Auto-Update: 2024-10-10T18:00:18.882198+00:00

This commit is contained in:
cad-safe-bot 2024-10-10 18:03:19 +00:00
parent 773980676f
commit bdc74a7bb4
58 changed files with 2324 additions and 327 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25091",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-02-01T13:15:09.410",
"lastModified": "2022-02-04T17:59:29.353",
"lastModified": "2024-10-10T16:59:04.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.2.9",
"matchCriteriaId": "DEA26EEA-A515-405C-963A-A1200053F9F0"
"matchCriteriaId": "B12E1682-0541-46FF-BCA6-D983C7223A52"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25092",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-02-01T13:15:09.460",
"lastModified": "2022-02-04T17:58:33.397",
"lastModified": "2024-10-10T16:59:04.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.2.8",
"matchCriteriaId": "4FCA212E-11B4-48F5-9E49-47013D294CE4"
"matchCriteriaId": "68E99884-F1E1-4F82-A97A-AA7E3293E319"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25093",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-02-01T13:15:09.510",
"lastModified": "2022-02-04T17:57:27.240",
"lastModified": "2024-10-10T16:59:04.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.2.8",
"matchCriteriaId": "4FCA212E-11B4-48F5-9E49-47013D294CE4"
"matchCriteriaId": "68E99884-F1E1-4F82-A97A-AA7E3293E319"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39118",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-09-14T05:15:09.900",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:00.827",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39122",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-09-08T02:15:06.787",
"lastModified": "2022-03-30T13:29:19.573",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:01.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39123",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-09-14T05:15:09.993",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:02.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4199",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:11.143",
"lastModified": "2023-11-07T03:57:09.600",
"lastModified": "2024-10-10T16:59:04.827",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -48,9 +48,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.4.1",
"matchCriteriaId": "E12AA0BA-F7DB-4F44-AFC4-477CEA5DABE5"
"matchCriteriaId": "5F313B36-93A6-425A-83DE-8989001DA479"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20827",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-09-04T03:15:09.270",
"lastModified": "2023-09-07T19:13:24.850",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:03.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1298"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20828",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-09-04T03:15:09.413",
"lastModified": "2023-09-07T19:13:33.270",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:04.517",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20829",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-09-04T03:15:09.527",
"lastModified": "2023-09-07T19:07:12.237",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:05.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20830",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-09-04T03:15:09.650",
"lastModified": "2023-09-07T19:07:25.423",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:07.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20831",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-09-04T03:15:09.770",
"lastModified": "2023-09-07T19:07:47.907",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:35:08.083",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2023-25581",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-10T16:15:04.923",
"lastModified": "2024-10-10T16:15:04.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pac4j is a security framework for Java. `pac4j-core` prior to version 4.0.0 is affected by a Java deserialization vulnerability. The vulnerability affects systems that store externally controlled values in attributes of the `UserProfile` class from pac4j-core. It can be exploited by providing an attribute that contains a serialized Java object with a special prefix `{#sb64}` and Base64 encoding. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. pac4j versions 4.0.0 and greater are not affected by this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.2,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://github.com/frohoff/ysoserial",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pac4j/pac4j/blob/5834aeb22ad3a4369dfa572be60d7b20f5784a8f/pac4j-core/src/main/java/org/pac4j/core/profile/InternalAttributeHandler.java#L95",
"source": "security-advisories@github.com"
},
{
"url": "https://portswigger.net/web-security/deserialization",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2022-085_pac4j/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25773",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:18.820",
"lastModified": "2023-11-07T04:09:11.320",
"lastModified": "2024-10-10T16:35:09.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -75,6 +75,16 @@
"value": "CWE-284"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2603",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-06T20:15:13.187",
"lastModified": "2023-11-30T05:15:08.800",
"vulnStatus": "Modified",
"lastModified": "2024-10-10T16:32:56.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libcap_project:libcap:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.66-4",
"matchCriteriaId": "6020DB67-8972-4BD9-8AF4-045C9E0B7AFA"
"versionEndExcluding": "2.69",
"matchCriteriaId": "93256DE7-08CA-4545-BF7E-2C916721F487"
}
]
}
@ -141,11 +141,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42135",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-15T14:15:24.413",
"lastModified": "2024-01-19T15:47:29.607",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:05.690",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-74"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42136",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-15T14:15:24.670",
"lastModified": "2024-01-19T16:19:25.047",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:05.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-77"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-42137",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-15T14:15:24.900",
"lastModified": "2024-01-19T16:21:06.650",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:06.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks.\n\n\n\n\nThe attacker must have shell access to the device in order to exploit this vulnerability. \n\n\n"
"value": "PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks.\n\n\n\n\nThe attacker must have shell access to the device in order to exploit this vulnerability."
},
{
"lang": "es",
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-59"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4537",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-02-15T09:15:33.273",
"lastModified": "2024-02-15T14:28:31.380",
"lastModified": "2024-10-10T16:15:06.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-311"
"value": "CWE-755"
}
]
}
@ -57,7 +57,7 @@
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2023/02/CVE-2023-4537/",
"url": "https://cert.pl/posts/2024/02/CVE-2023-4537/",
"source": "cvd@cert.pl"
}
]

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4540",
"sourceIdentifier": "cvd@cert.pl",
"published": "2023-09-05T08:15:40.017",
"lastModified": "2023-10-13T01:30:13.930",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:07.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \n\nThis issue affects lua-http: all versions before commit ddab283."
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \nSuch a request causes the program to enter an infinite loop. \n\nThis issue affects lua-http: all versions before commit ddab283."
},
{
"lang": "es",
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-755"
"value": "CWE-835"
}
]
}
@ -79,6 +79,10 @@
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2023/09/CVE-2023-4540/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2023/09/CVE-2023-4540/",
"source": "cvd@cert.pl",
@ -93,13 +97,6 @@
"tags": [
"Patch"
]
},
{
"url": "https://https://cert.pl/en/posts/2023/09/CVE-2023-4540/",
"source": "cvd@cert.pl",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4612",
"sourceIdentifier": "cvd@cert.pl",
"published": "2023-11-09T14:15:08.183",
"lastModified": "2023-11-17T17:42:18.630",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:07.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in Apereo CAS in\u00a0jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability.\n\n\n\n\n\n\n\n\n"
"value": "Improper Authentication vulnerability in Apereo CAS in\u00a0jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability."
},
{
"lang": "es",
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-302"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4818",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-15T14:15:25.180",
"lastModified": "2024-01-19T16:35:49.683",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:07.403",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.\u00a0\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability.\n\n"
"value": "PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.\u00a0\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability."
},
{
"lang": "es",
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-74"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49256",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-12T15:15:09.160",
"lastModified": "2024-01-18T21:14:03.490",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:06.313",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-798"
"value": "CWE-321"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49257",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-12T15:15:09.230",
"lastModified": "2024-01-18T21:13:51.623",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:06.553",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-732"
"value": "CWE-434"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49259",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-12T15:15:09.380",
"lastModified": "2024-01-18T20:33:22.163",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:06.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-327"
"value": "CWE-341"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49261",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-12T15:15:09.530",
"lastModified": "2024-09-04T20:35:12.553",
"lastModified": "2024-10-10T16:15:06.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-201"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49262",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-12T15:15:09.593",
"lastModified": "2024-01-19T02:11:40.757",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:06.893",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-190"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-5378",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-29T12:15:07.860",
"lastModified": "2024-02-19T12:15:43.980",
"lastModified": "2024-10-10T16:15:07.540",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in MegaBIP and already unsupported SmodBIP software allows for Stored XSS.This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2.\u00a0MegaBIP 5.08 was tested and is not vulnerable. A precise range of vulnerable versions remains unknown.\n\n\n"
"value": "Improper Input Validation vulnerability in MegaBIP and already unsupported SmodBIP software allows for Stored XSS.This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2.\u00a0MegaBIP 5.08 was tested and is not vulnerable. A precise range of vulnerable versions remains unknown."
},
{
"lang": "es",
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-79"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6551",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-04T16:15:09.380",
"lastModified": "2024-01-11T16:41:19.250",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:07.720",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. \n\n\nDevelopers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. \n\n\nThe README has been updated to include these guidelines.\n\n\n"
"value": "As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. \n\n\nDevelopers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. \n\n\nThe README has been updated to include these guidelines."
},
{
"lang": "es",
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-434"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6998",
"sourceIdentifier": "cvd@cert.pl",
"published": "2023-12-30T19:15:08.303",
"lastModified": "2024-01-11T20:25:14.163",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:07.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management vulnerability in CoolKit Technology eWeLink on Android and iOS allows application lockscreen bypass.This issue affects eWeLink before 5.2.0.\n\n"
"value": "Improper privilege management vulnerability in CoolKit Technology eWeLink on Android and iOS allows application lockscreen bypass.This issue affects eWeLink before 5.2.0."
},
{
"lang": "es",
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-305"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-0864",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-02-29T13:15:07.260",
"lastModified": "2024-08-29T20:35:57.690",
"lastModified": "2024-10-10T16:15:07.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.\nBy default, Laragon is not vulnerable until a user decides to use the\u00a0aforementioned plugin. \n"
"value": "Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.\nBy default, Laragon is not vulnerable until a user decides to use the\u00a0aforementioned plugin."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-434"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-1604",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-03-18T10:15:19.900",
"lastModified": "2024-03-18T12:38:25.490",
"lastModified": "2024-10-10T16:15:08.103",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in the report management and creation module of BMC Control-M branches\u00a09.0.20 and 9.0.21 allows logged-in users to read and make unauthorized changes to any reports available within the application, even without proper permissions. The attacker must know the unique identifier of the report they want to manipulate.\n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201. \n"
"value": "Improper authorization in the report management and creation module of BMC Control-M branches\u00a09.0.20 and 9.0.21 allows logged-in users to read and make unauthorized changes to any reports available within the application, even without proper permissions. The attacker must know the unique identifier of the report they want to manipulate.\n\n\n\n\n\n\n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "CWE-639"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-1605",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-03-18T10:15:20.583",
"lastModified": "2024-03-18T12:38:25.490",
"lastModified": "2024-10-10T16:15:08.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BMC Control-M branches 9.0.20 and 9.0.21 upon user login load all Dynamic Link Libraries (DLL) from a directory that grants Write and Read permissions to all users. Leveraging it leads to loading of a potentially malicious libraries, which will execute with the application's privileges. \n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201. \n\n"
"value": "BMC Control-M branches 9.0.20 and 9.0.21 upon user login load all Dynamic Link Libraries (DLL) from a directory that grants Write and Read permissions to all users. Leveraging it leads to loading of a potentially malicious libraries, which will execute with the application's privileges. \n\n\n\n\n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-276"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-2759",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-04-04T14:15:10.220",
"lastModified": "2024-04-04T16:33:06.610",
"lastModified": "2024-10-10T16:15:08.360",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in Apaczka plugin for PrestaShop allows information gathering from saved templates without authentication.This issue affects Apaczka plugin for PrestaShop from v1 through v4.\n\n"
"value": "Improper access control vulnerability in Apaczka plugin for PrestaShop allows information gathering from saved templates without authentication.This issue affects Apaczka plugin for PrestaShop from v1 through v4."
},
{
"lang": "es",
@ -23,7 +23,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-552"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3462",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-05-14T15:41:14.040",
"lastModified": "2024-05-14T16:11:39.510",
"lastModified": "2024-10-10T16:15:08.497",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,7 +23,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "CWE-302"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35202",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T13:15:14.077",
"lastModified": "2024-10-10T13:15:14.077",
"lastModified": "2024-10-10T16:35:11.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. FillBlock can be called twice for one PartiallyDownloadedBlock instance."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35687",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T15:15:51.000",
"lastModified": "2024-07-18T19:12:50.843",
"lastModified": "2024-10-10T16:59:04.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.6.4",
"matchCriteriaId": "B0156BD6-F412-4753-B5A5-F751F00BFAA7"
"matchCriteriaId": "28F5D46D-2ECE-4AD7-8B11-96D7EB6BAC0F"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41817",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-29T16:15:05.360",
"lastModified": "2024-09-11T16:16:23.090",
"lastModified": "2024-10-10T17:25:47.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -91,8 +91,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.11-36",
"matchCriteriaId": "0DB31638-1DA7-4EBE-B65D-E55D490107C5"
"versionEndExcluding": "7.1.1-36",
"matchCriteriaId": "77361F36-4709-4D0E-964D-DEF566899360"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44955",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T19:15:30.423",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:57:00.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: No hacer referencia a dc_sink en is_dsc_need_re_compute [Por qu\u00e9] Cuando se desconecta uno de los monitores conectados despu\u00e9s del concentrador mst, se produce una desreferencia de puntero nulo. Esto se debe a que dc_sink se libera inmediatamente en early_unregister() o detect_ctx(). Cuando se confirma un nuevo estado que hace referencia directa a la informaci\u00f3n almacenada en dc_sink, se producir\u00e1 una desreferencia de puntero nulo. [C\u00f3mo] Eliminar la condici\u00f3n de comprobaci\u00f3n redundante. La condici\u00f3n relevante ya deber\u00eda estar cubierta comprobando si dsc_aux es nulo o no. Tambi\u00e9n se restablece dsc_aux a NULL cuando se desconecta el conector."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/39b217193729aa45eded8de24d9245468a0c0263",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/fcf6a49d79923a234844b8efe830a61f3f0584e4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.5",
"matchCriteriaId": "E4CB0927-C720-465B-99F2-3E47215515F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/39b217193729aa45eded8de24d9245468a0c0263",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fcf6a49d79923a234844b8efe830a61f3f0584e4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44958",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T19:15:30.580",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:56:24.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,136 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched/smt: Corregir desequilibrio en sched_smt_present dec/inc Recib\u00ed el siguiente informe de advertencia mientras realizaba una prueba de estr\u00e9s: etiqueta de salto: \u00a1recuento negativo! ADVERTENCIA: CPU: 3 PID: 38 en kernel/jump_label.c:263 static_key_slow_try_dec+0x9d/0xb0 Seguimiento de llamadas: __static_key_slow_dec_cpuslocked+0x16/0x70 sched_cpu_deactivate+0x26e/0x2a0 cpuhp_invoke_callback+0x3ad/0x10d0 cpuhp_thread_fun+0x3f5/0x680 smpboot_thread_fn+0x56d/0x8d0 kthread+0x309/0x400 ret_from_fork+0x41/0x70 ret_from_fork_asm+0x1b/0x30 Porque cuando cpuset_cpu_inactive() falla en sched_cpu_deactivate(), la CPU fuera de l\u00ednea fall\u00f3, pero sched_smt_present se decrementa antes de llamar a sched_cpu_deactivate(), esto genera un dec/inc desequilibrado, por lo que debe solucionarlo incrementando sched_smt_present en la ruta de error."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/2a3548c7ef2e135aee40e7e5e44e7d11b893e7c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/2cf7665efe451e48d27953e6b5bc627d518c902b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/65727331b60197b742089855ac09464c22b96f66",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/d0c87a3c6be10a57aa3463c32c3fc6b2a47c3dab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e22f910a26cc2a3ac9c66b8e935ef2a7dd881117",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.86",
"versionEndExcluding": "4.15",
"matchCriteriaId": "4B10ECDC-134F-409F-8DC5-1B38E76D5478"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.7",
"versionEndExcluding": "4.20",
"matchCriteriaId": "BFCE51A8-A708-49F5-B629-C107F587C29F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.15.165",
"matchCriteriaId": "4F2025E4-76F7-4500-8020-B236CD18654A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.105",
"matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.46",
"matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.5",
"matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2a3548c7ef2e135aee40e7e5e44e7d11b893e7c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2cf7665efe451e48d27953e6b5bc627d518c902b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/65727331b60197b742089855ac09464c22b96f66",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d0c87a3c6be10a57aa3463c32c3fc6b2a47c3dab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e22f910a26cc2a3ac9c66b8e935ef2a7dd881117",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44959",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T19:15:30.637",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:54:07.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,106 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracefs: usar RCU de inodo gen\u00e9rico para sincronizar la liberaci\u00f3n con la aleatorizaci\u00f3n del dise\u00f1o de la estructura habilitada para 'struct inode', debemos evitar superponer cualquiera de los miembros de RCU utilizados o inicializados solo una vez, por ejemplo, i_lru o i_sb_list para no da\u00f1ar los recorridos de listas relacionadas al hacer uso de rcu_head. En caso de una disposici\u00f3n desafortunada de la estructura 'struct inode', podemos terminar con el siguiente resultado al ejecutar las pruebas autom\u00e1ticas de ftrace: [<...>] corrupci\u00f3n de list_del, ffff888103ee2cb0->next (tracefs_inode_cache+0x0/0x4e0 [objeto slab]) es NULL (prev es tracefs_inode_cache+0x78/0x4e0 [objeto slab]) [<...>] ------------[ cortar aqu\u00ed ]------------ [<...>] \u00a1ERROR del kernel en lib/list_debug.c:54! [<...>] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP KASAN [<...>] CPU: 3 PID: 2550 Comm: mount Contaminado: GN 6.8.12-grsec+ #122 ed2f536ca62f28b087b90e3cc906a8d25b3ddc65 [<...>] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 [<...>] RIP: 0010:[] __list_del_entry_valid_or_report+0x138/0x3e0 [<...>] C\u00f3digo: 48 b8 99 fb 65 f2 ff ff ff es e9 03 5c d9 fc cc 48 b8 99 fb 65 f2 es ff es ff es ff e9 33 5a d9 fc cc 48 b8 99 fb 65 f2 es ff es ff es ff <0f> 0b 4c 89 e9 48 89 ea 48 89 ee 48 c7 c7 60 8f dd 89 31 c0 e8 2f [<...>] RSP: 0018:fffffe80416afaf0 EFLAGS: 00010283 [<...>] RAX: 000000000000098 RBX: ffff888103ee2cb0 RCX: 0000000000000000 [<...>] RDX: RSI: ffffffff89dd8b60 RDI: 0000000000000001 [<...>] RBP: ffff888103ee2cb0 R08: 0000000000000001 R09: fffffbd0082d5f25 [<...>] R10: fffffe80416af92f R11: 0000000000000001 R12: fdf99c16731d9b6d [<...>] R13: 000000000000000 R14: ffff88819ad4b8b8 R15: 0000000000000000 [<...>] RBX: tracefs_inode_cache+0x0/0x4e0 [objeto de losa] [<...>] RDX: __list_del_entry_valid_or_report+0x108/0x3e0 [<...>] RSI: __func__.47+0x4340/0x4400 [<...>] RBP: tracefs_inode_cache+0x0/0x4e0 [objeto de losa] [<...>] RSP: proceso kstack fffffe80416afaf0+0x7af0/0x8000 [montaje 2550 2550] [<...>] R09: sombra de kasan del proceso kstack fffffe80416af928+0x7928/0x8000 [montaje 2550 2550] [<...>] R10: proceso kstack fffffe80416af92f+0x792f/0x8000 [montaje 2550 2550] [<...>] R14: tracefs_inode_cache+0x78/0x4e0 [objeto de losa] [<...>] FS: 00006dcb380c1840(0000) GS:ffff8881e0600000(0000) knlGS:0000000000000000 [<...>] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [<...>] CR2: 000076ab72b30e84 CR3: 000000000b088004 CR4: 0000000000360ef0 sombra CR4: 0000000000360ef0 [<...>] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000000000 [<...>] DR3: 000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [<...>] ASID: 0003 [<...>] Pila: [<...>] ffffffff818a2315 00000000f5c856ee ffffffff896f1840 ffff888103ee2cb0 [<...>] ffff88812b6b9750 0000000079d714b6 fffffbfff1e9280b ffffffff8f49405f [<...>] 000000000000001 0000000000000000 ffff888104457280 ffffffff8248b392 [<...>] Rastreo de llamadas: [<...>] [<...>] [] ? liberaci\u00f3n_de_bloqueo+0x175/0x380 fffffe80416afaf0 [<...>] [] lista_lru_del+0x152/0x740 fffffe80416afb48 [<...>] [] lista_lru_del_obj+0x113/0x280 fffffe80416afb88 [<...>] [] ? __dentry_kill+0x23c/0xf00 fffffe80416afc40 [<...>] [] ? __esta_comprobaci\u00f3n_previa_de_cpu+0x1f/0xa0 fffffe80416afc48 [<...>] [] ? lista_de_reducci\u00f3n_dentry+0x1c5/0x760 fffffe80416afc70 [<...>] [] ? lista_dentry_shrink+0x51/0x760 fffffe80416afc78 [<...>] [] lista_dentry_shrink+0x288/0x760 fffffe80416afc80 [<...>] [] lista_dentry_shrink+0x155/0x420 fffffe80416afcc8 [<...>] [] ? id_procesador_smp_depuraci\u00f3n+0x23/0xa0 fffffe80416afce0 [<...>] [] ? do_one_tre ---truncado---"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/061da60716ce0cde99f62f31937b81e1c03acef6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/0b6743bd60a56a701070b89fb80c327a44b7b3e2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/726f4c241e17be75a9cf6870d80cd7479dc89e8f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.31",
"versionEndExcluding": "6.6.46",
"matchCriteriaId": "EB28F13B-5DD7-4C32-B506-0964915A6822"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8.10",
"versionEndExcluding": "6.9",
"matchCriteriaId": "DD26A649-FB0B-4A7B-A16B-A9D27807D7E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.10.5",
"matchCriteriaId": "F07BD0FF-07AF-4DAD-8EB1-09FB50ABDC47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/061da60716ce0cde99f62f31937b81e1c03acef6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0b6743bd60a56a701070b89fb80c327a44b7b3e2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/726f4c241e17be75a9cf6870d80cd7479dc89e8f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44976",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.223",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:50:14.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: pata_macio: Fix DMA table overflow Kolbj\u00f8rn y Jon\u00e1\u0161 informaron que sus PowerMacs de 32 bits fallaban en pata-macio desde el commit 09fe2bfa6b83 (\"ata: pata_macio: Fix max_segment_size with PAGE_SIZE == 64K\"). Por ejemplo: \u00a1ERROR del kernel en drivers/ata/pata_macio.c:544! Ups: Excepci\u00f3n en modo kernel, firma: 5 [#1] BE PAGE_SIZE=4K MMU=Hash SMP NR_CPUS=2 DEBUG_PAGEALLOC PowerMac ... NIP pata_macio_qc_prep+0xf4/0x190 LR pata_macio_qc_prep+0xfc/0x190 Rastreo de llamadas: 0xc1421660 (no confiable) ata_qc_issue+0x14c/0x2d4 __ata_scsi_queuecmd+0x200/0x53c ata_scsi_queuecmd+0x50/0xe0 scsi_queue_rq+0x788/0xb1c __blk_mq_issue_directly+0x58/0xf4 blk_mq_plug_issue_direct+0x8c/0x1b4 blk_mq_flush_plug_list.part.0+0x584/0x5e0 __blk_flush_plug+0xf8/0x194 __submit_bio+0x1b8/0x2e0 submission_bio_noacct_nocheck+0x230/0x304 btrfs_work_helper+0x200/0x338 process_one_work+0x1a8/0x338 worker_thread+0x364/0x4c0 kthread+0x100/0x104 start_kernel_thread+0x10/0x14 Esa confirmaci\u00f3n aument\u00f3 max_segment_size a 64 KB, con la justificaci\u00f3n de que el n\u00facleo SCSI ya estaba usando ese tama\u00f1o cuando PAGE_SIZE == 64 KB, y que exist\u00eda una l\u00f3gica para dividir las solicitudes de gran tama\u00f1o. Sin embargo, con una solicitud lo suficientemente grande, la l\u00f3gica de divisi\u00f3n hace que cada sg se divida en dos comandos en la tabla DMA, lo que provoca un desbordamiento de la tabla DMA y activa el BUG_ON(). Con la configuraci\u00f3n predeterminada, el error no se activa, porque el tama\u00f1o de la solicitud est\u00e1 limitado por max_sectors_kb == 1280, sin embargo, max_sectors_kb se puede aumentar y, aparentemente, algunas distribuciones lo hacen de forma predeterminada utilizando reglas de udev. Corrija el error para los n\u00facleos de 4 KB volviendo al antiguo max_segment_size. Para los n\u00facleos de 64 KB, el sg_tablesize debe reducirse a la mitad, para permitir la posibilidad de que cada sg se divida en dos."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/709e4c8f78e156ab332297bdd87527ec3da4e2d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/822c8020aebcf5804a143b891e34f29873fee5e2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "E55C1263-DF43-41EF-8DA8-2BA68DF4FFFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/709e4c8f78e156ab332297bdd87527ec3da4e2d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/822c8020aebcf5804a143b891e34f29873fee5e2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44977",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.290",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:47:59.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,122 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Validar el tama\u00f1o binario de TA Agregar validaci\u00f3n del tama\u00f1o binario de TA para evitar escritura OOB. (seleccionado de el commit c0a04e3570d72aaf090962156ad085e37c62e442)"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/50553ea7cbd3344fbf40afb065f6a2d38171c1ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/5ab8793b9a6cc059f503cbe6fe596f80765e0f19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/c99769bceab4ecb6a067b9af11f9db281eea3e2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/e562415248f402203e7fb6d8c38c1b32fa99220f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.107",
"matchCriteriaId": "8F2CC1DB-35C3-4EA5-A949-B2693FE60222"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.2",
"versionEndExcluding": "6.6.48",
"matchCriteriaId": "2FB95FF7-B158-4D6C-896F-AD8F14E79ACE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "6.7",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "E84F5598-59B1-4D52-A342-22B5C73FBD41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/50553ea7cbd3344fbf40afb065f6a2d38171c1ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5ab8793b9a6cc059f503cbe6fe596f80765e0f19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c99769bceab4ecb6a067b9af11f9db281eea3e2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e562415248f402203e7fb6d8c38c1b32fa99220f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44979",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.400",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:44:36.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: Se corrige la falta de destrucci\u00f3n de la cola de trabajo en xe_gt_pagefault. Al recargar el controlador, nunca liberamos la memoria para las colas de trabajo del contador de acceso y de Pagefault. Agregue esas llamadas de destrucci\u00f3n aqu\u00ed. (seleccionadas de el commit 7586fc52b14e0b8edd0d1f8a434e0de2078b7b2b)"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/a6f78359ac75f24cac3c1bdd753c49c1877bcd82",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/b09ef3b762a7fc641fb2f89afd3ebdb65b8ba1b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "E89DCAFA-7226-4A61-B500-1229E533B4BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/a6f78359ac75f24cac3c1bdd753c49c1877bcd82",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b09ef3b762a7fc641fb2f89afd3ebdb65b8ba1b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44980",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.460",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:42:53.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: Fix opregion leak Como parte de la pantalla, lo ideal ser\u00eda que la configuraci\u00f3n y la limpieza las hiciera la propia pantalla. Sin embargo, se trata de una refactorizaci\u00f3n m\u00e1s grande que debe realizarse tanto en i915 como en xe. Por ahora, solo arregle la fuga: objeto sin referencia 0xffff8881a0300008 (tama\u00f1o 192): comm \"modprobe\", pid 4354, jiffies 4295647021 volcado hexadecimal (primeros 32 bytes): 00 00 87 27 81 88 ff ff 18 80 9b 00 00 c9 ff ff ...'............ 18 81 9b 00 00 c9 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 99260e31): [] kmemleak_alloc+0x4b/0x80 [] kmalloc_trace_noprof+0x312/0x3d0 [] intel_opregion_setup+0x89/0x700 [xe] [] xe_display_init_noirq+0x2f/0x90 [xe] [] xe_device_probe+0x7a3/0xbf0 [xe] [] xe_pci_probe+0x333/0x5b0 [xe] [] local_pci_probe+0x48/0xb0 [] pci_device_probe+0xc8/0x280 [] really_probe+0xf8/0x390 [] __driver_probe_device+0x8a/0x170 [] driver_probe_device+0x23/0xb0 [] __driver_attach+0xc7/0x190 [] bus_for_each_dev+0x7d/0xd0 [] driver_attach+0x1e/0x30 [] bus_add_driver+0x117/0x250 (seleccionado de el commit) 6f4e43a2f771b737d991142ec4f6d4b7ff31fbb4)"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/f4b2a0ae1a31fd3d1b5ca18ee08319b479cf9b5f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/f7ecdd9853dd9f34e7cdfdadfb70b8f40644ebb4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "E89DCAFA-7226-4A61-B500-1229E533B4BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/f4b2a0ae1a31fd3d1b5ca18ee08319b479cf9b5f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f7ecdd9853dd9f34e7cdfdadfb70b8f40644ebb4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44982",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.593",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T17:09:54.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,137 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/dpu: limpiar FB si dpu_format_populate_layout falla Si dpu_format_populate_layout() falla, entonces FB se prepara, pero no se limpia. Esto termina filtrando el pin_count en el objeto GEM y provoca un splat durante el cierre del archivo DRM: msm_obj->pin_count ADVERTENCIA: CPU: 2 PID: 569 en drivers/gpu/drm/msm/msm_gem.c:121 update_lru_locked+0xc4/0xcc [...] Rastreo de llamadas: update_lru_locked+0xc4/0xcc put_pages+0xac/0x100 msm_gem_free_object+0x138/0x180 drm_gem_object_free+0x1c/0x30 drm_gem_object_handle_put_unlocked+0x108/0x10c drm_gem_object_release_handle+0x58/0x70 idr_for_each+0x68/0xec drm_gem_release+0x28/0x40 drm_file_free+0x174/0x234 drm_release+0xb0/0x160 __fput+0xc0/0x2c8 __fput_sync+0x50/0x5c __arm64_sys_close+0x38/0x7c anybody_syscall+0x48/0x118 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x4c/0x120 el0t_64_sync_handler+0x100/0x12c el0t_64_sync+0x190/0x194 marca de evento irq: 129818 hardirqs habilitados por \u00faltima vez en (129817): [] console_unlock+0x118/0x124 hardirqs deshabilitados por \u00faltima vez en (129818): [] el1_dbg+0x24/0x8c softirqs habilitados por \u00faltima vez en (129808): [] handle_softirqs+0x4c8/0x4e8 softirqs deshabilitados por \u00faltima vez en (129785): [] __do_softirq+0x14/0x20 Patchwork: https://patchwork.freedesktop.org/patch/600714/"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/02193c70723118889281f75b88722b26b58bf4ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/7ecf85542169012765e4c2817cd3be6c2e009962",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/9b8b65211a880af8fe8330a101e1e239a2d4008f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/a3c5815b07f4ee19d0b7e2ddf91ff9f03ecbf27d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bfa1a6283be390947d3649c482e5167186a37016",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-459"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19",
"versionEndExcluding": "5.15.166",
"matchCriteriaId": "7EC1FEFC-7B3F-47B1-8D1F-6D6B04486321"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.107",
"matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.48",
"matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/02193c70723118889281f75b88722b26b58bf4ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7ecf85542169012765e4c2817cd3be6c2e009962",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b8b65211a880af8fe8330a101e1e239a2d4008f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a3c5815b07f4ee19d0b7e2ddf91ff9f03ecbf27d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bfa1a6283be390947d3649c482e5167186a37016",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44984",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.717",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T16:48:56.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,109 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bnxt_en: Se ha corregido la doble anulaci\u00f3n de la asignaci\u00f3n de DMA para XDP_REDIRECT. Se ha eliminado la llamada dma_unmap_page_attrs() en la ruta de c\u00f3digo XDP_REDIRECT del controlador. Esto deber\u00eda haberse eliminado cuando dejamos que el grupo de p\u00e1ginas se encargara de la asignaci\u00f3n de DMA. Este error provoca la advertencia: ADVERTENCIA: CPU: 7 PID: 59 en drivers/iommu/dma-iommu.c:1198 iommu_dma_unmap_page+0xd5/0x100 CPU: 7 PID: 59 Comm: ksoftirqd/7 Contaminado: GW 6.8.0-1010-gcp #11-Ubuntu Nombre del hardware: Dell Inc. PowerEdge R7525/0PYVT1, BIOS 2.15.2 04/02/2024 RIP: 0010:iommu_dma_unmap_page+0xd5/0x100 C\u00f3digo: 89 ee 48 89 df e8 cb f2 69 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff 45 31 c0 e9 ab 17 71 00 <0f> 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 RSP: 0018:ffffab1fc0597a48 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff99ff838280c8 RCX: 000000000000000 RDX: 0000000000000000 RSI: 00000000000000000 RDI: 0000000000000000 RBP: ffffab1fc0597a78 R08: 0000000000000002 R09: ffffab1fc0597c1c R10: ffffab1fc0597cd3 R11: ffff99ffe375acd8 R12: 00000000e65b9000 R13: 0000000000000050 R14: 0000000000001000 R15: 0000000000000002 FS: 000000000000000(0000) GS:ffff9a06efb80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000565c34c37210 CR3: 00000005c7e3e000 CR4: 0000000000350ef0 ? mostrar_regs+0x6d/0x80 ? __warn+0x89/0x150 ? iommu_dma_unmap_page+0xd5/0x100 ? informar_error+0x16a/0x190 ? manejar_error+0x51/0xa0 ? dma_unmap_page_attrs+0x55/0x220 ? bpf_prog_4d7e87c0d30db711_xdp_dispatcher+0x64/0x9f bnxt_rx_xdp+0x237/0x520 [bnxt_es] bnxt_rx_pkt+0x640/0xdd0 [bnxt_es] __bnxt_poll_work+0x1a1/0x3d0 [bnxt_es] bnxt_poll+0xaa/0x1e0 [bnxt_es] __napi_poll+0x33/0x1e0 net_rx_action+0x18a/0x2f0"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/8baeef7616d5194045c5a6b97fd1246b87c55b13",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/95a305ba259b685780ed62ea2295aa2feb2d6c0c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/fa4e6ae38574d0fc5596272bee64727d8ab7052b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.48",
"matchCriteriaId": "F83B546B-6FA2-483D-A14D-3C7EB9CAD99D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8baeef7616d5194045c5a6b97fd1246b87c55b13",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95a305ba259b685780ed62ea2295aa2feb2d6c0c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fa4e6ae38574d0fc5596272bee64727d8ab7052b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44988",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:07.960",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-10T16:44:14.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,179 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: mv88e6xxx: Se corrige el acceso fuera de los l\u00edmites. Si una violaci\u00f3n de ATU fue causada por una operaci\u00f3n de carga de CPU, el SPID podr\u00eda ser mayor que DSA_MAX_PORTS (el tama\u00f1o de la matriz mv88e6xxx_chip.ports[])."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
{
"url": "https://git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.21",
"versionEndExcluding": "4.20",
"matchCriteriaId": "F6FF0A3A-758D-43A0-A0F5-479C21D63D06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20.8",
"versionEndExcluding": "5.0",
"matchCriteriaId": "AB13970D-66FC-4BF4-9E1B-453377326244"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndExcluding": "5.4.283",
"matchCriteriaId": "07286026-9003-45BE-90E5-51F9AF983C18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.225",
"matchCriteriaId": "C57B46A9-B105-4792-8481-1870DEFB436A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.166",
"matchCriteriaId": "913ED6CD-8ACF-48AF-AA18-7880881DD402"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.107",
"matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.48",
"matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4748",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-24T14:15:13.030",
"lastModified": "2024-06-26T14:07:47.567",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:08.630",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-77"
"value": "CWE-78"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-7265",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-08-07T11:15:45.757",
"lastModified": "2024-08-23T15:09:29.843",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:08.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie? Komputerowa - Pa?stwowy Instytut Badawczy EZD RP allows logged-in user to change the password of any user, including root user, which could lead to privilege escalation.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2."
"value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie\u0107 Komputerowa - Pa\u0144stwowy Instytut Badawczy EZD RP allows logged-in user to change the password of any user, including root user, which could lead to privilege escalation.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2."
},
{
"lang": "es",
@ -100,7 +100,7 @@
"description": [
{
"lang": "en",
"value": "CWE-286"
"value": "CWE-863"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-7266",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-08-07T11:15:46.077",
"lastModified": "2024-08-23T15:09:51.707",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-10T16:15:08.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie? Komputerowa - Pa?stwowy Instytut Badawczy EZD RP allows logged-in user to list all users in the system, including those from other organizations.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2."
"value": "Incorrect User Management vulnerability in Naukowa i Akademicka Sie\u0107 Komputerowa - Pa\u0144stwowy Instytut Badawczy EZD RP allows logged-in user to list all users in the system, including those from other organizations.\u00a0This issue affects EZD RP: from 15 before 15.84, from 16 before 16.15, from 17 before 17.2."
},
{
"lang": "es",
@ -100,7 +100,7 @@
"description": [
{
"lang": "en",
"value": "CWE-286"
"value": "CWE-863"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-9793",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T16:15:09.080",
"lastModified": "2024-10-10T16:15:09.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Tenda AC1206 up to 15.03.06.23. This vulnerability affects the function ate_iwpriv_set/ate_ifconfig_set of the file /goform/ate. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/ixout/iotVuls/blob/main/Tenda/ac1206_003/report.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ixout/iotVuls/blob/main/Tenda/ac1206_004/report.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279946",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279946",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.418061",
"source": "cna@vuldb.com"
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-9794",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T16:15:09.350",
"lastModified": "2024-10-10T16:15:09.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Codezips Online Shopping Portal 1.0. This issue affects some unknown processing of the file /update-image1.php. The manipulation of the argument productimage1 leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/7",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279947",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279947",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.417583",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-9797",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T17:15:16.063",
"lastModified": "2024-10-10T17:15:16.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Blood Bank System 1.0. Affected is an unknown function of the file register.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/siyuancn-hub/cve/blob/main/sql4-user.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279948",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279948",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.417586",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-9799",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T17:15:16.390",
"lastModified": "2024-10-10T17:15:16.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Profile Registration without Reload Refresh 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file add.php. The manipulation of the argument email_address/address/company_name/job_title/jobDescriptionparameter leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/sechurity/07c5a3a15f21313ee657d05baadbee19",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279949",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279949",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.417589",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-9803",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-10T17:15:16.730",
"lastModified": "2024-10-10T17:15:16.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file blooddetails.php. The manipulation of the argument Availibility leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/cookie5201314/CVE/blob/main/xss4-w.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.279951",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.279951",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.418615",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-10T16:00:19.035045+00:00
2024-10-10T18:00:18.882198+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-10T15:59:06.093000+00:00
2024-10-10T17:57:00.267000+00:00
```
### Last Data Feed Release
@ -33,52 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265244
265250
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `6`
- [CVE-2024-44711](CVE-2024/CVE-2024-447xx/CVE-2024-44711.json) (`2024-10-10T14:15:04.777`)
- [CVE-2024-4658](CVE-2024/CVE-2024-46xx/CVE-2024-4658.json) (`2024-10-10T14:15:05.587`)
- [CVE-2024-9312](CVE-2024/CVE-2024-93xx/CVE-2024-9312.json) (`2024-10-10T14:15:05.863`)
- [CVE-2024-9787](CVE-2024/CVE-2024-97xx/CVE-2024-9787.json) (`2024-10-10T14:15:06.243`)
- [CVE-2024-9788](CVE-2024/CVE-2024-97xx/CVE-2024-9788.json) (`2024-10-10T14:15:06.537`)
- [CVE-2024-9789](CVE-2024/CVE-2024-97xx/CVE-2024-9789.json) (`2024-10-10T14:15:06.803`)
- [CVE-2024-9790](CVE-2024/CVE-2024-97xx/CVE-2024-9790.json) (`2024-10-10T15:15:15.457`)
- [CVE-2024-9792](CVE-2024/CVE-2024-97xx/CVE-2024-9792.json) (`2024-10-10T15:15:15.710`)
- [CVE-2023-25581](CVE-2023/CVE-2023-255xx/CVE-2023-25581.json) (`2024-10-10T16:15:04.923`)
- [CVE-2024-9793](CVE-2024/CVE-2024-97xx/CVE-2024-9793.json) (`2024-10-10T16:15:09.080`)
- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-10T16:15:09.350`)
- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-10T17:15:16.063`)
- [CVE-2024-9799](CVE-2024/CVE-2024-97xx/CVE-2024-9799.json) (`2024-10-10T17:15:16.390`)
- [CVE-2024-9803](CVE-2024/CVE-2024-98xx/CVE-2024-9803.json) (`2024-10-10T17:15:16.730`)
### CVEs modified in the last Commit
Recently modified CVEs: `41`
Recently modified CVEs: `50`
- [CVE-2023-39390](CVE-2023/CVE-2023-393xx/CVE-2023-39390.json) (`2024-10-10T14:35:04.077`)
- [CVE-2023-49069](CVE-2023/CVE-2023-490xx/CVE-2023-49069.json) (`2024-10-10T15:15:14.937`)
- [CVE-2023-49339](CVE-2023/CVE-2023-493xx/CVE-2023-49339.json) (`2024-10-10T15:47:52.090`)
- [CVE-2023-6681](CVE-2023/CVE-2023-66xx/CVE-2023-6681.json) (`2024-10-10T14:32:07.260`)
- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-10-10T14:22:28.617`)
- [CVE-2024-21338](CVE-2024/CVE-2024-213xx/CVE-2024-21338.json) (`2024-10-10T15:14:00.550`)
- [CVE-2024-22043](CVE-2024/CVE-2024-220xx/CVE-2024-22043.json) (`2024-10-10T15:44:13.010`)
- [CVE-2024-22126](CVE-2024/CVE-2024-221xx/CVE-2024-22126.json) (`2024-10-10T15:56:49.207`)
- [CVE-2024-24884](CVE-2024/CVE-2024-248xx/CVE-2024-24884.json) (`2024-10-10T14:04:13.600`)
- [CVE-2024-25360](CVE-2024/CVE-2024-253xx/CVE-2024-25360.json) (`2024-10-10T14:43:01.797`)
- [CVE-2024-25914](CVE-2024/CVE-2024-259xx/CVE-2024-25914.json) (`2024-10-10T15:57:37.980`)
- [CVE-2024-38259](CVE-2024/CVE-2024-382xx/CVE-2024-38259.json) (`2024-10-10T14:02:28.917`)
- [CVE-2024-43572](CVE-2024/CVE-2024-435xx/CVE-2024-43572.json) (`2024-10-10T15:25:33.310`)
- [CVE-2024-43573](CVE-2024/CVE-2024-435xx/CVE-2024-43573.json) (`2024-10-10T15:54:19.353`)
- [CVE-2024-44994](CVE-2024/CVE-2024-449xx/CVE-2024-44994.json) (`2024-10-10T15:59:06.093`)
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-10-10T15:04:49.143`)
- [CVE-2024-46304](CVE-2024/CVE-2024-463xx/CVE-2024-46304.json) (`2024-10-10T14:15:05.100`)
- [CVE-2024-46503](CVE-2024/CVE-2024-465xx/CVE-2024-46503.json) (`2024-10-10T14:15:05.183`)
- [CVE-2024-7840](CVE-2024/CVE-2024-78xx/CVE-2024-7840.json) (`2024-10-10T15:15:15.237`)
- [CVE-2024-9156](CVE-2024/CVE-2024-91xx/CVE-2024-9156.json) (`2024-10-10T15:35:15.513`)
- [CVE-2024-9379](CVE-2024/CVE-2024-93xx/CVE-2024-9379.json) (`2024-10-10T15:53:20.427`)
- [CVE-2024-9380](CVE-2024/CVE-2024-93xx/CVE-2024-9380.json) (`2024-10-10T15:50:03.240`)
- [CVE-2024-9796](CVE-2024/CVE-2024-97xx/CVE-2024-9796.json) (`2024-10-10T15:35:16.310`)
- [CVE-2024-9798](CVE-2024/CVE-2024-97xx/CVE-2024-9798.json) (`2024-10-10T15:35:16.493`)
- [CVE-2024-9802](CVE-2024/CVE-2024-98xx/CVE-2024-9802.json) (`2024-10-10T15:35:17.230`)
- [CVE-2023-49262](CVE-2023/CVE-2023-492xx/CVE-2023-49262.json) (`2024-10-10T16:15:06.893`)
- [CVE-2023-5378](CVE-2023/CVE-2023-53xx/CVE-2023-5378.json) (`2024-10-10T16:15:07.540`)
- [CVE-2023-6551](CVE-2023/CVE-2023-65xx/CVE-2023-6551.json) (`2024-10-10T16:15:07.720`)
- [CVE-2023-6998](CVE-2023/CVE-2023-69xx/CVE-2023-6998.json) (`2024-10-10T16:15:07.850`)
- [CVE-2024-0864](CVE-2024/CVE-2024-08xx/CVE-2024-0864.json) (`2024-10-10T16:15:07.990`)
- [CVE-2024-1604](CVE-2024/CVE-2024-16xx/CVE-2024-1604.json) (`2024-10-10T16:15:08.103`)
- [CVE-2024-1605](CVE-2024/CVE-2024-16xx/CVE-2024-1605.json) (`2024-10-10T16:15:08.220`)
- [CVE-2024-2759](CVE-2024/CVE-2024-27xx/CVE-2024-2759.json) (`2024-10-10T16:15:08.360`)
- [CVE-2024-3462](CVE-2024/CVE-2024-34xx/CVE-2024-3462.json) (`2024-10-10T16:15:08.497`)
- [CVE-2024-35202](CVE-2024/CVE-2024-352xx/CVE-2024-35202.json) (`2024-10-10T16:35:11.390`)
- [CVE-2024-35687](CVE-2024/CVE-2024-356xx/CVE-2024-35687.json) (`2024-10-10T16:59:04.827`)
- [CVE-2024-41817](CVE-2024/CVE-2024-418xx/CVE-2024-41817.json) (`2024-10-10T17:25:47.637`)
- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2024-10-10T17:57:00.267`)
- [CVE-2024-44958](CVE-2024/CVE-2024-449xx/CVE-2024-44958.json) (`2024-10-10T17:56:24.467`)
- [CVE-2024-44959](CVE-2024/CVE-2024-449xx/CVE-2024-44959.json) (`2024-10-10T17:54:07.960`)
- [CVE-2024-44976](CVE-2024/CVE-2024-449xx/CVE-2024-44976.json) (`2024-10-10T17:50:14.863`)
- [CVE-2024-44977](CVE-2024/CVE-2024-449xx/CVE-2024-44977.json) (`2024-10-10T17:47:59.593`)
- [CVE-2024-44979](CVE-2024/CVE-2024-449xx/CVE-2024-44979.json) (`2024-10-10T17:44:36.417`)
- [CVE-2024-44980](CVE-2024/CVE-2024-449xx/CVE-2024-44980.json) (`2024-10-10T17:42:53.433`)
- [CVE-2024-44982](CVE-2024/CVE-2024-449xx/CVE-2024-44982.json) (`2024-10-10T17:09:54.350`)
- [CVE-2024-44984](CVE-2024/CVE-2024-449xx/CVE-2024-44984.json) (`2024-10-10T16:48:56.167`)
- [CVE-2024-44988](CVE-2024/CVE-2024-449xx/CVE-2024-44988.json) (`2024-10-10T16:44:14.767`)
- [CVE-2024-4748](CVE-2024/CVE-2024-47xx/CVE-2024-4748.json) (`2024-10-10T16:15:08.630`)
- [CVE-2024-7265](CVE-2024/CVE-2024-72xx/CVE-2024-7265.json) (`2024-10-10T16:15:08.763`)
- [CVE-2024-7266](CVE-2024/CVE-2024-72xx/CVE-2024-7266.json) (`2024-10-10T16:15:08.910`)
## Download and Usage

View File

@ -53307,7 +53307,7 @@ CVE-2012-1657,0,0,7462e3b7f0f867320cd68c6bbb80948d5e6dba653da622e7160eff7e5f62ef
CVE-2012-1658,0,0,560e2e981abfe6f659323e61516988fffb3a37e7b67c4bef344d1bfc4a28d4bc,2017-08-29T01:31:21.197000
CVE-2012-1659,0,0,639034ca9f07c790ac2ef492bd5f3a40aa5601fef1156b2207387f576c231b4a,2017-08-29T01:31:21.257000
CVE-2012-1660,0,0,1a1fdc233e49b7e2a63c3ad5e101484443bfa62fa3d16cbf9d941cdc05dda569,2017-08-29T01:31:21.320000
CVE-2012-1661,0,1,66338164131b46ea4354bd8bab41e9b1d37f24f7e8888b9af6e1fe51fb8593c3,2024-10-10T14:30:09.217000
CVE-2012-1661,0,0,66338164131b46ea4354bd8bab41e9b1d37f24f7e8888b9af6e1fe51fb8593c3,2024-10-10T14:30:09.217000
CVE-2012-1662,0,0,2df8f900483fdb6e6d54cec6aaac270e11c4a2838e3af3b4f9303c89b71d90cd,2021-04-07T18:14:30.630000
CVE-2012-1663,0,0,00d8eac9ff6a370e8741d1cbc49fe92781178c0b399b9b789308565363c2dce3,2017-08-29T01:31:21.397000
CVE-2012-1664,0,0,e390080a910fcded0c4e326becb2176e4d6c58ba3c30d9da61282ae32886d178,2015-05-21T16:53:13.197000
@ -170947,9 +170947,9 @@ CVE-2021-25087,0,0,19e5de177e018eddf6d5a6875036f53b78d429deae8efad633fa9b91298bb
CVE-2021-25088,0,0,bee661c44eb6e65b60a9fe52fbaf1b4775a92328a5411f570fc6063c67f7c58f,2022-06-30T14:24:30.540000
CVE-2021-25089,0,0,05895cbf1b9443f106297e5a92634828df29f4af7bea5d81a44de2796a1dcd7d,2022-02-04T18:01:22.500000
CVE-2021-25090,0,0,26860aa3f36d9e491890e7d184049cf51fe3e428cd51d8077cad8e49275b8957,2022-04-15T17:47:52.203000
CVE-2021-25091,0,0,8ab61558c876a955213e335796d5d7be0ae5efdbb0c673d958c977de226322bd,2022-02-04T17:59:29.353000
CVE-2021-25092,0,0,ada9520ab536c9631c83fa4029cc9dab45890fe7e3c82abcb19c89de72dd4b73,2022-02-04T17:58:33.397000
CVE-2021-25093,0,0,12b229ebecfdba5f06c6486fc8f629462148536eee8d9d87023e6e9c531821de,2022-02-04T17:57:27.240000
CVE-2021-25091,0,1,8f745090ccc214dd2d75ed946d82ed1b8ab0a89279191b5a9c71a893e0773959,2024-10-10T16:59:04.827000
CVE-2021-25092,0,1,7208f7393a679602468fe51538ce3b460fd0f12c45d7cc136ad2af27660acbff,2024-10-10T16:59:04.827000
CVE-2021-25093,0,1,c497c0cbefa1ee70d7e5d10f8442a98df74e697472aa9c3039a2ca06c18921f7,2024-10-10T16:59:04.827000
CVE-2021-25094,0,0,dd533dc3cc92acef1f59bb6a4350acbdf9cca7aaabbf023b4f276daed6440190,2022-11-09T21:26:14.653000
CVE-2021-25095,0,0,8c78162e663a846060fb12d9533a13fc81591ecca36fca2f037661d2c2237d5e,2022-12-09T18:55:26.423000
CVE-2021-25096,0,0,fd5053d87489fe09b1d48cb8e7c1b0f4ca149e5e22ee43ef2fa1caa855f416a6,2022-02-10T22:07:50.717000
@ -181126,12 +181126,12 @@ CVE-2021-39114,0,0,91bb300b928a2e7c1d42863cf149e080ec34fb17bb3f12f372376e10a70a3
CVE-2021-39115,0,0,3edadea3bb79510465312b5ed43b357dd9837c0ef0dbf8d050d2cfbe35d4b421,2022-04-25T18:16:18.227000
CVE-2021-39116,0,0,a42315d93d2fd10c554b2c15934daf6b946942b74ba2ba4fbf662199cd5b29b6,2022-03-28T16:18:14.047000
CVE-2021-39117,0,0,0f5bdd3a21f39c9eaa09674f49f313b346bf46d979c65d077a542c986dc638e1,2021-09-02T02:41:23.137000
CVE-2021-39118,0,0,cfa44fb973040235d1d403e0d891bd636533414b5cf18b31edbab2917bfa225e,2022-06-28T14:11:45.273000
CVE-2021-39118,0,1,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000
CVE-2021-39119,0,0,19d82c9ad15e2315e337669b0ea8aa57ac063c6e8f2ab13ad8070419810cfcfb,2022-07-12T17:42:04.277000
CVE-2021-3912,0,0,e8c5a6132b4c804f3ef396cb77b6bb9032c86570b20db73e367107d41f114ccb,2022-08-09T14:39:02.117000
CVE-2021-39121,0,0,633d5656fffda0e45c49d4bc8d151e90cce078ce60d3d369ea3f30579930e1fe,2022-03-30T13:29:49.280000
CVE-2021-39122,0,0,c9981cfb918b68d6a12602ba73c7b1acc25021219d3d022a55745d72255b54c2,2022-03-30T13:29:19.573000
CVE-2021-39123,0,0,d0e4c2c03b72a02ecdb7525c0e326d6b0d96a344de7caa87bc9349453372cd09,2022-07-12T17:42:04.277000
CVE-2021-39122,0,1,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000
CVE-2021-39123,0,1,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8aa41,2024-10-10T16:35:02.213000
CVE-2021-39124,0,0,2b58fd447d3cafa91334dabd9357b993b27ae7c16f1985b8ba8afc2558c4088b,2022-02-24T20:18:49.327000
CVE-2021-39125,0,0,4c8f1895e82d1bcd913a7b42e9a1b5d82429da426af796f023bfb884e96ba7ec,2024-10-09T17:35:02.380000
CVE-2021-39126,0,0,c5fcfc69aba84d73b9f8c74c936a36d81151cadeddc7fa2ff49085a699b83f32,2022-04-15T15:29:12.737000
@ -182959,11 +182959,11 @@ CVE-2021-41305,0,0,c1ebdde2379fe23f7c43787afa73694bb283be765dba75893d579667592b2
CVE-2021-41306,0,0,912f08e64dfad95775b944cdd17d5dcacfb984ff7bca32afcb0eb812044cdcd8,2024-10-09T19:35:03.473000
CVE-2021-41307,0,0,0a85ebb78eaec36b97ea96c5ebf64a13b26ac00f0999ce8b9b238c2a8e6940a0,2024-10-09T20:35:10.230000
CVE-2021-41308,0,0,cfb1dc84f95dca98ea9db01ce0a047c8488867d52c4b6bc7f5724969a80a8bbf,2022-08-09T13:41:02.947000
CVE-2021-41309,0,1,fee479a78a1c80a72f60651ae579f48966cd2679824b48142d9357149133ff0f,2024-10-10T14:35:00.837000
CVE-2021-41309,0,0,fee479a78a1c80a72f60651ae579f48966cd2679824b48142d9357149133ff0f,2024-10-10T14:35:00.837000
CVE-2021-4131,0,0,4f7d3ba062434f9f457c9b2673730333ccdd0b0deef79cfedad8ece588fede90,2021-12-21T16:21:10.787000
CVE-2021-41310,0,0,96a7f0a3af760e8f782bf236d4bd2025e990ab72c1279bf78211c5c1341dae3b,2021-11-02T23:18:16.800000
CVE-2021-41311,0,1,30b5666aaf7fa18e235a6c4a31a81b554087c89780d14cf889a0806be2cf0aab,2024-10-10T14:35:01.190000
CVE-2021-41312,0,1,af076cb36001433ceb795978d5ff9824bf782e6b6e21a0e85f212ff3ecc365d8,2024-10-10T14:35:01.433000
CVE-2021-41311,0,0,30b5666aaf7fa18e235a6c4a31a81b554087c89780d14cf889a0806be2cf0aab,2024-10-10T14:35:01.190000
CVE-2021-41312,0,0,af076cb36001433ceb795978d5ff9824bf782e6b6e21a0e85f212ff3ecc365d8,2024-10-10T14:35:01.433000
CVE-2021-41313,0,0,89518e64ebac158fccd8f0ec7ad9d346b2cab73157d62d14e442a26c59a1ba1f,2022-11-16T16:47:19.750000
CVE-2021-41314,0,0,d0c32eb2851d45bc9d6d482f4132febadf03b787704b8a0463c1bd6590a848a3,2022-07-12T17:42:04.277000
CVE-2021-41315,0,0,46ac4fa176eeab97f0a56e95ed804ddf838df2e8377c475a7840f718a2c08010,2021-09-30T18:04:07.720000
@ -201474,7 +201474,7 @@ CVE-2022-34307,0,0,338b12c62bad2e4a0eda57b50a8ad27206a92d39c87953a6bab08cfde445d
CVE-2022-34308,0,0,72517e273cfc874b53e7020837bf9b331677635584e6cd68de357af3c120f8a1,2022-10-08T13:18:23.537000
CVE-2022-34309,0,0,e3adf5645c12963bf66511008bf8bd0d2b48b61c9b9629d499565330aa17f93b,2024-04-30T20:18:51.433000
CVE-2022-3431,0,0,89e3567eb73930c489cbcd122cdece28404497e84a1ec23a14bda2eca382111b,2023-10-14T02:23:44.330000
CVE-2022-34310,0,1,e44de1dfbb26090f018ee65abbb9b72048b08e3a391acdea756403f47e41c066,2024-10-10T15:12:13.673000
CVE-2022-34310,0,0,e44de1dfbb26090f018ee65abbb9b72048b08e3a391acdea756403f47e41c066,2024-10-10T15:12:13.673000
CVE-2022-34311,0,0,dee5018313c173aed72aa543a5661071e95212d1d53651caec216af2b2bc4a40,2024-04-30T20:19:51.123000
CVE-2022-34312,0,0,45e301dcc5a66dca95afd271cbf450e3989352cef5ff9b783b89d2260ac5226d,2023-11-07T03:48:31.727000
CVE-2022-34313,0,0,0d9ec88dde84ebfeeb30e977159987301d9ce4d0596cedcaa54b9f8d5721f8f5,2023-11-07T03:48:31.813000
@ -205045,7 +205045,7 @@ CVE-2022-38708,0,0,781d609c9b3dc891552143ee435ef3e063fbe0b877a671a9cf817c94de5c1
CVE-2022-38709,0,0,7f3077c38854304042150d1d1a1c927d058013bb127b4d8270511cb4e453573a,2022-10-14T20:30:32.833000
CVE-2022-38710,0,0,76541b99bab0b9f82be0ed5eea11d8d59857d4fa70130aa00483a9682faa2549,2024-09-21T10:15:03.890000
CVE-2022-38712,0,0,efacb8e6b7af22915dcaad88def28008695f8ac120f0459e05383852abad5aa2,2022-11-04T15:16:45.807000
CVE-2022-38714,0,1,b087b6a47c12b13cdb4852a0efc0b2a50238e6b6dcdd99138053137a8b014ae6,2024-10-10T15:32:29.487000
CVE-2022-38714,0,0,b087b6a47c12b13cdb4852a0efc0b2a50238e6b6dcdd99138053137a8b014ae6,2024-10-10T15:32:29.487000
CVE-2022-38715,0,0,560f03ba50c9656a0b9b0e7f82b2ddc7a737af875f6c233628cc6ad5be254d04,2023-02-02T17:22:07.650000
CVE-2022-38716,0,0,74a54fb7cac47160e4bdc1cedc02000c796dd4aa4d33ffecd45836a7c084fcde,2023-05-31T22:47:16.617000
CVE-2022-3872,0,0,20d26b63a749ce414bf0c9834ab95bc6bbb3f61b07fb6dd62cd2285487e4b53f,2023-02-23T01:35:36.783000
@ -207577,7 +207577,7 @@ CVE-2022-41986,0,0,ee6e9ef066ba8c5459920520ed62fd3d1ecc23c4fd518353f99769eb13ab0
CVE-2022-41987,0,0,973b71f1dab2e2d56c71d687723d5c44031c8553347583b75d1661405fd6e442,2023-05-31T22:47:06.207000
CVE-2022-41988,0,0,d84d73f7ebcefc94a40d46de0942ff010bc2553936ab9fef99b206cfa4aec137,2023-05-30T06:15:24.370000
CVE-2022-41989,0,0,3ac83e6f430f25af669f4a1c5f38227f6c1e7b17a93a5ca5588faf3f237ae764,2023-11-07T03:53:11.200000
CVE-2022-4199,0,0,57559eaec31cf26247d4965947c5296286c4e093c8523b3302c651ffa4b0899a,2023-11-07T03:57:09.600000
CVE-2022-4199,0,1,e8ddc903285ebf1515513113098cbd32df397061ee6caf54c2302be597b7fb65,2024-10-10T16:59:04.827000
CVE-2022-41990,0,0,9034b3c666ccb8516dcb1cb446205c1217b17de23ff758726eeef9b5ab2a0cb9,2024-01-24T18:44:19.600000
CVE-2022-41991,0,0,59d444d31b0a538de290798d8cadedf1819a417ebd6154c3e1e4a9a386d6b539,2023-02-06T17:28:53.793000
CVE-2022-41992,0,0,baf225fe84f3f52e61816c353969d1e421b989ba6be07e7177d1f64b7bd91e9f,2022-12-22T13:08:10.897000
@ -214051,9 +214051,9 @@ CVE-2023-1527,0,0,411c7303cc31b219dbc4b0b1ac6c22a4cc1b0fc4ef9b3f82d4c227bf7f99e2
CVE-2023-1528,0,0,e387f07573074221f041db6eeacc85aa0313ac61d91b40a13b2cd15641653801,2024-10-09T20:35:11.607000
CVE-2023-1529,0,0,36bd6fbb1379271480531ba27f51074b6cd8a2c529341f8b40cd549e18592c5e,2024-10-09T21:35:05.160000
CVE-2023-1530,0,0,c897a67b35ef59fc0789ea1e6d0edf196d92841fc8ae71b92d0755fc583a4847,2023-10-20T20:46:04.377000
CVE-2023-1531,0,1,036ad10166ac22c1be1b018401bc07be762a12cd0115c6e70b5b401bfd0970df,2024-10-10T15:35:04.080000
CVE-2023-1532,0,1,da644232e8e6a3c7226b6f08124ed64860d7accd8086d2921e6c9b615b9621b5,2024-10-10T15:35:04.993000
CVE-2023-1533,0,1,95f228fa5c0acf36a6c480b688f3431227fcbe5e2a77ebb583d60eb5b35f2092,2024-10-10T15:35:05.857000
CVE-2023-1531,0,0,036ad10166ac22c1be1b018401bc07be762a12cd0115c6e70b5b401bfd0970df,2024-10-10T15:35:04.080000
CVE-2023-1532,0,0,da644232e8e6a3c7226b6f08124ed64860d7accd8086d2921e6c9b615b9621b5,2024-10-10T15:35:04.993000
CVE-2023-1533,0,0,95f228fa5c0acf36a6c480b688f3431227fcbe5e2a77ebb583d60eb5b35f2092,2024-10-10T15:35:05.857000
CVE-2023-1534,0,0,b80725c73df1ac8a3dcd1b6e8d6743020ace19e1a3bdb33286a0bad76f802a0d,2024-10-08T19:35:02.020000
CVE-2023-1535,0,0,214759b8e86e348cd6647c94c0700582828ff171cf71df4f59fe7aa4cce2dd25,2023-03-23T15:48:17.870000
CVE-2023-1536,0,0,b22d4f13421f92a82c89ae0cf4f4854b334bce8624a31264b3cf078f3411544d,2023-03-23T15:13:25.773000
@ -215083,12 +215083,12 @@ CVE-2023-20823,0,0,e5030abbdc1b76a1fdf724e78a79e9447430af00d8598a10a707b12f48ab9
CVE-2023-20824,0,0,6caacf9d3f8a58027c0dab9caf4b9b264fdfa1d70dcd710a95edcc7d198dbed4,2023-09-07T19:06:55.563000
CVE-2023-20825,0,0,3b7e714e9925156ab37c943a82248f5bb6cc462ec9ffd9479518f0eaa72d4ea8,2023-09-07T19:14:16.880000
CVE-2023-20826,0,0,f19cc9ee6c42e884beea40f74b7dd27c757677880dca33965287532349a24c24,2023-09-07T19:13:15.787000
CVE-2023-20827,0,0,c94fd0a8a61a7bec88a90e4cd437026cd13fafbd7af82cb801d6797c805bfe54,2023-09-07T19:13:24.850000
CVE-2023-20828,0,0,ba8cf7ecdc8e2657806eb0ec453fabe867b6d584899270638f41072140f25560,2023-09-07T19:13:33.270000
CVE-2023-20829,0,0,f605265cfe43d6b952781ee95d910e3219955dd13bd4519307313420737cdcde,2023-09-07T19:07:12.237000
CVE-2023-20827,0,1,83bbd7748b521833d1c4e47e1d930c6efc13da73425f93940cd5870a89858ab8,2024-10-10T16:35:03.543000
CVE-2023-20828,0,1,f7fc852afc53227ebfac9ed12d8d9bf27249e792c863286dbe616fd7f942976d,2024-10-10T16:35:04.517000
CVE-2023-20829,0,1,dfa93302be3736a2d42f62642d511aa3a1c70f4594e227fe1b2a98e2c69bf4d9,2024-10-10T16:35:05.527000
CVE-2023-2083,0,0,cee4396e30e25258287b1e489d3bf3b3f1eef2f0033a51dfea6bffe2ec1286c2,2023-11-07T04:11:54.640000
CVE-2023-20830,0,0,4f22d2e02b9718a10b47922faf9dbc8103f5219e55234ab4196e259f48bdf194,2023-09-07T19:07:25.423000
CVE-2023-20831,0,0,43369e4a882734bb03e43eb27216eeac5a1c82e841f8246a44fad96b2d498c4b,2023-09-07T19:07:47.907000
CVE-2023-20830,0,1,6a02392b6a6fe91a83233632455d7b661d82c5d0733c61d40940a5da6781c68c,2024-10-10T16:35:07.153000
CVE-2023-20831,0,1,a7bd9cc2fd769f7a7f78cbf92dbd0df138f255abd6200025975d1d20633911f3,2024-10-10T16:35:08.083000
CVE-2023-20832,0,0,05c466968e672a55e813b676aa2e07e30bcd43922fbe2ea39969f9ca4c1ecc0c,2024-10-04T15:35:02.997000
CVE-2023-20833,0,0,0d4fbfbfcfca4b8d072b58089465cf19c7295168fffc28d5689dd850a4e87f39,2023-09-07T19:08:21.983000
CVE-2023-20834,0,0,2fa6eb5f722248d938b7f55db6fa9eb5c85a7a23b1dd1c297a61b4fbff51fb9d,2023-09-07T19:08:44.343000
@ -219117,6 +219117,7 @@ CVE-2023-25577,0,0,5ee92e0558fbce9bd773a8afe897565bfdaa982c0f4ad7e71e954409a79ac
CVE-2023-25578,0,0,a34c5a3bd74c9feff4c9c3173b48f4aebcbdb41926b496db508268725eb1d80a,2023-11-07T04:09:01.430000
CVE-2023-25579,0,0,a6c9e68a845dd568c2130b08183545a22df0a4df1e1473c0c5450b50e5f8d3f7,2023-03-03T15:09:20.680000
CVE-2023-2558,0,0,b36d9018fbad440af935b7a05f8181b9f5920728ee39953642c99c7cad89beda,2023-11-07T04:12:52.760000
CVE-2023-25581,1,1,579c0aad7d867cae9a73ee2c9d8422836a716e4fd5e18a78c07bdbbb7a948afa,2024-10-10T16:15:04.923000
CVE-2023-25582,0,0,232d943891f8f503b5ec3e85110e47e18b7fb6075027f0a7fcc0c9807f79fac9,2023-07-12T15:05:19.617000
CVE-2023-25583,0,0,90cb5ae4facc7427ba0ec7a3aba488de3ea49316450585c3a592993efe3ec3d7,2023-07-12T15:18:34.447000
CVE-2023-25584,0,0,28b5e4e1071105b09a7a0fe37c814dcf7b81d264417fa64df5b4f0851185a205,2024-02-23T18:51:09.787000
@ -219296,7 +219297,7 @@ CVE-2023-25769,0,0,198ca9c61d051c8c694de7cff750ffa8d39aeb715958a8ab2b3e781df2601
CVE-2023-25770,0,0,c196f3f59a9ed379f3033392f5332da695ce96226441cec597553d40d2c90803,2024-04-22T16:15:12.870000
CVE-2023-25771,0,0,0a40ade9e4b633e2e25c64b41412f6cf20b10475ee3b92ce849eec7e304b725e,2023-11-07T04:09:10.947000
CVE-2023-25772,0,0,a0a863d580e53f497e70eeff0d4bd28ff51b949ec7490c2b052c7aaa57fffae7,2023-11-07T04:09:11.190000
CVE-2023-25773,0,0,968a444d55ca3d983c15ddeda13597fed46940726ab0afc57332a75accb84113,2023-11-07T04:09:11.320000
CVE-2023-25773,0,1,c8a4a4c116ed5d896279b6cb93fadbf0a6a145a41b80291e643b9b92633bb181,2024-10-10T16:35:09.100000
CVE-2023-25774,0,0,50f00eb85c9a6f3939ad3ac3d2f8701f08cab7d7ec6691ef9981e83d63419194,2023-10-18T17:53:08.367000
CVE-2023-25775,0,0,9e0931d7bb83de9c26f9ad076dcda45420d6c5a1e995b56352243c3259380610,2024-01-11T21:15:10.030000
CVE-2023-25776,0,0,a5c9a6507e4e8061236842380ca8385e80281fc571d20401f84423392270b8fa,2023-11-07T04:09:11.693000
@ -219524,7 +219525,7 @@ CVE-2023-26022,0,0,e0cd395060def6af839f53ca17359e6fe07ff5b74e3efa90c2588e10aba9c
CVE-2023-26023,0,0,bf7f45eb43f656e5a2c0034397287ee8bde96ac526309a673ae112ef759ff9a6,2023-07-28T14:02:42.573000
CVE-2023-26024,0,0,db59bc89cdf9d3cbfb06338ac5b62513dd0547a1a4f051c439caafcace4d191b,2023-12-06T18:51:10.323000
CVE-2023-26026,0,0,9d4fc8ae77db69c6c04dc4dd3fae29dc591b099947fecb438ca71d1c94800582,2023-07-28T16:36:20.187000
CVE-2023-2603,0,0,5c2edc4b230ab73934fa6df5aaecfabf8f1a7178b4f82823ba1cf427aa43726d,2023-11-30T05:15:08.800000
CVE-2023-2603,0,1,4a60df169eea5dff83ba6df411dcf1103a34959027fdc74feb414d60c9098ed0,2024-10-10T16:32:56.777000
CVE-2023-26031,0,0,3c1225c9f1cc3a824a50548b415ab5a795739af789c2ff216b590967c4819438,2024-08-01T13:43:31.307000
CVE-2023-26032,0,0,73f981053207ef66bd42c47f91689994979ec8c8290fe7f9acad2a7d7aba765e,2023-11-07T04:09:17.300000
CVE-2023-26033,0,0,e9bef52edabfb15f3fd145610458b9c83a92e0d7fa6697fbaccc32ad54c639c0,2023-03-06T18:54:30.003000
@ -225220,7 +225221,7 @@ CVE-2023-33228,0,0,29dfa574b2b575cb97b8521ab674749b0aaabf351bed111232835624b22ef
CVE-2023-33229,0,0,81aa6f0cf7582dea8ca19016be9f8618ad64ab056bc36c3dda2d2769bc9139e9,2023-10-30T19:42:24.257000
CVE-2023-3323,0,0,5d041b778bd7002c0102efc1a53874ba30ce5ef86cf602c08c6258cba09747a1,2023-08-01T21:07:23.737000
CVE-2023-33231,0,0,09f86d8066d74c7874dbea9cc2ad06aac59a2df7122675bfda30672a291d4916,2023-08-03T21:15:14.363000
CVE-2023-33234,0,1,8c3bc362e58c079b32d4a0791724c2c1cfa09349b40fca7b2ef6d10dc4db9437,2024-10-10T15:35:07.983000
CVE-2023-33234,0,0,8c3bc362e58c079b32d4a0791724c2c1cfa09349b40fca7b2ef6d10dc4db9437,2024-10-10T15:35:07.983000
CVE-2023-33235,0,0,98d0a7eb19704063a78a382792254db430678a754513fb8bc0821026290e2114,2023-05-30T19:43:02.460000
CVE-2023-33236,0,0,4f9a68681c8de805fc0155196f19f195d6dec29aeda4ac774c34b5b3dd85bcb0,2023-05-30T19:29:08.573000
CVE-2023-33237,0,0,fc0463edc62e3d49a47d812193c4e183bc8b4a3e3b302f50593f49aa3aecc82b,2023-08-22T19:10:04.453000
@ -229777,18 +229778,18 @@ CVE-2023-39377,0,0,4d90b5eceb5f584a241485f97a12c8816a725103cea0b53b1c41a09576d3f
CVE-2023-39378,0,0,818da8692480b8c7f857fbaca678d0fbcd2ffcc1a3ac48218812fd2c104c191f,2023-09-27T18:42:38.813000
CVE-2023-39379,0,0,9f7e46dc100d810b1be2f3ea55a8f0b45783194c8729b6823b66663af22f9544,2023-08-09T12:25:04.040000
CVE-2023-3938,0,0,f544e7fbbebcf5018c1b842c359ba6f67f61f2e97528d09d37e4a4e3af4bc755,2024-05-21T12:37:59.687000
CVE-2023-39380,0,1,047b870c1c6a5f603bffc321511ef6dfcdaf2e90e62bd0b06e976e05199b8938,2024-10-10T15:35:08.920000
CVE-2023-39381,0,1,f9e170096e19507dba0831067a70cc22b32c49554118b7d309552ebd9585b3cb,2024-10-10T15:35:09.677000
CVE-2023-39382,0,1,ef374e3a047ffd506cbacd3151b796fb42de4901d3595cbfb0100754bf1c61d8,2024-10-10T15:35:10.383000
CVE-2023-39380,0,0,047b870c1c6a5f603bffc321511ef6dfcdaf2e90e62bd0b06e976e05199b8938,2024-10-10T15:35:08.920000
CVE-2023-39381,0,0,f9e170096e19507dba0831067a70cc22b32c49554118b7d309552ebd9585b3cb,2024-10-10T15:35:09.677000
CVE-2023-39382,0,0,ef374e3a047ffd506cbacd3151b796fb42de4901d3595cbfb0100754bf1c61d8,2024-10-10T15:35:10.383000
CVE-2023-39383,0,0,36b9d7ae7f9f63d22ead28158ce2dee347df00226f00b7bbb7f386995f234aa2,2023-08-17T02:20:13.110000
CVE-2023-39384,0,0,83515c704dc94d04e5e09da684d8584ccbdbe5913247a79d2f20db217d2c5e0d,2023-08-17T14:22:55.907000
CVE-2023-39385,0,0,5d2ae7e7bf9faaee9636f81726672dd8ae0435204c2dbb924972e6274c2b9969,2023-08-17T19:51:42.627000
CVE-2023-39386,0,1,82cf70710c69e5b5f29f1a4103c38e910da8ad89c04b0f4f6486fe7104e5fef3,2024-10-10T14:35:03.147000
CVE-2023-39386,0,0,82cf70710c69e5b5f29f1a4103c38e910da8ad89c04b0f4f6486fe7104e5fef3,2024-10-10T14:35:03.147000
CVE-2023-39387,0,0,1c057d6dcb781a1d30a44046fe206c3ec5b28a34b88028371661a459104c041f,2023-08-17T19:18:15.017000
CVE-2023-39388,0,1,f6c4adf2f7caa39346a0676cf7f3d545ac7ada60da83fe18d59a2ac44a2d51b4,2024-10-10T15:35:11.660000
CVE-2023-39389,0,1,76cc1a9013364c3a6427f4c7f1dfbbabf00045b11864910abaf4e61ef5462d54,2024-10-10T15:35:12.470000
CVE-2023-39388,0,0,f6c4adf2f7caa39346a0676cf7f3d545ac7ada60da83fe18d59a2ac44a2d51b4,2024-10-10T15:35:11.660000
CVE-2023-39389,0,0,76cc1a9013364c3a6427f4c7f1dfbbabf00045b11864910abaf4e61ef5462d54,2024-10-10T15:35:12.470000
CVE-2023-3939,0,0,25163a15e80808af2e68687cc6739d321eac4c9f550e324911c55f31802ef947,2024-05-21T12:37:59.687000
CVE-2023-39390,0,1,3529adcfb60695d777c24c1b1bd700c2ceff9bad9e16d21a2aa6ff3d4655f750,2024-10-10T14:35:04.077000
CVE-2023-39390,0,0,3529adcfb60695d777c24c1b1bd700c2ceff9bad9e16d21a2aa6ff3d4655f750,2024-10-10T14:35:04.077000
CVE-2023-39391,0,0,6618314ce18d355699f4f6da6666e67387a841860a731781dd72cc555ed84b3f,2023-08-17T14:01:09.233000
CVE-2023-39392,0,0,7a7d0aa31e3d4745cf3a480630de77fdcf37a29b05186be7db2d99c232791b0f,2023-08-17T13:49:52.153000
CVE-2023-39393,0,0,3b1b8de3eb296c24b3e2a3b4f84bc94a593e07f4cf00e538dbed9ca658cbf397,2023-08-17T14:27:23.250000
@ -231956,9 +231957,9 @@ CVE-2023-42130,0,0,0241b38800c234ec8e4a2ff16f40e83d68c56ec86a9b4257cd78b46e40a43
CVE-2023-42131,0,0,4e0f01a335565af1d2caffbcb3515b0a5bc3abdb5520eb1e67adabde374601fe,2024-09-18T19:15:36.553000
CVE-2023-42132,0,0,b3614605e58c2ad6bb3381e3dd9a9ae21953bc0309c61010e3af35ddfe93114f,2023-10-03T20:56:24.067000
CVE-2023-42134,0,0,4ee57071d16fbebb2fd73b2c73a537f320f9d80ad77a4c87162327571d527be7,2024-01-19T16:14:39.460000
CVE-2023-42135,0,0,821bba39ae16d97a24fd2a276b98c40666b66d2f666e958c2c85468b96464bbb,2024-01-19T15:47:29.607000
CVE-2023-42136,0,0,731b0a7c0949a03c1da38a3e04556cc9f668abccfe65e5570c44682bb8657447,2024-01-19T16:19:25.047000
CVE-2023-42137,0,0,8d8e84e081d27b7ad13a4ab4bcb8b03f542a6ac7c3dbb364cd003b7e7bd81d89,2024-01-19T16:21:06.650000
CVE-2023-42135,0,1,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000
CVE-2023-42136,0,1,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000
CVE-2023-42137,0,1,c966cfe4f9f72b0b343b6e5bc55f130bed0f505de6f9e1585674a3d65dbc321f,2024-10-10T16:15:06.090000
CVE-2023-42138,0,0,229b19fe75a25194eeeceeed8dd7d2cb66ba39737de630ef3ead70362964246b,2023-10-18T19:57:05.243000
CVE-2023-4214,0,0,819da04ab354ee39aabca649e2dd617af7bc8556f065736471274ad51ec00604,2023-11-25T02:12:54.557000
CVE-2023-42143,0,0,6c09d38ca58ec27b89dd2edb91a7d385bfff81e0d5504c4d608be4afbef841ea,2024-01-31T16:57:18.603000
@ -234031,7 +234032,7 @@ CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694
CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000
CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000
CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000
CVE-2023-4537,0,0,d55e9c2ec2d6a309b7146da78217b22dabb54a472777f14cd37d2689a428a754,2024-02-15T14:28:31.380000
CVE-2023-4537,0,1,eea3b8def9553f8b072fdf468cb4f4f9b040c5e8850ac6668a829484a8fdd935,2024-10-10T16:15:06.990000
CVE-2023-45370,0,0,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000
CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000
CVE-2023-45372,0,0,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000
@ -234056,7 +234057,7 @@ CVE-2023-45391,0,0,9c0fd5516832886de6f7034699893261e3bea437e0ea5d4edc791da17fd46
CVE-2023-45393,0,0,c1fb02f3a6040b11d75e76a87aac1d917a2141d0d313b00964f7b7e953d37259,2023-10-20T17:09:10.553000
CVE-2023-45394,0,0,a4b4f063ff375dd7ab74a1a8d1c641e98ad0cb4a4cc340067fe632ab3db64424,2023-10-30T15:29:24.470000
CVE-2023-45396,0,0,a9c3245ef3981c277f6e35bb37ce5839a8934f2abfbc3e4742e599437dabb487,2023-11-07T04:21:45.490000
CVE-2023-4540,0,0,df2b36fedeae1630c51e74f166d14d09eb3f5b86dabb1d9ce3dc74aa1fbaf07d,2023-10-13T01:30:13.930000
CVE-2023-4540,0,1,454dcfbbb42131d02ef2de39e6b50d769b0e902beec03a837e810055e3fa53c4,2024-10-10T16:15:07.110000
CVE-2023-4541,0,0,e6c5b595e1802a5ff24ab31b4fe094c0626b7d35f33552e6362bd8cefaa24697,2024-01-08T18:49:41.183000
CVE-2023-4542,0,0,08b69d675d8a1c1e0ff7f35c28444e73725292dffb22cba8268ef60d8afdb0cd,2024-05-17T02:31:38.280000
CVE-2023-4543,0,0,dc1ba3a33cff31b8fca78e8cb21ccb021964ab63d67083a56dc6088e7b3319cb,2024-05-17T02:31:38.390000
@ -234536,7 +234537,7 @@ CVE-2023-46116,0,0,32b4d7ad1ade33016b0db1435d5658983da94db4596e866b4681196d84a04
CVE-2023-46117,0,0,121f23ec03c8bfaf7add309657ccc2b1ffeb80e620568dd23fbae288673558b3,2023-10-28T03:48:19.117000
CVE-2023-46118,0,0,2aa54fb6f1645b23b925b0febacb85bd2e2906b6fd47ae5d3d57a7dea4fa70d4,2023-12-14T01:15:08.103000
CVE-2023-46119,0,0,188517dc1713ce67d106802c5ad12899f4256143eda10dbeb48b8cf0d28ac511,2023-11-01T17:09:01.520000
CVE-2023-4612,0,0,a56ecda2c721d482fb9dd7cace991defff2fedc13314a40cf8df8c687c46ec72,2023-11-17T17:42:18.630000
CVE-2023-4612,0,1,01d7a15f58bf2babc855c5767a299377da4c90f0f3df23aa6271c6ffec670599,2024-10-10T16:15:07.260000
CVE-2023-46120,0,0,6e468d84efc420bb6523b981da81618dcba67cf9ae9e183627575d464dc63c85,2023-11-01T16:42:03.003000
CVE-2023-46121,0,0,b7e0c927c4dcd3e846e6bd7603e2bace09835d7b7a24801aa9322bb54baaa1f8,2023-11-22T15:05:37.027000
CVE-2023-46122,0,0,77ece346cd29f8df5fbc9b6dc7a110d1754062db3ff45e353933b3597d9c5458,2023-10-31T14:52:24.573000
@ -235947,7 +235948,7 @@ CVE-2023-4817,0,0,66b9317b8b341b3c6f85e7870e90748e4d6a86dfea30b64fc5b4019933f60d
CVE-2023-48171,0,0,6326cb8d81d428a9f4381270fc2ce963d0ad0058312b77c3d694b3258e3a7cbb,2024-09-18T18:54:08.080000
CVE-2023-48172,0,0,0e78c6c737f4aa94c295f39e3b2f6c04b05dd97deb3b6a7475ffc20424f8ee86,2023-12-09T04:46:27.490000
CVE-2023-48176,0,0,5229479ea70d793012d98b28f5832b18c29ca0585926ac2e2e1991c088531620,2023-11-30T20:21:54.850000
CVE-2023-4818,0,0,c99fef0e43e54a7e397a1f19b3703f45e3876ee2d790b03b384938f06570625f,2024-01-19T16:35:49.683000
CVE-2023-4818,0,1,c9f685e7feb9907c1838dc5c22479dcdaf800947aa0e477285b5b32cee6e423c,2024-10-10T16:15:07.403000
CVE-2023-48183,0,0,e30177454f59bb0f06584d26feaa9f110fa0ec2af3bd7711cda6932b65226702,2024-07-03T01:42:18.010000
CVE-2023-48184,0,0,2a3c5af64fd53e932537ccff83557b108ba1700dbb22cbbe968d9532a829a3fb,2024-07-03T01:42:18.813000
CVE-2023-48185,0,0,fb1a8a21d098ed36db5f2ffae494f226b32c201c926520d79e5da8af6f3638dd,2023-12-02T00:21:40.093000
@ -236695,7 +236696,7 @@ CVE-2023-49060,0,0,0f125d0d07dbe270a6f07b57aa641d1848f31c22fb855ca4bf11b4d5b4ef2
CVE-2023-49061,0,0,dc7136ec78ed5cf0b1889d9e499076dc7861b57a74e858b10a634425002df41f,2023-11-28T19:45:33.650000
CVE-2023-49062,0,0,1d72476c88fb45368b58247aec1688b0093de275b1093249720b62193de89ed0,2023-12-04T19:46:20.953000
CVE-2023-49068,0,0,182c6949abe2a827480e4301e5ed188cb126ad03424cd6905a2140b6a730140b,2023-12-01T13:53:23.050000
CVE-2023-49069,0,1,d362233b8da3a6077c74a42f30d3dece5a08fdd053ad1fb23fa4128a346b7f8a,2024-10-10T15:15:14.937000
CVE-2023-49069,0,0,d362233b8da3a6077c74a42f30d3dece5a08fdd053ad1fb23fa4128a346b7f8a,2024-10-10T15:15:14.937000
CVE-2023-4907,0,0,ee7fec7a11df58ff005b9b63ad49a50bb70f5f4e575258375cd0f49a03cc2ad7,2024-01-31T17:15:17.750000
CVE-2023-49070,0,0,631766166232ba486ccd48cb00f4afe564eec8aa0b473067715b1f04d1a8cd4e,2023-12-29T18:15:39.103000
CVE-2023-49073,0,0,2a69c4407ae45adf60baf11d8aa993141dc3f78b1f8dc71c70987fff6214c4d6,2024-07-11T16:00:30.427000
@ -236867,14 +236868,14 @@ CVE-2023-49252,0,0,6696676ea138bbbe3898a0462d8349d55e4aa53c82758205c6683cad9207a
CVE-2023-49253,0,0,39190be26437367f0cb128dcd19588699a00c78d11d0cabd94b801e94a74f9b6,2024-01-18T21:14:22.820000
CVE-2023-49254,0,0,f34419f08bdce6ccb5f0124295abfdffd452c9485f4a1c06bc7fd8b241598e11,2024-01-18T21:14:11.877000
CVE-2023-49255,0,0,bc83c3f00ff6ea1845ee64d5acf6a80c765b032e9814e7dcd665e4aa5a04acbc,2024-01-19T02:11:57.800000
CVE-2023-49256,0,0,e3bc35420a35cf0a0a8b6dc3869c6abf5ae01099f2f89963f2fa6ec1fc60fd1f,2024-01-18T21:14:03.490000
CVE-2023-49257,0,0,16d5106ac327700aa753d1b6d02c16f740e7dddd3031e69142bde57143428f01,2024-01-18T21:13:51.623000
CVE-2023-49256,0,1,1fe21d50c5e8b0fde1b1aeab802f4db220d1674b9d434fbf5d6ee24127c69ec7,2024-10-10T16:15:06.313000
CVE-2023-49257,0,1,c31f878e5552c04f8a82115b35872a15a6ed05c684d69a1210e2832df83e342b,2024-10-10T16:15:06.553000
CVE-2023-49258,0,0,a15e9f4b25aa211e384ddcd9096065a9180748cd045a91be89f41ec1efaa7319,2024-01-18T20:38:29.220000
CVE-2023-49259,0,0,6924dfc81c2a6023f175e888f5718d5b4f1102a144570e76ad875ec2457c6878,2024-01-18T20:33:22.163000
CVE-2023-49259,0,1,ec3adc3a7840a7661f1b002dec4a07aa624dd034829c5b4ec8b6632211624a03,2024-10-10T16:15:06.680000
CVE-2023-4926,0,0,f04445011a7b61f0239196a2a3d2a11a7cfa48d9f67d70f794613b5affd23cb6,2023-11-07T04:23:10.633000
CVE-2023-49260,0,0,eacaa360b74b478231fd0a67d27793e1aa2a71bc28ed6337e23a0f3affc2630c,2024-01-18T20:22:01.957000
CVE-2023-49261,0,0,bb95820a1bbf7731e6ea6579ba6cdd3005ad5561f41805c8edcf0828900fdcd0,2024-09-04T20:35:12.553000
CVE-2023-49262,0,0,be77953338847c472ae3266454952ff76c6c345f7ce213da5b94760693e5af8f,2024-01-19T02:11:40.757000
CVE-2023-49261,0,1,ab12768ceb84db446d13551e51716c39b487b5e822d367a966090eb33f0ba06c,2024-10-10T16:15:06.787000
CVE-2023-49262,0,1,274063e158f489d41be2d722570f9ed9c17604ee5dffa76726e2ba1ea7a07b0e,2024-10-10T16:15:06.893000
CVE-2023-49269,0,0,028a4e58082cf4ef8da9a9e284540f563d62594be00f2afffe30cf24bc0b64ca,2023-12-27T17:17:44.617000
CVE-2023-49270,0,0,b9649fb168337300fb031c39ff29926d549e641e684c52d7e7ff666ecb63d06e,2023-12-26T21:41:07.910000
CVE-2023-49271,0,0,b7b5bb763871877cb1dd0f84ec6ac0e1261e6246273abfbaba9879bbf625ed6c,2023-12-26T21:40:42.173000
@ -236928,7 +236929,7 @@ CVE-2023-49334,0,0,9ad6eedcb03f7a172221bc2f6a0260009bbad50c9cbb4a0f5dbd937d290a6
CVE-2023-49335,0,0,e7d994af3bf6531f78fd36c6bf9b0b84ca46db68a74be45308869abcb571e682,2024-07-03T01:42:32.677000
CVE-2023-49337,0,0,e424406de5c43c131143c16d111e773c8556787e526b7f62d53e176ae0c6b011,2024-02-29T13:49:47.277000
CVE-2023-49338,0,0,fa3bf55d0b5318e101267d5f4c126776700bea84adfbb2e6dbc68fed8dd82145,2024-02-29T13:49:47.277000
CVE-2023-49339,0,1,544cc18b99f9ed925d3edb5aad597827a3000589d248106d3004c4296636529b,2024-10-10T15:47:52.090000
CVE-2023-49339,0,0,544cc18b99f9ed925d3edb5aad597827a3000589d248106d3004c4296636529b,2024-10-10T15:47:52.090000
CVE-2023-4934,0,0,5bda99711a1c7b5e53779ffb125b8e009708afa5e83126fe4dceceec3c818038,2023-10-02T16:39:41.720000
CVE-2023-49340,0,0,2fec675eb8e4c16f2410d6f1b888906e569c7e065980f36c37bb644d4c4fdee2,2024-08-01T13:45:10.687000
CVE-2023-49341,0,0,d7e8c79b8806628e204e114f4b555101d3f5cbaa1c0f55c651021629b1c5cc97,2024-08-26T21:35:03.467000
@ -239556,7 +239557,7 @@ CVE-2023-5374,0,0,bbad172aa30166f85ca2e7d3ff515943900e68e6abf27c8173e4afc98be416
CVE-2023-5375,0,0,a64347362803998112e7738c159b01f9d4276db052cc0c20b8aec7e6633c0c07,2023-10-05T18:26:45.907000
CVE-2023-5376,0,0,990cd494edefb2d9c83b147909f1f06cb068f2eb4ba15f46e74b335e88c7a2b7,2024-01-17T17:46:40.297000
CVE-2023-5377,0,0,beec2be658ee2abf7a8172d160c87ff77ea1bb8ccb609f8c80ff98d55729625c,2023-10-05T17:07:40.813000
CVE-2023-5378,0,0,0ea6a14bb690af069b538d4f5a80c36feec2eba038b507d154ff439f4b98e251,2024-02-19T12:15:43.980000
CVE-2023-5378,0,1,609da6346e4b2cfb0c1b7e2a7e8f2a984ad4f64785ebe1bf6922b24e0ab439b8,2024-10-10T16:15:07.540000
CVE-2023-5379,0,0,2931e08b2d2958f825098c38b4e9fee27840063393b70d1f9dc8921e6c5fef26,2023-12-20T18:39:19.120000
CVE-2023-5380,0,0,cb08b877665112ae720bd7aafeb8d644ec13fe741b6b7e105c2ccf85e625dbc3,2024-09-16T16:15:08.980000
CVE-2023-5381,0,0,f4159bdba728827531b2d68c527e85df9c54a93da715a2ba38d9642e5e4ffa3f,2023-11-21T02:45:00.847000
@ -240616,7 +240617,7 @@ CVE-2023-6546,0,0,4f4e46a35eb2a1cbc8c494030b87e8c4a5413a7fdef4268737b564917a093f
CVE-2023-6547,0,0,4de5784377e5f9787f8338a046ec4c275ae6d29b8fb06be598377dd3ea6b3a4e,2023-12-14T19:31:10.497000
CVE-2023-6548,0,0,a93a0604081016c50f51b204cce97858e584569f5bc0432075c5fb69824b24a8,2024-01-25T16:45:58.287000
CVE-2023-6549,0,0,850161f4c77aa0f06b12ed2562bc348193320e4386ca4ea0ef325dd56db8dedc,2024-06-10T16:27:52.507000
CVE-2023-6551,0,0,cd3f3ed873de505baad87dd3d7c9568fa07b86b6e65dabfc0c9c6711c4c193f5,2024-01-11T16:41:19.250000
CVE-2023-6551,0,1,bf9ad9148b141f0ca977f2e13f6eef6a0137ca2b6186a2363f040e09df113981,2024-10-10T16:15:07.720000
CVE-2023-6552,0,0,280e58e9ed2dc80c0c0a43f67c21eed670b513dd1014a470571d49cccf0fc6ac,2024-01-11T21:13:09.007000
CVE-2023-6553,0,0,b5146d631beb06b07e5ca8b91ef438e8f5760824aa0920387c6fefb74ea914c5,2024-01-18T17:15:14.300000
CVE-2023-6554,0,0,2feb5ba088ff3e9dd4cf7fbd58c1eecc82f5eb18efcc3326d89df15d295f81d8,2024-01-18T17:35:46.637000
@ -240720,7 +240721,7 @@ CVE-2023-6677,0,0,e8d7b2ac483abddd5fb5246b0ccb58f2167ff8c7d9bb3d75a435f4c19bbf40
CVE-2023-6678,0,0,1b6b891a0a4426afd1f075411ff63c2743633b69b418dac3850de8598da1bdb5,2024-10-03T07:15:25.903000
CVE-2023-6679,0,0,8a553df1f73da3c3f6a8806f65fbad51b05599efca34aa3bb086ca5c7375d091,2024-09-16T16:15:11.767000
CVE-2023-6680,0,0,c6542118c55ee22c9b7c10aee5216ffa75acaf15d09a32564befb52a8c8ef3f4,2023-12-19T20:51:03.237000
CVE-2023-6681,0,1,d360fedbf0c997e91a93b42a556bffc4945068180194d5383c7ee98c6935bb41,2024-10-10T14:32:07.260000
CVE-2023-6681,0,0,d360fedbf0c997e91a93b42a556bffc4945068180194d5383c7ee98c6935bb41,2024-10-10T14:32:07.260000
CVE-2023-6682,0,0,69333011d542843f9f8a1cff6b2418572503758c6c0e55bd5de3a41edb291769,2024-10-03T07:15:26.070000
CVE-2023-6683,0,0,b645b2687895ad9ffdd472ae3eb052dcc4d9790cb61e30172f134f068042e89a,2024-09-14T00:15:14.397000
CVE-2023-6684,0,0,da2814d561e54fcd1c06571b2900d34494328fc42cf13ea916a741c8e290cd99,2024-01-17T20:41:05.143000
@ -241005,7 +241006,7 @@ CVE-2023-6993,0,0,58824562ab00139fd1065f90d459866d58a79c75a4afe1ed988bda594a97b5
CVE-2023-6994,0,0,98369af104a5f616fad5110292c6d21a84f6de7cb99223c15d3db3d8af92686a,2024-01-17T22:13:52.143000
CVE-2023-6996,0,0,fccc2168deda8e9a325faec73794d5557356b0d09dbb916af246ca96a67db2d3,2024-02-13T16:11:03.577000
CVE-2023-6997,0,0,6e27e5b63f0a87af454d1261575dc30b0f4ff5f301848e086587a6cca0abb399,2024-06-07T19:15:23.410000
CVE-2023-6998,0,0,148626548a3b7b4ba32190715f2b33394cb592dd0ffc44a66575dc401f00c38f,2024-01-11T20:25:14.163000
CVE-2023-6998,0,1,d47af9cb9500ce4c322dbabda800a0d285b36e94645b23c9df839f36c73319f9,2024-10-10T16:15:07.850000
CVE-2023-6999,0,0,105a70829f6eff53ac15a557cd0bd3f06555e4d64cccad8e6bdc880dc85be3d9,2024-04-10T13:24:00.070000
CVE-2023-7002,0,0,1f48f06eff9246f8921966d36b30d4b155872d4efce169cac69a0e04e201ed5d,2023-12-29T06:21:43.197000
CVE-2023-7003,0,0,e9402f475914886887087bf2c3bb459f6ae259bd32832a137b61739af9c3ed22,2024-09-25T01:15:39.957000
@ -242015,7 +242016,7 @@ CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
CVE-2024-0861,0,0,86ecba68491b7b81822881feb2da55a3f32a47f2022c25fb159df017410c6f17,2024-10-03T07:15:28.390000
CVE-2024-0862,0,0,cd566c8abfba0ca515f734ef4070df65c5856e9bf9b981d35c91f199e6054347,2024-05-14T19:17:55.627000
CVE-2024-0864,0,0,8a8d358bdeda4e251f9de12891e26aa14503e300a3d835f742cbedccca9bc293,2024-08-29T20:35:57.690000
CVE-2024-0864,0,1,5df0a42cefa6ce6ca871e243da3f4a295df398ecbf312afeac42b693671796d2,2024-10-10T16:15:07.990000
CVE-2024-0865,0,0,92ed612466d8a4d7183523d7500a321a95aa9e27cc826fa3fd89f2bb9954809a,2024-07-19T20:43:36.043000
CVE-2024-0866,0,0,fc759d49c9e441a8b12ab4ad1a997904eb8eb9894ecca01f95e8cb0572eecb6c,2024-03-26T12:55:05.010000
CVE-2024-0867,0,0,e359b89be2d490f4a35e658519a1716eaafc027d44d059518f42f8274899e25d,2024-05-24T13:03:11.993000
@ -242200,7 +242201,7 @@ CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab32714
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000
CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000
CVE-2024-1062,0,1,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000
CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f85b,2024-10-10T14:22:28.617000
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
@ -242713,8 +242714,8 @@ CVE-2024-1600,0,0,361b3dac683b3a5ac546d616c21e4dc0f349290759dbe747906d2ebdb44b8f
CVE-2024-1601,0,0,83cf4a8caabcc81e351705b7638f02b9b11f8845346f643cabf4d0eb108d61fe,2024-04-16T13:24:07.103000
CVE-2024-1602,0,0,424c7946b86609c0593c4ee4eb3ca817d37faadfd2bd290c5bce24c66955d72e,2024-04-10T19:49:51.183000
CVE-2024-1603,0,0,7560f4eb0fe2f104ec0cc7868f6032f1be714ae3fffcb6babc4d2b97acd948b5,2024-03-25T01:51:01.223000
CVE-2024-1604,0,0,8b4498cdb20c150711bd944967e97a81c88350fa1df3333987400929c6bc12c9,2024-03-18T12:38:25.490000
CVE-2024-1605,0,0,a0eba83f11cfc5277be8603fcd907e5e0ba11be2bc4df8af74fb8a87201e455f,2024-03-18T12:38:25.490000
CVE-2024-1604,0,1,277105b8ea788ca74c9aed2acbcd50868e1b158a625c260553e18f1e3fc00dac,2024-10-10T16:15:08.103000
CVE-2024-1605,0,1,1303820adefb05fc627f5a7ece6f248c68b2369966e9fc4c3087c505496a74aa,2024-10-10T16:15:08.220000
CVE-2024-1606,0,0,15a17e447d99df7418714d7ef94e3798f3d5d0e7ef6ca0dc3b7b341bddda711a,2024-03-18T12:38:25.490000
CVE-2024-1608,0,0,44224eee05265f6f7b8c8729d57dee56f28fe5925bde16e1c91e799aa3c2bf41,2024-07-03T01:45:25.227000
CVE-2024-1618,0,0,3886085aa0e530a3cd7ca87e86ea29f5f9d41baf4dd8dca3226a1b22f221980f,2024-03-12T16:02:33.900000
@ -244035,7 +244036,7 @@ CVE-2024-21334,0,0,bb98735e0397eef282b3bf0c8a7f17fd1a894c0580516f67c50b6ae552edb
CVE-2024-21335,0,0,d3be0da75c93e40dc74ef43532ac464e7457c464e235cbe682e70d325b6a979e,2024-07-09T18:18:38.713000
CVE-2024-21336,0,0,4632192569ed60af4d57d1dd58a5b140d682aa1d82fc677d5ec51bcb39be3541,2024-06-11T15:15:59.553000
CVE-2024-21337,0,0,1ed4e9ec6936be258d1de771e0acb5830541ca48fb0a246032f3c3930147d134,2024-05-29T00:15:20.793000
CVE-2024-21338,0,1,3aa0124262ccd838e18fcb8d62fa84ec847253898437096a73d841c68b97cdf8,2024-10-10T15:14:00.550000
CVE-2024-21338,0,0,3aa0124262ccd838e18fcb8d62fa84ec847253898437096a73d841c68b97cdf8,2024-10-10T15:14:00.550000
CVE-2024-21339,0,0,3b2246ef5e1d88b753a2538b4b172fb8ad25db9ef5e4dae729823984d67c0483,2024-05-29T00:15:21.830000
CVE-2024-2134,0,0,32f7b6769a3de1e870eb862cfbcf578418aa858e7cc01f11b7b77f4ab31882e5,2024-05-17T02:38:03.667000
CVE-2024-21340,0,0,54f8fce81fb3f01b0990ebeb93fb4090923de6185bd8f6ef3135f577fe07fabe,2024-05-29T00:15:22.083000
@ -244591,7 +244592,7 @@ CVE-2024-2204,0,0,a1b09b74c91818340209a8ddf823ec1cf800d4476587d084b8cf03d19b7025
CVE-2024-22040,0,0,be358f199493e83f56d872322bfd43fdac4427b513b4fe755395a46f51c51b1d,2024-05-14T16:16:05.417000
CVE-2024-22041,0,0,b5443db0c86e6457cab6a387b03922b3d7f0b5665f00c0fc059d18dd37af355a,2024-05-14T16:16:06.063000
CVE-2024-22042,0,0,51e530b3f65717bb1e8010af0bda85338ccdaa265e736b5da43fcef129570895,2024-02-13T14:01:07.747000
CVE-2024-22043,0,1,9e476139d6d724b0e5de7cce022f763d77f88747a669d7f1dbe27dfd871a9603,2024-10-10T15:44:13.010000
CVE-2024-22043,0,0,9e476139d6d724b0e5de7cce022f763d77f88747a669d7f1dbe27dfd871a9603,2024-10-10T15:44:13.010000
CVE-2024-22044,0,0,eebeb23ba8a6b13727ce5f42031738195bd52d4a50bd5c3f51bde42fc8fdd786,2024-03-12T12:40:13.500000
CVE-2024-22045,0,0,0934b761764d7359e221a8250519572915febccdf4c0aa0b54ead29e97778d40,2024-03-25T16:24:56.037000
CVE-2024-22047,0,0,b48a64d9772f9484f6f883609c51e940b13757e9806b4287550205f9ae688a52,2024-01-10T20:02:53.583000
@ -244656,7 +244657,7 @@ CVE-2024-22122,0,0,22b11101943a1c4b31c7e2bc3bb992e519d6c0c349adf117401cf85389b24
CVE-2024-22123,0,0,99933d3f598e6bb9a91d26b93e70d5c40c6c642d2f1f853d8b31928e38a1ad31,2024-08-12T13:41:36.517000
CVE-2024-22124,0,0,ae727126e60d9cde8ef5e51668c38a883080195512277d1a80e4217d8781fb3c,2024-01-22T19:17:13.050000
CVE-2024-22125,0,0,45e3a9c2ec5632f05c6eeeb6aeaaf2c6d04ed3da2f62c2fdc1ffee6c0b199240,2024-01-12T19:42:36.637000
CVE-2024-22126,0,1,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6d37,2024-10-10T15:56:49.207000
CVE-2024-22126,0,0,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6d37,2024-10-10T15:56:49.207000
CVE-2024-22127,0,0,a93c2036d31e75652d8f4eeafd412b70336432f9ad8255c87f034d5f74373945,2024-09-26T19:15:06.897000
CVE-2024-22128,0,0,867f07a0106f89603e780ece7b7a835f530d6c4dbff3b43b95585dfd576bd64e,2024-02-13T14:01:40.577000
CVE-2024-22129,0,0,f98c249f22037a19179779366a2c80b4076872a899c468771d964e4af4fceb0b,2024-02-13T14:01:40.577000
@ -246476,7 +246477,7 @@ CVE-2024-24880,0,0,d33c65d2cd8280ebaa686b2fcc8fd218b13ad4aa68609a2777547b3bf6ac3
CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000
CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000
CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000
CVE-2024-24884,0,1,af55aab316537bd504b6b6ea3895403cc0d0c1e7e14595579898db1923b7122d,2024-10-10T14:04:13.600000
CVE-2024-24884,0,0,af55aab316537bd504b6b6ea3895403cc0d0c1e7e14595579898db1923b7122d,2024-10-10T14:04:13.600000
CVE-2024-24885,0,0,7a43d600d033d18ff5a631d3c78e01918ca77dcf41ffa14f3f93f7c9b4bb4ad4,2024-08-02T00:15:23.523000
CVE-2024-24886,0,0,07792f7aa43278f631451e24100471b838930227e2960a56c45baad7e36474f5,2024-02-15T05:03:32.117000
CVE-2024-24887,0,0,b91ba2c15170dd37eb83644d09105b152fe9fce4832e88e978eca355fc6a4e64,2024-10-08T16:48:35.663000
@ -246804,7 +246805,7 @@ CVE-2024-25354,0,0,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560
CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000
CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6ca08,2024-08-02T20:35:24.740000
CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000
CVE-2024-25360,0,1,6caf8fa41563275660a5cbd6a4cda6f930214e7d87293b674b62db1753cb154f,2024-10-10T14:43:01.797000
CVE-2024-25360,0,0,6caf8fa41563275660a5cbd6a4cda6f930214e7d87293b674b62db1753cb154f,2024-10-10T14:43:01.797000
CVE-2024-25366,0,0,fcf0bd0bcec5d3ac613d0f087b722a9736b6c16fe60db374ab304707fd794e91,2024-08-16T18:35:06.990000
CVE-2024-25369,0,0,59ffb0bc2370235574d9929dc2e6276b267db724d8340eb583c27a6ab908bf38,2024-02-23T02:42:54.547000
CVE-2024-2537,0,0,ce9753e7852cdca037deeb9816f11b74c3d1bde3479050982fbbe15f57049a4a,2024-03-17T22:38:29.433000
@ -247153,7 +247154,7 @@ CVE-2024-25910,0,0,928d48dc594e744f5fa97c70afcd77c815a0c3c31658eabf2781fdbf263d0
CVE-2024-25911,0,0,f9465290d28dcba85e6fa4f87ecd37cd0b8e17c3025445c3165a61ba0e85426f,2024-04-17T12:48:31.863000
CVE-2024-25912,0,0,9372b7ae5090799ba3301728cf8f4fbb7d0bd389adff9daf4b1e1d1a7bf7cf41,2024-04-11T12:47:44.137000
CVE-2024-25913,0,0,2eca2aef8ac97b5a992d9aa3c1345031dda8501c8ce091779f4e2778ef8c6417,2024-02-26T16:32:25.577000
CVE-2024-25914,0,1,60b1b3c6a773bff9103aa6fa8644965c2c36b3e0f49444784ec5e0e3fa8c3f55,2024-10-10T15:57:37.980000
CVE-2024-25914,0,0,60b1b3c6a773bff9103aa6fa8644965c2c36b3e0f49444784ec5e0e3fa8c3f55,2024-10-10T15:57:37.980000
CVE-2024-25915,0,0,6af4fccf980af39bb585f399c964cef04631f1cb23395cd472ba3e09ce83a91a,2024-02-23T16:14:43.447000
CVE-2024-25916,0,0,7c2094a0e33d9af2c6dae0b5fb17a51d90fad41de0a9f2cea5d22b783ccd08e6,2024-03-15T16:26:49.320000
CVE-2024-25917,0,0,8f1b78603cfc0f16aac41bf1a9d05d825248337645d9c39cfce4e7524b120c6e,2024-04-25T13:18:13.537000
@ -248609,7 +248610,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
CVE-2024-2758,0,0,ec71169b8e8ae96bf24d772237af9a9c33e20fd447b06805225d467e622ae7a6,2024-05-01T18:15:19.300000
CVE-2024-2759,0,0,f895adfc16a08410bca73fa13cf2db3485a9413616bcb45162729aeb14feb416,2024-04-04T16:33:06.610000
CVE-2024-2759,0,1,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000
CVE-2024-27592,0,0,d1ab0f4f443cdfc3ef1bdb598e0eca6a6dd41bceb98b2d42145b4b52d872d5f3,2024-04-16T23:15:08.690000
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
@ -253615,7 +253616,7 @@ CVE-2024-34616,0,0,c301260c315697c954fb2feafb31403c37229c06fbc1763a645c0b780c7d6
CVE-2024-34617,0,0,b1ee984b0fa2dc691ebab6e8249f2a4d4bb83e2ded6eba30678b4026e2d801bc,2024-08-12T18:40:21.090000
CVE-2024-34618,0,0,d83244a9f175d49a5d846a23c6fe10dd7ec1bbbbc81b439f7092f16730defc87,2024-08-12T18:40:38.963000
CVE-2024-34619,0,0,91b7e2ba5c8ef39243e26b3218dbb54a69ef40dbc6e2ee1a6dfc7635d1e06db4,2024-08-12T18:41:03.467000
CVE-2024-3462,0,0,54779d92a3c6d70fd24721dad0ad60ea3e87e07e6060c4f8a8e7678e5dd7fd43,2024-05-14T16:11:39.510000
CVE-2024-3462,0,1,cde69c32d1cfdddf84aad9bf072c1ff8f90df5fe6471a02399ac91c4d7da2bbd,2024-10-10T16:15:08.497000
CVE-2024-34620,0,0,18af99a16c151d48117fe4a9d6b46c84a917ab3823f5ed3fce7acc26205bcfe1,2024-08-12T18:41:21.593000
CVE-2024-34621,0,0,fbb4f55b8bb52c900dd8b6fb5e30a72cb1ea07a01b1c400b8d7287789fe61e97,2024-08-09T20:43:21.560000
CVE-2024-34622,0,0,aeda50f8bab0ac7ef960dd7444278eb4fda7645ea46e11099531591011c5f504,2024-08-09T20:15:32.807000
@ -253974,7 +253975,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08
CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000
CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000
CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000
CVE-2024-35202,0,0,0c067622ccaeabdace30507435f4a38bb860d320794b69a4ccb0eae8d222a96e,2024-10-10T13:15:14.077000
CVE-2024-35202,0,1,307eeb0ba3a894c1f24169242df5b7772be5729599a16b2a6aaeb88e865b1b41,2024-10-10T16:35:11.390000
CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000
CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000
CVE-2024-35206,0,0,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000
@ -254256,7 +254257,7 @@ CVE-2024-35683,0,0,35d7e7c403c9e1a0af5b15ee529f21dfe95dd77d68bca956781c650575c54
CVE-2024-35684,0,0,73ceea3685cab6d12bcc00b1be64bf260bc52647423fb13caa461de77b765285,2024-07-18T19:15:49.853000
CVE-2024-35685,0,0,139851b07c410dda78a8d072ad9e34deae44fbd00bd025834cea54049b4e0532,2024-06-11T13:54:12.057000
CVE-2024-35686,0,0,32ff2e600a9d8926049897296d1d6fe8809b6a2e4221afcb5a5a74815a856c9b,2024-08-19T12:59:59.177000
CVE-2024-35687,0,0,79fce35ccd3e930bc208091f41ac29961dccd33e15189a2e1b06f3b46062b830,2024-07-18T19:12:50.843000
CVE-2024-35687,0,1,b379fb6562e3ac3f0754d3c341db6054c4dc0eed9ed63187d866802f459ed76a,2024-10-10T16:59:04.827000
CVE-2024-35688,0,0,3002fd4b3fe5cc02b7654ca7bf43c572c5d7c5d95678447c325fe6a4dfea431c,2024-07-18T19:11:38.683000
CVE-2024-35689,0,0,a84697d9194d9eaca216c47abe16f4656da4cd35d0aca0020ad4375947ea31e4,2024-07-18T19:11:09.873000
CVE-2024-3569,0,0,9b80b9a87217b369759c7140d80dbd6082319d66e422964bf6b9aefb97f43369,2024-04-10T19:49:51.183000
@ -256191,7 +256192,7 @@ CVE-2024-38254,0,0,51e07d963269d194219f11a7f07791c63d4b27fc12cb6d3b8ac346f9bf2c8
CVE-2024-38256,0,0,2716cfae0f1f9233f52a2225afa7ed0b6aac310a887e60636554d0b32b5b97e3,2024-09-13T15:05:30.070000
CVE-2024-38257,0,0,3a8b2af4adcb4bdfc01df1b0ecd23bc52fe1bc4f0791eb3347f047cb2790f5a2,2024-09-13T15:03:00.917000
CVE-2024-38258,0,0,6c786148de3caa551f00d4f5be537f09b4e147b1bb4e421666b8f6ad512325e1,2024-09-13T15:00:54.153000
CVE-2024-38259,0,1,d7a118fae4649d7f9bd788f71eb172724667e7ef52a1e02ea9ee9eac2db2ad0a,2024-10-10T14:02:28.917000
CVE-2024-38259,0,0,d7a118fae4649d7f9bd788f71eb172724667e7ef52a1e02ea9ee9eac2db2ad0a,2024-10-10T14:02:28.917000
CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000
CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2431,2024-09-13T14:53:26.410000
CVE-2024-38261,0,0,ebfdb8837e9ec46b0c59a92ae543c8a1bf9ca753f5c0c9f66ff763b497d2dbac,2024-10-10T12:56:30.817000
@ -258327,7 +258328,7 @@ CVE-2024-41812,0,0,77d77d75e12a46a4096a7ded13c0631df5e5cdfd100a1bda9b1f75a9011ec
CVE-2024-41813,0,0,91e03e36b9e87581405a8dd69398040d61a14fc0a45ce589d6f6ebdb2f6cab48,2024-09-30T20:02:25.837000
CVE-2024-41815,0,0,fa3c6b5fdaad718b40db16c805a164fa7a9b4ae5ba2f85a17caaeb17fb76200d,2024-09-19T14:36:12.677000
CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000
CVE-2024-41817,0,0,9cb2153c741e308483085d8110b63401b0c640bfe3ba97ff298d16bc8f67bbb6,2024-09-11T16:16:23.090000
CVE-2024-41817,0,1,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000
CVE-2024-41818,0,0,34e8576dcb1a1bd2ef0841435c6e4eb9b22f044d76175d55bfedd30532739326,2024-09-11T16:09:46.303000
CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
@ -259537,8 +259538,8 @@ CVE-2024-43567,0,0,5254211d003cb9dfab5d0a0274d50ed06371d19404c4e47d666432ca57706
CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000
CVE-2024-43570,0,0,016b6e94609b530b65d5100c09249d20ef14a15a752087ce1bb1b7159fb57dc2,2024-10-10T12:56:30.817000
CVE-2024-43571,0,0,015df71595da42b0884946bd78c15bf74fc19709a1096441e42c8f5ef0b8f816,2024-10-10T12:56:30.817000
CVE-2024-43572,0,1,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000
CVE-2024-43573,0,1,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000
CVE-2024-43572,0,0,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000
CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000
CVE-2024-43574,0,0,30d4174ef4e94dde6f0aa7093742f8a5ba6bcc65556c31badec28200fce82b19,2024-10-10T12:56:30.817000
CVE-2024-43575,0,0,eec07e542dee921a9f44a423761686ae2ce04f8b4b0745d9fd5ba52addccbd98,2024-10-10T12:56:30.817000
CVE-2024-43576,0,0,d76a890bff782679827ca6165aa10af7abdcfc7817f90ed044c9e8a2ad69acdc,2024-10-10T12:56:30.817000
@ -260079,7 +260080,7 @@ CVE-2024-44685,0,0,7f282f2a70785e8bb92c0556d0f098f6c6fb951f86f77bf4595504ac943bb
CVE-2024-4469,0,0,8f4eafe1629cfec30e07bc480cd9bd60074526e695dc3e7699a9034cc841795d,2024-05-31T13:01:46.727000
CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037c4,2024-05-21T12:37:59.687000
CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000
CVE-2024-44711,1,1,620599d0f9bccc5f0a82e6591e0e72db06771c1ec29da729120ba22a8704288d,2024-10-10T14:15:04.777000
CVE-2024-44711,0,0,620599d0f9bccc5f0a82e6591e0e72db06771c1ec29da729120ba22a8704288d,2024-10-10T14:15:04.777000
CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000
CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000
CVE-2024-4472,0,0,6cbabb06deec22e45817e31231db7dceeae03b03c30644b1dc19b42bb497afd7,2024-09-18T19:16:35.900000
@ -260184,11 +260185,11 @@ CVE-2024-44951,0,0,d4df6b53659b4bf2ca95c9e72ed9fbab6343da2558ed206d0ca74ab614293
CVE-2024-44952,0,0,6abe9435eb01f0417ea6e45511928e929f498aad7a413484748a480c46e0c4ce,2024-09-06T16:37:38.370000
CVE-2024-44953,0,0,f2ec50e0309c43f7cf9bb2e776118a51e77c29a5f9b8c0285a1645b3f3d10a0b,2024-09-06T16:37:33.650000
CVE-2024-44954,0,0,31b5dfbb887da799bd2bd3ced4c927fc2ecea3232fc0eafa678eaf39c7e755f6,2024-09-05T12:53:21.110000
CVE-2024-44955,0,0,2a6532accf02411787cbf424bddea1cf6a2c7506af16dac0f1dc27d82c748f26,2024-09-05T12:53:21.110000
CVE-2024-44955,0,1,7ecd6df0a7fc728e9f1b78b619a80458c35c83df938799fdd53ee40a270e647d,2024-10-10T17:57:00.267000
CVE-2024-44956,0,0,6af1a87a6f61cb2e54a20c3401cc5debba4744f6ee0ebb8ac5c756a545a18cee,2024-09-06T16:37:11.777000
CVE-2024-44957,0,0,e09ae721dc946241eec9f81a8aaa6dbc034c414b1c1b70d35ec2e90777c333a8,2024-09-06T16:37:00.077000
CVE-2024-44958,0,0,49c750c0a9b2f5b7b2c2c67e4181474af81d7c9d2786a41fdac4a4241460e7f1,2024-09-05T12:53:21.110000
CVE-2024-44959,0,0,ce07f05b33b1296682d80c2098d95c4078dc762d4b2d2681cf75b77f51bfb848,2024-09-05T12:53:21.110000
CVE-2024-44958,0,1,e4d3f1ed246cde0567507bcc647e05aeb172deedd04cdd90b68c843294cc3a64,2024-10-10T17:56:24.467000
CVE-2024-44959,0,1,cdc6d6e75361aea84c95ea1414f5cfe7ea6483c758f03a0ec301cc000a1016f2,2024-10-10T17:54:07.960000
CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000
CVE-2024-44960,0,0,68277b730b7485e374cc6a581bba8cf7b2d42cf68316fea6befff6e677f25010,2024-10-04T16:44:05.497000
CVE-2024-44961,0,0,f953df8f16221e9fd81f9cf7e7b0f2354703b12926c99e78c21e8910d16a893b,2024-10-04T16:39:39.300000
@ -260207,27 +260208,27 @@ CVE-2024-44972,0,0,9b4a601abf868742cc56845740bd2af5dc67b7e9f76c5e2e3815a329e7373
CVE-2024-44973,0,0,6da77340a818d4254bbf05ca91b8c65562f8d826d87a4df556d42cceb3d012ba,2024-10-03T14:23:09.147000
CVE-2024-44974,0,0,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000
CVE-2024-44975,0,0,259cddaa128c9efb6ec303816aae245e7b8378b15a62da050b41a2aa6ef90c6f,2024-10-03T14:32:31.677000
CVE-2024-44976,0,0,8c7b930f69a8eac68da6855eedc8b3a97b1051cdf631749b93c2aaf1d2a28ef8,2024-09-05T12:53:21.110000
CVE-2024-44977,0,0,8267c668040f19c89ab2180e788476dee75d30c69bd18b77721b380cd5039fc4,2024-09-05T12:53:21.110000
CVE-2024-44976,0,1,bc18e50085e0996c22bd3875fde1d8b8546c02856815a998cf979827e572374f,2024-10-10T17:50:14.863000
CVE-2024-44977,0,1,03172ad45dab614d5712c6aa7ef1d5d1de28df5518c80831856ede17b98f6602,2024-10-10T17:47:59.593000
CVE-2024-44978,0,0,86121d29302acc1da31190cefab002b1ff26f43dfa1aaefb7afb57e51681158d,2024-09-10T16:51:19.813000
CVE-2024-44979,0,0,c564230a8b2dad8ceef7ebf62fdc806efd7fe79c5ccf1d638e23d29d49c547ed,2024-09-05T12:53:21.110000
CVE-2024-44979,0,1,cecac389382680ea39a2d45161307db74c62b644cb6a1947cc1848191426c503,2024-10-10T17:44:36.417000
CVE-2024-4498,0,0,237405bb434f57b5ee3d93725ee504cc093cf6521d831301400a29eebde53ae2,2024-06-26T12:44:29.693000
CVE-2024-44980,0,0,47cbb2b80b64a9e65a634f164af37fe8f9bbf35b2a4763627fcb954d1d43d5f1,2024-09-05T12:53:21.110000
CVE-2024-44980,0,1,dea397cd74419967eeeec31ac4bb73b2fcd8298d78221f7ff8b71c505344cc1e,2024-10-10T17:42:53.433000
CVE-2024-44981,0,0,bc3bb172f7a0023a22356964618a5541429c999634289482e09bbe39c56b8053,2024-09-05T17:54:19.377000
CVE-2024-44982,0,0,097b402de9531ebf5ca1f6aae63ba13bda02a74939ff8ca55ac9e7a6db69946f,2024-09-05T12:53:21.110000
CVE-2024-44982,0,1,a05c0c5e6b282a95ebe731908435bbb3ecaa688dda76ce2904340585b7afa275,2024-10-10T17:09:54.350000
CVE-2024-44983,0,0,6dcccaf315345579e49205f3bdea80f9b0827330855785bb5774834968a11f76,2024-09-10T16:57:55.110000
CVE-2024-44984,0,0,c055413ce64b83c18979ac6480bb0a27c5e68feb3d290ff4c7ff28dc7f6a5b89,2024-09-05T12:53:21.110000
CVE-2024-44984,0,1,9f87dbbca170f6f4d252c6919ea7b3f286e8ff7024a06a22635aff0d47c02da1,2024-10-10T16:48:56.167000
CVE-2024-44985,0,0,89614f0dc5a1bc1e42d274d3ec6531500905f54e1226dc3d0cfa558fdaf45e82,2024-09-05T17:54:11.313000
CVE-2024-44986,0,0,7b1b7f962a5dde2e3112c86530d9327efd0060e0a73a92ec7225981af2f022b4,2024-09-05T17:54:04.127000
CVE-2024-44987,0,0,80c7ee92eb0c64e1bc51cb1cea659b21d515983723260d3a4a67be7790dea749,2024-09-05T17:53:54.687000
CVE-2024-44988,0,0,88c9242491758cb5cb40dacc794baa4f1069a31af76a02349607187c0ed57054,2024-09-05T12:53:21.110000
CVE-2024-44988,0,1,6a50a64461dde71a529e9e83bb0f9a6735ab909803f408460e79c8c9f655c334,2024-10-10T16:44:14.767000
CVE-2024-44989,0,0,f232cbe2cf85d26edc47089ff1f523369ffa3f6479342bd09b010a8ff52ddbe8,2024-09-06T16:31:22.253000
CVE-2024-4499,0,0,76c471af3c85399c41d057a036d2a12d52d3dc17ec6cbd4660af6d2299ed90b8,2024-09-13T16:01:19.483000
CVE-2024-44990,0,0,87bc0c256d1ef863849319b5a4078ee77f85507d6091a25f9ed554ccb2e112e7,2024-09-06T16:31:12.870000
CVE-2024-44991,0,0,69eec0bb380a8754aee628a5bf38db8d970f8f66da3bb74dd5662c2dae9dd51b,2024-10-09T14:36:15.790000
CVE-2024-44992,0,0,97ef2dd55e50d283d25cb375a53b1b9e4ced48005c60f251c68cb5bcbe063f3e,2024-09-06T16:29:28.963000
CVE-2024-44993,0,0,83c20e8055b5f920fb8768cd48edd51dee49d28189ff000654e3b9aceca5b744,2024-09-06T16:28:49.180000
CVE-2024-44994,0,1,b3f61d72a38d9d8c80281898ad7104799056cdc59334f53bd829366071e8d80e,2024-10-10T15:59:06.093000
CVE-2024-44994,0,0,b3f61d72a38d9d8c80281898ad7104799056cdc59334f53bd829366071e8d80e,2024-10-10T15:59:06.093000
CVE-2024-44995,0,0,197459857248206995b34d4054170be94eac94a6c36641a79619b26d39e0858c,2024-09-15T18:15:34.540000
CVE-2024-44996,0,0,e18967c4ab698ef45683375a8ae0d2c16fa28828098e111c232677530888b1a3,2024-09-16T12:21:47.370000
CVE-2024-44997,0,0,e3f86ed864785c36fda99f43974c4da9bece309546ba3123a45070f74f032602,2024-09-06T16:28:25.183000
@ -260584,7 +260585,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
CVE-2024-45519,0,1,8cf7771886ee091236ac393f14fcd9299d951c1d8323e7c75b78becbb53a0cf0,2024-10-10T15:04:49.143000
CVE-2024-45519,0,0,8cf7771886ee091236ac393f14fcd9299d951c1d8323e7c75b78becbb53a0cf0,2024-10-10T15:04:49.143000
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
@ -260836,7 +260837,7 @@ CVE-2024-46292,0,0,16657deaed202158307b9cd348b1ae5a658eccdd4341dd38e21d8ab9f2e1a
CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-46300,0,0,d1242a191b8ea8c2a0e9fbab7765f3d208830dd828d323e4edc4853d2473356e,2024-10-07T20:35:11.433000
CVE-2024-46304,0,1,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000
CVE-2024-46304,0,0,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000
CVE-2024-46307,0,0,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2b0a,2024-10-04T13:51:25.567000
@ -260894,7 +260895,7 @@ CVE-2024-46488,0,0,41c2092a15aede67b224d6f9481dd8740d600089d5047373dfa98024a8d78
CVE-2024-46489,0,0,0556d6a2fec67f99959df88dbf0bb95ed9722504d8b825a29e35fd84905c2afd,2024-10-02T16:24:32.300000
CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000
CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000
CVE-2024-46503,0,1,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000
CVE-2024-46503,0,0,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000
CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0b9,2024-06-20T20:15:19.353000
CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
@ -260927,7 +260928,7 @@ CVE-2024-46567,0,0,dedf59b7bdc5b2e51a36cbc666014cae7f626ef481966bf02a77cd072fada
CVE-2024-46568,0,0,2301bebc09919b1fb68167c3b63854080045492699033fe0b4e9e2e63dbdb0e5,2024-09-24T16:42:01.687000
CVE-2024-4657,0,0,e4551eb50aadbad4e8d70da122e3e5b28a0bd348b1d5555c6dab0b92557cea7b,2024-09-26T13:32:02.803000
CVE-2024-46571,0,0,d8c3af383191fcf5562e605a727b1592f14cb20acc9bc8714597971ea66958fd,2024-09-24T16:42:03.157000
CVE-2024-4658,1,1,6b27f4629a4709da9f5df818e618a578d6df916d8a407726ce5dd45b44432682,2024-10-10T14:15:05.587000
CVE-2024-4658,0,0,6b27f4629a4709da9f5df818e618a578d6df916d8a407726ce5dd45b44432682,2024-10-10T14:15:05.587000
CVE-2024-46580,0,0,4ef81a3a666be4ae5d59b8240dbfdd552f675698f9d209378d8692d698660973,2024-09-24T16:42:09.207000
CVE-2024-46581,0,0,16117c2b2643f1e7cb6f228f7ad68d76a739f5581aa486deed15d00461c03fe3,2024-09-24T16:41:36.533000
CVE-2024-46582,0,0,4dc729b9802e75f61b77ace705aeb5edeb4d2f366d0a6bce4afc576e2ee3fa8e,2024-09-24T16:41:29.377000
@ -261468,7 +261469,7 @@ CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef
CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000
CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
CVE-2024-4748,0,0,dc500bd2c271d3e2932961c6c29606d3774e3a53e6aec567d01cebdb2996b974,2024-06-26T14:07:47.567000
CVE-2024-4748,0,1,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000
CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000
CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000
@ -263733,8 +263734,8 @@ CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd
CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000
CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000
CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000
CVE-2024-7265,0,0,7744849ec550e14a15ade5689dd13e89a671dd2d7872009d179abef8fe868c92,2024-08-23T15:09:29.843000
CVE-2024-7266,0,0,6254ba9d278e387df53e686fa5a3601176a5b5e90ff24b9b7119a368e812b840,2024-08-23T15:09:51.707000
CVE-2024-7265,0,1,f8d550c674039cce8f324746def751c860d87bd4ce8e1c453bd0781310abcf46,2024-10-10T16:15:08.763000
CVE-2024-7266,0,1,e5f7907376447dca655b663fd7a74a213d7d563471c1ec60c07889df6ae132cf,2024-10-10T16:15:08.910000
CVE-2024-7267,0,0,d99f3d8b6ba6fe3542d0e70da6abdfbfdfd1dfb75ac1c1edca9979fafd8e77bc,2024-08-23T15:12:23.453000
CVE-2024-7269,0,0,7c73ca02cf2298b160a9951524082c8dd50257198d6ed0e474a4c364b69ef80a,2024-09-19T14:37:26.380000
CVE-2024-7272,0,0,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000
@ -264199,7 +264200,7 @@ CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277
CVE-2024-7836,0,0,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000
CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000
CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000
CVE-2024-7840,0,1,4aff3ecdb957b98960e18b3a212dcb872645f04a254f3e9f7fb77b50392cee06,2024-10-10T15:15:15.237000
CVE-2024-7840,0,0,4aff3ecdb957b98960e18b3a212dcb872645f04a254f3e9f7fb77b50392cee06,2024-10-10T15:15:15.237000
CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000
CVE-2024-7842,0,0,6f597ddda6138d9acc81d07fc2eafe7775fb8cb17d6e8df28c226b7f95417689,2024-08-21T14:13:38.923000
CVE-2024-7843,0,0,1916845a00ac6d864acb448c0fe39fd74d4023a097dc2d81074d929455ca1839,2024-08-21T14:13:11.157000
@ -265025,7 +265026,7 @@ CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f3
CVE-2024-9146,0,0,093a84e73722aaf94583ed37757bead7a369f935148ee5112a4de416d29a94d3,2024-10-07T17:48:28.117000
CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000
CVE-2024-9156,0,1,15471148679479d1c4996386b3c830796b4238e3e438030cfa3cd455d3b54335,2024-10-10T15:35:15.513000
CVE-2024-9156,0,0,15471148679479d1c4996386b3c830796b4238e3e438030cfa3cd455d3b54335,2024-10-10T15:35:15.513000
CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000
CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000
CVE-2024-9161,0,0,64c617d54e278f215ea553b63862cfa05f613731871770da9abd12448d8f4117,2024-10-07T17:48:28.117000
@ -265092,7 +265093,7 @@ CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961
CVE-2024-9301,0,0,8bd5a6d252ad4356c723578db918b42e690d26a3308bebd8024d27b2807bcd16,2024-10-07T13:12:48.953000
CVE-2024-9304,0,0,f4e2b697051bb54ba85260a74446cf2ab04e7ed5a9a99551a585b1547839152d,2024-10-04T13:51:25.567000
CVE-2024-9306,0,0,ac26ad903bb36889edec0c6ea9a2822945801fec7c4fdd4634c75606f4fc1bfd,2024-10-08T16:25:29.877000
CVE-2024-9312,1,1,c61a24c6a6bc70e80ca2fa418b83401f0228ff97884f8f436dcd1153e4d73199,2024-10-10T14:15:05.863000
CVE-2024-9312,0,0,c61a24c6a6bc70e80ca2fa418b83401f0228ff97884f8f436dcd1153e4d73199,2024-10-10T14:15:05.863000
CVE-2024-9313,0,0,8eab8e6a12fcb7dddda62f8c34fd34d547229d6ef4cec2e38f61189642da0e5f,2024-10-04T13:50:43.727000
CVE-2024-9314,0,0,a38936eed4619dcb3327257a1c570731c2950b1dc59439e66bd5a7e1f84786fb,2024-10-07T17:48:28.117000
CVE-2024-9315,0,0,dcae3590349756096f3149f913fcd278d961f7a38fe3ece525d39bf3aa5da14a,2024-10-01T13:33:59.480000
@ -265125,8 +265126,8 @@ CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044a
CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000
CVE-2024-9377,0,0,7e92c94153a671db6e3bc46a35701812779a3ebf2498b474df31292a74a22a6c,2024-10-10T12:51:56.987000
CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000
CVE-2024-9379,0,1,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000
CVE-2024-9380,0,1,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000
CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000
CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000
CVE-2024-9381,0,0,38dc7b42bfe6f81a683e774fe86ddcbec5bce97b381af2229d40d440156c5086,2024-10-10T12:56:30.817000
CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000
CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000
@ -265235,11 +265236,16 @@ CVE-2024-9783,0,0,712836b1436318ef30c4c9316757670b95113f358e845fe262e620150796b3
CVE-2024-9784,0,0,64a6c68ed42050536e19b6453db5b3e132a6112e07a448f7da505723942301c6,2024-10-10T12:51:56.987000
CVE-2024-9785,0,0,ee184b824fb4d6c43c3629feb69eb05004a7592fad511f98957566ebeb43d5af,2024-10-10T13:15:14.583000
CVE-2024-9786,0,0,e7875c706b86134a4356de16f7f39d3d03c8ad5b5439952fad2634c3220ea97a,2024-10-10T13:15:14.860000
CVE-2024-9787,1,1,a419614d20c76506100e7560985e58b193a4ffc80500f031d6c39db1267dc50f,2024-10-10T14:15:06.243000
CVE-2024-9788,1,1,d0cba3dcf7be8cbc54f9f640901b56842d2e022c0155404c088882514bb98ec3,2024-10-10T14:15:06.537000
CVE-2024-9789,1,1,2b4090b026a79f14a56152956a62ce7d4cd34e80782abc00813a239529bb2e8c,2024-10-10T14:15:06.803000
CVE-2024-9790,1,1,062baa88691ce911608565afafee861bca229a67c8372d75785d3a77a80a0dfa,2024-10-10T15:15:15.457000
CVE-2024-9792,1,1,2514dd90a5e918a09429c2c7607165e2b577a21ba08399597bfb6d38390f9c80,2024-10-10T15:15:15.710000
CVE-2024-9796,0,1,c4f0b98e58e202300ac3c27bc57acd8a82992c6087c6cae3816d6e3a584fcf99,2024-10-10T15:35:16.310000
CVE-2024-9798,0,1,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000
CVE-2024-9802,0,1,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000
CVE-2024-9787,0,0,a419614d20c76506100e7560985e58b193a4ffc80500f031d6c39db1267dc50f,2024-10-10T14:15:06.243000
CVE-2024-9788,0,0,d0cba3dcf7be8cbc54f9f640901b56842d2e022c0155404c088882514bb98ec3,2024-10-10T14:15:06.537000
CVE-2024-9789,0,0,2b4090b026a79f14a56152956a62ce7d4cd34e80782abc00813a239529bb2e8c,2024-10-10T14:15:06.803000
CVE-2024-9790,0,0,062baa88691ce911608565afafee861bca229a67c8372d75785d3a77a80a0dfa,2024-10-10T15:15:15.457000
CVE-2024-9792,0,0,2514dd90a5e918a09429c2c7607165e2b577a21ba08399597bfb6d38390f9c80,2024-10-10T15:15:15.710000
CVE-2024-9793,1,1,f88fa106bba1c40a4cd6d3772f7b83c7e4ea94d13bbc61f765d745f4584ffc72,2024-10-10T16:15:09.080000
CVE-2024-9794,1,1,24440d82ae69b0af74e9c151f82c9b1061e13043eae6ee1de39cb7f149ea4452,2024-10-10T16:15:09.350000
CVE-2024-9796,0,0,c4f0b98e58e202300ac3c27bc57acd8a82992c6087c6cae3816d6e3a584fcf99,2024-10-10T15:35:16.310000
CVE-2024-9797,1,1,32d50d64a6d23aa1ecf9c20299adc2043371b388c20eb741bc94c3c31f2a5a2e,2024-10-10T17:15:16.063000
CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000
CVE-2024-9799,1,1,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000
CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000
CVE-2024-9803,1,1,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000

Can't render this file because it is too large.