000 -CVE-2024-9790,1,1,062baa88691ce911608565afafee861bca229a67c8372d75785d3a77a80a0dfa,2024-10-10T15:15:15.457000 -CVE-2024-9792,1,1,2514dd90a5e918a09429c2c7607165e2b577a21ba08399597bfb6d38390f9c80,2024-10-10T15:15:15.710000 -CVE-2024-9796,0,1,c4f0b98e58e202300ac3c27bc57acd8a82992c6087c6cae3816d6e3a584fcf99,2024-10-10T15:35:16.310000 -CVE-2024-9798,0,1,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000 -CVE-2024-9802,0,1,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000 +CVE-2024-9787,0,0,a419614d20c76506100e7560985e58b193a4ffc80500f031d6c39db1267dc50f,2024-10-10T14:15:06.243000 +CVE-2024-9788,0,0,d0cba3dcf7be8cbc54f9f640901b56842d2e022c0155404c088882514bb98ec3,2024-10-10T14:15:06.537000 +CVE-2024-9789,0,0,2b4090b026a79f14a56152956a62ce7d4cd34e80782abc00813a239529bb2e8c,2024-10-10T14:15:06.803000 +CVE-2024-9790,0,0,062baa88691ce911608565afafee861bca229a67c8372d75785d3a77a80a0dfa,2024-10-10T15:15:15.457000 +CVE-2024-9792,0,0,2514dd90a5e918a09429c2c7607165e2b577a21ba08399597bfb6d38390f9c80,2024-10-10T15:15:15.710000 +CVE-2024-9793,1,1,f88fa106bba1c40a4cd6d3772f7b83c7e4ea94d13bbc61f765d745f4584ffc72,2024-10-10T16:15:09.080000 +CVE-2024-9794,1,1,24440d82ae69b0af74e9c151f82c9b1061e13043eae6ee1de39cb7f149ea4452,2024-10-10T16:15:09.350000 +CVE-2024-9796,0,0,c4f0b98e58e202300ac3c27bc57acd8a82992c6087c6cae3816d6e3a584fcf99,2024-10-10T15:35:16.310000 +CVE-2024-9797,1,1,32d50d64a6d23aa1ecf9c20299adc2043371b388c20eb741bc94c3c31f2a5a2e,2024-10-10T17:15:16.063000 +CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000 +CVE-2024-9799,1,1,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000 +CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000 +CVE-2024-9803,1,1,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000