From cf6a641989d09cb6ab3183269631e6163f39f12e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 4 Aug 2024 02:03:13 +0000 Subject: [PATCH] Auto-Update: 2024-08-04T02:00:16.891362+00:00 --- CVE-2017/CVE-2017-37xx/CVE-2017-3772.json | 2 +- CVE-2019/CVE-2019-61xx/CVE-2019-6197.json | 2 +- CVE-2019/CVE-2019-61xx/CVE-2019-6198.json | 2 +- CVE-2021/CVE-2021-320xx/CVE-2021-32089.json | 2 +- CVE-2021/CVE-2021-325xx/CVE-2021-32569.json | 2 +- CVE-2021/CVE-2021-325xx/CVE-2021-32571.json | 2 +- CVE-2021/CVE-2021-325xx/CVE-2021-32573.json | 2 +- CVE-2021/CVE-2021-330xx/CVE-2021-33026.json | 2 +- CVE-2021/CVE-2021-332xx/CVE-2021-33226.json | 2 +- CVE-2021/CVE-2021-332xx/CVE-2021-33256.json | 2 +- CVE-2021/CVE-2021-334xx/CVE-2021-33430.json | 2 +- CVE-2021/CVE-2021-335xx/CVE-2021-33558.json | 2 +- CVE-2021/CVE-2021-339xx/CVE-2021-33904.json | 2 +- CVE-2021/CVE-2021-339xx/CVE-2021-33990.json | 2 +- CVE-2021/CVE-2021-343xx/CVE-2021-34369.json | 2 +- CVE-2021/CVE-2021-343xx/CVE-2021-34370.json | 2 +- CVE-2021/CVE-2021-349xx/CVE-2021-34983.json | 12 +- CVE-2021/CVE-2021-351xx/CVE-2021-35196.json | 2 +- CVE-2021/CVE-2021-353xx/CVE-2021-35331.json | 2 +- CVE-2021/CVE-2021-359xx/CVE-2021-35958.json | 2 +- CVE-2021/CVE-2021-363xx/CVE-2021-36368.json | 2 +- CVE-2021/CVE-2021-366xx/CVE-2021-36690.json | 2 +- CVE-2021/CVE-2021-367xx/CVE-2021-36741.json | 8 +- CVE-2021/CVE-2021-367xx/CVE-2021-36797.json | 2 +- CVE-2021/CVE-2021-367xx/CVE-2021-36799.json | 2 +- CVE-2022/CVE-2022-316xx/CVE-2022-31696.json | 2 +- CVE-2023/CVE-2023-15xx/CVE-2023-1577.json | 2 +- CVE-2023/CVE-2023-280xx/CVE-2023-28074.json | 2 +- CVE-2023/CVE-2023-292xx/CVE-2023-29267.json | 2 +- CVE-2023/CVE-2023-350xx/CVE-2023-35022.json | 2 +- CVE-2023/CVE-2023-390xx/CVE-2023-39016.json | 4 + CVE-2023/CVE-2023-406xx/CVE-2023-40672.json | 2 +- CVE-2023/CVE-2023-420xx/CVE-2023-42011.json | 2 +- CVE-2023/CVE-2023-435xx/CVE-2023-43554.json | 2 +- CVE-2023/CVE-2023-439xx/CVE-2023-43953.json | 2 +- CVE-2023/CVE-2023-439xx/CVE-2023-43971.json | 2 +- CVE-2023/CVE-2023-507xx/CVE-2023-50782.json | 2 +- CVE-2023/CVE-2023-509xx/CVE-2023-50954.json | 2 +- CVE-2023/CVE-2023-521xx/CVE-2023-52177.json | 2 +- CVE-2023/CVE-2023-528xx/CVE-2023-52887.json | 4 + CVE-2024/CVE-2024-08xx/CVE-2024-0857.json | 2 +- CVE-2024/CVE-2024-17xx/CVE-2024-1724.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2011.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2012.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2013.json | 2 +- CVE-2024/CVE-2024-20xx/CVE-2024-2098.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21303.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21308.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21317.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21331.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21332.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21333.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21335.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21373.json | 2 +- CVE-2024/CVE-2024-213xx/CVE-2024-21398.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21414.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21415.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21425.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21428.json | 2 +- CVE-2024/CVE-2024-214xx/CVE-2024-21456.json | 2 +- CVE-2024/CVE-2024-215xx/CVE-2024-21586.json | 2 +- CVE-2024/CVE-2024-223xx/CVE-2024-22333.json | 2 +- CVE-2024/CVE-2024-234xx/CVE-2024-23443.json | 2 +- CVE-2024/CVE-2024-237xx/CVE-2024-23737.json | 2 +- CVE-2024/CVE-2024-24xx/CVE-2024-2455.json | 4 + CVE-2024/CVE-2024-250xx/CVE-2024-25052.json | 2 +- CVE-2024/CVE-2024-271xx/CVE-2024-27182.json | 2 +- CVE-2024/CVE-2024-280xx/CVE-2024-28021.json | 2 +- CVE-2024/CVE-2024-281xx/CVE-2024-28164.json | 2 +- CVE-2024/CVE-2024-287xx/CVE-2024-28762.json | 2 +- CVE-2024/CVE-2024-287xx/CVE-2024-28795.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28928.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28964.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28965.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28966.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28967.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28968.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28969.json | 2 +- CVE-2024/CVE-2024-289xx/CVE-2024-28993.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29068.json | 2 +- CVE-2024/CVE-2024-290xx/CVE-2024-29069.json | 2 +- CVE-2024/CVE-2024-291xx/CVE-2024-29168.json | 2 +- CVE-2024/CVE-2024-299xx/CVE-2024-29977.json | 4 + CVE-2024/CVE-2024-300xx/CVE-2024-30057.json | 2 +- CVE-2024/CVE-2024-301xx/CVE-2024-30163.json | 2 +- CVE-2024/CVE-2024-318xx/CVE-2024-31881.json | 2 +- CVE-2024/CVE-2024-319xx/CVE-2024-31916.json | 2 +- CVE-2024/CVE-2024-322xx/CVE-2024-32230.json | 2 +- CVE-2024/CVE-2024-327xx/CVE-2024-32758.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32857.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32862.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32863.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32864.json | 2 +- CVE-2024/CVE-2024-328xx/CVE-2024-32865.json | 2 +- CVE-2024/CVE-2024-329xx/CVE-2024-32931.json | 2 +- CVE-2024/CVE-2024-330xx/CVE-2024-33001.json | 2 +- CVE-2024/CVE-2024-333xx/CVE-2024-33375.json | 2 +- CVE-2024/CVE-2024-340xx/CVE-2024-34012.json | 2 +- CVE-2024/CVE-2024-346xx/CVE-2024-34683.json | 2 +- CVE-2024/CVE-2024-346xx/CVE-2024-34684.json | 2 +- CVE-2024/CVE-2024-346xx/CVE-2024-34686.json | 2 +- CVE-2024/CVE-2024-346xx/CVE-2024-34688.json | 2 +- CVE-2024/CVE-2024-346xx/CVE-2024-34690.json | 2 +- CVE-2024/CVE-2024-346xx/CVE-2024-34691.json | 2 +- CVE-2024/CVE-2024-351xx/CVE-2024-35116.json | 2 +- CVE-2024/CVE-2024-351xx/CVE-2024-35156.json | 2 +- CVE-2024/CVE-2024-357xx/CVE-2024-35750.json | 2 +- CVE-2024/CVE-2024-357xx/CVE-2024-35753.json | 2 +- CVE-2024/CVE-2024-362xx/CVE-2024-36287.json | 2 +- CVE-2024/CVE-2024-364xx/CVE-2024-36492.json | 4 + CVE-2024/CVE-2024-369xx/CVE-2024-36990.json | 2 +- CVE-2024/CVE-2024-369xx/CVE-2024-36992.json | 2 +- CVE-2024/CVE-2024-369xx/CVE-2024-36993.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37100.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37127.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37129.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37142.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37176.json | 2 +- CVE-2024/CVE-2024-371xx/CVE-2024-37182.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37313.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37314.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37315.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37316.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37317.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37343.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37344.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37345.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37346.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37347.json | 2 +- CVE-2024/CVE-2024-373xx/CVE-2024-37348.json | 2 +- CVE-2024/CVE-2024-374xx/CVE-2024-37476.json | 2 +- CVE-2024/CVE-2024-375xx/CVE-2024-37532.json | 2 +- CVE-2024/CVE-2024-376xx/CVE-2024-37624.json | 2 +- CVE-2024/CVE-2024-376xx/CVE-2024-37635.json | 2 +- CVE-2024/CVE-2024-378xx/CVE-2024-37883.json | 2 +- CVE-2024/CVE-2024-378xx/CVE-2024-37884.json | 2 +- CVE-2024/CVE-2024-378xx/CVE-2024-37885.json | 2 +- CVE-2024/CVE-2024-378xx/CVE-2024-37887.json | 2 +- CVE-2024/CVE-2024-378xx/CVE-2024-37888.json | 2 +- CVE-2024/CVE-2024-378xx/CVE-2024-37889.json | 2 +- CVE-2024/CVE-2024-379xx/CVE-2024-37906.json | 4 + CVE-2024/CVE-2024-380xx/CVE-2024-38082.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38083.json | 2 +- CVE-2024/CVE-2024-380xx/CVE-2024-38093.json | 2 +- CVE-2024/CVE-2024-383xx/CVE-2024-38312.json | 2 +- CVE-2024/CVE-2024-383xx/CVE-2024-38322.json | 2 +- CVE-2024/CVE-2024-384xx/CVE-2024-38428.json | 2 +- CVE-2024/CVE-2024-384xx/CVE-2024-38435.json | 2 +- CVE-2024/CVE-2024-384xx/CVE-2024-38436.json | 2 +- CVE-2024/CVE-2024-384xx/CVE-2024-38482.json | 2 +- CVE-2024/CVE-2024-385xx/CVE-2024-38529.json | 4 + CVE-2024/CVE-2024-388xx/CVE-2024-38876.json | 2 +- CVE-2024/CVE-2024-388xx/CVE-2024-38877.json | 2 +- CVE-2024/CVE-2024-388xx/CVE-2024-38878.json | 2 +- CVE-2024/CVE-2024-388xx/CVE-2024-38879.json | 2 +- CVE-2024/CVE-2024-389xx/CVE-2024-38953.json | 2 +- CVE-2024/CVE-2024-390xx/CVE-2024-39036.json | 2 +- CVE-2024/CVE-2024-392xx/CVE-2024-39274.json | 4 + CVE-2024/CVE-2024-397xx/CVE-2024-39777.json | 4 + CVE-2024/CVE-2024-398xx/CVE-2024-39832.json | 4 + CVE-2024/CVE-2024-398xx/CVE-2024-39837.json | 4 + CVE-2024/CVE-2024-398xx/CVE-2024-39839.json | 4 + CVE-2024/CVE-2024-398xx/CVE-2024-39875.json | 2 +- CVE-2024/CVE-2024-398xx/CVE-2024-39876.json | 2 +- CVE-2024/CVE-2024-399xx/CVE-2024-39945.json | 2 +- CVE-2024/CVE-2024-399xx/CVE-2024-39946.json | 2 +- CVE-2024/CVE-2024-399xx/CVE-2024-39947.json | 2 +- CVE-2024/CVE-2024-399xx/CVE-2024-39949.json | 2 +- CVE-2024/CVE-2024-39xx/CVE-2024-3938.json | 2 +- CVE-2024/CVE-2024-400xx/CVE-2024-40051.json | 2 +- CVE-2024/CVE-2024-403xx/CVE-2024-40347.json | 2 +- CVE-2024/CVE-2024-403xx/CVE-2024-40393.json | 2 +- CVE-2024/CVE-2024-404xx/CVE-2024-40464.json | 2 +- CVE-2024/CVE-2024-406xx/CVE-2024-40645.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40719.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40720.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40721.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40722.json | 2 +- CVE-2024/CVE-2024-407xx/CVE-2024-40723.json | 2 +- CVE-2024/CVE-2024-408xx/CVE-2024-40883.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4005.json | 2 +- CVE-2024/CVE-2024-410xx/CVE-2024-41020.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41021.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41022.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41023.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41024.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41025.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41026.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41027.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41028.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41029.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41030.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41031.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41032.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41033.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41034.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41035.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41036.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41037.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41038.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41039.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41040.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41041.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41042.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41043.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41044.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41045.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41046.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41047.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41048.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41049.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41050.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41051.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41052.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41053.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41054.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41055.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41056.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41057.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41058.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41059.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41060.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41061.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41062.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41063.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41064.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41065.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41066.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41067.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41068.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41069.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41070.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41071.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41072.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41073.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41074.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41075.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41076.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41077.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41078.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41079.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41080.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41081.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41082.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41083.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41084.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41085.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41086.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41087.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41088.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41089.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41092.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41093.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41094.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41095.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41096.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41097.json | 4 + CVE-2024/CVE-2024-410xx/CVE-2024-41098.json | 4 + CVE-2024/CVE-2024-411xx/CVE-2024-41108.json | 2 +- CVE-2024/CVE-2024-411xx/CVE-2024-41123.json | 6 +- CVE-2024/CVE-2024-411xx/CVE-2024-41144.json | 4 + CVE-2024/CVE-2024-411xx/CVE-2024-41162.json | 4 + CVE-2024/CVE-2024-412xx/CVE-2024-41254.json | 2 +- CVE-2024/CVE-2024-412xx/CVE-2024-41256.json | 2 +- CVE-2024/CVE-2024-412xx/CVE-2024-41258.json | 2 +- CVE-2024/CVE-2024-412xx/CVE-2024-41260.json | 4 + CVE-2024/CVE-2024-412xx/CVE-2024-41264.json | 4 + CVE-2024/CVE-2024-415xx/CVE-2024-41599.json | 2 +- CVE-2024/CVE-2024-416xx/CVE-2024-41600.json | 2 +- CVE-2024/CVE-2024-416xx/CVE-2024-41624.json | 4 + CVE-2024/CVE-2024-416xx/CVE-2024-41671.json | 4 + CVE-2024/CVE-2024-416xx/CVE-2024-41676.json | 4 + CVE-2024/CVE-2024-417xx/CVE-2024-41799.json | 4 + CVE-2024/CVE-2024-418xx/CVE-2024-41800.json | 2 +- CVE-2024/CVE-2024-418xx/CVE-2024-41801.json | 2 +- CVE-2024/CVE-2024-418xx/CVE-2024-41808.json | 2 +- CVE-2024/CVE-2024-418xx/CVE-2024-41810.json | 4 + CVE-2024/CVE-2024-418xx/CVE-2024-41817.json | 4 + CVE-2024/CVE-2024-418xx/CVE-2024-41819.json | 4 + CVE-2024/CVE-2024-419xx/CVE-2024-41926.json | 4 + CVE-2024/CVE-2024-419xx/CVE-2024-41946.json | 6 +- CVE-2024/CVE-2024-419xx/CVE-2024-41948.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41949.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41951.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41954.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41955.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41957.json | 2 +- CVE-2024/CVE-2024-419xx/CVE-2024-41961.json | 4 + CVE-2024/CVE-2024-419xx/CVE-2024-41965.json | 2 +- CVE-2024/CVE-2024-41xx/CVE-2024-4187.json | 2 +- CVE-2024/CVE-2024-420xx/CVE-2024-42063.json | 4 + CVE-2024/CVE-2024-421xx/CVE-2024-42152.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42153.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42154.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42155.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42161.json | 2 +- CVE-2024/CVE-2024-421xx/CVE-2024-42162.json | 2 +- CVE-2024/CVE-2024-424xx/CVE-2024-42461.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4404.json | 2 +- CVE-2024/CVE-2024-44xx/CVE-2024-4480.json | 2 +- CVE-2024/CVE-2024-50xx/CVE-2024-5062.json | 2 +- CVE-2024/CVE-2024-53xx/CVE-2024-5342.json | 2 +- CVE-2024/CVE-2024-54xx/CVE-2024-5469.json | 2 +- CVE-2024/CVE-2024-55xx/CVE-2024-5506.json | 2 +- CVE-2024/CVE-2024-55xx/CVE-2024-5507.json | 2 +- CVE-2024/CVE-2024-55xx/CVE-2024-5508.json | 2 +- CVE-2024/CVE-2024-55xx/CVE-2024-5509.json | 2 +- CVE-2024/CVE-2024-57xx/CVE-2024-5741.json | 2 +- CVE-2024/CVE-2024-57xx/CVE-2024-5745.json | 2 +- CVE-2024/CVE-2024-58xx/CVE-2024-5885.json | 2 +- CVE-2024/CVE-2024-58xx/CVE-2024-5898.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5924.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5933.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5935.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5947.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5948.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5949.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5950.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5951.json | 2 +- CVE-2024/CVE-2024-59xx/CVE-2024-5952.json | 2 +- CVE-2024/CVE-2024-60xx/CVE-2024-6040.json | 4 + CVE-2024/CVE-2024-60xx/CVE-2024-6041.json | 2 +- CVE-2024/CVE-2024-60xx/CVE-2024-6043.json | 2 +- CVE-2024/CVE-2024-60xx/CVE-2024-6050.json | 2 +- CVE-2024/CVE-2024-60xx/CVE-2024-6065.json | 2 +- CVE-2024/CVE-2024-60xx/CVE-2024-6066.json | 2 +- CVE-2024/CVE-2024-60xx/CVE-2024-6067.json | 2 +- CVE-2024/CVE-2024-60xx/CVE-2024-6084.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6110.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6113.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6124.json | 4 + CVE-2024/CVE-2024-61xx/CVE-2024-6181.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6182.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6183.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6185.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6190.json | 2 +- CVE-2024/CVE-2024-62xx/CVE-2024-6242.json | 4 + CVE-2024/CVE-2024-63xx/CVE-2024-6331.json | 56 ++ CVE-2024/CVE-2024-64xx/CVE-2024-6453.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6558.json | 2 +- CVE-2024/CVE-2024-65xx/CVE-2024-6576.json | 4 + CVE-2024/CVE-2024-66xx/CVE-2024-6652.json | 2 +- CVE-2024/CVE-2024-66xx/CVE-2024-6699.json | 4 + CVE-2024/CVE-2024-68xx/CVE-2024-6873.json | 4 + CVE-2024/CVE-2024-68xx/CVE-2024-6881.json | 4 + CVE-2024/CVE-2024-69xx/CVE-2024-6923.json | 4 + CVE-2024/CVE-2024-69xx/CVE-2024-6984.json | 4 + CVE-2024/CVE-2024-70xx/CVE-2024-7007.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7105.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7106.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7154.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7155.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7156.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7157.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7158.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7159.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7160.json | 2 +- CVE-2024/CVE-2024-71xx/CVE-2024-7199.json | 4 + CVE-2024/CVE-2024-72xx/CVE-2024-7200.json | 4 + CVE-2024/CVE-2024-72xx/CVE-2024-7204.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7212.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7213.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7214.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7215.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7216.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7217.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7255.json | 2 +- CVE-2024/CVE-2024-72xx/CVE-2024-7264.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7323.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7326.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7327.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7328.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7329.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7330.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7332.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7333.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7334.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7335.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7336.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7337.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7357.json | 4 + CVE-2024/CVE-2024-73xx/CVE-2024-7358.json | 4 + CVE-2024/CVE-2024-73xx/CVE-2024-7370.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7371.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7372.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7373.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7374.json | 2 +- CVE-2024/CVE-2024-73xx/CVE-2024-7375.json | 2 +- README.md | 57 +- _state.csv | 813 ++++++++++---------- 390 files changed, 1241 insertions(+), 715 deletions(-) create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6331.json diff --git a/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json b/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json index eca754282d2..5f8553fa762 100644 --- a/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json +++ b/CVE-2017/CVE-2017-37xx/CVE-2017-3772.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:12.063", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json b/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json index f78c28b52d9..ecb4fcc0b69 100644 --- a/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json +++ b/CVE-2019/CVE-2019-61xx/CVE-2019-6197.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:12.340", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json b/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json index bcabe60e1af..fd51a144255 100644 --- a/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json +++ b/CVE-2019/CVE-2019-61xx/CVE-2019-6198.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:12.557", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-320xx/CVE-2021-32089.json b/CVE-2021/CVE-2021-320xx/CVE-2021-32089.json index 8c1839a88bf..259208b74f5 100644 --- a/CVE-2021/CVE-2021-320xx/CVE-2021-32089.json +++ b/CVE-2021/CVE-2021-320xx/CVE-2021-32089.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32089", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-11T21:15:08.023", - "lastModified": "2024-05-17T01:57:27.660", + "lastModified": "2024-08-04T00:15:17.737", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-325xx/CVE-2021-32569.json b/CVE-2021/CVE-2021-325xx/CVE-2021-32569.json index 566c08c2f9b..9af4511eed6 100644 --- a/CVE-2021/CVE-2021-325xx/CVE-2021-32569.json +++ b/CVE-2021/CVE-2021-325xx/CVE-2021-32569.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32569", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-14T17:15:08.590", - "lastModified": "2024-05-17T01:57:34.637", + "lastModified": "2024-08-04T00:15:22.200", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-325xx/CVE-2021-32571.json b/CVE-2021/CVE-2021-325xx/CVE-2021-32571.json index 8ebd369bcc3..902426a4b83 100644 --- a/CVE-2021/CVE-2021-325xx/CVE-2021-32571.json +++ b/CVE-2021/CVE-2021-325xx/CVE-2021-32571.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32571", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-14T18:15:12.697", - "lastModified": "2024-05-17T01:57:34.810", + "lastModified": "2024-08-04T00:15:22.343", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-325xx/CVE-2021-32573.json b/CVE-2021/CVE-2021-325xx/CVE-2021-32573.json index 18fa9fecac5..6a43ca81c8f 100644 --- a/CVE-2021/CVE-2021-325xx/CVE-2021-32573.json +++ b/CVE-2021/CVE-2021-325xx/CVE-2021-32573.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32573", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-11T17:15:07.690", - "lastModified": "2024-05-17T01:57:34.943", + "lastModified": "2024-08-04T00:15:22.467", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json index 45069c914aa..e80c0c71485 100644 --- a/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33026.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33026", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-13T23:15:07.367", - "lastModified": "2024-08-01T13:42:13.313", + "lastModified": "2024-08-04T00:15:28.303", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json b/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json index 45c74b7c0d0..0f94bae1581 100644 --- a/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json +++ b/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33226", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:11.083", - "lastModified": "2024-05-17T01:57:52.580", + "lastModified": "2024-08-04T00:15:30.537", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-332xx/CVE-2021-33256.json b/CVE-2021/CVE-2021-332xx/CVE-2021-33256.json index 0bc67368fa5..32d4839b8c1 100644 --- a/CVE-2021/CVE-2021-332xx/CVE-2021-33256.json +++ b/CVE-2021/CVE-2021-332xx/CVE-2021-33256.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33256", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-09T14:15:31.280", - "lastModified": "2024-05-17T01:57:52.860", + "lastModified": "2024-08-04T00:15:30.707", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-334xx/CVE-2021-33430.json b/CVE-2021/CVE-2021-334xx/CVE-2021-33430.json index b8c780f204c..563aaea5848 100644 --- a/CVE-2021/CVE-2021-334xx/CVE-2021-33430.json +++ b/CVE-2021/CVE-2021-334xx/CVE-2021-33430.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33430", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-17T19:15:07.500", - "lastModified": "2024-06-04T19:17:04.897", + "lastModified": "2024-08-04T00:15:32.943", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-335xx/CVE-2021-33558.json b/CVE-2021/CVE-2021-335xx/CVE-2021-33558.json index 95ff74f84d4..1f1e2bfb609 100644 --- a/CVE-2021/CVE-2021-335xx/CVE-2021-33558.json +++ b/CVE-2021/CVE-2021-335xx/CVE-2021-33558.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33558", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-27T11:15:07.373", - "lastModified": "2024-06-11T15:15:52.823", + "lastModified": "2024-08-04T00:15:35.893", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33904.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33904.json index 56e5edc5354..ba5bc5bb9e7 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33904.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33904.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33904", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-07T12:15:09.107", - "lastModified": "2024-05-17T01:58:07.877", + "lastModified": "2024-08-04T00:15:40.440", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json index 0403b022680..fe636f09be9 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33990.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33990", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T04:15:07.967", - "lastModified": "2024-08-01T13:42:14.200", + "lastModified": "2024-08-04T00:15:41.570", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-343xx/CVE-2021-34369.json b/CVE-2021/CVE-2021-343xx/CVE-2021-34369.json index a8a1afae89d..045f7d061e4 100644 --- a/CVE-2021/CVE-2021-343xx/CVE-2021-34369.json +++ b/CVE-2021/CVE-2021-343xx/CVE-2021-34369.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34369", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-09T12:15:08.033", - "lastModified": "2024-05-17T01:58:14.640", + "lastModified": "2024-08-04T00:15:44.763", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-343xx/CVE-2021-34370.json b/CVE-2021/CVE-2021-343xx/CVE-2021-34370.json index 1108a924ed0..60073c9dd4c 100644 --- a/CVE-2021/CVE-2021-343xx/CVE-2021-34370.json +++ b/CVE-2021/CVE-2021-343xx/CVE-2021-34370.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34370", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-09T12:15:08.067", - "lastModified": "2024-05-17T01:58:14.760", + "lastModified": "2024-08-04T00:15:44.863", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json b/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json index acaad1ae838..c0bc8ca09c7 100644 --- a/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json +++ b/CVE-2021/CVE-2021-349xx/CVE-2021-34983.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34983", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-07T23:15:13.573", - "lastModified": "2024-07-03T01:36:50.850", + "lastModified": "2024-08-04T01:35:05.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-306" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-120" - } - ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json b/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json index dc45134b889..90644d690b6 100644 --- a/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json +++ b/CVE-2021/CVE-2021-351xx/CVE-2021-35196.json @@ -2,7 +2,7 @@ "id": "CVE-2021-35196", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-21T23:15:10.723", - "lastModified": "2024-08-01T13:42:15.173", + "lastModified": "2024-08-04T01:15:30.987", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-353xx/CVE-2021-35331.json b/CVE-2021/CVE-2021-353xx/CVE-2021-35331.json index c2b14a58a83..6df5556a01b 100644 --- a/CVE-2021/CVE-2021-353xx/CVE-2021-35331.json +++ b/CVE-2021/CVE-2021-353xx/CVE-2021-35331.json @@ -2,7 +2,7 @@ "id": "CVE-2021-35331", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-05T15:15:07.997", - "lastModified": "2024-05-17T01:58:36.660", + "lastModified": "2024-08-04T01:15:32.833", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-359xx/CVE-2021-35958.json b/CVE-2021/CVE-2021-359xx/CVE-2021-35958.json index 7150e8e99f5..9c04a9c3ce8 100644 --- a/CVE-2021/CVE-2021-359xx/CVE-2021-35958.json +++ b/CVE-2021/CVE-2021-359xx/CVE-2021-35958.json @@ -2,7 +2,7 @@ "id": "CVE-2021-35958", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-30T01:15:07.033", - "lastModified": "2024-05-17T01:58:44.037", + "lastModified": "2024-08-04T01:15:37.527", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-363xx/CVE-2021-36368.json b/CVE-2021/CVE-2021-363xx/CVE-2021-36368.json index bccdb922b6c..8e521391d9f 100644 --- a/CVE-2021/CVE-2021-363xx/CVE-2021-36368.json +++ b/CVE-2021/CVE-2021-363xx/CVE-2021-36368.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36368", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-13T00:15:07.937", - "lastModified": "2024-05-17T01:58:53.237", + "lastModified": "2024-08-04T01:15:42.867", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-366xx/CVE-2021-36690.json b/CVE-2021/CVE-2021-366xx/CVE-2021-36690.json index 2e63c72feea..1c44facdf77 100644 --- a/CVE-2021/CVE-2021-366xx/CVE-2021-36690.json +++ b/CVE-2021/CVE-2021-366xx/CVE-2021-36690.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36690", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-24T14:15:09.797", - "lastModified": "2024-05-17T01:58:57.110", + "lastModified": "2024-08-04T01:15:46.013", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-367xx/CVE-2021-36741.json b/CVE-2021/CVE-2021-367xx/CVE-2021-36741.json index 672b4e07d44..edde707f069 100644 --- a/CVE-2021/CVE-2021-367xx/CVE-2021-36741.json +++ b/CVE-2021/CVE-2021-367xx/CVE-2021-36741.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36741", "sourceIdentifier": "security@trendmicro.com", "published": "2021-07-29T20:15:07.620", - "lastModified": "2024-07-26T19:26:16.980", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-04T01:15:46.910", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", @@ -12,11 +12,11 @@ "descriptions": [ { "lang": "en", - "value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability." + "value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product\ufffds management console in order to exploit this vulnerability." }, { "lang": "es", - "value": "Una vulnerabilidad de comprobaci\u00f3n de entrada inapropiada en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security versi\u00f3n 10.0 SP1, permite a un adjunto remoto cargar archivos arbitrarios en las instalaciones afectadas. Nota: un atacante debe obtener primero la habilidad de iniciar sesi\u00f3n en la consola de administraci\u00f3n del producto para poder explotar esta vulnerabilidad" + "value": " Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Trend Micro Apex One, Apex One as a Service, OfficeScan XG y Worry-Free Business Security 10.0 SP1 permite que un control remoto conectado cargue archivos arbitrarios en las instalaciones afectadas. Tenga en cuenta: un atacante primero debe obtener la capacidad de iniciar sesi\u00f3n en la consola de administraci\u00f3n del producto para poder aprovechar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-367xx/CVE-2021-36797.json b/CVE-2021/CVE-2021-367xx/CVE-2021-36797.json index a7dd4ebd70d..86b3c78b07a 100644 --- a/CVE-2021/CVE-2021-367xx/CVE-2021-36797.json +++ b/CVE-2021/CVE-2021-367xx/CVE-2021-36797.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36797", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-19T17:15:11.870", - "lastModified": "2024-05-17T01:59:00.180", + "lastModified": "2024-08-04T01:15:48.210", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2021/CVE-2021-367xx/CVE-2021-36799.json b/CVE-2021/CVE-2021-367xx/CVE-2021-36799.json index 76ec8743297..fd974da8b96 100644 --- a/CVE-2021/CVE-2021-367xx/CVE-2021-36799.json +++ b/CVE-2021/CVE-2021-367xx/CVE-2021-36799.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36799", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-19T17:15:11.920", - "lastModified": "2024-05-17T01:59:00.337", + "lastModified": "2024-08-04T01:15:48.333", "vulnStatus": "Modified", "cveTags": [ { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31696.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31696.json index 1b148942f5f..47cda7c0485 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31696.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31696.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@vmware.com", "published": "2022-12-13T16:15:19.733", "lastModified": "2023-08-08T14:21:49.707", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json index 973ae61d8d5..06f621704fb 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1577.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@lenovo.com", "published": "2024-07-31T21:15:15.423", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28074.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28074.json index 0129228f7ee..bd6a0a61d55 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28074.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28074.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-31T08:15:02.243", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29267.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29267.json index 31c592a5522..5443de4621a 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29267.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29267.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-12T19:15:50.020", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json index 308e64624be..4925d964fde 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35022.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T16:15:02.600", "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39016.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39016.json index dec4cfd68ed..2eaa76689a8 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39016.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39016.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "bboss-persistent v6.0.9 and below was discovered to contain a code injection vulnerability in the component com.frameworkset.common.poolman.util.SQLManager.createPool. This vulnerability is exploited via passing an unchecked argument." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que bboss-persistent v6.0.9 y versiones anteriores conten\u00edan una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en el componente com.frameworkset.common.poolman.util.SQLManager.createPool. Esta vulnerabilidad se explota pasando un argumento no verificado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40672.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40672.json index 79fd9924986..2307348fa39 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40672.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40672.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-12T10:15:25.837", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42011.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42011.json index 1f8a8bba026..bcb04daac17 100644 --- a/CVE-2023/CVE-2023-420xx/CVE-2023-42011.json +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42011.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-27T18:15:13.143", "lastModified": "2024-06-27T19:25:12.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43554.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43554.json index 5b2f7edc207..64ce79e2781 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43554.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43554.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-07-01T15:15:13.000", "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43953.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43953.json index d8d97f71109..bf081031ad9 100644 --- a/CVE-2023/CVE-2023-439xx/CVE-2023-43953.json +++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2023-10-03T21:15:10.573", "lastModified": "2023-10-04T18:27:51.783", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43971.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43971.json index bfc3621f89a..2c7a8f7ca05 100644 --- a/CVE-2023/CVE-2023-439xx/CVE-2023-43971.json +++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43971.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-17T22:15:03.627", "lastModified": "2024-07-18T12:28:43.707", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json index 80a374353fb..07995caeb00 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-05T21:15:11.183", "lastModified": "2024-07-26T22:15:03.550", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50954.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50954.json index d9183fe2bbc..a3f7daa85df 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50954.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T17:15:02.470", "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52177.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52177.json index c733015d909..96624a64db6 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52177.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52177.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-12T09:15:16.067", "lastModified": "2024-07-18T19:54:16.287", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52887.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52887.json index de5b12ef4f8..73cc9945432 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52887.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52887.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new\n\nThis patch enhances error handling in scenarios with RTS (Request to\nSend) messages arriving closely. It replaces the less informative WARN_ON_ONCE\nbacktraces with a new error handling method. This provides clearer error\nmessages and allows for the early termination of problematic sessions.\nPreviously, sessions were only released at the end of j1939_xtp_rx_rts().\n\nPotentially this could be reproduced with something like:\ntestj1939 -r vcan0:0x80 &\nwhile true; do\n\t# send first RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send second RTS\n\tcansend vcan0 18EC8090#1014000303002301;\n\t# send abort\n\tcansend vcan0 18EC8090#ff00000000002301;\ndone" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: can: j1939: manejo de errores mejorado para mensajes RTS recibidos estrechamente en xtp_rx_rts_session_new Este parche mejora el manejo de errores en escenarios con mensajes RTS (Solicitud de env\u00edo) que llegan cerca. Reemplaza los rastreos WARN_ON_ONCE menos informativos con un nuevo m\u00e9todo de manejo de errores. Esto proporciona mensajes de error m\u00e1s claros y permite la finalizaci\u00f3n anticipada de sesiones problem\u00e1ticas. Anteriormente, las sesiones s\u00f3lo se publicaban al final de j1939_xtp_rx_rts(). Potencialmente, esto podr\u00eda reproducirse con algo como: testj1939 -r vcan0:0x80 & while true; hacer # enviar primero RTS cansend vcan0 18EC8090#1014000303002301; # enviar segundo RTS cansend vcan0 18EC8090#1014000303002301; # enviar cancelar cansend vcan0 18EC8090#ff00000000002301; hecho" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0857.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0857.json index 4fa96a15313..1c263f6db33 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0857.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0857.json @@ -3,7 +3,7 @@ "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-07-18T18:15:05.177", "lastModified": "2024-07-22T09:15:04.457", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1724.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1724.json index 9555ea6c6a8..51b0aaf0967 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1724.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1724.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@ubuntu.com", "published": "2024-07-25T19:15:09.913", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2011.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2011.json index d4171d6bd25..52262516c25 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2011.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2011.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T14:15:11.050", "lastModified": "2024-06-13T18:36:45.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2012.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2012.json index ce43db3872b..1cdd4d72220 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2012.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2012.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T14:15:11.273", "lastModified": "2024-06-13T18:36:45.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2013.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2013.json index da82bcdabe7..0ab430da151 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2013.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2013.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T14:15:11.503", "lastModified": "2024-06-13T18:36:45.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json index d3ad7f36cec..808a30cf790 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-13T06:15:09.453", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json index a8b15c42765..2c2d728e968 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21303.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.117", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json index 8a7c63a9d9d..5ba9d6329d7 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.337", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json index ab3cbc3e85f..653fa13a844 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.573", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json index 38f8660b022..273a66b9dc3 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.800", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json index 4b0607330b5..bab494c9a62 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.033", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json index b00987dd74f..35f94e9fc1e 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.260", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json index b509dd34dad..81492c6fa1d 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.487", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json index 5de2035b91e..d4c858947d2 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.857", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json index cd904c79df0..58f93936304 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.103", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json index 1aed480e312..09d11efb02b 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.327", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json index 094166f0dad..479c172d8fe 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.550", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json index 6e0cbdf87c0..6a25626f1f2 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.770", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json index 0f83162121c..0d96b4479aa 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.973", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21456.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21456.json index d34e8c1e321..0e8c816e3db 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21456.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21456.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-07-01T15:15:13.387", "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21586.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21586.json index fccd9a01205..2f5783fb2e5 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21586.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21586.json @@ -3,7 +3,7 @@ "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-01T17:15:05.193", "lastModified": "2024-07-18T12:15:02.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json index 8032023ddd7..c94ed32784f 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-13T14:15:11.110", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json index 906e7795528..3d1b048c3ca 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23443.json @@ -3,7 +3,7 @@ "sourceIdentifier": "bressers@elastic.co", "published": "2024-06-19T14:15:13.360", "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json index 9d2bd8181c8..be2d1a37c66 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T22:15:02.857", "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json index c827b63a040..b9eac99345c 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Element Pack - Addon for Elementor Page Builder WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the widget wrapper link URL in all versions up to, and including, 7.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Element Pack - Addon for Elementor Page Builder WordPress Plugin para WordPress para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de la URL del enlace del widget en todas las versiones hasta la 7.9.0 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida del usuario insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25052.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25052.json index a2fbeb81c46..e8b08764fcf 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25052.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25052.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-13T14:15:11.370", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json index 723334be768..2f52391a353 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27182.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@apache.org", "published": "2024-08-02T10:16:00.250", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json index 8d498e1dd31..fd8814cb4a9 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T14:15:10.587", "lastModified": "2024-06-13T18:36:45.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28164.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28164.json index 3b3498a3c72..99fc4cbf452 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28164.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28164.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:09.953", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28762.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28762.json index 5cd71b10e20..f4109ee75db 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28762.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28762.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-12T18:15:11.267", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json index 9b08d020e0d..e8f32bb6f00 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28795.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-30T16:15:02.987", "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json index f5cf45668ba..d74cf597a23 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:15.447", "lastModified": "2024-07-09T18:18:38.713", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json index 126e7248c29..94e7cc1656e 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28964.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-12T15:15:50.647", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28965.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28965.json index d7e1e1d07e1..114d6f04591 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28965.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28965.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T15:15:51.033", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28966.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28966.json index 98ed0ea1af7..bb9aeff7ffb 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28966.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28966.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T15:15:51.423", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28967.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28967.json index 913f35ca688..842dda50790 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28967.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28967.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T15:15:51.660", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28968.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28968.json index 6b092d4314e..fb6064c5c98 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28968.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28968.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T15:15:51.890", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28969.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28969.json index 068ea17e280..78de5daf9ad 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28969.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28969.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T15:15:52.183", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json index 937306b0e07..f19084b453e 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28993.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-07-17T15:15:13.860", "lastModified": "2024-07-18T12:28:43.707", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29068.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29068.json index bdd02627989..a09fd457848 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29068.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@ubuntu.com", "published": "2024-07-25T20:15:04.280", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29069.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29069.json index 88469e57a4f..208af0a778c 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29069.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@ubuntu.com", "published": "2024-07-25T20:15:04.483", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29168.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29168.json index 44462fb0923..bced686393d 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29168.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29168.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-13T15:15:52.433", "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29977.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29977.json index a183abbe270..ee6bbe20686 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29977.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29977.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly validate\u00a0synced reactions, when shared channels are enabled,\u00a0which allows a malicious remote to create arbitrary reactions on arbitrary posts" + }, + { + "lang": "es", + "value": " Las versiones 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 de Mattermost no validan correctamente las reacciones sincronizadas cuando los canales compartidos est\u00e1n habilitados, lo que permite que un control remoto malicioso cree reacciones arbitrarias en publicaciones arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json index 78229ad8794..20d44719770 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30057.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-06-13T20:15:12.457", "lastModified": "2024-06-26T18:15:12.910", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30163.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30163.json index a2c6a8185f5..f12e9f1e73c 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30163.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30163.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-07T17:15:50.267", "lastModified": "2024-06-07T19:24:09.243", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31881.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31881.json index a41dc626424..335c760cfcb 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31881.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31881.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-12T19:15:50.710", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31916.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31916.json index e5675811377..f96d125ddc9 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31916.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31916.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-27T18:15:17.857", "lastModified": "2024-06-27T19:25:12.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32230.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32230.json index 7abb25c1564..df84f57fb94 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32230.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32230.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T21:15:03.617", "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32758.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32758.json index ebef71648c7..f8dacc9f83e 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32758.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32758.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productsecurity@jci.com", "published": "2024-08-01T22:15:24.640", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32857.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32857.json index 6aca79c23c0..01996983fe1 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32857.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32857.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-31T09:15:03.297", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32862.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32862.json index 7e76f123115..ff3eb58444b 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32862.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32862.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productsecurity@jci.com", "published": "2024-08-01T22:15:24.783", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32863.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32863.json index 90b2eb4a7a4..de093702ab3 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32863.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32863.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productsecurity@jci.com", "published": "2024-08-01T21:15:26.920", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32864.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32864.json index d1ce5c93aad..31f537d7a10 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32864.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32864.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productsecurity@jci.com", "published": "2024-08-01T21:15:27.150", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32865.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32865.json index f1d77e40d1a..606f112d5e9 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32865.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32865.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productsecurity@jci.com", "published": "2024-08-01T22:15:24.987", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32931.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32931.json index 6a695a32528..99835b9a57e 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32931.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32931.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productsecurity@jci.com", "published": "2024-08-01T22:15:25.190", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33001.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33001.json index 40a9869f830..4fb6064d0b8 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33001.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33001.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:10.393", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json index dfd217a67bd..6b82f7ff5ad 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.170", "lastModified": "2024-08-01T13:51:54.967", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34012.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34012.json index d0aec4495e2..ce170404178 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34012.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34012.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@acronis.com", "published": "2024-06-14T10:15:10.047", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34683.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34683.json index f3012e22ba1..994095f6cf4 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34683.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34683.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:10.623", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34684.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34684.json index 3491aa851f2..e6d910dee3f 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34684.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34684.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:10.863", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json index 3bc387f1e29..1437017b092 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34686.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:11.080", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34688.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34688.json index ae3b3eafd4b..daae14ec514 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34688.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34688.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:11.310", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34690.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34690.json index 68067c12b00..6f3d846e930 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34690.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34690.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:11.547", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34691.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34691.json index 9b62fe0cfa9..a3c1475afb0 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34691.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34691.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:11.780", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35116.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35116.json index a8f5d552099..2769823eb2d 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35116.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35116.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-28T19:15:05.677", "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35156.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35156.json index 92cdfc0ffaf..275422db289 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35156.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-28T19:15:05.917", "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35750.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35750.json index 02736e6ff53..478ebe9e6ca 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35750.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35750.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T13:15:57.137", "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35753.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35753.json index efbf91f93b7..a0b2e9f3b85 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35753.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35753.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T11:15:49.193", "lastModified": "2024-07-19T18:31:44.157", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36287.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36287.json index b9856086cc0..434ffede625 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36287.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36287.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-06-14T09:15:09.450", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36492.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36492.json index 744b12f459c..cf20e74d029 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36492.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36492.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to disallow the modification of local users when syncing users in shared channels. which allows a malicious remote to overwrite an existing local user." + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 no permiten la modificaci\u00f3n de usuarios locales al sincronizar usuarios en canales compartidos lo que permite que un control remoto malicioso sobrescriba a un usuario local existente." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36990.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36990.json index bf81a25d11c..e4289709343 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36990.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36990.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:07.600", "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36992.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36992.json index aeecae2d9b0..0e9a9bbffb8 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36992.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36992.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:08.077", "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36993.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36993.json index 7bae1589438..24e04a12852 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36993.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36993.json @@ -3,7 +3,7 @@ "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:08.290", "lastModified": "2024-07-02T12:09:16.907", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37100.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37100.json index 9bc57dbb877..92d6026bd37 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37100.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37100.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-22T10:15:04.173", "lastModified": "2024-07-26T13:27:50.583", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37127.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37127.json index 1ae801124e7..76663a17321 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37127.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37127.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-31T09:15:03.840", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37129.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37129.json index b765f077099..fd1622b3a88 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37129.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37129.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-31T09:15:04.290", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37142.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37142.json index b69af97ab2a..d5150f22927 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37142.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37142.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-07-31T09:15:04.700", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37176.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37176.json index 19d4e1a6785..fa557a3f4ff 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37176.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37176.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@sap.com", "published": "2024-06-11T03:15:12.020", "lastModified": "2024-06-11T13:54:12.057", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37182.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37182.json index dedf069d004..f0ec8f48115 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37182.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37182.json @@ -3,7 +3,7 @@ "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-06-14T09:15:10.013", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37313.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37313.json index fe0648398e0..91957fea2b7 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37313.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37313.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T15:15:51.427", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37314.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37314.json index 0b1bec07f0f..c1918463ef7 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37314.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37314.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T15:15:51.697", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37315.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37315.json index f03f9c63f76..9b982c4de3b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37315.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37315.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:11.473", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37316.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37316.json index e58efa93ecf..1630df90fcf 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37316.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37316.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:11.707", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37317.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37317.json index 31e20bfd9fe..f436fbf3fa6 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37317.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37317.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:11.960", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37343.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37343.json index 4bdda659d24..be3eacb69d0 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37343.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37343.json @@ -3,7 +3,7 @@ "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2024-06-20T17:15:50.910", "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37344.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37344.json index ae00455cddf..19fe8f820ca 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37344.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37344.json @@ -3,7 +3,7 @@ "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2024-06-20T17:15:51.153", "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37345.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37345.json index 9acd15b26eb..110400ef32c 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37345.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37345.json @@ -3,7 +3,7 @@ "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2024-06-20T17:15:51.397", "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37346.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37346.json index d7b765c537b..958a1ac2ed6 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37346.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37346.json @@ -3,7 +3,7 @@ "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2024-06-20T17:15:51.623", "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37347.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37347.json index f0eb0fef72b..893cbfc2846 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37347.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2024-06-20T17:15:51.853", "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37348.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37348.json index 4f4ec9644b5..a9ad993e71b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37348.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37348.json @@ -3,7 +3,7 @@ "sourceIdentifier": "SecurityResponse@netmotionsoftware.com", "published": "2024-06-20T17:15:52.080", "lastModified": "2024-06-21T11:22:01.687", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37476.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37476.json index ce54004aac2..2d2863e4ce2 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37476.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37476.json @@ -3,7 +3,7 @@ "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-04T18:15:10.210", "lastModified": "2024-07-19T16:52:39.713", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37532.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37532.json index 89507098113..eefae3fea70 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37532.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37532.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-20T14:15:10.920", "lastModified": "2024-06-20T16:07:50.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37624.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37624.json index ee2cdcdacff..074711fd503 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37624.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37624.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T14:15:11.680", "lastModified": "2024-07-18T20:58:16.307", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37635.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37635.json index 1006090812c..2a90fa35cc8 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37635.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37635.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:52.630", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37883.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37883.json index b9319206e10..032c2a7f95c 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37883.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37883.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:13.107", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37884.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37884.json index b2aba2933b7..0028721e586 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37884.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37884.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:13.340", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37885.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37885.json index ae49976a002..daa32faf5c4 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37885.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:13.570", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37887.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37887.json index c73c78862af..ffbe53ae4ed 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37887.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37887.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T16:15:14.237", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37888.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37888.json index 1a7c22c25a1..fc04136a3c3 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37888.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37888.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T18:15:27.790", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37889.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37889.json index 7999a389e03..9288fc9171f 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37889.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37889.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-14T20:15:11.873", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json index 9b19903eced..f664e70a0b0 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37906.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.3.9, there is an SQL Injection in the `/adm_program/modules/ecards/ecard_send.php` source file of the Admidio Application. The SQL Injection results in a compromise of the application's database. The value of `ecard_recipients `POST parameter is being directly concatenated with the SQL query in the source code causing the SQL Injection. The SQL Injection can be exploited by a member user, using blind condition-based, time-based, and Out of band interaction SQL Injection payloads. This vulnerability is fixed in 4.3.9." + }, + { + "lang": "es", + "value": "Admidio es un sistema de gesti\u00f3n de usuarios gratuito y de c\u00f3digo abierto para sitios web de organizaciones y grupos. En Admidio anterior a la versi\u00f3n 4.3.9, hay una inyecci\u00f3n SQL en el archivo fuente `/adm_program/modules/ecards/ecard_send.php` de la aplicaci\u00f3n Admidio. La inyecci\u00f3n SQL resulta en un compromiso de la base de datos de la aplicaci\u00f3n. El valor del par\u00e1metro POST `ecard_recipients `se concatena directamente con la consulta SQL en el c\u00f3digo fuente que causa la inyecci\u00f3n SQL. La inyecci\u00f3n SQL puede ser explotada por un usuario miembro, utilizando cargas \u00fatiles de inyecci\u00f3n SQL ciegas basadas en condiciones, basadas en tiempo y fuera de banda. Esta vulnerabilidad se solucion\u00f3 en 4.3.9." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json index 4620dc990ce..42b9bb310ab 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38082.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-06-20T20:15:18.257", "lastModified": "2024-06-26T18:15:15.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json index 4ea428e554f..0f1d2731bb3 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38083.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-06-13T20:15:15.157", "lastModified": "2024-06-26T18:15:15.170", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json index e6dbae72e6b..aebe3b6d0bf 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38093.json @@ -3,7 +3,7 @@ "sourceIdentifier": "secure@microsoft.com", "published": "2024-06-20T20:15:18.527", "lastModified": "2024-06-26T18:15:15.260", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38312.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38312.json index 141af90e0ad..0e91545782f 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38312.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38312.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@mozilla.org", "published": "2024-06-13T20:15:15.370", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38322.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38322.json index 06a950cddea..e51f5f12662 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38322.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38322.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-28T19:15:06.317", "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38428.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38428.json index 83749edd5e5..5195f7fdf1a 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38428.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38428.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-06-16T03:15:08.430", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38435.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38435.json index e876f70cc21..7755ac20233 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38435.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38435.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-07-21T08:15:05.780", "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38436.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38436.json index db46ff8e6f2..fac3977718d 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38436.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38436.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-07-21T08:15:05.997", "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json index 5cc240f2e82..35b196e0d1d 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-02T04:17:27.750", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json index d3db6b955a3..294fee55284 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38529.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.3.10, there is a Remote Code Execution Vulnerability in the Message module of the Admidio Application, where it is possible to upload a PHP file in the attachment. The uploaded file can be accessed publicly through the URL `{admidio_base_url}/adm_my_files/messages_attachments/{file_name}`. The vulnerability is caused due to the lack of file extension verification, allowing malicious files to be uploaded to the server and public availability of the uploaded file. This vulnerability is fixed in 4.3.10." + }, + { + "lang": "es", + "value": "Admidio es un sistema de gesti\u00f3n de usuarios gratuito y de c\u00f3digo abierto para sitios web de organizaciones y grupos. En Admidio anterior a la versi\u00f3n 4.3.10, hay una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el m\u00f3dulo de mensajes de la aplicaci\u00f3n Admidio, donde es posible cargar un archivo PHP en el archivo adjunto. Se puede acceder p\u00fablicamente al archivo subido a trav\u00e9s de la URL `{admidio_base_url}/adm_my_files/messages_attachments/{file_name}`. La vulnerabilidad se debe a la falta de verificaci\u00f3n de la extensi\u00f3n del archivo, lo que permite cargar archivos maliciosos en el servidor y la disponibilidad p\u00fablica del archivo cargado. Esta vulnerabilidad se solucion\u00f3 en 4.3.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38876.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38876.json index b1ee0543ff8..6a6ae5ee94f 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38876.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38876.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-08-02T11:16:41.643", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38877.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38877.json index a7080ae9592..9d79ffbabac 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38877.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38877.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-08-02T11:16:41.957", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38878.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38878.json index 7d5c51c56af..e477e677014 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38878.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38878.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-08-02T11:16:42.260", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38879.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38879.json index 074f77a1411..a43cedcd8c6 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38879.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38879.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-08-02T11:16:42.510", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json index 1ba1a19b17f..a68e23a60d7 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38953.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T14:15:05.600", "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json index f24e11b7e0b..5b2fa3c6b14 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39036.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.460", "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39274.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39274.json index 4c0f4b811d3..aeb3bea7a82 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39274.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39274.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to properly validate that\u00a0the channel that comes from the sync message is a shared channel, when shared channels are enabled, which allows a malicious remote to add users to arbitrary teams and channels" + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 y 9.8.x <= 9.8.1 no validan correctamente que el canal que proviene del mensaje de sincronizaci\u00f3n es un canal compartido, cuando los canales compartidos est\u00e1n habilitados, lo que permite que un control remoto malicioso agregue usuarios a equipos y canales arbitrarios" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39777.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39777.json index ccc7aeb9877..64cbbaabd90 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39777.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39777.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to disallow\u00a0unsolicited invites to expose access to local channels, when shared channels are enabled,\u00a0which allows a malicious\u00a0remote to send an invite with the ID of an existing local channel, and that local channel will then become shared without the consent of the local admin." + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 y 9.8.x <= 9.8.1 no permiten invitaciones no solicitadas para exponer el acceso a canales locales, cuando los canales compartidos est\u00e1n habilitados, lo que permite que un control remoto malicioso env\u00ede una invitaci\u00f3n con el ID de un canal local existente, y ese canal local se compartir\u00e1 sin el consentimiento del administrador local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39832.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39832.json index 3274f93ab8b..5dc3558ca1c 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39832.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39832.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to properly safeguard an error handling which allows a malicious remote to permanently delete local data by abusing dangerous error handling, when share channels were enabled." + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 no protegen adecuadamente un manejo de errores que permite que un control remoto malicioso eliminar permanentemente datos locales abusando del manejo de errores peligroso, cuando se habilitaron los canales compartidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39837.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39837.json index 05a2582828d..54cc0bb42b3 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39837.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39837.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 fail to properly restrict channel creation\u00a0which allows\u00a0a malicious remote to create arbitrary channels,\u00a0when shared channels were enabled." + }, + { + "lang": "es", + "value": " Las versiones 9.9.x <= 9.9.0, 9.5.x <= 9.5.6 de Mattermost no restringen adecuadamente la creaci\u00f3n de canales, lo que permite que un control remoto malicioso cree canales arbitrarios, cuando los canales compartidos estaban habilitados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39839.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39839.json index 18834fd2430..e4143470500 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39839.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39839.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to disallow\u00a0users to set their own remote username, when shared channels were enabled, which allows a user on a remote to set their remote username prop to an arbitrary string, which would be then synced to the local server as long as the user hadn't been synced before." + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 no permiten que los usuarios establezcan su propio nombre de usuario remoto cuando se comparte. Se habilitaron canales, lo que permite a un usuario en un control remoto configurar su nombre de usuario remoto en una cadena arbitraria, que luego se sincronizar\u00eda con el servidor local siempre que el usuario no se hubiera sincronizado antes." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json index 1ed5df0a0b9..d108161e89a 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39875.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:19.803", "lastModified": "2024-07-09T18:19:14.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json index 7ccd23e1aef..ad2a1bee5b1 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39876.json @@ -3,7 +3,7 @@ "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-09T12:15:20.047", "lastModified": "2024-07-09T18:19:14.047", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39945.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39945.json index eb83ec526a9..7ce57a0adcd 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39945.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39945.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:03.077", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39946.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39946.json index d5d53c5a906..0d00ebac755 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39946.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39946.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:03.597", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39947.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39947.json index 863ecbb8c53..a8d36ef5c8b 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39947.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39947.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:04.840", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json index 080144f2548..61dce11a5e5 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39949.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cybersecurity@dahuatech.com", "published": "2024-07-31T04:15:05.503", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3938.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3938.json index 8bd5e3a81e5..9c26387f4f6 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3938.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3938.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@dotcms.com", "published": "2024-07-25T22:15:08.903", "lastModified": "2024-07-26T14:15:02.773", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json b/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json index 003dd758fd6..95cfa9bcf2e 100644 --- a/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json +++ b/CVE-2024/CVE-2024-400xx/CVE-2024-40051.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T18:15:03.700", "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json index bc5dadf0947..33e537e3437 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-20T04:15:03.853", "lastModified": "2024-07-22T13:00:53.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json index 94501461920..f82959b2daf 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.873", "lastModified": "2024-07-17T13:34:20.520", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json index 20097be357d..0d317398202 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40464.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:17.640", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json index 054d6d91687..964a790e613 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T19:15:11.870", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40719.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40719.json index 04ac5d050d4..5c4562469da 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40719.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40719.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-02T10:16:00.470", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40720.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40720.json index 53415560bab..15c25846fa4 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40720.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40720.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-02T11:16:42.763", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40721.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40721.json index 49e6963e50c..a3bdd517244 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40721.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40721.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-02T11:16:43.020", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40722.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40722.json index a636dbdcd47..bf32ddd83cf 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40722.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40722.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-02T11:16:43.283", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40723.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40723.json index 1626f6d00db..abda0de93ed 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40723.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40723.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-02T11:16:43.520", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json index d7e110f2270..531ae5fb45a 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40883.json @@ -3,7 +3,7 @@ "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-08-01T02:15:02.023", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4005.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4005.json index a79db2cfef5..6860f060aa9 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4005.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4005.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:12.753", "lastModified": "2024-07-29T16:35:52.363", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41020.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41020.json index 9acbbdd6266..8d50fdc1a57 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41020.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41020.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Fix fcntl/close race recovery compat path\n\nWhen I wrote commit 3cad1bc01041 (\"filelock: Remove locks reliably when\nfcntl/close race is detected\"), I missed that there are two copies of the\ncode I was patching: The normal version, and the version for 64-bit offsets\non 32-bit kernels.\nThanks to Greg KH for stumbling over this while doing the stable\nbackport...\n\nApply exactly the same fix to the compat path for 32-bit kernels." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: filelock: corrige la ruta de compatibilidad de recuperaci\u00f3n de fcntl/close race Cuando escrib\u00ed la confirmaci\u00f3n 3cad1bc01041 (\"filelock: elimina los bloqueos de manera confiable cuando se detecta fcntl/close race\"), me perd\u00ed que hay dos copias del c\u00f3digo que estaba parcheando: la versi\u00f3n normal y la versi\u00f3n para compensaciones de 64 bits en n\u00facleos de 32 bits. Gracias a Greg KH por tropezar con esto mientras hac\u00eda el backport estable... Aplique exactamente la misma soluci\u00f3n a la ruta de compatibilidad para kernels de 32 bits." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json index 2d9e4340802..816d32a106a 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41021.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()\n\nThere is no support for HWPOISON, MEMORY_FAILURE, or ARCH_HAS_COPY_MC on\ns390. Therefore we do not expect to see VM_FAULT_HWPOISON in\ndo_exception().\n\nHowever, since commit af19487f00f3 (\"mm: make PTE_MARKER_SWAPIN_ERROR more\ngeneral\"), it is possible to see VM_FAULT_HWPOISON in combination with\nPTE_MARKER_POISONED, even on architectures that do not support HWPOISON\notherwise. In this case, we will end up on the BUG() in do_exception().\n\nFix this by treating VM_FAULT_HWPOISON the same as VM_FAULT_SIGBUS, similar\nto x86 when MEMORY_FAILURE is not configured. Also print unexpected fault\nflags, for easier debugging.\n\nNote that VM_FAULT_HWPOISON_LARGE is not expected, because s390 cannot\nsupport swap entries on other levels than PTE level." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/mm: corrija el manejo de VM_FAULT_HWPOISON en do_exception() No hay soporte para HWPOISON, MEMORY_FAILURE o ARCH_HAS_COPY_MC en s390. Por lo tanto, no esperamos ver VM_FAULT_HWPOISON en do_exception(). Sin embargo, desde la confirmaci\u00f3n af19487f00f3 (\"mm: hacer que PTE_MARKER_SWAPIN_ERROR sea m\u00e1s general\"), es posible ver VM_FAULT_HWPOISON en combinaci\u00f3n con PTE_MARKER_POISONED, incluso en arquitecturas que no admiten HWPOISON de otra manera. En este caso, terminaremos en el ERROR() en do_exception(). Solucione este problema tratando VM_FAULT_HWPOISON de la misma manera que VM_FAULT_SIGBUS, similar a x86 cuando MEMORY_FAILURE no est\u00e1 configurado. Tambi\u00e9n imprima indicadores defallos inesperadas para facilitar la depuraci\u00f3n. Tenga en cuenta que no se espera VM_FAULT_HWPOISON_LARGE, porque s390 no puede admitir entradas de intercambio en otros niveles que no sean el nivel PTE." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41022.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41022.json index 16b0eb278fd..6b44f2515c9 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41022.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41022.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()\n\nThe \"instance\" variable needs to be signed for the error handling to work." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdgpu: corrigi\u00f3 el error de firma en sdma_v4_0_process_trap_irq() La variable \"instance\" debe estar firmada para que funcione el manejo de errores." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json index bcf91254406..c10679481ca 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41023.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix task_struct reference leak\n\nDuring the execution of the following stress test with linux-rt:\n\nstress-ng --cyclic 30 --timeout 30 --minimize --quiet\n\nkmemleak frequently reported a memory leak concerning the task_struct:\n\nunreferenced object 0xffff8881305b8000 (size 16136):\n comm \"stress-ng\", pid 614, jiffies 4294883961 (age 286.412s)\n object hex dump (first 32 bytes):\n 02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@..............\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n debug hex dump (first 16 bytes):\n 53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 S...............\n backtrace:\n [<00000000046b6790>] dup_task_struct+0x30/0x540\n [<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0\n [<00000000ced59777>] kernel_clone+0xb0/0x770\n [<00000000a50befdc>] __do_sys_clone+0xb6/0xf0\n [<000000001dbf2008>] do_syscall_64+0x5d/0xf0\n [<00000000552900ff>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nThe issue occurs in start_dl_timer(), which increments the task_struct\nreference count and sets a timer. The timer callback, dl_task_timer,\nis supposed to decrement the reference count upon expiration. However,\nif enqueue_task_dl() is called before the timer expires and cancels it,\nthe reference count is not decremented, leading to the leak.\n\nThis patch fixes the reference leak by ensuring the task_struct\nreference count is properly decremented when the timer is canceled." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: sched/deadline: Reparar fuga de referencia de task_struct Durante la ejecuci\u00f3n de la siguiente prueba de estr\u00e9s con linux-rt: estr\u00e9s-ng --ciclic 30 --timeout 30 --minimize --quiet kmemleak inform\u00f3 con frecuencia una p\u00e9rdida de memoria relacionada con task_struct: objeto sin referencia 0xffff8881305b8000 (tama\u00f1o 16136): comm \"stress-ng\", pid 614, jiffies 4294883961 (edad 286.412 s) volcado hexadecimal de objeto (primeros 32 bytes): 02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .@.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ volcado hexadecimal de depuraci\u00f3n (primeros 16 bytes): 53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 S............... rastreo inverso : [<00000000046b6790>] dup_task_struct+0x30/0x540 [<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0 [<00000000ced59777>] kernel_clone+0xb0/0x770 [<00000000a50befd c>] __do_sys_clone+0xb6/0xf0 [<000000001dbf2008>] do_syscall_64+0x5d/ 0xf0 [<00000000552900ff>] Entry_SYSCALL_64_after_hwframe+0x6e/0x76 El problema ocurre en start_dl_timer(), que incrementa el recuento de referencias de task_struct y establece un temporizador. Se supone que la devoluci\u00f3n de llamada del temporizador, dl_task_timer, disminuye el recuento de referencia al expirar. Sin embargo, si se llama a enqueue_task_dl() antes de que expire el temporizador y lo cancela, el recuento de referencias no disminuye, lo que provoca la fuga. Este parche corrige la fuga de referencia al garantizar que el recuento de referencias de task_struct disminuya correctamente cuando se cancela el temporizador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json index 7edba35cda0..0482999c095 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41024.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Restrict untrusted app to attach to privileged PD\n\nUntrusted application with access to only non-secure fastrpc device\nnode can attach to root_pd or static PDs if it can make the respective\ninit request. This can cause problems as the untrusted application\ncan send bad requests to root_pd or static PDs. Add changes to reject\nattach to privileged PDs if the request is being made using non-secure\nfastrpc device node." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: restringe la aplicaci\u00f3n que no es de confianza para que se conecte a un PD privilegiado. La aplicaci\u00f3n que no es de confianza con acceso \u00fanicamente al nodo de dispositivo fastrpc no seguro puede conectarse a root_pd o a PD est\u00e1ticos si puede realizar el inicio respectivo. pedido. Esto puede causar problemas ya que la aplicaci\u00f3n que no es de confianza puede enviar solicitudes incorrectas a root_pd o PD est\u00e1ticos. Agregue cambios para rechazar la conexi\u00f3n a PD privilegiados si la solicitud se realiza mediante un nodo de dispositivo fastrpc no seguro." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41025.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41025.json index 655b5ec6725..88e433b56cb 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41025.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41025.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: Fix memory leak in audio daemon attach operation\n\nAudio PD daemon send the name as part of the init IOCTL call. This\nname needs to be copied to kernel for which memory is allocated.\nThis memory is never freed which might result in memory leak. Free\nthe memory when it is not needed." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: corrige la p\u00e9rdida de memoria en la operaci\u00f3n de conexi\u00f3n del daemon de audio. El daemon PD de audio env\u00eda el nombre como parte de la llamada init IOCTL. Este nombre debe copiarse en el kernel para el que se asigna la memoria. Esta memoria nunca se libera, lo que podr\u00eda provocar una p\u00e9rdida de memoria. Libera la memoria cuando no sea necesaria." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41026.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41026.json index 2d7e7a63c8e..de7bd2d4ba2 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41026.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41026.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length\n\nNo check is done on the size of the data to be transmiited. This causes\na kernel panic when this size exceeds the sg_miter's length.\n\nLimit the number of transmitted bytes to sgm->length." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mmc: davinci_mmc: Evita que el tama\u00f1o de los datos transmitidos exceda la longitud de sgm No se realiza ninguna verificaci\u00f3n del tama\u00f1o de los datos a transmitir. Esto provoca un p\u00e1nico en el kernel cuando este tama\u00f1o excede la longitud de sg_miter. Limite el n\u00famero de bytes transmitidos a sgm->length." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41027.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41027.json index ede429c7915..1c04ee18e31 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41027.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41027.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nFix userfaultfd_api to return EINVAL as expected\n\nCurrently if we request a feature that is not set in the Kernel config we\nfail silently and return all the available features. However, the man\npage indicates we should return an EINVAL.\n\nWe need to fix this issue since we can end up with a Kernel warning should\na program request the feature UFFD_FEATURE_WP_UNPOPULATED on a kernel with\nthe config not set with this feature.\n\n [ 200.812896] WARNING: CPU: 91 PID: 13634 at mm/memory.c:1660 zap_pte_range+0x43d/0x660\n [ 200.820738] Modules linked in:\n [ 200.869387] CPU: 91 PID: 13634 Comm: userfaultfd Kdump: loaded Not tainted 6.9.0-rc5+ #8\n [ 200.877477] Hardware name: Dell Inc. PowerEdge R6525/0N7YGH, BIOS 2.7.3 03/30/2022\n [ 200.885052] RIP: 0010:zap_pte_range+0x43d/0x660" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Corrija userfaultfd_api para devolver EINVAL como se esperaba. Actualmente, si solicitamos una funci\u00f3n que no est\u00e1 configurada en la configuraci\u00f3n del kernel, fallamos silenciosamente y devolvemos todas las funciones disponibles. Sin embargo, la p\u00e1gina de manual indica que debemos devolver un EINVAL. Necesitamos solucionar este problema ya que podemos terminar con una advertencia del Kernel si un programa solicita la caracter\u00edstica UFFD_FEATURE_WP_UNPOPULATED en un kernel con la configuraci\u00f3n no configurada con esta caracter\u00edstica. [ 200.812896] ADVERTENCIA: CPU: 91 PID: 13634 en mm/memory.c:1660 zap_pte_range+0x43d/0x660 [ 200.820738] M\u00f3dulos vinculados en: [ 200.869387] CPU: 91 PID: 13634 Comm: userfaultfd Kdump: cargado No contiene ted 6.9. 0-rc5+ #8 [ 200.877477] Nombre del hardware: Dell Inc. PowerEdge R6525/0N7YGH, BIOS 2.7.3 30/03/2022 [ 200.885052] RIP: 0010:zap_pte_range+0x43d/0x660" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json index 21b965fa63a..fbbb4bcc405 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: toshiba_acpi: Fix array out-of-bounds access\n\nIn order to use toshiba_dmi_quirks[] together with the standard DMI\nmatching functions, it must be terminated by a empty entry.\n\nSince this entry is missing, an array out-of-bounds access occurs\nevery time the quirk list is processed.\n\nFix this by adding the terminating empty entry." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: plataforma/x86: toshiba_acpi: corrige el acceso fuera de los l\u00edmites de la matriz. Para utilizar toshiba_dmi_quirks[] junto con las funciones est\u00e1ndar de coincidencia DMI, debe terminar con una entrada vac\u00eda. Dado que falta esta entrada, se produce un acceso fuera de los l\u00edmites a la matriz cada vez que se procesa la lista de peculiaridades. Solucione este problema agregando la entrada vac\u00eda final." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41029.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41029.json index 924f7dc3741..955cdc1ba0c 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41029.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: core: limit cell sysfs permissions to main attribute ones\n\nThe cell sysfs attribute should not provide more access to the nvmem\ndata than the main attribute itself.\nFor example if nvme_config::root_only was set, the cell attribute\nwould still provide read access to everybody.\n\nMask out permissions not available on the main attribute." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmem: core: limita los permisos de cell sysfs a los del atributo principal. El atributo cell sysfs no debe proporcionar m\u00e1s acceso a los datos de nvmem que el propio atributo principal. Por ejemplo, si se configur\u00f3 nvme_config::root_only, el atributo de celda a\u00fan proporcionar\u00eda acceso de lectura a todos. Oculte los permisos que no est\u00e1n disponibles en el atributo principal." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41030.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41030.json index e5b8c24229b..6d8146a20fa 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41030.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41030.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: discard write access to the directory open\n\nmay_open() does not allow a directory to be opened with the write access.\nHowever, some writing flags set by client result in adding write access\non server, making ksmbd incompatible with FUSE file system. Simply, let's\ndiscard the write access when opening a directory.\n\nlist_add corruption. next is NULL.\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:26!\npc : __list_add_valid+0x88/0xbc\nlr : __list_add_valid+0x88/0xbc\nCall trace:\n__list_add_valid+0x88/0xbc\nfuse_finish_open+0x11c/0x170\nfuse_open_common+0x284/0x5e8\nfuse_dir_open+0x14/0x24\ndo_dentry_open+0x2a4/0x4e0\ndentry_open+0x50/0x80\nsmb2_open+0xbe4/0x15a4\nhandle_ksmbd_work+0x478/0x5ec\nprocess_one_work+0x1b4/0x448\nworker_thread+0x25c/0x430\nkthread+0x104/0x1d4\nret_from_fork+0x10/0x20" + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ksmbd: descarta el acceso de escritura al directorio abierto may_open() no permite abrir un directorio con acceso de escritura. Sin embargo, algunos indicadores de escritura establecidos por el cliente dan como resultado la adici\u00f3n de acceso de escritura en el servidor, lo que hace que ksmbd sea incompatible con el sistema de archivos FUSE. Simplemente, descartemos el acceso de escritura al abrir un directorio. list_add corrupci\u00f3n. lo siguiente es NULO. ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en lib/list_debug.c:26! pc: __list_add_valid+0x88/0xbc lr: __list_add_valid+0x88/0xbc Rastreo de llamadas: __list_add_valid+0x88/0xbc fuse_finish_open+0x11c/0x170 fuse_open_common+0x284/0x5e8 fuse_dir_open+0x14/0x24 a4/0x4e0 dentry_open+0x50/0x80 smb2_open+0xbe4 /0x15a4 handle_ksmbd_work+0x478/0x5ec process_one_work+0x1b4/0x448 worker_thread+0x25c/0x430 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41031.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41031.json index 46200cdb77f..e5dce006692 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41031.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41031.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/filemap: skip to create PMD-sized page cache if needed\n\nOn ARM64, HPAGE_PMD_ORDER is 13 when the base page size is 64KB. The\nPMD-sized page cache can't be supported by xarray as the following error\nmessages indicate.\n\n------------[ cut here ]------------\nWARNING: CPU: 35 PID: 7484 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\nModules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\\nnft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\\nnft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\nip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm \\\nfuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 \\\nsha1_ce virtio_net net_failover virtio_console virtio_blk failover \\\ndimlib virtio_mmio\nCPU: 35 PID: 7484 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9\nHardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\npstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : xas_split_alloc+0xf8/0x128\nlr : split_huge_page_to_list_to_order+0x1c4/0x720\nsp : ffff800087a4f6c0\nx29: ffff800087a4f6c0 x28: ffff800087a4f720 x27: 000000001fffffff\nx26: 0000000000000c40 x25: 000000000000000d x24: ffff00010625b858\nx23: ffff800087a4f720 x22: ffffffdfc0780000 x21: 0000000000000000\nx20: 0000000000000000 x19: ffffffdfc0780000 x18: 000000001ff40000\nx17: 00000000ffffffff x16: 0000018000000000 x15: 51ec004000000000\nx14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020\nx11: 51ec000000000000 x10: 51ece1c0ffff8000 x9 : ffffbeb961a44d28\nx8 : 0000000000000003 x7 : ffffffdfc0456420 x6 : ffff0000e1aa6eb8\nx5 : 20bf08b4fe778fca x4 : ffffffdfc0456420 x3 : 0000000000000c40\nx2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\nCall trace:\n xas_split_alloc+0xf8/0x128\n split_huge_page_to_list_to_order+0x1c4/0x720\n truncate_inode_partial_folio+0xdc/0x160\n truncate_inode_pages_range+0x1b4/0x4a8\n truncate_pagecache_range+0x84/0xa0\n xfs_flush_unmap_range+0x70/0x90 [xfs]\n xfs_file_fallocate+0xfc/0x4d8 [xfs]\n vfs_fallocate+0x124/0x2e8\n ksys_fallocate+0x4c/0xa0\n __arm64_sys_fallocate+0x24/0x38\n invoke_syscall.constprop.0+0x7c/0xd8\n do_el0_svc+0xb4/0xd0\n el0_svc+0x44/0x1d8\n el0t_64_sync_handler+0x134/0x150\n el0t_64_sync+0x17c/0x180\n\nFix it by skipping to allocate PMD-sized page cache when its size is\nlarger than MAX_PAGECACHE_ORDER. For this specific case, we will fall to\nregular path where the readahead window is determined by BDI's sysfs file\n(read_ahead_kb)." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm/filemap: omita para crear un cach\u00e9 de p\u00e1gina del tama\u00f1o de PMD si es necesario. En ARM64, HPAGE_PMD_ORDER es 13 cuando el tama\u00f1o de p\u00e1gina base es 64 KB. Xarray no puede admitir la cach\u00e9 de p\u00e1ginas de tama\u00f1o PMD, como lo indican los siguientes mensajes de error. ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 35 PID: 7484 en lib/xarray.c:1025 xas_split_alloc+0xf8/0x128 M\u00f3dulos vinculado en: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib \\ nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct \\ nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\ ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm \\ fuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 \\ sha1_ce virtio_net net_failover virtio_console virtio_blk failover \\ dimlib virtio_mmio CPU: 35 PID : 7484 Comm: prueba Kdump: cargado Contaminado: GW 6.10.0-rc5-gavin+ #9 Nombre del hardware: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 24/05/2024 pstate: 83400005 (Nzcv daif +PAN - UAO +TCO +DIT -SSBS BTYPE=--) pc: xas_split_alloc+0xf8/0x128 lr: split_huge_page_to_list_to_order+0x1c4/0x720 sp: ffff800087a4f6c0 x29: ffff800087a4f6c0 x28: 0 x27: 000000001fffffff x26: 0000000000000c40 x25: 000000000000000d x24: ffff00010625b858 x23: ffff800087a4f720 x22: ffffffdfc0780000 x21: 0000000000000000 x20: 0000000000000000 x19: ffffffdfc0780000 x18: 000000001ff40000 x17: 00000000ffffffff x16: 0018000000000 x15: 51ec004000000000 x14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020 x11: 51ec000000000000 x10: 1c0ffff8000 x9: ffffbeb961a44d28 x8: 0000000000000003 x7: ffffffdfc0456420 x6: ffff0000e1aa6eb8 x5: 20bf08b4fe778fca x4: ffffffdfc0456420 x3: 0000000000000c40 x2: 000000000000000d x1: 000000000000000c x0: 0000000000 000000 Rastreo de llamadas: xas_split_alloc+0xf8/0x128 split_huge_page_to_list_to_order+0x1c4/0x720 truncate_inode_partial_folio+0xdc/0x160 truncate_inode_pages_range+0x1b4/0x4a8 truncate_pagecache_range+0x84/0xa0 xfs _flush_unmap_range+0x70 /0x90 [xfs] xfs_file_fallocate+0xfc/0x4d8 [xfs] vfs_fallocate+0x124/0x2e8 ksys_fallocate+0x4c/0xa0 __arm64_sys_fallocate+0x24/0x38 invoke_syscall.constprop.0+0x7c/0xd8 do_el0_ svc+0xb4/0xd0 el0_svc+0x44/0x1d8 el0t_64_sync_handler+0x134 /0x150 el0t_64_sync+0x17c/0x180 Corr\u00edjalo omitiendo la asignaci\u00f3n de cach\u00e9 de p\u00e1gina de tama\u00f1o PMD cuando su tama\u00f1o sea mayor que MAX_PAGECACHE_ORDER. Para este caso espec\u00edfico, recurriremos a la ruta normal donde la ventana de lectura anticipada est\u00e1 determinada por el archivo sysfs de BDI (read_ahead_kb)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41032.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41032.json index 1788e54c5b9..4f21764aee2 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41032.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: vmalloc: check if a hash-index is in cpu_possible_mask\n\nThe problem is that there are systems where cpu_possible_mask has gaps\nbetween set CPUs, for example SPARC. In this scenario addr_to_vb_xa()\nhash function can return an index which accesses to not-possible and not\nsetup CPU area using per_cpu() macro. This results in an oops on SPARC.\n\nA per-cpu vmap_block_queue is also used as hash table, incorrectly\nassuming the cpu_possible_mask has no gaps. Fix it by adjusting an index\nto a next possible CPU." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: vmalloc: comprueba si hay un \u00edndice hash en cpu_possible_mask El problema es que hay sistemas donde cpu_possible_mask tiene espacios entre las CPU configuradas, por ejemplo SPARC. En este escenario, la funci\u00f3n hash addr_to_vb_xa() puede devolver un \u00edndice que accede a un \u00e1rea de CPU no posible y no configurada usando la macro per_cpu(). Esto da como resultado un \u00a1Uy en SPARC! Tambi\u00e9n se utiliza una vmap_block_queue por CPU como tabla hash, asumiendo incorrectamente que cpu_possible_mask no tiene espacios. Solucionarlo ajustando un \u00edndice a la siguiente CPU posible." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41033.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41033.json index 26ab185cf77..4c87aedc248 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41033.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41033.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachestat: do not flush stats in recency check\n\nsyzbot detects that cachestat() is flushing stats, which can sleep, in its\nRCU read section (see [1]). This is done in the workingset_test_recent()\nstep (which checks if the folio's eviction is recent).\n\nMove the stat flushing step to before the RCU read section of cachestat,\nand skip stat flushing during the recency check.\n\n[1]: https://lore.kernel.org/cgroups/000000000000f71227061bdf97e0@google.com/" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cachestat: no vaciar estad\u00edsticas en comprobaci\u00f3n de actualidad syzbot detecta que cachestat() est\u00e1 vaciando estad\u00edsticas, que pueden dormir, en su secci\u00f3n de lectura de RCU (ver [1]). Esto se hace en el pasoworkingset_test_recent() (que verifica si el desalojo del folio es reciente). Mueva el paso de vaciado de estad\u00edsticas antes de la secci\u00f3n de lectura de RCU de cachestat y omita el vaciado de estad\u00edsticas durante la verificaci\u00f3n reciente. [1]: https://lore.kernel.org/cgroups/000000000000f71227061bdf97e0@google.com/" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41034.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41034.json index 141527eacdb..4a9bd6fb95c 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41034.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41034.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel bug on rename operation of broken directory\n\nSyzbot reported that in rename directory operation on broken directory on\nnilfs2, __block_write_begin_int() called to prepare block write may fail\nBUG_ON check for access exceeding the folio/page size.\n\nThis is because nilfs_dotdot(), which gets parent directory reference\nentry (\"..\") of the directory to be moved or renamed, does not check\nconsistency enough, and may return location exceeding folio/page size for\nbroken directories.\n\nFix this issue by checking required directory entries (\".\" and \"..\") in\nthe first chunk of the directory in nilfs_dotdot()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nilfs2: corrige el error del kernel en la operaci\u00f3n de cambio de nombre de un directorio roto Syzbot inform\u00f3 que en la operaci\u00f3n de cambio de nombre de directorio en un directorio roto en nilfs2, __block_write_begin_int() llamado para preparar la escritura en bloque puede fallar en la verificaci\u00f3n BUG_ON de acceso exceder el tama\u00f1o del folio/p\u00e1gina. Esto se debe a que nilfs_dotdot(), que obtiene la entrada de referencia del directorio principal (\"..\") del directorio que se va a mover o cambiar de nombre, no verifica la coherencia lo suficiente y puede devolver una ubicaci\u00f3n que exceda el tama\u00f1o de folio/p\u00e1gina para directorios rotos. Solucione este problema verificando las entradas de directorio requeridas (\".\" y \"..\") en el primer fragmento del directorio en nilfs_dotdot()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41035.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41035.json index 4a18f276585..943a6cc2e42 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41035.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41035.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\n\nSyzbot has identified a bug in usbcore (see the Closes: tag below)\ncaused by our assumption that the reserved bits in an endpoint\ndescriptor's bEndpointAddress field will always be 0. As a result of\nthe bug, the endpoint_is_duplicate() routine in config.c (and possibly\nother routines as well) may believe that two descriptors are for\ndistinct endpoints, even though they have the same direction and\nendpoint number. This can lead to confusion, including the bug\nidentified by syzbot (two descriptors with matching endpoint numbers\nand directions, where one was interrupt and the other was bulk).\n\nTo fix the bug, we will clear the reserved bits in bEndpointAddress\nwhen we parse the descriptor. (Note that both the USB-2.0 and USB-3.1\nspecs say these bits are \"Reserved, reset to zero\".) This requires us\nto make a copy of the descriptor earlier in usb_parse_endpoint() and\nuse the copy instead of the original when checking for duplicates." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: core: corrige el error de endpoint duplicado borrando los bits reservados en el descriptor Syzbot ha identificado un error en usbcore (consulte la etiqueta Closes: a continuaci\u00f3n) causado por nuestra suposici\u00f3n de que los bits reservados en el campo bEndpointAddress de un descriptor de endpoint siempre ser\u00e1 0. Como resultado del error, la rutina endpoint_is_duplicate() en config.c (y posiblemente tambi\u00e9n otras rutinas) puede creer que dos descriptores son para endpoints distintos, aunque tengan la misma direcci\u00f3n y n\u00famero de endpoint. Esto puede generar confusi\u00f3n, incluido el error identificado por syzbot (dos descriptores con direcciones y n\u00fameros de endpoint coincidentes, donde uno era de interrupci\u00f3n y el otro era masivo). Para corregir el error, borraremos los bits reservados en bEndpointAddress cuando analicemos el descriptor. (Tenga en cuenta que las especificaciones de USB-2.0 y USB-3.1 dicen que estos bits est\u00e1n \"Reservados, restablecidos a cero\"). Esto requiere que hagamos una copia del descriptor anteriormente en usb_parse_endpoint() y usemos la copia en lugar del original cuando buscando duplicados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41036.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41036.json index fcebf500624..9944f0dd267 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41036.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41036.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ks8851: Fix deadlock with the SPI chip variant\n\nWhen SMP is enabled and spinlocks are actually functional then there is\na deadlock with the 'statelock' spinlock between ks8851_start_xmit_spi\nand ks8851_irq:\n\n watchdog: BUG: soft lockup - CPU#0 stuck for 27s!\n call trace:\n queued_spin_lock_slowpath+0x100/0x284\n do_raw_spin_lock+0x34/0x44\n ks8851_start_xmit_spi+0x30/0xb8\n ks8851_start_xmit+0x14/0x20\n netdev_start_xmit+0x40/0x6c\n dev_hard_start_xmit+0x6c/0xbc\n sch_direct_xmit+0xa4/0x22c\n __qdisc_run+0x138/0x3fc\n qdisc_run+0x24/0x3c\n net_tx_action+0xf8/0x130\n handle_softirqs+0x1ac/0x1f0\n __do_softirq+0x14/0x20\n ____do_softirq+0x10/0x1c\n call_on_irq_stack+0x3c/0x58\n do_softirq_own_stack+0x1c/0x28\n __irq_exit_rcu+0x54/0x9c\n irq_exit_rcu+0x10/0x1c\n el1_interrupt+0x38/0x50\n el1h_64_irq_handler+0x18/0x24\n el1h_64_irq+0x64/0x68\n __netif_schedule+0x6c/0x80\n netif_tx_wake_queue+0x38/0x48\n ks8851_irq+0xb8/0x2c8\n irq_thread_fn+0x2c/0x74\n irq_thread+0x10c/0x1b0\n kthread+0xc8/0xd8\n ret_from_fork+0x10/0x20\n\nThis issue has not been identified earlier because tests were done on\na device with SMP disabled and so spinlocks were actually NOPs.\n\nNow use spin_(un)lock_bh for TX queue related locking to avoid execution\nof softirq work synchronously that would lead to a deadlock." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ks8851: Se corrige el interbloqueo con la variante del chip SPI Cuando SMP est\u00e1 habilitado y los spinlocks son realmente funcionales, entonces hay un interbloqueo con el spinlock 'statelock' entre ks8851_start_xmit_spi y ks8851_irq: watchdog: ERROR: bloqueo suave: \u00a1CPU n.\u00b0 0 se atasc\u00f3 durante 27 segundos! seguimiento de llamadas: queued_spin_lock_slowpath+0x100/0x284 do_raw_spin_lock+0x34/0x44 ks8851_start_xmit_spi+0x30/0xb8 ks8851_start_xmit+0x14/0x20 netdev_start_xmit+0x40/0x6c 0xbc sch_direct_xmit+0xa4/0x22c __qdisc_run+0x138/0x3fc qdisc_run+0x24/0x3c net_tx_action+ 0xf8/0x130 handle_softirqs+0x1ac/0x1f0 __do_softirq+0x14/0x20 ____do_softirq+0x10/0x1c call_on_irq_stack+0x3c/0x58 do_softirq_own_stack+0x1c/0x28 __irq_exit_rcu+0x54/0x9c _exit_rcu+0x10/0x1c el1_interrupt+0x38/0x50 el1h_64_irq_handler+0x18/0x24 el1h_64_irq+ 0x64/0x68 __netif_schedule+0x6c/0x80 netif_tx_wake_queue+0x38/0x48 ks8851_irq+0xb8/0x2c8 irq_thread_fn+0x2c/0x74 irq_thread+0x10c/0x1b0 kthread+0xc8/0xd8 k+0x10/0x20 Este problema no se identific\u00f3 anteriormente porque se realizaron pruebas en un dispositivo con SMP deshabilitado y, por lo tanto, los spinlocks eran en realidad NOP. Ahora use spin_(un)lock_bh para el bloqueo relacionado con la cola TX para evitar la ejecuci\u00f3n del trabajo de softirq de forma sincr\u00f3nica que conducir\u00eda a un punto muerto." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41037.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41037.json index d3de86c28ff..a2b7d67f904 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41037.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41037.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda: fix null deref on system suspend entry\n\nWhen system enters suspend with an active stream, SOF core\ncalls hw_params_upon_resume(). On Intel platforms with HDA DMA used\nto manage the link DMA, this leads to call chain of\n\n hda_dsp_set_hw_params_upon_resume()\n -> hda_dsp_dais_suspend()\n -> hda_dai_suspend()\n -> hda_ipc4_post_trigger()\n\nA bug is hit in hda_dai_suspend() as hda_link_dma_cleanup() is run first,\nwhich clears hext_stream->link_substream, and then hda_ipc4_post_trigger()\nis called with a NULL snd_pcm_substream pointer." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: SOF: Intel: hda: corrige el deref nulo en la entrada de suspensi\u00f3n del sistema Cuando el sistema entra en suspensi\u00f3n con una secuencia activa, el n\u00facleo de SOF llama a hw_params_upon_resume(). En las plataformas Intel con HDA DMA utilizado para administrar el enlace DMA, esto conduce a la cadena de llamadas de hda_dsp_set_hw_params_upon_resume() -> hda_dsp_dais_suspend() -> hda_dai_suspend() -> hda_ipc4_post_trigger() Se detecta un error en hda_dai_suspend() como hda_link_dma_cleanup() ejecutar primero, lo que borra hext_stream->link_substream, y luego se llama a hda_ipc4_post_trigger() con un puntero NULL snd_pcm_substream." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41038.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41038.json index 5d7287bfda6..8cd6ae07e49 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41038.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41038.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers\n\nCheck that all fields of a V2 algorithm header fit into the available\nfirmware data buffer.\n\nThe wmfw V2 format introduced variable-length strings in the algorithm\nblock header. This means the overall header length is variable, and the\nposition of most fields varies depending on the length of the string\nfields. Each field must be checked to ensure that it does not overflow\nthe firmware data buffer.\n\nAs this ia bugfix patch, the fixes avoid making any significant change to\nthe existing code. This makes it easier to review and less likely to\nintroduce new bugs." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: cs_dsp: evita la saturaci\u00f3n de b\u00fafer al procesar encabezados de alg V2. Verifique que todos los campos de un encabezado de algoritmo V2 encajen en el b\u00fafer de datos del firmware disponible. El formato wmfw V2 introdujo cadenas de longitud variable en el encabezado del bloque del algoritmo. Esto significa que la longitud total del encabezado es variable y la posici\u00f3n de la mayor\u00eda de los campos var\u00eda seg\u00fan la longitud de los campos de cadena. Se debe verificar cada campo para garantizar que no desborde el b\u00fafer de datos del firmware. Como se trata de un parche de correcci\u00f3n de errores, las correcciones evitan realizar cambios significativos en el c\u00f3digo existente. Esto hace que sea m\u00e1s f\u00e1cil de revisar y menos probable que se introduzcan nuevos errores." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41039.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41039.json index 4a5cc46ac41..f03c90664ad 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41039.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41039.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Fix overflow checking of wmfw header\n\nFix the checking that firmware file buffer is large enough for the\nwmfw header, to prevent overrunning the buffer.\n\nThe original code tested that the firmware data buffer contained\nenough bytes for the sums of the size of the structs\n\n\twmfw_header + wmfw_adsp1_sizes + wmfw_footer\n\nBut wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and\nHalo Core the equivalent struct is wmfw_adsp2_sizes, which is\n4 bytes longer. So the length check didn't guarantee that there\nare enough bytes in the firmware buffer for a header with\nwmfw_adsp2_sizes.\n\nThis patch splits the length check into three separate parts. Each\nof the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked\nseparately before they are used." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: firmware: cs_dsp: corrige la verificaci\u00f3n de desbordamiento del encabezado wmfw. Se corrige la verificaci\u00f3n de que el b\u00fafer del archivo de firmware sea lo suficientemente grande para el encabezado wmfw, para evitar que se sobrecargue el b\u00fafer. El c\u00f3digo original prob\u00f3 que el b\u00fafer de datos del firmware conten\u00eda suficientes bytes para las sumas del tama\u00f1o de las estructuras wmfw_header + wmfw_adsp1_sizes + wmfw_footer. Pero wmfw_adsp1_sizes solo se usa en el firmware ADSP1. Para ADSP2 y Halo Core, la estructura equivalente es wmfw_adsp2_sizes, que es 4 bytes m\u00e1s larga. Por lo tanto, la verificaci\u00f3n de longitud no garantiza que haya suficientes bytes en el b\u00fafer del firmware para un encabezado con wmfw_adsp2_sizes. Este parche divide el control de longitud en tres partes separadas. Cada uno de los wmfw_header, wmfw_adsp?_sizes y wmfw_footer se verifican por separado antes de usarse." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41040.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41040.json index 85b1569232f..e6d53ef87dc 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41040.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix UAF when resolving a clash\n\nKASAN reports the following UAF:\n\n BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n Read of size 1 at addr ffff888c07603600 by task handler130/6469\n\n Call Trace:\n \n dump_stack_lvl+0x48/0x70\n print_address_description.constprop.0+0x33/0x3d0\n print_report+0xc0/0x2b0\n kasan_report+0xd0/0x120\n __asan_load1+0x6c/0x80\n tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n tcf_ct_act+0x886/0x1350 [act_ct]\n tcf_action_exec+0xf8/0x1f0\n fl_classify+0x355/0x360 [cls_flower]\n __tcf_classify+0x1fd/0x330\n tcf_classify+0x21c/0x3c0\n sch_handle_ingress.constprop.0+0x2c5/0x500\n __netif_receive_skb_core.constprop.0+0xb25/0x1510\n __netif_receive_skb_list_core+0x220/0x4c0\n netif_receive_skb_list_internal+0x446/0x620\n napi_complete_done+0x157/0x3d0\n gro_cell_poll+0xcf/0x100\n __napi_poll+0x65/0x310\n net_rx_action+0x30c/0x5c0\n __do_softirq+0x14f/0x491\n __irq_exit_rcu+0x82/0xc0\n irq_exit_rcu+0xe/0x20\n common_interrupt+0xa1/0xb0\n \n \n asm_common_interrupt+0x27/0x40\n\n Allocated by task 6469:\n kasan_save_stack+0x38/0x70\n kasan_set_track+0x25/0x40\n kasan_save_alloc_info+0x1e/0x40\n __kasan_krealloc+0x133/0x190\n krealloc+0xaa/0x130\n nf_ct_ext_add+0xed/0x230 [nf_conntrack]\n tcf_ct_act+0x1095/0x1350 [act_ct]\n tcf_action_exec+0xf8/0x1f0\n fl_classify+0x355/0x360 [cls_flower]\n __tcf_classify+0x1fd/0x330\n tcf_classify+0x21c/0x3c0\n sch_handle_ingress.constprop.0+0x2c5/0x500\n __netif_receive_skb_core.constprop.0+0xb25/0x1510\n __netif_receive_skb_list_core+0x220/0x4c0\n netif_receive_skb_list_internal+0x446/0x620\n napi_complete_done+0x157/0x3d0\n gro_cell_poll+0xcf/0x100\n __napi_poll+0x65/0x310\n net_rx_action+0x30c/0x5c0\n __do_softirq+0x14f/0x491\n\n Freed by task 6469:\n kasan_save_stack+0x38/0x70\n kasan_set_track+0x25/0x40\n kasan_save_free_info+0x2b/0x60\n ____kasan_slab_free+0x180/0x1f0\n __kasan_slab_free+0x12/0x30\n slab_free_freelist_hook+0xd2/0x1a0\n __kmem_cache_free+0x1a2/0x2f0\n kfree+0x78/0x120\n nf_conntrack_free+0x74/0x130 [nf_conntrack]\n nf_ct_destroy+0xb2/0x140 [nf_conntrack]\n __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]\n nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]\n __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]\n tcf_ct_act+0x12ad/0x1350 [act_ct]\n tcf_action_exec+0xf8/0x1f0\n fl_classify+0x355/0x360 [cls_flower]\n __tcf_classify+0x1fd/0x330\n tcf_classify+0x21c/0x3c0\n sch_handle_ingress.constprop.0+0x2c5/0x500\n __netif_receive_skb_core.constprop.0+0xb25/0x1510\n __netif_receive_skb_list_core+0x220/0x4c0\n netif_receive_skb_list_internal+0x446/0x620\n napi_complete_done+0x157/0x3d0\n gro_cell_poll+0xcf/0x100\n __napi_poll+0x65/0x310\n net_rx_action+0x30c/0x5c0\n __do_softirq+0x14f/0x491\n\nThe ct may be dropped if a clash has been resolved but is still passed to\nthe tcf_ct_flow_table_process_conn function for further usage. This issue\ncan be fixed by retrieving ct from skb again after confirming conntrack." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net/sched: Reparar UAF al resolver un conflicto KASAN reporta el siguiente UAF: ERROR: KASAN: slab-use-after-free en tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct] Lectura de tama\u00f1o 1 en la direcci\u00f3n ffff888c07603600 por el controlador de tareas 130/6469 Seguimiento de llamadas: dump_stack_lvl+0x48/0x70 print_address_description.constprop.0+0x33/0x3d0 print_report+0xc0/0x2b0 kasan_report+0xd0/0x120 __asan_load1+0x 6c/0x80 tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct] tcf_ct_act+0x886/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop.0+0x 2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25 /0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30 c/0x5c0 __do_softirq+0x14f/0x491 __irq_exit_rcu+0x82/0xc0 irq_exit_rcu+0xe/0x20 common_interrupt+0xa1 /0xb0 asm_common_interrupt+0x27/0x40 Asignado por la tarea 6469: kasan_save_stack+0x38/0x70 kasan_set_track+0x25/0x40 kasan_save_alloc_info+0x1e/0x40 __kasan_krealloc+0x133/0x190 a/0x130 nf_ct_ext_add+0xed/0x230 [ nf_conntrack] tcf_ct_act+0x1095/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop. 0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/ 0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30 c/0x5c0 __do_softirq+0x14f/0x491 Liberado por la tarea 6469: kasan_save_stack+0x38/0x70 kasan_set_track+0x25/ 0x40 kasan_save_free_info+0x2b/0x60 ____kasan_slab_free+0x180/0x1f0 __kasan_slab_free+0x12/0x30 slab_free_freelist_hook+0xd2/0x1a0 __kmem_cache_free+0x1a2/0x2f0 kfree+0x78/0x120 conntrack_free+0x74/0x130 [nf_conntrack] nf_ct_destroy+0xb2/0x140 [nf_conntrack] __nf_ct_resolve_clash+0x529 /0x5d0 [nf_conntrack] nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack] __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack] tcf_ct_act+0x12ad/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c /0x3c0 sch_handle_ingress.constprop.0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_ done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30c/0x5c0 __do_softirq+0x14f/0x491 El ct se puede descartar si se resolvi\u00f3 un conflicto pero a\u00fan se pasa a la funci\u00f3n tcf_ct_flow_table_process_conn para su uso posterior. Este problema se puede solucionar recuperando ct de skb nuevamente despu\u00e9s de confirmar conntrack." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41041.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41041.json index 1a3599e6c37..0697ec85171 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41041.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41041.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb->destructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table. Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n CPU1 CPU2\n ---- ----\n udp_v4_early_demux() udp_lib_get_port()\n | |- hlist_add_head_rcu()\n |- sk = __udp4_lib_demux_lookup() |\n |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet's apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe <0f> 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS: 00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n \n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udp: configure SOCK_RCU_FREE anteriormente en udp_lib_get_port(). syzkaller activ\u00f3 la advertencia [0] en udp_v4_early_demux(). En udp_v[46]_early_demux() y sk_lookup(), no tocamos el recuento del sk buscado y usamos sock_pfree() como skb->destructor, por lo que verificamos SOCK_RCU_FREE para asegurarnos de que sea seguro acceder al sk durante el per\u00edodo de gracia de la UCR. Actualmente, SOCK_RCU_FREE est\u00e1 marcado para un socket vinculado despu\u00e9s de colocarlo en la tabla hash. Adem\u00e1s, la comprobaci\u00f3n SOCK_RCU_FREE se realiza demasiado pronto en udp_v[46]_early_demux() y sk_lookup(), por lo que podr\u00eda haber una peque\u00f1a ventana de ejecuci\u00f3n: CPU1 CPU2 ---- ---- udp_v4_early_demux() udp_lib_get_port() | |- hlist_add_head_rcu() |- sk = __udp4_lib_demux_lookup() | |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk)); `- sock_set_flag(sk, SOCK_RCU_FREE) Tuvimos el mismo error en TCP y lo solucionamos en la confirmaci\u00f3n 871019b22d1b (\"net: configure SOCK_RCU_FREE antes de insertar el socket en la tabla hash\"). Apliquemos la misma soluci\u00f3n para UDP. [0]: ADVERTENCIA: CPU: 0 PID: 11198 en net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599 M\u00f3dulos vinculados en: CPU: 0 PID: 11198 Comm: syz- ejecutor.1 No contaminado 6.9.0-g93bda33046e7 #13 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 01/04/2014 RIP: 0010 :udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599 C\u00f3digo: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe <0f> 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52 RSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c RDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001 RBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680 R13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e FS: 00007fc449127640(0 000) GS:ffff88807dc00000(0000) knlGS: 0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0 DR0: 0000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 PKRU: 55555554 Llamar Seguimiento: ip_rcv_finish_core .constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349 ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447 NF_HOOK include/linux/netfilter.h:314 [en l\u00ednea] NF_HOOK include/linux/netfilter .h:308 [en l\u00ednea] ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569 __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624 __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738 skb_internal net/core/dev.c:5824 [en l\u00ednea] netif_receive_skb+0x271/0x300 net/core/dev.c:5884 tun_rx_batched drivers/net/tun.c:1549 [en l\u00ednea] tun_get_user+0x24db/0x2c50 drivers/net/tun. c:2002 tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048 new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x76f/0x8d0 fs/read_write.c:590 ksys_write+0xbf/0x190 fs/read_write.c : 643 __do_sys_write fs/read_write.c: 655 [en l\u00ednea] __se_sys_write fs/read_write.c: 652 [inline] __x64_sys_write+0x41/0x50 fs/read_write.c: 652 x64_sy m /syscalls_64.h:2 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0x7fc44a68bc C\u00f3digo 1f: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48 RSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000004bc050 RCX: 00007fc44a68bc1f R ---truncado---" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41042.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41042.json index eecfc4ec857..ed1f791c9bf 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41042.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41042.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via ->validate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can't see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don't have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table->validate_state in case we could catch an error earlier\n(for improved error reporting to userspace)." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nf_tables: prefiere nft_chain_validate nft_chain_validate ya realiza detecci\u00f3n de bucle porque un ciclo resultar\u00e1 en un desbordamiento de la pila de llamadas (ctx->level >= NFT_JUMP_STACK_SIZE). Tambi\u00e9n sigue los mapas a trav\u00e9s de ->validate callback en nft_lookup, por lo que no parece haber raz\u00f3n para iterar los mapas nuevamente. nf_tables_check_loops() y todas sus funciones auxiliares se pueden eliminar. Esto mejora significativamente el tiempo de carga del conjunto de reglas, de 23 a 12 segundos. Esto tambi\u00e9n corrige un error de bloqueo. El c\u00f3digo de detecci\u00f3n de bucle antiguo puede provocar una recursividad ilimitada: ERROR: La p\u00e1gina de protecci\u00f3n de pila de TAREA fue visitada en... Vaya: p\u00e1gina de protecci\u00f3n de pila: 0000 [#1] PREEMPT SMP KASAN CPU: 4 PID: 1539 Comm: nft No contaminado 6.10. 0-rc5+ #1 [..] con un conjunto de reglas adecuado durante la validaci\u00f3n de los almacenes de registros. No veo ninguna raz\u00f3n real para intentar verificar esto desde nft_validate_register_store(); en este punto, la transacci\u00f3n a\u00fan est\u00e1 en progreso, por lo que no tenemos una imagen completa del gr\u00e1fico de reglas. Para nf-next, podr\u00eda tener sentido eliminarlo o hacer que esto dependa de table->validate_state en caso de que podamos detectar un error antes (para mejorar el informe de errores al espacio de usuario)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41043.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41043.json index 312887f2074..606ff28e628 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41043.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41043.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_queue: drop bogus WARN_ON\n\nHappens when rules get flushed/deleted while packet is out, so remove\nthis WARN_ON.\n\nThis WARN exists in one form or another since v4.14, no need to backport\nthis to older releases, hence use a more recent fixes tag." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nfnetlink_queue: drop bogus WARN_ON Ocurre cuando las reglas se vac\u00edan/eliminan mientras el paquete est\u00e1 fuera, as\u00ed que elimine este WARN_ON. Esta ADVERTENCIA existe de una forma u otra desde la versi\u00f3n 4.14, no es necesario realizar un backport a versiones anteriores, por lo tanto, utilice una etiqueta de correcciones m\u00e1s reciente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41044.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41044.json index 6395a719c4b..5e3e263b984 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41044.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41044.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince 'ppp_async_encode()' assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ppp: rechazar paquetes reclamados como LCP pero en realidad con formato incorrecto Dado que 'ppp_async_encode()' asume paquetes LCP v\u00e1lidos (con c\u00f3digo del 1 al 7 inclusive), agregue 'ppp_check_packet()' para garantizar que el paquete LCP tenga un cuerpo real m\u00e1s all\u00e1 de los bytes del encabezado PPP_LCP y, de lo contrario, rechace los datos reclamados como LCP pero en realidad con formato incorrecto." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41045.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41045.json index 10f071dcc89..8b253280ddc 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41045.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41045.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer work in bpf_timer_cancel_and_free\n\nCurrently, the same case as previous patch (two timer callbacks trying\nto cancel each other) can be invoked through bpf_map_update_elem as\nwell, or more precisely, freeing map elements containing timers. Since\nthis relies on hrtimer_cancel as well, it is prone to the same deadlock\nsituation as the previous patch.\n\nIt would be sufficient to use hrtimer_try_to_cancel to fix this problem,\nas the timer cannot be enqueued after async_cancel_and_free. Once\nasync_cancel_and_free has been done, the timer must be reinitialized\nbefore it can be armed again. The callback running in parallel trying to\narm the timer will fail, and freeing bpf_hrtimer without waiting is\nsufficient (given kfree_rcu), and bpf_timer_cb will return\nHRTIMER_NORESTART, preventing the timer from being rearmed again.\n\nHowever, there exists a UAF scenario where the callback arms the timer\nbefore entering this function, such that if cancellation fails (due to\ntimer callback invoking this routine, or the target timer callback\nrunning concurrently). In such a case, if the timer expiration is\nsignificantly far in the future, the RCU grace period expiration\nhappening before it will free the bpf_hrtimer state and along with it\nthe struct hrtimer, that is enqueued.\n\nHence, it is clear cancellation needs to occur after\nasync_cancel_and_free, and yet it cannot be done inline due to deadlock\nissues. We thus modify bpf_timer_cancel_and_free to defer work to the\nglobal workqueue, adding a work_struct alongside rcu_head (both used at\n_different_ points of time, so can share space).\n\nUpdate existing code comments to reflect the new state of affairs." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Aplazar el trabajo en bpf_timer_cancel_and_free Actualmente, el mismo caso del parche anterior (dos devoluciones de llamada de temporizador que intentan cancelarse entre s\u00ed) tambi\u00e9n se puede invocar a trav\u00e9s de bpf_map_update_elem, o m\u00e1s precisamente, liberando mapa elementos que contienen temporizadores. Dado que esto tambi\u00e9n depende de hrtimer_cancel, es propenso a la misma situaci\u00f3n de punto muerto que el parche anterior. Ser\u00eda suficiente usar hrtimer_try_to_cancel para solucionar este problema, ya que el temporizador no se puede poner en cola despu\u00e9s de async_cancel_and_free. Una vez que se haya realizado async_cancel_and_free, el temporizador debe reinicializarse antes de poder armarse nuevamente. La devoluci\u00f3n de llamada que se ejecuta en paralelo al intentar armar el temporizador fallar\u00e1, y liberar bpf_hrtimer sin esperar es suficiente (dado kfree_rcu), y bpf_timer_cb devolver\u00e1 HRTIMER_NORESTART, evitando que el temporizador se rearme nuevamente. Sin embargo, existe un escenario UAF en el que la devoluci\u00f3n de llamada arma el temporizador antes de ingresar a esta funci\u00f3n, de modo que si la cancelaci\u00f3n falla (debido a que la devoluci\u00f3n de llamada del temporizador invoca esta rutina o la devoluci\u00f3n de llamada del temporizador de destino se ejecuta simult\u00e1neamente). En tal caso, si la expiraci\u00f3n del temporizador est\u00e1 significativamente lejos en el futuro, la expiraci\u00f3n del per\u00edodo de gracia de RCU que ocurra antes liberar\u00e1 el estado bpf_hrtimer y junto con \u00e9l la estructura hrtimer, que est\u00e1 en cola. Por lo tanto, est\u00e1 claro que la cancelaci\u00f3n debe ocurrir despu\u00e9s de async_cancel_and_free y, sin embargo, no se puede realizar en l\u00ednea debido a problemas de interbloqueo. Por lo tanto, modificamos bpf_timer_cancel_and_free para diferir el trabajo a la cola de trabajo global, agregando un work_struct junto con rcu_head (ambos usados en _diferentes_ puntos de tiempo, por lo que pueden compartir espacio). Actualice los comentarios del c\u00f3digo existente para reflejar la nueva situaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41046.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41046.json index 7db20730f83..c380f7e342a 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41046.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41046.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: lantiq_etop: fix double free in detach\n\nThe number of the currently released descriptor is never incremented\nwhich results in the same skb being released multiple times." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: ethernet: lantiq_etop: fix double free in detach El n\u00famero del descriptor publicado actualmente nunca se incrementa, lo que da como resultado que el mismo skb se publique varias veces." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41047.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41047.json index 3a24c6845cb..5c03d57aec6 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41047.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41047.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix XDP program unloading while removing the driver\n\nThe commit 6533e558c650 (\"i40e: Fix reset path while removing\nthe driver\") introduced a new PF state \"__I40E_IN_REMOVE\" to block\nmodifying the XDP program while the driver is being removed.\nUnfortunately, such a change is useful only if the \".ndo_bpf()\"\ncallback was called out of the rmmod context because unloading the\nexisting XDP program is also a part of driver removing procedure.\nIn other words, from the rmmod context the driver is expected to\nunload the XDP program without reporting any errors. Otherwise,\nthe kernel warning with callstack is printed out to dmesg.\n\nExample failing scenario:\n 1. Load the i40e driver.\n 2. Load the XDP program.\n 3. Unload the i40e driver (using \"rmmod\" command).\n\nThe example kernel warning log:\n\n[ +0.004646] WARNING: CPU: 94 PID: 10395 at net/core/dev.c:9290 unregister_netdevice_many_notify+0x7a9/0x870\n[...]\n[ +0.010959] RIP: 0010:unregister_netdevice_many_notify+0x7a9/0x870\n[...]\n[ +0.002726] Call Trace:\n[ +0.002457] \n[ +0.002119] ? __warn+0x80/0x120\n[ +0.003245] ? unregister_netdevice_many_notify+0x7a9/0x870\n[ +0.005586] ? report_bug+0x164/0x190\n[ +0.003678] ? handle_bug+0x3c/0x80\n[ +0.003503] ? exc_invalid_op+0x17/0x70\n[ +0.003846] ? asm_exc_invalid_op+0x1a/0x20\n[ +0.004200] ? unregister_netdevice_many_notify+0x7a9/0x870\n[ +0.005579] ? unregister_netdevice_many_notify+0x3cc/0x870\n[ +0.005586] unregister_netdevice_queue+0xf7/0x140\n[ +0.004806] unregister_netdev+0x1c/0x30\n[ +0.003933] i40e_vsi_release+0x87/0x2f0 [i40e]\n[ +0.004604] i40e_remove+0x1a1/0x420 [i40e]\n[ +0.004220] pci_device_remove+0x3f/0xb0\n[ +0.003943] device_release_driver_internal+0x19f/0x200\n[ +0.005243] driver_detach+0x48/0x90\n[ +0.003586] bus_remove_driver+0x6d/0xf0\n[ +0.003939] pci_unregister_driver+0x2e/0xb0\n[ +0.004278] i40e_exit_module+0x10/0x5f0 [i40e]\n[ +0.004570] __do_sys_delete_module.isra.0+0x197/0x310\n[ +0.005153] do_syscall_64+0x85/0x170\n[ +0.003684] ? syscall_exit_to_user_mode+0x69/0x220\n[ +0.004886] ? do_syscall_64+0x95/0x170\n[ +0.003851] ? exc_page_fault+0x7e/0x180\n[ +0.003932] entry_SYSCALL_64_after_hwframe+0x71/0x79\n[ +0.005064] RIP: 0033:0x7f59dc9347cb\n[ +0.003648] Code: 73 01 c3 48 8b 0d 65 16 0c 00 f7 d8 64 89 01 48 83\nc8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f\n05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 35 16 0c 00 f7 d8 64 89 01 48\n[ +0.018753] RSP: 002b:00007ffffac99048 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0\n[ +0.007577] RAX: ffffffffffffffda RBX: 0000559b9bb2f6e0 RCX: 00007f59dc9347cb\n[ +0.007140] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 0000559b9bb2f748\n[ +0.007146] RBP: 00007ffffac99070 R08: 1999999999999999 R09: 0000000000000000\n[ +0.007133] R10: 00007f59dc9a5ac0 R11: 0000000000000206 R12: 0000000000000000\n[ +0.007141] R13: 00007ffffac992d8 R14: 0000559b9bb2f6e0 R15: 0000000000000000\n[ +0.007151] \n[ +0.002204] ---[ end trace 0000000000000000 ]---\n\nFix this by checking if the XDP program is being loaded or unloaded.\nThen, block only loading a new program while \"__I40E_IN_REMOVE\" is set.\nAlso, move testing \"__I40E_IN_REMOVE\" flag to the beginning of XDP_SETUP\ncallback to avoid unnecessary operations and checks." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i40e: corrige la descarga del programa XDP mientras se elimina el controlador La confirmaci\u00f3n 6533e558c650 (\"i40e: corrige la ruta de reinicio mientras se elimina el controlador\") introdujo un nuevo estado de PF \"__I40E_IN_REMOVE\" para bloquear la modificaci\u00f3n del programa XDP mientras se elimina el controlador. Desafortunadamente, tal cambio es \u00fatil s\u00f3lo si la devoluci\u00f3n de llamada \".ndo_bpf()\" fue llamada fuera del contexto rmmod porque descargar el programa XDP existente tambi\u00e9n es parte del procedimiento de eliminaci\u00f3n del controlador. En otras palabras, desde el contexto rmmod se espera que el controlador descargue el programa XDP sin informar ning\u00fan error. De lo contrario, la advertencia del kernel con la pila de llamadas se imprime en dmesg. Ejemplo de escenario de error: 1. Cargue el controlador i40e. 2. Cargue el programa XDP. 3. Descargue el controlador i40e (usando el comando \"rmmod\"). El registro de advertencia del kernel de ejemplo: [ +0.004646] ADVERTENCIA: CPU: 94 PID: 10395 en net/core/dev.c:9290 unregister_netdevice_many_notify+0x7a9/0x870 [...] [ +0.010959] RIP: 0010:unregister_netdevice_many_notify+0x7a9/ 0x870 [...] [ +0.002726] Seguimiento de llamadas: [ +0.002457] [ +0.002119] ? __advertir+0x80/0x120 [ +0.003245] ? unregister_netdevice_many_notify+0x7a9/0x870 [+0.005586]? report_bug+0x164/0x190 [+0.003678] ? handle_bug+0x3c/0x80 [+0.003503]? exc_invalid_op+0x17/0x70 [+0.003846]? asm_exc_invalid_op+0x1a/0x20 [+0.004200]? unregister_netdevice_many_notify+0x7a9/0x870 [+0.005579]? unregister_netdevice_many_notify+0x3cc/0x870 [ +0.005586] unregister_netdevice_queue+0xf7/0x140 [ +0.004806] unregister_netdev+0x1c/0x30 [ +0.003933] i40e_vsi_release+0x87/0x2f0 [i40e] [ + 0.004604] i40e_remove+0x1a1/0x420 [i40e] [ +0.004220 ] pci_device_remove+0x3f/0xb0 [ +0.003943] device_release_driver_internal+0x19f/0x200 [ +0.005243] driver_detach+0x48/0x90 [ +0.003586] bus_remove_driver+0x6d/0xf0 [ +0.003939] ister_driver+0x2e/0xb0 [ +0.004278] i40e_exit_module+0x10/ 0x5f0 [i40e] [ +0.004570] __do_sys_delete_module.isra.0+0x197/0x310 [ +0.005153] do_syscall_64+0x85/0x170 [ +0.003684] ? syscall_exit_to_user_mode+0x69/0x220 [+0.004886]? do_syscall_64+0x95/0x170 [ +0.003851] ? exc_page_fault+0x7e/0x180 [ +0.003932] Entry_SYSCALL_64_after_hwframe+0x71/0x79 [ +0.005064] RIP: 0033:0x7f59dc9347cb [ +0.003648] C\u00f3digo: 73 01 c3 48 8b 0d 65 16 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 35 16 0c 00 f7 d8 64 89 01 48 [ +0. 018753] RSP : 002b:00007ffffac99048 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0 [ +0.007577] RAX: ffffffffffffffda RBX: 0000559b9bb2f6e0 RCX: 00007f59dc9347cb [ +0. 007140] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 0000559b9bb2f748 [ +0.007146] RBP: 00007ffffac99070 R08: 1999999999999999 R09: 0000000000000 [ +0.007133] R10: 00007f59dc9a5ac0 R11: 0000000000000206 R12: 0000000000000000 [ +0.007141] R13: 00007ffffac992d8 R14: 0000559b9bb2f6e0 5: 0000000000000000 [+0.007151] [+0.002204] ---[ final de seguimiento 0000000000000000 ]--- Solucionar esto comprobando si el programa XDP se est\u00e1 cargando o descargando. Luego, bloquee solo la carga de un nuevo programa mientras \"__I40E_IN_REMOVE\" est\u00e9 configurado. Adem\u00e1s, mueva el indicador de prueba \"__I40E_IN_REMOVE\" al comienzo de la devoluci\u00f3n de llamada XDP_SETUP para evitar operaciones y comprobaciones innecesarias." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41048.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41048.json index 10b52739e25..cd852365a83 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41048.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41048.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nskmsg: Skip zero length skb in sk_msg_recvmsg\n\nWhen running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch\nplatform, the following kernel panic occurs:\n\n [...]\n Oops[#1]:\n CPU: 22 PID: 2824 Comm: test_progs Tainted: G OE 6.10.0-rc2+ #18\n Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018\n ... ...\n ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560\n ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 0000000c (PPLV0 +PIE +PWE)\n EUEN: 00000007 (+FPE +SXE +ASXE -BTE)\n ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)\n ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n BADV: 0000000000000040\n PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)\n Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack\n Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)\n Stack : ...\n Call Trace:\n [<9000000004162774>] copy_page_to_iter+0x74/0x1c0\n [<90000000048bf6c0>] sk_msg_recvmsg+0x120/0x560\n [<90000000049f2b90>] tcp_bpf_recvmsg_parser+0x170/0x4e0\n [<90000000049aae34>] inet_recvmsg+0x54/0x100\n [<900000000481ad5c>] sock_recvmsg+0x7c/0xe0\n [<900000000481e1a8>] __sys_recvfrom+0x108/0x1c0\n [<900000000481e27c>] sys_recvfrom+0x1c/0x40\n [<9000000004c076ec>] do_syscall+0x8c/0xc0\n [<9000000003731da4>] handle_syscall+0xc4/0x160\n Code: ...\n ---[ end trace 0000000000000000 ]---\n Kernel panic - not syncing: Fatal exception\n Kernel relocated by 0x3510000\n .text @ 0x9000000003710000\n .data @ 0x9000000004d70000\n .bss @ 0x9000000006469400\n ---[ end Kernel panic - not syncing: Fatal exception ]---\n [...]\n\nThis crash happens every time when running sockmap_skb_verdict_shutdown\nsubtest in sockmap_basic.\n\nThis crash is because a NULL pointer is passed to page_address() in the\nsk_msg_recvmsg(). Due to the different implementations depending on the\narchitecture, page_address(NULL) will trigger a panic on Loongarch\nplatform but not on x86 platform. So this bug was hidden on x86 platform\nfor a while, but now it is exposed on Loongarch platform. The root cause\nis that a zero length skb (skb->len == 0) was put on the queue.\n\nThis zero length skb is a TCP FIN packet, which was sent by shutdown(),\ninvoked in test_sockmap_skb_verdict_shutdown():\n\n\tshutdown(p1, SHUT_WR);\n\nIn this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no\npage is put to this sge (see sg_set_page in sg_set_page), but this empty\nsge is queued into ingress_msg list.\n\nAnd in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by\nsg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it\nto kmap_local_page() and to page_address(), then kernel panics.\n\nTo solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),\nif copy is zero, that means it's a zero length skb, skip invoking\ncopy_page_to_iter(). We are using the EFAULT return triggered by\ncopy_page_to_iter to check for is_fin in tcp_bpf.c." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: skmsg: omitir skb de longitud cero en sk_msg_recvmsg Al ejecutar autopruebas de BPF (./test_progs -t sockmap_basic) en una plataforma Loongarch, se produce el siguiente p\u00e1nico del kernel: [...] Ups[ #1]: CPU: 22 PID: 2824 Comm: test_progs Contaminado: G OE 6.10.0-rc2+ #18 Nombre del hardware: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018 ... ... ra: 90000000048bf6c0 sk_msg_recvmsg+0x120 /0x560 ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0 CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) PRMD: 0000000c (PPLV0 +PIE +PWE) EUEN: 00000007 (+FPE +SXE +ASXE -BTE) ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7) ESTAT: 00010000 [PIL] (IS= ECode=1 EssubCode=0) BADV: 00000000000000040 PRID: 0014c011 (Loongson-64bit, Loongson -3C5000) M\u00f3dulos vinculados en: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack Procesar test_progs (pid: 2824, threadinfo=0000000000863a31, task=...) Pila: ... Seguimiento de llamadas: [<9000000004162774>] 1c0 [ <90000000048bf6c0>] sk_msg_recvmsg+0x120/0x560 [<90000000049f2b90>] tcp_bpf_recvmsg_parser+0x170/0x4e0 [<90000000049aae34>] 0x54/0x100 [<900000000481ad5c>] sock_recvmsg+0x7c/0xe0 [<900000000481e1a8>] __sys_recvfrom+0x108/0x1c0 [ <900000000481e27c>] sys_recvfrom+0x1c/0x40 [<9000000004c076ec>] do_syscall+0x8c/0xc0 [<9000000003731da4>] handle_syscall+0xc4/0x160 C\u00f3digo: ... ---[ end trace 0000000 000000000 ]--- P\u00e1nico del kernel: no se sincroniza : Excepci\u00f3n fatal Kernel reubicado por 0x3510000 .text @ 0x9000000003710000 .data @ 0x9000000004d70000 .bss @ 0x9000000006469400 ---[ fin del p\u00e1nico del kernel - no se sincroniza: excepci\u00f3n fatal ]--- [...] Este bloqueo ocurre cada vez que se ejecuta sockmap_ subprueba skb_verdict_shutdown en sockmap_basic. Este bloqueo se debe a que se pasa un puntero NULL a page_address() en sk_msg_recvmsg(). Debido a las diferentes implementaciones seg\u00fan la arquitectura, page_address(NULL) provocar\u00e1 un p\u00e1nico en la plataforma Loongarch pero no en la plataforma x86. Entonces, este error estuvo oculto en la plataforma x86 por un tiempo, pero ahora est\u00e1 expuesto en la plataforma Loongarch. La causa principal es que se coloc\u00f3 en la cola un skb de longitud cero (skb->len == 0). Este skb de longitud cero es un paquete TCP FIN, que fue enviado por apagado(), invocado en test_sockmap_skb_verdict_shutdown(): apagado(p1, SHUT_WR); En este caso, en sk_psock_skb_ingress_enqueue(), num_sge es cero y no se coloca ninguna p\u00e1gina en este sge (consulte sg_set_page en sg_set_page), pero este sge vac\u00edo se pone en cola en la lista ingress_msg. Y en sk_msg_recvmsg(), se usa este sge vac\u00edo, y sg_page(sge) obtiene una p\u00e1gina NULL. Pase esta p\u00e1gina NULL a copy_page_to_iter(), que la pasa a kmap_local_page() y a page_address(), luego el kernel entra en p\u00e1nico. Para resolver esto, debemos omitir este skb de longitud cero. Entonces, en sk_msg_recvmsg(), si la copia es cero, eso significa que es un skb de longitud cero, omita la invocaci\u00f3n de copy_page_to_iter(). Estamos utilizando el retorno EFAULT activado por copy_page_to_iter para verificar is_fin en tcp_bpf.c." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json index 3e3feb3822f..e204604f46a 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41049.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: fix potential use-after-free in posix_lock_inode\n\nLight Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().\nThe request pointer had been changed earlier to point to a lock entry\nthat was added to the inode's list. However, before the tracepoint could\nfire, another task raced in and freed that lock.\n\nFix this by moving the tracepoint inside the spinlock, which should\nensure that this doesn't happen." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: filelock: corrige el posible use after free en posix_lock_inode Light Hsieh inform\u00f3 una advertencia de KASAN UAF en trace_posix_lock_inode(). El puntero de solicitud se hab\u00eda cambiado anteriormente para apuntar a una entrada de bloqueo que se agreg\u00f3 a la lista del inodo. Sin embargo, antes de que el punto de rastreo pudiera activarse, otra tarea entr\u00f3 r\u00e1pidamente y liber\u00f3 ese bloqueo. Solucione este problema moviendo el punto de seguimiento dentro del spinlock, lo que deber\u00eda garantizar que esto no suceda." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41050.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41050.json index d700d1f7467..a2120cbfec7 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41050.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41050.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: cyclic allocation of msg_id to avoid reuse\n\nReusing the msg_id after a maliciously completed reopen request may cause\na read request to remain unprocessed and result in a hung, as shown below:\n\n t1 | t2 | t3\n-------------------------------------------------\ncachefiles_ondemand_select_req\n cachefiles_ondemand_object_is_close(A)\n cachefiles_ondemand_set_object_reopening(A)\n queue_work(fscache_object_wq, &info->work)\n ondemand_object_worker\n cachefiles_ondemand_init_object(A)\n cachefiles_ondemand_send_req(OPEN)\n // get msg_id 6\n wait_for_completion(&req_A->done)\ncachefiles_ondemand_daemon_read\n // read msg_id 6 req_A\n cachefiles_ondemand_get_fd\n copy_to_user\n // Malicious completion msg_id 6\n copen 6,-1\n cachefiles_ondemand_copen\n complete(&req_A->done)\n // will not set the object to close\n // because ondemand_id && fd is valid.\n\n // ondemand_object_worker() is done\n // but the object is still reopening.\n\n // new open req_B\n cachefiles_ondemand_init_object(B)\n cachefiles_ondemand_send_req(OPEN)\n // reuse msg_id 6\nprocess_open_req\n copen 6,A.size\n // The expected failed copen was executed successfully\n\nExpect copen to fail, and when it does, it closes fd, which sets the\nobject to close, and then close triggers reopen again. However, due to\nmsg_id reuse resulting in a successful copen, the anonymous fd is not\nclosed until the daemon exits. Therefore read requests waiting for reopen\nto complete may trigger hung task.\n\nTo avoid this issue, allocate the msg_id cyclically to avoid reusing the\nmsg_id for a very short duration of time." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: archivos de cach\u00e9: asignaci\u00f3n c\u00edclica de msg_id para evitar la reutilizaci\u00f3n La reutilizaci\u00f3n de msg_id despu\u00e9s de una solicitud de reapertura completada maliciosamente puede causar que una solicitud de lectura permanezca sin procesar y resulte en un bloqueo, como se muestra a continuaci\u00f3n: t1 | t2 | t3 ------------------------------------------------- cachefiles_ondemand_select_req cachefiles_ondemand_object_is_close(A) cachefiles_ondemand_set_object_reopening(A) queue_work(fscache_object_wq, &info->work) ondemand_object_worker cachefiles_ondemand_init_object(A) cachefiles_ondemand_send_req(OPEN) // obtener msg_id 6 _completion(&req_A->done) cachefiles_ondemand_daemon_read // leer msg_id 6 req_A cachefiles_ondemand_get_fd copy_to_user // Finalizaci\u00f3n maliciosa msg_id 6 copen 6,-1 cachefiles_ondemand_copen complete(&req_A->done) // no configurar\u00e1 el objeto para que se cierre // porque ondemand_id && fd es v\u00e1lido. // ondemand_object_worker() est\u00e1 listo // pero el objeto a\u00fan se est\u00e1 reabriendo. // new open req_B cachefiles_ondemand_init_object(B) cachefiles_ondemand_send_req(OPEN) // reutilizar msg_id 6 process_open_req copen 6,A.size // El copen fallido esperado se ejecut\u00f3 con \u00e9xito Se espera que copen falle y, cuando lo hace, cierra fd, lo que establece el objeto se cierra y luego el cierre activa nuevamente. Sin embargo, debido a que la reutilizaci\u00f3n de msg_id da como resultado un copen exitoso, el fd an\u00f3nimo no se cierra hasta que el demonio sale. Por lo tanto, las solicitudes de lectura que esperan que se complete la reapertura pueden desencadenar una tarea colgada. Para evitar este problema, asigne msg_id c\u00edclicamente para evitar reutilizar msg_id durante un per\u00edodo de tiempo muy corto." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41051.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41051.json index 3f6c9a8121b..fcaba77bed5 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41051.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41051.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: wait for ondemand_object_worker to finish when dropping object\n\nWhen queuing ondemand_object_worker() to re-open the object,\ncachefiles_object is not pinned. The cachefiles_object may be freed when\nthe pending read request is completed intentionally and the related\nerofs is umounted. If ondemand_object_worker() runs after the object is\nfreed, it will incur use-after-free problem as shown below.\n\nprocess A processs B process C process D\n\ncachefiles_ondemand_send_req()\n// send a read req X\n// wait for its completion\n\n // close ondemand fd\n cachefiles_ondemand_fd_release()\n // set object as CLOSE\n\n cachefiles_ondemand_daemon_read()\n // set object as REOPENING\n queue_work(fscache_wq, &info->ondemand_work)\n\n // close /dev/cachefiles\n cachefiles_daemon_release\n cachefiles_flush_reqs\n complete(&req->done)\n\n// read req X is completed\n// umount the erofs fs\ncachefiles_put_object()\n// object will be freed\ncachefiles_ondemand_deinit_obj_info()\nkmem_cache_free(object)\n // both info and object are freed\n ondemand_object_worker()\n\nWhen dropping an object, it is no longer necessary to reopen the object,\nso use cancel_work_sync() to cancel or wait for ondemand_object_worker()\nto finish." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cachefiles: espere a que finalice ondemand_object_worker al soltar el objeto Al poner en cola ondemand_object_worker() para volver a abrir el objeto, cachefiles_object no est\u00e1 fijado. El objeto cachefiles_object se puede liberar cuando la solicitud de lectura pendiente se completa intencionalmente y se desmontan los erofs relacionados. Si ondemand_object_worker() se ejecuta despu\u00e9s de liberar el objeto, incurrir\u00e1 en un problema de use after free como se muestra a continuaci\u00f3n. proceso A procesos B proceso C proceso D cachefiles_ondemand_send_req() // env\u00eda una solicitud de lectura X // espera a que se complete // cierra ondemand fd cachefiles_ondemand_fd_release() // establece el objeto como CERRAR cachefiles_ondemand_daemon_read() // establece el objeto como REAPERTURA queue_work(fscache_wq , &info->ondemand_work) // cerrar /dev/cachefiles cachefiles_daemon_release cachefiles_flush_reqs complete(&req->done) // leer la solicitud X est\u00e1 completa // desmontar el erofs fs cachefiles_put_object() // el objeto ser\u00e1 liberado cachefiles_ondemand_deinit_obj_info() kmem_cache_free(object ) // tanto la informaci\u00f3n como el objeto se liberan ondemand_object_worker() Cuando se suelta un objeto, ya no es necesario volver a abrirlo, as\u00ed que use cancel_work_sync() para cancelar o espere a que finalice ondemand_object_worker()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json index 32dcad638fc..748881d5424 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41052.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Init the count variable in collecting hot-reset devices\n\nThe count variable is used without initialization, it results in mistakes\nin the device counting and crashes the userspace if the get hot reset info\npath is triggered." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/pci: inicia la variable de conteo al recopilar dispositivos de reinicio en caliente. La variable de conteo se usa sin inicializaci\u00f3n, genera errores en el conteo de dispositivos y bloquea el espacio de usuario si se calienta. Se activa el restablecimiento de la ruta de informaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json index d9afa33f1b9..90f66101b69 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41053.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix ufshcd_abort_one racing issue\n\nWhen ufshcd_abort_one is racing with the completion ISR, the completed tag\nof the request's mq_hctx pointer will be set to NULL by ISR. Return\nsuccess when request is completed by ISR because ufshcd_abort_one does not\nneed to do anything.\n\nThe racing flow is:\n\nThread A\nufshcd_err_handler\t\t\t\t\tstep 1\n\t...\n\tufshcd_abort_one\n\t\tufshcd_try_to_abort_task\n\t\t\tufshcd_cmd_inflight(true)\tstep 3\n\t\tufshcd_mcq_req_to_hwq\n\t\t\tblk_mq_unique_tag\n\t\t\t\trq->mq_hctx->queue_num\tstep 5\n\nThread B\nufs_mtk_mcq_intr(cq complete ISR)\t\t\tstep 2\n\tscsi_done\n\t\t...\n\t\t__blk_mq_free_request\n\t\t\trq->mq_hctx = NULL;\t\tstep 4\n\nBelow is KE back trace.\n ufshcd_try_to_abort_task: cmd at tag 41 not pending in the device.\n ufshcd_try_to_abort_task: cmd at tag=41 is cleared.\n Aborting tag 41 / CDB 0x28 succeeded\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000194\n pc : [0xffffffddd7a79bf8] blk_mq_unique_tag+0x8/0x14\n lr : [0xffffffddd6155b84] ufshcd_mcq_req_to_hwq+0x1c/0x40 [ufs_mediatek_mod_ise]\n do_mem_abort+0x58/0x118\n el1_abort+0x3c/0x5c\n el1h_64_sync_handler+0x54/0x90\n el1h_64_sync+0x68/0x6c\n blk_mq_unique_tag+0x8/0x14\n ufshcd_err_handler+0xae4/0xfa8 [ufs_mediatek_mod_ise]\n process_one_work+0x208/0x4fc\n worker_thread+0x228/0x438\n kthread+0x104/0x1d4\n ret_from_fork+0x10/0x20" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: ufs: core: solucione el problema de ejecuci\u00f3n de ufshcd_abort_one Cuando ufshcd_abort_one se ejecuta con el ISR de finalizaci\u00f3n, ISR establecer\u00e1 la etiqueta completada del puntero mq_hctx de la solicitud en NULL. Devuelve el \u00e9xito cuando ISR completa la solicitud porque ufshcd_abort_one no necesita hacer nada. El flujo de ejecucuones es: Hilo A ufshcd_err_handler paso 1 ... ufshcd_abort_one ufshcd_try_to_abort_task ufshcd_cmd_inflight(true) paso 3 ufshcd_mcq_req_to_hwq blk_mq_unique_tag rq->mq_hctx->queue_num paso 5 Hilo B (cq completar ISR) paso 2 scsi_done... __blk_mq_free_request rq-> mq_hctx = NULO; paso 4 A continuaci\u00f3n se muestra el seguimiento de KE. ufshcd_try_to_abort_task: cmd en la etiqueta 41 no est\u00e1 pendiente en el dispositivo. ufshcd_try_to_abort_task: cmd en la etiqueta = 41 se borra. Anulaci\u00f3n de la etiqueta 41 / CDB 0x28 exitosa No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000194 pc: [0xffffffddd7a79bf8] blk_mq_unique_tag+0x8/0x14 lr: [0xffffffddd6155b84] x1c/0x40 [ufs_mediatek_mod_ise] do_mem_abort+0x58/0x118 el1_abort+0x3c/ 0x5c el1h_64_sync_handler+0x54/0x90 el1h_64_sync+0x68/0x6c blk_mq_unique_tag+0x8/0x14 ufshcd_err_handler+0xae4/0xfa8 [ufs_mediatek_mod_ise] Process_one_work+0x208/0x4fc trabajador_thread+0x228/0 x438 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json index 1fe320c6f8c..8d978c06159 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41054.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ufs: core: Fix ufshcd_clear_cmd racing issue\n\nWhen ufshcd_clear_cmd is racing with the completion ISR, the completed tag\nof the request's mq_hctx pointer will be set to NULL by the ISR. And\nufshcd_clear_cmd's call to ufshcd_mcq_req_to_hwq will get NULL pointer KE.\nReturn success when the request is completed by ISR because sq does not\nneed cleanup.\n\nThe racing flow is:\n\nThread A\nufshcd_err_handler\t\t\t\t\tstep 1\n\tufshcd_try_to_abort_task\n\t\tufshcd_cmd_inflight(true)\t\tstep 3\n\t\tufshcd_clear_cmd\n\t\t\t...\n\t\t\tufshcd_mcq_req_to_hwq\n\t\t\tblk_mq_unique_tag\n\t\t\t\trq->mq_hctx->queue_num\tstep 5\n\nThread B\nufs_mtk_mcq_intr(cq complete ISR)\t\t\tstep 2\n\tscsi_done\n\t\t...\n\t\t__blk_mq_free_request\n\t\t\trq->mq_hctx = NULL;\t\tstep 4\n\nBelow is KE back trace:\n\n ufshcd_try_to_abort_task: cmd pending in the device. tag = 6\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000194\n pc : [0xffffffd589679bf8] blk_mq_unique_tag+0x8/0x14\n lr : [0xffffffd5862f95b4] ufshcd_mcq_sq_cleanup+0x6c/0x1cc [ufs_mediatek_mod_ise]\n Workqueue: ufs_eh_wq_0 ufshcd_err_handler [ufs_mediatek_mod_ise]\n Call trace:\n dump_backtrace+0xf8/0x148\n show_stack+0x18/0x24\n dump_stack_lvl+0x60/0x7c\n dump_stack+0x18/0x3c\n mrdump_common_die+0x24c/0x398 [mrdump]\n ipanic_die+0x20/0x34 [mrdump]\n notify_die+0x80/0xd8\n die+0x94/0x2b8\n __do_kernel_fault+0x264/0x298\n do_page_fault+0xa4/0x4b8\n do_translation_fault+0x38/0x54\n do_mem_abort+0x58/0x118\n el1_abort+0x3c/0x5c\n el1h_64_sync_handler+0x54/0x90\n el1h_64_sync+0x68/0x6c\n blk_mq_unique_tag+0x8/0x14\n ufshcd_clear_cmd+0x34/0x118 [ufs_mediatek_mod_ise]\n ufshcd_try_to_abort_task+0x2c8/0x5b4 [ufs_mediatek_mod_ise]\n ufshcd_err_handler+0xa7c/0xfa8 [ufs_mediatek_mod_ise]\n process_one_work+0x208/0x4fc\n worker_thread+0x228/0x438\n kthread+0x104/0x1d4\n ret_from_fork+0x10/0x20" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: ufs: core: solucione el problema de ejecuci\u00f3n de ufshcd_clear_cmd Cuando ufshcd_clear_cmd corre con el ISR de finalizaci\u00f3n, el ISR establecer\u00e1 la etiqueta completada del puntero mq_hctx de la solicitud en NULL. Y la llamada de ufshcd_clear_cmd a ufshcd_mcq_req_to_hwq obtendr\u00e1 un puntero NULL KE. Devuelve el \u00e9xito cuando ISR completa la solicitud porque sq no necesita limpieza. El flujo de ejecuci\u00f3n es: Hilo A ufshcd_err_handler paso 1 ufshcd_try_to_abort_task ufshcd_cmd_inflight(true) paso 3 ufshcd_clear_cmd ... ufshcd_mcq_req_to_hwq blk_mq_unique_tag rq->mq_hctx->queue_num paso 5 Hilo ufs_mtk_mcq_int r(cq completar ISR) paso 2 scsi_done ... __blk_mq_free_request rq-> mq_hctx = NULO; paso 4 A continuaci\u00f3n se muestra el rastreo de KE: ufshcd_try_to_abort_task: cmd pendiente en el dispositivo. etiqueta = 6 No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000194 pc: [0xffffffd589679bf8] blk_mq_unique_tag+0x8/0x14 lr: [0xffffffd5862f95b4] ufshcd_mcq_sq_cleanup+0x6c/0x1cc _mod_ise] Cola de trabajo: ufs_eh_wq_0 ufshcd_err_handler [ufs_mediatek_mod_ise] Seguimiento de llamadas: dump_backtrace+0xf8 /0x148 show_stack+0x18/0x24 dump_stack_lvl+0x60/0x7c dump_stack+0x18/0x3c mrdump_common_die+0x24c/0x398 [mrdump] ipanic_die+0x20/0x34 [mrdump] notify_die+0x80/0xd8 die+0x94/0x2b8 __do_kernel_fault+0x264/0x298 do_page_fault+ 0xa4/0x4b8 do_translation_fault+0x38/0x54 do_mem_abort+0x58/0x118 el1_abort+0x3c/0x5c el1h_64_sync_handler+0x54/0x90 el1h_64_sync+0x68/0x6c blk_mq_unique_tag+0x8/0x14 clear_cmd+0x34/0x118 [ufs_mediatek_mod_ise] ufshcd_try_to_abort_task+0x2c8/0x5b4 [ufs_mediatek_mod_ise] ufshcd_err_handler +0xa7c/0xfa8 [ufs_mediatek_mod_ise] process_one_work+0x208/0x4fc trabajador_hilo+0x228/0x438 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json index 202cd9159c2..18c3a56378b 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41055.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section->usage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms->usage\" to fix a race with section_deactivate() where\nms->usage can be cleared. The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference. We need to check its value before\ndereferencing it." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: evita la eliminaci\u00f3n de la referencia NULL ptr en pfn_section_valid() La confirmaci\u00f3n 5ec8e8ea8b77 (\"mm/sparsemem: corrige la ejecuci\u00f3n al acceder a la secci\u00f3n_memoria->uso\") cambi\u00f3 pfn_section_valid() para agregar un READ_ONCE() llame a \"ms->usage\" para arreglar una ejecuci\u00f3n con section_deactivate() donde se puede borrar ms->usage. La llamada READ_ONCE(), por s\u00ed sola, no es suficiente para evitar la desreferencia al puntero NULL. Necesitamos comprobar su valor antes de desreferenciarlo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41056.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41056.json index 1e401ec52c4..99b3e01ff4c 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41056.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41056.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files\n\nUse strnlen() instead of strlen() on the algorithm and coefficient name\nstring arrays in V1 wmfw files.\n\nIn V1 wmfw files the name is a NUL-terminated string in a fixed-size\narray. cs_dsp should protect against overrunning the array if the NUL\nterminator is missing." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: cs_dsp: use strnlen() en los campos de nombre en archivos wmfw V1. Use strnlen() en lugar de strlen() en las matrices de cadenas de nombres de algoritmos y coeficientes en archivos wmfw V1. En los archivos wmfw V1, el nombre es una cadena terminada en NUL en una matriz de tama\u00f1o fijo. cs_dsp deber\u00eda proteger contra el desbordamiento de la matriz si falta el terminador NUL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41057.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41057.json index 61ae89da5d5..0718951d36c 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41057.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41057.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()\n\nWe got the following issue in our fault injection stress test:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600\nRead of size 8 at addr ffff888118efc000 by task kworker/u78:0/109\n\nCPU: 13 PID: 109 Comm: kworker/u78:0 Not tainted 6.8.0-dirty #566\nCall Trace:\n \n kasan_report+0x93/0xc0\n cachefiles_withdraw_cookie+0x4d9/0x600\n fscache_cookie_state_machine+0x5c8/0x1230\n fscache_cookie_worker+0x91/0x1c0\n process_one_work+0x7fa/0x1800\n [...]\n\nAllocated by task 117:\n kmalloc_trace+0x1b3/0x3c0\n cachefiles_acquire_volume+0xf3/0x9c0\n fscache_create_volume_work+0x97/0x150\n process_one_work+0x7fa/0x1800\n [...]\n\nFreed by task 120301:\n kfree+0xf1/0x2c0\n cachefiles_withdraw_cache+0x3fa/0x920\n cachefiles_put_unbind_pincount+0x1f6/0x250\n cachefiles_daemon_release+0x13b/0x290\n __fput+0x204/0xa00\n task_work_run+0x139/0x230\n do_exit+0x87a/0x29b0\n [...]\n==================================================================\n\nFollowing is the process that triggers the issue:\n\n p1 | p2\n------------------------------------------------------------\n fscache_begin_lookup\n fscache_begin_volume_access\n fscache_cache_is_live(fscache_cache)\ncachefiles_daemon_release\n cachefiles_put_unbind_pincount\n cachefiles_daemon_unbind\n cachefiles_withdraw_cache\n fscache_withdraw_cache\n fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN);\n cachefiles_withdraw_objects(cache)\n fscache_wait_for_objects(fscache)\n atomic_read(&fscache_cache->object_count) == 0\n fscache_perform_lookup\n cachefiles_lookup_cookie\n cachefiles_alloc_object\n refcount_set(&object->ref, 1);\n object->volume = volume\n fscache_count_object(vcookie->cache);\n atomic_inc(&fscache_cache->object_count)\n cachefiles_withdraw_volumes\n cachefiles_withdraw_volume\n fscache_withdraw_volume\n __cachefiles_free_volume\n kfree(cachefiles_volume)\n fscache_cookie_state_machine\n cachefiles_withdraw_cookie\n cache = object->volume->cache;\n // cachefiles_volume UAF !!!\n\nAfter setting FSCACHE_CACHE_IS_WITHDRAWN, wait for all the cookie lookups\nto complete first, and then wait for fscache_cache->object_count == 0 to\navoid the cookie exiting after the volume has been freed and triggering\nthe above issue. Therefore call fscache_withdraw_volume() before calling\ncachefiles_withdraw_objects().\n\nThis way, after setting FSCACHE_CACHE_IS_WITHDRAWN, only the following two\ncases will occur:\n1) fscache_begin_lookup fails in fscache_begin_volume_access().\n2) fscache_withdraw_volume() will ensure that fscache_count_object() has\n been executed before calling fscache_wait_for_objects()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() Recibimos el siguiente problema en nuestra prueba de estr\u00e9s de inyecci\u00f3n de fallos: ============ ==================================================== ==== ERROR: KASAN: slab-use-after-free en cachefiles_withdraw_cookie+0x4d9/0x600 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888118efc000 por tarea kworker/u78:0/109 CPU: 13 PID: 109 Comm: kworker/u78:0 No contaminado 6.8.0-dirty #566 Seguimiento de llamadas: kasan_report+0x93/0xc0 cachefiles_withdraw_cookie+0x4d9/0x600 fscache_cookie_state_machine+0x5c8/0x1230 fscache_cookie_worker+0x91/0x1c0 Process_one_work+0x7fa/0x1800 [...] Asignado por la tarea 117: kmalloc_trace+0x1b3/0x3c0 cachefiles_acquire_volume+0xf3/0x9c0 fscache_create_volume_work+0x97/0x150 Process_one_work+0x7fa/0x1800 [...] Liberado por la tarea 120301: kfree+0xf1/0x2c0 cachefiles_withdraw_cache+0x3fa/0x92 0 cachefiles_put_unbind_pincount+0x1f6/0x250 cachefiles_daemon_release+0x13b/0x290 __fput+0x204/0xa00 task_work_run+0x139/0x230 do_exit+0x87a/0x29b0 [...] ================================ ==================================== El siguiente es el proceso que desencadena el problema: p1 | p2 ------------------------------------------------- ----------- fscache_begin_lookup fscache_begin_volume_access fscache_cache_is_live(fscache_cache) cachefiles_daemon_release cachefiles_put_unbind_pincount cachefiles_daemon_unbind cachefiles_withdraw_cache fscache_withdraw_cache fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN); cachefiles_withdraw_objects(cache) fscache_wait_for_objects(fscache) atomic_read(&fscache_cache->object_count) == 0 fscache_perform_lookup cachefiles_lookup_cookie cachefiles_alloc_object refcount_set(&object->ref, 1); objeto->volumen = volumen fscache_count_object(vcookie->cache); atomic_inc(&fscache_cache->object_count) cachefiles_withdraw_volumes cachefiles_withdraw_volume fscache_withdraw_volume __cachefiles_free_volume kfree(cachefiles_volume) fscache_cookie_state_machine cachefiles_withdraw_cookie cache = objeto->volumen->cache; // archivos_cach\u00e9_volumen UAF !!! Despu\u00e9s de configurar FSCACHE_CACHE_IS_WITHDRAWN, primero espere a que se completen todas las b\u00fasquedas de cookies y luego espere a que fscache_cache->object_count == 0 para evitar que la cookie salga despu\u00e9s de que se haya liberado el volumen y desencadene el problema anterior. Por lo tanto, llame a fscache_withdraw_volume() antes de llamar a cachefiles_withdraw_objects(). De esta manera, despu\u00e9s de configurar FSCACHE_CACHE_IS_WITHDRAWN, solo ocurrir\u00e1n los dos casos siguientes: 1) fscache_begin_lookup falla en fscache_begin_volume_access(). 2) fscache_withdraw_volume() garantizar\u00e1 que fscache_count_object() se haya ejecutado antes de llamar a fscache_wait_for_objects()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json index c0f24c72569..f7dca16f42b 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41058.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix slab-use-after-free in fscache_withdraw_volume()\n\nWe got the following issue in our fault injection stress test:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in fscache_withdraw_volume+0x2e1/0x370\nRead of size 4 at addr ffff88810680be08 by task ondemand-04-dae/5798\n\nCPU: 0 PID: 5798 Comm: ondemand-04-dae Not tainted 6.8.0-dirty #565\nCall Trace:\n kasan_check_range+0xf6/0x1b0\n fscache_withdraw_volume+0x2e1/0x370\n cachefiles_withdraw_volume+0x31/0x50\n cachefiles_withdraw_cache+0x3ad/0x900\n cachefiles_put_unbind_pincount+0x1f6/0x250\n cachefiles_daemon_release+0x13b/0x290\n __fput+0x204/0xa00\n task_work_run+0x139/0x230\n\nAllocated by task 5820:\n __kmalloc+0x1df/0x4b0\n fscache_alloc_volume+0x70/0x600\n __fscache_acquire_volume+0x1c/0x610\n erofs_fscache_register_volume+0x96/0x1a0\n erofs_fscache_register_fs+0x49a/0x690\n erofs_fc_fill_super+0x6c0/0xcc0\n vfs_get_super+0xa9/0x140\n vfs_get_tree+0x8e/0x300\n do_new_mount+0x28c/0x580\n [...]\n\nFreed by task 5820:\n kfree+0xf1/0x2c0\n fscache_put_volume.part.0+0x5cb/0x9e0\n erofs_fscache_unregister_fs+0x157/0x1b0\n erofs_kill_sb+0xd9/0x1c0\n deactivate_locked_super+0xa3/0x100\n vfs_get_super+0x105/0x140\n vfs_get_tree+0x8e/0x300\n do_new_mount+0x28c/0x580\n [...]\n==================================================================\n\nFollowing is the process that triggers the issue:\n\n mount failed | daemon exit\n------------------------------------------------------------\n deactivate_locked_super cachefiles_daemon_release\n erofs_kill_sb\n erofs_fscache_unregister_fs\n fscache_relinquish_volume\n __fscache_relinquish_volume\n fscache_put_volume(fscache_volume, fscache_volume_put_relinquish)\n zero = __refcount_dec_and_test(&fscache_volume->ref, &ref);\n cachefiles_put_unbind_pincount\n cachefiles_daemon_unbind\n cachefiles_withdraw_cache\n cachefiles_withdraw_volumes\n list_del_init(&volume->cache_link)\n fscache_free_volume(fscache_volume)\n cache->ops->free_volume\n cachefiles_free_volume\n list_del_init(&cachefiles_volume->cache_link);\n kfree(fscache_volume)\n cachefiles_withdraw_volume\n fscache_withdraw_volume\n fscache_volume->n_accesses\n // fscache_volume UAF !!!\n\nThe fscache_volume in cache->volumes must not have been freed yet, but its\nreference count may be 0. So use the new fscache_try_get_volume() helper\nfunction try to get its reference count.\n\nIf the reference count of fscache_volume is 0, fscache_put_volume() is\nfreeing it, so wait for it to be removed from cache->volumes.\n\nIf its reference count is not 0, call cachefiles_withdraw_volume() with\nreference count protection to avoid the above issue." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() Obtuvimos el siguiente problema en nuestra prueba de estr\u00e9s de inyecci\u00f3n defallos: ============ ==================================================== ==== ERROR: KASAN: slab-use-after-free en fscache_withdraw_volume+0x2e1/0x370 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff88810680be08 por tarea ondemand-04-dae/5798 CPU: 0 PID: 5798 Comm: ondemand-04-dae No contaminado 6.8.0-dirty #565 Seguimiento de llamadas: kasan_check_range+0xf6/0x1b0 fscache_withdraw_volume+0x2e1/0x370 cachefiles_withdraw_volume+0x31/0x50 cachefiles_withdraw_cache+0x3ad/0x900 cachefiles_put_unbind_pincount+0x1f6/0x25 0 cachefiles_daemon_release+0x13b/0x290 __fput+0x204/0xa00 task_work_run+0x139 /0x230 Asignado por la tarea 5820: __kmalloc+0x1df/0x4b0 fscache_alloc_volume+0x70/0x600 __fscache_acquire_volume+0x1c/0x610 erofs_fscache_register_volume+0x96/0x1a0 erofs_fscache_register_fs+0x49a/0 x690 erofs_fc_fill_super+0x6c0/0xcc0 vfs_get_super+0xa9/0x140 vfs_get_tree+0x8e/0x300 do_new_mount+0x28c /0x580 [...] Liberado por la tarea 5820: kfree+0xf1/0x2c0 fscache_put_volume.part.0+0x5cb/0x9e0 erofs_fscache_unregister_fs+0x157/0x1b0 erofs_kill_sb+0xd9/0x1c0 deactivate_locked_super+0xa3/0x100 _super+0x105/0x140 vfs_get_tree+0x8e/ 0x300 do_new_mount+0x28c/0x580 [...] ======================================== =========================== El siguiente es el proceso que desencadena el problema: montaje fallido | salida del daemon ------------------------------------------------ ------------ deactivate_locked_super cachefiles_daemon_release erofs_kill_sb erofs_fscache_unregister_fs fscache_relinquish_volume __fscache_relinquish_volume fscache_put_volume(fscache_volume, fscache_volume_put_relinquish) zero = __refcount_dec_and_test(&fscache_volume->ref, &ref); cachefiles_put_unbind_pincount cachefiles_daemon_unbind cachefiles_withdraw_cache cachefiles_withdraw_volumes list_del_init(&volume->cache_link) fscache_free_volume(fscache_volume) cache->ops->free_volume cachefiles_free_volume list_del_init(&cachefiles_volume->cache_link); kfree(fscache_volume) cachefiles_withdraw_volume fscache_withdraw_volume fscache_volume->n_accesses // fscache_volume UAF !!! El fscache_volume en cache->volumes no debe haberse liberado todav\u00eda, pero su recuento de referencias puede ser 0. Por lo tanto, utilice la nueva funci\u00f3n auxiliar fscache_try_get_volume() para intentar obtener su recuento de referencias. Si el recuento de referencia de fscache_volume es 0, fscache_put_volume() lo est\u00e1 liberando, as\u00ed que espere a que se elimine de cach\u00e9->vol\u00famenes. Si su recuento de referencias no es 0, llame a cachefiles_withdraw_volume() con protecci\u00f3n de recuento de referencias para evitar el problema anterior." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41059.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41059.json index 47224eeea5f..0cb22d75a62 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41059.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41059.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix uninit-value in copy_name\n\n[syzbot reported]\nBUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160\n sized_strscpy+0xc4/0x160\n copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411\n hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3877 [inline]\n slab_alloc_node mm/slub.c:3918 [inline]\n kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065\n kmalloc include/linux/slab.h:628 [inline]\n hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699\n vfs_listxattr fs/xattr.c:493 [inline]\n listxattr+0x1f3/0x6b0 fs/xattr.c:840\n path_listxattr fs/xattr.c:864 [inline]\n __do_sys_listxattr fs/xattr.c:876 [inline]\n __se_sys_listxattr fs/xattr.c:873 [inline]\n __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873\n x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[Fix]\nWhen allocating memory to strbuf, initialize memory to 0." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hfsplus: corrige valor uninit en copy_name [syzbot inform\u00f3] ERROR: KMSAN: valor uninit en sized_strscpy+0xc4/0x160 sized_strscpy+0xc4/0x160 copy_name+0x2af/0x320 fs/hfsplus /xattr.c:411 hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750 vfs_listxattr fs/xattr.c:493 [en l\u00ednea] listxattr+0x1f3/0x6b0 fs/xattr.c:840 path_listxattr fs/xattr.c: 864 [en l\u00ednea] __do_sys_listxattr fs/xattr.c:876 [en l\u00ednea] __se_sys_listxattr fs/xattr.c:873 [en l\u00ednea] __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873 x64_sys_call+0x2ba0/0x3b5 0 arco/x86/incluir/generado /asm/syscalls_64.h:195 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit se cre\u00f3 en slab_post_alloc_ gancho mm/slub.c:3877 [en l\u00ednea] slab_alloc_node mm/slub.c:3918 [en l\u00ednea] kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065 kmalloc include/linux/slab.h:628 [en l\u00ednea] hfsplus_listxattr+0x4cc/ 0x1a50 fs/hfsplus/xattr.c:699 vfs_listxattr fs/xattr.c:493 [en l\u00ednea] listxattr+0x1f3/0x6b0 fs/xattr.c:840 path_listxattr fs/xattr.c:864 [en l\u00ednea] __do_sys_listxattr fs/xattr.c :876 [en l\u00ednea] __se_sys_listxattr fs/xattr.c:873 [en l\u00ednea] __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:1 95 do_syscall_x64 arco /x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x77/0x7f [Soluci\u00f3n] Al asignar memoria a strbuf, inicialice la memoria a 0." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41060.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41060.json index e3cc062d953..2f2e28032fa 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41060.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41060.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va->bo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va->bo, so\nwe have to check it before dereferencing it." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/radeon: verifique que bo_va->bo no sea NULL antes de usarlo. La llamada a radeon_vm_clear_freed podr\u00eda borrar bo_va->bo, por lo que debemos verificarlo antes de eliminar la referencia." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json index 7492bce231c..89020f32911 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41061.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport\n\n[Why]\nPotential out of bounds access in dml2_calculate_rq_and_dlg_params()\nbecause the value of out_lowest_state_idx used as an index for FCLKChangeSupport\narray can be greater than 1.\n\n[How]\nCurrently dml2 core specifies identical values for all FCLKChangeSupport\nelements. Always use index 0 in the condition to avoid out of bounds access." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: Correcci\u00f3n de \u00edndice de matriz fuera de los l\u00edmites en dml2/FCLKChangeSupport [Por qu\u00e9] Posible acceso fuera de los l\u00edmites en dml2_calculate_rq_and_dlg_params() porque se us\u00f3 el valor de out_lowest_state_idx como \u00edndice para la matriz FCLKChangeSupport puede ser mayor que 1. [C\u00f3mo] Actualmente, el n\u00facleo dml2 especifica valores id\u00e9nticos para todos los elementos FCLKChangeSupport. Utilice siempre el \u00edndice 0 en la condici\u00f3n para evitar el acceso fuera de los l\u00edmites." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41062.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41062.json index 2847d4be56e..31d901e86f3 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41062.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41062.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbluetooth/l2cap: sync sock recv cb and release\n\nThe problem occurs between the system call to close the sock and hci_rx_work,\nwhere the former releases the sock and the latter accesses it without lock protection.\n\n CPU0 CPU1\n ---- ----\n sock_close hci_rx_work\n\t l2cap_sock_release hci_acldata_packet\n\t l2cap_sock_kill l2cap_recv_frame\n\t sk_free l2cap_conless_channel\n\t l2cap_sock_recv_cb\n\nIf hci_rx_work processes the data that needs to be received before the sock is\nclosed, then everything is normal; Otherwise, the work thread may access the\nreleased sock when receiving data.\n\nAdd a chan mutex in the rx callback of the sock to achieve synchronization between\nthe sock release and recv cb.\n\nSock is dead, so set chan data to NULL, avoid others use invalid sock pointer." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: bluetooth/l2cap: sync sock recv cb and release El problema ocurre entre la llamada al sistema para cerrar el calcet\u00edn y hci_rx_work, donde el primero libera el calcet\u00edn y el segundo accede a \u00e9l sin protecci\u00f3n de bloqueo. . CPU0 CPU1 ---- ---- sock_close hci_rx_work l2cap_sock_release hci_acldata_packet l2cap_sock_kill l2cap_recv_frame sk_free l2cap_conless_channel l2cap_sock_recv_cb Si hci_rx_work procesa los datos que deben recibirse antes de cerrar el sock, entonces todo es normal; De lo contrario, el hilo de trabajo puede acceder al sock liberado al recibir datos. Agregue un mutex chan en la devoluci\u00f3n de llamada rx del sock para lograr la sincronizaci\u00f3n entre la liberaci\u00f3n del sock y recv cb. Sock est\u00e1 muerto, as\u00ed que configure los datos de chan en NULL, evite que otros usen un puntero de sock no v\u00e1lido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41063.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41063.json index 5981f36844c..91447e83bb5 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41063.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41063.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: cancel all works upon hci_unregister_dev()\n\nsyzbot is reporting that calling hci_release_dev() from hci_error_reset()\ndue to hci_dev_put() from hci_error_reset() can cause deadlock at\ndestroy_workqueue(), for hci_error_reset() is called from\nhdev->req_workqueue which destroy_workqueue() needs to flush.\n\nWe need to make sure that hdev->{rx_work,cmd_work,tx_work} which are\nqueued into hdev->workqueue and hdev->{power_on,error_reset} which are\nqueued into hdev->req_workqueue are no longer running by the moment\n\n destroy_workqueue(hdev->workqueue);\n destroy_workqueue(hdev->req_workqueue);\n\nare called from hci_release_dev().\n\nCall cancel_work_sync() on these work items from hci_unregister_dev()\nas soon as hdev->list is removed from hci_dev_list." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: hci_core: cancelar todos los trabajos en hci_unregister_dev() syzbot informa que llamar a hci_release_dev() desde hci_error_reset() debido a hci_dev_put() desde hci_error_reset() puede causar un punto muerto en destroy_workqueue( ), porque hci_error_reset() se llama desde hdev->req_workqueue y destroy_workqueue() necesita vaciarse. Necesitamos asegurarnos de que hdev->{rx_work,cmd_work,tx_work} que est\u00e1n en cola en hdev->workqueue y hdev->{power_on,error_reset} que est\u00e1n en cola en hdev->req_workqueue ya no se est\u00e9n ejecutando en el momento destroy_workqueue( hdev->cola de trabajo); destroy_workqueue(hdev->req_workqueue); se llaman desde hci_release_dev(). Llame a cancel_work_sync() en estos elementos de trabajo desde hci_unregister_dev() tan pronto como se elimine hdev->list de hci_dev_list." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41064.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41064.json index 36d1fb5ed4c..56246141b1f 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41064.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41064.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev->pdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev->pdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev->pdev->bus." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/eeh: evita un posible bloqueo cuando cambia edev->pdev Si se elimina un dispositivo PCI durante eeh_pe_report_edev(), edev->pdev cambiar\u00e1 y puede causar un bloqueo, mantenga presionado el bot\u00f3n PCI vuelve a escanear/quitar bloqueo mientras se toma una copia de edev->pdev->bus." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41065.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41065.json index fc89fe96e99..8fe0e40f7d6 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41065.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41065.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Whitelist dtl slub object for copying to userspace\n\nReading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*\nresults in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as\nshown below.\n\n kernel BUG at mm/usercopy.c:102!\n Oops: Exception in kernel mode, sig: 5 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc\n scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse\n CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85\n Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries\n NIP: c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8\n REGS: c000000120c078c0 TRAP: 0700 Not tainted (6.10.0-rc3)\n MSR: 8000000000029033 CR: 2828220f XER: 0000000e\n CFAR: c0000000001fdc80 IRQMASK: 0\n [ ... GPRs omitted ... ]\n NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0\n LR [c0000000005d23d0] usercopy_abort+0x74/0xb0\n Call Trace:\n usercopy_abort+0x74/0xb0 (unreliable)\n __check_heap_object+0xf8/0x120\n check_heap_object+0x218/0x240\n __check_object_size+0x84/0x1a4\n dtl_file_read+0x17c/0x2c4\n full_proxy_read+0x8c/0x110\n vfs_read+0xdc/0x3a0\n ksys_read+0x84/0x144\n system_call_exception+0x124/0x330\n system_call_vectored_common+0x15c/0x2ec\n --- interrupt: 3000 at 0x7fff81f3ab34\n\nCommit 6d07d1cd300f (\"usercopy: Restrict non-usercopy caches to size 0\")\nrequires that only whitelisted areas in slab/slub objects can be copied to\nuserspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.\nDtl contains hypervisor dispatch events which are expected to be read by\nprivileged users. Hence mark this safe for user access.\nSpecify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the\nentire object." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/pseries: incluir en la lista blanca el objeto dtl slub para copiarlo en el espacio de usuario. La lectura del registro de seguimiento de env\u00edo desde /sys/kernel/debug/powerpc/dtl/cpu-* da como resultado un ERROR() cuando la configuraci\u00f3n CONFIG_HARDENED_USERCOPY est\u00e1 habilitada como se muestra a continuaci\u00f3n. \u00a1ERROR del kernel en mm/usercopy.c:102! Vaya: Excepci\u00f3n en modo kernel, sign: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries M\u00f3dulos vinculados en: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror _region_hash dm_log dm_mod fusible CPU: 27 PID: 1815 Comm: python3 No contaminado 6.10.0-rc3 #85 Nombre de hardware: IBM,9040-MRX POWER10 (sin procesar) 0x800200 0xf000006 de:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries NIP: c0000000005d23d4 LR: c0000000005d23d0 CTR : 00000000006ee6f8 REGS: c000000120c078c0 TRAP: 0700 No contaminado (6.10.0-rc3) MSR: 8000000000029033 CR: 2828220f XER: 0000000e CFAR: 00000001fdc80 M\u00c1SCARA IRQ: 0 [ .. GPR omitidos... ] NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0 LR [c0000000005d23d0] usercopy_abort+0x74/0xb0 Seguimiento de llamadas: usercopy_abort+0x74/0xb0 (no confiable) __check_heap_object+0xf8/0x 120 check_heap_object+0x218/0x240 __check_object_size+0x84/ 0x1a4 dtl_file_read+0x17c/0x2c4 full_proxy_read+0x8c/0x110 vfs_read+0xdc/0x3a0 ksys_read+0x84/0x144 system_call_exception+0x124/0x330 system_call_vectored_common+0x15c/0x2ec --- interrupci\u00f3n: 3000 0x7fff81f3ab34 Confirmaci\u00f3n 6d07d1cd300f (\"copia de usuario: restringir cach\u00e9s que no sean de copia de usuario) a tama\u00f1o 0\") requiere que solo las \u00e1reas incluidas en la lista blanca en objetos de losa/slub se puedan copiar al espacio de usuario cuando el refuerzo de copia de usuario est\u00e1 habilitado usando CONFIG_HARDENED_USERCOPY. Dtl contiene eventos de env\u00edo del hipervisor que se espera que sean le\u00eddos por usuarios privilegiados. Por lo tanto, marque esto como seguro para el acceso de los usuarios. Especifique useroffset=0 y usersize=DISPATCH_LOG_BYTES para incluir todo el objeto en la lista blanca." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41066.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41066.json index e66741606a2..987a73a65ea 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41066.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41066.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: Add tx check to prevent skb leak\n\nBelow is a summary of how the driver stores a reference to an skb during\ntransmit:\n tx_buff[free_map[consumer_index]]->skb = new_skb;\n free_map[consumer_index] = IBMVNIC_INVALID_MAP;\n consumer_index ++;\nWhere variable data looks like this:\n free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]\n \tconsumer_index^\n tx_buff == [skb=null, skb=, skb=, skb=null, skb=null]\n\nThe driver has checks to ensure that free_map[consumer_index] pointed to\na valid index but there was no check to ensure that this index pointed\nto an unused/null skb address. So, if, by some chance, our free_map and\ntx_buff lists become out of sync then we were previously risking an\nskb memory leak. This could then cause tcp congestion control to stop\nsending packets, eventually leading to ETIMEDOUT.\n\nTherefore, add a conditional to ensure that the skb address is null. If\nnot then warn the user (because this is still a bug that should be\npatched) and free the old pointer to prevent memleak/tcp problems." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ibmvnic: agregue verificaci\u00f3n de tx para evitar fugas de skb A continuaci\u00f3n se muestra un resumen de c\u00f3mo el controlador almacena una referencia a un skb durante la transmisi\u00f3n: tx_buff[free_map[consumer_index]]->skb = new_skb ; free_map[consumer_index] = IBMVNIC_INVALID_MAP; consumer_index++; Donde los datos variables se ven as\u00ed: free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3] consumer_index^ tx_buff == [skb=null, skb=, skb=, skb=null, skb=null ] El controlador tiene comprobaciones para garantizar que free_map[consumer_index] apunte a un \u00edndice v\u00e1lido, pero no hubo ninguna verificaci\u00f3n para garantizar que este \u00edndice apunte a una direcci\u00f3n skb nula o no utilizada. Entonces, si, por casualidad, nuestras listas free_map y tx_buff no est\u00e1n sincronizadas, entonces est\u00e1bamos arriesg\u00e1ndonos a una p\u00e9rdida de memoria skb. Esto podr\u00eda provocar que el control de congesti\u00f3n de TCP deje de enviar paquetes, lo que eventualmente provocar\u00eda ETIMEDOUT. Por lo tanto, agregue un condicional para garantizar que la direcci\u00f3n skb sea nula. De lo contrario, advierta al usuario (porque todav\u00eda es un error que debe corregirse) y libere el puntero antiguo para evitar problemas de memleak/tcp." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41067.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41067.json index 66d1b162ec2..afaafe064b5 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41067.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41067.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: scrub: handle RST lookup error correctly\n\n[BUG]\nWhen running btrfs/060 with forced RST feature, it would crash the\nfollowing ASSERT() inside scrub_read_endio():\n\n\tASSERT(sector_nr < stripe->nr_sectors);\n\nBefore that, we would have tree dump from\nbtrfs_get_raid_extent_offset(), as we failed to find the RST entry for\nthe range.\n\n[CAUSE]\nInside scrub_submit_extent_sector_read() every time we allocated a new\nbbio we immediately called btrfs_map_block() to make sure there was some\nRST range covering the scrub target.\n\nBut if btrfs_map_block() fails, we immediately call endio for the bbio,\nwhile the bbio is newly allocated, it's completely empty.\n\nThen inside scrub_read_endio(), we go through the bvecs to find\nthe sector number (as bi_sector is no longer reliable if the bio is\nsubmitted to lower layers).\n\nAnd since the bio is empty, such bvecs iteration would not find any\nsector matching the sector, and return sector_nr == stripe->nr_sectors,\ntriggering the ASSERT().\n\n[FIX]\nInstead of calling btrfs_map_block() after allocating a new bbio, call\nbtrfs_map_block() first.\n\nSince our only objective of calling btrfs_map_block() is only to update\nstripe_len, there is really no need to do that after btrfs_alloc_bio().\n\nThis new timing would avoid the problem of handling empty bbio\ncompletely, and in fact fixes a possible race window for the old code,\nwhere if the submission thread is the only owner of the pending_io, the\nscrub would never finish (since we didn't decrease the pending_io\ncounter).\n\nAlthough the root cause of RST lookup failure still needs to be\naddressed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: Scrub: maneja correctamente el error de b\u00fasqueda RST [ERROR] Al ejecutar btrfs/060 con la funci\u00f3n RST forzada, bloquear\u00eda el siguiente ASSERT() dentro de Scrub_read_endio(): ASSERT(sector_nr < raya->nr_sectors); Antes de eso, tendr\u00edamos un volcado de \u00e1rbol de btrfs_get_raid_extent_offset(), ya que no pudimos encontrar la entrada RST para el rango. [CAUSA] Dentro de Scrub_submit_extent_sector_read() cada vez que asignamos un nuevo bbio llamamos inmediatamente a btrfs_map_block() para asegurarnos de que hubiera alg\u00fan rango RST que cubriera el objetivo de limpieza. Pero si btrfs_map_block()fallo, inmediatamente llamamos a endio para el bbio, mientras el bbio est\u00e1 reci\u00e9n asignado, est\u00e1 completamente vac\u00edo. Luego, dentro de Scrub_read_endio(), revisamos los bvecs para encontrar el n\u00famero del sector (ya que bi_sector ya no es confiable si la biograf\u00eda se env\u00eda a capas inferiores). Y dado que la biograf\u00eda est\u00e1 vac\u00eda, dicha iteraci\u00f3n de bvecs no encontrar\u00eda ning\u00fan sector que coincida con el sector y devolver\u00eda sector_nr == stripe->nr_sectors, lo que activar\u00eda ASSERT(). [FIX] En lugar de llamar a btrfs_map_block() despu\u00e9s de asignar un nuevo bbio, llame primero a btrfs_map_block(). Dado que nuestro \u00fanico objetivo al llamar a btrfs_map_block() es solo actualizar stripe_len, realmente no hay necesidad de hacerlo despu\u00e9s de btrfs_alloc_bio(). Este nuevo tiempo evitar\u00eda por completo el problema de manejar bbio vac\u00edo y, de hecho, soluciona una posible ventana de ejecuci\u00f3npara el c\u00f3digo anterior, donde si el hilo de env\u00edo es el \u00fanico propietario de pendiente_io, la limpieza nunca terminar\u00eda (ya que no lo hicimos). disminuir el contador pendiente_io). Aunque a\u00fan es necesario abordar la causa ra\u00edz del error de b\u00fasqueda de RST." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41068.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41068.json index 153825d40fd..1dfa1d04b7e 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41068.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41068.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/sclp: Fix sclp_init() cleanup on failure\n\nIf sclp_init() fails it only partially cleans up: if there are multiple\nfailing calls to sclp_init() sclp_state_change_event will be added several\ntimes to sclp_reg_list, which results in the following warning:\n\n------------[ cut here ]------------\nlist_add double add: new=000003ffe1598c10, prev=000003ffe1598bf0, next=000003ffe1598c10.\nWARNING: CPU: 0 PID: 1 at lib/list_debug.c:35 __list_add_valid_or_report+0xde/0xf8\nCPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-rc3\nKrnl PSW : 0404c00180000000 000003ffe0d6076a (__list_add_valid_or_report+0xe2/0xf8)\n R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3\n...\nCall Trace:\n [<000003ffe0d6076a>] __list_add_valid_or_report+0xe2/0xf8\n([<000003ffe0d60766>] __list_add_valid_or_report+0xde/0xf8)\n [<000003ffe0a8d37e>] sclp_init+0x40e/0x450\n [<000003ffe00009f2>] do_one_initcall+0x42/0x1e0\n [<000003ffe15b77a6>] do_initcalls+0x126/0x150\n [<000003ffe15b7a0a>] kernel_init_freeable+0x1ba/0x1f8\n [<000003ffe0d6650e>] kernel_init+0x2e/0x180\n [<000003ffe000301c>] __ret_from_fork+0x3c/0x60\n [<000003ffe0d759ca>] ret_from_fork+0xa/0x30\n\nFix this by removing sclp_state_change_event from sclp_reg_list when\nsclp_init() fails." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/sclp: corrige la limpieza de sclp_init() en caso defallo. Si sclp_init()fallo, solo se limpia parcialmente: si hay varias llamadas fallidas a sclp_init(), sclp_state_change_event se agregar\u00e1 varias veces. a sclp_reg_list, lo que resulta en la siguiente advertencia: ------------[ cortar aqu\u00ed ]------------ list_add double add: new=000003ffe1598c10, prev=000003ffe1598bf0, siguiente=000003ffe1598c10. ADVERTENCIA: CPU: 0 PID: 1 en lib/list_debug.c:35 __list_add_valid_or_report+0xde/0xf8 CPU: 0 PID: 1 Comm: swapper/0 No contaminado 6.10.0-rc3 Krnl PSW: 0404c00180000000 000003ffe0d6076a (__list_ad d_valid_or_report+0xe2/0xf8 ) R:0 T:1 IO:0 EX:0 Clave:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 ... Seguimiento de llamadas: [<000003ffe0d6076a> ] __list_add_valid_or_report+0xe2/0xf8 ([<000003ffe0d60766>] __list_add_valid_or_report+0xde/0xf8) [<000003ffe0a8d37e>] sclp_init+0x40e/0x450 [<000003ffe00009f2>] _one_initcall+0x42/0x1e0 [<000003ffe15b77a6>] do_initcalls+0x126/0x150 [< 000003ffe15b7a0a>] kernel_init_freeable+0x1ba/0x1f8 [<000003ffe0d6650e>] kernel_init+0x2e/0x180 [<000003ffe000301c>] __ret_from_fork+0x3c/0x60 [<000003ffe0d759ca>] _from_fork+0xa/0x30 Solucionar esto eliminando sclp_state_change_event de sclp_reg_list cuando falla sclp_init() ." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41069.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41069.json index 70f1bed84f6..ff17852df93 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41069.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41069.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: topology: Fix references to freed memory\n\nMost users after parsing a topology file, release memory used by it, so\nhaving pointer references directly into topology file contents is wrong.\nUse devm_kmemdup(), to allocate memory as needed." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: topolog\u00eda: corrige referencias a la memoria liberada. La mayor\u00eda de los usuarios, despu\u00e9s de analizar un archivo de topolog\u00eda, liberan la memoria utilizada por este, por lo que tener referencias de puntero directamente al contenido del archivo de topolog\u00eda es incorrecto. Utilice devm_kmemdup() para asignar memoria seg\u00fan sea necesario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json index b2c56fd4f2d..5579c87cc85 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41070.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()\n\nAl reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().\n\nIt looks up `stt` from tablefd, but then continues to use it after doing\nfdput() on the returned fd. After the fdput() the tablefd is free to be\nclosed by another thread. The close calls kvm_spapr_tce_release() and\nthen release_spapr_tce_table() (via call_rcu()) which frees `stt`.\n\nAlthough there are calls to rcu_read_lock() in\nkvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent\nthe UAF, because `stt` is used outside the locked regions.\n\nWith an artifcial delay after the fdput() and a userspace program which\ntriggers the race, KASAN detects the UAF:\n\n BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505\n CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1\n Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV\n Call Trace:\n dump_stack_lvl+0xb4/0x108 (unreliable)\n print_report+0x2b4/0x6ec\n kasan_report+0x118/0x2b0\n __asan_load4+0xb8/0xd0\n kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]\n kvm_vfio_set_attr+0x524/0xac0 [kvm]\n kvm_device_ioctl+0x144/0x240 [kvm]\n sys_ioctl+0x62c/0x1810\n system_call_exception+0x190/0x440\n system_call_vectored_common+0x15c/0x2ec\n ...\n Freed by task 0:\n ...\n kfree+0xec/0x3e0\n release_spapr_tce_table+0xd4/0x11c [kvm]\n rcu_core+0x568/0x16a0\n handle_softirqs+0x23c/0x920\n do_softirq_own_stack+0x6c/0x90\n do_softirq_own_stack+0x58/0x90\n __irq_exit_rcu+0x218/0x2d0\n irq_exit+0x30/0x80\n arch_local_irq_restore+0x128/0x230\n arch_local_irq_enable+0x1c/0x30\n cpuidle_enter_state+0x134/0x5cc\n cpuidle_enter+0x6c/0xb0\n call_cpuidle+0x7c/0x100\n do_idle+0x394/0x410\n cpu_startup_entry+0x60/0x70\n start_secondary+0x3fc/0x410\n start_secondary_prolog+0x10/0x14\n\nFix it by delaying the fdput() until `stt` is no longer in use, which\nis effectively the entire function. To keep the patch minimal add a call\nto fdput() at each of the existing return paths. Future work can convert\nthe function to goto or __cleanup style cleanup.\n\nWith the fix in place the test case no longer triggers the UAF." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: PPC: Book3S HV: Prevenir UAF en kvm_spapr_tce_attach_iommu_group() Al inform\u00f3 un posible use after free (UAF) en kvm_spapr_tce_attach_iommu_group(). Busca `stt` en tablefd, pero luego contin\u00faa us\u00e1ndolo despu\u00e9s de realizar fdput() en el fd devuelto. Despu\u00e9s de fdput(), otro hilo puede cerrar el tablefd. El cierre llama a kvm_spapr_tce_release() y luego a release_spapr_tce_table() (a trav\u00e9s de call_rcu()) que libera `stt`. Aunque hay llamadas a rcu_read_lock() en kvm_spapr_tce_attach_iommu_group(), no son suficientes para evitar la UAF, porque `stt` se usa fuera de las regiones bloqueadas. Con un retraso artificial despu\u00e9s de fdput() y un programa de espacio de usuario que desencadena la ejecuci\u00f3n, KASAN detecta la UAF: ERROR: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm] Lectura de tama\u00f1o 4 en direcci\u00f3n c000200027552c30 por tarea kvm-vfio/2505 CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1 Nombre de hardware: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35 -g1851b2a06 Seguimiento de llamadas de PowerNV: dump_stack_lvl+0xb4/0x108 (no confiable) print_report+0x2b4/0x6ec kasan_report+0x118/0x2b0 __asan_load4+0xb8/0xd0 kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm] kvm_vfio_set_attr+0x524/0xac0 [kvm] kvm_device_ioctl+0x144/0x240 [kvm] sys_ioctl+0x62c/0x1810 system_call_exception+0x190/0x440 system_call_vectored_common+0x15c/0x2ec ... Liberado por la tarea 0: ... kfree+0xec/0x3e0 release_spapr_tce_table+0xd4/0x11c [rcu_core+0x568/0 x16a0 handle_softirqs+0x23c /0x920 do_softirq_own_stack+0x6c/0x90 do_softirq_own_stack+0x58/0x90 __irq_exit_rcu+0x218/0x2d0 irq_exit+0x30/0x80 arch_local_irq_restore+0x128/0x230 arch_local_irq_enable+0x1c/0x 30 cpuidle_enter_state+0x134/0x5cc cpuidle_enter+0x6c/0xb0 call_cpuidle+0x7c/0x100 do_idle+0x394 /0x410 cpu_startup_entry+0x60/0x70 start_secondary+0x3fc/0x410 start_secondary_prolog+0x10/0x14 Solucionarlo retrasando fdput() hasta que `stt` ya no est\u00e9 en uso, que es efectivamente toda la funci\u00f3n. Para mantener el parche m\u00ednimo, agregue una llamada a fdput() en cada una de las rutas de retorno existentes. El trabajo futuro puede convertir la funci\u00f3n a limpieza de estilo goto o __cleanup. Con la soluci\u00f3n implementada, el caso de prueba ya no activa la UAF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json index efb5b718c1c..e863b8e6eb7 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Avoid address calculations via out of bounds array indexing\n\nreq->n_channels must be set before req->channels[] can be used.\n\nThis patch fixes one of the issues encountered in [1].\n\n[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4\n[ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]'\n[...]\n[ 83.964264] Call Trace:\n[ 83.964267] \n[ 83.964269] dump_stack_lvl+0x3f/0xc0\n[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110\n[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0\n[ 83.964281] __ieee80211_start_scan+0x601/0x990\n[ 83.964291] nl80211_trigger_scan+0x874/0x980\n[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160\n[ 83.964298] genl_rcv_msg+0x240/0x270\n[...]\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=218810" + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: evitar c\u00e1lculos de direcciones mediante indexaci\u00f3n de matriz fuera de los l\u00edmites. Se debe configurar req->n_channels antes de poder usar req->channels[]. Este parche soluciona uno de los problemas encontrados en [1]. [83.964255] UBSAN: \u00edndice de matriz fuera de los l\u00edmites en net/mac80211/scan.c:364:4 [83.964258] el \u00edndice 0 est\u00e1 fuera de rango para el tipo 'struct ieee80211_channel *[]' [...] [ 83.964264] Seguimiento de llamadas: [ 83.964267] [ 83.964269] dump_stack_lvl+0x3f/0xc0 [ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110 [ 83.964278] escaneo+0x2db/0x4b0 [ 83.964281] __ieee80211_start_scan+0x601/0x990 [ 83.964291] nl80211_trigger_scan+0x874/ 0x980 [83.964295] genl_family_rcv_msg_doit+0xe8/0x160 [83.964298] genl_rcv_msg+0x240/0x270 [...] [1] https://bugzilla.kernel.org/show_bug.cgi?id=218810" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41072.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41072.json index a67806f3ec0..d8bf036c512 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41072.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41072.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: wext: add extra SIOCSIWSCAN data check\n\nIn 'cfg80211_wext_siwscan()', add extra check whether number of\nchannels passed via 'ioctl(sock, SIOCSIWSCAN, ...)' doesn't exceed\nIW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: wext: agregue verificaci\u00f3n de datos SIOCSIWSCAN adicional En 'cfg80211_wext_siwscan()', agregue verificaci\u00f3n adicional si el n\u00famero de canales pasados a trav\u00e9s de 'ioctl(sock, SIOCSIWSCAN, ...) ' no excede IW_MAX_FREQUENCIES y rechaza la solicitud no v\u00e1lida con -EINVAL en caso contrario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json index 8ec1d2d7b6e..57f1eb4577a 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41073.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: avoid double free special payload\n\nIf a discard request needs to be retried, and that retry may fail before\na new special payload is added, a double free will result. Clear the\nRQF_SPECIAL_LOAD when the request is cleaned." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme: evitar payload de double free especial Si es necesario volver a intentar una solicitud de descarte y ese reintento puede fallar antes de agregar un nuevo payload especial, se producir\u00e1 un double free. Borre RQF_SPECIAL_LOAD cuando se limpie la solicitud." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41074.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41074.json index 0319a2c56df..1b1bd0b527f 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41074.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41074.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: Set object to close if ondemand_id < 0 in copen\n\nIf copen is maliciously called in the user mode, it may delete the request\ncorresponding to the random id. And the request may have not been read yet.\n\nNote that when the object is set to reopen, the open request will be done\nwith the still reopen state in above case. As a result, the request\ncorresponding to this object is always skipped in select_req function, so\nthe read request is never completed and blocks other process.\n\nFix this issue by simply set object to close if its id < 0 in copen." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: archivos de cach\u00e9: establece el objeto para que se cierre si ondemand_id < 0 en copen. Si se llama maliciosamente a copen en el modo de usuario, puede eliminar la solicitud correspondiente a la identificaci\u00f3n aleatoria. Y es posible que la solicitud a\u00fan no se haya le\u00eddo. Tenga en cuenta que cuando el objeto est\u00e1 configurado para reabrirse, la solicitud de apertura se realizar\u00e1 con el estado a\u00fan reabierto en el caso anterior. Como resultado, la solicitud correspondiente a este objeto siempre se omite en la funci\u00f3n select_req, por lo que la solicitud de lectura nunca se completa y bloquea otros procesos. Solucione este problema simplemente configurando el objeto para que se cierre si su id <0 en copen." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41075.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41075.json index d266beebcc0..92319e3e8ba 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41075.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41075.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: add consistency check for copen/cread\n\nThis prevents malicious processes from completing random copen/cread\nrequests and crashing the system. Added checks are listed below:\n\n * Generic, copen can only complete open requests, and cread can only\n complete read requests.\n * For copen, ondemand_id must not be 0, because this indicates that the\n request has not been read by the daemon.\n * For cread, the object corresponding to fd and req should be the same." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: archivos de cach\u00e9: agregue verificaci\u00f3n de coherencia para copen/cread. Esto evita que procesos maliciosos completen solicitudes aleatorias de copen/cread y bloqueen el sistema. Las comprobaciones agregadas se enumeran a continuaci\u00f3n: * Gen\u00e9rico, copen solo puede completar solicitudes abiertas y cread solo puede completar solicitudes de lectura. * Para copen, ondemand_id no debe ser 0, porque esto indica que el daemon no ha le\u00eddo la solicitud. * Para cread, el objeto correspondiente a fd y req debe ser el mismo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41076.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41076.json index 27f5b49e40d..800e3fb5672 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41076.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41076.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix memory leak in nfs4_set_security_label\n\nWe leak nfs_fattr and nfs4_label every time we set a security xattr." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: NFSv4: corrige la p\u00e9rdida de memoria en nfs4_set_security_label Filtramos nfs_fattr y nfs4_label cada vez que configuramos un xattr de seguridad." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41077.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41077.json index e881c9524dd..0b12a9a0fc2 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41077.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41077.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnull_blk: fix validation of block size\n\nBlock size should be between 512 and PAGE_SIZE and be a power of 2. The current\ncheck does not validate this, so update the check.\n\nWithout this patch, null_blk would Oops due to a null pointer deref when\nloaded with bs=1536 [1].\n\n\n[axboe: remove unnecessary braces and != 0 check]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: null_blk: corrige la validaci\u00f3n del tama\u00f1o del bloque. El tama\u00f1o del bloque debe estar entre 512 y PAGE_SIZE y ser una potencia de 2. La verificaci\u00f3n actual no valida esto, as\u00ed que actualice la verificaci\u00f3n. Sin este parche, null_blk tendr\u00eda un error debido a la eliminaci\u00f3n del puntero nulo cuando se carga con bs=1536 [1]. [axboe: elimine las llaves innecesarias y la comprobaci\u00f3n != 0]" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41078.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41078.json index cf3f985c3f6..05d7d07e4e9 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41078.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41078.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix quota root leak after quota disable failure\n\nIf during the quota disable we fail when cleaning the quota tree or when\ndeleting the root from the root tree, we jump to the 'out' label without\never dropping the reference on the quota root, resulting in a leak of the\nroot since fs_info->quota_root is no longer pointing to the root (we have\nset it to NULL just before those steps).\n\nFix this by always doing a btrfs_put_root() call under the 'out' label.\nThis is a problem that exists since qgroups were first added in 2012 by\ncommit bed92eae26cc (\"Btrfs: qgroup implementation and prototypes\"), but\nback then we missed a kfree on the quota root and free_extent_buffer()\ncalls on its root and commit root nodes, since back then roots were not\nyet reference counted." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha solucionado la siguiente vulnerabilidad: btrfs:qgroup: arregla fuga de cuota ra\u00edz tras fallo de desactivaci\u00f3n de cuota Si durante la desactivaci\u00f3n de cuota fallamos al limpiar el \u00e1rbol de cuotas o al borrar el root del \u00e1rbol ra\u00edz, saltamos al etiqueta 'out' sin eliminar la referencia en la ra\u00edz de la cuota, lo que resulta en una p\u00e9rdida de la ra\u00edz ya que fs_info->quota_root ya no apunta a la ra\u00edz (la hemos configurado en NULL justo antes de esos pasos). Solucione este problema realizando siempre una llamada btrfs_put_root() bajo la etiqueta 'out'. Este es un problema que existe desde que qgroups se agregaron por primera vez en 2012 mediante el compromiso bed92eae26cc (\"Btrfs: implementaci\u00f3n y prototipos de qgroup\"), pero en aquel entonces nos perdimos un kfree en la cuota ra\u00edz y llamadas free_extent_buffer() en su ra\u00edz y en los nodos ra\u00edz de confirmaci\u00f3n. , ya que en aquel entonces las ra\u00edces a\u00fan no se contaban como referencia." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41079.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41079.json index f8d0eb9dd3a..d5e3e8dbe07 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41079.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41079.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: always initialize cqe.result\n\nThe spec doesn't mandate that the first two double words (aka results)\nfor the command queue entry need to be set to 0 when they are not\nused (not specified). Though, the target implemention returns 0 for TCP\nand FC but not for RDMA.\n\nLet's make RDMA behave the same and thus explicitly initializing the\nresult field. This prevents leaking any data from the stack." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: inicializar siempre cqe.result La especificaci\u00f3n no exige que las dos primeras palabras dobles (tambi\u00e9n conocidas como resultados) para la entrada de la cola de comandos deban establecerse en 0 cuando no lo est\u00e1n usado (no especificado). Sin embargo, la implementaci\u00f3n de destino devuelve 0 para TCP y FC, pero no para RDMA. Hagamos que RDMA se comporte igual y as\u00ed inicialicemos expl\u00edcitamente el campo de resultado. Esto evita la fuga de datos de la pila." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41080.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41080.json index 80a8ead970c..a504c9e4044 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41080.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41080.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix possible deadlock in io_register_iowq_max_workers()\n\nThe io_register_iowq_max_workers() function calls io_put_sq_data(),\nwhich acquires the sqd->lock without releasing the uring_lock.\nSimilar to the commit 009ad9f0c6ee (\"io_uring: drop ctx->uring_lock\nbefore acquiring sqd->lock\"), this can lead to a potential deadlock\nsituation.\n\nTo resolve this issue, the uring_lock is released before calling\nio_put_sq_data(), and then it is re-acquired after the function call.\n\nThis change ensures that the locks are acquired in the correct\norder, preventing the possibility of a deadlock." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: io_uring: soluciona posible punto muerto en io_register_iowq_max_workers() La funci\u00f3n io_register_iowq_max_workers() llama a io_put_sq_data(), que adquiere el sqd->lock sin liberar uring_lock. De manera similar a la confirmaci\u00f3n 009ad9f0c6ee (\"io_uring: drop ctx->uring_lock before adquiring sqd->lock\"), esto puede conducir a una posible situaci\u00f3n de punto muerto. Para resolver este problema, uring_lock se libera antes de llamar a io_put_sq_data() y luego se vuelve a adquirir despu\u00e9s de la llamada a la funci\u00f3n. Este cambio garantiza que los bloqueos se adquieran en el orden correcto, evitando la posibilidad de un punto muerto." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41081.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41081.json index f652a630ae4..1dbf00837cd 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41081.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41081.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nila: block BH in ila_output()\n\nAs explained in commit 1378817486d6 (\"tipc: block BH\nbefore using dst_cache\"), net/core/dst_cache.c\nhelpers need to be called with BH disabled.\n\nila_output() is called from lwtunnel_output()\npossibly from process context, and under rcu_read_lock().\n\nWe might be interrupted by a softirq, re-enter ila_output()\nand corrupt dst_cache data structures.\n\nFix the race by using local_bh_disable()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ila: bloquear BH en ila_output() Como se explica en la confirmaci\u00f3n 1378817486d6 (\"tipc: bloquear BH antes de usar dst_cache\"), los ayudantes net/core/dst_cache.c deben llamarse con BH desactivado. ila_output() se llama desde lwtunnel_output() posiblemente desde el contexto del proceso y bajo rcu_read_lock(). Podr\u00edamos ser interrumpidos por un softirq, volver a ingresar a ila_output() y da\u00f1ar las estructuras de datos dst_cache. Arregle la carrera usando local_bh_disable()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41082.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41082.json index b1ada260932..c4655c2099b 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41082.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41082.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fabrics: use reserved tag for reg read/write command\n\nIn some scenarios, if too many commands are issued by nvme command in\nthe same time by user tasks, this may exhaust all tags of admin_q. If\na reset (nvme reset or IO timeout) occurs before these commands finish,\nreconnect routine may fail to update nvme regs due to insufficient tags,\nwhich will cause kernel hang forever. In order to workaround this issue,\nmaybe we can let reg_read32()/reg_read64()/reg_write32() use reserved\ntags. This maybe safe for nvmf:\n\n1. For the disable ctrl path, we will not issue connect command\n2. For the enable ctrl / fw activate path, since connect and reg_xx()\n are called serially.\n\nSo the reserved tags may still be enough while reg_xx() use reserved tags." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-fabrics: use etiqueta reservada para el comando de lectura/escritura de registro. En algunos escenarios, si el comando nvme emite demasiados comandos al mismo tiempo por las tareas del usuario, esto puede agotar todos etiquetas de admin_q. Si se produce un reinicio (reinicio de nvme o tiempo de espera de IO) antes de que finalicen estos comandos, es posible que la rutina de reconexi\u00f3n no actualice los registros de nvme debido a etiquetas insuficientes, lo que provocar\u00e1 que el kernel se cuelgue para siempre. Para solucionar este problema, tal vez podamos permitir que reg_read32()/reg_read64()/reg_write32() use etiquetas reservadas. Esto puede ser seguro para nvmf: 1. Para la ruta de activaci\u00f3n ctrl/deshabilitar, no emitiremos el comando connect. 2. Para la ruta de activaci\u00f3n ctrl/fw enable, ya que connect y reg_xx() se llaman en serie. Por lo tanto, las etiquetas reservadas pueden ser suficientes mientras reg_xx() usa etiquetas reservadas." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41083.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41083.json index 1803e8ce482..819066d6951 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41083.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41083.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix netfs_page_mkwrite() to check folio->mapping is valid\n\nFix netfs_page_mkwrite() to check that folio->mapping is valid once it has\ntaken the folio lock (as filemap_page_mkwrite() does). Without this,\ngeneric/247 occasionally oopses with something like the following:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n\n RIP: 0010:trace_event_raw_event_netfs_folio+0x61/0xc0\n ...\n Call Trace:\n \n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x6e/0xa0\n ? exc_page_fault+0xc2/0xe0\n ? asm_exc_page_fault+0x22/0x30\n ? trace_event_raw_event_netfs_folio+0x61/0xc0\n trace_netfs_folio+0x39/0x40\n netfs_page_mkwrite+0x14c/0x1d0\n do_page_mkwrite+0x50/0x90\n do_pte_missing+0x184/0x200\n __handle_mm_fault+0x42d/0x500\n handle_mm_fault+0x121/0x1f0\n do_user_addr_fault+0x23e/0x3c0\n exc_page_fault+0xc2/0xe0\n asm_exc_page_fault+0x22/0x30\n\nThis is due to the invalidate_inode_pages2_range() issued at the end of the\nDIO write interfering with the mmap'd writes." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfs: corrija netfs_page_mkwrite() para verificar que folio->mapping sea v\u00e1lido. Corrija netfs_page_mkwrite() para verificar que folio->mapping sea v\u00e1lido una vez que haya tomado el bloqueo de folio (como filemap_page_mkwrite( ) hace). Sin esto, generic/247 ocasionalmente falla con algo como lo siguiente: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000) - p\u00e1gina no presente RIP: 0010:trace_event_raw_event_netfs_folio +0x61/0xc0... Seguimiento de llamadas: ? __die_body+0x1a/0x60 ? page_fault_oops+0x6e/0xa0? exc_page_fault+0xc2/0xe0? asm_exc_page_fault+0x22/0x30? trace_event_raw_event_netfs_folio+0x61/0xc0 trace_netfs_folio+0x39/0x40 netfs_page_mkwrite+0x14c/0x1d0 do_page_mkwrite+0x50/0x90 do_pte_missing+0x184/0x200 __handle_mm_fault+0x42d/0x500 _fault+0x121/0x1f0 do_user_addr_fault+0x23e/0x3c0 exc_page_fault+0xc2/0xe0 asm_exc_page_fault+0x22/0x30 Esto se debe a que invalidate_inode_pages2_range() emitido al final de la escritura DIO interfiere con las escrituras mmap." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41084.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41084.json index 3169961f30b..8b213577ce7 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41084.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41084.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/region: Avoid null pointer dereference in region lookup\n\ncxl_dpa_to_region() looks up a region based on a memdev and DPA.\nIt wrongly assumes an endpoint found mapping the DPA is also of\na fully assembled region. When not true it leads to a null pointer\ndereference looking up the region name.\n\nThis appears during testing of region lookup after a failure to\nassemble a BIOS defined region or if the lookup raced with the\nassembly of the BIOS defined region.\n\nFailure to clean up BIOS defined regions that fail assembly is an\nissue in itself and a fix to that problem will alleviate some of\nthe impact. It will not alleviate the race condition so let's harden\nthis path.\n\nThe behavior change is that the kernel oops due to a null pointer\ndereference is replaced with a dev_dbg() message noting that an\nendpoint was mapped.\n\nAdditional comments are added so that future users of this function\ncan more clearly understand what it provides." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cxl/region: evitar la desreferencia del puntero nulo en la b\u00fasqueda de regiones cxl_dpa_to_region() busca una regi\u00f3n basada en memdev y DPA. Se supone err\u00f3neamente que un endpoint encontrado mapeando el DPA tambi\u00e9n pertenece a una regi\u00f3n completamente ensamblada. Cuando no es cierto, se produce una desreferencia del puntero nulo al buscar el nombre de la regi\u00f3n. Esto aparece durante la prueba de la b\u00fasqueda de regiones despu\u00e9s de un error al ensamblar una regi\u00f3n definida por el BIOS o si la b\u00fasqueda coincidi\u00f3 con el ensamblaje de la regi\u00f3n definida por el BIOS. No limpiar las regiones definidas por el BIOS que fallan en el ensamblaje es un problema en s\u00ed mismo y una soluci\u00f3n a ese problema aliviar\u00e1 parte del impacto. Esto no aliviar\u00e1 las condiciones de carrera, as\u00ed que endurezcamos este camino. El cambio de comportamiento es que el kernel oops debido a una desreferencia de puntero nulo se reemplaza con un mensaje dev_dbg() que indica que se asign\u00f3 un endpoint. Se agregan comentarios adicionales para que los futuros usuarios de esta funci\u00f3n puedan comprender m\u00e1s claramente lo que proporciona." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41085.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41085.json index 216aef0a161..e08b7361576 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41085.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41085.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\n\nWhen CXL subsystem is auto-assembling a pmem region during cxl\nendpoint port probing, always hit below calltrace.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000078\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n Call Trace:\n \n ? __die+0x24/0x70\n ? page_fault_oops+0x82/0x160\n ? do_user_addr_fault+0x65/0x6b0\n ? exc_page_fault+0x7d/0x170\n ? asm_exc_page_fault+0x26/0x30\n ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\n cxl_bus_probe+0x1b/0x60 [cxl_core]\n really_probe+0x173/0x410\n ? __pfx___device_attach_driver+0x10/0x10\n __driver_probe_device+0x80/0x170\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x90/0x120\n bus_for_each_drv+0x84/0xe0\n __device_attach+0xbc/0x1f0\n bus_probe_device+0x90/0xa0\n device_add+0x51c/0x710\n devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\n cxl_bus_probe+0x1b/0x60 [cxl_core]\n\nThe cxl_nvd of the memdev needs to be available during the pmem region\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\nThe endpoint probe, in the case of autoassembly of regions, can cause a\npmem region probe requiring the not yet available cxl_nvd. Adjust the\nsequence so this dependency is met.\n\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\ncan be used to query the ancestor root port. The endpoint port is not\nyet available, but will share a common ancestor with its parent, so\nstart the query from there instead." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cxl/mem: no se corrige cxl_nvd durante el autoensamblaje de la regi\u00f3n pmem. Cuando el subsistema CXL ensambla autom\u00e1ticamente una regi\u00f3n pmem durante el sondeo del puerto del endpoint cxl, presione siempre debajo de calltrace. ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000078 #PF: acceso de lectura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] Seguimiento de llamadas: ? __morir+0x24/0x70 ? page_fault_oops+0x82/0x160? do_user_addr_fault+0x65/0x6b0? exc_page_fault+0x7d/0x170? asm_exc_page_fault+0x26/0x30? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem] cxl_bus_probe+0x1b/0x60 [cxl_core] really_probe+0x173/0x410? __pfx___device_attach_driver+0x10/0x10 __driver_probe_device+0x80/0x170 driver_probe_device+0x1e/0x90 __device_attach_driver+0x90/0x120 bus_for_each_drv+0x84/0xe0 __device_attach+0xbc/0x1f0 be_device+0x90/0xa0 device_add+0x51c/0x710 devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core] cxl_bus_probe+ 0x1b/0x60 [cxl_core] El cxl_nvd de memdev debe estar disponible durante el sondeo de la regi\u00f3n pmem. Actualmente, cxl_nvd est\u00e1 registrado despu\u00e9s de la sonda del puerto del endpoint. La sonda de endpoint, en el caso de autoensamblaje de regiones, puede provocar una sonda de regi\u00f3n pmem que requiera el cxl_nvd a\u00fan no disponible. Ajuste la secuencia para que se cumpla esta dependencia. Esto requiere agregar un par\u00e1metro de puerto a cxl_find_nvdimm_bridge() que se puede usar para consultar el puerto ra\u00edz ancestro. El puerto del endpoint a\u00fan no est\u00e1 disponible, pero compartir\u00e1 un ancestro com\u00fan con su padre, as\u00ed que inicie la consulta desde all\u00ed." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41086.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41086.json index 2cb00f3d120..6f84d4238e9 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41086.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41086.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbcachefs: Fix sb_field_downgrade validation\n\n- bch2_sb_downgrade_validate() wasn't checking for a downgrade entry\n extending past the end of the superblock section\n\n- for_each_downgrade_entry() is used in to_text() and needs to work on\n malformed input; it also was missing a check for a field extending\n past the end of the section" + }, + { + "lang": "es", + "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bcachefs: corrigi\u00f3 la validaci\u00f3n de sb_field_downgrade - bch2_sb_downgrade_validate() no buscaba una entrada de degradaci\u00f3n que se extendiera m\u00e1s all\u00e1 del final de la secci\u00f3n de superbloque - for_each_downgrade_entry() se usa en to_text() y necesita trabajar con entradas mal formadas; Tambi\u00e9n faltaba una marca para un campo que se extend\u00eda m\u00e1s all\u00e1 del final de la secci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41087.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41087.json index ff22d6c0647..268680d3c30 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41087.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41087.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: libata-core: Fix double free on error\n\nIf e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump\nto the err_out label, which will call devres_release_group().\ndevres_release_group() will trigger a call to ata_host_release().\nata_host_release() calls kfree(host), so executing the kfree(host) in\nata_host_alloc() will lead to a double free:\n\nkernel BUG at mm/slub.c:553!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 11 PID: 599 Comm: (udev-worker) Not tainted 6.10.0-rc5 #47\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:kfree+0x2cf/0x2f0\nCode: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da\nRSP: 0018:ffffc90000f377f0 EFLAGS: 00010246\nRAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320\nRDX: 000000000000400b RSI: ffffffffc02c9de5 RDI: ffff888112b1f2c0\nRBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000\nR10: ffffc90000f37610 R11: 617461203a736b6e R12: ffffea00044ac780\nR13: ffff888100046400 R14: ffffffffc02c9de5 R15: 0000000000000006\nFS: 00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \n ? __die_body.cold+0x19/0x27\n ? die+0x2e/0x50\n ? do_trap+0xca/0x110\n ? do_error_trap+0x6a/0x90\n ? kfree+0x2cf/0x2f0\n ? exc_invalid_op+0x50/0x70\n ? kfree+0x2cf/0x2f0\n ? asm_exc_invalid_op+0x1a/0x20\n ? ata_host_alloc+0xf5/0x120 [libata]\n ? ata_host_alloc+0xf5/0x120 [libata]\n ? kfree+0x2cf/0x2f0\n ata_host_alloc+0xf5/0x120 [libata]\n ata_host_alloc_pinfo+0x14/0xa0 [libata]\n ahci_init_one+0x6c9/0xd20 [ahci]\n\nEnsure that we will not call kfree(host) twice, by performing the kfree()\nonly if the devres_open_group() call failed." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: libata-core: corrige double free en caso de error Si, por ejemplo, la llamada ata_port_alloc() en ata_host_alloc() falla, saltaremos a la etiqueta err_out, que llamar\u00e1 a devres_release_group() . devres_release_group() activar\u00e1 una llamada a ata_host_release(). ata_host_release() llama a kfree(host), por lo que ejecutar kfree(host) en ata_host_alloc() provocar\u00e1 un doble error de kernel free: en mm/slub.c:553. Ups: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI CPU: 11 PID: 599 Comm: (udev-worker) No contaminado 6.10.0-rc5 #47 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 01/04/2014 RIP: 0010:kfree+0x2cf/0x2f0 C\u00f3digo: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da RSP : 0018:ffffc90000f377f0 EFLAGS: 00010246 RAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320 RDX: 000000000000400b RSI: ffffffffc02c 9de5 RDI: ffff888112b1f2c0 RBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000 R10: ffffc90000f37610 R11: 617461203a736b6e : ffffea00044ac780 R13: ffff888100046400 R14: ffffffffc02c9de5 R15 : 0000000000000006 FS: 00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050 033 CR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __die_body.cold+0x19/0x27 ? die+0x2e/0x50 ? do_trap+0xca/0x110 ? do_error_trap+0x6a/0x90? kfree+0x2cf/0x2f0 ? exc_invalid_op+0x50/0x70? kfree+0x2cf/0x2f0 ? asm_exc_invalid_op+0x1a/0x20? ata_host_alloc+0xf5/0x120 [libata]? ata_host_alloc+0xf5/0x120 [libata]? kfree+0x2cf/0x2f0 ata_host_alloc+0xf5/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 [ahci] Aseg\u00farese de que no llamaremos a kfree(host) dos veces, realizando kfree() solo si La llamada a devres_open_group() fall\u00f3." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41088.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41088.json index e6f74baec88..76d08188db7 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41088.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41088.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcp251xfd: fix infinite loop when xmit fails\n\nWhen the mcp251xfd_start_xmit() function fails, the driver stops\nprocessing messages, and the interrupt routine does not return,\nrunning indefinitely even after killing the running application.\n\nError messages:\n[ 441.298819] mcp251xfd spi2.0 can0: ERROR in mcp251xfd_start_xmit: -16\n[ 441.306498] mcp251xfd spi2.0 can0: Transmit Event FIFO buffer not empty. (seq=0x000017c7, tef_tail=0x000017cf, tef_head=0x000017d0, tx_head=0x000017d3).\n... and repeat forever.\n\nThe issue can be triggered when multiple devices share the same SPI\ninterface. And there is concurrent access to the bus.\n\nThe problem occurs because tx_ring->head increments even if\nmcp251xfd_start_xmit() fails. Consequently, the driver skips one TX\npackage while still expecting a response in\nmcp251xfd_handle_tefif_one().\n\nResolve the issue by starting a workqueue to write the tx obj\nsynchronously if err = -EBUSY. In case of another error, decrement\ntx_ring->head, remove skb from the echo stack, and drop the message.\n\n[mkl: use more imperative wording in patch description]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: mcp251xfd: corrige el bucle infinito cuando falla xmit Cuando falla la funci\u00f3n mcp251xfd_start_xmit(), el controlador deja de procesar mensajes y la rutina de interrupci\u00f3n no regresa, ejecut\u00e1ndose indefinidamente incluso despu\u00e9s de finalizar el aplicaci\u00f3n en ejecuci\u00f3n. Mensajes de error: [441.298819] mcp251xfd spi2.0 can0: ERROR en mcp251xfd_start_xmit: -16 [441.306498] mcp251xfd spi2.0 can0: El b\u00fafer FIFO de evento de transmisi\u00f3n no est\u00e1 vac\u00edo. (seq=0x000017c7, tef_tail=0x000017cf, tef_head=0x000017d0, tx_head=0x000017d3). ... y repetir para siempre. El problema puede desencadenarse cuando varios dispositivos comparten la misma interfaz SPI. Y hay acceso simult\u00e1neo al autob\u00fas. El problema ocurre porque tx_ring->head incrementa incluso si falla mcp251xfd_start_xmit(). En consecuencia, el controlador omite un paquete TX mientras espera una respuesta en mcp251xfd_handle_tefif_one(). Resuelva el problema iniciando una cola de trabajo para escribir el obj tx sincr\u00f3nicamente si err = -EBUSY. En caso de otro error, disminuya tx_ring->head, elimine skb de la pila de eco y elimine el mensaje. [mkl: utilice una redacci\u00f3n m\u00e1s imperativa en la descripci\u00f3n del parche]" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41089.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41089.json index aba16d7550b..436fd83e37f 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41089.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41089.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes\n\nIn nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().\nAdd a check to avoid null pointer dereference." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau/dispnv04: corrige la desreferencia del puntero nulo en nv17_tv_get_hd_modes En nv17_tv_get_hd_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Lo mismo se aplica a drm_cvt_mode(). Agregue una marca para evitar la desreferencia del puntero nulo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41092.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41092.json index 5f00d4c821c..7b3fc05077b 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41092.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41092.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gt: Fix potential UAF by revoke of fence registers\n\nCI has been sporadically reporting the following issue triggered by\nigt@i915_selftest@live@hangcheck on ADL-P and similar machines:\n\n<6> [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence\n...\n<6> [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled\n<6> [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled\n<3> [414.070354] Unable to pin Y-tiled fence; err:-4\n<3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active))\n...\n<4>[ 609.603992] ------------[ cut here ]------------\n<2>[ 609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301!\n<4>[ 609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n<4>[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G U W 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1\n<4>[ 609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023\n<4>[ 609.604010] Workqueue: i915 __i915_gem_free_work [i915]\n<4>[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915]\n...\n<4>[ 609.604271] Call Trace:\n<4>[ 609.604273] \n...\n<4>[ 609.604716] __i915_vma_evict+0x2e9/0x550 [i915]\n<4>[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915]\n<4>[ 609.604977] force_unbind+0x24/0xa0 [i915]\n<4>[ 609.605098] i915_vma_destroy+0x2f/0xa0 [i915]\n<4>[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915]\n<4>[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915]\n<4>[ 609.605440] process_scheduled_works+0x351/0x690\n...\n\nIn the past, there were similar failures reported by CI from other IGT\ntests, observed on other platforms.\n\nBefore commit 63baf4f3d587 (\"drm/i915/gt: Only wait for GPU activity\nbefore unbinding a GGTT fence\"), i915_vma_revoke_fence() was waiting for\nidleness of vma->active via fence_update(). That commit introduced\nvma->fence->active in order for the fence_update() to be able to wait\nselectively on that one instead of vma->active since only idleness of\nfence registers was needed. But then, another commit 0d86ee35097a\n(\"drm/i915/gt: Make fence revocation unequivocal\") replaced the call to\nfence_update() in i915_vma_revoke_fence() with only fence_write(), and\nalso added that GEM_BUG_ON(!i915_active_is_idle(&fence->active)) in front.\nNo justification was provided on why we might then expect idleness of\nvma->fence->active without first waiting on it.\n\nThe issue can be potentially caused by a race among revocation of fence\nregisters on one side and sequential execution of signal callbacks invoked\non completion of a request that was using them on the other, still\nprocessed in parallel to revocation of those fence registers. Fix it by\nwaiting for idleness of vma->fence->active in i915_vma_revoke_fence().\n\n(cherry picked from commit 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915/gt: corrige un posible UAF mediante la revocaci\u00f3n de los registros de valla. CI ha estado informando espor\u00e1dicamente el siguiente problema provocado por igt@i915_selftest@live@hangcheck en ADL-P y m\u00e1quinas similares. : <6> [414.049203] I915: ejecutando Intel_hangcheck_live_SelfTests/IGT_RESET_EVICT_FENCE ... <6> [414.068804] I915 0000: 00: 02.0: [DRM] GT0: GUC: CUBLICIDAD : [drm] GT0: GUC: SLPC habilitado <3> [414.070354] No se puede fijar la cerca con mosaicos en Y; err:-4 <3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active)) ... <4>[ 609.603992] ------------[ cortar aqu\u00ed ]- ----------- <2>[ 609.603995] \u00a1ERROR del kernel en drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301! <4>[ 609.604003] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI <4>[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Contaminado: GUW 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1 <4 >[ 609.604008] Nombre del hardware: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 20/01/2023 <4>[ 609.604010] Cola de trabajo: i915 __i915_gem_free_work [i915] <4 >[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915] ... <4>[ 609.604271] Seguimiento de llamadas: <4>[ 609.604273] ... <4>[ 609.604716] ct+0x2e9/ 0x550 [i915] <4>[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915] <4>[ 609.604977] force_unbind+0x24/0xa0 [i915] <4>[ 609.605098] x2f/0xa0 [i915] <4>[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915] <4>[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915] <4>[ 609.605440 process_scheduled_works+0x351/0x690... En el pasado, hubo fallas similares informado por CI de otras pruebas de IGT, observado en otras plataformas. Antes de confirmar 63baf4f3d587 (\"drm/i915/gt: solo espere la actividad de la GPU antes de desvincular una valla GGTT\"), i915_vma_revoke_fence() estaba esperando la inactividad de vma->active a trav\u00e9s de fence_update(). Ese compromiso introdujo vma->fence->active para que fence_update() pudiera esperar selectivamente en ese en lugar de vma->active, ya que solo se necesitaba la inactividad de los registros de cerca. Pero luego, otra confirmaci\u00f3n 0d86ee35097a (\"drm/i915/gt: Hacer que la revocaci\u00f3n de la valla sea inequ\u00edvoca\") reemplaz\u00f3 la llamada a fence_update() en i915_vma_revoke_fence() con solo fence_write(), y tambi\u00e9n agreg\u00f3 que GEM_BUG_ON(!i915_active_is_idle(&fence->active )) Al frente. No se proporcion\u00f3 ninguna justificaci\u00f3n sobre por qu\u00e9 podr\u00edamos esperar que vma->fence->active est\u00e9 inactivo sin esperarlo primero. El problema puede deberse potencialmente a una carrera entre la revocaci\u00f3n de registros de valla por un lado y la ejecuci\u00f3n secuencial de devoluciones de llamadas de se\u00f1ales invocadas al completar una solicitud que las estaba usando por el otro, a\u00fan procesadas en paralelo a la revocaci\u00f3n de esos registros de valla. Solucionelo esperando a que vma->fence->active est\u00e9 inactivo en i915_vma_revoke_fence(). (cereza escogida del compromiso 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41093.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41093.json index b61f3e5dacb..61c45fc8f9d 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41093.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41093.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: avoid using null object of framebuffer\n\nInstead of using state->fb->obj[0] directly, get object from framebuffer\nby calling drm_gem_fb_get_obj() and return error code when object is\nnull to avoid using null object of framebuffer." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: evite usar el objeto nulo del framebuffer. En lugar de usar state->fb->obj[0] directamente, obtenga el objeto del framebuffer llamando a drm_gem_fb_get_obj() y devuelva el c\u00f3digo de error. cuando el objeto es nulo para evitar el uso de un objeto nulo de framebuffer." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41094.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41094.json index b1b6b5d438f..38b78e10126 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41094.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41094.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/fbdev-dma: Only set smem_start is enable per module option\n\nOnly export struct fb_info.fix.smem_start if that is required by the\nuser and the memory does not come from vmalloc().\n\nSetting struct fb_info.fix.smem_start breaks systems where DMA\nmemory is backed by vmalloc address space. An example error is\nshown below.\n\n[ 3.536043] ------------[ cut here ]------------\n[ 3.540716] virt_to_phys used for non-linear address: 000000007fc4f540 (0xffff800086001000)\n[ 3.552628] WARNING: CPU: 4 PID: 61 at arch/arm64/mm/physaddr.c:12 __virt_to_phys+0x68/0x98\n[ 3.565455] Modules linked in:\n[ 3.568525] CPU: 4 PID: 61 Comm: kworker/u12:5 Not tainted 6.6.23-06226-g4986cc3e1b75-dirty #250\n[ 3.577310] Hardware name: NXP i.MX95 19X19 board (DT)\n[ 3.582452] Workqueue: events_unbound deferred_probe_work_func\n[ 3.588291] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 3.595233] pc : __virt_to_phys+0x68/0x98\n[ 3.599246] lr : __virt_to_phys+0x68/0x98\n[ 3.603276] sp : ffff800083603990\n[ 3.677939] Call trace:\n[ 3.680393] __virt_to_phys+0x68/0x98\n[ 3.684067] drm_fbdev_dma_helper_fb_probe+0x138/0x238\n[ 3.689214] __drm_fb_helper_initial_config_and_unlock+0x2b0/0x4c0\n[ 3.695385] drm_fb_helper_initial_config+0x4c/0x68\n[ 3.700264] drm_fbdev_dma_client_hotplug+0x8c/0xe0\n[ 3.705161] drm_client_register+0x60/0xb0\n[ 3.709269] drm_fbdev_dma_setup+0x94/0x148\n\nAdditionally, DMA memory is assumed to by contiguous in physical\naddress space, which is not guaranteed by vmalloc().\n\nResolve this by checking the module flag drm_leak_fbdev_smem when\nDRM allocated the instance of struct fb_info. Fbdev-dma then only\nsets smem_start only if required (via FBINFO_HIDE_SMEM_START). Also\nguarantee that the framebuffer is not located in vmalloc address\nspace." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/fbdev-dma: solo configurar smem_start est\u00e1 habilitado por opci\u00f3n de m\u00f3dulo. Solo exporte la estructura fb_info.fix.smem_start si as\u00ed lo requiere el usuario y la memoria no proviene de vmalloc( ). La configuraci\u00f3n de struct fb_info.fix.smem_start interrumpe los sistemas donde la memoria DMA est\u00e1 respaldada por el espacio de direcciones vmalloc. A continuaci\u00f3n se muestra un error de ejemplo. [3.536043] ------------[ cortar aqu\u00ed ]------------ [ 3.540716] virt_to_phys usado para direcciones no lineales: 000000007fc4f540 (0xffff800086001000) [ 3.552628] ADVERTENCIA : CPU: 4 PID: 61 en arch/arm64/mm/physaddr.c:12 __virt_to_phys+0x68/0x98 [ 3.565455] M\u00f3dulos vinculados en: [ 3.568525] CPU: 4 PID: 61 Comm: kworker/u12:5 No contaminado 6.6 .23-06226-g4986cc3e1b75-dirty #250 [ 3.577310] Nombre de hardware: placa NXP i.MX95 19X19 (DT) [ 3.582452] Cola de trabajo: events_unbound deferred_probe_work_func [ 3.588291] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT- SSBS BTYPE=--) [ 3.595233] pc : __virt_to_phys+0x68/0x98 [ 3.599246] lr : __virt_to_phys+0x68/0x98 [ 3.603276] sp : ffff800083603990 [ 3.677939] Rastreo de llamadas: [ 3.68039 3] __virt_to_phys+0x68/0x98 [ 3.684067] drm_fbdev_dma_helper_fb_probe +0x138/0x238 [ 3.689214] __drm_fb_helper_initial_config_and_unlock+0x2b0/0x4c0 [ 3.695385] drm_fb_helper_initial_config+0x4c/0x68 [ 3.700264] xe0 [ 3.705161] drm_client_register+0x60/0xb0 [ 3.709269] drm_fbdev_dma_setup+0x94/0x148 Adem\u00e1s, se supone memoria DMA a por contiguo en el espacio de direcciones f\u00edsicas, lo cual no est\u00e1 garantizado por vmalloc(). Resuelva esto verificando el indicador del m\u00f3dulo drm_leak_fbdev_smem cuando DRM asign\u00f3 la instancia de la estructura fb_info. Luego, Fbdev-dma solo configura smem_start solo si es necesario (a trav\u00e9s de FBINFO_HIDE_SMEM_START). Tambi\u00e9n garantice que el framebuffer no est\u00e9 ubicado en el espacio de direcciones vmalloc." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41095.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41095.json index ddfe4d3475f..62dc8a93a0f 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41095.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41095.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes\n\nIn nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is\nassigned to mode, which will lead to a possible NULL pointer dereference\non failure of drm_mode_duplicate(). Add a check to avoid npd." + }, + { + "lang": "es", + "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau/dispnv04: corrige la desreferencia del puntero null en nv17_tv_get_ld_modes En nv17_tv_get_ld_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Agregue una marca para evitar npd." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41096.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41096.json index 9ccb33066b6..8f43a9123a6 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41096.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41096.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/MSI: Fix UAF in msi_capability_init\n\nKFENCE reports the following UAF:\n\n BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488\n\n Use-after-free read at 0x0000000024629571 (in kfence-#12):\n __pci_enable_msi_range+0x2c0/0x488\n pci_alloc_irq_vectors_affinity+0xec/0x14c\n pci_alloc_irq_vectors+0x18/0x28\n\n kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128\n\n allocated by task 81 on cpu 7 at 10.808142s:\n __kmem_cache_alloc_node+0x1f0/0x2bc\n kmalloc_trace+0x44/0x138\n msi_alloc_desc+0x3c/0x9c\n msi_domain_insert_msi_desc+0x30/0x78\n msi_setup_msi_desc+0x13c/0x184\n __pci_enable_msi_range+0x258/0x488\n pci_alloc_irq_vectors_affinity+0xec/0x14c\n pci_alloc_irq_vectors+0x18/0x28\n\n freed by task 81 on cpu 7 at 10.811436s:\n msi_domain_free_descs+0xd4/0x10c\n msi_domain_free_locked.part.0+0xc0/0x1d8\n msi_domain_alloc_irqs_all_locked+0xb4/0xbc\n pci_msi_setup_msi_irqs+0x30/0x4c\n __pci_enable_msi_range+0x2a8/0x488\n pci_alloc_irq_vectors_affinity+0xec/0x14c\n pci_alloc_irq_vectors+0x18/0x28\n\nDescriptor allocation done in:\n__pci_enable_msi_range\n msi_capability_init\n msi_setup_msi_desc\n msi_insert_msi_desc\n msi_domain_insert_msi_desc\n msi_alloc_desc\n ...\n\nFreed in case of failure in __msi_domain_alloc_locked()\n__pci_enable_msi_range\n msi_capability_init\n pci_msi_setup_msi_irqs\n msi_domain_alloc_irqs_all_locked\n msi_domain_alloc_locked\n __msi_domain_alloc_locked => fails\n msi_domain_free_locked\n ...\n\nThat failure propagates back to pci_msi_setup_msi_irqs() in\nmsi_capability_init() which accesses the descriptor for unmasking in the\nerror exit path.\n\nCure it by copying the descriptor and using the copy for the error exit path\nunmask operation.\n\n[ tglx: Massaged change log ]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI/MSI: corrige UAF en msi_capability_init KFENCE informa el siguiente UAF: ERROR: KFENCE: lectura de uso despu\u00e9s de liberaci\u00f3n en __pci_enable_msi_range+0x2c0/0x488 Lectura de uso despu\u00e9s de liberaci\u00f3n en 0x0000000024629571 (en kfence-#12): __pci_enable_msi_range+0x2c0/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 kfence-#12: 0x0000000008614900-0x00000000e06c22 8d, tama\u00f1o=104, cach\u00e9=kmalloc-128 asignado por la tarea 81 en la CPU 7 en 10.808142 s: __kmem_cache_alloc_node+0x1f0/0x2bc kmalloc_trace+0x44/0x138 msi_alloc_desc+0x3c/0x9c msi_domain_insert_msi_desc+0x30/0x78 msi_setup_msi_desc+0x13c/0x184 __pci_enable_msi_range+0 x258/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 liberado por la tarea 81 en la CPU 7 en 10.811436s: msi_domain_free_descs+0xd4/0x10c msi_domain_free_locked.part.0+0xc0/0x1d8 msi_domain_alloc_irqs_all_locked+0xb4/0xbc pci_msi_setup_msi_irqs+0x30/0x4c __pci_enable_msi_range+ 0x2a8/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 Asignaci\u00f3n de descriptores realizada en: __pci_enable_msi_range msi_capability_init msi_setup_msi_desc msi_insert_msi_desc msi_domain_insert_msi_desc msi_alloc_desc ... Liberado en caso de fallo en __msi_domain_alloc_locked() __pci_enable_msi_range msi_capability_init pci_msi_setup_msi_irqs msi_domain_alloc_irqs_all_locked msi_domain_alloc_locked __msi_ domain_alloc_locked => falla msi_domain_free_locked... Ese error se propaga nuevamente a pci_msi_setup_msi_irqs() en msi_capability_init() que accede al descriptor para desenmascarar en la salida de error camino. Sor\u00e9guelo copiando el descriptor y usando la copia para la operaci\u00f3n de desenmascarar la ruta de salida del error. [tglx: registro de cambios masajeado]" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41097.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41097.json index 2a054cf3a82..9d649c21464 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41097.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41097.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: atm: cxacru: corrige la comprobaci\u00f3n de endpoints en cxacru_bind() Syzbot todav\u00eda informa de un problema bastante antiguo [1] que se produce debido a una comprobaci\u00f3n incompleta de los endpoints USB actuales. Como tal, se pueden usar tipos de endpoints incorrectos en la etapa de env\u00edo de urb, lo que a su vez activa una advertencia en usb_submit_urb(). Solucione el problema verificando que los tipos de endpoints requeridos est\u00e9n presentes tanto para los endpoints de entrada como para los de salida, teniendo en cuenta el tipo de endpoint cmd. Desafortunadamente, este parche no ha sido probado en hardware real. [1] Informe Syzbot: usb 1-1: BOGUS urb xfer, tuber\u00eda 1! = tipo 3 ADVERTENCIA: CPU: 0 PID: 8667 en drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/ core/urb.c:502 M\u00f3dulos vinculados en: CPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01 /01/2011 Cola de trabajo: usb_hub_wq hub_event RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 ... Seguimiento de llamadas: cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649 cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760 cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209 usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055 cxacru_usb_probe+ 0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363 usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:517 [en l\u00ednea] Actually_probe+0x23c/0xcd0 drivers/ base/dd.c:595 __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777 __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894 bus_for_each_drv +0x15f/0x1e0 drivers/base/bus.c:427 __device_attach+0x228/0x4a0 drivers/base/dd.c:965 bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487 device_add+0xc2f/0x2180 drivers/base/ core.c:3354 usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170 usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238 usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver. c:293" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41098.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41098.json index a46faa9f0d7..6e71fb0ecc8 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41098.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41098.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: libata-core: Fix null pointer dereference on error\n\nIf the ata_port_alloc() call in ata_host_alloc() fails,\nata_host_release() will get called.\n\nHowever, the code in ata_host_release() tries to free ata_port struct\nmembers unconditionally, which can lead to the following:\n\nBUG: unable to handle page fault for address: 0000000000003990\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 10 PID: 594 Comm: (udev-worker) Not tainted 6.10.0-rc5 #44\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:ata_host_release.cold+0x2f/0x6e [libata]\nCode: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41\nRSP: 0018:ffffc90000ebb968 EFLAGS: 00010246\nRAX: 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0\nRBP: ffff88810fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68\nR10: ffffc90000ebb738 R11: 73692033203a746e R12: 0000000000000004\nR13: 0000000000000000 R14: 0000000000000011 R15: 0000000000000006\nFS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000003990 CR3: 00000001122a2000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \n ? __die_body.cold+0x19/0x27\n ? page_fault_oops+0x15a/0x2f0\n ? exc_page_fault+0x7e/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? ata_host_release.cold+0x2f/0x6e [libata]\n ? ata_host_release.cold+0x2f/0x6e [libata]\n release_nodes+0x35/0xb0\n devres_release_group+0x113/0x140\n ata_host_alloc+0xed/0x120 [libata]\n ata_host_alloc_pinfo+0x14/0xa0 [libata]\n ahci_init_one+0x6c9/0xd20 [ahci]\n\nDo not access ata_port struct members unconditionally." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: libata-core: corrige la desreferencia del puntero nulo en caso de error Si la llamada ata_port_alloc() en ata_host_alloc() falla, se llamar\u00e1 ata_host_release(). Sin embargo, el c\u00f3digo en ata_host_release() intenta liberar incondicionalmente a los miembros de la estructura ata_port, lo que puede provocar lo siguiente: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 0000000000003990 PGD 0 P4D 0 Ups: Ups: 0000 [#1] PREEMPT SMP NOPTI CPU: 10 PID: 594 Comunicaciones: (udev-worker) No contaminado 6.10.0-rc5 #44 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 01/04/2014 RIP : 0010:ata_host_release.cold+0x2f/0x6e [libata] C\u00f3digo: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41 RSP: 0018:ffffc90000ebb968 00010246 RAX : 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0 RBP: ffff888 10fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68 R10: ffffc90000ebb738 R11: 73692033203a746e R12: 000000000000004 R13: 00000000 R14: 0000000000000011 R15: 0000000000000006 FS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000003990 CR3: 00000001122a200 0 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2f0? exc_page_fault+0x7e/0x180? asm_exc_page_fault+0x26/0x30? ata_host_release.cold+0x2f/0x6e [libata]? ata_host_release.cold+0x2f/0x6e [libata] release_nodes+0x35/0xb0 devres_release_group+0x113/0x140 ata_host_alloc+0xed/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 ] No acceder a los miembros de la estructura ata_port incondicionalmente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json index 199849f148a..841ddf96d56 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T19:15:12.110", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json index 413184377b7..8c4dbc3a8f3 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T15:15:13.213", "lastModified": "2024-08-01T16:45:25.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities." + }, + { + "lang": "es", + "value": "REXML es un conjunto de herramientas XML para Ruby. La gema REXML anterior a 3.3.2 tiene algunas vulnerabilidades DoS cuando analiza un XML que tiene muchos caracteres espec\u00edficos, como espacios en blanco, `>]` y `]>`. La gema REXML 3.3.3 o posterior incluye los parches para corregir estas vulnerabilidades." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41144.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41144.json index 7ba44d9a8ad..6957a776805 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41144.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41144.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to properly validate\u00a0synced posts, when shared channels are enabled,\u00a0\u00a0which allows a malicious remote to create/update/delete arbitrary posts in arbitrary channels" + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 no validan correctamente las publicaciones sincronizadas cuando los canales compartidos est\u00e1n habilitados. que permite que un control remoto malicioso cree/actualice/elimine publicaciones arbitrarias en canales arbitrarios" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41162.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41162.json index 761a114d60c..858977f532f 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41162.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41162.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to disallow\u00a0the modification of local channels by a remote, when shared channels are enabled, which allows\u00a0a malicious remote to make an arbitrary local channel read-only." + }, + { + "lang": "es", + "value": " Las versiones de Mattermost 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 y 9.8.x <= 9.8.1 no permiten la modificaci\u00f3n de canales locales mediante un control remoto, cuando Los canales compartidos est\u00e1n habilitados, lo que permite que un control remoto malicioso convierta un canal local arbitrario en solo lectura." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json index a9e017d84d5..59560e68c8f 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41254.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:17.940", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json index b3b032092c6..0f14f98faca 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41256.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:18.117", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json index 66e7a4f29a2..629c3fb362b 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41258.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-31T21:15:18.200", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41260.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41260.json index 59bec04bf7f..d92498cdeb2 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41260.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41260.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A static initialization vector (IV) in the encrypt function of netbird v0.28.4 allows attackers to obtain sensitive information." + }, + { + "lang": "es", + "value": "Un vector de inicializaci\u00f3n est\u00e1tico (IV) en la funci\u00f3n de cifrado de netbird v0.28.4 permite a los atacantes obtener informaci\u00f3n confidencial." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41264.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41264.json index afa727cbc7c..572d37ed612 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41264.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41264.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue discovered in casdoor v1.636.0 allows attackers to obtain sensitive information via the ssh.InsecureIgnoreHostKey() method." + }, + { + "lang": "es", + "value": " Un problema descubierto en casdoor v1.636.0 permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s del m\u00e9todo ssh.InsecureIgnoreHostKey()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41599.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41599.json index 972682cbc93..1c98f77f694 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41599.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41599.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T20:15:09.063", "lastModified": "2024-07-22T13:00:53.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41600.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41600.json index 25171eebac5..943a3f774bd 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41600.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41600.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T18:15:05.727", "lastModified": "2024-07-22T13:00:53.287", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41624.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41624.json index 48699a3a858..f819128de79 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41624.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41624.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Incorrect access control in Himalaya Xiaoya nano smart speaker rom_version 1.6.96 allows a remote attacker to have an unspecified impact." + }, + { + "lang": "es", + "value": " El control de acceso incorrecto en el altavoz inteligente nano Himalaya Xiaoya rom_version 1.6.96 permite que un atacante remoto tenga un impacto no especificado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41671.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41671.json index 6d52c364a02..7a5c6e825a0 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41671.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41671.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Twisted is an event-based framework for internet applications, supporting Python 3.6+. The HTTP 1.0 and 1.1 server provided by twisted.web could process pipelined HTTP requests out-of-order, possibly resulting in information disclosure. This vulnerability is fixed in 24.7.0rc1." + }, + { + "lang": "es", + "value": " Twisted es un framework basado en eventos para aplicaciones de Internet, compatible con Python 3.6+. El servidor HTTP 1.0 y 1.1 proporcionado por twisted.web podr\u00eda procesar solicitudes HTTP canalizadas desordenadas, lo que posiblemente resulte en la divulgaci\u00f3n de informaci\u00f3n. Esta vulnerabilidad se soluciona en 24.7.0rc1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json index 14fb4a6a3f0..ed187fc11d8 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41676.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.\nBut because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher." + }, + { + "lang": "es", + "value": "Magento-lts es una alternativa de soporte a largo plazo a Magento Community Edition (CE). Esta vulnerabilidad de XSS afecta las configuraciones del sistema design/header/welcome, design/header/logo_src, design/header/logo_src_small y design/header/logo_alt. Su objetivo es permitir a los administradores establecer un texto en los dos casos y definir una URL de imagen para los otros dos casos. Pero debido a que anteriormente faltaba el escape, se permit\u00eda ingresar HTML arbitrario y, como consecuencia, tambi\u00e9n JavaScript arbitrario. El problema se solucion\u00f3 con la versi\u00f3n 20.10.1 o superior." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41799.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41799.json index a23dbbfa320..9b08a665440 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41799.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41799.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "tgstation-server is a production scale tool for BYOND server management. Prior to 6.8.0, low permission users using the \"Set .dme Path\" privilege could potentially set malicious .dme files existing on the host machine to be compiled and executed. These .dme files could be uploaded via tgstation-server (requiring a separate, isolated privilege) or some other means. A server configured to execute in BYOND's trusted security level (requiring a third separate, isolated privilege OR being set by another user) could lead to this escalating into remote code execution via BYOND's shell() proc. The ability to execute this kind of attack is a known side effect of having privileged TGS users, but normally requires multiple privileges with known weaknesses. This vector is not intentional as it does not require control over the where deployment code is sourced from and _may_ not require remote write access to an instance's `Configuration` directory. This problem is fixed in versions 6.8.0 and above." + }, + { + "lang": "es", + "value": "tgstation-server es una herramienta a escala de producci\u00f3n para la gesti\u00f3n de servidores BYOND. Antes de 6.8.0, los usuarios con permisos bajos que usaban el privilegio \"Set .dme Path\" pod\u00edan configurar archivos .dme maliciosos existentes en la m\u00e1quina host para compilarlos y ejecutarlos. Estos archivos .dme se pueden cargar a trav\u00e9s del servidor tgstation (que requiere un privilegio aislado e independiente) o por alg\u00fan otro medio. Un servidor configurado para ejecutarse en el nivel de seguridad confiable de BYOND (que requiere un tercer privilegio separado y aislado O que lo establezca otro usuario) podr\u00eda llevar a que esto se convierta en una ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del proceso shell() de BYOND. La capacidad de ejecutar este tipo de ataque es un efecto secundario conocido de tener usuarios privilegiados de TGS, pero normalmente requiere m\u00faltiples privilegios con debilidades conocidas. Este vector no es intencional ya que no requiere control sobre el origen del c\u00f3digo de implementaci\u00f3n y _puede_ no requerir acceso de escritura remota al directorio \"Configuration\" de una instancia. Este problema se solucion\u00f3 en las versiones 6.8.0 y superiores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41800.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41800.json index 620a3e1be9c..65bd653f8d0 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41800.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41800.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-25T17:15:11.203", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41801.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41801.json index 9b31475dae2..6e298fb5a7d 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41801.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41801.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-25T17:15:11.423", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41808.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41808.json index 80b015f0ea1..3d17b4c520d 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41808.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41808.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-25T20:15:05.153", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json index 063fa9b231e..59012e5a6bd 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. This vulnerability is fixed in 24.7.0rc1." + }, + { + "lang": "es", + "value": " Twisted es un framework basado en eventos para aplicaciones de Internet, compatible con Python 3.6+. La funci\u00f3n `twisted.web.util.redirectTo` contiene una vulnerabilidad de inyecci\u00f3n de HTML. Si el c\u00f3digo de la aplicaci\u00f3n permite a un atacante controlar la URL de redireccionamiento, esta vulnerabilidad puede provocar Cross Site Scripting reflejado (XSS) en el cuerpo HTML de la respuesta de redireccionamiento. Esta vulnerabilidad se soluciona en 24.7.0rc1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json index fddcdc5b7a1..a36c0091ea3 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. The `AppImage` version `ImageMagick` might use an empty path when setting `MAGICK_CONFIGURE_PATH` and `LD_LIBRARY_PATH` environment variables while executing, which might lead to arbitrary code execution by loading malicious configuration files or shared libraries in the current working directory while executing `ImageMagick`. The vulnerability is fixed in 7.11-36." + }, + { + "lang": "es", + "value": " ImageMagick es un paquete de software gratuito y de c\u00f3digo abierto que se utiliza para editar y manipular im\u00e1genes digitales. La versi\u00f3n `AppImage` `ImageMagick` puede usar una ruta vac\u00eda al configurar las variables de entorno `MAGICK_CONFIGURE_PATH` y `LD_LIBRARY_PATH` durante la ejecuci\u00f3n, lo que podr\u00eda llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario al cargar archivos de configuraci\u00f3n maliciosos o librer\u00edas compartidas en el directorio de trabajo actual mientras se ejecuta ` ImagenMagick`. La vulnerabilidad se solucion\u00f3 en 7.11-36." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41819.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41819.json index 2b4486ef78c..578a37116f4 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41819.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41819.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Note Mark is a web-based Markdown notes app. A stored cross-site scripting (XSS) vulnerability in Note Mark allows attackers to execute arbitrary web scripts via a crafted payload injected into the URL value of a link in the markdown content. This vulnerability is fixed in 0.13.1." + }, + { + "lang": "es", + "value": " Note Mark es una aplicaci\u00f3n de notas Markdown basada en la web. Una vulnerabilidad de Cross Site Scripting (XSS) almacenado en Note Mark permite a los atacantes ejecutar scripts web arbitrarios a trav\u00e9s de un payload manipulado inyectado en el valor URL de un enlace en el contenido de rebajas. Esta vulnerabilidad se solucion\u00f3 en 0.13.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41926.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41926.json index c5e9b0602f3..f74df624b36 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41926.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41926.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Mattermost versions 9.9.x <= 9.9.0 and 9.5.x <= 9.5.6 fail to validate the source of sync messages and only allow the correct remote IDs,\u00a0which allows a malicious remote to\u00a0set arbitrary RemoteId values for synced users and therefore\u00a0claim that a user was synced from another remote." + }, + { + "lang": "es", + "value": " Las versiones 9.9.x <= 9.9.0 y 9.5.x <= 9.5.6 de Mattermost no validan el origen de los mensajes de sincronizaci\u00f3n y solo permiten las ID remotas correctas, lo que permite que un control remoto malicioso establezca valores RemoteId arbitrarios para usuarios sincronizados y, por lo tanto, afirmar que un usuario se sincroniz\u00f3 desde otro control remoto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json index f36a33a33f7..eae7f9d0440 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json @@ -3,12 +3,16 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T15:15:14.100", "lastModified": "2024-08-01T16:45:25.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability." + }, + { + "lang": "es", + "value": "REXML es un conjunto de herramientas XML para Ruby. La gema REXML 3.3.2 tiene una vulnerabilidad DoS cuando analiza un XML que tiene muchas expansiones de entidad con SAX2 o API de analizador de extracci\u00f3n. La gema REXML 3.3.3 o posterior incluye el parche para corregir la vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41948.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41948.json index 1cbb7bd85a7..92370a1464f 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41948.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41948.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T22:15:28.743", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41949.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41949.json index e9d965c3d6d..adef2303511 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41949.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41949.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T22:15:28.950", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json index acad71e10e6..5655436bab0 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41951.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.357", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json index acb0b690712..579b1d5bd5d 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.587", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json index 5bc07024597..e749cfa6752 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41955.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.793", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41957.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41957.json index a9278799538..50d6a9618f8 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41957.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41957.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T22:15:29.367", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41961.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41961.json index a427a1e788e..3bc7209ebaf 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41961.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41961.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Elektra is an opinionated Openstack Dashboard for Operators and Consumers of Openstack Services. A code injection vulnerability was found in the live search functionality of the Ruby on Rails based Elektra web application. An authenticated user can craft a search term containing Ruby code, which later flows into an `eval` sink which executes the code. Fixed in commit 8bce00be93b95a6512ff68fe86bf9554e486bc02." + }, + { + "lang": "es", + "value": " Elektra es un panel de Openstack obstinado para operadores y consumidores de servicios Openstack. Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en la funcionalidad de b\u00fasqueda en vivo de la aplicaci\u00f3n web Elektra basada en Ruby on Rails. Un usuario autenticado puede crear un t\u00e9rmino de b\u00fasqueda que contenga c\u00f3digo Ruby, que luego fluye hacia un receptor \"eval\" que ejecuta el c\u00f3digo. Corregido en la confirmaci\u00f3n 8bce00be93b95a6512ff68fe86bf9554e486bc02." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41965.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41965.json index 76b0f8d03b7..852c38492f7 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41965.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41965.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T22:15:29.567", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json index 7590eaf30a5..9db63823675 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4187.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@opentext.com", "published": "2024-07-31T21:15:18.320", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json index 28ae1a4a776..a4db577503a 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode\n\nsyzbot reported uninit memory usages during map_{lookup,delete}_elem.\n\n==========\nBUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\nBUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]\ndev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796\n____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]\nbpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38\n___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237\n==========\n\nThe reproducer should be in the interpreter mode.\n\nThe C reproducer is trying to run the following bpf prog:\n\n 0: (18) r0 = 0x0\n 2: (18) r1 = map[id:49]\n 4: (b7) r8 = 16777216\n 5: (7b) *(u64 *)(r10 -8) = r8\n 6: (bf) r2 = r10\n 7: (07) r2 += -229\n ^^^^^^^^^^\n\n 8: (b7) r3 = 8\n 9: (b7) r4 = 0\n 10: (85) call dev_map_lookup_elem#1543472\n 11: (95) exit\n\nIt is due to the \"void *key\" (r2) passed to the helper. bpf allows uninit\nstack memory access for bpf prog with the right privileges. This patch\nuses kmsan_unpoison_memory() to mark the stack as initialized.\n\nThis should address different syzbot reports on the uninit \"void *key\"\nargument during map_{lookup,delete}_elem." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: marcar la pila de programas bpf con kmsan_unposion_memory en modo int\u00e9rprete syzbot inform\u00f3 usos de memoria uninit durante map_{lookup,delete}_elem. ========== ERROR: KMSAN: valor uninit en __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] ERROR: KMSAN: valor uninit en dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap. c:796 __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 ____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [en l\u00ednea] bpf_map_lookup_elem+0x5c/0x80 kernel / bpf/helpers.c:38 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997 __bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237 ========== El reproductor debe estar en el modo int\u00e9rprete. El reproductor de C est\u00e1 intentando ejecutar el siguiente programa bpf: 0: (18) r0 = 0x0 2: (18) r1 = map[id:49] 4: (b7) r8 = 16777216 5: (7b) *(u64 * )(r10 -8) = r8 6: (bf) r2 = r10 7: (07) r2 += -229 ^^^^^^^^^^ 8: (b7) r3 = 8 9: (b7) r4 = 0 10: (85) llamar a dev_map_lookup_elem#1543472 11: (95) salir Se debe a la \"clave * vac\u00eda\" (r2) pasada al ayudante. bpf permite el acceso a la memoria de pila uninit para el programa bpf con los privilegios correctos. Este parche usa kmsan_unpoison_memory() para marcar la pila como inicializada. Esto deber\u00eda abordar diferentes informes de syzbot sobre el argumento uninit \"void *key\" durante map_{lookup,delete}_elem." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42152.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42152.json index 9d4090e3f66..c076cbaddb5 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42152.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42152.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:06.763", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42153.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42153.json index 39b9531ac40..d56912c3599 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42153.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42153.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:06.847", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42154.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42154.json index d3f1cd02fe4..625050f0e97 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42154.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:06.933", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42155.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42155.json index 7570f4f309b..e1e3db0e7a0 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42155.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:07.010", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42161.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42161.json index f2b3c7b7c77..3dfed76b85a 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42161.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42161.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:07.447", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42162.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42162.json index d4cc15e4b7d..222794d5c1e 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42162.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42162.json @@ -3,7 +3,7 @@ "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:07.520", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json index 4c12fa1cdef..63684bd805a 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42461.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T07:16:10.230", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4404.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4404.json index be3f3d99f82..f7c881e6e39 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4404.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4404.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-14T06:15:12.987", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4480.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4480.json index c56ec2853e4..4b537d3febe 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4480.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4480.json @@ -3,7 +3,7 @@ "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-14T06:15:13.220", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json index 790e1a5cffd..f44ca2740e2 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5062.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-30T16:15:03.217", "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json index 688c20fd81a..a7f7e754269 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:55.087", "lastModified": "2024-07-23T20:20:19.420", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5469.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5469.json index f089f5af667..2a1a59061d6 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5469.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5469.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-14T04:15:43.120", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5506.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5506.json index 5c65ece77d1..3b1e5576d2e 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5506.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5506.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-06T18:15:21.640", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5507.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5507.json index 0b5d9ba87f5..dae796c4eda 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5507.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5507.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-06T18:15:21.853", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5508.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5508.json index c3582f47a5b..0c9132615c4 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5508.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5508.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-06T18:15:22.053", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5509.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5509.json index c9fbf63d3a8..071810916a4 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5509.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5509.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-06T18:15:22.270", "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5741.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5741.json index f87b10016f5..6637c56cc98 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5741.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5741.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@checkmk.com", "published": "2024-06-17T12:15:48.740", "lastModified": "2024-06-17T12:42:04.623", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5745.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5745.json index 0b547806435..f5e465fd932 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5745.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5745.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-07T18:15:10.843", "lastModified": "2024-06-08T04:15:10.027", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5885.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5885.json index 8a8ae4d4d92..655c081add0 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5885.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5885.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:17.590", "lastModified": "2024-06-27T19:25:12.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json index af16cafb92c..61461c34038 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5898.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T17:15:52.577", "lastModified": "2024-06-13T18:36:09.010", - "vulnStatus": "Undergoing Analysis", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5924.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5924.json index b78066c1c6c..7ddcfd2f95f 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5924.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5924.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-13T20:15:16.000", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json index 135a6263132..5a308d56370 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:17.840", "lastModified": "2024-06-27T19:25:12.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json index bc8a6c2ba31..18d2f96aafb 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5935.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:18.073", "lastModified": "2024-06-27T19:25:12.067", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5947.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5947.json index 304f9fd0b45..66c92c3d1e4 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5947.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5947.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-13T20:15:16.277", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5948.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5948.json index 4e141fef04d..354d485461a 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5948.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5948.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-13T20:15:16.497", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5949.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5949.json index 2e4bc1f9d0c..2f5b984e264 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5949.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5949.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-13T20:15:16.710", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5950.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5950.json index 250176bf1e1..b41625ca6ba 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5950.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5950.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-13T20:15:16.923", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5951.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5951.json index e18ef3f0000..dad32144ef1 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5951.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5951.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-13T20:15:17.140", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5952.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5952.json index acb25876d23..0bfbab75d7c 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5952.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5952.json @@ -3,7 +3,7 @@ "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-13T20:15:17.350", "lastModified": "2024-06-17T12:43:31.090", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6040.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6040.json index 0e1fd151f41..68c7923f8f7 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6040.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6040.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "In parisneo/lollms-webui version v9.8, the lollms_binding_infos is missing the client_id parameter, which leads to multiple security vulnerabilities. Specifically, the endpoints /reload_binding, /install_binding, /reinstall_binding, /unInstall_binding, /set_active_binding_settings, and /update_binding_settings are susceptible to CSRF attacks and local attacks. An attacker can exploit this vulnerability to perform unauthorized actions on the victim's machine." + }, + { + "lang": "es", + "value": "En parisneo/lollms-webui versi\u00f3n v9.8, a lollms_binding_infos le falta el par\u00e1metro client_id, lo que genera m\u00faltiples vulnerabilidades de seguridad. Espec\u00edficamente, los endpoints /reload_binding, /install_binding, /reinstall_binding, /unInstall_binding, /set_active_binding_settings y /update_binding_settings son susceptibles a ataques CSRF y ataques locales. Un atacante puede aprovechar esta vulnerabilidad para realizar acciones no autorizadas en la m\u00e1quina de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json index a463291eef8..8178b23b056 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6041.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-16T23:15:49.417", "lastModified": "2024-06-17T14:15:12.733", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6043.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6043.json index f0d248d8702..df303aaa76f 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6043.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6043.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T01:15:49.627", "lastModified": "2024-06-17T14:15:12.833", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json index 171dfc723a7..0d45d74bd7c 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6050.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cvd@cert.pl", "published": "2024-07-01T14:15:05.893", "lastModified": "2024-07-01T16:37:39.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json index 5745bd9a695..8cc77aff992 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T21:15:52.007", "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json index c3b05a7ab80..5000091940d 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T21:15:52.283", "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6067.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6067.json index d2cfe6e156e..bfa20c4d8af 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6067.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6067.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T22:15:10.657", "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json index f441907be77..2e06fbb34d4 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-18T01:15:20.333", "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6110.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6110.json index 029c5886dc2..986ee49a6d8 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6110.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6110.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-18T12:15:13.290", "lastModified": "2024-06-20T12:44:01.637", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6113.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6113.json index e47710a1372..844494a46be 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6113.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6113.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T06:15:10.310", "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6124.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6124.json index ff7642c2033..1bcb662398d 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6124.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6124.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Reflected XSS in M-Files Hubshare before version 5.0.6.0 allows\u00a0an attacker to execute arbitrary JavaScript code in the context of the victim's browser session" + }, + { + "lang": "es", + "value": " XSS reflejado en M-Files Hubshare anterior a la versi\u00f3n 5.0.6.0 permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario en el contexto de la sesi\u00f3n del navegador de la v\u00edctima" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json index 5ec0814c205..71b3f2f5f7a 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6181.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T11:15:56.723", "lastModified": "2024-06-20T14:15:11.837", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json index 9126e03e051..b6b59f168a3 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6182.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T11:15:57.117", "lastModified": "2024-06-20T16:15:14.807", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6183.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6183.json index e060b747609..1b073fa81cf 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6183.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6183.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T12:15:15.233", "lastModified": "2024-06-20T16:15:14.903", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6185.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6185.json index ad45b97e0c7..e356ffc962e 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6185.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6185.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T12:15:15.873", "lastModified": "2024-06-25T21:16:01.940", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6190.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6190.json index ac158c2880c..988eb38a4de 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6190.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6190.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-20T15:15:50.940", "lastModified": "2024-06-20T16:07:50.417", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6242.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6242.json index 173ba3cf619..40621250329 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6242.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6242.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted\u00ae Slot feature in a ControlLogix\u00ae controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad en los productos afectados de Rockwell Automation que permite a un actor de amenazas eludir la funci\u00f3n Trusted\u00ae Slot en un controlador ControlLogix\u00ae. Si se explota en cualquier m\u00f3dulo afectado en un chasis 1756, un actor de amenazas podr\u00eda potencialmente ejecutar comandos CIP que modifiquen los proyectos de usuario y/o la configuraci\u00f3n del dispositivo en un controlador Logix en el chasis." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6331.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6331.json new file mode 100644 index 00000000000..d57d9401bac --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6331.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6331", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-08-04T00:15:47.863", + "lastModified": "2024-08-04T00:15:47.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. The integration of Google Gimini 1.0 Pro with `HarmBlockThreshold.BLOCK_NONE` for `HarmCategory.HARM_CATEGORY_HATE_SPEECH` and `HarmCategory.HARM_CATEGORY_HARASSMENT` in `safety_settings` disables content protection. This allows malicious commands to be executed, such as reading sensitive file contents like `/etc/passwd`." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://huntr.com/bounties/d5ac1051-22fa-42f0-8d82-73267482e60f", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6453.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6453.json index 1b50992f286..f5051a4c55e 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6453.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6453.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-02T22:15:05.077", "lastModified": "2024-07-03T12:53:24.977", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6558.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6558.json index fd80984a9d7..26c7e56f470 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6558.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6558.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-25T20:15:05.360", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6576.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6576.json index af4d51e3f04..5176c0fb766 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6576.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6576.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Privilege Escalation.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.12, from 2023.1.0 before 2023.1.7, from 2024.0.0 before 2024.0.3." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de autenticaci\u00f3n incorrecta en progreso de MOVEit Transfer (m\u00f3dulo SFTP) puede provocar una escalada de privilegios. Este problema afecta a MOVEit Transfer: desde 2023.0.0 antes de 2023.0.12, desde 2023.1.0 antes de 2023.1.7, desde 2024.0.0 antes de 2024.0.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json index ae01e204716..730ed33dce7 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6652.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-10T23:15:15.250", "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json index e3aa4af9475..2b0a91fdfc2 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6699.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mikafon Electronic Inc. Mikafon MA7 allows SQL Injection.This issue affects Mikafon MA7: from v3.0 before v3.1." + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Mikafon Electronic Inc. Mikafon MA7 permite la inyecci\u00f3n SQL. Este problema afecta a Mikafon MA7: desde v3.0 antes de v3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6873.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6873.json index 53b8515450c..d5524449c2c 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6873.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6873.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "It is possible to crash or redirect the execution flow of the ClickHouse server process from an unauthenticated vector by sending a specially crafted request to the ClickHouse server native interface. This redirection is limited to what is available within a 256-byte range of memory at the time of execution, and no known remote code execution (RCE) code has been produced or exploited.\n\n\u00a0Fixes have been merged to all currently supported version of ClickHouse.\u00a0If you are maintaining your own forked version of ClickHouse or using an older version and cannot upgrade, the fix for this vulnerability can be found in this commit\u00a0 https://github.com/ClickHouse/ClickHouse/pull/64024 ." + }, + { + "lang": "es", + "value": "Es posible bloquear o redirigir el flujo de ejecuci\u00f3n del proceso del servidor ClickHouse desde un vector no autenticado enviando una solicitud especialmente manipulada a la interfaz nativa del servidor ClickHouse. Esta redirecci\u00f3n se limita a lo que est\u00e1 disponible dentro de un rango de memoria de 256 bytes en el momento de la ejecuci\u00f3n, y no se ha producido ni explotado ning\u00fan c\u00f3digo de ejecuci\u00f3n remota de c\u00f3digo (RCE) conocido. Las correcciones se han combinado en todas las versiones actualmente compatibles de ClickHouse. Si mantiene su propia versi\u00f3n bifurcada de ClickHouse o utiliza una versi\u00f3n anterior y no puede actualizar, la soluci\u00f3n para esta vulnerabilidad se puede encontrar en esta confirmaci\u00f3n https://github.com/ClickHouse/ClickHouse/pull/64024." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6881.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6881.json index 200f4b3e4c1..bb4a386a6ef 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6881.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6881.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Stored XSS in M-Files Hubshare versions before 5.0.6.0 allows an authenticated attacker to execute arbitrary JavaScript in user's browser session" + }, + { + "lang": "es", + "value": " XSS almacenado en versiones de M-Files Hubshare anteriores a 5.0.6.0 permite a un atacante autenticado ejecutar JavaScript arbitrario en la sesi\u00f3n del navegador del usuario" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6923.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6923.json index 20b05541b9a..0e5a2f87b7a 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6923.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6923.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u2019t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de gravedad MEDIA que afecta a CPython. El m\u00f3dulo de correo electr\u00f3nico no citaba correctamente las nuevas l\u00edneas para los encabezados de correo electr\u00f3nico al serializar un mensaje de correo electr\u00f3nico, lo que permit\u00eda la inyecci\u00f3n de encabezado cuando se serializa un correo electr\u00f3nico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json index 1371d423323..2ff1e30bfad 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An issue was discovered in Juju that resulted in the leak of the sensitive context ID, which allows a local unprivileged attacker to access other sensitive data or relation accessible to the local charm." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en Juju que result\u00f3 en la filtraci\u00f3n del ID de contexto confidencial, que permite a un atacante local sin privilegios acceder a otros datos o relaciones confidenciales accesibles al acceso local." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7007.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7007.json index c6672d1ad63..f621c55a9fc 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7007.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7007.json @@ -3,7 +3,7 @@ "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-25T17:15:11.837", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7105.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7105.json index f98cd41f72d..6f2921c5eeb 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7105.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7105.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-25T21:15:11.790", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7106.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7106.json index db8db03b389..b909e3e76f3 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7106.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7106.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-25T21:15:12.090", "lastModified": "2024-07-26T12:38:41.683", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7154.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7154.json index 7b67693d967..f3c28d1c28e 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7154.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7154.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-28T10:15:01.897", "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7155.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7155.json index a43fc8788c7..2f0fcf7b4f4 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7155.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7155.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-28T10:15:03.053", "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7156.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7156.json index d2d73251467..e33b9254ecd 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7156.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7156.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-28T11:15:11.820", "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7157.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7157.json index fa40b8bbe8c..1e7f5bfbb57 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7157.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7157.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-28T11:15:12.107", "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7158.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7158.json index e55e542a91c..3c3b7e29168 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7158.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7158.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-28T14:15:11.303", "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7159.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7159.json index 2b72c1216ac..db97e5b3892 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7159.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7159.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-28T15:15:09.897", "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7160.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7160.json index 3f8cf35aed3..2d069db3b8f 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7160.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7160.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-28T15:15:10.163", "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7199.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7199.json index 8fb1e0f3925..28770e11eef 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7199.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7199.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability classified as critical was found in SourceCodester Complaints Report Management System 1.0. This vulnerability affects unknown code of the file /admin/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272620." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Complaints Report Management System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/manage_user.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-272620." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7200.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7200.json index 89ef9040d6c..bf3c8843990 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7200.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7200.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Complaints Report Management System 1.0. This issue affects some unknown processing of the file /admin/ajax.php?action=save_settings. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272621 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": " Una vulnerabilidad fue encontrada en SourceCodester Complaints Report Management System 1.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /admin/ajax.php?action=save_settings. La manipulaci\u00f3n del argumento name conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-272621." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7204.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7204.json index c9181cbc104..ae494874c31 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7204.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7204.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-02T11:16:43.987", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7212.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7212.json index acfa150ed11..66618580d43 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7212.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7212.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-30T02:15:08.697", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7213.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7213.json index 4bf17d4a195..c0f1aa1162d 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7213.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7213.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-30T03:15:01.817", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7214.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7214.json index b7515a0539b..dbe1e465874 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7214.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7214.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-30T03:15:02.127", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7215.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7215.json index ff300f1e31a..23407851ad4 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7215.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7215.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-30T04:15:03.760", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7216.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7216.json index 8c08f0db975..5de118b95fc 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7216.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7216.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-30T04:15:04.690", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7217.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7217.json index 5743dfd96ff..85da03bf08e 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7217.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7217.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-30T05:15:09.957", "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json index 70cf4ec393a..08fe1f8c7dc 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7255.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-01T18:15:26.723", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7264.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7264.json index 888f5802cf4..63cdcf7c16e 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7264.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7264.json @@ -3,7 +3,7 @@ "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-07-31T08:15:02.657", "lastModified": "2024-07-31T12:57:02.300", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7323.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7323.json index 37539f66832..95b3d882ace 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7323.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7323.json @@ -3,7 +3,7 @@ "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-08-02T11:16:44.220", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json index a729d8d7095..e169ec31d19 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7326.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T21:15:19.190", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json index 6288da72f92..b35f260a2b4 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7327.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T22:15:02.520", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json index 81c9ba4e34a..17edcd04318 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7328.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T23:15:13.787", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json index 59e8eb11308..9544d665589 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7329.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-31T23:15:14.063", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json index 07f2440bca6..363bc6e2dd5 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7330.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T00:15:02.480", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json index 7011fb23cc9..72eb36323b0 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7332.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T01:15:09.663", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json index fb00e5827b2..92f08fb60a8 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7333.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T02:15:02.317", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json index e0dd5bf432a..3d82ac985e9 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7334.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T02:15:02.617", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json index 4b98a29c13f..74a07d15594 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7335.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T02:15:02.900", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json index 317d9e6cbb6..714a1e75fe2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7336.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T03:15:01.717", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json index cc2ee6409c9..916003799c2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7337.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T03:15:01.987", "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7357.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7357.json index 7f1a7e52492..bac3f1207e6 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7357.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7357.json @@ -16,6 +16,10 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-600 up to 2.18. It has been rated as critical. This issue affects the function soapcgi_main of the file /soap.cgi. The manipulation of the argument service leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273329 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced." + }, + { + "lang": "es", + "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en D-Link DIR-600 hasta 2.18. Ha sido calificada como cr\u00edtica. Este problema afecta la funci\u00f3n Soapcgi_main del archivo /soap.cgi. La manipulaci\u00f3n del argumento service conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-273329. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor. NOTA: Se contact\u00f3 al proveedor tempranamente y se confirm\u00f3 de inmediato que el producto ha llegado al final de su vida \u00fatil. Deber\u00eda retirarse y reemplazarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7358.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7358.json index caf6ed619c8..c54a477e82b 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7358.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7358.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A vulnerability was found in Point B Ltd Getscreen Agent 2.19.6 on Windows. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file getscreen.msi of the component Installation. The manipulation leads to creation of temporary file with insecure permissions. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-273337 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but was not able to provide a technical response in time." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Point B Ltd Getscreen Agent 2.19.6 en Windows. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo getscreen.msi del componente Installation es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la creaci\u00f3n de un archivo temporal con permisos inseguros. Se requiere acceso local para abordar este ataque. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-273337. NOTA: Se contact\u00f3 al proveedor tempranamente sobre esta divulgaci\u00f3n, pero no pudo brindar una respuesta t\u00e9cnica a tiempo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7370.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7370.json index 179795fcc8f..243e51bfc3f 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7370.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7370.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T23:15:52.550", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7371.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7371.json index 59155cf523c..0a7fe84c63c 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7371.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7371.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-01T23:15:52.810", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7372.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7372.json index 82c0ffdc9a5..05dd632aae2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7372.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7372.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T00:15:49.350", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7373.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7373.json index 62a99dc2a42..39e8286f048 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7373.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7373.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T00:15:49.667", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json index 1ed85c98895..091cb2bd795 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7374.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T01:16:01.027", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json index 5008b782df1..6139a4ab33f 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7375.json @@ -3,7 +3,7 @@ "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-02T01:16:01.313", "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 00babff6585..a65143cdb0a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-03T23:55:16.964576+00:00 +2024-08-04T02:00:16.891362+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-03T23:15:54.537000+00:00 +2024-08-04T01:35:05.720000+00:00 ``` ### Last Data Feed Release @@ -27,44 +27,51 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-08-03T00:00:08.665713+00:00 +2024-08-04T00:00:08.666943+00:00 ``` ### Total Number of included CVEs ```plain -258909 +258910 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +- [CVE-2024-6331](CVE-2024/CVE-2024-63xx/CVE-2024-6331.json) (`2024-08-04T00:15:47.863`) ### CVEs modified in the last Commit -Recently modified CVEs: `19` +Recently modified CVEs: `387` -- [CVE-2021-27549](CVE-2021/CVE-2021-275xx/CVE-2021-27549.json) (`2024-08-03T22:15:16.123`) -- [CVE-2021-27583](CVE-2021/CVE-2021-275xx/CVE-2021-27583.json) (`2024-08-03T22:15:16.840`) -- [CVE-2021-27798](CVE-2021/CVE-2021-277xx/CVE-2021-27798.json) (`2024-08-03T22:15:19.087`) -- [CVE-2021-28141](CVE-2021/CVE-2021-281xx/CVE-2021-28141.json) (`2024-08-03T22:15:23.967`) -- [CVE-2021-28154](CVE-2021/CVE-2021-281xx/CVE-2021-28154.json) (`2024-08-03T22:15:24.443`) -- [CVE-2021-28246](CVE-2021/CVE-2021-282xx/CVE-2021-28246.json) (`2024-08-03T22:15:26.230`) -- [CVE-2021-28247](CVE-2021/CVE-2021-282xx/CVE-2021-28247.json) (`2024-08-03T22:15:26.350`) -- [CVE-2021-28248](CVE-2021/CVE-2021-282xx/CVE-2021-28248.json) (`2024-08-03T22:15:26.440`) -- [CVE-2021-28249](CVE-2021/CVE-2021-282xx/CVE-2021-28249.json) (`2024-08-03T22:15:26.527`) -- [CVE-2021-28250](CVE-2021/CVE-2021-282xx/CVE-2021-28250.json) (`2024-08-03T22:15:26.610`) -- [CVE-2021-28861](CVE-2021/CVE-2021-288xx/CVE-2021-28861.json) (`2024-08-03T22:15:33.710`) -- [CVE-2021-28956](CVE-2021/CVE-2021-289xx/CVE-2021-28956.json) (`2024-08-03T22:15:34.963`) -- [CVE-2021-29294](CVE-2021/CVE-2021-292xx/CVE-2021-29294.json) (`2024-08-03T22:15:39.750`) -- [CVE-2021-29295](CVE-2021/CVE-2021-292xx/CVE-2021-29295.json) (`2024-08-03T22:15:40.047`) -- [CVE-2021-29296](CVE-2021/CVE-2021-292xx/CVE-2021-29296.json) (`2024-08-03T22:15:40.157`) -- [CVE-2021-29379](CVE-2021/CVE-2021-293xx/CVE-2021-29379.json) (`2024-08-03T22:15:41.243`) -- [CVE-2021-30141](CVE-2021/CVE-2021-301xx/CVE-2021-30141.json) (`2024-08-03T23:15:29.920`) -- [CVE-2021-30496](CVE-2021/CVE-2021-304xx/CVE-2021-30496.json) (`2024-08-03T23:15:34.060`) -- [CVE-2021-31875](CVE-2021/CVE-2021-318xx/CVE-2021-31875.json) (`2024-08-03T23:15:54.537`) +- [CVE-2024-7215](CVE-2024/CVE-2024-72xx/CVE-2024-7215.json) (`2024-07-30T13:32:45.943`) +- [CVE-2024-7216](CVE-2024/CVE-2024-72xx/CVE-2024-7216.json) (`2024-07-30T13:32:45.943`) +- [CVE-2024-7217](CVE-2024/CVE-2024-72xx/CVE-2024-7217.json) (`2024-07-30T13:32:45.943`) +- [CVE-2024-7255](CVE-2024/CVE-2024-72xx/CVE-2024-7255.json) (`2024-08-02T12:59:43.990`) +- [CVE-2024-7264](CVE-2024/CVE-2024-72xx/CVE-2024-7264.json) (`2024-07-31T12:57:02.300`) +- [CVE-2024-7323](CVE-2024/CVE-2024-73xx/CVE-2024-7323.json) (`2024-08-02T12:59:43.990`) +- [CVE-2024-7326](CVE-2024/CVE-2024-73xx/CVE-2024-7326.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7327](CVE-2024/CVE-2024-73xx/CVE-2024-7327.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7328](CVE-2024/CVE-2024-73xx/CVE-2024-7328.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7329](CVE-2024/CVE-2024-73xx/CVE-2024-7329.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7330](CVE-2024/CVE-2024-73xx/CVE-2024-7330.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7332](CVE-2024/CVE-2024-73xx/CVE-2024-7332.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7333](CVE-2024/CVE-2024-73xx/CVE-2024-7333.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7334](CVE-2024/CVE-2024-73xx/CVE-2024-7334.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7335](CVE-2024/CVE-2024-73xx/CVE-2024-7335.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7336](CVE-2024/CVE-2024-73xx/CVE-2024-7336.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7337](CVE-2024/CVE-2024-73xx/CVE-2024-7337.json) (`2024-08-01T12:42:36.933`) +- [CVE-2024-7357](CVE-2024/CVE-2024-73xx/CVE-2024-7357.json) (`2024-08-01T14:04:01.833`) +- [CVE-2024-7358](CVE-2024/CVE-2024-73xx/CVE-2024-7358.json) (`2024-08-01T16:45:25.400`) +- [CVE-2024-7370](CVE-2024/CVE-2024-73xx/CVE-2024-7370.json) (`2024-08-02T12:59:43.990`) +- [CVE-2024-7371](CVE-2024/CVE-2024-73xx/CVE-2024-7371.json) (`2024-08-02T12:59:43.990`) +- [CVE-2024-7372](CVE-2024/CVE-2024-73xx/CVE-2024-7372.json) (`2024-08-02T12:59:43.990`) +- [CVE-2024-7373](CVE-2024/CVE-2024-73xx/CVE-2024-7373.json) (`2024-08-02T12:59:43.990`) +- [CVE-2024-7374](CVE-2024/CVE-2024-73xx/CVE-2024-7374.json) (`2024-08-02T12:59:43.990`) +- [CVE-2024-7375](CVE-2024/CVE-2024-73xx/CVE-2024-7375.json) (`2024-08-02T12:59:43.990`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 671c88ab007..5275edb84e6 100644 --- a/_state.csv +++ b/_state.csv @@ -104128,7 +104128,7 @@ CVE-2017-3768,0,0,a9d3cdbe35d4cbde354522677133c37182e14896a4a819ed3c4de775f8191c CVE-2017-3769,0,0,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000 CVE-2017-3770,0,0,50498b73d2e169a119c833acc8e6884b909fe57fd2f88c994b613d01d5b79a15,2019-10-03T00:03:26.223000 CVE-2017-3771,0,0,842fbd922aa5ab87bb1b786a79feb9336c4c27a9ebf45517f79af44ded7b2be3,2019-10-03T00:03:26.223000 -CVE-2017-3772,0,0,ce910abae86b4c65fcbaf7789eed94db28e2c6b68c9039b352dbf73a40426762,2024-08-01T12:42:36.933000 +CVE-2017-3772,0,1,8b3462e912b704c8334102ca2f6146e34b45d67ff30aa1a649b18fe52c032d4f,2024-08-01T12:42:36.933000 CVE-2017-3773,0,0,4f1c640be58fc5f21d6a63a5a68a2536a425a7f8d15f531f4f700289ecfd7ff1,2023-11-07T02:44:13.170000 CVE-2017-3774,0,0,d409d3f34db015c7daec361952a5a6d7fd1d6f73296ee3273429d749d1d764fa,2018-05-24T16:27:03.247000 CVE-2017-3775,0,0,ab41f4023b00bda26c97ad0eb99ef0d3cb35ca29d6e3b05ce617672fe8d191ca,2018-06-13T15:58:17.390000 @@ -141081,8 +141081,8 @@ CVE-2019-6193,0,0,5252032daec5c50053e0084e41e72ddc126830441b5cd9f1bc5d3b51ad6fae CVE-2019-6194,0,0,c68604ccf954a52cb6716566256a77cd3db53ede5f3a06738e8986c8de4ff505,2020-02-21T20:35:11.513000 CVE-2019-6195,0,0,b8ca041cf524a8af2c264b56ac34b349c13f470cc74fcc154488e5c74e7c9b20,2020-03-04T18:26:14.687000 CVE-2019-6196,0,0,4e909cb41ad592ca4f9d4234fb8effc0e79b826acdde1c26c8be3b2a71ed819a,2020-06-22T15:12:23.177000 -CVE-2019-6197,0,0,cdd719eaa28dafd1d2235daedf4c93ca982671d1445e53a47338975938fdcb1b,2024-08-01T12:42:36.933000 -CVE-2019-6198,0,0,8ad20c54d4d9ecfe49c3587388e29cad44474ff7508270580465499daa3fffad,2024-08-01T12:42:36.933000 +CVE-2019-6197,0,1,109a6d05896ddd6e083690d3bbf9e6bceca5319b863a567dd16dc5646e4325d0,2024-08-01T12:42:36.933000 +CVE-2019-6198,0,1,8f2e90b247f49341e94f300e13cdc77413fbd473b1e691c6e70a8c99f0554408,2024-08-01T12:42:36.933000 CVE-2019-6200,0,0,dc5aae0492d24fa91b4536b3552981c383b9d63f882441062844dbbfff411875,2019-03-06T13:28:02.637000 CVE-2019-6201,0,0,6886bf3befefe8be6891d8a439f88c625009f9073fcc0b27ce550b3121034599,2020-08-24T17:37:01.140000 CVE-2019-6202,0,0,657c4129d3c19fe26b6472cba4a044c11a1227aa706b62bc264b8678126b92c7,2019-03-06T14:10:11.387000 @@ -172605,7 +172605,7 @@ CVE-2021-27531,0,0,20c351bb2110223c396b7e16255ea3ae732f970aadc86a7207f47818d875e CVE-2021-27544,0,0,739e2e099e4f13bd9905c5905dac4fb911e529f6ac8c3401e62a186d1ae465ef,2023-11-14T22:32:17.710000 CVE-2021-27545,0,0,bbe8cb4c7887f057efbad6c8c297c46da53a86976d4154f2d2228b0d843eca9e,2023-11-14T22:32:17.710000 CVE-2021-27548,0,0,2fc777fc45e65d0ce26453fc1c8efb977ee873a553827b47215dcc03e7da7986,2022-05-26T03:07:42.620000 -CVE-2021-27549,0,1,ba588ecb23e682eee948c707d807c0b5c3609746da5da0e0ed6b906a99a893a6,2024-08-03T22:15:16.123000 +CVE-2021-27549,0,0,ba588ecb23e682eee948c707d807c0b5c3609746da5da0e0ed6b906a99a893a6,2024-08-03T22:15:16.123000 CVE-2021-27550,0,0,a3f51807008635117f5bc0e74b56140f1681df8c7508a0e8e50d524f3370d5dc,2021-02-26T19:39:59.347000 CVE-2021-27556,0,0,511fe32f349a803f18bb34f071c04d165caaa942b16d856c91d841f30d4154a5,2021-09-03T15:29:37.437000 CVE-2021-27557,0,0,8a2bfe24cff3f46d23bcecdf71c61ce1b406e15dd9e0db59c43ad63dadf89661,2021-09-08T15:04:51.287000 @@ -172628,7 +172628,7 @@ CVE-2021-27578,0,0,2ec16ca4e56903f9db7fbd714765bd748c46ad1855bab9bb55c7879cedb51 CVE-2021-27579,0,0,c37ba41354637d78907d402312055e189ac6a44e9ee209978dc3b5fc543e5c01,2022-07-12T17:42:04.277000 CVE-2021-27581,0,0,876a6318694d4f8cc43715beff56657039d3be8de56d6f14a3473014471e0099,2021-03-15T16:39:59.943000 CVE-2021-27582,0,0,add51d7fb8edd45e7e043ae9e61e9cfa70a301d610c51c13fc6f560f12d99594,2022-12-02T19:37:41.227000 -CVE-2021-27583,0,1,8ec784a9f86856377bde7684ee4058747966574108c3d1368ab88edd31c44c6c,2024-08-03T22:15:16.840000 +CVE-2021-27583,0,0,8ec784a9f86856377bde7684ee4058747966574108c3d1368ab88edd31c44c6c,2024-08-03T22:15:16.840000 CVE-2021-27584,0,0,8e43d8e79f09f92305214f17148a98483c01a14cfb640628077f629c3ef350d6,2021-03-10T19:11:53.007000 CVE-2021-27585,0,0,5809b0ff2fc83ab4504f7c2872b7e107677e2483bcbdc7a75d29bc37b7ced215,2021-03-25T13:38:25.430000 CVE-2021-27586,0,0,9e447fdd30d5e379e6a76ede76a19e1fb325b940f1d3dbf1e92e9c30ba7398e7,2021-03-25T14:43:59.287000 @@ -172781,7 +172781,7 @@ CVE-2021-27794,0,0,91a035e67e73bae8d941618799331b12d38efc9096ab7a2e09fe2cb0f09a8 CVE-2021-27795,0,0,e8ae1d0afee322ab5d7a2ef59dff7f6fb85db77bec6fcb0bdb18ff8f2a7e213c,2023-12-11T19:44:39.613000 CVE-2021-27796,0,0,9ab1ea7f9513c846a0a6f5f574c61dda29bae5fdc6562e7515ba003b603785d4,2022-03-01T23:43:08.080000 CVE-2021-27797,0,0,60ea4dc11c6fd40c40b7c4ef8ff290096a8515de5dc758044cc1610588f2a5cb,2022-03-01T16:09:03.430000 -CVE-2021-27798,0,1,8bbbd0064c59ee5caa1265329aa6a9f7fb69151328efe05783a50f61adf35a67,2024-08-03T22:15:19.087000 +CVE-2021-27798,0,0,8bbbd0064c59ee5caa1265329aa6a9f7fb69151328efe05783a50f61adf35a67,2024-08-03T22:15:19.087000 CVE-2021-27799,0,0,88e83fed62642d66c990a6c30d779c1445439edc93fc46075a63864eb460b6af,2021-03-10T16:59:06.673000 CVE-2021-27802,0,0,61325f6e2c979d6cc2b21158da8499da6f4893bf3057030cf0dc124ae6a6e7a0,2023-11-07T03:32:01.343000 CVE-2021-27803,0,0,a412eddcdba62a8259809bcd4baaf2a7ec78b47d50f8b43bf358ca91baf64184,2023-11-07T03:32:01.380000 @@ -172959,7 +172959,7 @@ CVE-2021-28134,0,0,0f8f6052e9e1709384afd0f8bde4f012d84b66f6644a5b43f6459155e36ab CVE-2021-28135,0,0,59beaa13e593a6d0f0594ac6d60a2c4a710cbb499f8e7520a46c113415257f6a,2022-07-12T17:42:04.277000 CVE-2021-28136,0,0,35b95f2bb1d29be70816d7d5f6ae7a9178d27bda866e8c2f2ab3b2471a8a8586,2021-09-09T23:32:23.887000 CVE-2021-28139,0,0,2f2d273342bfcf027b5e630796a97dc50c91c0c5385a6c48cd4c692a9d99e289,2021-09-09T23:30:21.467000 -CVE-2021-28141,0,1,b03910d9e3a951a8a55e5a3974ccd117a6be9b66a7aadc95942fbbb40f0ab039,2024-08-03T22:15:23.967000 +CVE-2021-28141,0,0,b03910d9e3a951a8a55e5a3974ccd117a6be9b66a7aadc95942fbbb40f0ab039,2024-08-03T22:15:23.967000 CVE-2021-28142,0,0,5e1a7975f6439534ccb73a52f1950fc888b3455828febea899e5ddf4dbc03d64,2021-04-19T18:17:43.403000 CVE-2021-28143,0,0,abf7b2f4f870bf61226c602cda5eca05937921e3bc2f5e7c279c30ba22f0b2a8,2022-06-28T14:11:45.273000 CVE-2021-28144,0,0,df85a0b65ee5dcea74ff14a88c517f0a3e4bc8fe142584daef63a3fa39033de4,2022-06-28T14:11:45.273000 @@ -172972,7 +172972,7 @@ CVE-2021-28150,0,0,83ab224d26bae012116a8c8feba84d2030974c496b717d1ea1263f89f0d6d CVE-2021-28151,0,0,829dd2e90721fa5ebe576ce974a334de0b3dd81d9502a72514112c399075713f,2021-05-13T18:53:56.257000 CVE-2021-28152,0,0,636b3a580e0e919d5c4ee9b4d72115ce85c15b5b43d31974479de9db24a4c4d7,2023-08-08T14:22:24.967000 CVE-2021-28153,0,0,c4e108c8360f9784d9091f4055a9f4aef7bd1034942513bdd7953cfa7376a947,2023-11-07T03:32:04.533000 -CVE-2021-28154,0,1,a9c57b3b0b3a7653c315c1dcd0f398fd2164ff326f6829ffbd2cfef82e46ed5b,2024-08-03T22:15:24.443000 +CVE-2021-28154,0,0,a9c57b3b0b3a7653c315c1dcd0f398fd2164ff326f6829ffbd2cfef82e46ed5b,2024-08-03T22:15:24.443000 CVE-2021-28155,0,0,fc63908d6e9c90ddf50cffa855e71b3a8e0fe1e7dc83b7abee849d51018f477a,2021-09-09T23:21:49.933000 CVE-2021-28156,0,0,66014af417aedc69ca6720dca1b72522e8621839de671b99a8f6727c45495796,2022-10-25T20:43:17.953000 CVE-2021-28157,0,0,9f7ffd0f3bd01dcde9da1837eb702d77961984da155cbeab396a0216d36139c0,2021-04-21T14:59:50.213000 @@ -173036,11 +173036,11 @@ CVE-2021-28236,0,0,8b1834adaddb5dded175a7e2409e97bfeec7eea9ff3035fb1ac8bbb197722 CVE-2021-28237,0,0,64e7b61e1aa1201cb5ed17134e57278d35e3d9fbbbf0206c855e3285ec3014fd,2021-12-06T19:08:37.600000 CVE-2021-28242,0,0,a422ed1e7cfa962f7ac4a87830c10f84d6f9eddc7123f32a6e1bd20157807e0b,2022-05-03T16:04:40.443000 CVE-2021-28245,0,0,20debe3e3035b0cc10503a16981dee897530cb3f5bf4efd5f2efddad3590a90e,2021-04-05T18:04:38.610000 -CVE-2021-28246,0,1,98934b2fd7d4ca7d69c7f05c3e82b633abc14fba964ff8b05c9f1a7fe785a0d3,2024-08-03T22:15:26.230000 -CVE-2021-28247,0,1,a85cfc7775fc0e73c3574030f40cf09e63c708c54d4249bd28314ac88f98fdc6,2024-08-03T22:15:26.350000 -CVE-2021-28248,0,1,0c7d4005fdec20f666c78fbd4fae2e7e989b5721c330d88501b5e6ad0ecd6324,2024-08-03T22:15:26.440000 -CVE-2021-28249,0,1,d1929c9a234607cb282c408061e3e29d0dac255b9e972ec0b271a2133a031a15,2024-08-03T22:15:26.527000 -CVE-2021-28250,0,1,af3b707ea4e2603507f5dd3a50dc08671a575f43bd31038e847aebef91b179c8,2024-08-03T22:15:26.610000 +CVE-2021-28246,0,0,98934b2fd7d4ca7d69c7f05c3e82b633abc14fba964ff8b05c9f1a7fe785a0d3,2024-08-03T22:15:26.230000 +CVE-2021-28247,0,0,a85cfc7775fc0e73c3574030f40cf09e63c708c54d4249bd28314ac88f98fdc6,2024-08-03T22:15:26.350000 +CVE-2021-28248,0,0,0c7d4005fdec20f666c78fbd4fae2e7e989b5721c330d88501b5e6ad0ecd6324,2024-08-03T22:15:26.440000 +CVE-2021-28249,0,0,d1929c9a234607cb282c408061e3e29d0dac255b9e972ec0b271a2133a031a15,2024-08-03T22:15:26.527000 +CVE-2021-28250,0,0,af3b707ea4e2603507f5dd3a50dc08671a575f43bd31038e847aebef91b179c8,2024-08-03T22:15:26.610000 CVE-2021-28254,0,0,c5dc79bb1f664f7c1b5ad86aa93aa90cfb5c3b22646ca974b91539fa994cf618,2023-04-28T03:50:18.003000 CVE-2021-28269,0,0,b09e201833804c810269b5ad4e67f5eb7df352a32fc2501361867e0f43bb63b8,2022-06-28T14:11:45.273000 CVE-2021-28271,0,0,7a0eed26a4617a9140f410c924a71fc159103b46f8461ae655b4e1c38aa24fdb,2021-09-23T14:27:05.190000 @@ -173432,7 +173432,7 @@ CVE-2021-28856,0,0,dc5305593e30600912dd47c284d46f8b2e9e5019228684271a4b20a90af09 CVE-2021-28857,0,0,8a2b1c8b4999617f0f9045d966dfd16aae3a3883f236ad341e376aaba8689a78,2021-06-23T19:47:37.117000 CVE-2021-28858,0,0,5ce40b365cad7e344a431d9275cd7970bd20eb5c360d8bacba45e00b2ab2e872,2021-06-23T19:49:34.073000 CVE-2021-28860,0,0,bfae016a68cd364c2b7dafc69d2211400c0162cd538cb1f8b071715b02345354,2024-02-14T01:17:43.863000 -CVE-2021-28861,0,1,9507c1b665dc6c357c71bc1debd4127b145caaab156b943519161bae326baae6,2024-08-03T22:15:33.710000 +CVE-2021-28861,0,0,9507c1b665dc6c357c71bc1debd4127b145caaab156b943519161bae326baae6,2024-08-03T22:15:33.710000 CVE-2021-28874,0,0,8c2fa868ea608a42623817dcb800bcbbc2c4959e660d86ed4a2aff65e98fa744,2022-12-09T16:55:47.187000 CVE-2021-28875,0,0,1dd67a18b14766f60ca96f629c257220ddadbdb249d19239cf95460293fdbdb9,2022-11-03T19:38:49.860000 CVE-2021-28876,0,0,293fccba206d8aed666323700265fcbcd030a8156db7a81f46315369fc348146,2023-11-07T03:32:24.040000 @@ -173470,7 +173470,7 @@ CVE-2021-28952,0,0,4469930d63f0e96f805fad9a448d77d5a2c1bc1001596dace571b156aeff7 CVE-2021-28953,0,0,c9e6bc8751605ba9df5f41be377618373737f56f6e235b148489feb3b1d0beb5,2023-08-08T14:22:24.967000 CVE-2021-28954,0,0,b2dfe7c1f8dc710fa33133d99ef036c08a9ce4d8f57e1b6b517aa37c80efb433,2022-05-20T20:33:42.457000 CVE-2021-28955,0,0,c23aee2f7131e78e4493ad0b75048b08f31c91140fa1c9280f44346ecd156ec6,2022-05-20T20:34:04.387000 -CVE-2021-28956,0,1,aeb3de97cbe96ccf42238133a440f2c109eb1debea6507534fd1afe8bf710fde,2024-08-03T22:15:34.963000 +CVE-2021-28956,0,0,aeb3de97cbe96ccf42238133a440f2c109eb1debea6507534fd1afe8bf710fde,2024-08-03T22:15:34.963000 CVE-2021-28957,0,0,26a061c9c90a0aa1805fc54e74edf7d99376be7d8295c2b0160d9417b2e38f4b,2023-11-07T03:32:24.873000 CVE-2021-28958,0,0,0cade42be67baf07e2484327ffd30150c707d12bcd602b0a1d329f2c2ffe106c,2022-07-12T17:42:04.277000 CVE-2021-28959,0,0,969d153d606765610668b679d971dcdf83a6dca745a664d86ed69cf149c4295a,2021-05-11T13:12:49.600000 @@ -173672,9 +173672,9 @@ CVE-2021-29274,0,0,24fa848b7fc93dc3d1c9affae33d9f91a6a21ee66b9b1eec25d48fdbdd814 CVE-2021-29279,0,0,1a5ae101afe389992a826b381d63d0a1f0fc2f3bdf8e7436d4b4da174f64b06c,2021-04-21T19:21:03.430000 CVE-2021-29280,0,0,285efee54ae16e0d65521fd30dd52c9e7fa5763f59c149ea26a3f172490f3891,2021-08-26T18:26:20.400000 CVE-2021-29281,0,0,530b60cf6fa4eb8c4dbc62f06d9e0fea4f3cebdf2ebf7c5f48f33fae91199174,2022-07-15T02:08:55.190000 -CVE-2021-29294,0,1,504babf6ca1738018046ad7dce68fdf9870e9bca605f91f0c6b3e96515d24e84,2024-08-03T22:15:39.750000 -CVE-2021-29295,0,1,f5bc5b04b677330c618e63ccb118a53d0790fc04d1e5a4fcd4dc9e21c8554d3d,2024-08-03T22:15:40.047000 -CVE-2021-29296,0,1,eb29077e5f6b03f6abdbdc67059939e41c857321fb7107b83336e33439fb746b,2024-08-03T22:15:40.157000 +CVE-2021-29294,0,0,504babf6ca1738018046ad7dce68fdf9870e9bca605f91f0c6b3e96515d24e84,2024-08-03T22:15:39.750000 +CVE-2021-29295,0,0,f5bc5b04b677330c618e63ccb118a53d0790fc04d1e5a4fcd4dc9e21c8554d3d,2024-08-03T22:15:40.047000 +CVE-2021-29296,0,0,eb29077e5f6b03f6abdbdc67059939e41c857321fb7107b83336e33439fb746b,2024-08-03T22:15:40.157000 CVE-2021-29297,0,0,eba7901e820f8fed3bfb11389ec8b25be1a79fc868207e3090c40631ed67cf0d,2021-08-09T18:50:58.393000 CVE-2021-29298,0,0,6476f97e0cf9405159602d90eab5787be1438bf077a96f1dea50e94ddd7f515f,2021-08-09T18:49:27.460000 CVE-2021-29300,0,0,cb22920078926413e6f7dcf28ab72c0d09d9743d6b155301ca2c5f803dd05eed,2022-06-28T14:11:45.273000 @@ -173709,7 +173709,7 @@ CVE-2021-29370,0,0,df8a0af7e9c791d152875af1f536fa104dadbb0a18faaf7e43d3423baf636 CVE-2021-29376,0,0,6d0df1a07c0472e72288631cfb42822bf146f949b1e3657d2612777487c19a95,2021-09-21T17:48:31.387000 CVE-2021-29377,0,0,b7e508ee2de1c44f3686637e4096f06da3fa24ded5d0fa0e2c25677ee1e26a1f,2021-08-23T15:42:20.597000 CVE-2021-29378,0,0,5c52be90640cf2a3560dee49e355c8058bb7af01c0af1c4905545fe724201d29,2023-08-18T15:22:20.870000 -CVE-2021-29379,0,1,7ab612c98f28b5df72ad8ed1fcb5eed90939874a97bdbee4b8bc0a25b1202892,2024-08-03T22:15:41.243000 +CVE-2021-29379,0,0,7ab612c98f28b5df72ad8ed1fcb5eed90939874a97bdbee4b8bc0a25b1202892,2024-08-03T22:15:41.243000 CVE-2021-29387,0,0,a70543ebe67624a1d90fff23d4ab851cbd34ceaa13955faea5c72d9152dc5fcb,2021-05-05T20:33:38.947000 CVE-2021-29388,0,0,d0e96f17fc3d9f343183003d546ab4ebf12e86b3beadbe3a534405f902b110c9,2021-05-05T20:33:04.177000 CVE-2021-29390,0,0,a9cfcca5baf30c1a803284fa70d46c53ba19dcee85cfcbd8573ef94ff41a9a7d,2023-11-07T03:32:35.183000 @@ -174293,7 +174293,7 @@ CVE-2021-30138,0,0,5848986934a682754ea4634a2a150ef0e8dbae4619b53291c7f964622ce22 CVE-2021-30139,0,0,2c0e7516e4f150e7812ca69ed99c7b6dc8738ab652f89dbfe82ad3666b09c304,2021-04-22T18:21:47.167000 CVE-2021-3014,0,0,bb675c73e1d46cbc098d3fd55668cf8cc89af739ca053c3f978976d91271c940,2021-01-07T21:33:23.017000 CVE-2021-30140,0,0,866aa4036bcaf1c3dcd3e55c8ed3742ff50877f5618c24ac28f4a1b5bd214a7e,2022-09-30T03:02:17.497000 -CVE-2021-30141,0,1,ccd25a9776c274811b4ed14cef5efc985f19c4ad2b92936fdb33ae37ba139b6a,2024-08-03T23:15:29.920000 +CVE-2021-30141,0,0,ccd25a9776c274811b4ed14cef5efc985f19c4ad2b92936fdb33ae37ba139b6a,2024-08-03T23:15:29.920000 CVE-2021-30144,0,0,9aa9f08d85b3130feab3184ab68bd7a1d5b4042e221c58fdc45d386d61994e90,2023-08-08T14:21:49.707000 CVE-2021-30145,0,0,cbe0e7531098696a284233e09befc9195e7cf4afcd8b9615b57e9346684bad1c,2022-05-20T20:45:03.070000 CVE-2021-30146,0,0,eee87f3e7e08da20afaa9e1be131f3e0ce48081f0b3074a7bd111921a35a8bbd,2021-04-12T20:45:03.807000 @@ -174531,7 +174531,7 @@ CVE-2021-3049,0,0,02490319834b0a006efe00b4d583d4dcf10cd99b4cf96dae8515830b4ec823 CVE-2021-30490,0,0,cdae8418fb7c006ac3366c166cd57b621947ebed87f0b97764f82172a7f1fbef,2022-08-17T20:47:57.200000 CVE-2021-30493,0,0,0c27cc00342d80706c5bbb0b109b0d1b0edb12c4511b72d23e32e4bd94e3e2cc,2021-04-22T15:11:04.050000 CVE-2021-30494,0,0,da9a910f7dc1455a5f2b6e36c16981d2d432e0b69d317d950d991299e6a9b482,2021-04-22T15:12:15.667000 -CVE-2021-30496,0,1,eef2385b0fd898dbad9ff71c7a570118c40855ca3ab865efaec345a9e7d40701,2024-08-03T23:15:34.060000 +CVE-2021-30496,0,0,eef2385b0fd898dbad9ff71c7a570118c40855ca3ab865efaec345a9e7d40701,2024-08-03T23:15:34.060000 CVE-2021-30497,0,0,0015d406c711549508fdd1bc82abe3e49124f767ce4e6a2c68b29d38da87cd98,2022-04-13T17:44:42.277000 CVE-2021-30498,0,0,5aa580a8f4add5c330e78b142835ec430e20bacfdc3ee27dcc030dc0035e2a4d,2024-04-07T10:15:07.870000 CVE-2021-30499,0,0,5b03e1fc1968491571a1c808f6bfe8862e3e280a4a5c2b02a8204f4c6addcf76,2024-04-07T10:15:08.593000 @@ -175748,7 +175748,7 @@ CVE-2021-31871,0,0,924ce95f176cbae288a58f348dd5eaf36ea30fdd34639598c5609a27bddd2 CVE-2021-31872,0,0,ebcadab8807e294439827d0b89facd5121da20281f49ab70512d1a6684c780f6,2022-04-19T03:53:13.967000 CVE-2021-31873,0,0,ffdb6b05e2d8162e68dc078d3b54d0f19ea8a362142cfa6926ea2c122383f7dc,2023-11-07T22:15:08.087000 CVE-2021-31874,0,0,a29ef7152f500b8660126f13f781bdc340c3113dbe74ae2e4ffc166d126bca03,2022-04-12T18:41:46.880000 -CVE-2021-31875,0,1,0538035e131c69d7db574a826ace83ed5c433df56836c66ab2b23d89d70d7b49,2024-08-03T23:15:54.537000 +CVE-2021-31875,0,0,0538035e131c69d7db574a826ace83ed5c433df56836c66ab2b23d89d70d7b49,2024-08-03T23:15:54.537000 CVE-2021-31876,0,0,e9c2f00e29c9fd2a5e18b0aba1895e1f74472dffec182e218333132b0b1ca5d5,2021-05-26T20:12:00.383000 CVE-2021-31877,0,0,f6e53f089f1129fadfb6639d91d5b1ca15bf179e05d3927428ae824c37e9c395,2023-11-07T03:35:10.003000 CVE-2021-31878,0,0,68dcd2f64e690767d2e60c800aaf36788d70e34ee8642ec80f7faaf8f7489f7c,2021-08-07T02:05:55.693000 @@ -175931,7 +175931,7 @@ CVE-2021-32075,0,0,62e6446fda67ef9e570ea81d768b844a749136d21d5e091d98ee31d45f3a9 CVE-2021-32076,0,0,63cb4c9b7858ad00dce793fb4fcbf4d2fcbf840cfcf2d77c936372bc74ee3c7d,2024-01-25T21:34:02.087000 CVE-2021-32077,0,0,cf368100a85c210ddde5f1fbef234a2b0eec4a35c5bc13063d0710019945fdee,2022-07-12T17:42:04.277000 CVE-2021-32078,0,0,efe36af1c6e9bbb96d54dcad665be5227e44f8ad1776cf5b55a3cbf3d10224e8,2021-09-20T17:08:15.567000 -CVE-2021-32089,0,0,94bd69968641b7edf87bb5fb72c568b526d3311cca4f2f6e07144755f7de03cf,2024-05-17T01:57:27.660000 +CVE-2021-32089,0,1,f227d82056d714e56baa65d2c8b826af3b76cb2f413c8b8e23398c360b8b363d,2024-08-04T00:15:17.737000 CVE-2021-32090,0,0,b9bcd3d50346aff463970d4784593d60f91cf9c2e50a89106bb33dd100784a17,2022-06-28T14:11:45.273000 CVE-2021-32091,0,0,180c06ece6f00019ec29efd53fd95b606dcb84a929043386a0d7598674ee60de,2021-06-17T14:50:27.983000 CVE-2021-32092,0,0,56a6d12dc41b3dfbac8dd2652322df18b7aaf98f2e15f4cc45c38e0393a30507,2021-05-13T13:37:01.317000 @@ -176147,11 +176147,11 @@ CVE-2021-32565,0,0,ab54433c25fac3362c3777ea4a2315472b357a08a983727ab8d7234d8aea0 CVE-2021-32566,0,0,ca0170fe89427688fb5e737fe087c78ac2dc7a79f05af2f06d883ffa312f0739,2021-09-20T18:54:29.340000 CVE-2021-32567,0,0,f2d33438d67c189eeaae70b15f262744ce6bc1ca960c00ecf70a50bce27854dd,2021-09-20T18:54:48.327000 CVE-2021-32568,0,0,2a84a8636ec528b26aad76a144b8029604f0b152826ce01548c8b5a58601eb3a,2021-09-09T23:42:03.527000 -CVE-2021-32569,0,0,073915f7a24b8b0057d94fec53fe0007cff95c017651d9fc234d04e8a2f35bd1,2024-05-17T01:57:34.637000 +CVE-2021-32569,0,1,ba5f3d7e2c4768257f6c4ed8b95824bc5f4fb4ad90049b15c3f6d979724f93ed,2024-08-04T00:15:22.200000 CVE-2021-32570,0,0,0c9ef45640e68b44e8600bb139613be0b08957e31bfd8536c9be7a2ec6a14eb2,2022-09-09T18:36:19.770000 -CVE-2021-32571,0,0,42f4c6f066d7405e3689271da8c18a68ea1f5aa0da5fdfb1fd902817eb6c6038,2024-05-17T01:57:34.810000 +CVE-2021-32571,0,1,aa23e7d2cbfe9a35d314a6f7ca34be233f3e9b8ee00cf31f62b45f501297558c,2024-08-04T00:15:22.343000 CVE-2021-32572,0,0,e2e76715a5f05c879605ef5d818d8e64ee8575102f7960b4ce0d051e2d47be14,2021-05-21T18:00:59.597000 -CVE-2021-32573,0,0,914cf167f28603bf2dbd2403c55229b8c22c8e140724624d19a24060552167ac,2024-05-17T01:57:34.943000 +CVE-2021-32573,0,1,0c188397323bffda4bd11a7a117dc4276ec8bbd2f3b89bd61858f2a6f1c3e9e2,2024-08-04T00:15:22.467000 CVE-2021-32574,0,0,ecce533eb6b6b9c967b5b5c3995a9d721da956d14e5cf737ebcc0a37da75b90f,2022-10-25T20:41:30.533000 CVE-2021-32575,0,0,5dd2b457beceb388e7ea2aacac94ee71886d5972980d4d523fa3e11b419167d6,2021-06-22T19:08:46.353000 CVE-2021-32576,0,0,48150a2b19edbc822a1420d17337900e265b9459b2439271782a9418696af556,2021-08-12T18:20:54.210000 @@ -176613,7 +176613,7 @@ CVE-2021-33022,0,0,12387620eb30ab39a033a98a69d8adf5e0c7f3aa2f0730cdba76bdbda3df0 CVE-2021-33023,0,0,84957ca62689d40114d714b0c9d1a223287a39086e70ca61881201e2684877ed,2021-10-20T22:16:01.683000 CVE-2021-33024,0,0,b6524dbe4a1cd7bf93fdbf13b8840b0b97d76ac7145f02c41a784cf3ed6c1b59,2022-04-08T20:44:38.887000 CVE-2021-33025,0,0,21fd0dace77928df316063f32312d1acf81d9ac5df72b0121053b1830e1c6991,2022-05-25T14:42:57.127000 -CVE-2021-33026,0,0,03fdb38bc58dda5b490d173aeaf25b3cfd3aad59de127bd855cbcb17837acd2d,2024-08-01T13:42:13.313000 +CVE-2021-33026,0,1,92c9010b849726a7e68435c59252b8e84472e0f31f54441eee4a38453741df94,2024-08-04T00:15:28.303000 CVE-2021-33027,0,0,0801bc34fc460d7a6d4506776bdc66ae449fd654eec6748996397180c19cdd01,2021-07-28T19:39:16.430000 CVE-2021-33031,0,0,510b4ee13ad9642728234f837e85ce4e18a9e35b7795bd363872b93ef9b01a8e,2021-06-22T18:29:56.030000 CVE-2021-33032,0,0,3d7de3fb5f01a40c864db1d961772ba77a2ef2eb768b56aa55c2492a69cdfeee,2021-09-21T16:18:17.080000 @@ -176801,7 +176801,7 @@ CVE-2021-33220,0,0,26f550d8b73a7aecb50a3d74d46be1211a0d99a0ecafaa6c9db7c97c8c3aa CVE-2021-33221,0,0,7bda5f4f136508efa36f059e6f190ee8b53c63034dba1ec4115febadcd2ab512,2021-07-09T16:44:34.563000 CVE-2021-33223,0,0,d2b83f9e1f0882e1076744320e069d1f47f0e0cced9df5c0393c31fc3b8e070b,2023-06-15T18:22:46.187000 CVE-2021-33224,0,0,8d2afd28ce29deef5fbada49aa6347c601e25c7d6d7640e07c560f8c5b25f125,2023-03-06T18:39:58.207000 -CVE-2021-33226,0,0,fe05ec37e5a57acb0e495ac46cd9ea6abf0c291ecdb17e9df11ecd02296d6821,2024-05-17T01:57:52.580000 +CVE-2021-33226,0,1,dbf1f2d8f8fe406b14c6045188af93918d128cce944b4eedf5562d3e61a0a5cc,2024-08-04T00:15:30.537000 CVE-2021-3323,0,0,af43be2264234642c1cc6ac94f4bb634ee4d39ba0767312d56bf20948c6a985b,2021-10-18T18:05:18.787000 CVE-2021-33231,0,0,6d710b65fcc887dc95455068005bdc822d017512dc4fe852cc2520622db27e8e,2022-10-22T02:00:30.903000 CVE-2021-33235,0,0,f6b88f5c8a66508b6ef156410be8f4674fb46775af3cda4ddf8ec3cb5c7e2fdf,2024-05-06T22:15:08.107000 @@ -176809,7 +176809,7 @@ CVE-2021-33236,0,0,7d1f782e3098e93fd8f5f3f901184d79fc52c2359c142754e521f2b033ac7 CVE-2021-33237,0,0,8dfef00000f17607f2076fbc96fc9ee77de55f26617626549909804314f9c6e2,2023-11-07T03:35:49.617000 CVE-2021-3325,0,0,939ab4497259414d46ac4932027e5730d6713f966c005f3d65972ed542f85b1c,2023-11-07T03:37:58.210000 CVE-2021-33254,0,0,3b52c582eb924fe286a099229befebb6f9100111c06923c7ab272cefd51be659,2022-06-09T12:17:19.760000 -CVE-2021-33256,0,0,01c576dbdb1375f525c44aa23b7556a429c1ea17e35807758f4dde2700b8b2a5,2024-05-17T01:57:52.860000 +CVE-2021-33256,0,1,a0ef0f5bb8bb5dd41d1a13d2daeb0b1ee434ed4cecd52719406bff4c32fbfb23,2024-08-04T00:15:30.707000 CVE-2021-33259,0,0,15e02045e44ed30d1ae5ccc7f943e606abf94603035d43ef131994de22310e70,2024-02-14T01:17:43.863000 CVE-2021-3326,0,0,149179acb6b228b7d3971e3d52e133d9438c74f3778746025c38b3d5aa003e12,2023-11-07T03:37:58.280000 CVE-2021-33265,0,0,44e7eca7f142c8155348749e3a272f000a7f4890170962c8ad4da2e380e6302d,2021-12-02T17:33:58.153000 @@ -176895,7 +176895,7 @@ CVE-2021-3341,0,0,bb2f7eb4dc34c277896ff9734eba9c11069cceab3d720c823ccc56dced4bcb CVE-2021-3342,0,0,7e9c7aa230672417ed4b9e2f2be652308f6e54c6ec28d5cb30606684cc6430b2,2021-03-04T15:39:25.737000 CVE-2021-33420,0,0,f13a5ff28b3777743216fa2f32d57915c5f0d2ff9011efcc245dd401ea68b163,2022-12-20T17:11:07.340000 CVE-2021-33425,0,0,d655d690664296541e13cf3eed7b4a5855972d8c72444c679acc1348cda3a8b8,2023-05-24T15:01:02.763000 -CVE-2021-33430,0,0,cfab48646b6bbff90f2e34a0cf0999b81097c30271d05a0e99a319b2d1efd532,2024-06-04T19:17:04.897000 +CVE-2021-33430,0,1,e01000677f19b2c9506bb0e91ec2ac881167b61a46dfe6d3c42a39a8d998bc96,2024-08-04T00:15:32.943000 CVE-2021-33436,0,0,62f0a4296a4e3e261db578c7a8d3ab3e3af1bff7e856c4207d7e229d9c7ce837,2022-05-07T02:15:43.643000 CVE-2021-33437,0,0,de50732023759ee5454e8818cad683712cb4a98f4c253f79d08545b53b652eb2,2023-08-08T14:22:24.967000 CVE-2021-33438,0,0,a411eb84270c140a676a1abc8bc3d6c108698177b594bcf2366e78fa8330a424,2022-07-28T16:43:09.900000 @@ -177013,7 +177013,7 @@ CVE-2021-33553,0,0,b045c3878f2ad3b11b4176302232dff2f8ee0af5f8367d4afdd3a8d800eb9 CVE-2021-33554,0,0,97321ebda08ffc5b66d9f94399ec2b3d47a510c8a7a32853d67fc32630c95dc6,2023-11-07T03:35:52.423000 CVE-2021-33555,0,0,3383da83de514db8cc023a287ad9da0ba985a7e5349245b89dab9165e4218f0f,2021-09-08T15:15:32.290000 CVE-2021-33557,0,0,68eaef3573cd76d1cafdf6df3b5bff170c6f88d49effca29b8206e3357c2afa5,2021-06-21T13:27:28.850000 -CVE-2021-33558,0,0,c407a26efbb45aac8ead96018d97c007bd10db84c148068e68336a96288f7bc8,2024-06-11T15:15:52.823000 +CVE-2021-33558,0,1,c1b167030953bb91b85cdb0fe139a09e6886866ca1b2b33639e9d9514d09a074,2024-08-04T00:15:35.893000 CVE-2021-33560,0,0,cf90b139e653d124cd7cea131b3fc975c3d4712bcb2130f882b5cf3d1a1b0234,2023-11-07T03:35:52.620000 CVE-2021-33561,0,0,c51e0fe747f38e71e8714523a879a2f384d3a91b4d3bea895b5ffd61d1e37e19,2021-05-27T22:10:17.830000 CVE-2021-33562,0,0,4df9d7003fe7c533490db6cc9aead5111b91c8c92b1398c6b7ba7ed2647e33d7,2021-05-27T22:10:03.673000 @@ -177288,7 +177288,7 @@ CVE-2021-33897,0,0,9bda20bb94ba98f742566f69f2cfc99f114164b4bebaf6173e58ee471d61b CVE-2021-33898,0,0,d73a97001307c2700611034b1a529628adb12126d7738585c9c0f3cfb54dc88e,2021-06-15T18:33:32.387000 CVE-2021-33900,0,0,b3e5c6e87816fdc5c58f714f938ead9420548ae544b2b725340e64dc83e58d13,2022-10-27T12:28:40.833000 CVE-2021-33903,0,0,1d3bf2a6a7a541b335aeecfb953c3b30767a50225e0a9115206fdd66e7e39273,2021-10-15T12:28:04.837000 -CVE-2021-33904,0,0,f045743b146009e7fd67e58ffa6f35b9917b24918de1f65abaa01eeabe585bd9,2024-05-17T01:58:07.877000 +CVE-2021-33904,0,1,e1f022ddf7ef00f73d5ade63251470569f7b6eeb76e3d40a7a381cd2c3b6a507,2024-08-04T00:15:40.440000 CVE-2021-33907,0,0,9861cee59f3b9f5a035fe1dd9a711080dd738a872aa40dd3797d051198d0832c,2021-10-06T19:01:09.047000 CVE-2021-33909,0,0,5a3dc0ebf3f25717cfae17a6da5e7b29cc384533a7f151a23b4b0352f3eaa408,2023-11-07T03:35:56.050000 CVE-2021-3391,0,0,9b4a57345b4ffdfe180db6c742265b6d8d3966c1b1be8e1e155b73f656c8a574,2021-04-06T13:30:50.890000 @@ -177331,7 +177331,7 @@ CVE-2021-33981,0,0,cab1c277a0ed5c168f764a99cffa691d551b4f0d95a06393cdaafd0cdbf74 CVE-2021-33982,0,0,0fd9f6091bb790244f86f71fde2b876e5dc644f476d51026545c4bfc9e745397,2021-09-15T00:15:12.243000 CVE-2021-33983,0,0,f364c385b2a939c68012f5340da55dd0188b3cd2fb7ad3f28303ac4cf7273add,2023-03-01T14:35:35.453000 CVE-2021-33988,0,0,496657c8983f44bfb7892d0c040c974b38d9be6baa22646f4b3254d7adb633cf,2021-10-20T22:13:35.920000 -CVE-2021-33990,0,0,566369b4ad4b1fe8ef7c5e4d403bb8c88882d16fd43ed49241dcdbe494bdf3f3,2024-08-01T13:42:14.200000 +CVE-2021-33990,0,1,fee7319e9d4e9f4cee8bd51162bc48cd1af3b408860c0f90e859941e06e19608,2024-08-04T00:15:41.570000 CVE-2021-3401,0,0,9b9759171902da6a83b79d8a1d5adbfbb4de1c91834a8f97f03d6feb0eae5c45,2022-06-28T14:11:45.273000 CVE-2021-3402,0,0,dcced8e46942434874ad1fb312e0f8fc9307677edc30037bf2e26a7066ae2df9,2023-11-07T03:37:58.917000 CVE-2021-3403,0,0,2d086700c0c9b4a4a58845389d97573b27cc1632371bfd969865def03ca057c3,2022-04-25T20:17:58.637000 @@ -177526,9 +177526,9 @@ CVE-2021-34365,0,0,49db18cb5c84205b8a534857fded3fddd49da27c7416cd302a15d10450f69 CVE-2021-34366,0,0,60031ad9118ed189c5b303a7dc6ea7e2175eba0b54db8563f12ad94eb22a19d2,2023-11-07T03:35:58.397000 CVE-2021-34367,0,0,23c44282221e673aa73f4b45bad8f6c7b3a2421350102aa66fb73f517471a272,2023-11-07T03:35:58.430000 CVE-2021-34368,0,0,e6a53be104a87fc8f230a782d5f04e90b629d74f44b2d70c784db58dc6936074,2023-11-07T03:35:58.460000 -CVE-2021-34369,0,0,3a0b0ba3aa681c9135c6f1288c06825fb00e5de8f3442923260b591218b3d565,2024-05-17T01:58:14.640000 +CVE-2021-34369,0,1,d208df6bb3c8f9ce623b1ac9b20771de86dcbde988e99fd95b7bb82e0ed5697e,2024-08-04T00:15:44.763000 CVE-2021-3437,0,0,df4e6d76cb7702996a3fc5f344c9ce94cda6624e057f2f01d7c56553049fca18,2022-12-19T16:59:34.797000 -CVE-2021-34370,0,0,942e9087668ee2aec1d56505841363db3a95655b1ab6af31a6e4af23afb60d76,2024-05-17T01:58:14.760000 +CVE-2021-34370,0,1,940b0dd4cf490e22c4ade1e34f784fa7cd638aa6102c41ed35bcd4ad064634e0,2024-08-04T00:15:44.863000 CVE-2021-34371,0,0,d7f8c97b46d0a810430c7afef845b2c79dbc02e6a93a2f20138e7131c9778779,2021-08-12T17:44:57.840000 CVE-2021-34372,0,0,3a60e5a7ade8d19461c474ed8ac0a4bcc5c924b1b36a3931217205a41709c378,2021-06-29T19:37:04.270000 CVE-2021-34373,0,0,e7fce41c194fe37b7af911fc58d4f3fe0b758be1d0a08450c93dc68c414510a1,2021-07-06T14:47:29.370000 @@ -178159,7 +178159,7 @@ CVE-2021-3498,0,0,309a7e109402a4feb995fc79b306f3a51498d2cd645abb8dccdb2c479948f6 CVE-2021-34980,0,0,f803eed081024b59391789d93bf5cd18f5162a6f521a3772d7579d17c812bc37,2022-01-19T20:09:51.213000 CVE-2021-34981,0,0,4b537719095078d5e843f31c6b218578d485b00f383681cfa547da59deffa052,2024-05-08T13:15:00.690000 CVE-2021-34982,0,0,738e6c62ed7fdcbd9dbb44b2d6631ea0f99064734217ffd2536a08218f408826,2024-05-08T13:15:00.690000 -CVE-2021-34983,0,0,f80c83722ee9cd915ef57178cfbbc7d7c420eb0219cb1c53255b5a5b6b93dfa5,2024-07-03T01:36:50.850000 +CVE-2021-34983,0,1,f9389b138f590b9c294769c7348f38edc0a5d2842011877d84c91aacc14bb811,2024-08-04T01:35:05.720000 CVE-2021-34984,0,0,517b69c1f707e87fa6efd70739aa66de58cfeb301cf52242c4c89af063d71abf,2022-01-20T18:19:58.510000 CVE-2021-34985,0,0,e3ed84d0e82e19c36cbfac1a88111f57af6a98f6352ea246610d179c698b53a1,2022-01-20T18:20:32.257000 CVE-2021-34986,0,0,d531492d811af0af93aa371508bb514c2f870c0e2ae96421fb3a4e8cbc53bb51,2022-07-22T14:01:25.817000 @@ -178297,7 +178297,7 @@ CVE-2021-3517,0,0,a1d962dfb005b2e5b98c5af02df290ef64262857839ca532498beca7ccdbdd CVE-2021-3518,0,0,a76e97de17ac8f24c61961e5a7d8254226f8468d4aec699c6b57a015dd8e1e0a,2023-11-07T03:38:04.050000 CVE-2021-3519,0,0,10977120fb7b4b66273cf50940e4d6bd76a1a997aa363c6e358c8486afb107c4,2021-11-19T22:04:31.987000 CVE-2021-35193,0,0,a162afbc7a5171c627141e195f850061f3e08439984b46f73143e95bd5312c58,2021-08-11T15:25:11.357000 -CVE-2021-35196,0,0,f271dc813783f778a56ea0a18e9a06f1a0c0fc62355c420d610556da3e3f3f27,2024-08-01T13:42:15.173000 +CVE-2021-35196,0,1,261b57d63e680a83bd74f2793f52b30afe1f95d9e17d6d4a5fd38b6a8e32efe1,2024-08-04T01:15:30.987000 CVE-2021-35197,0,0,22e8eda6d6da7bd81b1e3317fa4ee52603241e7efeefe5b25be85876bc1a8b43,2023-11-07T03:36:30.150000 CVE-2021-35198,0,0,cc19841f95cab4d85eab6ca777ade77a70d4e0471df59e5b70b5b81f5d971646,2021-10-04T17:33:36.207000 CVE-2021-35199,0,0,8e943a274ef674f856afd4581cd12225bc3ccb44bd8eaac54942c11c734cb67b,2021-10-04T17:34:23.810000 @@ -178394,7 +178394,7 @@ CVE-2021-35325,0,0,a9d9c41aa39be1a6f91677c17b22b655b745199fb0406bf7f7981f4646454 CVE-2021-35326,0,0,983cfbfe6c81d56a8b60122671585f86e1c82012af2510dcc5ac8fd2a0176a39,2021-08-12T18:31:00.713000 CVE-2021-35327,0,0,21f8c08d6d8d20d1fa8f3918b478f1dbaa528480628867637703b80fe26ead92,2021-08-12T18:33:42.270000 CVE-2021-3533,0,0,0872082589fb156f3da0235760e2ccbffddabc5c58a6d78af37d879f7fe2a8b2,2024-01-23T13:15:44.970000 -CVE-2021-35331,0,0,9f05e70f95e49ecd7e62c6987984784d160bcd8da81df91dd24d11c00684b16c,2024-05-17T01:58:36.660000 +CVE-2021-35331,0,1,42da675f67ab0a8c0de4c1dd91a09ad9a68796bf597eb067c6cd46356d451ec5,2024-08-04T01:15:32.833000 CVE-2021-35336,0,0,346ae813413d4c833d21c9e98ce757b341e47f7dccb47130d038bf7f2495180c,2022-07-12T17:42:04.277000 CVE-2021-35337,0,0,f241db2f2e658dfcbc2aeefd9051f434d1b4353e56fefa3af00c9863edb367e8,2022-05-03T16:04:40.443000 CVE-2021-3534,0,0,0ade513454ea4e2b15cf7ea0a2ab4b4d28e1d73a55bd7829067f802c9b5cd4a5,2023-11-07T03:38:05.257000 @@ -178688,7 +178688,7 @@ CVE-2021-35954,0,0,1a3882831e5c4c51fbe5cb42e1a7cd00f05885bdaed33d4fe2dba15c6169d CVE-2021-35955,0,0,c1d00e82f88d2a8abc8f2104b4c1c6690605c8fded80bf61a536252d431c7468,2021-08-20T19:51:40.223000 CVE-2021-35956,0,0,d0aecc8681de1817278da9f59c0afc24be467ae3ebc642e3e50bd4f33083a45b,2021-07-06T13:20:33.377000 CVE-2021-35957,0,0,9390b242feff14ee70cb8542748c8fda5d80c14c42cd8294061630c09201bc42,2021-07-15T14:25:38.787000 -CVE-2021-35958,0,0,eb88c05e152dde3182e5818868b58d7f6fe8a8b649a227140c0a1d8dcb0d2f5c,2024-05-17T01:58:44.037000 +CVE-2021-35958,0,1,95fb6f5a27b829172cbaa2985c88d62953c19e221962d9dd0a6f92e682795e7b,2024-08-04T01:15:37.527000 CVE-2021-35959,0,0,4f96be4512309c0a53fbeedcfa625495ce0a91bcbc3a83915e3847cfdbd670a8,2021-07-02T20:06:23.253000 CVE-2021-3596,0,0,0a139d14f56152104a87ee5117c34bd2d14731eedbe3be1bd09b589510825394,2023-03-11T23:15:17.597000 CVE-2021-35961,0,0,067cb4a3bf9020044266c3ad3f8cc05d3af5b8127454095f7d8476648ff0a354,2021-08-02T17:40:31.477000 @@ -179040,7 +179040,7 @@ CVE-2021-36364,0,0,31cf74bffa7a8b7ee8ed3b970f66924777c989859b353ac5e2cf74703e0cb CVE-2021-36365,0,0,640972985e54d495ec043164722fc0d4ca651dfd144022a254d75eded5f3bb56,2021-10-01T14:08:13.040000 CVE-2021-36366,0,0,4875b742eac63be7d9e0c40ac6fc7941633afb967069346c142c96d0dfb29521,2021-10-04T14:49:40.537000 CVE-2021-36367,0,0,0c437d1a92b028b783c1404735df08f0b56561aa800e259cd9084dd5343a5dcf,2024-07-03T01:36:53.610000 -CVE-2021-36368,0,0,e8a253a8482e6e4b61cdfd8017ae28bdcbdd890e45af6c8106c37eaa3924cd03,2024-05-17T01:58:53.237000 +CVE-2021-36368,0,1,523d871f8b76b028326dc77a3547e36fea53a589172b6a4c0f12591f6cdfbbbf,2024-08-04T01:15:42.867000 CVE-2021-36369,0,0,5aebbf999b2f4765132c4d466ad2cde666db6dec69d29093191b5884cded9aee,2023-01-20T13:31:40.710000 CVE-2021-3637,0,0,b0a96debd73fb28d8092299834bf62ad34d0cb3fe45a8c0cf99a60645abc5688,2021-07-13T17:56:24.283000 CVE-2021-36370,0,0,6c15fc836eb6bd36b0009a812f90dcbd4318d69120fc12e1ef551aca93bc2c6a,2021-09-08T13:41:03.360000 @@ -179187,7 +179187,7 @@ CVE-2021-3667,0,0,077c6f9f6200c35c6a77fb1c3e9aad939002ddb7421671f9be267a9e47700b CVE-2021-36686,0,0,d1e789329f32e2b0b7dc8522e2b2becb922d843cfb761a4814990e861848c69e,2023-02-21T18:15:11.743000 CVE-2021-36689,0,0,09d2fcc096014ceeb1688ed2092fd3971f6f9a5f0400886c1c9c96740acd539c,2023-03-10T15:05:39.123000 CVE-2021-3669,0,0,6e63460a736fea5b9537c51bced912e80c86557cd24a83a3efb3172e3a3a60c5,2023-07-07T19:16:17.817000 -CVE-2021-36690,0,0,dd728874c8e302cfec2ceeaef43062e94113e5ac8b30cf3b23950a792d9c4127,2024-05-17T01:58:57.110000 +CVE-2021-36690,0,1,d8f9a4c9e27ae125c4a2e7e1df083bb5fadd0e08ce04cf1af2f487d581997b09,2024-08-04T01:15:46.013000 CVE-2021-36691,0,0,e581530eb75271e04bd140e4e89eabd3eb0731e84836449f6a17bbfa23c3df73,2021-09-08T13:53:55.530000 CVE-2021-36692,0,0,b3497a7d79e764f6de6e1e4a421001c8bf92df3e6424ef7f252e6bd5b031ff6f,2021-09-07T20:23:13.163000 CVE-2021-36695,0,0,fef75b7c3c05614b1ff4ada7f734634af7295d86d1c18ddcae028928ae1c3b81,2021-09-14T18:48:39.137000 @@ -179226,7 +179226,7 @@ CVE-2021-36738,0,0,6291e909a53f621ff7267febc879b94b4fbb555d0058e1f683c0dd8bcc641 CVE-2021-36739,0,0,5947538ac7c104e041e87b610e0de26ebc1cf54019c58dfa4d6a71e07a3b84dc,2022-01-12T14:51:21.543000 CVE-2021-3674,0,0,563264c78802544cb4b3fa2728b8c97860df26ed11c5cc67dd0b69dfdddf2b05,2023-03-29T12:51:09.367000 CVE-2021-36740,0,0,4fd38cdeca28c80f7bfaa9bbcd0436f17ea1f4b0872bc5b5b38a25ce52fd64e9,2023-11-07T03:36:47.880000 -CVE-2021-36741,0,0,820d73ffeca1d30e11185d45f75ddf857e5d3f4994444a2825cfe2dd9926f9ed,2024-07-26T19:26:16.980000 +CVE-2021-36741,0,1,058fe56e6cc8b6c9c61d105ab6538aed09bc7dae5e539b34c6827d88837035eb,2024-08-04T01:15:46.910000 CVE-2021-36742,0,0,07ea05af1858224c3817e40b7b9a2d523a8c564fef1172f75d681b0dac065ad2,2021-08-06T16:44:57.420000 CVE-2021-36744,0,0,b0e6317ab19586c4e417d13fd757169adda5c1c6b2aeef952179476525359f4a,2022-07-12T17:42:04.277000 CVE-2021-36745,0,0,7817c8fd2c7d80d2661bbb1bab99266ef44b2edd9ade725a335b8e256ef77116,2022-07-12T17:42:04.277000 @@ -179282,9 +179282,9 @@ CVE-2021-36792,0,0,03b940a95e54160709a7f3f13a03779309c4fdab37624d6f38823c6c2bd6a CVE-2021-36793,0,0,6e49a5643e6990b6d428d90095ca184e81827607c46c72ba003d173390d56387,2022-07-12T17:42:04.277000 CVE-2021-36794,0,0,bdbc5a0933f19002d5a2081af48a343bdbd554377a670fd95c9cf06e43f91434,2021-11-04T13:30:35.797000 CVE-2021-36795,0,0,2e371991ef38301bd1a220d3ff2901fda72c1b95aa549f5ef1cf1b239ccb39b0,2021-08-16T20:21:55.030000 -CVE-2021-36797,0,0,3db5fb761cad8055f7e4ba15b49e86a108d6613b973878044fd499c78df5a71c,2024-05-17T01:59:00.180000 +CVE-2021-36797,0,1,bf1a173d22fc05443f516ae19fef2bc154c9df998703b74af4068e1554d88f7c,2024-08-04T01:15:48.210000 CVE-2021-36798,0,0,e4d9418ea62cd5a15dd8b94b50b921660c6f92c477971b607f36f110713b0df3,2021-08-17T12:49:59.017000 -CVE-2021-36799,0,0,83320c5f25774fbb9d96fdb9a6f0dc308b84eb5ebe40b4c80d0450c19820b30b,2024-05-17T01:59:00.337000 +CVE-2021-36799,0,1,e994f6b2951b1371ca652bcad523205b3192d486c37cd9b9acb2d41e69a79220,2024-08-04T01:15:48.333000 CVE-2021-3680,0,0,7e218f7493f108d913a8e69bcc48cb404c34dd308beab4ce250a525b3f66a1c3,2022-10-27T12:29:15.297000 CVE-2021-36800,0,0,0c7f528fe7a0e81c26cf3f075e83883ac78dcb760b1fdc1cd9cc438286a60b3e,2021-08-11T14:05:43.950000 CVE-2021-36801,0,0,bcaefbf4a76a278fb129fa403db9086b8e1423fa17634ea029427a6582d8bab8,2021-08-11T14:03:55.980000 @@ -199478,7 +199478,7 @@ CVE-2022-31691,0,0,3147c1465e31f8d8d2d6d27897f16a7a674d04d4cb3d1fde70b641f49ea0b CVE-2022-31692,0,0,f1c34c6caf6e386cfd7813af22e5f54dd63cc1c8ba6464aa9c28e562f2c19446,2023-08-08T14:22:24.967000 CVE-2022-31693,0,0,1f016da5cedd970d018d8be64178481b37f84136f0deb879c6ec274f163a1638,2023-08-24T19:15:10.177000 CVE-2022-31694,0,0,2329c118b6bb9e51b8206c0569ca413eba1a0b3d06ff7ddce7c0ce8e91bb6439,2022-11-22T20:31:54.550000 -CVE-2022-31696,0,0,72722fcfe9e65bfdfc13f5a75736b7e91e82df2b8fbb64a2218c1f8b6b0cabde,2023-08-08T14:21:49.707000 +CVE-2022-31696,0,1,034fc6e094bb10fb9db43a72aaacb1594533f6d1aa2c7d27f18f4252ace07f33,2023-08-08T14:21:49.707000 CVE-2022-31697,0,0,39f68de85b68c59e475d8af7afdd73f797e9f9fe8b170490a8ae314b505e2bf3,2022-12-15T17:45:12.637000 CVE-2022-31698,0,0,b367426e9e009401c8445b4c1c92f4c25e210c44defdda2610c4c4f5a75ab9fc,2023-11-07T03:47:40.757000 CVE-2022-31699,0,0,d7238901e236428b21197def37fa206c5dce7bb9921abb1f2bc015779728b382,2022-12-15T17:46:07.693000 @@ -213925,7 +213925,7 @@ CVE-2023-1573,0,0,7939398951a41cde776a82a2882d5d2fec4e3bcfafab8a6bab93479600d715 CVE-2023-1574,0,0,bb4ada258e527262ec9c1e564ff1ea3eabd2509806f1a474326cc753548f7d1f,2023-11-07T04:04:10.400000 CVE-2023-1575,0,0,f811fd520e2db6c6e57e3d4509f960ffa8a39e7841c7bdfcaeab3867649bffdd,2023-11-07T04:04:10.567000 CVE-2023-1576,0,0,ef2f2d7ef5f003955027a9696c660724e0afac7b8354b8ee997b1c99faa02c4b,2023-11-07T04:04:10.800000 -CVE-2023-1577,0,0,9bb7e9613225f2da28f695d89b328a6f22ab7ec97d457b6d0abbc7d77a7f1b3f,2024-08-01T12:42:36.933000 +CVE-2023-1577,0,1,360c95020e55b05c0f0a0fea18524acd8d08c610cbf7b565dc5ed8f6f29e2333,2024-08-01T12:42:36.933000 CVE-2023-1578,0,0,6263cebcfb388a666b983b865652ac01e5982368805925e75cfd9baf8b0148b0,2023-03-24T20:59:40.380000 CVE-2023-1579,0,0,8a5351cdb9caa5543c406229031bc98908bc9da8ce9c96b58cbfd6b128ff7404,2023-11-07T04:04:10.970000 CVE-2023-1580,0,0,45d0177157acfe9e834e03f4bd4c6174aac525767ec0c54d75bffa92c7ddabcb,2023-11-07T04:04:11.487000 @@ -220900,7 +220900,7 @@ CVE-2023-28070,0,0,6b06dac3e6645bdcdf2daa8669376f0eb71633f1db849c20838f9de3974a9 CVE-2023-28071,0,0,ac8ad066b4568a2740ef70c8b83380502d2da7385bb0318b9932a819e6b4c283,2023-06-30T21:17:54.033000 CVE-2023-28072,0,0,890c8c3e435d94e75601ba5f3f01cc951f80d11c3fba8ba23584cdbf9590ee73,2023-09-08T13:58:40.990000 CVE-2023-28073,0,0,c0805fe755dae08afe34203444849dc743ef82b285490ed67a8b997664d73c67,2023-06-30T21:17:26.547000 -CVE-2023-28074,0,0,8780c645aa116ef681eff3d35be07dc912c87e0ef8b33221d858c07594a06ce8,2024-07-31T12:57:02.300000 +CVE-2023-28074,0,1,d519b22ca8dce85f07cae30100aef96e070a92674e934608d318c9f5a4496762,2024-07-31T12:57:02.300000 CVE-2023-28075,0,0,263fb4056eae49bf0d178dd7eda3048b6eedb73f77bd02c9854e350cf9c199f0,2023-08-22T22:11:00.903000 CVE-2023-28076,0,0,49f73a0b782d30b42b8832cdfd6102bec5b80abbc6c6645b8949d1e69a2e7e37,2023-05-25T18:55:37.740000 CVE-2023-28077,0,0,864f1d99379daf3c5d006eb293792bffe251fd714ed14e7eec5fb2504cc09dd7,2024-02-15T18:40:41.303000 @@ -221979,7 +221979,7 @@ CVE-2023-29259,0,0,b02d21ca920ff44c3d2b4df6e2307695936a7e27eb42d34632c29b36ad7c5 CVE-2023-2926,0,0,711348ffaa8bf88933ad55b67b5238d02c265ac0b3ffcbf7bcbf21f080a79fa6,2024-05-17T02:23:22.407000 CVE-2023-29260,0,0,1db39a85d5c5a665d99c908397156c7c07cd1d62a4046c0b38ebc10401a9808e,2023-07-28T15:59:39.313000 CVE-2023-29261,0,0,e2008e5d1f636df0fd50d91fcbf50e9cdbc06c5fc55381345614253d8091c862,2023-09-08T17:10:21.577000 -CVE-2023-29267,0,0,6de3d6cb8f64efd1557b36163f6cac9dc6af03a617e083c105c5dc472930f5bd,2024-06-13T18:36:09.010000 +CVE-2023-29267,0,1,0c6453504c8b1eb146a37164f62d2c8e40990e286fa0b01aaa75f7bb9225a1e0,2024-06-13T18:36:09.010000 CVE-2023-29268,0,0,f1714f8c07b09347b9487bca0ca0cacd2a5a3951cccb493dadba896dcaf9d80a,2023-05-09T01:31:28.760000 CVE-2023-2927,0,0,5bdeed4d24b4feb5be560ac60907e25e0b13b57f82f5e462f8abadb299d64377,2024-05-17T02:23:22.513000 CVE-2023-29273,0,0,5cc9e91dc5ea3c5026a4b7b8387986ed5f39301e64ae47f7e79fce5d81d1413f,2023-05-17T12:50:17.923000 @@ -226212,7 +226212,7 @@ CVE-2023-35018,0,0,6d336ce3e2614937180971b4858c079e9a4762f40daaf2f592acb48025066 CVE-2023-35019,0,0,1291349f3b1d1d4adf1c92cac15e5df37965c90cdb3e3c741c73d93303d641a0,2023-08-04T17:23:56.413000 CVE-2023-3502,0,0,74be66f33660d5a960e431317df48fb842e4013315111e826f94f24e7bf2f927,2024-05-17T02:27:32.370000 CVE-2023-35020,0,0,ad9d714b38fc8dfafebf526e5bcd88bda4558e15578975a719df5c9198c79c30,2024-01-24T21:38:11.280000 -CVE-2023-35022,0,0,ac694e9c8ffd8fb7368eea470158e18ea431a24bfa5487ba39c286c0c02b290c,2024-07-01T12:37:24.220000 +CVE-2023-35022,0,1,33e02475c5109f5e91d42aac13b9b467a496a3bd3a8e57df046c865975e4ae02,2024-07-01T12:37:24.220000 CVE-2023-35024,0,0,b99623d62fd61cec8b42feb7692d36a2dddfce4725f8455d7ba260278fc27d1c,2023-10-18T21:04:02.917000 CVE-2023-35029,0,0,e92935d889ee7a18e80a49707d3023b26a55365680006a3e5edfac7046aa802e,2023-06-22T16:51:23.137000 CVE-2023-3503,0,0,9899b3a06c9c6b85f8b5fdfd6303f5bfb45d62bdf6dce68bc15f1326d515bc23,2024-05-17T02:27:32.480000 @@ -229234,7 +229234,7 @@ CVE-2023-39008,0,0,31a0302bdd0ffc06b188f72f231e393bfa8a0d5fe44f2afaa65308897630b CVE-2023-39010,0,0,dadd990db2f2bf5d475672a443dbf5292788500ceb28ca6582dba60fe975be54,2023-10-03T15:48:47.203000 CVE-2023-39013,0,0,7dacdaaf354b7ed4b3ab8a0f844e9ee4667b1e13599141930dc2f15b6c229dc9,2023-08-03T18:10:07.200000 CVE-2023-39015,0,0,25fc598084867b96c0280d9306f465af2d748b9ae6cd27a2361f7fee764a723b,2023-08-03T18:09:48.280000 -CVE-2023-39016,0,0,18fb0d5e88493f1ee1b23d6bc798bda2f68e1afe7bf64888d17d070ad0867873,2024-07-30T14:55:53.803000 +CVE-2023-39016,0,1,35309eb607975f9807b0a3d46f45f594c74574b329619228c80e35abf31e9dac,2024-07-30T14:55:53.803000 CVE-2023-39017,0,0,bd324813bcb37b44b5c9b86e7f9af2851a7fb2396edf48b6d794a7c804d10e9b,2024-08-02T18:16:00.607000 CVE-2023-39018,0,0,ea38700ac0106541c2c0e802f28b361ffa64625da709c9a04a7040996e0d9efb,2024-08-02T18:16:00.720000 CVE-2023-39020,0,0,6cdd81912f390a2f3a64bc1ee1daf573fa48d1318977e6c8237489f0256615ac,2023-08-03T18:01:31.200000 @@ -230562,7 +230562,7 @@ CVE-2023-40668,0,0,c5f3666ec34b0bebc6eb479d1b15e2450979865d27048a9e2266f236a52d2 CVE-2023-40669,0,0,5c308dbd51fe67d5297146fd2f11153f5ed9f5e69e426870b2d6a63aeefa9a57,2023-09-28T20:32:34.477000 CVE-2023-4067,0,0,939ba5b130017b4b05e177398efea379190be82190b15d1481689b6631de95b7,2023-11-07T04:22:05.270000 CVE-2023-40671,0,0,52c864f8280f91b11f38799b7bdd8a0e382072fdabbab2fb8bbb04b185b100f8,2023-11-07T04:20:19.910000 -CVE-2023-40672,0,0,361d2e8a5c3450c41302a3acf39c78cb584e4778c6bcbe8cedbb789a52e46877,2024-06-13T18:36:09.010000 +CVE-2023-40672,0,1,3b4ca01c238c25580c16513139571b5a01c5f6f19d1a69b371d368f3d5d73979,2024-06-13T18:36:09.010000 CVE-2023-40673,0,0,913cb4d0a64d9dcac1f16c3197783e48344deed7b9d09575c28c0713933e90a0,2024-06-04T16:57:41.053000 CVE-2023-40674,0,0,c89a706747ee0a74cddc3c6db3223197f42c1ec31495d415d140b42fcff80bec,2023-12-05T19:17:49.380000 CVE-2023-40675,0,0,4d21df136c90d8a17f2640a4b8a2f73e3d918c09cdc84335eadb84344294d8b9,2023-09-28T20:29:47.320000 @@ -231557,7 +231557,7 @@ CVE-2023-42006,0,0,7bc654299bdffd4dea86faa891431a36a20e867c63d5ac4b34f0bee0da988 CVE-2023-42009,0,0,f89329d383bff9c4e4003f97be62e026977c106e2fb260d8cf582ac6cfdbeb3f,2023-12-04T18:33:10.530000 CVE-2023-4201,0,0,7fd07b441817dababa9c6b0d46cc8c888a4f1cfb89732226d733c670a9e917bd,2024-05-17T02:31:26.180000 CVE-2023-42010,0,0,1e8aa5e26c09cccf0ed140c8075da66ee3fbbf5a749ce8c28192f82df2a4fafa,2024-07-18T12:28:43.707000 -CVE-2023-42011,0,0,29f92d5485e8f442869f06fcc611c3fcb39dc5070beb5deab37c685b582d12d9,2024-06-27T19:25:12.067000 +CVE-2023-42011,0,1,2062da33d8d22bf8ed5b418254f2c28e05f68d4c8038f3601eb74e5c3fd6f3e5,2024-06-27T19:25:12.067000 CVE-2023-42012,0,0,c9fd1cb220cca36310c2927eecb6716b856f9d4967673cbb0ec6589b58671e17,2023-12-27T18:09:34.133000 CVE-2023-42013,0,0,0842e742d79b869e58d2f38c2240ab17a3bfea52d45e865ce3c80d51b870f390,2023-12-27T18:18:23.723000 CVE-2023-42014,0,0,220908cc0bd0bf38a67dfd6ee916449ac5b321b71582e30e978cbeca27e6f78d,2024-08-02T15:15:02.987000 @@ -232564,7 +232564,7 @@ CVE-2023-43550,0,0,dd26777fe7c76aaddce632193169255ce63f6554f651158eb0fe9f8d3a6b3 CVE-2023-43551,0,0,1da0ac02f2044ad4b88696662d307d0447ec4789a4fffe3d4302bd62cb4a8ec4,2024-06-03T14:46:24.250000 CVE-2023-43552,0,0,df3b58954fcf9776a956bbffa11678a9c40ca1ba1f1d5d6d25fc081d8d702fa5,2024-04-12T15:15:22.210000 CVE-2023-43553,0,0,8941e7bb124b698e9acfc43e4da8e8c8b02af5a55db3e6552aa84d8cbfa3c4ed,2024-04-12T15:15:22.310000 -CVE-2023-43554,0,0,1f2b376389fdca1fd9b931847bef23e3554bafd77118c14c759aea825296c03b,2024-07-01T16:37:39.040000 +CVE-2023-43554,0,1,444186229f1e02e39cf0a3b47c9db7610150f711f9eafaf09f72a2076e14c6b0,2024-07-01T16:37:39.040000 CVE-2023-43555,0,0,cda7df5833e41442ddc362eb16f0c18ee659ca1f15aa965650a2448242784d5b,2024-06-03T14:46:24.250000 CVE-2023-43556,0,0,69dac4661060cf7876f4827f5c2b868921cf551c117e53edae64436a4aa9f67d,2024-06-03T14:46:24.250000 CVE-2023-4356,0,0,3c06bd3da07fea776daccde8a3b9274c7f86ff08a23bb0bce26102cdd4db70fe,2024-01-31T17:15:14.917000 @@ -232854,14 +232854,14 @@ CVE-2023-43944,0,0,444cb16bb521303bb044c64676fbd90beb0aac62b40598010588900ff85bf CVE-2023-4395,0,0,78dc7c95316407c5e68a1106c7fbdadf01339b63c6724f1e4f6fa4838b57b003,2023-08-22T00:55:09.250000 CVE-2023-43951,0,0,4683eef363601f03642432f8504e14297e36c6dbe1aacbaba8638da92ff60a6c,2023-10-04T18:25:22.743000 CVE-2023-43952,0,0,3f99df84039aad13bbb3a6357a20c18c76870c6d24c4cfff67d60d5d7d0cfece,2023-10-04T18:26:33.977000 -CVE-2023-43953,0,0,2f3193b20d58c45bca07f26458acbfed77684bab5d519c91b9269263b9606313,2023-10-04T18:27:51.783000 +CVE-2023-43953,0,1,08e2e8ca27902b55feb58cb1f34611b111178f88cdd0d1534e6a465107132aa1,2023-10-04T18:27:51.783000 CVE-2023-43955,0,0,d0f72de1dbb3e1a1dce2a1368d19b2afe07049e0c8cdd35b54ccdbe037d7faf5,2024-01-09T20:06:56.977000 CVE-2023-43956,0,0,287c16836b7f2388aafb63c0e9b6832690d16233ba3cdc6bea2100ffdf34047a,2024-01-19T20:15:11.727000 CVE-2023-43959,0,0,3e0508b282ce13b7ab31b65b36da1089fb9bc1c29185cb09f3c4226ee594b012,2023-11-07T04:21:31.343000 CVE-2023-43960,0,0,9436258b0be27800fafff316b46719607100f02382a5925bda03f182056bac68,2023-11-07T04:21:32.280000 CVE-2023-43961,0,0,d022a1326b47938450ca513431def271a90d142825dd394edf75f3be724de0cc,2023-11-01T16:16:14.943000 CVE-2023-4397,0,0,806c05c57b1f10660e4c63dcf9d9a34cfadf8928a75c42c7a5c8fcfbece74dfc,2023-12-04T18:05:04.100000 -CVE-2023-43971,0,0,bd02cd320c662dc80574cb8801b4bdb958c300106ecdfd89e2cc9ec89c8f8573,2024-07-18T12:28:43.707000 +CVE-2023-43971,0,1,fda77036a5308003e0fb24dd9b2100d6849512da904eaaca694a94bea0b31f4a,2024-07-18T12:28:43.707000 CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4442,2023-10-05T15:17:11.293000 CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000 CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000 @@ -237477,7 +237477,7 @@ CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edb CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000 CVE-2023-5078,0,0,df1630d406513e5e98f689a68136c5e13ac7072ff4d1809632880572b8c33161,2023-11-16T18:01:15.060000 CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000 -CVE-2023-50782,0,0,3700593098e2c9ce26782df2d092edb5938fce9b0983e474dcec622c04656511,2024-07-26T22:15:03.550000 +CVE-2023-50782,0,1,315916370f386a201b25a21080b7835087ab172a8af9bbdc447c4e22d9c155b1,2024-07-26T22:15:03.550000 CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000 CVE-2023-50784,0,0,310bd016f72a55e87952759915b2328751f88f7e5a355286cf6eeaceebb855b6,2023-12-26T03:15:08.927000 CVE-2023-50785,0,0,95069a7af58cd3ada76ed23cb42a6b26c34f9d8527e1cd720c0edc9a0997e9b2,2024-01-31T19:16:46.520000 @@ -237607,7 +237607,7 @@ CVE-2023-50950,0,0,44d9f6fce0df4c0cb249dd6910d6c5f827d41fa95ee4793fa82fc6cd0bdbd CVE-2023-50951,0,0,f6602a94bee5ac370ebd327ee71099d1d7184ed6e0d0e6b8d7894abc3d65ab08,2024-02-20T19:50:53.960000 CVE-2023-50952,0,0,a42bfb9eb2ec7c3f0ba7edf0dc6ed3e721be6a8d276393fcea326ad1cdea6eda,2024-07-31T19:34:52.883000 CVE-2023-50953,0,0,52036d7752aac445cbb090aea392f5f16e3dcdb55ed4b88e406bc96e30a1871f,2024-07-31T19:13:21.947000 -CVE-2023-50954,0,0,03e5c9c632759f06d0045591a0608fa87031762cf88a1b42fbb995d9ab529ae8,2024-07-01T12:37:24.220000 +CVE-2023-50954,0,1,343ac1e04ff20000b81409c9ec3032fb90f700b0c31082d18341edf6fa531fa6,2024-07-01T12:37:24.220000 CVE-2023-50955,0,0,cb43484caa0d365611ce717b8ab9c294998eddcf699afed606cd6871f7a3627e,2024-02-22T19:07:27.197000 CVE-2023-50957,0,0,2afed176927569fa17df9b690207f86f15723fa616f6bf3a39224dbb3a2fe550,2024-02-15T04:37:53.297000 CVE-2023-50959,0,0,548130eb58aed1c2c003b7ce8a5bcf3c2c3f04edc69dd49d513dcce2ff15616d,2024-04-02T17:56:18.897000 @@ -238421,7 +238421,7 @@ CVE-2023-52173,0,0,29481ff06e404451ee3dd102106da1def81bf8225ffdd4a8fc6fbebd81f51 CVE-2023-52174,0,0,ed5c6483ba36e47f6bf0a02784a6ad7c0d4a5a4f7c5aa8de5e885c167157b88a,2024-01-04T23:35:08.563000 CVE-2023-52175,0,0,ce7e2c4f9095c6f22260967a51bc4c7b04ad11f08ab1c0fae9cd95192cb663d3,2024-02-06T20:46:18.473000 CVE-2023-52176,0,0,5d1349960e00810e264a893f0f8c2ba7f1cba1976191536aa3e0c74bbfe93f11,2024-06-04T16:57:41.053000 -CVE-2023-52177,0,0,8e7f6824f99392675a0adefdf10fe66cb8d612771baa811d510a1f7e58845036,2024-07-18T19:54:16.287000 +CVE-2023-52177,0,1,e57e5efe439745b9b970854158571a4b92e4db71a2020941a4d42c14f6e5af76,2024-07-18T19:54:16.287000 CVE-2023-52178,0,0,be96dd3ef6190c169fef1d5762e1b15205836b1bfe9c4c0989d312b44ec7bfad,2024-01-11T14:17:42.607000 CVE-2023-52179,0,0,f0f540f0194d2882e5360a95cb9056f305903ffe5c8df94993073b68a0937afd,2024-06-11T13:54:12.057000 CVE-2023-5218,0,0,11fdcc6eaff8985a9ee1c73924d5a36b97ee4067b17070cd96377e4f87ca530e,2024-01-31T17:15:18.423000 @@ -239111,7 +239111,7 @@ CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b7 CVE-2023-52884,0,0,bbf325b5c1ed57a9d1f4ab6303e0df9c8a8b60b96f00c7266f34fe596a2f1382,2024-06-21T11:22:01.687000 CVE-2023-52885,0,0,e5c658cfc56d45f1e026b5e9d3b2354382c669c4a8a58f5c853288778028aada,2024-07-15T13:00:34.853000 CVE-2023-52886,0,0,99e5616b05810a67fbbeb83e14605ae0bcc6396fe4a66dbd84bd39d8703d92a9,2024-07-16T13:43:58.773000 -CVE-2023-52887,0,0,cc5f187e0aa0340440dfe6b878cebe9396819c0bf7ebb9ce657b145ebb84b3ea,2024-07-29T16:21:52.517000 +CVE-2023-52887,0,1,cb846ee4e76e369153e430accd03bef53983c1edb90492817231cbcbd98213a5,2024-07-29T16:21:52.517000 CVE-2023-52888,0,0,22b49aaad0de331d634875ed02b1dd2b64a739107c93a24ad94d1777a415da3c,2024-07-30T13:32:45.943000 CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000 CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000 @@ -241615,7 +241615,7 @@ CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000 CVE-2024-0855,0,0,d6a852138d81a2f1a5b951678ed9f076f0450cdd1094ad4d8554eefd8ccce592,2024-02-27T14:20:06.637000 CVE-2024-0856,0,0,35186061175bf94a789875417a754a8a320463b5a7778dc33b67b00319a2bfe4,2024-03-20T13:00:16.367000 -CVE-2024-0857,0,0,e2bacc26563e7c7b92879dac07a37ffacd002e5424c8573d2399e6b031c4f1b1,2024-07-22T09:15:04.457000 +CVE-2024-0857,0,1,eb17afdc7dc1bf92b321f990519fddd6b2895b42e203d3876b1bb54222e90b64,2024-07-22T09:15:04.457000 CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000 CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000 CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000 @@ -242414,7 +242414,7 @@ CVE-2024-1720,0,0,5f5ab364680f73fe36cdeef9e6784cd2a2ccddac9910224dc8b02d12bed9bd CVE-2024-1721,0,0,eb5f51f53eea8230bc7c9cfdc8a49e9ff2dfc7003ac468e860d0250fb679c030,2024-05-21T16:53:56.550000 CVE-2024-1722,0,0,42b1784fafcdd32cd3de080a0db388e459b3fea8e17fa87d175294bba4e974fc,2024-02-29T13:49:29.390000 CVE-2024-1723,0,0,94af9097193d9313a869e27fb9b3b59f6506dae8c000210c296f13f3a745bbf6,2024-03-13T18:15:58.530000 -CVE-2024-1724,0,0,aecc485835e530e353232a271b5406e7bdeece6f7170742bc79dfb7b2b41d581,2024-07-26T12:38:41.683000 +CVE-2024-1724,0,1,fa598366cfbac408db40cce2a320cfb2a50a5d77085bbb89d8a483d6c7624a87,2024-07-26T12:38:41.683000 CVE-2024-1725,0,0,0ee3e786fc3a6bde6a8ff18d77d971ec6a662811131e618f86487e4ea98156f8,2024-05-08T02:15:09.067000 CVE-2024-1726,0,0,bc2267887b9a57c4c91a15f093198e5713873bada3d866b94302e1c02f97e158,2024-04-25T17:24:59.967000 CVE-2024-1727,0,0,3ffad474a6b8688c8928b9908a66b725cdd6c054eaeb3d886c89c54b8393df58,2024-04-16T12:15:09.843000 @@ -242760,9 +242760,9 @@ CVE-2024-2008,0,0,9a3dfffdf84cbaecec5e4ac83fc5a2438eae99d0d114b1045bad131ec57012 CVE-2024-20080,0,0,90f248eed6a75fce7971996f28983ff9968e454d013e84d03f8b65c25bdd5601,2024-08-01T13:46:18.790000 CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 -CVE-2024-2011,0,0,272771111cefc333003471d127119de63334f3a19776f05f1d2885aa0ec12744,2024-06-13T18:36:45.417000 -CVE-2024-2012,0,0,29c87680e63b7e6463886f7f07bded97f3a282dcf37152246017c3016545605c,2024-06-13T18:36:45.417000 -CVE-2024-2013,0,0,aefc6eb68e306e4a20fc38a6af2d431b70230e994324d4a86b2abf95d7edda9a,2024-06-13T18:36:45.417000 +CVE-2024-2011,0,1,b92ed21b7a38ae037309fc5e23b3d331b9bad1dd1ccabe85871093b84aa070ec,2024-06-13T18:36:45.417000 +CVE-2024-2012,0,1,a768dd8feced7d799b02ec4f8dc178d2ff6751001567de726b2da481cde0069d,2024-06-13T18:36:45.417000 +CVE-2024-2013,0,1,990cfd3611b195ea1cff38f0ab2708015211bf75b29e43894d46ae4cb1aa9395,2024-06-13T18:36:45.417000 CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000 CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000 @@ -243252,7 +243252,7 @@ CVE-2024-20976,0,0,bc3be754979df29ad2734e39539476067aeea86a9848c06e4019a8d85fa64 CVE-2024-20977,0,0,3be8e35326984bf735a6f48b20180da3c518283b741d291831fba90f42ec9c9f,2024-02-02T17:24:20.210000 CVE-2024-20978,0,0,7d695c16c538753b41958698ebecaeec17620ace692b6d6e92b6bcee0dbccbeb,2024-03-01T23:19:21.650000 CVE-2024-20979,0,0,d57b35e6e7dde3fdff99cf29258a92afa9b590a25cc9c2305fb3a5b7f5bc7a9e,2024-01-20T18:30:34.090000 -CVE-2024-2098,0,0,4f92c0a0fff46cc92f0e70b4778419d8327e16f10b8a665f59763cd35f5a3261,2024-06-13T18:36:09.010000 +CVE-2024-2098,0,1,796ed6f6c420691b7d2e05f9f2ef2be6fc42adb0713e4dfd37258c395c790683,2024-06-13T18:36:09.010000 CVE-2024-20980,0,0,e0c7326a81da5eb88b4a32a231825326ef9bfdf0af46e0bb7cbce60b252d1f71,2024-02-20T19:50:53.960000 CVE-2024-20981,0,0,738d5bf858a7d236d8ca36c0f60d69759a2053056726d2d11c77fa47893de0b7,2024-02-02T17:24:34.507000 CVE-2024-20982,0,0,bcf38b819bc708c7b5775a8533315b44b098205319746fd8595275a2d7358785,2024-02-20T19:50:53.960000 @@ -243483,12 +243483,12 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 -CVE-2024-21303,0,0,da7d214c3e8114c9db9b415d9c17ea97e21be2d74542b4914bc49b904f40146e,2024-07-09T18:18:38.713000 +CVE-2024-21303,0,1,d58ef53ce2250cc88ff41c4958354d161d0e089fca6702a30570cf750b5a8215,2024-07-09T18:18:38.713000 CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000 CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000 CVE-2024-21306,0,0,8ecf79039d30017bccc819533fe3e339a20bc64fe56aa3e603969ca1cd4421c2,2024-06-11T15:15:58.640000 CVE-2024-21307,0,0,5c37ef66defdf8708bfd0f578ea195407a0793592c90ee13dd5a7afdc8687d5a,2024-05-29T00:15:16.713000 -CVE-2024-21308,0,0,14ee6a973050c3983fa3f345a57d75ea81906c3c510e8eb6aea8fc166ad812ec,2024-07-09T18:18:38.713000 +CVE-2024-21308,0,1,a7004c37719ff59f2f0d84440593e6510973cdfbda3f844f771ace0dee5c092d,2024-07-09T18:18:38.713000 CVE-2024-21309,0,0,e42de9b10ccc4cb172b4eb001a1906bad68e5c01f7f4e95caadbd6b48108b5f0,2024-05-29T00:15:16.833000 CVE-2024-2131,0,0,1cb34f9d56ec47ef042f3c821793e28b992c0aa97bebd17cebc35d75ef97e21d,2024-03-25T01:51:01.223000 CVE-2024-21310,0,0,4d9491aad8c4981a0e612e0b44a97454aec3903d3f3c0f6171a0f5a3dd0a9019,2024-05-29T00:15:16.957000 @@ -243498,7 +243498,7 @@ CVE-2024-21313,0,0,84d74bba1d9df7b2f90f14577b9a3a7c58e931843118784d67b2917662697 CVE-2024-21314,0,0,6930b57ece6bc92a908dde5d5920ba925f7e2ed0150ccc58bef0688fccd61155,2024-05-29T00:15:17.750000 CVE-2024-21315,0,0,67a5da33824ecd778f27844365bb36405f00090897685ced69c183058c104553,2024-05-29T00:15:17.893000 CVE-2024-21316,0,0,69af01c31576e26bce13811f71d6458a4139371f21cabf6e3162568d3dc981cd,2024-05-29T00:15:18.863000 -CVE-2024-21317,0,0,acaa4a95e126ae8c60d250e226b7a61e625b91e23b509f4aaee63cccd077503d,2024-07-09T18:18:38.713000 +CVE-2024-21317,0,1,9a47457ab01fa8e1e2830e4f468779b9aa225518acb5c615f8e6b11aaf08f4fe,2024-07-09T18:18:38.713000 CVE-2024-21318,0,0,4af76d6077d85cc6ac1b2e5fbbea392e5599de7981dc9d0bbea11cee80660ef7,2024-05-29T00:15:18.993000 CVE-2024-21319,0,0,a45f0ade862ff8aa7d45c69afb58ce07a8fc07a6b33b2d3562e36e6b68b9d714,2024-05-29T00:15:19.120000 CVE-2024-2132,0,0,9c9f85003a3bbe664082841aaa6842fc8427ec33d1f793f142740721a6f1bc65,2024-04-08T18:48:40.217000 @@ -243513,11 +243513,11 @@ CVE-2024-21328,0,0,ec8ea77195417e01f0c5006ef3a7f5f40b514106ee683eeea840dec181be1 CVE-2024-21329,0,0,df27e6f737cc5792d26c253424b1e83f8241581e4d6d1416fbc0d75a821d3e96,2024-05-29T00:15:19.753000 CVE-2024-2133,0,0,87c0e2076e8b815d57e7bbf3d4679907e441152b8657c1811eef0fcb4829965a,2024-05-17T02:38:03.570000 CVE-2024-21330,0,0,b2ac5d60b9bce9457d738f60e3ac9bb05697d436bd7be2810a9e1f7c3a676952,2024-05-29T00:15:20.273000 -CVE-2024-21331,0,0,29a98b004a64c1a6b898bd6e07dd38a95ace5850926fccee136365f7336fae05,2024-07-09T18:18:38.713000 -CVE-2024-21332,0,0,49e9e1f394bcc6face8250ba1baadebf487179b543d20330e58100528051675d,2024-07-09T18:18:38.713000 -CVE-2024-21333,0,0,dc4602055869f3aeababa4ff2ffd97ee5d054eb8a306a400798c94ad7d67b315,2024-07-09T18:18:38.713000 +CVE-2024-21331,0,1,92cd30ae764b239f28c0a8df0c95713f1cf63a2fae07aa40ae29b0b0ea46cc37,2024-07-09T18:18:38.713000 +CVE-2024-21332,0,1,e26f081e210bc97138c2c24c4864fe4562659ce63b5b575f0c0fb25cc97812b8,2024-07-09T18:18:38.713000 +CVE-2024-21333,0,1,32851108840c7a13c1ee82ea16c50177907e4bcd2e482894344fc3874564fc20,2024-07-09T18:18:38.713000 CVE-2024-21334,0,0,bb98735e0397eef282b3bf0c8a7f17fd1a894c0580516f67c50b6ae552edb8b3,2024-05-29T00:15:20.560000 -CVE-2024-21335,0,0,924f59f61e372780e4a9ef4b3956bd444943b3c0000bb673ac959c0073dcd1ce,2024-07-09T18:18:38.713000 +CVE-2024-21335,0,1,d3be0da75c93e40dc74ef43532ac464e7457c464e235cbe682e70d325b6a979e,2024-07-09T18:18:38.713000 CVE-2024-21336,0,0,4632192569ed60af4d57d1dd58a5b140d682aa1d82fc677d5ec51bcb39be3541,2024-06-11T15:15:59.553000 CVE-2024-21337,0,0,1ed4e9ec6936be258d1de771e0acb5830541ca48fb0a246032f3c3930147d134,2024-05-29T00:15:20.793000 CVE-2024-21338,0,0,fd09b67b390ff51b24709344b010f1522c3f6eaaa3f2afc97b3b0eb7c2e85567,2024-06-10T15:42:53.913000 @@ -243559,7 +243559,7 @@ CVE-2024-2137,0,0,9c4ef8a8c32b87435f5bffc368e49d1dc753fac53333758287821e563e4e59 CVE-2024-21370,0,0,56dafef82f20d4e4ca60de57b7e0adb637453884d8206fe278bd071ff00495c9,2024-05-29T00:15:29.847000 CVE-2024-21371,0,0,72010fd0375709bb18940ba3cd1d81d2ea1d21ad98890d457f42e34516be3e96,2024-05-29T00:15:30.020000 CVE-2024-21372,0,0,dc3849c825062f20d923dddf483254c2ba79f04a7b48a0a29c7a6a3b6e37ce22,2024-05-29T00:15:30.193000 -CVE-2024-21373,0,0,94250c010310ac468bd15dca95092db47240fef8eb1327e3e7e4f3c3a1361f76,2024-07-09T18:18:38.713000 +CVE-2024-21373,0,1,7de731645493de81ef67a1d3ccf92454e66cdabea61c40e547f5407246c0bf69,2024-07-09T18:18:38.713000 CVE-2024-21374,0,0,3571587478d0c95194c3763a86c8989f80736365da23f05f6a7b7a1c3f330163,2024-05-29T00:15:30.363000 CVE-2024-21375,0,0,7869503945aa76378caf346931136aaac5af63e3706963ea21782ff802e47367,2024-05-29T00:15:30.550000 CVE-2024-21376,0,0,a3ac67b4b0b20d67fd94b2e9c7cd672076b742bb02934fbeec928c6692785c50,2024-05-29T00:15:30.677000 @@ -243586,7 +243586,7 @@ CVE-2024-21394,0,0,aa75466b0aaf4d3ff3bbec78793ccbcfd1afc16c532cab8eae1991bcd2df2 CVE-2024-21395,0,0,e344e1d068e814165683c2d644d3dff647258b1ba561cb9b39845a1e1518a759,2024-05-29T00:15:32.827000 CVE-2024-21396,0,0,e40511257aaba7f130ac17106d6b1c7e0c33166cfbac3e05b617828c3cbeb2a9,2024-05-29T00:15:32.933000 CVE-2024-21397,0,0,b0ec241328054a214047be8b8375fba9ad1406b2a99b2fb228fd123085bb3212,2024-05-29T00:15:33.057000 -CVE-2024-21398,0,0,f9d715c43f38a307005642a59815c023f8ac80cb3f51ff2b73500986f48ab473,2024-07-09T18:18:38.713000 +CVE-2024-21398,0,1,c4c7d6f98e04a810853dfb263ff519362e5129031c36304acc0da85b748d5ae9,2024-07-09T18:18:38.713000 CVE-2024-21399,0,0,001820e0109335f5a2640c4a5189f5fe8ac80b4b4f2ff4d1526569f2ec1fd18f,2024-06-11T15:16:02.503000 CVE-2024-2140,0,0,f13df4d472ba646e6aac958170cf967e223db17be65b98ce4a37e6d44e80809a,2024-04-01T01:12:59.077000 CVE-2024-21400,0,0,da8277c9b07afba17ab7b2697668cebd1905952dc7d0b43230c5dd98b3c906f2,2024-04-11T20:15:29.170000 @@ -243604,8 +243604,8 @@ CVE-2024-21410,0,0,c8e90612f8b38e6b1f13375d68516f4b4a5a3386c3f385305f0005a7f45de CVE-2024-21411,0,0,e4762a6b8c68f949f9dbcca9e77f1e8e5511c352d40e6306cffb620bae6ab489,2024-06-11T16:15:17.890000 CVE-2024-21412,0,0,b6104bd728181cc6f1b23fea9e7b44e69f0920fbee86ae2aab644f60bbbd29e4,2024-06-11T15:16:02.980000 CVE-2024-21413,0,0,3ad86bc1ba52f2f459810626be1df924b2e3f20d0afe56f118b1051b273d3789,2024-05-29T00:15:34.720000 -CVE-2024-21414,0,0,9c66778280d7787cd644340c9b9e9e772e92ffd7aaf9e1461756fe9cc8d4ddf8,2024-07-09T18:18:38.713000 -CVE-2024-21415,0,0,8dce2349a4640c0f81e4346e660d38a20e235fcb13f36ba6d3ad5a506cd57ba0,2024-07-09T18:18:38.713000 +CVE-2024-21414,0,1,cb5be5a0298e388117cb17fb4e38b11bac4cf16d9158b5abf408d82cf361dfc1,2024-07-09T18:18:38.713000 +CVE-2024-21415,0,1,42bcd1202ef0ba594d559bd9441152ac5ae9644c270ba50531381a1aa41e9e3f,2024-07-09T18:18:38.713000 CVE-2024-21417,0,0,b49ef9a4a1641236078c066f567251303fbb25636e983b46ec501a6c4a0c9cb3,2024-07-11T13:05:54.930000 CVE-2024-21418,0,0,0f25c581a81e174a088bbd635450254be7b5c931f905496efb1385b8f25ccca1,2024-05-29T00:15:34.853000 CVE-2024-21419,0,0,e14cbf8653efa36d4d95c26c723d3b529d88b23a73e43ef96db6054f518ce906,2024-04-11T20:15:30.777000 @@ -243614,10 +243614,10 @@ CVE-2024-21420,0,0,2ea01e631d651401b9515b3d3a2402b54062f7c36e869d103a76323012ddb CVE-2024-21421,0,0,aa003351515fa6a13b090cbacd30e2c8bf4eb2017cb79e6a1063d808b3f7cdca,2024-03-12T17:46:17.273000 CVE-2024-21423,0,0,13dc0ecc7bfbb4f5b92a3170ab4cae2b8d2de511257aaf572933bffbc6f2ae09,2024-06-11T15:16:03.297000 CVE-2024-21424,0,0,77e44977e766588a59c87cb45706c3bfc2a9108d9dbf7fbc64f556e35f14f570,2024-04-10T13:24:00.070000 -CVE-2024-21425,0,0,57118e0779e3f58734a42fe33585c1ae4f1ae1293a15812f46ea2fb8bef9c106,2024-07-09T18:18:38.713000 +CVE-2024-21425,0,1,2812cfc5eff10f169d419b1ab02c34a9eddedbeb477ccb53ff000f9cf064044f,2024-07-09T18:18:38.713000 CVE-2024-21426,0,0,bf58e3ab2d0d8fef26a271d142d4ddbc32efd83cf1484da4e621fa84ad0ab648,2024-05-29T00:15:35.200000 CVE-2024-21427,0,0,a203f4e2c3489f685ae409b07ac750b7c17a3c0b573d7557437d389da21dae29,2024-04-11T20:15:31.130000 -CVE-2024-21428,0,0,ea2ffcbb4d280545891112304a032aadc97febf0c02dc8d6a3b043702dd8deb0,2024-07-09T18:18:38.713000 +CVE-2024-21428,0,1,d4326ce0e7de9ba79740916e4b692bd60f0e0e1e1ad6ad9543bd3e7e8895901a,2024-07-09T18:18:38.713000 CVE-2024-21429,0,0,f06428fbd106022c704fe75f56593c47f00c7769560ad8bf515561b79ff02e56,2024-04-11T20:15:31.223000 CVE-2024-2143,0,0,b4196c236271ea86599a9a6a71fa5d263ddeb4583a563a5493a42f4b531b62e8,2024-04-01T01:12:59.077000 CVE-2024-21430,0,0,e952ae4cf447cd295645cce29646bf9b8b37e88c4e9b315bafcb04dcaa54bf2e,2024-04-11T20:15:31.333000 @@ -243647,7 +243647,7 @@ CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e679 CVE-2024-21452,0,0,9f708d763548b34c7c49c3f0348df362d48fec38e955d6efb9dc3104c88d6865,2024-04-12T09:15:09.877000 CVE-2024-21453,0,0,da605aa15089d99be623e883beeca2f93e21f8fdda0997652a458a217ea7b701,2024-04-12T09:15:09.977000 CVE-2024-21454,0,0,bb3c6f4e967eb55a8c57e103a3dd8be0b010cb457fa764651101d90478af9307,2024-04-12T09:15:10.083000 -CVE-2024-21456,0,0,188d896355fea804c6aeaa951324d2da880a2436eaadfaaef54414434c70e91e,2024-07-01T16:37:39.040000 +CVE-2024-21456,0,1,bbc0c4fce4bb960a6cb325b48cf566c354dcfa91f1c2b80be65f27078b7ad1ea,2024-07-01T16:37:39.040000 CVE-2024-21457,0,0,0397b493f3a90fa8856b8c3877d0f328b647dc8423fd236ad4c3272a6eecd90f,2024-07-02T17:49:35.410000 CVE-2024-21458,0,0,f9498022a3fab8a9690b0ccfe79640e4fd1995291accc416b68050d29e4c1e40,2024-07-02T17:57:05.057000 CVE-2024-2146,0,0,07222f2c00876c864a76cc1aba64244679b8aa67131e6bb4ba2ce421b16cedae,2024-05-17T02:38:04.200000 @@ -243725,7 +243725,7 @@ CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d561063 CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000 CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000 CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740afc,2024-01-31T00:15:45.920000 -CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000 +CVE-2024-21586,0,1,5fd47a136b209c14901571ddda44bb414cf37a1b34e8ddd389219b5c2c79bf53,2024-07-18T12:15:02.647000 CVE-2024-21587,0,0,6fb74afc13eaed151f7dfc73f3405ccfaec4bc45b3ea2dc8ae59dadb238cb14a,2024-01-19T17:44:35.830000 CVE-2024-21589,0,0,bf8a565022261f069a66f4b01e754b7d699f349013c5b07db7616e20369d7f8b,2024-01-19T17:41:50.160000 CVE-2024-2159,0,0,1ffbabe39c0169d7c9b0e1bf51aed51f76764237e56b3a68db025efae83b9120,2024-04-26T12:58:17.720000 @@ -244276,7 +244276,7 @@ CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e289 CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000 CVE-2024-22331,0,0,d490fba89e7f88683c136dfcfc87c9cff8ad31b547c7cdf5425991357b2dcb7b,2024-02-13T20:26:23.780000 CVE-2024-22332,0,0,638d06450f89d191258df8fe36d1620abd0564acdb0d8f1f383caf127d6d43b9,2024-04-03T02:15:07.973000 -CVE-2024-22333,0,0,d35851d4b03c14cce5284485b4f2830471085a941916119a64981b5276d426f2,2024-06-13T18:35:19.777000 +CVE-2024-22333,0,1,84528ef2281e9dc96af01e3a4ea99c9a58b030566f78745c2f2d63c13ae91ed0,2024-06-13T18:35:19.777000 CVE-2024-22334,0,0,1951698d7ab1d55a1824ae76507a3577dbbe6facddaaf9272bcefe471309fc13,2024-04-15T13:15:51.577000 CVE-2024-22335,0,0,a452659277dfc0c00bbebf3f7fdbdbc10eb5e3a4586e5ce33a7b718b3f3008c7,2024-02-20T19:50:53.960000 CVE-2024-22336,0,0,34ed66b8b7f583d44759ce52a251db14fa1a95596195a1c1fd9558e86e073ccc,2024-02-20T19:50:53.960000 @@ -244898,7 +244898,7 @@ CVE-2024-2344,0,0,11b204885a38ce76288439d7d97d1d84c5464a602f99eb484aa99b808d016d CVE-2024-23440,0,0,888cd3d174129643abdafcbeddc64e6f21d5ae8e2b2e370f6f7b930a90b3e30a,2024-02-13T15:16:05.223000 CVE-2024-23441,0,0,390d5d2bcc3b1398b0150c0f0c98b785cb9627d9865bfc83ae73159a1a10f10c,2024-02-05T18:41:43.547000 CVE-2024-23442,0,0,443db8dbb1f8b987d963a7dd5d60c961dd33264e42510a9f3b5600fa33a14f9f,2024-06-17T12:42:04.623000 -CVE-2024-23443,0,0,39619cd9ac9d9c83b0ac7c9e7dc99ae54ae4def9a52df44cf7e3d4e8d6ff7018,2024-06-20T12:44:01.637000 +CVE-2024-23443,0,1,7d95a67e0c3c1e1a5340f946ebeeb4d125f6be507c70062fa5f629aaaad965b4,2024-06-20T12:44:01.637000 CVE-2024-23444,0,0,9d04c210297b8378296ccd9e937d21ef43ab4badaaad1c5feb386881ba03d55c,2024-08-01T12:42:36.933000 CVE-2024-23445,0,0,6c527df37925bfee88abbff37b4b4e377f6526ae267b170f8c243c193159d3f0,2024-06-13T18:36:09.010000 CVE-2024-23446,0,0,4d7124defa0cb48f303fd49a5701937ff8d343d7ed35efe26f93d719e40bd716,2024-02-14T20:10:24.323000 @@ -245136,7 +245136,7 @@ CVE-2024-23732,0,0,02703c2ad5218c00fbf227a383e9ac2f87b400985304eaa4f21127fe5bfed CVE-2024-23734,0,0,43927612b6ce5ac1d40a514f27b459d58ac129b1946513c8984f86634a0c6e7b,2024-04-10T19:49:51.183000 CVE-2024-23735,0,0,e340966d683de14f777fe6463a8b089f7ef5c4aa389a8fc7a1cf4f42fa19c09e,2024-04-10T19:49:51.183000 CVE-2024-23736,0,0,bcd223ae0db7879befee0415fb371b15c3be00a7450081b37507ddd44cb2eebb,2024-07-11T15:05:26.800000 -CVE-2024-23737,0,0,d4ffd6dd100fdc4a0d40bd51b5a0ee6bddac8cf5eac0ee6a0f29c8fa7350a5f1,2024-07-02T12:09:16.907000 +CVE-2024-23737,0,1,f7615a42ae78ac9996e0d8fa270b0c8ec56c7f3137d7aed02acfead14c7f84b1,2024-07-02T12:09:16.907000 CVE-2024-23738,0,0,c792a8c61de509a6b4c8710933e1e89c56da0b87e5c16dc5d6b30dffd8a63ebd,2024-08-01T23:15:47.553000 CVE-2024-23739,0,0,63d48f754f81b8e92c1f576c44d5a2721cbfda38f90bc8f3d75df23f4f024faf,2024-02-16T16:15:57.830000 CVE-2024-23740,0,0,9afaf78efbae07db9b872183e4f2721770190eb3e2c0001fcbfa810de3407a9e,2024-02-16T16:15:57.913000 @@ -245565,7 +245565,7 @@ CVE-2024-2454,0,0,aa2e42dd0f7f3fb6dd327d54b3ddb96859239f3cd7f3ec3259d3934a3a1351 CVE-2024-24543,0,0,6385de143d1b0b1fdcac1d167b2fcd059d27448a1d2af20c5a3fd2632900f66a,2024-02-14T17:13:32.827000 CVE-2024-24548,0,0,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000 CVE-2024-24549,0,0,f5a15fcd5d9acee072cefdba50b124ee1362445c36c6cff50be2ef6d7391ffe1,2024-06-23T09:15:11.213000 -CVE-2024-2455,0,0,15ee0ca57fb9ce702dc416f9f02c53951db71b7c20833783ef63d24f22155379,2024-08-01T14:04:01.833000 +CVE-2024-2455,0,1,3cc0f9fdc9468fb27389ba133379c86897b93cf96dc0807e412017bc8c64c264,2024-08-01T14:04:01.833000 CVE-2024-24550,0,0,91eff862acdcc27750c50b47ce447c3c9c3416434f24687f7378afff1f649bd4,2024-06-24T12:57:36.513000 CVE-2024-24551,0,0,41b8feea4c57aca430d02394b62e3944b862a79d0fb8a08429e306b869ff2908,2024-06-24T12:57:36.513000 CVE-2024-24552,0,0,a32dccf302bfc20ba754a253e224014a80e60749cb89e80f2c2957456d9e5ec1,2024-06-24T12:57:36.513000 @@ -245929,7 +245929,7 @@ CVE-2024-25047,0,0,4c11cca69210df187d3d55946724d29d5309ab7fc9a625e0bee1e1a8c96bb CVE-2024-25048,0,0,bc6964b7f687527cd9ffc79ae43e58050f5389bfb32054b48fecbb893305d870,2024-04-29T12:42:03.667000 CVE-2024-2505,0,0,47f3647a7f39a1a6bf9463d8b64e750951935a282bf349e6bd3af724e0fc071f,2024-07-03T01:53:18.567000 CVE-2024-25050,0,0,d5d181004f268714b493a10c14feb81e896885032543e22a22845d80857ca7a2,2024-04-29T12:42:03.667000 -CVE-2024-25052,0,0,9ad56251de4ec2b00a09ab89566cb8b7aeaa074b9cff0f8f58f535b4811f69b7,2024-06-13T18:35:19.777000 +CVE-2024-25052,0,1,dfe2b56418765338e9f41d15c7a6152cd3b82a2ef96d9de216d765757536b3f4,2024-06-13T18:35:19.777000 CVE-2024-25053,0,0,bd2f50030a56237ce3f5542962fb4603a34eaecf93dbe5e7f45fae23c268ba64,2024-08-01T18:20:26.953000 CVE-2024-2506,0,0,15dd0df7d24982aa8873038946323f95997c7b00b2d6d9bd63a3fcec8bcb10cd,2024-06-03T14:46:24.250000 CVE-2024-25062,0,0,f334bb7c1c336f02d7c42dce33207039f2135e2e4fa4b3a05e323a37b1f98d3a,2024-02-13T00:40:40.503000 @@ -247572,7 +247572,7 @@ CVE-2024-27179,0,0,85f9bd060c25072746b1e3bfaefabaa31cf907d9fa1300683bdfc57bd5ce2 CVE-2024-2718,0,0,e867b4db92934c4ec2b3fac03d5022cd051733038b4330c7ca5ad40b77757de0,2024-05-17T02:38:27.407000 CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431d16,2024-07-04T05:15:15.450000 CVE-2024-27181,0,0,21e26148840b13fc3c6737fbae62d8da3122fe005206d34756c4a69e36306e68,2024-08-02T14:35:10.763000 -CVE-2024-27182,0,0,59c9fadda2e94d929ac74a54d491b0c1e9c5d366e9160345e23fbd40ccae4103,2024-08-02T12:59:43.990000 +CVE-2024-27182,0,1,ce412bcff2b9c7110a2b759fc053bec2d3578e8e3e218da80159f8ef3b0ffed3,2024-08-02T12:59:43.990000 CVE-2024-27183,0,0,73875a696a64d9ddbd95175557e5ab869a14de50e9906db42e11184efe06e929,2024-07-12T17:13:30.700000 CVE-2024-27188,0,0,def19a2058b71e528abca5da80971f2d008d715cb853d3ea2c84141e42391a01,2024-03-27T12:29:30.307000 CVE-2024-27189,0,0,994d0c9d134383fa54dc85b5fd282a40acff54c3ff303ac4e31ff6be7de68f0c,2024-03-15T16:26:49.320000 @@ -248186,7 +248186,7 @@ CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 CVE-2024-28020,0,0,2375ef98ce8769f1ee6408c6bebcbef990543e738c9849476b7b59656001a147,2024-06-13T18:36:09.013000 -CVE-2024-28021,0,0,6c237fde8337b58abbc6472d9145462f4b01ffbacd86e057c7a00ddde49d16cf,2024-06-13T18:36:45.417000 +CVE-2024-28021,0,1,0ff26efab74f3ecf1eaea2effe93bf3a16e8ed8c464b480618e8617211df2a2d,2024-06-13T18:36:45.417000 CVE-2024-28022,0,0,1c1b411aa18aaf6f02b7017dfa6c21da9fce848904faa83d97dfcad4e0dbe10c,2024-06-13T18:36:09.013000 CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000 CVE-2024-28024,0,0,d58cb732d1bad72c4f4b12473f98520a1476ef8b05d36ceafc46457b7613a85f,2024-06-13T18:36:09.013000 @@ -248296,7 +248296,7 @@ CVE-2024-28160,0,0,241bfdb3674a34e6849fc0ad74b8b7e2c84a649745fec71e6a1d767d5a523 CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000 CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000 CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000 -CVE-2024-28164,0,0,56d93e23fdc0fca22d94e71079eb5167d13aa30307cd66d15150bc7cb86455a9,2024-06-11T13:54:12.057000 +CVE-2024-28164,0,1,06907c7bf1f301bbf3f48ef790bf7c4ec7f60daadc81dedfce941565f6b73ed0,2024-06-11T13:54:12.057000 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000 CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000 @@ -248592,7 +248592,7 @@ CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed CVE-2024-2876,0,0,96b96473aca77aa576cfbfd4fdd62bd6bbdb12d76f0bee3d312855d2e34a9cd3,2024-05-02T18:00:37.360000 CVE-2024-28760,0,0,cfc181c91eb6ebd155d194c850e8868e89a57828c5afbba56fac4c614045a19d,2024-05-14T16:13:02.773000 CVE-2024-28761,0,0,1598d9c2eee2b826eb7bc7234a2f0a152b27bbbe0fa8d271b9231b5137410922,2024-05-14T16:13:02.773000 -CVE-2024-28762,0,0,2b74775adf8f2e04577ce01a161565bb2636c8ecd701c9ec612fbff0cd2c152c,2024-06-13T18:36:09.010000 +CVE-2024-28762,0,1,cf12ece749571795111a5da405dfbbb5e02faaef7636bf352152e25575600b66,2024-06-13T18:36:09.010000 CVE-2024-28764,0,0,5a2a0938bbb4f693f69f0c82b8e2ca758cba68255eb4750803702115444076e3,2024-05-01T19:50:25.633000 CVE-2024-2877,0,0,9c132cce53a6b6a85505c31c6786c7f118915faeb72f4167fb6e574e48e7a4f7,2024-06-14T13:15:51.473000 CVE-2024-28772,0,0,68779989c69da808fbc42ce3de2c50cd4d1b6c4fe004dc710b2b076be8470ffa,2024-08-02T19:52:32.657000 @@ -248604,7 +248604,7 @@ CVE-2024-28787,0,0,ae2fe056558612ea54f7786b2749d8c7eb4b79c4855a2500ae63276f0936f CVE-2024-2879,0,0,dbdb53723be18fbee30aefddb98b892cc05662454ff0dc284d9d7d7d767dab47,2024-04-08T22:49:41.533000 CVE-2024-28793,0,0,7d414f92d43f30000a62dc37a0c80fadf87a5ffc630bb3c26c9945f0e8b7cdb0,2024-06-10T18:15:29.983000 CVE-2024-28794,0,0,c10da1b41da7071b80498b87abd9d687769c0fa94b037b7ebb3faa4084e98fd8,2024-07-31T16:45:28.247000 -CVE-2024-28795,0,0,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000 +CVE-2024-28795,0,1,925632b730be7fc60b182fff4d5d02866b4010bddb97677013338fd3a6f87507,2024-07-01T12:37:24.220000 CVE-2024-28796,0,0,9309b95ff28ad61ded45c96b0ce61eb28e84237793000fa8c06bf713a7309924,2024-07-18T12:28:43.707000 CVE-2024-28797,0,0,215c6e5211c115cb8a1dd99529c7ef7d500087d4643915a223453edd582d1174,2024-07-31T18:57:00.313000 CVE-2024-28798,0,0,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a524813c1,2024-07-31T19:33:56.337000 @@ -248706,7 +248706,7 @@ CVE-2024-28924,0,0,38fc1108a3de63879f035f09b242597087d059e94c1c50f3a8c5ef8eab919 CVE-2024-28925,0,0,1edda849705171ca964d2102bb3299d89c2942ca7304f3437e60a4a0dd3bd6e2,2024-04-10T13:24:00.070000 CVE-2024-28926,0,0,6bfacd965f60772f724d6700ed5e0b1ef1b3b6f780ad5bbef3cd3cd8476a3f2d,2024-04-10T13:24:00.070000 CVE-2024-28927,0,0,caea45a62e6f4db1988f69c8e7b00259c640c3809101776c49592dc31fa8ac7c,2024-04-10T13:24:00.070000 -CVE-2024-28928,0,0,2c0b504f9404bea7d358ab4673cc24504077ab49fde013a7aedcf54340d89ed7,2024-07-09T18:18:38.713000 +CVE-2024-28928,0,1,1c49857a7a47d7fbd6fb384ddaa6f84c5d21f03d6e0d85e6d695d2825e77174e,2024-07-09T18:18:38.713000 CVE-2024-28929,0,0,f0e98cfb5035f7ff5b44dc1e1a94afca59ed588bb9fa2736d19ab8c41a6b4e7e,2024-04-10T13:24:00.070000 CVE-2024-2893,0,0,e5c7eb9d06f3cdffe593d3541f7077bf0dfd6c09acc403e44ef19095d5f91ed3,2024-05-17T02:38:35.643000 CVE-2024-28930,0,0,db5b07fd30f75e21d467db8b159ad1023d6323de167567a61751560b81949f95,2024-04-10T13:24:00.070000 @@ -248734,12 +248734,12 @@ CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669 CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000 CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000 CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000 -CVE-2024-28964,0,0,f78001d74157b34fca8e03019f1e765ba2f5f76f771c0f9662cd4b06d1fe2773,2024-06-13T18:36:09.010000 -CVE-2024-28965,0,0,132bb9232b31f80efd4df67d5ab9337fab01778a84a368161d586fdefa73aa1a,2024-06-13T18:35:19.777000 -CVE-2024-28966,0,0,de2aa5cbaf1ba48c7ed84229150007b0bef48562997553c583a700734649d8f0,2024-06-13T18:35:19.777000 -CVE-2024-28967,0,0,930254365af4426beb61585ac0d053d7b94ea8c30d01eb72fe2ef952d58cb5a2,2024-06-13T18:35:19.777000 -CVE-2024-28968,0,0,b87929bba8da7b41a26562be15e29069d59c24ea067b365116b016a656a52fbd,2024-06-13T18:35:19.777000 -CVE-2024-28969,0,0,9aaf419f4a0f5578c1d360d21c88466bed088175329d02d5a4c08af5237b8c6d,2024-06-13T18:35:19.777000 +CVE-2024-28964,0,1,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000 +CVE-2024-28965,0,1,243304e77cbab7b4dbd33d38f2ed62543001dbffc348c59ebe507f143c414797,2024-06-13T18:35:19.777000 +CVE-2024-28966,0,1,8059850616658d5aecd85c5acbb6e9fab83060203b9180efea1ed79e9b6eb6e9,2024-06-13T18:35:19.777000 +CVE-2024-28967,0,1,f82472d0d6ace09131f709b8677ef2634ebabe0528f1e1608bf5e5e0608a7892,2024-06-13T18:35:19.777000 +CVE-2024-28968,0,1,afd86c5938eaf343cace2f8a60ccda5c8d44b9ee09c340c5ed37fc9c3a0af5c7,2024-06-13T18:35:19.777000 +CVE-2024-28969,0,1,7965757118d16671631493f0e1618e098ee64e46d6b8eddeab326e54299a1377,2024-06-13T18:35:19.777000 CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e0276563a,2024-06-04T19:19:19.267000 CVE-2024-28970,0,0,e8f11977500005486cf7671144dacf7215de23ccf91b6c8eb182a0c1c61d7f56,2024-06-13T18:36:09.013000 CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000 @@ -248756,7 +248756,7 @@ CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000 CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 CVE-2024-28992,0,0,f9c05c045935065b7fb107f1b586c585fb9b30e3a693206f28b101917f2c3d3e,2024-07-18T12:28:43.707000 -CVE-2024-28993,0,0,43886e4a719d1a16e6761a87b2801a58d931e0372987975bef0c24839811278c,2024-07-18T12:28:43.707000 +CVE-2024-28993,0,1,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000 CVE-2024-28995,0,0,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000 CVE-2024-28996,0,0,09468fc42886d2b9d5b470ae44f5a5cbca16443960a600683fb24e9570dc922c,2024-06-06T16:23:24.377000 CVE-2024-28999,0,0,768d1b3fe866566c9082c710789c8fcaa529e82f91bdfdec236693dabe93837d,2024-06-06T19:06:50.923000 @@ -248826,8 +248826,8 @@ CVE-2024-29062,0,0,fd7e4b3c77dd4d50570502e9a76290b7938f32ddd5cdd5d39cf2ed3ca2452 CVE-2024-29063,0,0,a8033ce9e699f35cb65dc8d63268bfdd99aa16f594ad08413d90e8003a22bf2e,2024-04-10T13:24:00.070000 CVE-2024-29064,0,0,88daf3a7de89b464600feb0ee044529e05b02bc2ba2ebf4683d236ef22e3a252,2024-04-10T13:24:00.070000 CVE-2024-29066,0,0,b57916d53c87b911e1996a4619a92f6e3a854e8931117c8efeb51360c73379e4,2024-04-10T13:24:00.070000 -CVE-2024-29068,0,0,e1dad172506bd4e95fa906ae43c52d8079d3c46d4ec490bee2c31e2d7d0fe25e,2024-07-26T12:38:41.683000 -CVE-2024-29069,0,0,1df4f123351673aa60d0db19441304a02c0eca550c10d5fc159c9066c876ecbc,2024-07-26T12:38:41.683000 +CVE-2024-29068,0,1,568b0ffa997a4e799b069b40b46be8256e93d9bd51c09263586c117d65df6c6a,2024-07-26T12:38:41.683000 +CVE-2024-29069,0,1,602e52bb9b472e6eb373cac762fb4a5be1b87b6c7165c60340c95c9623c49c7a,2024-07-26T12:38:41.683000 CVE-2024-2907,0,0,d38c3c5afe0996ef7d2afec58183dacb85dd11333a5da96f4ee973a2358a84d8,2024-08-01T13:49:56.797000 CVE-2024-29070,0,0,7e70b47539b534ac42449ef773f3a05c674c51a40e15b8addbcf7c05c21a85a1,2024-08-01T13:49:24.570000 CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000 @@ -248917,7 +248917,7 @@ CVE-2024-29164,0,0,0241c9be23a80d6ab3dceadfce1b9b19b6d47bdd0ac74b2f2c9ae593533e3 CVE-2024-29165,0,0,3c479a3372b122f69415807cf18990c87c6bdd2637a3e4ef28a1d60fed2086fd,2024-07-03T01:52:13.840000 CVE-2024-29166,0,0,725e6e590aa1d0d5293ed901f6d18ab0cb031637e03d15f947737ac3607357bd,2024-05-14T16:13:02.773000 CVE-2024-29167,0,0,8c037b42f45551faa2e5b6ebfa5f5568baba75ac04a9563d88f1a9c7edd265df,2024-08-02T01:15:57.060000 -CVE-2024-29168,0,0,4757a63897839b750c96114065020383f9f8ce7b203912f079b4ee320e300287,2024-06-13T18:35:19.777000 +CVE-2024-29168,0,1,88c624028af14d68c4e80c287e5c8eaefd6de289ac49c1f565f6c1aa13335d5d,2024-06-13T18:35:19.777000 CVE-2024-29169,0,0,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000 CVE-2024-2917,0,0,bce749de88c117bab31f2480bda989ec4febf4f1b6cd352875ee070fe63e4914,2024-05-17T02:38:37.297000 CVE-2024-29170,0,0,b197fa7a7096d94d37c613ba2c6a7ee9897dd072a00f8dfa13a38fc4064e100a,2024-06-04T16:57:41.053000 @@ -249379,7 +249379,7 @@ CVE-2024-29973,0,0,dce7b6fc2379041367d9194a4d489f2740a4e7f8a4fc50009d6741db67b41 CVE-2024-29974,0,0,95c960f3663ca805207b0282e4dd55b7db41b4855a5d3cd2356d3cbb0de9e78f,2024-08-02T02:15:17.627000 CVE-2024-29975,0,0,dd90f52c857658c1e55bb6a9eabcbfa685a04e70242168e88b92597613e79ebb,2024-08-02T02:15:17.723000 CVE-2024-29976,0,0,2e76e5f749f89d166e8f60e11fac3f53e046bc0b5b2bd2c0bb26a6cb79b733c7,2024-08-02T02:15:17.820000 -CVE-2024-29977,0,0,4af729810365e1ee8975035ec66622ed32f278ef750289fa9635f9978cf83bdd,2024-08-01T16:45:25.400000 +CVE-2024-29977,0,1,624fd4e7e1bb4b9d0e9df7a23e917a8f83f968c90f55b5d4b8782c2ddf9f8aa4,2024-08-01T16:45:25.400000 CVE-2024-2998,0,0,529e4d63a60fb43eff1450ddb35e7521c436b06357cd9f933bf7536e9ff53bd8,2024-05-17T02:38:41.883000 CVE-2024-29981,0,0,87a31a61cdf81b98bbc6bd8e79883f9fedc6f421fdbf6cfb239f24353327db62,2024-05-28T23:15:17.270000 CVE-2024-29982,0,0,2b0e311c693a5c01164acb4d684911085c875bf98c0b51fd697730431b87aa78,2024-04-10T13:24:00.070000 @@ -249462,7 +249462,7 @@ CVE-2024-30053,0,0,c1b00e8a2e45d39778d41ed44bce8cd343672ededb3a7201678d37ea0c9af CVE-2024-30054,0,0,4dde3cd5f0020ff99cbe06936615da565bc5eb9ab23b0ade4593c19aaa73d864,2024-05-14T19:17:55.627000 CVE-2024-30055,0,0,23d89decd4d1b6e2329043e8fdc048fb61291ac54cafb142af02fcb273d540b8,2024-05-15T20:15:11.047000 CVE-2024-30056,0,0,e4c2a56fdf90502d5af53126fa036af6d2482c1db80e32403c54bfa86ebe65b5,2024-05-28T12:39:42.673000 -CVE-2024-30057,0,0,15137c445682b161af5a6d441819713666201bda761502f3d1447307ca64faf3,2024-06-26T18:15:12.910000 +CVE-2024-30057,0,1,e99dcd5cb03521b546c7c2e366c6c78ca95dfeb27660a5a904f9077117a14be5,2024-06-26T18:15:12.910000 CVE-2024-30058,0,0,a1a511e081de1359a5c8e8dfcd73ce56d4990c75e99ccab65e8b03e7960f4873,2024-07-03T01:53:46.567000 CVE-2024-30059,0,0,63a2dab80c660c9c44dee394d6c5e0990ac774d032d077b9543992d53c1c870c,2024-05-14T19:17:55.627000 CVE-2024-3006,0,0,ec8b37c3fe07f44a3179e7ebf781c249c3b3c8917cb2a412d723e57af1e94421,2024-05-17T02:39:40.117000 @@ -249534,7 +249534,7 @@ CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f CVE-2024-3016,0,0,de2146827057d4173ad33d38353b5e127fb8228c688e81e98737f0f3b35e8a6f,2024-05-14T16:11:39.510000 CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000 CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000 -CVE-2024-30163,0,0,38ed7fef74bed532aaae71c6ce10c23b7dc06192165bf85eca0ea68d029caa44,2024-06-07T19:24:09.243000 +CVE-2024-30163,0,1,39ca1a6132e6e2f204e77b2ff440d28a7ab8af49f5189024790e4d8e4bf99e0f,2024-06-07T19:24:09.243000 CVE-2024-30164,0,0,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a216,2024-07-03T01:53:52.840000 CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000 CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000 @@ -250730,7 +250730,7 @@ CVE-2024-31874,0,0,e7d8855c4e811764eef94dcfa7dca9ed011409e4b80758da69813345c8ab3 CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000 CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000 CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 -CVE-2024-31881,0,0,b014172bf877ebeed2f989becf8c343ab7aca75911e767f15ea354d0ea1c571c,2024-06-13T18:36:09.010000 +CVE-2024-31881,0,1,b86227fdb89d6977e73fa729a433dc2311474d090bc38915ce3c0afe8efba311,2024-06-13T18:36:09.010000 CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000 CVE-2024-31887,0,0,ca1dcd6dc6fe353a02ec0a4cea716a53938c4b835e7c6779724d1f7fe8375c4c,2024-04-17T12:48:07.510000 CVE-2024-31889,0,0,551bcd3e36a73e2bb38d2c501766c5b52ca7977e525b06f960ceabe308a1516f,2024-05-31T19:14:47.793000 @@ -250748,7 +250748,7 @@ CVE-2024-31907,0,0,e57043b034702621fcca13eaf542da6f92ff5842c4e903e12746e460db136 CVE-2024-31908,0,0,747fd2c58000cd25913c25e42d3852e7dcfd29b11f273ad346d09720c57822b0,2024-05-31T19:14:47.793000 CVE-2024-3191,0,0,4b64737c2ba1d5381e6e70a6c028bdab456c548a9bdfe30ed67e35d729ec88f8,2024-05-17T02:39:45.973000 CVE-2024-31912,0,0,ab5386eb73e0ea05e5a45299f896aca5c29477fd42a37352296d9c1bcaa1f100,2024-08-01T17:45:05.433000 -CVE-2024-31916,0,0,fd73185278ccf524ba953e29082ce32e1264694cd6d02cb81c010959ba7d07bf,2024-06-27T19:25:12.067000 +CVE-2024-31916,0,1,d0ce4a3cfd2a3d2083838b7b5b4f2b308c549557b4ef2ff77ed46f8236c18936,2024-06-27T19:25:12.067000 CVE-2024-31919,0,0,ddf1072350526e7664aba8bcbe02e2a80caa760ca9cee42f25788d4cdafd825e,2024-08-01T17:55:26.330000 CVE-2024-3192,0,0,86d1d1e0321b1e36164b029ce40dad696891b3892eaedc5f030e5997e476b03b,2024-06-04T19:20:17.017000 CVE-2024-31920,0,0,6435e6c51f537812b6bae2b3471917a7ded9a85627b859f1e4c884ba2d652b66,2024-04-15T13:15:31.997000 @@ -250971,7 +250971,7 @@ CVE-2024-3222,0,0,57632d7e58038bae9be25dcea3482f307de0a31f331213554dd2d325ef2109 CVE-2024-32228,0,0,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85c2e,2024-07-03T01:55:54.267000 CVE-2024-32229,0,0,46cfde26330a35dd5af3aef05c7164d23baa98664713e164e4ba017a64475da0,2024-07-08T14:18:28.213000 CVE-2024-3223,0,0,ea7ad0974e81e86878848176b870b25d4ede66377ba0daa6f895cdaeb06d9607,2024-05-17T02:39:47.627000 -CVE-2024-32230,0,0,bba137e1373cb1ea88f9e5c5bc97b3dfc8dcee41432f2e75a6da02a5c1a71891,2024-07-02T12:09:16.907000 +CVE-2024-32230,0,1,9362b2b797a006bddcc5169710b996c1bae5f306510d2ae9a0e823f8d5efd51f,2024-07-02T12:09:16.907000 CVE-2024-32236,0,0,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000 CVE-2024-32238,0,0,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2359,2024-07-03T01:55:55.820000 CVE-2024-3224,0,0,5cb76873d21890ad6afc0804dc7e9ce4b6d28fdd7bfda362c8cc03368f50e1a6,2024-05-17T02:39:47.717000 @@ -251388,7 +251388,7 @@ CVE-2024-32754,0,0,607be943cbec19ebc26898f36a5e33ae0135cc060ad9e54e1f721e2b27b87 CVE-2024-32755,0,0,6486420787dcf6812bdb9f63fd9a4a343ad8e1daadcd81d170900a26ec6bdc80,2024-07-02T17:44:45.700000 CVE-2024-32756,0,0,66b47cfd09ecb3cd684d3e36f2805405b27c9172290255c35d66f88ed276f3b3,2024-07-02T17:44:45.700000 CVE-2024-32757,0,0,de1462c106dd8cf24c9e93644d082974dcd2a315f324264b86c9828d04e053fd,2024-07-02T17:44:45.700000 -CVE-2024-32758,0,0,57dbc3dcfe321c419dec0afabbc4b2efb598d23f4a31544841a76134b39f1481,2024-08-02T12:59:43.990000 +CVE-2024-32758,0,1,57924d40b32aaee849b88f4bfbcbf9b6c1cc83287d610850f0df769c85f59c82,2024-08-02T12:59:43.990000 CVE-2024-32759,0,0,e561891056edc630b07789b7eea3e9c4ca316a3bd4320f86e19aed48b57191eb,2024-07-11T15:15:11.627000 CVE-2024-3276,0,0,954e640f132b9cefdd02d650fab115252b37920b2c727ceb9c716e480c00b1fe,2024-07-08T14:19:01.997000 CVE-2024-32760,0,0,8a4cdc5bcedb63264846221216208f424d8dc5b52e5ca3fc3e32534258ddc5b1,2024-06-10T18:15:34.203000 @@ -251471,16 +251471,16 @@ CVE-2024-32853,0,0,a1dca3d4bd42a909fb90bb63c4311872870004374a80c3f2c77a99712953a CVE-2024-32854,0,0,ca09015aea734c79d590c062091997f16b37e268e9b438da15806fb6d9439330,2024-07-03T17:59:14.203000 CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a10592cf,2024-06-25T12:24:17.873000 CVE-2024-32856,0,0,6d8137a0b9dec706e783082fa3a1037a7f0ce7ef4a6d1bed9d383583e1a8b038,2024-06-13T18:35:19.777000 -CVE-2024-32857,0,0,9df7415e8c24738f147658917ace8db93f6d65073675c7ac5aef0dcefc41b5c8,2024-07-31T12:57:02.300000 +CVE-2024-32857,0,1,ed20271e55d433e86f607295e906a40f62fa167b1723ca128ef11690482d7b99,2024-07-31T12:57:02.300000 CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000 CVE-2024-32859,0,0,03cfa9128131e4e31b6c7a7857fb4f0bbd43d768e740100a365b65d50eaff363,2024-06-13T18:35:19.777000 CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000 CVE-2024-32860,0,0,f7dffb4e6c88e91eb3b0e840948c90a54884d2d7e46d06b53c404dced4e4a3d1,2024-06-13T18:35:19.777000 CVE-2024-32861,0,0,4690ae217a4b596d64e69c4e91eed7a814ce164eeb5aed983f8d559fa108dfae,2024-08-02T03:15:20.680000 -CVE-2024-32862,0,0,3608b2d975640592a6376fcc48f9d6a2e9b80dcdb0ec711b8012fac7f8f2f2df,2024-08-02T12:59:43.990000 -CVE-2024-32863,0,0,b87a64bef4141225c34422dbb69eda6ef53950aadb65d284e6c5e6bbf322e161,2024-08-02T12:59:43.990000 -CVE-2024-32864,0,0,0ca8e6fb7376e39c1deddbc7400ec71d1dfd0ca94c0208e0bdf16f94ab762367,2024-08-02T12:59:43.990000 -CVE-2024-32865,0,0,d271cfd87694e0f4ec52d3bbc695b03a501481585c42e6857cfa48dc8aab866a,2024-08-02T12:59:43.990000 +CVE-2024-32862,0,1,7591fae0de748c645053f8504672356468bd506a71ea6394c7bfbae5931a35cb,2024-08-02T12:59:43.990000 +CVE-2024-32863,0,1,64d5c3668f75955f440e2f02e5d80a29ded52e66989e20952ed1c7dcf7381738,2024-08-02T12:59:43.990000 +CVE-2024-32864,0,1,76508cf2d471b8cad4467875df7f68b4dd559ab86a1ab7f99a62b1711c9b090b,2024-08-02T12:59:43.990000 +CVE-2024-32865,0,1,27aab5bc5616ecf9e55a99e4c8d8c369263be7b29c84c8af43381ac496c6b63f,2024-08-02T12:59:43.990000 CVE-2024-32866,0,0,fa71fc06d8b1a0496adfae0f341821c88186ef8480ad5fdb07199c81b77393c3,2024-04-24T13:39:42.883000 CVE-2024-32867,0,0,5753d2fa0aea693f0e3bd6a10cde5e73ef612564cad64279a88ae35cadec23c1,2024-05-07T20:07:58.737000 CVE-2024-32868,0,0,2b261352b98ef068e4c3a1dc7bd9890450dc7582cc1875b68d4f6675a70c87c7,2024-04-26T12:58:17.720000 @@ -251548,7 +251548,7 @@ CVE-2024-32926,0,0,9ef7e8771a6566bb36cb9f88d81a05eda20461f6e380085d4cd6c336f418a CVE-2024-32929,0,0,17d10f21930634adcf648f3a1af5dffaf801c17e6eb1045912f45ef7311ec215,2024-07-03T01:57:19.547000 CVE-2024-3293,0,0,83ffac847878c264dc6ac6eac7b38e37082e6b861b5988770c12a0259c7b42c0,2024-04-23T12:52:26.253000 CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 -CVE-2024-32931,0,0,2ca6966831067d7d79732c9295b55be5d60823972c38bcccb7d1538e9e7ab70f,2024-08-02T12:59:43.990000 +CVE-2024-32931,0,1,d27927f798272503e3bfcbbda9de95daca7bdb44845ea667d033ad895facd922,2024-08-02T12:59:43.990000 CVE-2024-32932,0,0,4fb6f83f101b5683d5a8c45180e3a23cd3f8e2d3acfb194a28f95ea68de1746c,2024-07-02T17:44:45.700000 CVE-2024-32936,0,0,23e0b37e344ddd92e30dd7d9ca686ba35ea7eca4cd8b4bf43262492fe54966c0,2024-06-24T19:26:47.037000 CVE-2024-32937,0,0,652f451b71d39d99a50a831c1d05a67aee4d871187572c128dccbf3c57743878,2024-07-05T12:55:51.367000 @@ -251611,7 +251611,7 @@ CVE-2024-32998,0,0,1567cb7f89dc462eef4972362d1964514d455763b8e2788b3bea8aca976a4 CVE-2024-32999,0,0,05c8bf4912eccbca45ea5264fa23470cd36096c324ea65b045d35ce6125d8afe,2024-05-14T16:12:23.490000 CVE-2024-3300,0,0,5ed420ceec7dd67c7a8c90e2661f4216c9dcb91251ff120ca64b2c4babcfd8f9,2024-05-30T18:18:58.870000 CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528578,2024-05-14T19:17:55.627000 -CVE-2024-33001,0,0,935fe0c2f3680256ffb66bf319f09c523f0d880f377f85b4152106f884481877,2024-06-11T13:54:12.057000 +CVE-2024-33001,0,1,1f54828f51e404bd3a0cd4a9b51be8dce0b5188764cf29d41876bf27eaa2581a,2024-06-11T13:54:12.057000 CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000 CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000 CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000 @@ -251735,7 +251735,7 @@ CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48 CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000 CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000 CVE-2024-33374,0,0,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000 -CVE-2024-33375,0,0,3c42a38ae5f04141c6649ba31f40f64a0c3f80d6e11b222e09f0acf2cb15621f,2024-08-01T13:51:54.967000 +CVE-2024-33375,0,1,5d7df8240369da1ea82d816f49a8798a22ce4828b4c1dbb3062e5d8eb520b928,2024-08-01T13:51:54.967000 CVE-2024-33377,0,0,6251b0a1a5395fb43785352f146ee3a108da78ac236988b83117c2dea94d739f,2024-06-17T18:15:16.107000 CVE-2024-3338,0,0,b2327c11e1d762220f8764f83498076a393d83520a65cf1a3ec9854d72e0d01a,2024-05-02T18:00:37.360000 CVE-2024-33382,0,0,dc1b896c815bbb6d05d98ce7170409486d331681fef4f2caee5818b69d11fbd6,2024-05-09T13:05:45.620000 @@ -252141,7 +252141,7 @@ CVE-2024-34008,0,0,12468a64ece54d2177f4be3e63a53a42505149e2cd5b611cb491f1103f12d CVE-2024-34009,0,0,18bf6e117b9495c5fa8c40d17d2639b8385c3310650f6b1c3c8a3528c0ec36c0,2024-08-01T15:35:14.680000 CVE-2024-34010,0,0,e5242e4e175689c741a04991b05d676f9e3bda064e1a681e08ea1b95446de349,2024-04-30T13:11:16.690000 CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000 -CVE-2024-34012,0,0,04f4534da5173cfce7ebae120e48f12f9b737be7b5131e98dd79deccdc3d7723,2024-06-17T12:42:04.623000 +CVE-2024-34012,0,1,c7ea6b492e56591f1b89a7478517ccd0c48967c2a0287624ba6d37ef66b85daa,2024-06-17T12:42:04.623000 CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000 CVE-2024-3402,0,0,860d32d94b28d3118ff3553c4f964ad26b3d56a8c45fca055d79619e6385e5e0,2024-06-07T14:56:05.647000 CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 @@ -252557,16 +252557,16 @@ CVE-2024-3465,0,0,6e61814cfea547ec37c26ad0e88e359beda44dc20babd4ed16862aa3d501f9 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 CVE-2024-3467,0,0,f97f520f5797999559b92a7c0577ac536f47706a8739d6dd391d5611a09166cd,2024-06-13T18:36:09.010000 CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 -CVE-2024-34683,0,0,c91150abb32f8269da60d2d347524b0c2cacbe9d90187e8f42a05a019b4dc9b7,2024-06-11T13:54:12.057000 -CVE-2024-34684,0,0,9d73c2958a2fd631f829da148cf9c346499f3d8419b1af036ef78c7400b129cb,2024-06-11T13:54:12.057000 +CVE-2024-34683,0,1,8215122b0794f4527e9a9f7098a590e49c6262544380e077e351b7da89d43770,2024-06-11T13:54:12.057000 +CVE-2024-34684,0,1,bef969e507582e053d5208aedd392d42d8f349cdd9e5dd59add1c578f57fd6b7,2024-06-11T13:54:12.057000 CVE-2024-34685,0,0,588dc8fca74d544e911ad8585a3fe8a4026086ccc3b45cf5d371e8a153609a7e,2024-07-09T18:19:14.047000 -CVE-2024-34686,0,0,286850f41f9ede2e6fe46ae6be0a3d2c900c5ffff28e8801de27c9a9f235f745,2024-06-11T13:54:12.057000 +CVE-2024-34686,0,1,9a46529afe2602396741c77c95009142538ded4dd5a0a610b2bc7ac147d05880,2024-06-11T13:54:12.057000 CVE-2024-34687,0,0,2d1fb3e427c306d9f3a4e574ef26ad04ac3746abee3e170bed2385765a3ef230,2024-05-14T19:17:55.627000 -CVE-2024-34688,0,0,c319fe406deffad53491da96cb81c92b57b18e6b32e9aeb3554a046ca759c305,2024-06-11T13:54:12.057000 +CVE-2024-34688,0,1,bc0b797ad68234a4104a05c3d08234878b94974e03cbb237ed15cd1b2f5516b9,2024-06-11T13:54:12.057000 CVE-2024-34689,0,0,24635e46ef31bb11483f26da60a02a929940d00bd29acd39e88acae29470e314,2024-07-09T18:19:14.047000 CVE-2024-3469,0,0,cb7a58a01dcf9e5cd221e36a17138ff3dd47e8ff2900440904514d412daa843f,2024-06-13T19:36:21.350000 -CVE-2024-34690,0,0,0635383890efb866f764870a527700f53c4c6c290a6d3b6a816c3c24a50f0127,2024-06-11T13:54:12.057000 -CVE-2024-34691,0,0,d07f7e30238c02db4e7338c8c2c9f7edd1f6c081eb0d8c433c22b29e2a74e42c,2024-06-11T13:54:12.057000 +CVE-2024-34690,0,1,97e56bd7ad3de307b706e50cda0a78c0c488d191a6abe6d8bae80d7fdf2fbafd,2024-06-11T13:54:12.057000 +CVE-2024-34691,0,1,d72788bb0934c728a20ac076656a4f65df5d51a5a4a1b4463abc73555eeba89a,2024-06-11T13:54:12.057000 CVE-2024-34692,0,0,17deb1aaa9e14aac944dcf6df2dd1e234435ce38212119d1e0051b7c7492fda6,2024-07-09T18:19:14.047000 CVE-2024-34693,0,0,0aaa9ba78d50edebdcd2053a5f69520a0132977a44461876bfc235b9965b7cd7,2024-06-20T12:43:25.663000 CVE-2024-34694,0,0,379682f7a43e392f519649f9bebfbde90c0aee7ee0fd96bf9efedf4736084c4e,2024-06-17T12:42:04.623000 @@ -252778,7 +252778,7 @@ CVE-2024-35102,0,0,2b819b2aba7aeefcf863a3cc2beb98c85bbe7e051399664203866682707f6 CVE-2024-35108,0,0,26473bc212f25b793c66f492376510c497f3c8040fd855e035e2125e4662c9ef,2024-07-03T02:01:23.437000 CVE-2024-35109,0,0,5c37b5989db27d73a1b7673ab81df5907cc813f794f46739f6fbd9e9480590e6,2024-07-03T02:01:24.210000 CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9863,2024-07-03T02:01:24.987000 -CVE-2024-35116,0,0,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000 +CVE-2024-35116,0,1,7ab540c112b9010ca6d0b63139ef05bf7c8cdbd0e3d9c37e6db26ca5392b2ae4,2024-07-01T12:37:24.220000 CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000 @@ -252791,7 +252791,7 @@ CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4c CVE-2024-35153,0,0,bceffddb04f303a203c6bdd6ad6ed1855809c9b42c9ff2e40956bbe7b4fb3c29,2024-08-02T15:24:29.190000 CVE-2024-35154,0,0,7c994b7a6d7158efefd5e2d9a1e0bdd18fbe7152cacfbfaf67e2a7f91ec1260c,2024-07-11T13:05:54.930000 CVE-2024-35155,0,0,371571e1aae62a09e601d6099b5578266a4a707997394118a0b1e39997d5568b,2024-08-01T17:56:03.997000 -CVE-2024-35156,0,0,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000 +CVE-2024-35156,0,1,7c4915a6e4fe8b0271ff6d9725c9fe229558124031a1900b31f29119291d2b8c,2024-07-01T12:37:24.220000 CVE-2024-3516,0,0,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000 CVE-2024-35161,0,0,5b1f2647531a5d5b0f838168c4e1e46772cc2bf936ac72086e3c013a91970dfd,2024-08-01T13:52:33.223000 CVE-2024-35162,0,0,898115932dab71d396aafa3d3e8a79f10b6e8ca121500758707a59e848faab9f,2024-05-22T12:46:53.887000 @@ -253170,10 +253170,10 @@ CVE-2024-35747,0,0,901c39c91912bf2e0cc6afb470a86bf3ccd4cbaecb872655e61942740d3fd CVE-2024-35748,0,0,0d0ae6570b9b5dd7d8320e68cedce9cf69c0c9ccda564604cf2b92bad42c2a76,2024-06-12T13:30:18.963000 CVE-2024-35749,0,0,3be9161c0f99f99e480b0f4d9d6c3b5b6bdb08738620c21eb9fc65f646cc2eeb,2024-06-12T18:19:55.050000 CVE-2024-3575,0,0,7b73b64d176ee42e3f815efb129e0a4e8daabc141e22843995ce14322618115c,2024-04-16T13:24:07.103000 -CVE-2024-35750,0,0,6e06aeca71ad00810f40d3c09fd426bb6ff377dd4039e66a40155befdd774ca3,2024-06-10T02:52:08.267000 +CVE-2024-35750,0,1,337904e02d48eff7e7f71ff4e0b4d15f230905a46ebf33e9ed3f06ed45b6365c,2024-06-10T02:52:08.267000 CVE-2024-35751,0,0,e1663b8c50f83517934d4862fd0d61dee5d0a49bf4813097a1ced7fef67b55a4,2024-08-01T03:19:00.947000 CVE-2024-35752,0,0,2959743628a1736f3c2cc142d9df4f39137eeb6a8e6aeb3884b9986bb7f210b1,2024-07-25T13:23:13.527000 -CVE-2024-35753,0,0,4ad7364fde338b1172d3912b082d48ff9c7e6bb90d9788eb462ee65f933adbdc,2024-07-19T18:31:44.157000 +CVE-2024-35753,0,1,1f9798eb2ddb4f2a5f8cb2409909c9d19e48dfd3229084f2c0c29ef1f9e96a18,2024-07-19T18:31:44.157000 CVE-2024-35754,0,0,6542d4ccfbee23f434dbe55310367fe2a58769f4413cd83c76145804203a6991,2024-06-12T18:19:06.043000 CVE-2024-35755,0,0,cc2117d22812aa69d3d5a641ac8b181d687b07ad79fa54540f5770eb7650b484,2024-08-01T03:17:32.993000 CVE-2024-35756,0,0,544619c9ecc5325b30fd6bce5cf3678837c7f45621d4b9369a6b2ab863337f02,2024-07-19T18:45:25.210000 @@ -253671,7 +253671,7 @@ CVE-2024-36279,0,0,ae6d96e367108cc090e0cf1f9382ed63328248da9c7d975607021f129b51c CVE-2024-3628,0,0,d2a16bb2e0ca783e20096bf35e3f91c09dc2bc7f0a3b813f429c51b8aa3691ef,2024-05-07T13:39:32.710000 CVE-2024-36281,0,0,4032e87664df21abbcaa585b35a0470f103bb7ec0175fafa642785144372bdcb,2024-06-21T11:22:01.687000 CVE-2024-36286,0,0,7d09221a564e0c2df0ff5611559a80db23ca3f0bea1adae57d3ef567da0d5321,2024-07-15T07:15:05.140000 -CVE-2024-36287,0,0,2a781a16842757079744c57b0941ec2c7989685e6d30279442b64b26523bb6c7,2024-06-17T12:42:04.623000 +CVE-2024-36287,0,1,04137cf45d34269d5bf3f657fe47b3872cbc102190c8e0e404442f9a93e23877,2024-06-17T12:42:04.623000 CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000 CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000 CVE-2024-3629,0,0,e776b351c13d8fab7d20c1d77ce24b1735377c1f0ada7e55eb9590007cc5c2e8,2024-05-15T16:40:19.330000 @@ -253787,7 +253787,7 @@ CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 CVE-2024-36491,0,0,6efdbfe92fd7b110a7468fc85fb00858571ab2d21b32164f2daefb371e4e6cf2,2024-08-01T13:52:56.787000 -CVE-2024-36492,0,0,f8a9df8bba7c3c70134984b842266087f5464ece04a8a7976386b090a5803d94,2024-08-01T16:45:25.400000 +CVE-2024-36492,0,1,b1dcf5767978827d3d62f081664954ae8e8f4be7d84743a3b6ff988a4026f337,2024-08-01T16:45:25.400000 CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000 CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000 CVE-2024-36497,0,0,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000 @@ -254054,10 +254054,10 @@ CVE-2024-36986,0,0,19150827ddb5a5edfc4814b01ab21fdc0631b6b8b842914dd22329d1e779f CVE-2024-36987,0,0,1d55b78de0429e0f9217425a916f7a81cae7e1ecd4aabcd3cf4385f4839c5aca,2024-08-02T15:21:54.573000 CVE-2024-36989,0,0,689147655bf3300037b6b26d03b3db08b60063c952195c56a665f47f4c0b9812,2024-08-02T15:11:57.347000 CVE-2024-3699,0,0,30b1531f872c88b7cbea0828fb395914bc791e58c332296f8abe3de89de3423a,2024-06-12T17:53:09.130000 -CVE-2024-36990,0,0,aa48358778f1e075473a9c6be8b2232901de5cf6b02efd9b8064650031dc0d02,2024-07-02T12:09:16.907000 +CVE-2024-36990,0,1,e6ec05ae93a5d62e4bb408bdf39a17faca56e820bc3112ad2d6e8c556d4ce6d2,2024-07-02T12:09:16.907000 CVE-2024-36991,0,0,170802115c918c2bd8567732564fe4924a4eadc0df36a7df6beeafa80b77c812,2024-07-22T15:00:45.110000 -CVE-2024-36992,0,0,bcbbb6881d186d85eeb8a22d44f95616b8fd4f4a00ae2d2dab0390da0fa6c3c1,2024-07-02T12:09:16.907000 -CVE-2024-36993,0,0,0bf69cc687b9984786a898e5e3bdec70b83ac19c6b025b29f234d81abd1b0a63,2024-07-02T12:09:16.907000 +CVE-2024-36992,0,1,8b259e12fc841280bf9c5718258071fd5c15370b870fa19933a4286ce172db18,2024-07-02T12:09:16.907000 +CVE-2024-36993,0,1,13891ab073e5d77904955a690f3f6337ef8f7ac166082162fd284641ac322cb1,2024-07-02T12:09:16.907000 CVE-2024-36994,0,0,5bcf467196c1b84a362932fda69af7a594fd1733711aa93db9e3192dd09151ba,2024-08-02T15:07:01.577000 CVE-2024-36995,0,0,001f01624b8476726d4d815467edb381482f5d309cf989b89173ce343b404752,2024-08-02T14:55:40.310000 CVE-2024-36996,0,0,27a454f471e059b9034eb213c7435a94a3c4a3888f97de83d5b9e26473d4fbe6,2024-08-02T14:47:12.667000 @@ -254130,7 +254130,7 @@ CVE-2024-37092,0,0,4f832f426d4e20df2ade16ea7f95884ead700f0032ad8127b2362adeff7b3 CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000 CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000 CVE-2024-3710,0,0,b54f7b8999ad064535445b5fd4766a137ffc70ceb349f28f8c5f7d65dfa1d3ae,2024-08-01T13:56:40.053000 -CVE-2024-37100,0,0,d946d37139e082d7c1d3fa3022addee77f7079a31af1d75bfaf38f9c67f66b78,2024-07-26T13:27:50.583000 +CVE-2024-37100,0,1,2b3fe9b89db247c6739af47c680e25c99c767f88c107eecdb29b2289fcbaa161,2024-07-26T13:27:50.583000 CVE-2024-37101,0,0,97e2e32c34ae252be2daf95c15efc1d10b3c02ed553eff869e9373b422ad3f71,2024-07-26T13:28:35.413000 CVE-2024-37107,0,0,c34eb9423d2914f17496f972157edf5a13b8aac9d9952229863732abed2c8ebc,2024-06-28T13:15:02.503000 CVE-2024-37109,0,0,6d9561b54eb1585204efd78bb4aca173265e0252b0f8c4fd1c394313da00bedf,2024-06-28T13:15:02.650000 @@ -254149,8 +254149,8 @@ CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3 CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 -CVE-2024-37127,0,0,2670bae9edca672b157ba87b5b015d5eeee4bb834ff2f3b27f97caba119a85c2,2024-07-31T12:57:02.300000 -CVE-2024-37129,0,0,2161f62ae0fa653638927d726e9f4fb434094a4756bce33e5d739db56c800729,2024-07-31T12:57:02.300000 +CVE-2024-37127,0,1,80266d7603ba84619cf83925e2bd696016d21affd2f6df9fc168f7e6704b5a73,2024-07-31T12:57:02.300000 +CVE-2024-37129,0,1,f8926f8685bed687aa68c5f4ce1ca396bdbbe48ef35c808c3281a64c9d77dd67,2024-07-31T12:57:02.300000 CVE-2024-37130,0,0,cbd9dfc340def95265d907da6835c0ba032c0f95252bb398ce7a3b8c9a6f4189,2024-06-11T13:54:12.057000 CVE-2024-37131,0,0,1b53fe6698cfc8662ae4f6c0ed3f87f760fe2128440fb0619b7f2633753262fb,2024-06-13T18:35:19.777000 CVE-2024-37132,0,0,32a23a7a93e12576e3cef44acbc1e26d96ab3673ab3a48bd46dd4729adbaca95,2024-07-03T18:01:07.500000 @@ -254163,7 +254163,7 @@ CVE-2024-37139,0,0,8bcc51f0578107c550f57eda3e8f8169088ed87cca1e5fda916b143e22a12 CVE-2024-3714,0,0,4bcb0bea6568f5dfd8667c7519e5c32cf286da2de79c4bdf6bef9437b54c8d03,2024-05-20T13:00:34.807000 CVE-2024-37140,0,0,c0e59e0c3820f0b4a910e5eed0fb2eac2eba5c793659c906795da47f31c33278,2024-06-26T12:44:29.693000 CVE-2024-37141,0,0,4138154ff13405362c4f0fa9b34cca08a172e0f83625a1ab272957b9a58f67e5,2024-06-26T12:44:29.693000 -CVE-2024-37142,0,0,8900c7ecdbda7a1d390faf823d6974e6980ec688f3167407c1fab52e0e297570,2024-07-31T12:57:02.300000 +CVE-2024-37142,0,1,47d31bb71216f43e1772f3350bb70569945e37eca3562554c3b5cc26beccac57,2024-07-31T12:57:02.300000 CVE-2024-37145,0,0,1222762eaa12a0e0a49c86b792d6f13bb19acede2c9bc472eb8e6da85dd8abda,2024-07-02T12:09:16.907000 CVE-2024-37146,0,0,c0ed63c770ec79d5a3ba66c3386d10a89c2cf22e01c61def1bf7a85931426fdf,2024-07-02T12:09:16.907000 CVE-2024-37147,0,0,ba8c50fbc8db39821634ae7e204809a5bbf05c4c8996a3abdce4e3ee027f0fca,2024-07-11T13:05:54.930000 @@ -254196,12 +254196,12 @@ CVE-2024-37172,0,0,f250f84f8bf65fab54a28c1dd89e7ca9228f97ca19677f8b9e9fa5e3640f6 CVE-2024-37173,0,0,d9e89fa5c55cd9cf36655aeb8ad7d6e4f842f4a67f1bba1eaa34f27de714dd0d,2024-07-09T18:19:14.047000 CVE-2024-37174,0,0,2c40ad59745acc3c250745501ed073d3b465110b46945a5a11489e28e1b96643,2024-07-09T18:19:14.047000 CVE-2024-37175,0,0,ea3ef59255e28c88c31df74ab383a5e26e04912e674df43e855debbaabcfccf6,2024-07-09T18:19:14.047000 -CVE-2024-37176,0,0,3c1c643e5ff08b789de904a7c5b4981cbd7952ec6fa7ac388fcd22e22b171ca8,2024-06-11T13:54:12.057000 +CVE-2024-37176,0,1,2614a2a5dd7abc41a2bd805756fa140b232a108797557921666cfc08ca6dbbf9,2024-06-11T13:54:12.057000 CVE-2024-37177,0,0,5c668d6fc8f89d275dab68dfc9c6e6aa2dda5828c4c067dd13278268042a6c87,2024-06-11T13:54:12.057000 CVE-2024-37178,0,0,ec0623af63b542a59bee4b0b0dc964702dff4ddb4fa5e9957a0a4c2999ed0559,2024-06-11T13:54:12.057000 CVE-2024-3718,0,0,8a153be0e904f8dfce7a1fd62411ff8bb9932d49f0ddf7963b849729d2d3feb2,2024-05-24T13:03:05.093000 CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862f7e,2024-07-09T18:19:14.047000 -CVE-2024-37182,0,0,811d145dfdf9b85d98107a5a7665c6fc8b51651207773350b411b65175e7b871,2024-06-17T12:42:04.623000 +CVE-2024-37182,0,1,800e8bd7db11ecd7bb6f152ca1a9201a27bf6d72822819cd535bb436d535cd73,2024-06-17T12:42:04.623000 CVE-2024-37183,0,0,40759211984c4bbc303ff8d56740c06e4761a951d68b4235158aaff8607d5316,2024-06-21T11:22:01.687000 CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0bd3,2024-07-03T18:02:57.857000 CVE-2024-3719,0,0,e1388f5d62a0fd4143182e88b2e1e453aac0737837b6c91a5acc29cfca670145,2024-06-04T19:20:23.553000 @@ -254291,11 +254291,11 @@ CVE-2024-37309,0,0,8b77a8abce2581f8670d973fc05d76a08446b9e83f8b1259f30461904bc28 CVE-2024-3731,0,0,ef8eca77ff9380ae76e470c90fb3d29a9ba51986895ffc0d9d864ff0b2261547,2024-04-19T13:10:25.637000 CVE-2024-37310,0,0,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601463,2024-07-11T13:05:54.930000 CVE-2024-37312,0,0,c9951de02441eaa79d1cb1dd04f0cb479ff9f95a9feb89bd2a12c3935f476481,2024-06-17T12:42:04.623000 -CVE-2024-37313,0,0,aa0f6b44a59e1e1c752c1aa0bfc59db8945bb5237a8f4c76a445961f28196802,2024-06-17T12:42:04.623000 -CVE-2024-37314,0,0,bb61f2cc30d2406cc9959e8c81d4f0f87557a53470a94d7a209d3999ace3e058,2024-06-17T12:42:04.623000 -CVE-2024-37315,0,0,3417c5e8f776753ad0efbabbfdc80b0c2f9340b0d972874446121bdd7c424836,2024-06-17T12:42:04.623000 -CVE-2024-37316,0,0,ca8e80accb458900a27ff1dc5ffda1b6234a3affadf34e405f5468182494a4b7,2024-06-17T12:42:04.623000 -CVE-2024-37317,0,0,2ec183a7bd481c95a939eeb6455d912a63995d1c64762edcb32397abcfe7a318,2024-06-17T12:42:04.623000 +CVE-2024-37313,0,1,56e03be6114dcbcc420d52ba189ce21fd838f398741344c11caac865e40212b6,2024-06-17T12:42:04.623000 +CVE-2024-37314,0,1,2a8bc61fa93764cb0fb07c24d5bac1ea60f00f829a9b504f8438b7c40cefcf59,2024-06-17T12:42:04.623000 +CVE-2024-37315,0,1,31f47ce02db58cee61420543ed6af1becb289e2e35f5273500587c2c2526b083,2024-06-17T12:42:04.623000 +CVE-2024-37316,0,1,23efa33580c16c198846d8cbc540c3b959c8c6cc5d8e7e643aacce595c39ab53,2024-06-17T12:42:04.623000 +CVE-2024-37317,0,1,39b0b4317a6651cb59a140f8d7c551e6209dd76ddab831aefab29483d97c356d,2024-06-17T12:42:04.623000 CVE-2024-37318,0,0,f24ae26ca0facd31c951e48825bfa20026c0187e1527557d74d4daef2adbc562,2024-07-09T18:18:38.713000 CVE-2024-37319,0,0,7d017c79ccc3f705faf8a4c0ccdc6584afdd8bc15696ad2fd1dae4f04398fc66,2024-07-09T18:18:38.713000 CVE-2024-3732,0,0,1e5e3029c64a5f725486d32a5d97f2bbd597392012dab477d1543e258f8bb4ef,2024-04-23T12:52:09.397000 @@ -254317,12 +254317,12 @@ CVE-2024-37333,0,0,ca6a17cc22b1d717772d796bf0aa2546b83275671146f095987901bb082c3 CVE-2024-37334,0,0,3931d383be66577632f115e0c9d908ee2bcb3dc588be0b175f4163124a70c529,2024-07-09T18:18:38.713000 CVE-2024-37336,0,0,90e602973017f76462997dc997dd1aa43f526ec48ab9dba1852b6ff97aa50fb9,2024-07-09T18:18:38.713000 CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000 -CVE-2024-37343,0,0,5d1ba2e2d3f2d60c9152f8eaaf570c96059b4036c70f7343c852d7b5be457a53,2024-06-21T11:22:01.687000 -CVE-2024-37344,0,0,f6ac59258a88e0fd8348bc22574f876131263151d650211c3d991f7b451dad79,2024-06-21T11:22:01.687000 -CVE-2024-37345,0,0,f1ab373af51afa2b937d04c52f3aa749dc2339e9327e446544a571e4ab5fbefe,2024-06-21T11:22:01.687000 -CVE-2024-37346,0,0,a4475e8bc16526d4a2cd923965b515305302813fd73edbfa3f18575d405f61ec,2024-06-21T11:22:01.687000 -CVE-2024-37347,0,0,6e7baea952ef385b67b23083cebbb129c77e5630de3ec6d82658c88bc410c4ea,2024-06-21T11:22:01.687000 -CVE-2024-37348,0,0,49b92234970ec422b020245ff1e6f7259c16f36e8db6b7b874fd77e08ed0a6ef,2024-06-21T11:22:01.687000 +CVE-2024-37343,0,1,d5d5e2a1392f5d57021e524a562ea50a5a47222525d94aabe2d57813ad1cbe7a,2024-06-21T11:22:01.687000 +CVE-2024-37344,0,1,ea2bc9fc8fb7df1e245c6aae13803dab2723fd58e7dce1039730ea28c975b1a0,2024-06-21T11:22:01.687000 +CVE-2024-37345,0,1,fe95cad1fe407877b8df4d99c703d2baebe348e9e687e293000ef03d5bed212d,2024-06-21T11:22:01.687000 +CVE-2024-37346,0,1,2db4948f8270427d7ba2d74594c1333081073368dc8627246d0b026677177be1,2024-06-21T11:22:01.687000 +CVE-2024-37347,0,1,54b001786471676843893d801bfb43f9bd3fba3053d7f310b4329fbd325dc220,2024-06-21T11:22:01.687000 +CVE-2024-37348,0,1,dc48fa9974ed21f9f4246b3dd80406f069a0cd0f6f5793a9ce9659a6a27d7dd1,2024-06-21T11:22:01.687000 CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000 CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000 CVE-2024-37350,0,0,db322a02568c197ff2f4cce28d07f13a6d84645dcf6fb2d6d98030bff57992f6,2024-06-21T11:22:01.687000 @@ -254398,7 +254398,7 @@ CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1c CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000 CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000 CVE-2024-37474,0,0,cf61b09860754eb2ef791cdf4ca372725ff10acc72703ca0f7e6cbc23292744a,2024-08-01T03:18:10.487000 -CVE-2024-37476,0,0,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000 +CVE-2024-37476,0,1,a9b8075ca818c34cf8047c8e22860ec7285d6d846bfa067900eec39ca13c6995,2024-07-19T16:52:39.713000 CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000 CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000 CVE-2024-37480,0,0,e29cc7c72f9882ed3de055148476e2a1c36aa1c43c58b1a0300753d9c3833c44,2024-07-25T15:51:31.297000 @@ -254435,7 +254435,7 @@ CVE-2024-37522,0,0,8d0ca9ac1272094da7900aa5aa9c5ded401dd6ca5f585f197834c48735f10 CVE-2024-37523,0,0,13bb725e58e999cc176a750d097aad585b673654b57d0f90da08bbd8099664ec,2024-07-22T13:00:31.330000 CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 CVE-2024-3753,0,0,84eff4df8db1a00368e62ddb5ee92a92d75f6c87384a685b642620e2007cf84f,2024-08-01T13:56:41.100000 -CVE-2024-37532,0,0,aa877fbc00f03a99fc2b9d43fb935fba6551700aac862f95f49a54cca4d5d3d2,2024-06-20T16:07:50.417000 +CVE-2024-37532,0,1,45919b76fbf8caed85c6eed116f206909b848d159e913e9fa67d2f60af5f6be6,2024-06-20T16:07:50.417000 CVE-2024-37533,0,0,d82586c3abd351c16093df491355c34e8750e635410a84408441a8e9ff8b85a0,2024-07-25T12:36:39.947000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 CVE-2024-37536,0,0,df209a8df9bdd9e6c141521f70aae153351cd936d4fcc329ecd5520bb21d30d3,2024-07-22T13:00:31.330000 @@ -254483,7 +254483,7 @@ CVE-2024-37620,0,0,ebe226737997b7888b817551438c1e37a2c38e7acb5d8d30d877d05c52f4a CVE-2024-37621,0,0,9e4834b0a2259fe7beed8d6218339ef0ddeb82537e0bc99d7623e8e4a86ce3ca,2024-08-01T13:54:08.677000 CVE-2024-37622,0,0,72464291a01f93964414bd967586f0dc8e108583f1668f09fd2b19a23b93be4b,2024-07-03T02:04:21.550000 CVE-2024-37623,0,0,b515ba49cdad646a6e4424a0af8caad03b3eeb5dcc7461835b4fa847ff81d1a5,2024-07-03T02:04:22.347000 -CVE-2024-37624,0,0,c8b41555fa1b5545381823af8d22868fb77fdcda0648f938a956fe7589aa93b7,2024-07-18T20:58:16.307000 +CVE-2024-37624,0,1,99ec12e83f729addc296b344bbc75b84d16ea9a0bcdd94e13bb1e04d9f7179e8,2024-07-18T20:58:16.307000 CVE-2024-37625,0,0,edc6c7ada3ab39a077d81e5fed77b0c921f58ec6eccf265b1a8392c99d85829c,2024-07-18T20:57:39.087000 CVE-2024-37626,0,0,67f0e21678f6260b33b002fa2f7c441578e8bb71c1b35d831202b3d9d14d22d7,2024-07-03T02:04:23.230000 CVE-2024-37629,0,0,c452ca69266bafb149b8a8c25dc755c132605c57e188dcb250482aa14f3f8d70,2024-07-19T16:13:17.120000 @@ -254493,7 +254493,7 @@ CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74 CVE-2024-37632,0,0,9cdd55cb05ea6a8853a3da90df6c3ae48b6998b3a3519250ef0cbdaa308a2bd7,2024-08-01T13:54:09.520000 CVE-2024-37633,0,0,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000 CVE-2024-37634,0,0,6e16f0f95dfcf255097e7dd652ce7848499c89be47e371aaa754251b1b9e9021,2024-07-03T02:04:25.770000 -CVE-2024-37635,0,0,8375ffdc8fa2b93bd8f9cd95b8fde7329093cc9bcd706b96b08a7f0ce706831b,2024-06-17T12:43:31.090000 +CVE-2024-37635,0,1,428043ec22a0a8f281bbb3a49b63c17d5f0567e533dddfa06eb778a77603f147,2024-06-17T12:43:31.090000 CVE-2024-37637,0,0,4382c3c11477cb9c0c98c6b36d4d6a080861c8e7a12e5a542c24ab931706be1f,2024-07-03T02:04:26.567000 CVE-2024-37639,0,0,faac05558a999374b477194ccded752579ad2da62ef52225a1808c93fa007076,2024-07-03T02:04:27.370000 CVE-2024-3764,0,0,db341581177558129620666288ffbac018878c49ee9401bc4b7ea0ca7e6fd397,2024-08-01T21:15:32.793000 @@ -254595,13 +254595,13 @@ CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe CVE-2024-37880,0,0,e6a073a13f4d5d80acb782a97b27605fba3820cc74e70d67b997f08c66f11a31,2024-08-01T13:54:27.953000 CVE-2024-37881,0,0,e093bcdbd16679bd51273f21b0d2d0887a3da8aeb5e0bdca0911ec7d57d9cff9,2024-08-01T13:54:28.750000 CVE-2024-37882,0,0,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000 -CVE-2024-37883,0,0,c77acb00c6918b88f907a34f95c6331dd8026d26d9df45c23ee0d7fedcbaf4bb,2024-06-17T12:42:04.623000 -CVE-2024-37884,0,0,952c4e8fbd193a9545d9e09eebd8595200777ddf3410e4c7d9e4c780747d8c23,2024-06-17T12:42:04.623000 -CVE-2024-37885,0,0,0554ded4578d680ce028ccdfb1c66cc431ad3523cf98aaf322e17a30654cd453,2024-06-17T12:42:04.623000 +CVE-2024-37883,0,1,7626a3367857543c450838d843023961ad58fb44ff2499e7c7931fd5ab11dafa,2024-06-17T12:42:04.623000 +CVE-2024-37884,0,1,e664115ebc3d9e62a2f4cd0cf06116aef2a7d566cbf93f008874f1175c726ead,2024-06-17T12:42:04.623000 +CVE-2024-37885,0,1,17f5559a85e6e9db6ebd185b566af3c7ce60a0f396cf403a1166b89dd6d49182,2024-06-17T12:42:04.623000 CVE-2024-37886,0,0,37a2c4f4d6005992267e24a61cfd186fd6016e8e0dba151502269eb8999be1da,2024-06-17T12:42:04.623000 -CVE-2024-37887,0,0,807562aba7b677b8d2f68d9073cbfd000bc9513771c2062d3001c0d0b00797d7,2024-06-17T12:42:04.623000 -CVE-2024-37888,0,0,f63e4ed922038a1a0e692f680956c6c3b87ee5df5925ad069446c44188fcef08,2024-06-17T12:42:04.623000 -CVE-2024-37889,0,0,af24d3b9b5d47c59963982b1ae499580345b9783382b436574db7cf2485e3997,2024-06-17T12:42:04.623000 +CVE-2024-37887,0,1,b37e79a679fd9102b91941b53bdc183f281fbd5b4dc7d1de4c3b5e688532b583,2024-06-17T12:42:04.623000 +CVE-2024-37888,0,1,089dd35cce5dcae3cb152eacc7c740a003a3d7c1b73414660b2199c1fb6b7c31,2024-06-17T12:42:04.623000 +CVE-2024-37889,0,1,da37cbbdfe4f834b10353e5e1d3b0eb5b3eee2fe93cb20447933b9da6ef0b16a,2024-06-17T12:42:04.623000 CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f99848d,2024-05-14T16:11:39.510000 CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000 CVE-2024-37891,0,0,ddade946d98463a2c8f8cfbb3e55e1c2664330986b4bd67bacc4915522a6cc76,2024-06-20T12:44:22.977000 @@ -254619,7 +254619,7 @@ CVE-2024-37902,0,0,914ec46cc1273d7c21c7b2dab73f39d6c3f01e86944529e46279ac98efc57 CVE-2024-37903,0,0,886576036d4d085b682af52548aacb4c341112369e14bf61e8ca80c2c202d58c,2024-07-08T15:49:22.437000 CVE-2024-37904,0,0,4a1838bfa872e93babcec91edc2a58b1f777ff60512a3a43aa04f02c821270dc,2024-06-20T12:44:01.637000 CVE-2024-37905,0,0,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad04a6,2024-07-01T12:37:24.220000 -CVE-2024-37906,0,0,50039074c68fdffb25834dcca24138147e84db83a53e367dbc3c0a463d96594d,2024-07-29T16:21:52.517000 +CVE-2024-37906,0,1,23bc5b407322dbbf80a5cdf1a67c532af0f0ddf65dd5710a88ff9eac5c51af9a,2024-07-29T16:21:52.517000 CVE-2024-3791,0,0,767a003f920bfca311025815b56da50ca1604fe6f1547763faa14f2481b1f8a4,2024-05-14T16:11:39.510000 CVE-2024-37918,0,0,6673dbc8a8909fcbe3d7fcf2914a8f9e3012ce2a80753d8813e12c06150aec25,2024-07-22T13:00:31.330000 CVE-2024-37919,0,0,c8769a1d0c82ad0e3a52e5fc9303605bebd5a9d75185a0d263d89b0fda4b5a49,2024-07-22T13:00:31.330000 @@ -254745,8 +254745,8 @@ CVE-2024-38079,0,0,cc77807b9bff64f874a9a3a465038ff584cd27415cfd11977ad7c622d6fe0 CVE-2024-3808,0,0,daebc38f28018f470d095c611a797b48d3de3196e64f610b1b2c2cf5ab2e2da5,2024-05-14T16:11:39.510000 CVE-2024-38080,0,0,0b30162da9e985ccc862a1722fa27f1aee2c43036f0821b6ab829416dc832b5a,2024-07-10T14:04:22.217000 CVE-2024-38081,0,0,9ec7a791a53b6047ba6a281b8f0ff49e361c538c20891eaddfbbb18457d24c69,2024-07-09T18:18:38.713000 -CVE-2024-38082,0,0,6b7436b8dcfb68c86b68942b9b7ff494988ec4ca4656189dc30bd653543049f0,2024-06-26T18:15:15.067000 -CVE-2024-38083,0,0,552b842d55dd05f0304793ab88ff4ed8718d07318380658c555b3ffda5c42451,2024-06-26T18:15:15.170000 +CVE-2024-38082,0,1,fb447cc25605abe223fae4a8a9e49ebb914071cd36751099dfe60ea85d4cc990,2024-06-26T18:15:15.067000 +CVE-2024-38083,0,1,574c7b760b1214413093e419b76fda7e271c511a0407cf9c8b62f22bf0de53ce,2024-06-26T18:15:15.170000 CVE-2024-38085,0,0,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000 CVE-2024-38086,0,0,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000 CVE-2024-38087,0,0,9aedc1a56c783404631df75080f4299e332d0e54e3340c961c1b9240f3ba24ed,2024-07-09T18:18:38.713000 @@ -254755,7 +254755,7 @@ CVE-2024-38089,0,0,f43516e20a67775fdb300c6589bec8c27ea499a370a6240ad0d19a7cb4966 CVE-2024-3809,0,0,e9699ccf97d1a77cdd5a51c26652206ae829b76e33be88373519642da681c26d,2024-05-14T16:11:39.510000 CVE-2024-38091,0,0,a9751e3868c0a113eedbccdcd34b91f06a8adaf90dbd1405bbcc8c2a2900f94c,2024-07-12T15:35:41.100000 CVE-2024-38092,0,0,fa52aaacdeeea4f553a80268533abc67279c4becb10c86c23506d5aee3ea5aea,2024-07-12T15:05:16.757000 -CVE-2024-38093,0,0,cc96d54215c68c9ec5ca3d4ddfd2108f852b542d23e4ec4bab8def8f97d3a415,2024-06-26T18:15:15.260000 +CVE-2024-38093,0,1,c12d7fee7c9ec397c0700ffc8424b0e6979b69ed4d950d759d543199df42a643,2024-06-26T18:15:15.260000 CVE-2024-38094,0,0,acf9b14cc18bf684a3807e3f8aab28f09790dad10479460ab41f157199bfc8c8,2024-07-11T18:27:53.843000 CVE-2024-38095,0,0,b0c4146c3c5698cffee7ab10e0a7873691f618c4c7b8c0ade94c4f51d88f93cd,2024-07-11T18:27:00.083000 CVE-2024-38099,0,0,7782db89a967b149d71a424fdb71c049e171d01d737658a72251691ef31a5e3e,2024-07-11T18:24:27.333000 @@ -254815,12 +254815,12 @@ CVE-2024-38301,0,0,334450ca56bd1074e744d5e2e9a9bf04f668e867ead0d50886a3b74cbc9c3 CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000 CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000 CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000 -CVE-2024-38312,0,0,62eb62b9d7b5ef969e29b7a666a055ad4f1c195d2f96322b61c091e6e406a8ac,2024-06-17T12:43:31.090000 +CVE-2024-38312,0,1,a339b4f0aaeac5e86f7acd496b6184eeb06251334bda2b36a88861042293fc5a,2024-06-17T12:43:31.090000 CVE-2024-38313,0,0,99d0ffe48700cf0aafe0ab7664577089c510c6757d7ad1e1517ef516a283543d,2024-06-17T12:43:31.090000 CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804509,2024-06-24T12:57:36.513000 CVE-2024-3832,0,0,6ecd5aa860c46e319de2a6d27c0fc04ebd364294784d8c73db3364d5164d8af5,2024-04-23T18:15:15.187000 CVE-2024-38321,0,0,4c61d3886acec992c983cd5ee8ed064cc1cc1f757dbee932b5f9bcedb19a14b4,2024-08-03T14:15:48.013000 -CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 +CVE-2024-38322,0,1,9536736d6bb70ac2487e83bd3e528b3e966963cb3903454d36957b4cb7cdb33d,2024-07-01T12:37:24.220000 CVE-2024-38329,0,0,515bd4f8a6975d0242eb5160bb598bf35297ce9bdbe7a3832edd58be7833ade0,2024-08-03T12:15:16.803000 CVE-2024-3833,0,0,d8bd7ba32ab0c5df93ed1bc71c84eca78bd804cb628236293c000739d365ad50,2024-08-01T13:56:42.740000 CVE-2024-38330,0,0,33b4b1d171beda816ad627337fb5495a328e7dcd46af2bf62178f6a78527c9e7,2024-07-11T14:53:16.417000 @@ -254868,7 +254868,7 @@ CVE-2024-38396,0,0,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bf CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000 CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 -CVE-2024-38428,0,0,88ab77f65d2de763959b3536063d69fbc2444cb9d53c4b7dcba71cfc1a022537,2024-06-17T12:42:04.623000 +CVE-2024-38428,0,1,51bac25bef23729cef934e2fe888cfade4bd715fe82808c067ed5708df960553,2024-06-17T12:42:04.623000 CVE-2024-38429,0,0,5e526ecd9f3601e5c2a795b29824bf852a40a8bd76e3dceab8977ec097461eef,2024-07-30T13:32:45.943000 CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 CVE-2024-38430,0,0,d1c73169d37efc71e6beb9c22a4d2028659521613b3d071afac8c89cb0341c77,2024-07-30T13:32:45.943000 @@ -254876,8 +254876,8 @@ CVE-2024-38431,0,0,0be9f62504a33e030418fc8b74d4a8787bbf1a749f4374f35827e4c137874 CVE-2024-38432,0,0,a1e180a0b0a8fd8f7d88706dd4912ad369ff83bb3e8e4b5bec3dfba07b45a8d0,2024-07-30T13:32:45.943000 CVE-2024-38433,0,0,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000 CVE-2024-38434,0,0,4a8e238d88d3486572dfa29923d4eb1c064ff172ae0f1ad768133acfd895c782,2024-07-22T13:00:31.330000 -CVE-2024-38435,0,0,fc074747bdba693aebf19b6533a755af226e02ac32a25db69b162bf4e6fcd0ff,2024-07-22T13:00:31.330000 -CVE-2024-38436,0,0,3c8e6b2ad7a88c197cd8a483287a07eeba1d97a9557b701fa638bddf72d6f418,2024-07-22T13:00:31.330000 +CVE-2024-38435,0,1,443ed766c9f1828c7340ce8e1e5ea8f41dedacb0f54d1fb72032e14d63301ff7,2024-07-22T13:00:31.330000 +CVE-2024-38436,0,1,2a0666a7d40fd9b389de8adbff2ee11921b85d211afc0554b4f25dd1a035a738,2024-07-22T13:00:31.330000 CVE-2024-38437,0,0,af3d5558f6171821fe7b56d83a7ce68b00464fcaad0f93b82569b698cf8c8174,2024-07-22T13:00:31.330000 CVE-2024-38438,0,0,358e2c9395c78cc48f79a959f0dc011aabc3bf93ca600ba6e11d2ea9dd5c842d,2024-07-22T13:00:31.330000 CVE-2024-38439,0,0,ad0547c7e13400ba841e915e1326933d895cf31912d35dcec777c79ffa2bb158,2024-06-30T12:15:02.293000 @@ -254916,7 +254916,7 @@ CVE-2024-38477,0,0,4e865b7fff5c5346863d587e484df8d5b457292ae17a1b95a338aa934a187 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 -CVE-2024-38482,0,0,7e5c35f9a3029907b1bd7a6167df57b80cfb776d99ca4893c46730f1be49165f,2024-08-02T12:59:43.990000 +CVE-2024-38482,0,1,8ee6959d7a30823b850064776bf7b0de352ea772f41670edbb7ec14c9ec45a23,2024-08-02T12:59:43.990000 CVE-2024-38489,0,0,93d5075288eb71dc5e05de45f3028a8abf40e549af9e7f74c8d90c91ab2994de,2024-08-02T13:54:55.697000 CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000 CVE-2024-38490,0,0,6064da0857e13bb34f5161ce76072357349aff2d15fba2fd034148c6aa00cdc4,2024-08-02T13:54:51.277000 @@ -254954,7 +254954,7 @@ CVE-2024-38525,0,0,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83 CVE-2024-38526,0,0,9de1edb82d6bb6115c33dfe170943d78568f85fe7ab5266f92239979ec0b9259,2024-07-24T17:15:10.910000 CVE-2024-38527,0,0,d79f673f66de487942038a941e7146b053a6ddb1c998291462a54ca077215594,2024-06-27T12:47:19.847000 CVE-2024-38528,0,0,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000 -CVE-2024-38529,0,0,8f5b71c5bb2114b6820b0185b189361e5eb4aebcbd85cc6ce5f1481a62a0433b,2024-07-29T16:21:52.517000 +CVE-2024-38529,0,1,89427744b91101a7259abd96d0f1b96d17dbdafc1c9344405bcbbba05a81e234,2024-07-29T16:21:52.517000 CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f7a,2024-07-03T02:06:45.877000 CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 @@ -255184,10 +255184,10 @@ CVE-2024-38872,0,0,dbf8cb370f3281d99398aef0cb2a514c7e42473174f976e3fef6fdbb067cc CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000 CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000 CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000 -CVE-2024-38876,0,0,1193a297db1f7d7c7792fcc8072cec0bd09795ba7e99c882bf2c8b45ff4e1523,2024-08-02T12:59:43.990000 -CVE-2024-38877,0,0,6d2edf2b15fc4b4fbdc25b0afcf1f7b3b4b644ed78e3c30b36786a6ecff43f74,2024-08-02T12:59:43.990000 -CVE-2024-38878,0,0,77a9a4f705b9c443f00f584e5d42130259f74eb98ddc5444f41269676e118df7,2024-08-02T12:59:43.990000 -CVE-2024-38879,0,0,a691b142962a262639ba37d8d4d9b36f8aca1efcb08dcc801f4956388ddf8d09,2024-08-02T12:59:43.990000 +CVE-2024-38876,0,1,f37d327b0def2e29d3bc6bc3dacba715ce6d823e45c05553176d08d7c1cd9e79,2024-08-02T12:59:43.990000 +CVE-2024-38877,0,1,3c2802af256f993e9c9b1997654b28c298662bb9ea87dfa88b885cc43cb50c7c,2024-08-02T12:59:43.990000 +CVE-2024-38878,0,1,be9ed31353c78e492c6e88a7b293166827149613fca36318236d1aede1b61afa,2024-08-02T12:59:43.990000 +CVE-2024-38879,0,1,dc3bd179e6119486737c4f1168e051931d384978feb6aaddd27b647eedd9b13a,2024-08-02T12:59:43.990000 CVE-2024-3888,0,0,bc342da7901e0094f72065e6dd2aedad38420d6e9d380693e035c77fa5fe3f90,2024-06-04T16:57:41.053000 CVE-2024-38881,0,0,067d8adf4eaa3ab63c537824b2f0ddd319bcce074e84b1d6d5608effd1f5aba7,2024-08-03T19:35:02.607000 CVE-2024-38882,0,0,237abbf9a37dde4079a1d868cb8c60184d9e59bf439eec34df86ece42bd0fd0e,2024-08-03T19:35:03.430000 @@ -255220,7 +255220,7 @@ CVE-2024-3895,0,0,f1c1a204b725be702c93f4b9fc036bb365050aae2160c5f507be071f13b946 CVE-2024-38950,0,0,22d7d74f3fd2a34d71ced28539afa875128a0351336aca0ca02490a642cb6f36,2024-06-27T12:47:19.847000 CVE-2024-38951,0,0,68f3f4da755e62c58899a1c14a3bba19a0238b69cfd8361c9d435e588ebf0c01,2024-06-25T18:50:42.040000 CVE-2024-38952,0,0,f3ef3fd79d2aa5fbb6eac9aa4ae095adbf433e668b0d02d175100cd59627c991,2024-06-25T18:50:42.040000 -CVE-2024-38953,0,0,dbde02c3cebb008392d98c40885c4b018b5aa478839fb4271aaec02242524f62,2024-07-01T16:37:39.040000 +CVE-2024-38953,0,1,09fa972a2f90ff9ced571b39bbd0f6e8c2197cf8a1aa4ddb946388a81deded0a,2024-07-01T16:37:39.040000 CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000 CVE-2024-3896,0,0,f3d4ad57a1cf51c4743b52edc7b019af4ec979be4adfcc4256aae23d08f6902b,2024-07-26T12:40:58.473000 CVE-2024-38963,0,0,d919d9d308426b636be55ca100e53822e276f721bd65a6d6c4d8ce665dba3767,2024-08-01T13:55:10.347000 @@ -255265,7 +255265,7 @@ CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59de CVE-2024-39028,0,0,9687db509e67ca899b7283535a6c24eebf7f6784e1a1f28baae3172078bffed5,2024-08-01T13:55:19.873000 CVE-2024-3903,0,0,1173acb865ab00a4b856055c98dd70060d7f57d01c944a25db26e0ac92cb735f,2024-08-01T13:56:45.143000 CVE-2024-39031,0,0,d24f6f8147beeb7e9c2d09f46b9b50d67c2b9ac54ebfd67e20353ba96152db2b,2024-07-25T22:15:08.837000 -CVE-2024-39036,0,0,8b0e3b7a757c7630c97609bf5affb9bafa3162d1af04d1ccd31492e6e46f7c28,2024-07-17T13:34:20.520000 +CVE-2024-39036,0,1,e781d3560a30ed81f55e1f7559a10ba1bf461608a8aab49c689a007f7e92fdbc,2024-07-17T13:34:20.520000 CVE-2024-3904,0,0,b47d95974559a4f3b756535a5502c34ce174362aa3e2f750b6b7a9a829cd5533,2024-07-23T01:15:09.063000 CVE-2024-3905,0,0,67966257112781442fc6e512d6c151edda862eaaff35815fcc6adec0f7a08ca4,2024-06-04T19:20:26.357000 CVE-2024-3906,0,0,a3b427119bdbbda357983f8fdd52a145484ad89b344f08b8387b1c5f33e2d6f6,2024-06-04T19:20:26.463000 @@ -255339,7 +255339,7 @@ CVE-2024-39250,0,0,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67f CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 -CVE-2024-39274,0,0,386f35a446d273078d57cd15fb88871dcb0afbac44b1ea1c4a9632135dae8815,2024-08-01T16:45:25.400000 +CVE-2024-39274,0,1,e6293a55fc2e07d4badaf0b6ab097c48e8ef50320910d51d55d3f365db2ffa3c,2024-08-01T16:45:25.400000 CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000 CVE-2024-39277,0,0,da44e9f6b14f33e5d22339f98a1af8621d431ecd39b0e0bcdb259c56dded4baa,2024-06-24T19:17:48.380000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 @@ -255401,7 +255401,7 @@ CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef261 CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000 CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000 CVE-2024-39379,0,0,eea4124c5ea93e0750c53c7242ccfa255eb0eb94ed4c7c3ac1070e74f2655db4,2024-08-01T12:42:36.933000 -CVE-2024-3938,0,0,8887ed8e5799b16c10955230ab5dda27b9f755d2347bb21346f025730ab845b2,2024-07-26T14:15:02.773000 +CVE-2024-3938,0,1,65ce7ff82c49f65d2634b6daf25e98c9672c7f84a53fd4675899c0451a398720,2024-07-26T14:15:02.773000 CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000 CVE-2024-39392,0,0,66cfce17bd8b1475fbe1823e0e269e958974fa5e662af0c38bd8aae43df2ebb5,2024-08-02T12:59:43.990000 CVE-2024-39396,0,0,35651f26387fec82c0dfb279ff129f06faad55e21497397f655b21318cdf6ddc,2024-08-02T12:59:43.990000 @@ -255635,7 +255635,7 @@ CVE-2024-39742,0,0,72b0792276cc76bab7fb041a3bdd0407bdbbf55dba99879aeb0e420b1c80f CVE-2024-39743,0,0,56ba3c78f140f47d5ebd80a82e98c5cbfee01c52fb9fdf85fab2837f5a9797dd,2024-07-12T14:15:16.487000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 -CVE-2024-39777,0,0,9c59a4ca5c53afc132f6f708f71548e2568086c7c6b09b3cc9f564c03a03a654,2024-08-01T16:45:25.400000 +CVE-2024-39777,0,1,3965e84ff8fda80cbbd102769d78a8850769b610de13e16316e68861170daf18,2024-08-01T16:45:25.400000 CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 @@ -255647,9 +255647,9 @@ CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955c CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-3983,0,0,96266c916334fb5a02e4aa53ae15055a84c8153845733e53311fdb712a51a549,2024-08-01T14:35:11.540000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 -CVE-2024-39832,0,0,9fac94de80bec92dc2e582a41fa2dea6c29c856dc8feb2c2f7a82184a52085df,2024-08-01T16:45:25.400000 -CVE-2024-39837,0,0,a582e9c620f94d04ac39120cf9379bac693229a4f1365a5f82eb563abc09dbd3,2024-08-01T16:45:25.400000 -CVE-2024-39839,0,0,17ea62983d0936a75c6127a0d241a95b3980a376b8a9bd3163069b4dc899b905,2024-08-01T16:45:25.400000 +CVE-2024-39832,0,1,6234d17b9478f93b770d730f2c819b00d4af0dd333bfbc3cf8b2152550951f28,2024-08-01T16:45:25.400000 +CVE-2024-39837,0,1,c60120742f41154fefe3eaf4e38584ef459a2d1a28dab13e5a0225dc3e52fb1e,2024-08-01T16:45:25.400000 +CVE-2024-39839,0,1,c4552c9b1ee7cea8a178134078e247b54a0ce7f628fb8b4d8589f1118253544d,2024-08-01T16:45:25.400000 CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 CVE-2024-39844,0,0,24513dbab8cf2462c08846394521d45521a891f52f216d702fb8431100a32c1f,2024-07-08T14:18:55.147000 @@ -255671,8 +255671,8 @@ CVE-2024-39871,0,0,4c929bc716eaad2bc7be57aa6156e3e19f142b088abd4467f56e72c6df250 CVE-2024-39872,0,0,7472860ceecfa76f69b5855d3979dd260f1a1dcb528a9785382e05aed708de46,2024-07-09T18:19:14.047000 CVE-2024-39873,0,0,1a658b8037abfbe3e91b7510442ac4e5e9ef0d1495c2ad87b92c1ad50704cb5f,2024-07-09T18:19:14.047000 CVE-2024-39874,0,0,14f6ca6c361900eb9cffe6fab1a9a6cec695e772018ab46292846bfaeafee4e4,2024-07-09T18:19:14.047000 -CVE-2024-39875,0,0,7360bfd27b057e62564bd92359532fb7ec6b0e60daa411b44b0868522210c380,2024-07-09T18:19:14.047000 -CVE-2024-39876,0,0,b618a8de6e7bfd8c90ec2968f20d226ce35ab815fa49f40d9bc6faad3fe37973,2024-07-09T18:19:14.047000 +CVE-2024-39875,0,1,f06ab220b3c5d00577f1c26c99fb640d2df7823378c3a5c965d6be12c6a2649a,2024-07-09T18:19:14.047000 +CVE-2024-39876,0,1,28f95cba3c7c72044d8781b88bcc8b82e0b349f00b428f9d99129b4bdb6ddc3d,2024-07-09T18:19:14.047000 CVE-2024-39877,0,0,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624ace,2024-08-01T13:56:00.307000 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 @@ -255728,11 +255728,11 @@ CVE-2024-39937,0,0,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d CVE-2024-3994,0,0,1a9bed43f4b2f43f8d685322cd3b5005094af7345fc065cd7144b7703ac2b568,2024-04-25T13:18:02.660000 CVE-2024-39943,0,0,3de3703190bb81e39ee7c36efe8f307ccc0155c112a035e437cb302295eb462f,2024-07-08T16:42:25.603000 CVE-2024-39944,0,0,de1f44b506a595a6662499e7d94a511b6d5121e7efdfcadd96a746e1beabe750,2024-08-01T13:56:03.993000 -CVE-2024-39945,0,0,a5ab3325f057882799f6f16c8783707e22aa212f95926c9733b88f6653a4d4b5,2024-07-31T12:57:02.300000 -CVE-2024-39946,0,0,2f179373246697dd329234473867196653449d635e59d77de98b0eaf26d2939e,2024-07-31T12:57:02.300000 -CVE-2024-39947,0,0,1d84caa87e18e75fae5c517d138058f673719f4f25d3cf943368dabe7c105b88,2024-07-31T12:57:02.300000 +CVE-2024-39945,0,1,016efe8f11127d24055a64c694862171837d767c0c5c6ed8678f4cc93196a3e6,2024-07-31T12:57:02.300000 +CVE-2024-39946,0,1,4a4a188acaefae77f3ab150f76fb0d9f81d61e7ac6fd6bc8974d0fe50fd6a2a2,2024-07-31T12:57:02.300000 +CVE-2024-39947,0,1,80805e63343ea3a4bb64a84b8dbe9c1530e7f2159ab58409767f1aadf46ab125,2024-07-31T12:57:02.300000 CVE-2024-39948,0,0,ee424b189b0cfbdde47c11058cfacdc178076b71067d33cd2bbe727742314ac4,2024-08-01T13:56:05.350000 -CVE-2024-39949,0,0,ef3662ee89c4eeae5cdd99aec0f4ea4943d7af6b224a072a5602dd5d440a4453,2024-07-31T12:57:02.300000 +CVE-2024-39949,0,1,92b1523f2a3a126ed9cc65192947af848f33d01f398349b5751a172588fdfb77,2024-07-31T12:57:02.300000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-39950,0,0,0a5af814b405869cb4bc1326a5d163c966c476b51ac00ace4bb3ecf06791ecff,2024-08-01T13:56:11.127000 CVE-2024-39962,0,0,88f72130b2e330c20b5ac0702cd6d158cd0cb6e08e9ed8a9d4ac60ee5a0c3f4d,2024-08-01T13:56:13.933000 @@ -255748,8 +255748,8 @@ CVE-2024-40036,0,0,6571820d2e1a1dc301c44df53b57ff0785351c2dfcb2d72964621db254f59 CVE-2024-40037,0,0,2d899b3fa53128c3e0828bae5405b00736eb922f939f2e370cb4ad0c7f6bd239,2024-08-01T13:56:49.230000 CVE-2024-40038,0,0,ecdf63429f82782f035ce89230520009ed797d648fa3a25bb6b29a0e8623d9cb,2024-07-11T15:06:19.697000 CVE-2024-40039,0,0,e210b5ff95f4cbe50930111bbfa1727a53319595db825c61fbcbca8d251a4c44,2024-07-22T20:03:06.900000 -CVE-2024-4005,0,0,c6431725b361c692c2081e15add247d989dabd0c1a3e21944208c69fc167e5bf,2024-07-29T16:35:52.363000 -CVE-2024-40051,0,0,75fd7f2906c40209756954dd66b5f5cee33a2db6630cc09e906c96ebd33a611b,2024-07-24T12:55:13.223000 +CVE-2024-4005,0,1,afa421f5bee664ced5c552a131b98509d73342abcbf2673bca51baf98e6007c4,2024-07-29T16:35:52.363000 +CVE-2024-40051,0,1,2390648c59364020ab77e3a455e0a8719e496630dfc49c594a9ca2016b775f44,2024-07-24T12:55:13.223000 CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000 CVE-2024-40060,0,0,7504692f17154526fcbd6b507446e89a200da94eac67d79678218fa628e27433,2024-07-25T17:49:00.047000 CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000 @@ -255792,7 +255792,7 @@ CVE-2024-40333,0,0,7e3d2c86e913650fda83b9ed457908dd220d08dc6d50420a52a17a80ec44e CVE-2024-40334,0,0,7c5139eedfaa7c790c86aa9490dc20d97f552a9ba2b8fc27c6c10365859ea652,2024-08-01T13:57:11.203000 CVE-2024-40336,0,0,a5b75245e4db87e4fc3263aabb369a58a472f30d7c4ce491654a7dc1d23a1d6f,2024-07-11T15:06:22.143000 CVE-2024-4034,0,0,b39ca2e444e8e083e595bb1c45cab5e2a41d75405ee52855e2d6dbb02a011da0,2024-05-02T18:00:37.360000 -CVE-2024-40347,0,0,a0e1ab7ebd1605317c59e0767be0fc2f9b4038796f9f62de544553567c87cd93,2024-07-22T13:00:53.287000 +CVE-2024-40347,0,1,de9468190b204b497ece56be99f262af1b42bf76ed7f418d30bb9f22c65ba719,2024-07-22T13:00:53.287000 CVE-2024-40348,0,0,6f13fda773d8e13c984cf3b16a2d645e0294f8f1764ff4caaca1e99b49b9dc8a,2024-08-01T13:57:13.270000 CVE-2024-4035,0,0,3bb15040ac0c3c22ceadcf3607ee680ed3a99c29170715a5693bcfb82b999cb6,2024-04-25T13:18:02.660000 CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc7852637c,2024-05-02T18:00:37.360000 @@ -255800,7 +255800,7 @@ CVE-2024-4037,0,0,835f7b633520c38dc69c5473ca883b788d7739f8c5278809ab72b10ff3489f CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cdab4,2024-05-14T16:11:39.510000 CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000 CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000 -CVE-2024-40393,0,0,9a9cff313cd70f992ba5494f376cc0670f6ad08ca64711bf1142f1c34830e20a,2024-07-17T13:34:20.520000 +CVE-2024-40393,0,1,a8fa4d9c9028d03ae4c4c88e79b3a3f12935de932122e6ff5c1c67e0a64010a3,2024-07-17T13:34:20.520000 CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 @@ -255823,7 +255823,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 -CVE-2024-40464,0,0,b8422db4e982f0469c67bbba6a962444b3b39327ca8ac025396b7630f763c990,2024-08-01T12:42:36.933000 +CVE-2024-40464,0,1,3beb82f710e64d9007f097c0d34a0e44a728096673fd034d1450c47df3b8a4fc,2024-08-01T12:42:36.933000 CVE-2024-40465,0,0,15986f29ff1e8aef63181dd9799f409f46000c95ad7d745708fb5f0091003f8f,2024-08-02T19:35:37.367000 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 @@ -255900,7 +255900,7 @@ CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 -CVE-2024-40645,0,0,91dbd6b4d5c8b714c3697263d3de268166c48fc20477a94801ca44bff83f4fff,2024-08-01T12:42:36.933000 +CVE-2024-40645,0,1,8b31a06059a494455269a3b8eb929ceb21e3b755bbaa920739df5d0b92330056,2024-08-01T12:42:36.933000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 @@ -255912,12 +255912,12 @@ CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08ed CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000 CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000 -CVE-2024-40719,0,0,691e530af0dbfaadf9d42eee18bcff61d8ff93269c868bfa7475996947c87ae6,2024-08-02T12:59:43.990000 +CVE-2024-40719,0,1,6d4c1d57c01955803a84191ed9470dd02675c198a7ec6a13aaf692a0eac74a3d,2024-08-02T12:59:43.990000 CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000 -CVE-2024-40720,0,0,707796a44376b0235e6c8acae8d7fe5a2e2a38c02111e18a369adf88afe7fb03,2024-08-02T12:59:43.990000 -CVE-2024-40721,0,0,84253f8fd6397dd8b59edb59ffd6269befe061344dec6aa23c419cbca565037b,2024-08-02T12:59:43.990000 -CVE-2024-40722,0,0,1c09f99628d2227b8496d20c3c5f9f97f7b481a5a4fdd2717619f5c7803e962d,2024-08-02T12:59:43.990000 -CVE-2024-40723,0,0,530c543ea1a6933e7992d76a8557c2152f5a9d2d1a71f736a9bc743d795e136f,2024-08-02T12:59:43.990000 +CVE-2024-40720,0,1,6c8de2020e05d63d4141a2e856c867872b6f8ff56ac9cd3eeae4a717e054bd0c,2024-08-02T12:59:43.990000 +CVE-2024-40721,0,1,b328d1bf2246376dc2bcfaf254ac8cf27e4edc1837c9304a39b544baa0b56e56,2024-08-02T12:59:43.990000 +CVE-2024-40722,0,1,06cd326bcb6684c0890c2241f4f6f40e04f887cfa28a9135b667f347d3df522f,2024-08-02T12:59:43.990000 +CVE-2024-40723,0,1,9d62d22ec78b8eb92b3797a68076ca4fda5d2d8c3d34b61c5e25d9e7b6ff5190,2024-08-02T12:59:43.990000 CVE-2024-40724,0,0,09cacd48ee026a87d6e859ad9d37ad64030a7ce90c870855cdb1fc60a150db71,2024-08-01T13:57:55.270000 CVE-2024-40725,0,0,27ddf61295cd28078b1f9de55f307855293b185f22be05b7367bb4d1ccd08bdd,2024-07-18T12:28:43.707000 CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000 @@ -256008,7 +256008,7 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 -CVE-2024-40883,0,0,0a6160f0ee76225af5bb4f01e1f39e69b18667f9149ce3e532d575bbbbc22eb8,2024-08-01T12:42:36.933000 +CVE-2024-40883,0,1,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000 CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000 CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000 CVE-2024-40898,0,0,d1dec81302f4e54a600dae87bee8bfb9655cc572e1020953c947841130b121a3,2024-08-01T13:58:17.817000 @@ -256143,92 +256143,92 @@ CVE-2024-41017,0,0,44160d90778a18bd4719a1ac1a7168efa9f1878a84217fdfb904c56d9455d CVE-2024-41018,0,0,d4686c4125645eddd30834870d11d003b93b0eb7cd35144f063aba8a093303ae,2024-07-29T14:12:08.783000 CVE-2024-41019,0,0,250099f61de5b09d0ebec4af736d18492b0d2d580ebdd5742cde1f5131cfd721,2024-07-29T14:12:08.783000 CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000 -CVE-2024-41020,0,0,319929945b896e9aaeef09637629e7f7351ffac52f1b0a867fa31608124d97c6,2024-07-29T16:21:52.517000 -CVE-2024-41021,0,0,943a6e2012f4d19bb12f3f56f00b548dd09e8afca8c55bebede9c7db4e3532fd,2024-07-29T16:21:52.517000 -CVE-2024-41022,0,0,b70902ba46fab695790146da044b6a452b0a0984b23f78ad087b5cf8bd59428f,2024-07-29T16:21:52.517000 -CVE-2024-41023,0,0,ebb07aec089183adb5d88b9642dff30a80e51569f7819458abcbcf78bd070c07,2024-07-29T16:21:52.517000 -CVE-2024-41024,0,0,fc514b66a62d1c435f71942ef880c4330692362d3b61a7ce36438a82ed9db268,2024-07-29T16:21:52.517000 -CVE-2024-41025,0,0,2952d03deaa289370d30365f93e6e6ff872b8dbdaea68f14d360ca93435113e7,2024-07-29T16:21:52.517000 -CVE-2024-41026,0,0,65b9aa4425c5fd5027af97b82d3ce0d452ab54309ebef1e0551671e7bb63bc89,2024-07-29T16:21:52.517000 -CVE-2024-41027,0,0,b611c417564d187f9eb43d0f2fe60e2f275aaeece9a2aad943634b9b1c0a4589,2024-07-29T16:21:52.517000 -CVE-2024-41028,0,0,3d309375377a3cf2af5bd102af64d14fb0d2ffd4a0d519b5607cccd52b33f04c,2024-07-29T16:21:52.517000 -CVE-2024-41029,0,0,97e3cae9ba28ccb95a25eaadadfe546aa5d8bb2ffdea6313a095b05b92982666,2024-07-29T16:21:52.517000 +CVE-2024-41020,0,1,2648cd1ea7885aa6a15ad15439ad5970c22167ebbfaf88f36d6603640a0679ea,2024-07-29T16:21:52.517000 +CVE-2024-41021,0,1,354cbc7d9ab51c39164a428765b1fe45ea16fd87b2522c5f22baa8470ee9dff0,2024-07-29T16:21:52.517000 +CVE-2024-41022,0,1,55fcdc9633a220761bf2ee0f6eec0af74a7e91fb5065f3deb58c99d51016114b,2024-07-29T16:21:52.517000 +CVE-2024-41023,0,1,48ce4747e102be8dbf6b96a23a471ccbe6850776b27384be80a54885d800aaa0,2024-07-29T16:21:52.517000 +CVE-2024-41024,0,1,a83e56d28d472d169b675cbc7079dc9f720d853f9c0fe05fe88a8ff3b3b2caa6,2024-07-29T16:21:52.517000 +CVE-2024-41025,0,1,c2ffc0923afdc6d50c51b6d8bd71c7e00bbd09e54e834785bf9af35cbe7118ba,2024-07-29T16:21:52.517000 +CVE-2024-41026,0,1,eb7a88c6e7503e12c39942286d936a0841d7b65fc7e3861b8ccd8b44d0a3eedb,2024-07-29T16:21:52.517000 +CVE-2024-41027,0,1,b0aa1b4e0a98fd9219cf8bf1c3c66e6cba578add94d4435f1336632da80a96c4,2024-07-29T16:21:52.517000 +CVE-2024-41028,0,1,d72320055098b8f5f75560debea64425145e82a31a80c39a74198a2cf1d3ec17,2024-07-29T16:21:52.517000 +CVE-2024-41029,0,1,e3bbf6c21da458eb04df49b4607159aa47a2d96b5efd8d25eb0045d5087150f5,2024-07-29T16:21:52.517000 CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000 -CVE-2024-41030,0,0,660d9475009698ada56b157831c92efd939089701b2b5a238bfc7ad3a5902efc,2024-07-29T16:21:52.517000 -CVE-2024-41031,0,0,1fc6311395aa6799a5f1937d461a05e85adbed44d07ac7f821d2270e328bc97d,2024-07-29T16:21:52.517000 -CVE-2024-41032,0,0,1b36d0b67df5105224a3734f415c774b294624ae9ca1c23db2f6665feff90c4d,2024-07-29T16:21:52.517000 -CVE-2024-41033,0,0,dc14b6c9ea0b8542015f34dcb6bcd3736baa4022d88ed11e544af0e7628233a6,2024-07-29T16:21:52.517000 -CVE-2024-41034,0,0,25aea910de911f586aec840ac27ebdd33979580fde69aa31579d0ee250584db2,2024-07-29T16:21:52.517000 -CVE-2024-41035,0,0,28ceab5be7a1a02479ea742e7c6c366fd8a9fe6bd1ffd53e0ea5250cc0314631,2024-07-29T16:21:52.517000 -CVE-2024-41036,0,0,8dc5b7b1e1223f99c6a1d70a0a9b8d500f62d13b774adddb95ced4532afb6d6b,2024-07-29T16:21:52.517000 -CVE-2024-41037,0,0,fe94b5b5a43a23913f7bceb98aa342449059370e1d3cf701b99c8c035537707e,2024-07-29T16:21:52.517000 -CVE-2024-41038,0,0,1e3632a6b15a6096a037ba5b54ee86191d03b5c894fc2a9368539518ee4e605c,2024-07-29T16:21:52.517000 -CVE-2024-41039,0,0,fdb08dc61152cd825888bc109a7c8ad9b52bbf129cd6b9a8c50502bf808c8d5d,2024-07-29T16:21:52.517000 +CVE-2024-41030,0,1,5a36c878587da908bde92e273c1cbc556d223707aaa0cd03c4967ee0dd0759ce,2024-07-29T16:21:52.517000 +CVE-2024-41031,0,1,64e996b634b250ffb433959ab7c4b74bb3c944a19a1842f77997bed6cdddc01e,2024-07-29T16:21:52.517000 +CVE-2024-41032,0,1,bdffcee999c3d0af0f74f7734a5adea9ad57e171403aa64b2fb286ff19d84587,2024-07-29T16:21:52.517000 +CVE-2024-41033,0,1,7183dfda87a717a7043cb53f856518b54b6ea87a88747e15104fc76ba2e9f929,2024-07-29T16:21:52.517000 +CVE-2024-41034,0,1,8ef7155ce0eaa8275171b9ac0813864d0797967a61f622f33157a8a24fce3047,2024-07-29T16:21:52.517000 +CVE-2024-41035,0,1,cf48df2d338e0ed99938b6805f348531b3d0c639b71dd85f792b634a7cad4d55,2024-07-29T16:21:52.517000 +CVE-2024-41036,0,1,3eb36f0b966eb35cff9222acfdc54aaaf4f85427f44e523908ded2d0342001b2,2024-07-29T16:21:52.517000 +CVE-2024-41037,0,1,03ad41aa47b3521ca726588a13b9b67807df47d603e0c2ae5f4a7855107c284a,2024-07-29T16:21:52.517000 +CVE-2024-41038,0,1,846baeab557d3551a3a4fa3b4d204920637ef62e2619819c67d5cc5dc43f5b9e,2024-07-29T16:21:52.517000 +CVE-2024-41039,0,1,3cf037a7b77611f693ccd2b6ab5e6ffc513017022cda8dfe8747fcd8d565d21f,2024-07-29T16:21:52.517000 CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000 -CVE-2024-41040,0,0,17a4aa26ff1460d90ed9214cc8daa55ff9443b2e53e9ac1a659229a251848c48,2024-07-29T16:21:52.517000 -CVE-2024-41041,0,0,bd056d9a82ee4f47bf2837011d3b9b62b8a0cc2ace2e1fa6a5b0fbc46ff72d9e,2024-07-29T16:21:52.517000 -CVE-2024-41042,0,0,c8cf0a74d056583c21e48873bd04437b93c12c5754c35ed3105b72d63c00e96d,2024-07-29T16:21:52.517000 -CVE-2024-41043,0,0,5961c2f553d18bb7a81f9952605a576b1fc006db9771da943a3ac67cfd18d200,2024-07-29T16:21:52.517000 -CVE-2024-41044,0,0,73432ecb744cbe81084f2f01352f82ba756f1cad52449f57820d331fb42c1e6d,2024-07-29T16:21:52.517000 -CVE-2024-41045,0,0,e07a4c124b05477b362f741d70f10aced13461ea39f516290cded08d2de36629,2024-07-29T16:21:52.517000 -CVE-2024-41046,0,0,4c0e4ef31db3f42892f9f26a43e58d424a26e169c491f18b48d3420cac2813da,2024-07-29T16:21:52.517000 -CVE-2024-41047,0,0,4a10ffadb30c08f4f44b2519e8d2c8614c84d0cb1544041484c02ab7d1d336a6,2024-07-29T16:21:52.517000 -CVE-2024-41048,0,0,c53fb5c9e17af6eab57b9c9abbaa4196af83252795c468f688f165b19de4325b,2024-07-29T16:21:52.517000 -CVE-2024-41049,0,0,fc94c43e4555a067073d552f3ec94ef0700c852f96beb03088ce77265095d439,2024-07-29T16:21:52.517000 +CVE-2024-41040,0,1,7c4f1d43a75af85b97ad82a0f079e37e8691141bbc74b9a4b3f13879c7076fe9,2024-07-29T16:21:52.517000 +CVE-2024-41041,0,1,ab8eb93e609adeed2082cfe6d1ff0ed5ff0c5efceab6c15685035391707daa54,2024-07-29T16:21:52.517000 +CVE-2024-41042,0,1,b28c5bd2418a5fab0825a4b2e624a979da0c25fec6a9f6127f38f0f7b7c0d8f5,2024-07-29T16:21:52.517000 +CVE-2024-41043,0,1,b1b77e33358d04690c14c1f996e40889c4620febc00184f86c3a940dcddda7ee,2024-07-29T16:21:52.517000 +CVE-2024-41044,0,1,878d95bc097489805d00cb233f5c056490dbdc48e61ae053e453855a5e7a759e,2024-07-29T16:21:52.517000 +CVE-2024-41045,0,1,4f9b30ecef6fe7c680c397b7f6b0d592a1b6c2134e83e85871afb0247283b5b5,2024-07-29T16:21:52.517000 +CVE-2024-41046,0,1,6ec412d9edd2701da7d6bb31d01670cb9af9e93db69656860626b3f5f7395233,2024-07-29T16:21:52.517000 +CVE-2024-41047,0,1,655727fdede28c56228c39cac05a4364fd999f0fa2f0928eb096d7c3821e69f1,2024-07-29T16:21:52.517000 +CVE-2024-41048,0,1,6fc9eacf2b28a789fb6b2a685321f0f921c49eb0e11496c1b1c0ffa4c70d5884,2024-07-29T16:21:52.517000 +CVE-2024-41049,0,1,92c1bb7b998a305af611ea0fb8cec280acf0ca6290c6083ab04ddb40be1411ed,2024-07-29T16:21:52.517000 CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000 -CVE-2024-41050,0,0,7fed4d8411c86765c2b1527a715efae22caa51e29f227054bb1314157efcaf14,2024-07-29T16:21:52.517000 -CVE-2024-41051,0,0,7da226a31d34b0aeaa9659db2b406bc5f865875e84c5b3d3c2bc35e15209b0cb,2024-07-29T16:21:52.517000 -CVE-2024-41052,0,0,aaace22a1bc0c2281a3be63d582a3c21c318dfd5d9c313b945e4150d2ac26d6a,2024-07-29T16:21:52.517000 -CVE-2024-41053,0,0,cfc19312835b3e8954d9f4d1ec11c6f3c1a7d5f5c7076714b0b420a13a26f55d,2024-07-29T16:21:52.517000 -CVE-2024-41054,0,0,a6171ea56269782f3c881d8291c7053c313fa430a54d53b023ff59255cf8b7c2,2024-07-29T16:21:52.517000 -CVE-2024-41055,0,0,860b56ff8fe5df9b319f097ec91dc5dd855e0fe261d6f294b33f0765737520b6,2024-07-29T16:21:52.517000 -CVE-2024-41056,0,0,6cc030ec14edd7c6135e34ea112478134d32585084d4cb7a9bb3445fc9137532,2024-07-29T16:21:52.517000 -CVE-2024-41057,0,0,4e8cafcb21e00a9f176e200f97d72375ffa610bd0f801ab5cf22475103f9505e,2024-07-29T16:21:52.517000 -CVE-2024-41058,0,0,60157a9ab374c462b600e7be69b569d0f8c7960c43580322043c14f4bbd93b05,2024-07-29T16:21:52.517000 -CVE-2024-41059,0,0,2a7ea96a6be06a6575016dc9fef36320f3170a9d4232d02cef16a6d392052737,2024-07-29T16:21:52.517000 +CVE-2024-41050,0,1,39d4269dc6ec271427b4bdd65b9d3d16d3d31b7b1303de1471509f3b60dd1681,2024-07-29T16:21:52.517000 +CVE-2024-41051,0,1,828856464b37c81ed12190c5149ddea9cdaf7edfd74019e8a2aa69fd3cf3a9ff,2024-07-29T16:21:52.517000 +CVE-2024-41052,0,1,fb3db0800f1d44ed0a114f0cf342e8bf055e8cf60f79417cdb940df6c153b52d,2024-07-29T16:21:52.517000 +CVE-2024-41053,0,1,05b22f88796697f75b7ba1ed031084f4c2c736a1a846d7c22029cc453b4f5da0,2024-07-29T16:21:52.517000 +CVE-2024-41054,0,1,54d000610420765de59a42fcd6b0218f3e2dc53e9697b03d4c5cf83c4402e430,2024-07-29T16:21:52.517000 +CVE-2024-41055,0,1,fc08c26211d07af3c2dcad0b83216832b73156ac3e22815b24d608eb8691fff6,2024-07-29T16:21:52.517000 +CVE-2024-41056,0,1,681ae471fcf06bdb78f6869758eaa87ed447f2fed56eb21007ad5f506a538998,2024-07-29T16:21:52.517000 +CVE-2024-41057,0,1,0b332216c0df842bc638d752896e0ec96cd8126714647ee3b389804ef73ec7f2,2024-07-29T16:21:52.517000 +CVE-2024-41058,0,1,0ee33bac5cd744e25820753d4e8913005b9e5fa8c84ce01c68a24f2a525111bf,2024-07-29T16:21:52.517000 +CVE-2024-41059,0,1,a3e848e0f22cf6429fd584bc8b1d0becbc43af3e8de05f6d70f42a052cdb4353,2024-07-29T16:21:52.517000 CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000 -CVE-2024-41060,0,0,c32368660a58839ba3d704e194e791b73d3aa775c69fc5ef61fab1ff62dc518f,2024-07-29T16:21:52.517000 -CVE-2024-41061,0,0,5ddb2ae27d942ca55d360580a70a2b882afdb1d336aa83cc2fc9621809fa6cd8,2024-07-29T16:21:52.517000 -CVE-2024-41062,0,0,b065194a262e2bf8bc490d5cd904e6dea060a6755181abc69696280a4794be5a,2024-07-29T16:21:52.517000 -CVE-2024-41063,0,0,64f06f622f67a5da08042853b7ce80a87d3c131f9670a1ba7c4f3c7a4452a398,2024-07-29T16:21:52.517000 -CVE-2024-41064,0,0,6229e2677ee45f5a783376828839e03bc469a9dfd8e5c09694f9929bdd42a63b,2024-07-29T16:21:52.517000 -CVE-2024-41065,0,0,87199f2308bfc7f3f524dd6bd5c7b967ada6e2a050d6b55375b21eb9267c3880,2024-07-29T16:21:52.517000 -CVE-2024-41066,0,0,f931cbdfe61ba662cf53fcc67f57d873c2e470a8f84418e7c5ee40af7985d6bf,2024-07-29T16:21:52.517000 -CVE-2024-41067,0,0,cb5042b68e81618f8be3edb46bbf4f00491047906fb585cf73d614eb02f7dcba,2024-07-29T16:21:52.517000 -CVE-2024-41068,0,0,3709de2acfd1853b6325c1eeedccda2ecd8422da9b2c959b276e6574a4955011,2024-07-29T16:21:52.517000 -CVE-2024-41069,0,0,91a2cc08c06588bf311154c898cab0c9fb7d88d2565bc1aaf48dc90ecd0ddbaf,2024-07-29T16:21:52.517000 +CVE-2024-41060,0,1,ec0fe6e11350c37a45a30d3a61b44ae7110f7091e533c89a2e06068486abe2d7,2024-07-29T16:21:52.517000 +CVE-2024-41061,0,1,c31ec4d22bacc04d92424ba2cfe5730a061114014910513b5203f859670cc592,2024-07-29T16:21:52.517000 +CVE-2024-41062,0,1,fbf24b9fd211a6aa96a9c57e6e5ee51eed4d30e0f0990ba1f54a615f2caf60dd,2024-07-29T16:21:52.517000 +CVE-2024-41063,0,1,e4ddf8fb0026c8f28f6d7d93c6ba6f6b51f6cf05a4df4cf405d518f420d57bca,2024-07-29T16:21:52.517000 +CVE-2024-41064,0,1,38bd2f5b07078a53c43ab68cf08b88abdd1fbf1876fcfc6333b8f4086de00926,2024-07-29T16:21:52.517000 +CVE-2024-41065,0,1,ede3a7eff24dc96781a1bf5c5d72e977509c87f43005d55e6aa07185f5b39719,2024-07-29T16:21:52.517000 +CVE-2024-41066,0,1,712f2f5de9d3fb46387a0ca7262d152dbfa4034bab66a5c98b8bafe2ad248bf0,2024-07-29T16:21:52.517000 +CVE-2024-41067,0,1,0efab6bb0225a9dd01a2c48c612b8c9b17f157652f45c02a997409b99216f21b,2024-07-29T16:21:52.517000 +CVE-2024-41068,0,1,204dddbf2c3055c6474c497e009d780021b3a3ba131c505449bf528ad22a3199,2024-07-29T16:21:52.517000 +CVE-2024-41069,0,1,66906a938ffa21542183270372c452da3dca88c60e17c7adf5b30603bb4e6f9d,2024-07-29T16:21:52.517000 CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000 -CVE-2024-41070,0,0,8793b9feb3227b9f765417d267690e269676f9f04cf345e55f305df0bcc72cc1,2024-07-29T16:21:52.517000 -CVE-2024-41071,0,0,bab6842f9c96cc3b9c973b0075594ef0720431a002bf0e31c982a0530505509c,2024-07-29T16:21:52.517000 -CVE-2024-41072,0,0,1c142c670f21d67ddd63344cf7bdb1c5650b355836210629bd7bc76b909cfd72,2024-07-29T16:21:52.517000 -CVE-2024-41073,0,0,77e95f81aa69befd71292dac324d2dbbe66774ad3bcc958a5ea17b16352d6a27,2024-07-29T16:21:52.517000 -CVE-2024-41074,0,0,efb94453504bfa1500406155367b2bcbe54ebc9b724aca084a02a1d1029d7e9e,2024-07-29T16:21:52.517000 -CVE-2024-41075,0,0,9fde177a4e938a7cc0573995e91f697b1d96aca84a19dda771a1779cbe935fde,2024-07-29T16:21:52.517000 -CVE-2024-41076,0,0,d07d4c698803deada67bfb911a3d88d22852228114cf1727b45c5f36775002bd,2024-07-29T16:21:52.517000 -CVE-2024-41077,0,0,535a30750dc6b44460b530296f83340c9f1f796a201ddade4c1f3a3f23c1b6de,2024-07-29T16:21:52.517000 -CVE-2024-41078,0,0,9865f20a0cf127fae86b32ef4df6b4e9090faa98e26541632611be2c1f972104,2024-07-29T16:21:52.517000 -CVE-2024-41079,0,0,cb2ef36f028a26607f8f480b6e1a637c9b800863e3843f04d520516ec0757b3c,2024-07-29T16:21:52.517000 -CVE-2024-41080,0,0,e6e02f14d8dac7c2231d6786b160038b8f2e67a1671df42ba1419f38cf71a4d3,2024-07-29T16:21:52.517000 -CVE-2024-41081,0,0,f6f7449c02dddc29c8accd1b483bdf0d71d2b6fb8d34b76b38a849abb403af79,2024-07-29T16:21:52.517000 -CVE-2024-41082,0,0,865ac7a73fce459b2d7fd7720161c59178253613de72b368058e113bd361cd0b,2024-07-29T16:21:52.517000 -CVE-2024-41083,0,0,62cbedeca2ba744a293a8a38a228e012b1ed892d6455a7b9c63b5a90b9f0af58,2024-07-29T16:21:52.517000 -CVE-2024-41084,0,0,e8f687cfc8bd278f098d5813b801977f5cfc90783673e4ae25c2484420eb04a9,2024-07-29T16:21:52.517000 -CVE-2024-41085,0,0,4232dfb7f4734ca0af85f6c532b856d12943fb709faf81eb4231d57c8b227003,2024-07-29T16:21:52.517000 -CVE-2024-41086,0,0,835490733bfe9ba64de4225b83995f3d54cc4ae4499fa0156beac4d5035ec3ae,2024-07-29T16:21:52.517000 -CVE-2024-41087,0,0,fbc3fa23e59e0fee1f6326d974d65b298a8ca8868cf99d3c83bcd9005019e37b,2024-07-29T16:21:52.517000 -CVE-2024-41088,0,0,e93ed44ba0aafe0ea9d43c17b30749dd7b4e785bfdef346998b59138f8b6b3ff,2024-07-29T16:21:52.517000 -CVE-2024-41089,0,0,74cb209324c4eaed087d1ab2eb18533dc039b46f7751e44918b5f604c8195d39,2024-07-29T16:21:52.517000 +CVE-2024-41070,0,1,f74878f11b0a9116003cda92f3c9fa33660bbbfefeaf0b9ed0d27eee664a1417,2024-07-29T16:21:52.517000 +CVE-2024-41071,0,1,177c0b40693c47d1cfe95645d274ca4f188f21ea0538c600baca1cfb2270342f,2024-07-29T16:21:52.517000 +CVE-2024-41072,0,1,9708e45d2def4fb738b5d02d9d55acf1fa8c399eb790a4b712e28e9b74f333ba,2024-07-29T16:21:52.517000 +CVE-2024-41073,0,1,9429bfd27084dc522f39499985354d00abe783b73d0a957ee4fd10df6c6ae75e,2024-07-29T16:21:52.517000 +CVE-2024-41074,0,1,f542082ddf599a04b16950f50752f817590bbf66500823b9fc1bcea6a4f3fe4f,2024-07-29T16:21:52.517000 +CVE-2024-41075,0,1,7e5f7e52455b6252728f795318b0692091849e92df2f13b0fc7d4653c500eb13,2024-07-29T16:21:52.517000 +CVE-2024-41076,0,1,c7faa6a3cfdbb9b1189e081797c747de058c18bb1d20fffc4aba1f1d0fdbdb8a,2024-07-29T16:21:52.517000 +CVE-2024-41077,0,1,624c12a81b5da2ca28754283bf1be5845da17d15a71a3309a4b7d9f34f9a714f,2024-07-29T16:21:52.517000 +CVE-2024-41078,0,1,ac799525eff030bc0944058938e2136e8bedebdc2ca1a398b3a004427e84d2d5,2024-07-29T16:21:52.517000 +CVE-2024-41079,0,1,195d83914ecf533f64d9473e7a01094e98909e6d193fb5c78da4c3efe06a0ebc,2024-07-29T16:21:52.517000 +CVE-2024-41080,0,1,b48577fc0bb363cc00e79a0e21087033f497ed2d3e85e79a6ba64639a0beff34,2024-07-29T16:21:52.517000 +CVE-2024-41081,0,1,fff01037a051da08a2263944184820fc75504da30cc90ba25587a48f6e5bdd35,2024-07-29T16:21:52.517000 +CVE-2024-41082,0,1,8c96018251a7f231d9567ce1460824d8249a158be4d0c82fcdc62e42366a49b9,2024-07-29T16:21:52.517000 +CVE-2024-41083,0,1,dff5dc6a7165d8b682758090410b05b21412e86ab2996b0805e7e8a0c1a5ecb8,2024-07-29T16:21:52.517000 +CVE-2024-41084,0,1,f925e6b8af988fbff4009df696776564d1566b9bec0a2d08e615514886466a2d,2024-07-29T16:21:52.517000 +CVE-2024-41085,0,1,2a01a626749195e58b8c5d7793aaaf03330b26d8f731e06b491ff19b65d15e11,2024-07-29T16:21:52.517000 +CVE-2024-41086,0,1,def1e72f4af73afb05473009bf28654fb55be728733d04a1cb558efe55809b1e,2024-07-29T16:21:52.517000 +CVE-2024-41087,0,1,bd15033a3cf973bd638aace7e26263a17fe38e501501b32e5f4542ad2048b802,2024-07-29T16:21:52.517000 +CVE-2024-41088,0,1,77b266b2f37d59fc76108613da24291390035f20c7c9f472230f677ce48b8790,2024-07-29T16:21:52.517000 +CVE-2024-41089,0,1,42d363fb28c0c402e3b3a26eeb72bb1828849bc65cfe7de4fdb1a253856c4efa,2024-07-29T16:21:52.517000 CVE-2024-41090,0,0,6fcac80b2a14c2c34689e44731def02717dedfe18dda82ddf5737822dbb56b40,2024-07-29T14:12:08.783000 CVE-2024-41091,0,0,3fc4e261f19779ac0e56a4e977593baaf33599d021e440beef3dc9dadc5be94c,2024-07-29T14:12:08.783000 -CVE-2024-41092,0,0,ed0ebd828ad9f6b11856710b720d1a5952409704bd9e337046bcb32791342007,2024-07-29T16:21:52.517000 -CVE-2024-41093,0,0,80c94f9704af625a5c76abdc092d5e5825e879c75a4b4da0bcb5b54710cd88bc,2024-07-29T16:21:52.517000 -CVE-2024-41094,0,0,3b7fc6ce5bf7406da253c97ace1761e2b4bd2f584976076c170e984309937fc0,2024-07-29T16:21:52.517000 -CVE-2024-41095,0,0,f82e882224859de1abafc255576e15c44e6b152c694c24f47569edd94e5f4c7f,2024-07-29T16:21:52.517000 -CVE-2024-41096,0,0,d489857270af65a71c8869e16e9156c6c6f8ddab5a965ff4723a5cbb7166dae5,2024-07-29T16:21:52.517000 -CVE-2024-41097,0,0,58268fc72f08d01bcbeee285e07076a5aa3a451cc1f952059328faf3b59a18ce,2024-07-29T16:21:52.517000 -CVE-2024-41098,0,0,0e3bb06817924b091ecd502db6e8d6b8dfedc58f44996ff13dc833ea0ac51b2f,2024-07-29T16:21:52.517000 +CVE-2024-41092,0,1,6ba4cc9e9d43c375b4a27827e9ec237140f86ae979bb409fce41de855fede6f0,2024-07-29T16:21:52.517000 +CVE-2024-41093,0,1,0d64e8910c13b044168b969bba921ca7dfdd81d34edec58275188d07470da2a5,2024-07-29T16:21:52.517000 +CVE-2024-41094,0,1,278c76ef5ca1238c19b2adc813e6cb3415611fd6af79d964f6f40f1f04f60911,2024-07-29T16:21:52.517000 +CVE-2024-41095,0,1,f244fd6ca8576a21cb7f6e12692a808905044dd2fc8132b84f6eedf5a6d0c3a3,2024-07-29T16:21:52.517000 +CVE-2024-41096,0,1,f753c653f62c476d7f1d028269b80b34585f6eb891d94690df0f36d2c3d3deef,2024-07-29T16:21:52.517000 +CVE-2024-41097,0,1,c920409ed43bd61ce66fbb67a2bc2f7c465a9ae9767076af29e351ce5c3e00a0,2024-07-29T16:21:52.517000 +CVE-2024-41098,0,1,545801a52863d7fb74ca8bb3c684f54e35c8de9c9dee55a88b00c0dc2fd6a1ec,2024-07-29T16:21:52.517000 CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000 -CVE-2024-41108,0,0,85ed787d5fdb79d2575b436efc8870a4af131f715ca3b5b9c0cb8e5676b18e70,2024-08-01T12:42:36.933000 +CVE-2024-41108,0,1,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000 CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 CVE-2024-41110,0,0,73fe8c24dc51cc9ae0d0f228bfd2d081609568fbc3ab82eb1b26156020a860c9,2024-07-30T20:15:04.567000 @@ -256245,7 +256245,7 @@ CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6c CVE-2024-41120,0,0,b416f848a357ab59e2e46c0ef3aa06a21db46db69dddef1a53ad391a28de7698,2024-08-02T05:15:46.910000 CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000 CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000 -CVE-2024-41123,0,0,baeccbcdbb406f2fb237a17f877223db4a5c4f576b55f0f9f16288ffd769c4ae,2024-08-01T16:45:25.400000 +CVE-2024-41123,0,1,8618b7a16f64f0870336097fbc285992a3f592ba239b8c1dae204e252fa5afbd,2024-08-01T16:45:25.400000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 CVE-2024-41127,0,0,000170111081b31bb4abb6f9790a2f76e15b20e1150d49e80f53a9061e25359e,2024-08-02T15:16:36.503000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 @@ -256261,10 +256261,10 @@ CVE-2024-41139,0,0,bdbde1cdec8d54982e9a23b2fe9e10007aefb60cb58693a874090f6e5b975 CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000 CVE-2024-41141,0,0,66e666e17c3fd137fec7c9da37ae1ceec042d1fec499bcfa85959d0b047331a3,2024-07-30T13:32:45.943000 CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a147,2024-07-29T14:12:08.783000 -CVE-2024-41144,0,0,378c3eba8b2a8261590a196231ea11e7797fd3556fee1f1fd49cc1e1f8752e1e,2024-08-01T16:45:25.400000 +CVE-2024-41144,0,1,beef6d47444f75a70cc53f4dcdee75e777176599a5e18a0e5bf9ea36f35cb6ca,2024-08-01T16:45:25.400000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 -CVE-2024-41162,0,0,a9ee2eeea2a89f4fbf8b44fb8fbec1a794653306c11b980b26117ad7d2cff2ed,2024-08-01T16:45:25.400000 +CVE-2024-41162,0,1,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41172,0,0,0087aeb6889d25bdcd58d5c13e74686715f9e0c8b30a01b7278dbe7dddf3fdaf,2024-08-01T13:58:23.907000 CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000 @@ -256278,15 +256278,15 @@ CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569 CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000 CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000 CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000 -CVE-2024-41254,0,0,36c275048345aafd4967cc99060f3515232aeb1f10e6cea5973173274ac0f1a7,2024-08-01T12:42:36.933000 +CVE-2024-41254,0,1,27d7c2f374106e64ca875d8bdf9e26785b8da013fe899595d0b402d9e5d8a252,2024-08-01T12:42:36.933000 CVE-2024-41255,0,0,7cc2545787669f116d3dff916e600823ce1d7be3e6c14b4dba9c7bef750d7295,2024-08-01T15:35:18.570000 -CVE-2024-41256,0,0,c34f16195b4d4bb3545971d91a4c69ca4931fba52d2eed97c0ec81a098482150,2024-08-01T12:42:36.933000 -CVE-2024-41258,0,0,96da6905de4964d9057f780018205ee750e98d2e9f0f4e3ec876179acd2f6de3,2024-08-01T12:42:36.933000 +CVE-2024-41256,0,1,1bf0b121e504fbd022f127340154e7cb8fcfb04505e0f7d02e6472303f883868,2024-08-01T12:42:36.933000 +CVE-2024-41258,0,1,76b722665ab6223e41ba7e3d8945bf1a36e3d6ce75d31b29574bb0e37bab2587,2024-08-01T12:42:36.933000 CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fccf6,2024-08-02T16:35:51.213000 CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000 -CVE-2024-41260,0,0,01a4dc383241b29475fe46da1010ab0d9b2c4fbe4e82c96a72551cb6765d5656,2024-08-01T16:45:25.400000 +CVE-2024-41260,0,1,25301b4765662f066fc7f700627e4020d9a3fbc8a2a55cd696a53ac330cf4760,2024-08-01T16:45:25.400000 CVE-2024-41262,0,0,48b0074f34ada1a302a3c7c2afcfaf4594d4fd732c8b7153c8377ab26e16ee3d,2024-08-01T16:35:11.627000 -CVE-2024-41264,0,0,7bd303f43689238f2546dde04c8a599187353210a643c685befc17f063b43b5d,2024-08-01T16:45:25.400000 +CVE-2024-41264,0,1,e43a064e1b1ff6ef8a97711f28e968b4f0e7a0ef8c9eef14ecc69844d0cf5b71,2024-08-01T16:45:25.400000 CVE-2024-41265,0,0,96664aad23c7dd63e002634cfc71189c6e2399a9d19b5373e19abde784e31cd7,2024-08-02T16:35:52.013000 CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000 CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000 @@ -256355,9 +256355,9 @@ CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db7 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9dfaf6,2024-08-01T13:58:54.793000 -CVE-2024-41599,0,0,52d9f4b1f84cdbd87aa4f03cf25826582c07238a7b945fcb5013d3d0c82fa936,2024-07-22T13:00:53.287000 +CVE-2024-41599,0,1,eb607562b4faacb5cba93d5b9c0bbc37dd670b1d974499a6671588a854a9e5f8,2024-07-22T13:00:53.287000 CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000 -CVE-2024-41600,0,0,cc0e6e793ee7a69f8fd73fe8ecb147448342f32afe6f179485c22854a24778bf,2024-07-22T13:00:53.287000 +CVE-2024-41600,0,1,c15c51d53ae94a762371dbf5dca32c6ce50f2d645e29733f7a591ad483809d6b,2024-07-22T13:00:53.287000 CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000 CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000 CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000 @@ -256365,7 +256365,7 @@ CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71 CVE-2024-41610,0,0,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1adb9,2024-08-01T13:58:58.120000 CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 -CVE-2024-41624,0,0,27591d721b6b93bb72ed8c8d8df31fac89dd525c92ee99de3b5ca8f07694b2d0,2024-07-29T16:21:52.517000 +CVE-2024-41624,0,1,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,d775534a368e8c28faf8473aa0e044dfb71629f7abbcf66e63d176e1f11c5ce7,2024-08-01T13:58:59.747000 CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000 CVE-2024-41630,0,0,1f68238b8090ad7d80fcdde7844c7b581ff0ac481c35df52ee6c6fce21a269d8,2024-08-01T12:42:36.933000 @@ -256388,9 +256388,9 @@ CVE-2024-41667,0,0,d807bfd84f5b74f1e63b53bf5062db02d2089c64840986d53e751cf99f4af CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000 CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000 CVE-2024-41670,0,0,d4de1327e25e7abc39266a562cb92a3c058d45ff783401ce0a66d0266a4c8b41,2024-07-29T14:12:08.783000 -CVE-2024-41671,0,0,c3887e08a19f6a4662d206364ee646486b6ffd74972535a505600e6869433097,2024-07-29T16:21:52.517000 +CVE-2024-41671,0,1,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b806,2024-07-29T16:21:52.517000 CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000 -CVE-2024-41676,0,0,4edd6c50f14612f7776f922c6baad3f4ffc072867d1278ee28662409b50e6afc,2024-07-29T16:21:52.517000 +CVE-2024-41676,0,1,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-41684,0,0,c04c7a72cb63ae7eeb8584b102c76882304d9bf5cb81d153e75d8ddb331bc6dc,2024-08-01T08:15:03.390000 CVE-2024-41685,0,0,93eaff307f4f8791a8e8ff304ad0c9cc6b3c2580cc14efd1e8266bfdcba69042,2024-08-01T08:15:03.547000 @@ -256423,26 +256423,26 @@ CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d30 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 -CVE-2024-41799,0,0,fc4b2e07a5edf18e2d71545043137e7f6abe0decf71ec7d6e02dec3d0f75aec8,2024-07-29T16:21:52.517000 +CVE-2024-41799,0,1,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 -CVE-2024-41800,0,0,de10ad962b669cb0e83390124cefb714c566366c680caf05af31d5cbb07531ef,2024-07-26T12:38:41.683000 -CVE-2024-41801,0,0,7a4a47d8d4dd1e6f1ffdce276bee976a7b2cf6eead2e5e4570c33554bb7cb103,2024-07-26T12:38:41.683000 +CVE-2024-41800,0,1,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000 +CVE-2024-41801,0,1,59cef218f2c3f45e1ae5cce35d644d9f081db49696f18040aa3a6645570fd734,2024-07-26T12:38:41.683000 CVE-2024-41802,0,0,996931b83535a88b71fa46477e38f2a249ed84a357be2097534d4d663d8e4fe5,2024-07-31T12:57:02.300000 CVE-2024-41803,0,0,c7d5d98c108038c70e0e22f6cdd9a348b8a9cd6951457bdb8677d859fc162104,2024-07-31T12:57:02.300000 CVE-2024-41804,0,0,1eb20b79a205e234d02bd19bc2ee6fc8b7a374c6f3282ae0ce6727f5dc603d2d,2024-07-31T12:57:02.300000 CVE-2024-41805,0,0,d25981eca346da6da343ee3e5d5d95b55972138683a74ea987fda864ae2895de,2024-07-29T14:12:08.783000 CVE-2024-41806,0,0,538c83928617c702a46380612d20226d3b25d01fddbfea7d5ac18a5a8a9114ce,2024-07-26T12:38:41.683000 CVE-2024-41807,0,0,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07969,2024-07-26T16:15:03.593000 -CVE-2024-41808,0,0,eee8cfba986a7a6e0e312c331c59644589f8c648c497985f0ce93d189bcf72fd,2024-07-26T12:38:41.683000 +CVE-2024-41808,0,1,b3d53912601ff07a5b9dfd76930828745fd2ac29ca4e0e92c0f8effab7510dc8,2024-07-26T12:38:41.683000 CVE-2024-41809,0,0,b0682c8c723c73fc1a0038b3ebbfe70590dc2b09b74a47db560984ce7762a231,2024-07-26T12:38:41.683000 CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000 -CVE-2024-41810,0,0,696be31604f96520c5e3d6fe40f564532e8b3e98f6248d68685b90ad868e4e54,2024-07-29T16:21:52.517000 +CVE-2024-41810,0,1,099a0ba0bd576293cb0ce77966a6fd680adec1ed22994792ed20d2deaa7afc28,2024-07-29T16:21:52.517000 CVE-2024-41812,0,0,605ecb75121956b18494e4f351202cd384be9d27e18d4bfd8c3bb9b7ae2660a2,2024-07-29T14:12:08.783000 CVE-2024-41813,0,0,fe9e6378fcfc8b99f2b48a607bb0a5dba88b4b1c10de034eea904d310b31031b,2024-07-29T14:12:08.783000 CVE-2024-41815,0,0,ba208e21e1cc4072b07e7947a406e2fc77ed18be9dcff08d15af01e0491d3f24,2024-07-29T14:12:08.783000 -CVE-2024-41817,0,0,38ea9f3ed02a8740a8be6535ce507f70e92ce007150f4745669bdb1425e97179,2024-07-29T16:21:52.517000 +CVE-2024-41817,0,1,c3e50103d6a8f469b4238c3f312796b0087815956d0c470348037696e81257f6,2024-07-29T16:21:52.517000 CVE-2024-41818,0,0,4db2007d5d263ef00adddd9e1d74cef5ae3a3c480a8569b96e9fc77a6bc18e63,2024-08-02T20:17:01.807000 -CVE-2024-41819,0,0,6474e18430d561541152f779524b11677a9e94ef7986bbe45d8b1431d2eb55ab,2024-07-29T16:21:52.517000 +CVE-2024-41819,0,1,f3cfe1b39605943f3a193f4927b0453942f477a28be73c97a6d2dce409e2aaec,2024-07-29T16:21:52.517000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000 CVE-2024-41825,0,0,6aad2331189a4332679fd93c0cdd3f8949299f242c1480d90e032f6f8578050d,2024-07-24T12:55:13.223000 @@ -256455,7 +256455,7 @@ CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8 CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000 CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 -CVE-2024-4187,0,0,8b8a35fca782012f11c31cffff7d95d2e2a6bd697f135f955d6b79a5a54c5ff3,2024-08-01T12:42:36.933000 +CVE-2024-4187,0,1,6e41c1b7087e8ddcfaf3801328e1ee1bd29a767b33bcf1748327754d0e784ada,2024-08-01T12:42:36.933000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 @@ -256465,29 +256465,29 @@ CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000 CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000 CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000 -CVE-2024-41926,0,0,3aba702ad8183262ea062b2fe55bf7a7beb92176ef89fa894555ebe42ef0c355,2024-08-01T16:45:25.400000 +CVE-2024-41926,0,1,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000 CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000 CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000 CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000 -CVE-2024-41946,0,0,27fff074b1dd013bcbc850e46c1eceda1afa83a48151d2363cf80c21065e8a56,2024-08-01T16:45:25.400000 +CVE-2024-41946,0,1,c52c7facc60e4f3a9ee8c47105e340c262737ef60ffcec357a602905ad66b349,2024-08-01T16:45:25.400000 CVE-2024-41947,0,0,489889ea045ed7e83ddaa8e74cc5bef9c95d6933aa19a93d66e14365f9a47770,2024-08-01T12:42:36.933000 -CVE-2024-41948,0,0,54bd430ad51a630917a71b989ec45a05b11a899acae2774ead0b3a191dcff5da,2024-08-02T12:59:43.990000 -CVE-2024-41949,0,0,b3af4e354f26f4a3637188cc8805bf93abfa7c63ae77ff1fa7b4f83424d37420,2024-08-02T12:59:43.990000 +CVE-2024-41948,0,1,e90a19ab93ad33c5794018ff4b016f6e9aeb25eb75b9c412e7896e22d2c2d995,2024-08-02T12:59:43.990000 +CVE-2024-41949,0,1,0b4452421e4bb126d86ca20a2699785f6179b7a8ecd9896b2dcb14a96f515b9d,2024-08-02T12:59:43.990000 CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000 CVE-2024-41950,0,0,cb384ef22df022e960189f7f7e44ba5570748379fe4c550a69c77cdcfc6aec43,2024-08-01T12:42:36.933000 -CVE-2024-41951,0,0,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1a8e,2024-08-01T12:42:36.933000 +CVE-2024-41951,0,1,491bf4f02264efa2a3916557e5a2ff361ed981abbb889b96a7fa49114a1810dc,2024-08-01T12:42:36.933000 CVE-2024-41952,0,0,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000 CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000 -CVE-2024-41954,0,0,7e1c97c50037701afdb107f0bb75f0db274cbe7f87c9535fe2f1a7188b860ff2,2024-08-01T12:42:36.933000 -CVE-2024-41955,0,0,205a6735d12138019ffdd3553fd1e252eadb16e3a5329794c0b97ccb4d1299f3,2024-08-01T12:42:36.933000 +CVE-2024-41954,0,1,93352fab81d54ba7d01179899803c8640d36e5f65730e1a9dce8a0309247dc87,2024-08-01T12:42:36.933000 +CVE-2024-41955,0,1,5cc7c41b3793b9bfbfffe5ce80cc2ba3b224b9e2e273665abd77af2754fbe18c,2024-08-01T12:42:36.933000 CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000 -CVE-2024-41957,0,0,62a686a9e799f4d25642e880d5617481cc55e70c7e8efded09671853d833d697,2024-08-02T12:59:43.990000 +CVE-2024-41957,0,1,6cec11ed397a63c2089d6f43e54fda609eed3700b56505b26d7c31e16a62a695,2024-08-02T12:59:43.990000 CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000 -CVE-2024-41961,0,0,65108f8670dab087c8156e9dd2489faee3d6510d82e45d5fa62b4089cc95a2b1,2024-08-01T16:45:25.400000 +CVE-2024-41961,0,1,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000 CVE-2024-41962,0,0,a42e5c6a5a1b3aff5b6cba30b7dbafa96411265920aa021d515ff4195ac31125,2024-08-02T12:59:43.990000 -CVE-2024-41965,0,0,77a600c40f11dd3bb169da2a9579f4057c604878907e06b7994dce2cc27b286e,2024-08-02T12:59:43.990000 +CVE-2024-41965,0,1,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936838,2024-08-02T12:59:43.990000 CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000 CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000 CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000 @@ -256507,7 +256507,7 @@ CVE-2024-42053,0,0,a6062e6a4bcd11b760655238c4a48736a58caa8e1af15eed073e37dfa3063 CVE-2024-42054,0,0,7cefcb5df710c5d52c7b44743e7320cbb773b7864f3adff97191d41734299500,2024-07-29T14:12:08.783000 CVE-2024-42055,0,0,38832abf63aaabdc907feb9726d6725f630aba764b55549d89c565bd77d3378b,2024-07-29T14:12:08.783000 CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000 -CVE-2024-42063,0,0,b79fa6aa08c846471acf77f3dfbf57119b631126c398ef36dda54a714ad37725,2024-07-29T16:21:52.517000 +CVE-2024-42063,0,1,ab1fc80f4d5a337fc787a5927c5a2799f0f954cb8192994c0bb80d8c74f4b1de,2024-07-29T16:21:52.517000 CVE-2024-42064,0,0,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000 CVE-2024-42065,0,0,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000 CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f9751ee,2024-07-30T19:02:32.857000 @@ -256602,18 +256602,18 @@ CVE-2024-42149,0,0,649ede760b2b7270506bd2e8f6e94a8f5d04fb5a4016b73e8b26514807ad0 CVE-2024-4215,0,0,9e7e3a04514a4f3c8325efbee683d76ee50f1989bb723741735a5cc60f766fa9,2024-08-01T13:59:27.703000 CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad32d,2024-07-30T13:32:45.943000 CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000 -CVE-2024-42152,0,0,c163a59ce677eb32db9641351d1f6f413c4ffb92aea153eb86185ed0d6ce326a,2024-07-30T13:32:45.943000 -CVE-2024-42153,0,0,bb8a7ceaf2f8b37a8d3f7eb050e0272909cfea237255193cffbfa8e67d5364a0,2024-07-30T13:32:45.943000 -CVE-2024-42154,0,0,ac1e5ea19fc9191c2385b6a560a85070850c8b7c44dc74fec8d4c337a35c0259,2024-07-30T13:32:45.943000 -CVE-2024-42155,0,0,649cfcf5f94dfd0539ec06ad7e29e5491392c15014c88ec48dabfd87e510b886,2024-07-30T13:32:45.943000 +CVE-2024-42152,0,1,cf7897733bea0728a109fc5e6bd10f12dc7e878ac6bdef95ec146d648e8c50e6,2024-07-30T13:32:45.943000 +CVE-2024-42153,0,1,0465b75eb4ad67223ef39c0739fecb9c856eb8c91ec6c9984d8d2985a3310e3e,2024-07-30T13:32:45.943000 +CVE-2024-42154,0,1,d416af6795b48e43f1a1c8940ad0d35468a0d12993b2375e6c6034cd5a1c934a,2024-07-30T13:32:45.943000 +CVE-2024-42155,0,1,3c5c132dfa3d8fc2716ad525960ef85ad7bf6a714edaf72c82d542c3f61e5e8e,2024-07-30T13:32:45.943000 CVE-2024-42156,0,0,3e3b593a088f7c0fa294387fa1377c62b099a10750cb61c9f552055051d6684b,2024-08-02T14:31:53.660000 CVE-2024-42157,0,0,5125f5bae216026101436b8ffee5dc883ebe43267cdd74d06d29261ee37e908f,2024-08-02T14:31:28.107000 CVE-2024-42158,0,0,f708fe0c9b8afdea7e816433ff8d7e695756b23c2951cd3e7d51dd4aa0ae2367,2024-08-02T14:31:04.187000 CVE-2024-42159,0,0,ddb54cf3e23058b0cc94c2454029ec74eccf92e763ca85662f68c5080c1191bb,2024-08-02T14:29:46.240000 CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000 CVE-2024-42160,0,0,99059c88b605f4fa1bbf18da91fe0a3527191b8f257bfef3a73d85473c482ede,2024-08-02T14:29:26.330000 -CVE-2024-42161,0,0,9fcf740171f87f28186bab23327bb17213289dd63e15061d3ffa98bf7d337652,2024-07-30T13:32:45.943000 -CVE-2024-42162,0,0,262dd2df259e037f321ec8a8f04347f229615a9b174bd5f9a755bea1d4b8e483,2024-07-30T13:32:45.943000 +CVE-2024-42161,0,1,add7e30624e9f99baf1c87fbef22efd07168cc54b2e7337b28e1c527601d3e7e,2024-07-30T13:32:45.943000 +CVE-2024-42162,0,1,c90c401e51945f896794a5911a0c81f87029d900d37eddae6df24e29145f49ee,2024-07-30T13:32:45.943000 CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd60693,2024-08-01T13:59:28.453000 CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000 CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000 @@ -256655,7 +256655,7 @@ CVE-2024-42458,0,0,5eafccd5df7bef970438ac1d03b619e38f022d674e8b177e990312669bca6 CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff193,2024-08-02T15:35:44.213000 CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000 CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000 -CVE-2024-42461,0,0,724b2ef769a0dcc36d1dd9379ccad27d21381d75ae133afdfc49b77ec65d1a39,2024-08-02T12:59:43.990000 +CVE-2024-42461,0,1,6b06bbf04b7d8f786c095f1c15331d4a3d16814680cf8d838fd5f72c310b320b,2024-08-02T12:59:43.990000 CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000 CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 @@ -256795,7 +256795,7 @@ CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000 CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000 CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408fe2,2024-06-10T18:06:22.600000 -CVE-2024-4404,0,0,b2ea9ab0ea31a15b40318ebe976f0751d3099071fe47e6a81493f58d308a68ee,2024-06-17T12:42:04.623000 +CVE-2024-4404,0,1,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000 CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000 CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 @@ -256858,7 +256858,7 @@ CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c0 CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000 CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000 CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000 -CVE-2024-4480,0,0,f67562e05d6ec09870268aa7f7fb2c1f10d5ffdcd82e1a66baa51eee0cc1551d,2024-06-17T12:42:04.623000 +CVE-2024-4480,0,1,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000 CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000 @@ -257362,7 +257362,7 @@ CVE-2024-5056,0,0,e1d03c88d872cdf904f996ddd0c44a42c46c29f4f47c658c86206a3f64af2f CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 -CVE-2024-5062,0,0,c4bfd24b428765fb9ddf19e7205629f5a96898980bd431291729b4911f485626,2024-07-01T12:37:24.220000 +CVE-2024-5062,0,1,78f2bfeb3a24fd55e50e85deafb66d73fd5459a887051a3f963aaa1316e5d806,2024-07-01T12:37:24.220000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 @@ -257608,7 +257608,7 @@ CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b CVE-2024-5339,0,0,f1bbd379636cfad5e34ec0ced69571115fae96e9b2078934f8d5d54e609ed8df,2024-06-04T19:21:05.273000 CVE-2024-5340,0,0,546c56f2649b42bddc6aa9959f384e4ae23101ba059a7107ea7eadf7da74c09f,2024-06-04T19:21:05.373000 CVE-2024-5341,0,0,40f4ad179dcb36606de702fcfb61368c761e9a979db8ddd9beb5e39827e7a792,2024-05-30T13:15:41.297000 -CVE-2024-5342,0,0,09b9ac961d9727e38cef78b4477d3b46ce9c0406a011457327d7c1dceea8f833,2024-07-23T20:20:19.420000 +CVE-2024-5342,0,1,0ee74532f3aa2980f7ddc7758d6a9df8255f57d3171a653c846b4326dc715168,2024-07-23T20:20:19.420000 CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b44,2024-06-20T12:44:01.637000 CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000 CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000 @@ -257719,7 +257719,7 @@ CVE-2024-5463,0,0,4d43b352cf9202f80c2f04ee56f4d6c5363c98e3eebea680338a85f124fca3 CVE-2024-5464,0,0,87d260a13f52f3a01db81247aa60ad8629b4b67f72e7ca5812703b2de9e3fb0a,2024-07-16T15:19:27.493000 CVE-2024-5465,0,0,c54306dfcc71e50bcd77c603fadee0b02af76d4cc30340f017524a72c7deac1a,2024-07-16T15:19:04.987000 CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7fb,2024-06-13T18:36:09.010000 -CVE-2024-5469,0,0,5ac6e5bbb985b1f56a24d83448848a6f9d47ec5d1570dbff766b29523f5e59ca,2024-06-17T12:42:04.623000 +CVE-2024-5469,0,1,46c8a499fa636742fbb93fee21ab2103d77152f8b40e8e1d922bcd71f8fa1da9,2024-06-17T12:42:04.623000 CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000 CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c69c,2024-07-18T14:09:17.740000 CVE-2024-5472,0,0,cbeafb08776655e35d6e47fe8a75d08cb39135639adca55be0cfb4cff69e0ec6,2024-08-01T13:59:47.140000 @@ -257750,10 +257750,10 @@ CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345 CVE-2024-5503,0,0,1cb7ec9812df8ec09d21a8b50ab54c8421f9f9a3696399f8cf01057ff5629e64,2024-07-17T13:53:37.643000 CVE-2024-5504,0,0,c9387f8cc727d3178a2e16ac3c8996c4ce5ec1145aa8a5124e81e8cb3cf535a8,2024-07-05T14:46:38.860000 CVE-2024-5505,0,0,1c3992bc63f7227d162e21046bb65e254ca8028b79f3c4549059f0cdf09e2564,2024-06-07T14:56:05.647000 -CVE-2024-5506,0,0,36eb3efa9638c266f250e6b2a9c026701090c3f06543d26a76940258ea3a1f9b,2024-06-07T14:56:05.647000 -CVE-2024-5507,0,0,28f0a857d2506fdc29d2328f5111f55a9fcb4dba9e7215e6286863567494493d,2024-06-07T14:56:05.647000 -CVE-2024-5508,0,0,c76170c7e704d218c9287a1ae3e31247d5d64a8a1ff9915ae4aab704e3ca9af4,2024-06-07T14:56:05.647000 -CVE-2024-5509,0,0,2266e74d94fdcf13d93b272105db1a7c12771180b9a238fb072983f61e291500,2024-06-07T14:56:05.647000 +CVE-2024-5506,0,1,059eb66660a4387c955fd762364c59614302e662ed74f9d09ad6db69402e0997,2024-06-07T14:56:05.647000 +CVE-2024-5507,0,1,ebb02809f724df1febd22d03488812a4eb51e3b6ab6298a26521ba547b07d7bb,2024-06-07T14:56:05.647000 +CVE-2024-5508,0,1,be19584843ec25cf9689ef2ec80babdecbe55dbfa4f634446c58da87398fdb75,2024-06-07T14:56:05.647000 +CVE-2024-5509,0,1,9158515e07c008dec1c4172eab74eedf6b034ac05200ad482484eb407fccdd2d,2024-06-07T14:56:05.647000 CVE-2024-5514,0,0,833e991f0e6be90b2237e59745237181caa44e2bd9d3a544d7919a263fb2690a,2024-05-30T13:15:41.297000 CVE-2024-5515,0,0,4678a2be8c70b7477a92ff0be2440ca33d4803d8173344aa517704fd754394de,2024-06-04T19:21:09.717000 CVE-2024-5516,0,0,d9e4106066ccff650b208a23a361cef7969f556246b95e24218cffd8f065e4ba,2024-06-04T19:21:09.817000 @@ -257924,10 +257924,10 @@ CVE-2024-5735,0,0,5164f7c1a233150ee53341ccee6b477fac348115ef4d5352757fe303df2f5a CVE-2024-5736,0,0,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d0d,2024-07-03T15:46:08.877000 CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000 CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca454,2024-06-13T18:36:09.013000 -CVE-2024-5741,0,0,598ae2049072e1c2a3df1e983119a3b149c1d2d0666eb71ab5fdb900f4e38254,2024-06-17T12:42:04.623000 +CVE-2024-5741,0,1,6d324202e2efceeacccb12535a95801d87a66a1fe04ee84089df7f4c9fe71009,2024-06-17T12:42:04.623000 CVE-2024-5742,0,0,fb1a8c1252ee22cc610fe8ff09c119041e84ac15850fc2d3efcf49cef978035c,2024-06-17T12:15:49.850000 CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000 -CVE-2024-5745,0,0,dff05d6623c183c983d17145ccb68bed448b0bc79462e5e5f54dc4238cbb2935,2024-06-08T04:15:10.027000 +CVE-2024-5745,0,1,cded5ad41ef6333d80951aa3faa1a62096911219d310580ac748c5b446823d1c,2024-06-08T04:15:10.027000 CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,b021056a2386bbaab3004cd237916090181697c8a0e20dfa0ef7d94a29a0eb73,2024-06-27T19:25:12.067000 @@ -258029,7 +258029,7 @@ CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be2561502 CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000 CVE-2024-5882,0,0,9790fb22da231882b81afb2259612f6848f747553cc5560caa274dd01996ad4d,2024-08-01T14:00:04.947000 CVE-2024-5883,0,0,d6a370f6079b934cdc983b97c847b09fbc2fd364cbab75a4154dad04b870dbf6,2024-08-01T14:00:05.160000 -CVE-2024-5885,0,0,4946e96abf9096ba44688feaf0b247be9bc7227d3f0040d31298fc7792a9ccc3,2024-06-27T19:25:12.067000 +CVE-2024-5885,0,1,b5614d391dddc0e9ee0cd01b27ce132c017dd0bcdbf8ef98ef36b8b2bea3e0a8,2024-06-27T19:25:12.067000 CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000 CVE-2024-5889,0,0,fbcff794637f48a8b78c74fdd2956f49b1e81babb06e13aa124ccff6d03acd89,2024-08-01T16:50:43.603000 @@ -258040,7 +258040,7 @@ CVE-2024-5894,0,0,81bb1adaca5810670b3e36a8c8668070a8b09d1407d3ceff602a173d0dbbb0 CVE-2024-5895,0,0,2916af699ccfed36af03962ad095469de585069a42ae36c1a8c03f4f2cd233b9,2024-06-13T18:36:09.010000 CVE-2024-5896,0,0,543a9739bb7994a5cf7a44d8a031ddac2c68327e324b7d90a0e38059960eb029,2024-06-13T18:36:09.010000 CVE-2024-5897,0,0,7705294a726132fe76b260cca78d94d4cdc2b24feee8f8352eb858eb73b1c164,2024-06-13T18:36:09.010000 -CVE-2024-5898,0,0,0d43a32ea8127bc0ab1191832cee4a9d60038575841f8992bc0a9c66154d3c87,2024-06-13T18:36:09.010000 +CVE-2024-5898,0,1,0514997e9a16e932b4bae6c16e61e0724aa85046156dacb25935f77f1e43af81,2024-06-13T18:36:09.010000 CVE-2024-5899,0,0,9a50f1672a8f19c78e5991e440d5a0c2d46a5e3e821843d3d776673ac7766d57,2024-06-20T12:44:01.637000 CVE-2024-5901,0,0,c7025d21d7cefd8a737ac6a16c68fff1a0fe38b52cd112c652dcfaf982c97225,2024-07-31T12:57:02.300000 CVE-2024-5902,0,0,7888af9d367c2dddb4d6f8ca0d5bee140123446fdb703c2c12cdc94e6e9d8ba4,2024-07-15T13:00:34.853000 @@ -258054,13 +258054,13 @@ CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000 CVE-2024-5913,0,0,e09fa300f42c3066d0a6d6e758e3f3cfea839eecb0d836963ee331dd9715d64e,2024-07-11T13:05:54.930000 CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000 -CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802bd,2024-06-17T12:43:31.090000 +CVE-2024-5924,0,1,5e3ff1a9d9518c557ed5168c87e0fdab65bac252833de925901af21dfaeaa6cd,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 CVE-2024-5926,0,0,c0270df40bf1e286ad8957d3baf72bffff8cfb079896c2cd70dab328142b04f1,2024-07-12T08:15:11.797000 CVE-2024-5927,0,0,1b7b6c83db008ddacf60314208106fd6b62f6e315f688ea9bb13e1efdd6d20e3,2024-06-13T11:15:48.917000 -CVE-2024-5933,0,0,dfbf434bb07744648ac908bc9867da003fd9e56f6e178394dc18f029bd062412,2024-06-27T19:25:12.067000 +CVE-2024-5933,0,1,6758af0b2662de653aa95051fa19ece2cb88da72e8efd4f694bc468beddcf48e,2024-06-27T19:25:12.067000 CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000 -CVE-2024-5935,0,0,6d97b174f0f692842857ee253423340b8d343c7c0734cf88836fdbc1d2e3e341,2024-06-27T19:25:12.067000 +CVE-2024-5935,0,1,a7d5b6247499f12d315c68e24ef40626cc2368303f6af76cae9629f3161ce437,2024-06-27T19:25:12.067000 CVE-2024-5936,0,0,e2323b28e2dc5842b2496ff11e24a4c05c687e44cc94008f23990b03437dd0e3,2024-06-27T19:25:12.067000 CVE-2024-5937,0,0,51e02db0c012e8abf29c205fa293326baf9f1716cc7d665366a7580a75792510,2024-07-09T18:19:14.047000 CVE-2024-5938,0,0,cb9458c48aba8db651d9dffddd7092d96350e7e331bc06e4be8ccddeb7b09d02,2024-07-05T14:25:03.107000 @@ -258068,12 +258068,12 @@ CVE-2024-5942,0,0,113cc7beeb08d524b60a394c0c59242af2ffb5f606d529aae03da21992ee2f CVE-2024-5943,0,0,43d6e7eaee5cf473c82f61329f5b629440390732fa8dcc1ef57a07502bd93742,2024-07-05T17:22:13.547000 CVE-2024-5945,0,0,a8ec237fbd27a5c84c4e08640ab34c25a666ff13a56d8ff8f5f6d1f86ddcb89a,2024-06-24T19:24:00.433000 CVE-2024-5946,0,0,eda339fb530ea9d144964218d587b435b3cb13f3a03c0fa86f823875ae12fdf1,2024-07-09T18:19:14.047000 -CVE-2024-5947,0,0,9a67ed26259461ba4e70a87541f7e7bde85c50b43ee7c51dcac934aae4d86906,2024-06-17T12:43:31.090000 -CVE-2024-5948,0,0,d8abd7168591c872add4fd6bda4fc77c3a96545894a25874d899799740c2f69f,2024-06-17T12:43:31.090000 -CVE-2024-5949,0,0,abbd363668467b9342a22f19937ee5ad6e51f49725199cf879868647c6b9cda4,2024-06-17T12:43:31.090000 -CVE-2024-5950,0,0,f76126ed5e60b36ff8480eeb6486ab37e697eae94f09ed6af8196b8262740055,2024-06-17T12:43:31.090000 -CVE-2024-5951,0,0,87f5fac47828e74edc8ae8030b14b1def8ed1d32c8b04f54af8ec2228918d192,2024-06-17T12:43:31.090000 -CVE-2024-5952,0,0,87a2f2171e04409846dc1561f9a973913ea91bdc8a79b11f6db8efb325779e15,2024-06-17T12:43:31.090000 +CVE-2024-5947,0,1,67f301076cb6b570fbf6a1f2f302362aed8706a4241e93a89b86d9d5fe9d1462,2024-06-17T12:43:31.090000 +CVE-2024-5948,0,1,aa417d9a67c33e2f2ad2497e6f5d511644bf2e6a5306efbf2c438240ec7e335b,2024-06-17T12:43:31.090000 +CVE-2024-5949,0,1,7d2d499986fdc021a0d3f52d8d5ff0edd15a9cdad29acd75a4b272151e86cc2b,2024-06-17T12:43:31.090000 +CVE-2024-5950,0,1,738393b4a96c1f28fd2ffb54d3722d33f5eacee4372e02132279733830e65ec8,2024-06-17T12:43:31.090000 +CVE-2024-5951,0,1,e2c5ddad0b1d08ae1de4abdf18fd5602aa900df4a0ec05b88fd524e1cafbf001,2024-06-17T12:43:31.090000 +CVE-2024-5952,0,1,40ebe85d8c64c07bc3dba0083fe28d8cc2f7bdd89fd4e4bd7a8b15ba99af4aac,2024-06-17T12:43:31.090000 CVE-2024-5953,0,0,ff84fe3aa628f2c6f67eb8babe4492f2b26345414352447d21a924e1940b62f9,2024-07-18T16:15:08.153000 CVE-2024-5961,0,0,458be8cb6fdb0d558a4d51d11b5f294250dd9695661afd805b88290bb2df249d,2024-06-17T12:42:04.623000 CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71e9,2024-07-18T12:28:43.707000 @@ -258131,16 +258131,16 @@ CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039 CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000 CVE-2024-6039,0,0,f8c984250d04a7659b926b5f5e3b365c15c8af8d222ab387cdb752767559d964,2024-06-17T14:15:12.620000 -CVE-2024-6040,0,0,583103cc16ef1ac9f7463a6f074659ad02e9fb3db18046dbe635a0d454781add,2024-08-01T16:45:25.400000 -CVE-2024-6041,0,0,b43af224078e126a0828a02d26a4aa248fddef58b3f38b0ead69dff5d3c53826,2024-06-17T14:15:12.733000 +CVE-2024-6040,0,1,6a9c4144365634994ba43a8add9c13dbdf1bbd1570489b8639d9e032f2336e4e,2024-08-01T16:45:25.400000 +CVE-2024-6041,0,1,0bba41a7973df28ebdaef99f4f4bb154528af053016671ff9df5d8dd516a53fb,2024-06-17T14:15:12.733000 CVE-2024-6042,0,0,8aeb993fe6979be9c567452d4d33791380e98a9ad6d703b5e29eea21301f6d67,2024-06-17T12:42:04.623000 -CVE-2024-6043,0,0,9a8214fcd16bf01d325c97e688ae6245e010f64d01a5df33ef8c749a0d5352d3,2024-06-17T14:15:12.833000 +CVE-2024-6043,0,1,134d97ce84b44f4b35faf92e34e089d208422ab36351d068a836626bdb7ccb80,2024-06-17T14:15:12.833000 CVE-2024-6044,0,0,4f21043ce144607b18656c689e724820f609703d237d24dbe17227d3f52b49e9,2024-06-17T12:42:04.623000 CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee94266,2024-06-17T12:42:04.623000 CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000 CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 -CVE-2024-6050,0,0,af0f9fc577c3e44fa6616ba0473858c6a88d9ea48cff0078f9cf415e610d9fc1,2024-07-01T16:37:39.040000 +CVE-2024-6050,0,1,fd028ccd5dbbb52fd62ce5cf61096dcc35b49e2bacbad5bd90cd713d5568adf3,2024-07-01T16:37:39.040000 CVE-2024-6052,0,0,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000 @@ -258153,9 +258153,9 @@ CVE-2024-6061,0,0,9fbdc13d40c52cd3201ba4dbc85806265bcae7fe430997057864a0abc50a97 CVE-2024-6062,0,0,93dbd09d82a9c090799896e27a01f38efff42cdeec70d50228105cef0f88fcb4,2024-06-20T12:44:22.977000 CVE-2024-6063,0,0,bc31baa414c7130817af75aefc4c93d5c50e0d49a263847622e8e121134c5d33,2024-06-20T12:44:22.977000 CVE-2024-6064,0,0,3370149dffce37c68b93ba4d92c68f6dbfa595c6fecab2312ed9b990710fd435,2024-06-20T12:44:22.977000 -CVE-2024-6065,0,0,548e8e867c04e79878c430ada31323fc36976f485c950db4630bd23910f1b815,2024-06-20T12:44:01.637000 -CVE-2024-6066,0,0,cbf8936592610ae34f4b5bf7fb4818686f988ed15a558bfd2730cc7024fe976a,2024-06-20T12:44:01.637000 -CVE-2024-6067,0,0,596738069000cc0464260f732fa90b4426b6499980be7c9c05f741f30f52c3b4,2024-06-20T12:44:01.637000 +CVE-2024-6065,0,1,514bd9f9f4a3613b94bc7bfb084d907ec74ed34501cfb3e4a683a0b50d6afe06,2024-06-20T12:44:01.637000 +CVE-2024-6066,0,1,a06c9fc8db7eb13dd621ace2d752d99df40755c9b5b91f1efc8bbc9b6de30b09,2024-06-20T12:44:01.637000 +CVE-2024-6067,0,1,1e6b129394b13ed508cc25c73753e4a7c09d825658c089c51e19bb31b1ffc20c,2024-06-20T12:44:01.637000 CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000 CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000 CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000 @@ -258167,7 +258167,7 @@ CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f7 CVE-2024-6080,0,0,9ad80ebfe8b856e46a0a6652807c607b3ca5adc92bd23988173663f4819ac96b,2024-06-20T20:15:20.583000 CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000 CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000 -CVE-2024-6084,0,0,cc27580ea7e10d365cbd9adb83725d32523f524a0ffc648adccf2cb2555fef66,2024-06-20T12:44:01.637000 +CVE-2024-6084,0,1,06b281398f86ed81b091427e75b7100073dd1dfd003da38e7de1b912df60ef63,2024-06-20T12:44:01.637000 CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000 CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000 CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000 @@ -258184,10 +258184,10 @@ CVE-2024-6103,0,0,5e29bc37d9d7a304c867024ebdb6c9635d505e152b36dfc1b31a9280adb1e2 CVE-2024-6104,0,0,108534f982ecedc8e18a75e604642b0e40fef80fdd2c5d6c473bb0683c303507,2024-06-26T17:19:40.850000 CVE-2024-6108,0,0,8dcf8c978ffd08a68470779b67afcba2ef4b72c9a7a6acbd6d0451b159e2f4f9,2024-06-25T18:15:11.730000 CVE-2024-6109,0,0,bb0e3455a169d6bebc9d8b88e9df5fdfc40e2e3982d9fbc581f71bdf8363e7cb,2024-06-20T12:44:01.637000 -CVE-2024-6110,0,0,8b457624986cf22e0fffeb8d8047035eadffa5014f7fdcd76ad7d8ff4689cff6,2024-06-20T12:44:01.637000 +CVE-2024-6110,0,1,50ef215f8e6157854634fcfeb971b8c496415614205b190cacac31c6923eeaf4,2024-06-20T12:44:01.637000 CVE-2024-6111,0,0,98763a9958bd86a666bf14e0feaaf6fc585400a69f10e2d292b840aca2e315e8,2024-06-20T12:44:01.637000 CVE-2024-6112,0,0,b1e6c0864e0ebee4a0a8c4638d7eeba1ec17f68eaa1c8ef1caada2a1fabb05a0,2024-06-20T12:44:01.637000 -CVE-2024-6113,0,0,490e92a6a0a65d36b87406b192c608105d64066f8fdcb131887f4b543a0ae3ab,2024-06-20T12:43:25.663000 +CVE-2024-6113,0,1,5b70a902f6bae2f98582af8aea358fa74ce77c6f620f786f6fe02fb8c741aebc,2024-06-20T12:43:25.663000 CVE-2024-6114,0,0,1d496eb490a052b12517f100a93bb767cf2cf15a2c008e0693dc387c679adba3,2024-06-20T12:44:01.637000 CVE-2024-6115,0,0,b78a8bc77e5cbf73cf04c74141f6177c3ffa0587a4a1d2d98ad3bfe6bcce3476,2024-06-25T18:15:11.857000 CVE-2024-6116,0,0,a6d83e3fcdc09a0a6cf307cbc9b62cfd655f854315f6260ca3a48d86acd6c58e,2024-06-20T12:44:01.637000 @@ -258195,7 +258195,7 @@ CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187 CVE-2024-6121,0,0,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000 CVE-2024-6122,0,0,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000 CVE-2024-6123,0,0,75695c59d88081a795c134128ddb6cd1415db185318a55dfce97b139d1d4e40d,2024-07-09T18:19:14.047000 -CVE-2024-6124,0,0,149ab6637d7fedee1645eba8cd0b40d54489c4318ada662e0d25f47ae7f70a2e,2024-07-29T14:12:08.783000 +CVE-2024-6124,0,1,8d25c090cf235b06f2ec76e8f8f482e95e4fdaaa46ccea623efcb0d2a9b85e78,2024-07-29T14:12:08.783000 CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000 CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000 CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000 @@ -258237,16 +258237,16 @@ CVE-2024-6177,0,0,e51904c80961d41608903dd9ecba1a38d9527008f51a121ebd3747e18a611a CVE-2024-6178,0,0,59f19ecff82a76c70bb0044c2129cdaa12044314a15fb2e7dd459f8df0580df5,2024-06-20T15:16:58.507000 CVE-2024-6179,0,0,2b19138855924be9a22cebfb9d12e0ecf8edc110d160dd4a9b77eaf81994263d,2024-06-20T15:16:47.133000 CVE-2024-6180,0,0,ae7bf283ba8414ace0d3bfd9d7e72bd4b5eafadc11f0e00b9a21d42e8d6a993e,2024-07-09T18:19:14.047000 -CVE-2024-6181,0,0,43a5dd6c7faa7ff7dc42cc22504d1a9cab4be23a74ebc97e52fcf54ce288b86c,2024-06-20T14:15:11.837000 -CVE-2024-6182,0,0,b7300e1d6e011af555cac7e9219943ad19c6e572a487c63347f4c440f884de90,2024-06-20T16:15:14.807000 -CVE-2024-6183,0,0,790906757a88c7f7d6f374e4bdae7595edd021a512b7dc22550779aa2ef88d9f,2024-06-20T16:15:14.903000 +CVE-2024-6181,0,1,25d34698435fd733d14f9e9b25e82de91cb8bdadea6e36356b43f106fe01799c,2024-06-20T14:15:11.837000 +CVE-2024-6182,0,1,99c1276e250f27ab1a7ed54d5b28afe5280c58bd34c5cf7568d77caadbeecbdd,2024-06-20T16:15:14.807000 +CVE-2024-6183,0,1,103c390d46ed5a5b34f5195878be208fa52acfb25358825f2747fb4a1823c1fd,2024-06-20T16:15:14.903000 CVE-2024-6184,0,0,6ed410242918c83588a5b17ccbcdbea871e2837aedc3a54aaddf5510e1de1707,2024-06-20T14:15:11.953000 -CVE-2024-6185,0,0,8f2a7091aa992e38102bc58b7b130549dd35f6e846ab151cee494bede2c7b89c,2024-06-25T21:16:01.940000 +CVE-2024-6185,0,1,cd6c234b3ed72fe4a1ddcb674b9d77147cb4f951db51bc078af89543191ba8a4,2024-06-25T21:16:01.940000 CVE-2024-6186,0,0,74f50a83bba6fd9acd5099500e18aafcc6991f5ca85d44a1cd8e6668ee356efd,2024-06-20T16:07:50.417000 CVE-2024-6187,0,0,46a9ddc8bb6bbc4e903f9925f1ffd0840f6c35cdad7ceeddf74058350bff44ed,2024-06-20T19:15:50.553000 CVE-2024-6188,0,0,4625f1b2f464b662fbeded6da9887ec07a27d81c66aeccd1b897d9eab956f4de,2024-06-20T16:15:15.003000 CVE-2024-6189,0,0,2355a57183440873745a58c5ee4255e73d48e3621df08442512d4d5de5154bef,2024-06-25T16:15:25.607000 -CVE-2024-6190,0,0,93b00ddbb08aa0f67c76c17594afa01da9990f6bd21725b8f9039b95b52fe264,2024-06-20T16:07:50.417000 +CVE-2024-6190,0,1,09a00bc1af4efde3dc04b8a8530655694f6fb7d3967742c1c8e1b17d5294f466,2024-06-20T16:07:50.417000 CVE-2024-6191,0,0,97e62f49bbf59d417e17e1c185a719d026dd666b9cea29cbaf2df8f078cf498d,2024-06-20T16:07:50.417000 CVE-2024-6192,0,0,f3fb71ab4261b9f1fe9614be4c3aca69249da1a29d73f44d5548ddecce138315,2024-06-20T18:15:13.337000 CVE-2024-6193,0,0,476b924f51226d24001327f060e7c65bf0fd7643e073512f604e9ac2113d6939,2024-08-01T13:52:16.463000 @@ -258283,7 +258283,7 @@ CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ff CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 -CVE-2024-6242,0,0,72f9cd446843cfa1e4b6e56440f3d264c8eb39cb42ad9ef8171e4545882c997a,2024-08-01T16:45:25.400000 +CVE-2024-6242,0,1,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000 CVE-2024-6243,0,0,af3e968f15710e52d1218645566e4f111ef2efb93699a091cf90e62d1a93b4e5,2024-08-01T14:00:17.580000 CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000 CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000 @@ -258352,6 +258352,7 @@ CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c008 CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000 CVE-2024-6327,0,0,2921f8f8780ecccf64e99daaa57d4495895350cac37fbdf3fcfbbaadf3869269,2024-07-26T13:03:00.473000 CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000 +CVE-2024-6331,1,1,22da11c7b5931ac842329e73cdc98e713f66f9d872a9ecbc9a0f73734a8ff17d,2024-08-04T00:15:47.863000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000 CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000 @@ -258424,7 +258425,7 @@ CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3e CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 -CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 +CVE-2024-6453,0,1,a31f9b2d11e920ef5820d5943bd943df178bc2e27d100b648bd1b922afad8eca,2024-07-03T12:53:24.977000 CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000 CVE-2024-6457,0,0,2021b397e47ab38cda013de2c201fe3ea53b49570246fbb65269f60be90e5ab4,2024-07-16T13:43:58.773000 CVE-2024-6458,0,0,e6f4f9a699790cfa92517dafe90bcdba32232615fceb305817a9ccda94d06fc4,2024-07-29T14:12:08.783000 @@ -258483,7 +258484,7 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6 CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000 CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6557,0,0,5f8a5c5bf162c69368d24395d90aef2e1a9fd156ec4a6d0f0e02ca54e1438d8b,2024-07-16T13:43:58.773000 -CVE-2024-6558,0,0,55e7288aff9cb555c955e7c49e137c91aa5bce5f87ca894b51591f68efa3279c,2024-07-26T12:38:41.683000 +CVE-2024-6558,0,1,80bb4db184b5e092f77800c9ee0ef41022e963bac58d9cb1fdeb51b7e7504217,2024-07-26T12:38:41.683000 CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000 CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 @@ -258496,7 +258497,7 @@ CVE-2024-6570,0,0,1c2083317d49d5094b93c672429fe80fa3944fba8c36de7f1f2403e55beb6b CVE-2024-6571,0,0,99e28e1eec016aa2ea1a00034153b94fa7a8f3552e46398f5643f95dd38cab4e,2024-07-24T12:55:13.223000 CVE-2024-6573,0,0,eec8b8537f493346698f7e9346611d53ae9a4a9981bcfb08980cc8315ebb4c8d,2024-07-29T14:12:08.783000 CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000 -CVE-2024-6576,0,0,5fa5f2773842e64c1ee36f958b07fa3629a22baedac1fc1b99640a9767d760f9,2024-07-29T16:21:52.517000 +CVE-2024-6576,0,1,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070ff,2024-07-29T16:21:52.517000 CVE-2024-6578,0,0,93a96ee1a320fb95ed34fac92f5f2d70d185ebfa88b318de204eab5f166d9aec,2024-07-30T13:33:30.653000 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 @@ -258542,7 +258543,7 @@ CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1 CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73eb9,2024-08-01T22:15:46.930000 CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000 CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000 -CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000 +CVE-2024-6652,0,1,0923244b6b76f442c47a88150f368b6b9dcb9b0e76b0d2676e50d3c093d67a8a,2024-07-11T13:05:54.930000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000 CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 @@ -258562,7 +258563,7 @@ CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d5287 CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000 CVE-2024-6695,0,0,99ceef595ada6c305df9cf6da95af28747b0bb8e4a9bd8bdcd9193a7cc73001a,2024-08-01T14:00:34.400000 CVE-2024-6698,0,0,89497c4dbd46e9ca69b6c9e20c77840978d4a56c74e425e3a4babf4cd1ed1264,2024-08-01T12:42:36.933000 -CVE-2024-6699,0,0,6e43517d823543b1bfe29f11155aa061b1b3007e0c0d0141333897dcac3700cf,2024-07-30T13:32:45.943000 +CVE-2024-6699,0,1,9d9db768b9c88d760728ad43f917f22b5e5ff8a9965264fbc4d242d1015fefd3,2024-07-30T13:32:45.943000 CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000 CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 @@ -258632,9 +258633,9 @@ CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd6963 CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 CVE-2024-6872,0,0,f8e93c9ef81ed3baf8f288057790da67aa6e3fd85ff499888cba605afcfdec35,2024-08-03T12:15:17.160000 -CVE-2024-6873,0,0,f9dff3a0260621f4dfdfc4a55d6334b2658f009fae91da5d5efee860b1419149,2024-08-01T16:45:25.400000 +CVE-2024-6873,0,1,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000 -CVE-2024-6881,0,0,ae484b8b97ecbaca3d459a043a0b9e7c17dfa3db2ae41eab10b19174db4e67d5,2024-07-29T14:12:08.783000 +CVE-2024-6881,0,1,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1ed,2024-07-29T14:12:08.783000 CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000 CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000 CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000 @@ -258655,7 +258656,7 @@ CVE-2024-6912,0,0,b579ffc43dbaf89f50f93b1659dc012bb7b84a2d36bcb32b984560565416f5 CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e93,2024-07-24T12:55:13.223000 CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000 CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000 -CVE-2024-6923,0,0,aa9593337d58790793e31f744edd4bb352754feff1c648a94b3b61c3c10dcb2e,2024-08-01T19:36:19.627000 +CVE-2024-6923,0,1,b74614a06050f6bc3de2bccba63255782fe3b1f0f02b341181217619b708040a,2024-08-01T19:36:19.627000 CVE-2024-6930,0,0,de9484f0df1ac338aa3b09c73b4d890cbda7e2129d6e265be8ed1831a07d234d,2024-07-24T12:55:13.223000 CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000 CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000 @@ -258702,9 +258703,9 @@ CVE-2024-6975,0,0,71ef57164cbd1cefa8e97c2640842f587dea0e157fc8339c8b95332c952efe CVE-2024-6977,0,0,581c8cdfdfeb82af68c8689432d86b8be0c3f45442112c85b954569b41cd04b5,2024-08-01T12:42:36.933000 CVE-2024-6978,0,0,aa71215d41abe7b7e6f6bff5080b4c986f22761adf5de92aeb36f54acec24a60,2024-08-01T12:42:36.933000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 -CVE-2024-6984,0,0,5e471e68c1f9c8af4cd4126a693da97e089cde1a0fe72eca9e017c53446a32dc,2024-07-29T16:21:52.517000 +CVE-2024-6984,0,1,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03be,2024-07-29T16:21:52.517000 CVE-2024-6990,0,0,af78978331551e601c74e65678c49159db8dbbe52afb220c54529e9bbfddee69,2024-08-03T18:35:02.320000 -CVE-2024-7007,0,0,d661b80f381c5e5a20762050cd26d7cdbc7442dd5816d04953c75c3bb9a2e0ae,2024-07-26T12:38:41.683000 +CVE-2024-7007,0,1,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000 CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 CVE-2024-7029,0,0,fad07a9da6cffc18d92ada6e07d470166b1b5d9ed10a7f4fee96e9c6be049e72,2024-08-02T15:16:37.163000 @@ -258726,8 +258727,8 @@ CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93b CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000 CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000 CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000 -CVE-2024-7105,0,0,ebac193a722d703cc6182b67006761d03a0c9cb5217fdf90f3600dc72f51b279,2024-07-26T12:38:41.683000 -CVE-2024-7106,0,0,ef114d9446090044e968605e26812a012528e5941b9264b330a28ad79b353ac3,2024-07-26T12:38:41.683000 +CVE-2024-7105,0,1,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000 +CVE-2024-7106,0,1,4f79551bb831c41c367c51b2f81bdf75eb9c94a2549b6a3ae035069141d77523,2024-07-26T12:38:41.683000 CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000 CVE-2024-7115,0,0,819d5cce5a1e2afdff1be642b38d32a950da76b4219022024da1eb7f580c864f,2024-07-26T12:38:41.683000 CVE-2024-7116,0,0,d606950e780706743ffa240e54bab9ff9a5a27e768f8fb90c18e7f69203f2bc4,2024-07-26T12:38:41.683000 @@ -258741,13 +258742,13 @@ CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1f CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000 CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000 CVE-2024-7153,0,0,9aefcf5212f7daa00d220d7b2b9f573be0a36b383139766fde3ad17e71ad7b77,2024-07-29T14:12:08.783000 -CVE-2024-7154,0,0,d39e89f94f60e8d7b79da52df9d630b9e81b2b245d2f85488b74e63c84749625,2024-07-29T14:12:08.783000 -CVE-2024-7155,0,0,f5d8fd6ea549865a120b84df9be93cc729fc94148b48501efc2a1336d4453b69,2024-07-29T14:12:08.783000 -CVE-2024-7156,0,0,c04270c954b828ec763b97e8ed2b78c708b74a47e6721967a3457c8a9e1757f9,2024-07-29T14:12:08.783000 -CVE-2024-7157,0,0,8931cf89829462eec766ef746a4df63fed2464177966f213542a55d19c1e58d8,2024-07-29T14:12:08.783000 -CVE-2024-7158,0,0,8eeb2027bd614b39229013c89fa87c0faae1b21e4ff9300ebed3e09a05e7621e,2024-07-29T14:12:08.783000 -CVE-2024-7159,0,0,51344c47b8eb3e5995bb3f068befefc9478cc85a0bdf7d4262df8af84d61054a,2024-07-29T14:12:08.783000 -CVE-2024-7160,0,0,7a68b956977c10119ffc6d81803eeef1fb41a452ce84d40c98b0c64707958ef7,2024-07-29T14:12:08.783000 +CVE-2024-7154,0,1,c4877af6f0f1d9badd5877f96c865212ecd80856f1bba48b44a6bc252bd67be2,2024-07-29T14:12:08.783000 +CVE-2024-7155,0,1,00ae35729f7efa70b9e9a0053d17c0f5d011aeb14328040786cb900c89deda41,2024-07-29T14:12:08.783000 +CVE-2024-7156,0,1,6a53f69f84040ffce7173b21790e83616284ff242a58b9eb143d86d28bd080cb,2024-07-29T14:12:08.783000 +CVE-2024-7157,0,1,836f9f624768493b472613aa13824be2823cb6224ccf39d26fbb2c9e52660f92,2024-07-29T14:12:08.783000 +CVE-2024-7158,0,1,793ada3591847e31d76f8a9cb327d0114a8efecba6a45eabf7fe3415c2ce972c,2024-07-29T14:12:08.783000 +CVE-2024-7159,0,1,126404475b52662f6be2a9b0fe73c669b02b4551a2de8ba0dfd0f5f735003c10,2024-07-29T14:12:08.783000 +CVE-2024-7160,0,1,02fabcc8687338e3f7df6d6a8cba4564c24822decf50f5b0cf2c414bde2b165f,2024-07-29T14:12:08.783000 CVE-2024-7161,0,0,3a84ea99e48e8a8d8048664ee759fce102c4899e7bf3a25b129131d6e118a2d3,2024-07-29T14:12:08.783000 CVE-2024-7162,0,0,89a4bb0daa62a108ba37ba1cd76131a6b4592ff5908e4382e3ba0ccae44d808b,2024-07-29T14:12:08.783000 CVE-2024-7163,0,0,81c756b3132cc48183d1a3c3acfd78fbea5503464491879bb3d1859dc5f53baf,2024-07-29T14:12:08.783000 @@ -258786,21 +258787,21 @@ CVE-2024-7195,0,0,f7da8846d38917b002b2b5180ea4d9dfe045dbd2366df57dc48d23d9f467bf CVE-2024-7196,0,0,39d23cef38325ecf26226fe3be85d15a455fca8c58ec9aec865b5e3e8e46a122,2024-07-29T14:12:08.783000 CVE-2024-7197,0,0,5d31abf7bbec1a1e9c73407b33a1eac65b603572b6614585eac60c62db7f2f75,2024-07-29T14:12:08.783000 CVE-2024-7198,0,0,19b2c36b5e0bfb10044c7e6ef90326036ca4d51ac224f6fe5c0ea3590aa3b04f,2024-07-29T14:12:08.783000 -CVE-2024-7199,0,0,1c38ae71600e9c4c0d209d192fce66196ad6d1d1454dfe95d9b268bf29c6a54f,2024-07-29T14:12:08.783000 -CVE-2024-7200,0,0,d21a4dd541acbc0094d3b150aee5dc57732e3b43b8983d68802bfc40bea446f0,2024-07-29T14:12:08.783000 +CVE-2024-7199,0,1,d49757d9ac765cc8b512a083d69448585816d7b63197f233b44c3e7bb7ce3c57,2024-07-29T14:12:08.783000 +CVE-2024-7200,0,1,ecebc5cb06aa8303e1f01b0ddd154513906ce47137646c7f40e950538ac827b2,2024-07-29T14:12:08.783000 CVE-2024-7201,0,0,ada84f4b903b0c95dc45be4013db2022612c9fdb66b840b2138f16a8a9061fa8,2024-07-29T14:12:08.783000 CVE-2024-7202,0,0,47ee30ff0ebecde915aadd7cf1bd702d0bebf04cac4786411e427c0fde39b1f2,2024-07-29T14:12:08.783000 -CVE-2024-7204,0,0,d2587825bac42b76f45556edb15dfcf895a8e2e3b7e136941fd6529228c20252,2024-08-02T12:59:43.990000 +CVE-2024-7204,0,1,1772f71824e8e67d08dd960b8980267be3eb60b7db474bb1b3294ba0efdcc4fb,2024-08-02T12:59:43.990000 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 CVE-2024-7211,0,0,f7cf1e82b08ec7fe9f4242ffeab1b87d553af7021ef2a87240fdd9ca70a1801c,2024-08-02T13:16:06.853000 -CVE-2024-7212,0,0,f6bebad6ae53838fdfc46656ae8fba28c66f127a824bd527778b34c8dcd63e65,2024-07-30T13:32:45.943000 -CVE-2024-7213,0,0,1d232a759ef9c9587d56c52f8268da136472cbcd6eef42f7766a15dddc72721a,2024-07-30T13:32:45.943000 -CVE-2024-7214,0,0,f3edd19e8cfc3c22a6f8f65ed67f6c523f424989a4dab15459681566d0408238,2024-07-30T13:32:45.943000 -CVE-2024-7215,0,0,0c6ba92ca49c50ec04686bda4a475e9c1360e2f00f914c21bc89c22bd88093ee,2024-07-30T13:32:45.943000 -CVE-2024-7216,0,0,43b68ee5f9123795b96be62e185f2715be0bb58b0b37af249d6d1f0069715279,2024-07-30T13:32:45.943000 -CVE-2024-7217,0,0,d45d2159d661192d847f250b2446c4d36ba8f20a0a8832c4a23a36b0b5228730,2024-07-30T13:32:45.943000 +CVE-2024-7212,0,1,d85ae600c31799294f18b9bdf208b413cec392bb78df4aac4443ee1d547655fa,2024-07-30T13:32:45.943000 +CVE-2024-7213,0,1,f43e3a4d574beb5f0357466024a5b7d0acc9d943f364ba7f1706d9b4e0614f61,2024-07-30T13:32:45.943000 +CVE-2024-7214,0,1,cf0ff9b3c048cd8fe1cbe27d866836b45cf6f395e7f604068bddd4880fe6e623,2024-07-30T13:32:45.943000 +CVE-2024-7215,0,1,19cb74dd169a2c0adddcb9f3b1359dd5ec8b4cb73285f81c84c895b0918569f3,2024-07-30T13:32:45.943000 +CVE-2024-7216,0,1,06cb7fdb9eba9a4918c738c6ef004796ad0e05a3d2a825c6eaa07e4a67d42660,2024-07-30T13:32:45.943000 +CVE-2024-7217,0,1,0ed3879ead1919503d898348b2756de9d3825fdc7f91b91789dd95f7bd091466,2024-07-30T13:32:45.943000 CVE-2024-7218,0,0,5d0054c3fdbf03d2b2f068cbdbe6251db2dbd2a118324c2439603e07b3cc1979,2024-07-30T13:32:45.943000 CVE-2024-7219,0,0,7e68d9931944536c53759c49211464ac06490e908e53e029d7404aa622e5549d,2024-07-30T13:32:45.943000 CVE-2024-7220,0,0,5720c21291c5d0d772a794164cf0868f04ecdd497da40613327c3e7f8460872e,2024-07-30T13:32:45.943000 @@ -258815,10 +258816,10 @@ CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d8 CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000 CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000 CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000 -CVE-2024-7255,0,0,ec6d8b25e0e5ba1e3e90015d6cefeaf68b2bdb7b4fac3cf40f2d3d5451a85d9a,2024-08-02T12:59:43.990000 +CVE-2024-7255,0,1,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b95,2024-08-02T12:59:43.990000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,79e2c90f08a141e0d2af320c2c00c7a8e7045b0083d96c850bf2cc9a4f46bed5,2024-08-03T10:15:50.710000 -CVE-2024-7264,0,0,22a3c0d538fcf832ced7f03bd70f178e854fb61ad54846ad0e19524f5f7cdb42,2024-07-31T12:57:02.300000 +CVE-2024-7264,0,1,4c56e36858354627d468029972bf040b2893210da9a48750dcecdce8ded0e49b,2024-07-31T12:57:02.300000 CVE-2024-7273,0,0,08b55eeeed04c0bbb7f14e00803b2981c3933c2f80c54832a95f5208a289acec,2024-07-31T12:57:02.300000 CVE-2024-7274,0,0,6788201314420897e4c9c6ba6deacc95e7d9a0fa193d6b8ed0518ed687cbc19f,2024-07-31T12:57:02.300000 CVE-2024-7275,0,0,73b728508a2e1fb139a6a6d96a6d39cb0fa47f6c3f9b9fdd8e3fc0433fa4a3e5,2024-07-31T12:57:02.300000 @@ -258853,29 +258854,29 @@ CVE-2024-7314,0,0,26f63734987560bbf8b99cf0771fa81abdbb797d72ecd3e5a70d2b9ad1845a CVE-2024-7319,0,0,dfed53411027de9ada72630ee7d81422ecbad7fa4900178431e209fde54249f7,2024-08-02T21:16:31.180000 CVE-2024-7320,0,0,33e9dcaae6c93434ade67bd8a073d2b7f1fbc81482e595b40c21856a0fa46ae6,2024-07-31T12:57:02.300000 CVE-2024-7321,0,0,7c3abae321c1c206df72b5645aa4b7f08ab908ecabfe1d2acbc6472a1b295bbf,2024-07-31T12:57:02.300000 -CVE-2024-7323,0,0,ec5e8410b4ed47ccf51f3a36a010b59d399541ac8044ecfcbc030f0f4f8e9e67,2024-08-02T12:59:43.990000 +CVE-2024-7323,0,1,9ade4a736dcd7d946c31626909fde6ca44169336c2686d18f85ae47322aa8137,2024-08-02T12:59:43.990000 CVE-2024-7324,0,0,095fe191ca170a7ec3aafa46faf9007b467b7e450c1bcd7d0af0a45c400bd246,2024-08-01T12:42:36.933000 CVE-2024-7325,0,0,a6bde1ed410a10749d44bba07a55a46b87addce8acb914516046e9ef7fd987c8,2024-08-01T12:42:36.933000 -CVE-2024-7326,0,0,e4fe5d72b3f720e88066c7bf40d2778eb52d0e5e4aaa7ab2ee68780546e20939,2024-08-01T12:42:36.933000 -CVE-2024-7327,0,0,fe3d1ed38fdcbe26e7c4f19481629a7cea987c971b77e5704a37efab8356ba68,2024-08-01T12:42:36.933000 -CVE-2024-7328,0,0,2741567ee42748d59f252daefa57fb417e53fa2eac4698fc44657e5e7da1a98c,2024-08-01T12:42:36.933000 -CVE-2024-7329,0,0,7144e8cdcb46eab920fe5de8630867a88e3a00ef411c2d17720e845745aadc9e,2024-08-01T12:42:36.933000 -CVE-2024-7330,0,0,1e3fccb13fc5c6d56713c5eea41817a54c12be6a0c13c4e45cd85401565fe586,2024-08-01T12:42:36.933000 +CVE-2024-7326,0,1,c6993a2dfb30d9b79ca99771f308e19b2a8b96785a4599f6177f16a411359171,2024-08-01T12:42:36.933000 +CVE-2024-7327,0,1,9ec7c5b4f3fea2ac5f9abdae5d7475fef06eab11099d18f41ef0237ea3e05b7b,2024-08-01T12:42:36.933000 +CVE-2024-7328,0,1,d7a3331bca731f76c4abaa1cc5cdfd3af91da16a0035eba7b48c86ad7eb687ea,2024-08-01T12:42:36.933000 +CVE-2024-7329,0,1,f2ada99243d0f575b81eec21f3148ca66fce3d9559ae9316ecf85d94bc4c0b72,2024-08-01T12:42:36.933000 +CVE-2024-7330,0,1,a0d90f27df0d1d8acc92db1ac146dc79ec66c02483d0fbebb438d850d8cdcf9e,2024-08-01T12:42:36.933000 CVE-2024-7331,0,0,b740f062346a9fa2712074e24c9e0d1ce4d148884dac19c4cc72ee657acd38b6,2024-08-01T17:42:09.417000 -CVE-2024-7332,0,0,fe9a2a9bc3d553a706eaa2f08749bb9b15a6ef17e04c8c48db1ad7505c2ba120,2024-08-01T12:42:36.933000 -CVE-2024-7333,0,0,c3a5011bfb5eec54c654dd8d356ddde5a6bfaa85a23259d2c194704ac1cdc233,2024-08-01T12:42:36.933000 -CVE-2024-7334,0,0,19177a6fd60d0db100f20d17e83c37a08eb9c6922ec4abb29b21dd8862fb0ac2,2024-08-01T12:42:36.933000 -CVE-2024-7335,0,0,a05ac42f5fdbb3229fb9b9974bc01e0eb59f8a21259223f45c625ea0aa891a8c,2024-08-01T12:42:36.933000 -CVE-2024-7336,0,0,6b999c7ba5a34b9be4966aa95415b63dcf55afa08607062a69f340eac0d653a4,2024-08-01T12:42:36.933000 -CVE-2024-7337,0,0,e958ed6747e03c8a2ca1c242b94c85738e8d31d5df2bb2e9e89a97ba7b147825,2024-08-01T12:42:36.933000 +CVE-2024-7332,0,1,4b7431288d440a6565f153911b2f00dda4e52ebf7a7cdd1108a37378b9eb56a8,2024-08-01T12:42:36.933000 +CVE-2024-7333,0,1,477e253680b7a1600fd14f8549c5cac893ca9ed9b05806be9c32b2574cf726b2,2024-08-01T12:42:36.933000 +CVE-2024-7334,0,1,0cf74f7d738102da0f19d6838dd64e12b598ac9c0786cd9df3abf769af66229a,2024-08-01T12:42:36.933000 +CVE-2024-7335,0,1,ea2e7f4e97d4eb37eda5cee3101adfd83f8680ffcf4023b0d1b714cd789ed180,2024-08-01T12:42:36.933000 +CVE-2024-7336,0,1,1e7e5297ea867ee09674e1f2f655feb58eb1d6034c5b9d78677a2634764acdc8,2024-08-01T12:42:36.933000 +CVE-2024-7337,0,1,abdf88b89f18b0bfe89f885285308aae4c494af19bd7488de0e43e517362fa3e,2024-08-01T12:42:36.933000 CVE-2024-7338,0,0,900487bade652abeffed8d740657af80643a0645713b0752d7dde8b898a5b8a0,2024-08-01T12:42:36.933000 CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16a5,2024-08-01T12:42:36.933000 CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000 CVE-2024-7342,0,0,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000 CVE-2024-7343,0,0,81acd094d4fc0681dfbdfb7143ed5e48e10c433b5dcce0c0a370d97e4141e1d6,2024-08-01T12:42:36.933000 CVE-2024-7356,0,0,33ef487a1dbdc0058c4b271c1999600df178016d73d5497eee90558f451b86ba,2024-08-03T10:15:51.173000 -CVE-2024-7357,0,0,23989dfce9c5957bbf67a574c2e84a67ebc788d2fac159999ceb900315ff213c,2024-08-01T14:04:01.833000 -CVE-2024-7358,0,0,c99e4b6286f9cc9624cb556fe939b08f48cd5ab727504714126ae69fbf4dd44c,2024-08-01T16:45:25.400000 +CVE-2024-7357,0,1,f009667a77c799e6604310d258fa1eed19a5f03c0e86bb9dc257ea4c1f3cc0a5,2024-08-01T14:04:01.833000 +CVE-2024-7358,0,1,d0d3bbadf8d959881fb1ac3e2ef5c9a3fa1992957990fec2aa7880f237382301,2024-08-01T16:45:25.400000 CVE-2024-7359,0,0,e4157cf13226a6af7e8af651561772b532766fc461a201f711d37e21eb607965,2024-08-02T12:59:43.990000 CVE-2024-7360,0,0,e5c147ccf2a4c7e1bf16edb55c3b9d708b671cb7247e1f8dcacfdbfd64c237c0,2024-08-02T12:59:43.990000 CVE-2024-7361,0,0,00d0b277c00d4384f6edcdd4372f264d87365fa1cef210eee06bab0ad3297b5a,2024-08-02T12:59:43.990000 @@ -258887,12 +258888,12 @@ CVE-2024-7366,0,0,85232956a9ed750d40da4498f3ea9b9a83137981e4552248a960fb2cde4cfd CVE-2024-7367,0,0,08b5160fd62de88fadaf85d3610ad611f2030f2e8d41a8ceeaa56e7a06246c4c,2024-08-02T12:59:43.990000 CVE-2024-7368,0,0,0e8b2687d896f306e9f484e87e29675797f3b32ef6701f4114f313a9453ed7a8,2024-08-02T12:59:43.990000 CVE-2024-7369,0,0,d33eb7f622d0a5cf6a04e3c8598dc590366f1301297746a6827545dedfebe571,2024-08-02T12:59:43.990000 -CVE-2024-7370,0,0,b82758e8c3e405fd7c024f7e9d71ad24d02418f4a4a3d67dc8185a381c7de970,2024-08-02T12:59:43.990000 -CVE-2024-7371,0,0,b28eb3ea802ce7b7793ac77bd3cfcf962614a525a5dc09d32025d339899010eb,2024-08-02T12:59:43.990000 -CVE-2024-7372,0,0,241df2d35b851dd76f1f9fd616648a98510a7189bb162457275148ab19ed040a,2024-08-02T12:59:43.990000 -CVE-2024-7373,0,0,38235ec66a425a79972f82b2f7ec6c40ffa528b5914bfe021c855502877ea5cd,2024-08-02T12:59:43.990000 -CVE-2024-7374,0,0,6388dbe3a9e72b2da6cc93dd5400e16b993675d0ae8951d541e67e884fa18ad9,2024-08-02T12:59:43.990000 -CVE-2024-7375,0,0,64c4e650eda8a59de414060beea48037713ce1494caab87bdf4c56cfc60a229e,2024-08-02T12:59:43.990000 +CVE-2024-7370,0,1,fd18d55af69d6b2182143c7ec70f3a050ae4563754630f27cbca5bb5250ecf30,2024-08-02T12:59:43.990000 +CVE-2024-7371,0,1,b49415420f091a7dd4403e5985833ded8c1941c2472099afef4c208f22600c7d,2024-08-02T12:59:43.990000 +CVE-2024-7372,0,1,ca705e2b4ee06bda856e0afa62cb577411a73f94439c6bccffc6426e98df9bd3,2024-08-02T12:59:43.990000 +CVE-2024-7373,0,1,10791e2a17a1d1a4734d2d36bda847eb4ee035e5adc3c33ee89b8bd6ceae1bd8,2024-08-02T12:59:43.990000 +CVE-2024-7374,0,1,b1757dcf36a81fa7b189c57f93588b7eec41b1b303dd6a7fb26b1b239a23baed,2024-08-02T12:59:43.990000 +CVE-2024-7375,0,1,34e1bd107d2aecd6493421c4d3ab7a413fcec3731eb80185a4092f9ab654b192,2024-08-02T12:59:43.990000 CVE-2024-7376,0,0,13c26267c4eb798d77a069115917b306a73c1051ac2cdd324720ad494f5f9add,2024-08-02T12:59:43.990000 CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e43,2024-08-02T12:59:43.990000 CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000