diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json index 0f218ac7d18..e11e7b26a9b 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json @@ -2,16 +2,55 @@ "id": "CVE-2019-25219", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T17:15:03.567", - "lastModified": "2024-10-29T17:15:03.567", + "lastModified": "2024-10-30T16:35:01.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Asio C++ Library before 1.13.0 lacks a fallback error code in the case of SSL_ERROR_SYSCALL with no associated error information from the SSL library being used." + }, + { + "lang": "es", + "value": "La librer\u00eda Asio C++ anterior a 1.13.0 carece de un c\u00f3digo de error de respaldo en el caso de SSL_ERROR_SYSCALL sin informaci\u00f3n de error asociada de la librer\u00eda SSL que se est\u00e1 utilizando." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/chriskohlhoff/asio/commit/93337cba7b013150f5aa6194393e1d94be2853ec", diff --git a/CVE-2022/CVE-2022-238xx/CVE-2022-23861.json b/CVE-2022/CVE-2022-238xx/CVE-2022-23861.json index 9b39ccc8cae..99d41df93ba 100644 --- a/CVE-2022/CVE-2022-238xx/CVE-2022-23861.json +++ b/CVE-2022/CVE-2022-238xx/CVE-2022-23861.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23861", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T16:15:04.897", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:49:36.883", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ysoft:safeq:6.0:build_53:*:*:*:*:*:*", + "matchCriteriaId": "4BF6B709-569F-425B-8909-C52FB5ECC9EE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mbadanoiu/CVE-2022-23861", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://ysoft.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29946.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29946.json index caeae2a8a66..5c275374576 100644 --- a/CVE-2022/CVE-2022-299xx/CVE-2022-29946.json +++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29946.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29946", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-11T21:15:10.480", - "lastModified": "2024-07-12T12:49:11.340", + "lastModified": "2024-10-30T15:35:02.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "NATS.io NATS Server anterior a 2.8.2 y Streaming Server anterior a 0.24.6 podr\u00edan permitir a un atacante remoto omitir las restricciones de seguridad, causadas por no aplicar permisos de usuario negativos en un escenario. Al utilizar una suscripci\u00f3n a cola en el comod\u00edn, un atacante podr\u00eda aprovechar esta vulnerabilidad para permitir sujetos denegados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/nats-io/advisories/blob/main/CVE/CVE-2022-29946.txt", diff --git a/CVE-2022/CVE-2022-362xx/CVE-2022-36228.json b/CVE-2022/CVE-2022-362xx/CVE-2022-36228.json index 725f7680a33..30399eee368 100644 --- a/CVE-2022/CVE-2022-362xx/CVE-2022-36228.json +++ b/CVE-2022/CVE-2022-362xx/CVE-2022-36228.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36228", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-09T21:15:09.850", - "lastModified": "2023-10-12T18:37:26.680", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:02.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38176.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38176.json index eec186b5d4e..5de3c37fa37 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38176.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38176.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38176", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-06T21:15:08.967", - "lastModified": "2022-09-09T19:26:21.257", + "lastModified": "2024-10-30T16:17:27.707", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -56,16 +56,7 @@ "nodes": [ { "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ysoft:safeq:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.0.0", - "versionEndExcluding": "6.0.72", - "matchCriteriaId": "00BCA96F-949D-46C7-A349-F7A880E94D86" - } - ] + "negate": false } ] } diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48634.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48634.json index 80e6de245ef..8a9ded4590f 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48634.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48634.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48634", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:06.617", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-10-30T16:35:02.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/gma500: Correcci\u00f3n de ERROR: funci\u00f3n inactiva llamada desde errores de contexto no v\u00e1lidos gma_crtc_page_flip() estaba manteniendo el spinlock event_lock mientras llamaba a crtc_funcs->mode_set_base() que toma ww_mutex. La \u00fanica raz\u00f3n para mantener event_lock es borrar los errores de gma_crtc->page_flip_event en mode_set_base(). En su lugar, desbloqu\u00e9elo despu\u00e9s de configurar gma_crtc->page_flip_event y, en caso de errores, vuelva a tomar el bloqueo y borre gma_crtc->page_flip_event si todav\u00eda est\u00e1 configurado. Esto corrige la siguiente ADVERTENCIA/stacktrace: [512.122953] ERROR: funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en kernel/locking/mutex.c:870 [512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, nombre: gnome-shell [512.123031] preempt_count: 1, esperado: 0 [512.123048] Profundidad del nido de RCU: 0, esperado: 0 [512.123066] INFORMACI\u00d3N: lockdep est\u00e1 desactivado. [ 512.123080] sello de evento irq: 0 [ 512.123094] hardirqs habilitado por \u00faltima vez en (0): [<0000000000000000>] 0x0 [ 512.123134] hardirqs deshabilitado por \u00faltima vez en (0): [] copy_process+0x9fc/0x1de0 [ 5 12.123176] softirqs habilitado por \u00faltima vez en (0): [] copy_process+0x9fc/0x1de0 [ 512.123207] softirqs deshabilitado por \u00faltima vez en (0): [<0000000000000000>] 0x0 [ 512.123233] Preferencia deshabilitada en: [ 512.123241] 0000000000>] 0x0 [ 512.123275] CPU: 3 PID: 1253 Comunicaciones: gnome-shell Contaminado: GW 5.19.0+ #1 [ 512.123304] Nombre de hardware: Packard Bell dot s/SJE01_CT, BIOS V1.10 23/07/2013 [ 512.123323] Seguimiento de llamadas : [ 512.123346] [ 512.123370] dump_stack_lvl+0x5b/0x77 [ 512.123412] __might_resched.cold+0xff/0x13a [ 512.123458] ww_mutex_lock+0x1e/0xa0 [ 512.123495 ] psb_gem_pin+0x2c/0x150 [gma500_gfx] [ 512.123601] gma_pipe_set_base+0x76 /0x240 [gma500_gfx] [ 512.123708] gma_crtc_page_flip+0x95/0x130 [gma500_gfx] [ 512.123808] drm_mode_page_flip_ioctl+0x57d/0x5d0 [ 512.123897] ? drm_mode_cursor2_ioctl+0x10/0x10 [ 512.123936] drm_ioctl_kernel+0xa1/0x150 [ 512.123984] drm_ioctl+0x21f/0x420 [ 512.124025] ? drm_mode_cursor2_ioctl+0x10/0x10 [512.124070]? rcu_read_lock_bh_held+0xb/0x60 [512.124104]? lock_release+0x1ef/0x2d0 [ 512.124161] __x64_sys_ioctl+0x8d/0xd0 [ 512.124203] do_syscall_64+0x58/0x80 [ 512.124239] ? do_syscall_64+0x67/0x80 [512.124267]? trace_hardirqs_on_prepare+0x55/0xe0 [512.124300]? do_syscall_64+0x67/0x80 [512.124340]? rcu_read_lock_sched_held+0x10/0x80 [ 512.124377] Entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 512.124411] RIP: 0033:0x7fcc4a70740f [ 512.124442] C\u00f3digo: 00 48 89 44 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 24470]RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f [ 512.124524] RDX: 7ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009 [ 512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034 12.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0 [ 512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0 [ 512.124647 ] " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/63e37a79f7bd939314997e29c2f5a9f0ef184281", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48638.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48638.json index e406a959d7e..6578ff2afc8 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48638.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48638.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48638", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:06.807", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-10-30T16:35:03.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cgroup: cgroup_get_from_id() debe verificar que el kn buscado sea un directorio. cgroup tiene que ser un directorio kernfs; de lo contrario, se produce un p\u00e1nico en el kernel, especialmente la identificaci\u00f3n de cgroup se proporciona desde el espacio de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/1e9571887f97b17cf3ffe9aa4da89090ea60988b", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48654.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48654.json index a2bce680da5..314e3a29188 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48654.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48654.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48654", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:07.580", - "lastModified": "2024-05-23T19:01:47.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:04.010", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48689.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48689.json index 5ea6ef96cd8..f64d64978db 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48689.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48689.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48689", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T15:15:07.833", - "lastModified": "2024-05-23T20:33:57.590", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:04.910", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48691.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48691.json index c558985f4ee..1322bc29d56 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48691.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48691.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48691", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T15:15:07.887", - "lastModified": "2024-05-23T20:34:05.590", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:05.407", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48697.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48697.json index 1ec815842b1..ab698785c47 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48697.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48697.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48697", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T16:15:08.363", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-10-30T16:35:05.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: corrige un use-after-free. Solucione la siguiente queja de use-after-free activada por blktests nvme/004: ERROR: KASAN: acceso a la memoria del usuario en blk_mq_complete_request_remote+0xac /0x350 Lectura de tama\u00f1o 4 en la direcci\u00f3n 0000607bd1835943 por tarea kworker/13:1/460 Cola de trabajo: nvmet-wq nvme_loop_execute_work [nvme_loop] Seguimiento de llamadas: show_stack+0x52/0x58 dump_stack_lvl+0x49/0x5e /0x1e2 informe_kasan+0xb9 /0xf0 __asan_load4+0x6b/0x80 blk_mq_complete_request_remote+0xac/0x350 nvme_loop_queue_response+0x1df/0x275 [nvme_loop] __nvmet_req_complete+0x132/0x4f0 [nvmet_req_complete+0x15/0x 40 [nvmet] nvmet_execute_io_connect+0x18a/0x1f0 [nvmet] nvme_loop_execute_work+0x20/0x30 [ nvme_loop] proceso_one_work+0x56e/0xa70 trabajador_thread+0x2d1/0x640 kthread+0x183/0x1c0 ret_from_fork+0x1f/0x30" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/17f121ca3ec6be0fb32d77c7f65362934a38cc8e", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48698.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48698.json index a8982860c71..15b5b0a1b2c 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48698.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48698.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48698", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-03T16:15:08.410", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-10-30T16:35:06.023", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: soluciona la p\u00e9rdida de memoria al usar debugfs_lookup() Al llamar a debugfs_lookup(), el resultado debe tener llamado dput(); de lo contrario, la memoria se perder\u00e1 con el tiempo. Solucione este problema llamando correctamente a dput()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/3a6279d243cb035eaaff1450980b40cf19748f05", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48711.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48711.json index 22773d74bd0..fd1dfaf87e2 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48711.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48711.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48711", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T11:15:54.793", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-10-30T16:35:06.243", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tipc: mejorar las validaciones de tama\u00f1o para los registros de dominio recibidos. La funci\u00f3n tipc_mon_rcv() permite que un nodo reciba y procese estructuras domain_record de nodos pares para rastrear sus vistas de la topolog\u00eda de la red. Este parche verifica que la cantidad de miembros en un registro de dominio recibido no exceda el l\u00edmite definido por MAX_MON_DOMAIN, algo que de otro modo podr\u00eda provocar un desbordamiento de pila. tipc_mon_rcv() se llama desde la funci\u00f3n tipc_link_proto_rcv(), donde leemos un campo de longitud de datos de mensaje de 32 bits en un uint16. Para evitar cualquier riesgo de desbordamiento de bits, agregamos una verificaci\u00f3n de cordura adicional en esa funci\u00f3n. No podemos ver que eso suceda con el c\u00f3digo actual, pero los futuros dise\u00f1adores, al desconocer este riesgo, pueden introducirlo permitiendo la entrega de b\u00faferes sk muy grandes (> 64k) desde la capa portadora. Este problema potencial fue identificado por Eric Dumazet. Esto corrige CVE-2022-0435" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/175db196e45d6f0e6047eccd09c8ba55465eb131", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json index a49a7956655..e110397cc97 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48743.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48743", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:12.610", - "lastModified": "2024-08-20T13:54:00.933", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:06.467", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48753.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48753.json index 675fee51199..c005ae8f02d 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48753.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48753.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48753", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:13.480", - "lastModified": "2024-09-18T16:03:25.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:06.700", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48761.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48761.json index 92736f62c8a..b08a6c3f36c 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48761.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48761.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48761", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:14.203", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-10-30T16:35:06.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: xhci-plat: corrige el bloqueo al suspender si se habilita la activaci\u00f3n remota. Fall\u00f3 en la plataforma i.mx8qm al suspender si se habilita la activaci\u00f3n remota. Error interno: aborto externo sincr\u00f3nico: 96000210 [#1] PREEMPT M\u00f3dulos SMP vinculados en: CPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12 Nombre del hardware: Freescale i.MX8QM MEK (DT) Cola de trabajo: events_unbound async_run_entry_fn pstate: 600000c5 (nZCv daIF - PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: xhci_disable_hub_port_wake.isra.62+0x60/0xf8 lr: xhci_disable_hub_port_wake.isra.62+0x34/0xf8 sp: ffff80001394bbf0 x29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578 x26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000 x23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001 x20: 0000000000000000 x19: ffff800014e90490 x18: 000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0 x8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453 x5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff000811 93a29c x2: 0000000000000001 x1: 0000000000000000 x0: ffff000814591620 Rastreo de llamadas: xhci_disable_hub_port_wake.isra.62+0x60/0xf8 xhci_suspend+0x58/0x510 0x50/ 0x78 platform_pm_suspend+0x2c/0x78 dpm_run_callback.isra.25+0x50/0xe8 __device_suspend+0x108/0x3c0 El flujo b\u00e1sico: 1. llamada de suspensi\u00f3n en tiempo de ejecuci\u00f3n xhci_suspend, los dispositivos principales xhci controlan el reloj. 2. echo mem >/sys/power/state, system _device_suspend llama a xhci_suspend 3. xhci_suspend llama a xhci_disable_hub_port_wake, que accede al registro, pero el reloj ya est\u00e1 cerrado por la suspensi\u00f3n del tiempo de ejecuci\u00f3n. Este problema fue ocultado por el controlador de dominio de energ\u00eda, que solicita la reanudaci\u00f3n del tiempo de ejecuci\u00f3n antes. Pero el siguiente compromiso lo elimina y hace que este problema suceda. commit c1df456d0f06e (\"PM: dominios: no reanudar el tiempo de ejecuci\u00f3n de los dispositivos en genpd_prepare()\") Este parche llama al tiempo de ejecuci\u00f3n para reanudar antes de la suspensi\u00f3n para asegurarse de que el reloj est\u00e9 encendido antes del registro de acceso. Testeb-by: Abel Vesa " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48764.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48764.json index e732e9239df..283eed2d51b 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48764.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48764.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48764", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:14.450", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-10-30T16:35:07.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Libere la matriz kvm_cpuid_entry2 en KVM_RUN KVM_SET_CPUID{,2} posterior a KVM_RUN KVM_SET_CPUID{,2} Libere la matriz \"struct kvm_cpuid_entry2\" en KVM_RUN KVM_SET_CPUID{,2} posterior a \u00e9xito para corregir una p\u00e9rdida de memoria , las personas que llaman a kvm_set_cpuid() liberan la matriz solo en caso de falla. ERROR: p\u00e9rdida de memoria, objeto sin referencia 0xffff88810963a800 (size 2048): comm \"syz-executor025\", pid 3610, jiffies 4294944928 (age 8.080s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 00 00 ................ 47 65 6e 75 6e 74 65 6c 69 6e 65 49 00 00 00 00 GenuntelineI.... backtrace: [] kmalloc_node include/linux/slab.h:604 [inline] [] kvmalloc_node+0x3e/0x100 mm/util.c:580 [] kvmalloc include/linux/slab.h:732 [inline] [] vmemdup_user+0x22/0x100 mm/util.c:199 [] kvm_vcpu_ioctl_set_cpuid2+0x8f/0xf0 arch/x86/kvm/cpuid.c:423 [] kvm_arch_vcpu_ioctl+0xb99/0x1e60 arch/x86/kvm/x86.c:5251 [] kvm_vcpu_ioctl+0x4ad/0x950 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4066 [] vfs_ioctl fs/ioctl.c:51 [inline] [] __do_sys_ioctl fs/ioctl.c:874 [inline] [] __se_sys_ioctl fs/ioctl.c:860 [inline] [] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:860 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/811f95ff95270e6048197821434d9301e3d7f07c", diff --git a/CVE-2022/CVE-2022-487xx/CVE-2022-48767.json b/CVE-2022/CVE-2022-487xx/CVE-2022-48767.json index c1f70a28b69..5ee42deaa98 100644 --- a/CVE-2022/CVE-2022-487xx/CVE-2022-48767.json +++ b/CVE-2022/CVE-2022-487xx/CVE-2022-48767.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48767", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-20T12:15:14.703", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-10-30T16:35:07.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ceph: coloque correctamente la referencia ceph_string despu\u00e9s del intento de creaci\u00f3n as\u00edncrona. La referencia adquirida por try_prep_async_create se ha filtrado actualmente. Aseg\u00farate de que lo pongamos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/36d433ae3242aa714176378850e6d1a5a3e78f18", diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4971.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4971.json index fa24fc40f46..f131f2e6183 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4971.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4971.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4971", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:12.040", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:37:33.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:heateor:sassy_social_share:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.3.3", + "matchCriteriaId": "510E5801-7AF4-4A61-9B4E-F4EDEA16C82E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/4631519b-2060-43a0-b69b-b3d7ed94c705/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/85277960-2bba-4cd7-9f4c-e04f6743b96c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4972.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4972.json index afd78a3b32b..163abbc95a4 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4972.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4972.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4972", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:12.257", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:34:55.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,7 +41,7 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -49,16 +49,50 @@ "value": "CWE-862" } ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.7.51", + "matchCriteriaId": "E34EAF21-939D-46CD-9DCC-5809E0175AEC" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/2822758/download-monitor/trunk/src/Admin/Reports/class-dlm-reports.php?contextall=1&old=2821522&old_path=%2Fdownload-monitor%2Ftrunk%2Fsrc%2FAdmin%2FReports%2Fclass-dlm-reports.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9000c52-fdd7-43e2-ae6a-9f127c4a9fcd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4973.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4973.json index ee10e96e484..e4ff61456aa 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4973.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4973.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4973", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:12.497", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:58:30.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.0.2", + "matchCriteriaId": "A54B0FB0-4E00-4D19-A948-394A668C9312" + } + ] + } + ] + } + ], "references": [ { "url": "https://core.trac.wordpress.org/changeset/53961", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json index 61327e62ddd..9094acc1baa 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38409", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T22:15:09.540", - "lastModified": "2023-07-27T03:49:09.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:04.137", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10290.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10290.json index 5d81d72e3b0..e5cc4403f28 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10290.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10290.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10290", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T15:15:30.110", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:06:00.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*", + "matchCriteriaId": "654D0493-9784-4B2B-BC05-69B4BB6F86F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/zzcms2023/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.281559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.281559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.427069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10296.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10296.json index 6a0a8f029fe..5b15ec069a9 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10296.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10296", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T17:15:13.690", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:13:18.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anujkumar:medical_card_generation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BEA0DF27-1627-47C5-B007-78DC8E84DCCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.281563", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281563", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.427400", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10353.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10353.json index 01e3f552d2e..e18c3be5dd4 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10353.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10353.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10353", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-25T00:15:02.800", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:21:35.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,26 +150,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_exam_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D4A488EE-05AF-47AC-8F21-317C507E55C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1hEXfbOOkWdYzaSI6ORQvPGBtn09R12Ui/view?usp=drive_link", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.281700", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281700", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.427957", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10354.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10354.json index a1f7809bfc6..d65e82a7d67 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10354.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10354", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-25T01:15:13.213", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:32:48.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/K1nako0/tmp_vuln3/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.281701", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281701", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.430074", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10368.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10368.json index 57419e66193..cc43fac91c7 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10368.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10368.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10368", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-25T02:15:02.327", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:46:30.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/17", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281760", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281760", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.430114", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10369.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10369.json index d0f95c4a1df..cbf609eabe2 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10369.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10369.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10369", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-25T02:15:02.613", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:50:32.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +150,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/18", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281761", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281761", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.430115", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10370.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10370.json index ac962eef6b7..22f81cf08ee 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10370.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10370", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-25T02:15:02.910", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:38:40.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/19", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281762", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281762", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.430607", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json index b5fd9b239c5..67f8ee18280 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json @@ -2,13 +2,13 @@ "id": "CVE-2024-22455", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-14T07:15:09.803", - "lastModified": "2024-10-16T16:10:10.413", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:15:18.117", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nDell E-Lab Navigator, [3.1.9, 3.2.0], contains an Insecure Direct Object Reference Vulnerability in Feedback submission. An attacker could potentially exploit this vulnerability, to manipulate the email's appearance, potentially deceiving recipients and causing reputational and security risks.\n\n" + "value": "Dell Mobility - E-Lab Navigator, version(s) 3.1.9, 3.2.0, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Launch of phishing attacks." }, { "lang": "es", @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security_alert@emc.com", "type": "Primary", "description": [ { @@ -71,12 +71,12 @@ ] }, { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-451" + "value": "CWE-639" } ] } diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25087.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25087.json index 135b376e55b..2af883a13be 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25087.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25087", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T16:15:04.157", - "lastModified": "2024-07-05T17:04:43.917", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:07.993", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json index f4ebf221390..c526a9c907a 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25837", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T18:15:08.907", - "lastModified": "2024-08-19T13:00:23.117", + "lastModified": "2024-10-30T15:35:08.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en el complemento CMS Bloghub v1.3.8 y anteriores de octubre permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado en la secci\u00f3n Comentarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/RatMD/bloghub-plugin/blob/master/CHANGELOG.md#version-139---stable", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25876.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25876.json index 33e86519674..ade9da9fffc 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25876.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25876.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25876", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T14:15:47.033", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-10-30T16:35:12.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en el m\u00f3dulo de encabezado de Enhavo CMS v0.13.1 permite a los atacantes ejecutar scrips web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto T\u00edtulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-titel-v0.13.1.md", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26271.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26271.json index 0bb237dda15..1518827ed28 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26271.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26271.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26271", "sourceIdentifier": "security@liferay.com", "published": "2024-10-22T15:15:05.523", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:04:11.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@liferay.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "security@liferay.com", "type": "Secondary", @@ -51,10 +81,112 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*", + "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*", + "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*", + "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*", + "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", + "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", + "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.1:*:*:*:*:*:*", + "matchCriteriaId": "1A13C2E9-9260-466E-9D98-0021CB2F41F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.5:*:*:*:*:*:*", + "matchCriteriaId": "08FB7951-AEED-4B44-8504-ACA10D5B99B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.0:*:*:*:*:*:*", + "matchCriteriaId": "B6C54C71-6885-475B-939B-CEC309579BBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.2:*:*:*:*:*:*", + "matchCriteriaId": "4E4B4759-C7D4-4A33-B1B8-29869F60FEE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.3.75", + "versionEndExcluding": "7.4.3.112", + "matchCriteriaId": "FEDE37FB-83BC-41D6-94D7-DE087BC4FE14" + } + ] + } + ] + } + ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26271", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26272.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26272.json index ccbc3335dbf..84cca8a6988 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26272.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26272.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26272", "sourceIdentifier": "security@liferay.com", "published": "2024-10-22T15:15:05.740", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:03:51.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@liferay.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "security@liferay.com", "type": "Secondary", @@ -51,10 +81,129 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*", + "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*", + "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*", + "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*", + "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*", + "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", + "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", + "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.1:*:*:*:*:*:*", + "matchCriteriaId": "1A13C2E9-9260-466E-9D98-0021CB2F41F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.5:*:*:*:*:*:*", + "matchCriteriaId": "08FB7951-AEED-4B44-8504-ACA10D5B99B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.0:*:*:*:*:*:*", + "matchCriteriaId": "B6C54C71-6885-475B-939B-CEC309579BBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.2:*:*:*:*:*:*", + "matchCriteriaId": "4E4B4759-C7D4-4A33-B1B8-29869F60FEE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.2", + "versionEndIncluding": "7.3.7", + "matchCriteriaId": "4F2C2272-3E19-4836-BCA5-660208D5985D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.3.108", + "matchCriteriaId": "D23EB185-798C-4F89-8AAA-6D229BCD8BA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26272", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26273.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26273.json index 4ba3ebf5685..fec7ffbcf9a 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26273.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26273", "sourceIdentifier": "security@liferay.com", "published": "2024-10-22T15:15:05.937", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:03:35.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@liferay.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "security@liferay.com", "type": "Secondary", @@ -51,10 +81,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*", + "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*", + "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*", + "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*", + "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*", + "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.1:*:*:*:*:*:*", + "matchCriteriaId": "1A13C2E9-9260-466E-9D98-0021CB2F41F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.5:*:*:*:*:*:*", + "matchCriteriaId": "08FB7951-AEED-4B44-8504-ACA10D5B99B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.0:*:*:*:*:*:*", + "matchCriteriaId": "B6C54C71-6885-475B-939B-CEC309579BBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.2:*:*:*:*:*:*", + "matchCriteriaId": "4E4B4759-C7D4-4A33-B1B8-29869F60FEE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.3.104", + "matchCriteriaId": "2BF93004-E003-45A8-A84A-86710D138F3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26273", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2606.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2606.json index e68bd6dbafe..b2e6c39dba0 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2606.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2606.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2606", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:08.740", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-10-30T15:35:09.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Pasar datos no v\u00e1lidos podr\u00eda haber dado lugar a la creaci\u00f3n de valores wasm no v\u00e1lidos, como n\u00fameros enteros arbitrarios que se convierten en valores de puntero. Esta vulnerabilidad afecta a Firefox < 124. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879237", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2610.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2610.json index 1864ac5cb3a..9c358c8f475 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2610.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2610.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2610", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:08.957", - "lastModified": "2024-03-25T17:15:51.833", + "lastModified": "2024-10-30T16:35:13.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Al utilizar una inyecci\u00f3n de marcado, un atacante podr\u00eda haber robado valores nonce. Esto podr\u00eda haberse utilizado para eludir las estrictas pol\u00edticas de seguridad de contenido. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2630.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2630.json index f026ae3e8cb..01dba8f0f69 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2630.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2630.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2630", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-20T17:15:07.660", - "lastModified": "2024-04-01T15:23:32.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:14.117", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35495.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35495.json index 3cfc8b85937..7bb5718a26a 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35495.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35495.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35495", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T18:15:05.713", - "lastModified": "2024-10-04T13:51:25.567", + "lastModified": "2024-10-30T15:35:10.887", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente Telemetr\u00eda en TP-Link Kasa KP125M V1.0.0 y Tapo P125M 1.0.0 Build 220930 Rel.143947 permite a los atacantes observar el estado del dispositivo mediante la observaci\u00f3n del tr\u00e1fico de la red." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "https://github.com/Chapoly1305/tp-link-cve/blob/main/CVE-2024-35495.md", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3634.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3634.json index ef23ed5c83c..6ad53b62572 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3634.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3634.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3634", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-15T06:15:13.447", - "lastModified": "2024-05-15T16:40:19.330", + "lastModified": "2024-10-30T16:35:16.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/76e000e0-314f-4e39-8871-68bf8cc95b22/", diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3752.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3752.json index fa938376d07..e96a0479c3c 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3752.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3752.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3752", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-06T06:15:07.080", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-10-30T16:35:17.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Crelly Slider de WordPress hasta la versi\u00f3n 1.4.5 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/", diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json index dfcddfb6ffe..50613b9e6b9 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3801.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3801", "sourceIdentifier": "cvd@cert.pl", "published": "2024-06-28T13:15:03.157", - "lastModified": "2024-07-03T14:36:52.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:18.490", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json index 8a18c42dbc9..e4c286fdce8 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3980", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.210", - "lastModified": "2024-10-29T14:15:06.670", - "vulnStatus": "Modified", + "lastModified": "2024-10-30T15:33:12.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-88" + "value": "CWE-22" } ] }, @@ -88,11 +88,42 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_1:*:*:*:*:*:*", + "matchCriteriaId": "BC4CE02B-F8CF-4A9E-B9FC-AEFE59F4BCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf1:*:*:*:*:*:*", + "matchCriteriaId": "0B90ED6E-68E4-4C14-B275-F44BAC1B9C5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf2:*:*:*:*:*:*", + "matchCriteriaId": "196E08EA-807C-4B7B-981A-96D106AC328B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf3:*:*:*:*:*:*", + "matchCriteriaId": "680FAE83-9D7A-4AD9-AFBE-480FD105ADC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf4:*:*:*:*:*:*", + "matchCriteriaId": "014C8428-8F88-4C3D-B9B1-87DE26867471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf5:*:*:*:*:*:*", + "matchCriteriaId": "06AFA271-0785-4526-B7DA-FA00672CC5B5" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", "versionEndExcluding": "10.6", - "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + "matchCriteriaId": "AEAAFA90-ACFF-47E2-A23D-728912D74B99" } ] } diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json index 69d8c2f6879..3d1f5ebb0f8 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3982.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3982", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.557", - "lastModified": "2024-08-28T16:30:50.080", + "lastModified": "2024-10-30T15:32:23.680", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -91,8 +91,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", "versionEndExcluding": "10.6", - "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + "matchCriteriaId": "AEAAFA90-ACFF-47E2-A23D-728912D74B99" } ] } diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json index c37300c4a18..70d14eacbba 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40743.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40743", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:11.457", - "lastModified": "2024-08-21T12:30:33.697", + "lastModified": "2024-10-30T15:35:12.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Los m\u00e9todos stripImages y stripIframes no procesaron correctamente las entradas, lo que gener\u00f3 vectores XSS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json index 26fdefaec6e..7b5a8e4c351 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40767", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T05:15:12.907", - "lastModified": "2024-07-30T19:19:40.767", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:12.440", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json index 740c718af79..2f07ad0ac27 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40789.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40789", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:12.270", - "lastModified": "2024-08-23T15:38:01.380", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:13.230", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json index 5ec1aeacd30..5c6e317ea07 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40792", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.670", - "lastModified": "2024-10-29T17:28:34.383", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:18.823", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40834.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40834.json index 81a1c0a1966..2e8597a2325 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40834.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40834.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40834", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:14.413", - "lastModified": "2024-08-23T14:40:52.523", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:14.080", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json index 90c8f07bf18..df5ca0c9f27 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40851", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.740", - "lastModified": "2024-10-29T17:42:35.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:14.883", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json index 3e91f54093d..fad6ea5591d 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44080.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44080", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:03.633", - "lastModified": "2024-10-29T22:15:03.633", + "lastModified": "2024-10-30T15:35:15.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Jitsi Meet before 2.0.9779, the functionality to share an image using giphy was implemented in an insecure way, resulting in clients loading GIFs from any arbitrary URL if a message from another participant contains a URL encoded in the expected format." + }, + { + "lang": "es", + "value": " En Jitsi Meet anterior a 2.0.9779, la funcionalidad para compartir una imagen usando giphy se implement\u00f3 de manera insegura, lo que provocaba que los clientes cargaran GIF desde cualquier URL arbitraria si un mensaje de otro participante conten\u00eda una URL codificada en el formato esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/jitsi/jitsi-meet/compare/jitsi-meet_9672...jitsi-meet_9673", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json index 7da09f9817b..aff6fa50419 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44159", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.603", - "lastModified": "2024-10-29T17:33:37.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:19.750", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json index b8c75e76e60..2bf76bfb2a1 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44174", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.667", - "lastModified": "2024-10-29T17:33:16.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:20.507", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-754" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json index b87ac22b613..e7796dfb881 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44175", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.737", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:35:21.327", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sequoia 15 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json index 298e04cc1b6..1744b660660 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44196", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.860", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:35:22.640", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json index 9380ece68fd..37ccc5e8d27 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44255", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.003", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:35:24.113", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de manejo de rutas con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en visionOS 2.1, iOS 18.1 y iPadOS 18.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y tvOS 18.1. Una aplicaci\u00f3n maliciosa podr\u00eda ejecutar accesos directos arbitrarios sin el consentimiento del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json index a195e157ab8..5d272786964 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44267", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.513", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:35:26.040", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json index 19ec02f9d7d..dbb445d5703 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44270", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.667", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:35:26.390", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un proceso aislado puede eludir las restricciones de la zona protegida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json index c3be9667000..bcb8c9a70a3 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44279.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44279", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.110", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-30T15:35:16.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json index bd1bfe5c1f5..77f0c150c1b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44280.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44280", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.180", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:35:17.173", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Se solucion\u00f3 un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json index 89f81ff69d6..97ee79fafe8 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44289", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.680", - "lastModified": "2024-10-29T20:25:47.537", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:28.097", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json index 870fade5844..0961a808bd0 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44296.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44296", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.830", - "lastModified": "2024-10-29T23:15:03.770", + "lastModified": "2024-10-30T15:35:17.433", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de contenido web manipulado con fines malintencionados puede impedir que se aplique la Pol\u00edtica de seguridad de contenido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121563", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json index 84203840858..0b932492a9f 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44297.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44297", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.910", - "lastModified": "2024-10-29T20:23:37.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T15:35:17.777", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47901.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47901.json index d2864313a00..ef0780695c8 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47901.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47901.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47901", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-23T15:15:30.930", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:39:47.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -62,8 +62,28 @@ ], "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", @@ -95,10 +115,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.2.12", + "matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2.12", + "matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47902.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47902.json index 46900ffd37c..fe792d1150d 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47902.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47902", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-23T15:15:31.163", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:48:39.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -62,8 +62,28 @@ ], "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -95,10 +115,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.2.12", + "matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2.12", + "matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47903.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47903.json index f422f3c3dee..daba06962a7 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47903.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47903", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-23T15:15:31.397", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:54:34.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -62,8 +62,28 @@ ], "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", @@ -85,8 +105,18 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -95,10 +125,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.2.12", + "matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2.12", + "matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47904.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47904.json index 7fd8b9a7887..bb626ab4842 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47904.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47904.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47904", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-23T15:15:31.687", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:39:06.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,18 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -95,10 +105,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.2.12", + "matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2.12", + "matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json index 3384d2645db..48e87b98e61 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48063", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.080", - "lastModified": "2024-10-29T21:15:04.080", + "lastModified": "2024-10-30T15:35:17.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE." + }, + { + "lang": "es", + "value": " En PyTorch <=2.4.1, RemoteModule tiene RCE de deserializaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/hexian2001/c046c066895a963ecc0a2cf9e1180065", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json index faa134b7dc4..ef5646f145a 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48138.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48138", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:03.810", - "lastModified": "2024-10-29T22:15:03.810", + "lastModified": "2024-10-30T15:35:18.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en el componente /PluXml/core/admin/parametres_edittpl.php de PluXml v5.8.16 y anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la inyecci\u00f3n de un payload manipulado en una plantilla." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/pluxml/PluXml/issues/829", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json index 72b4385e0cc..4ef4661ce5f 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48206.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48206", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.190", - "lastModified": "2024-10-29T21:15:04.190", + "lastModified": "2024-10-30T15:35:19.677", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Deserialization of Untrusted Data vulnerability in chainer v7.8.1.post1 leads to execution of arbitrary code." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de deserializaci\u00f3n de datos no confiables en chainer v7.8.1.post1 conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/hexian2001/51c6257351098e5b086a12ad247cc6ca", diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json index 44600717fa7..ae74cbf59ed 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48572.json @@ -2,16 +2,32 @@ "id": "CVE-2024-48572", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:03.913", - "lastModified": "2024-10-29T22:15:03.913", + "lastModified": "2024-10-30T15:35:20.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A User enumeration vulnerability in AquilaCMS 1.409.20 and prior allows unauthenticated attackers to obtain email addresses via the \"Add a user\" feature. The vulnerability occurs due to insufficiently validated user input being processed as a regular expression, which is then matched against email addresses to find duplicate entries." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de enumeraci\u00f3n de usuarios en AquilaCMS 1.409.20 y versiones anteriores permite a atacantes no autenticados obtener direcciones de correo electr\u00f3nico a trav\u00e9s de la funci\u00f3n \"Agregar un usuario\". La vulnerabilidad se produce debido a que la entrada de usuario no validada de forma suficiente se procesa como una expresi\u00f3n regular, que luego se compara con las direcciones de correo electr\u00f3nico para encontrar entradas duplicadas." } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-48572", diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json index 2842744f9a2..37d601c38d2 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48573.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48573", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T22:15:04.003", - "lastModified": "2024-10-29T22:15:04.003", + "lastModified": "2024-10-30T15:35:21.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NoSQL injection vulnerability in AquilaCMS 1.409.20 and prior allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n NoSQL en AquilaCMS 1.409.20 y versiones anteriores permite a atacantes no autenticados restablecer las contrase\u00f1as de cuentas de usuario y administrador a trav\u00e9s de la funci\u00f3n \"Restablecer contrase\u00f1a\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-48573", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json index 41221ec708b..5c9a4237c26 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T18:15:05.690", - "lastModified": "2024-10-29T18:15:05.690", + "lastModified": "2024-10-30T15:35:22.063", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In NetAdmin 4.0.30319, an attacker can steal a valid session cookie and inject it into another device, granting unauthorized access. This type of attack is commonly referred to as session hijacking." + }, + { + "lang": "es", + "value": " En NetAdmin 4.0.30319, un atacante puede robar una cookie de sesi\u00f3n v\u00e1lida e inyectarla en otro dispositivo, lo que le otorga acceso no autorizado. Este tipo de ataque se conoce com\u00fanmente como secuestro de sesi\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json index e6f90410a65..526b061fe24 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4872", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:05.890", - "lastModified": "2024-10-29T14:15:07.950", - "vulnStatus": "Modified", + "lastModified": "2024-10-30T15:31:41.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-89" + "value": "NVD-CWE-Other" } ] }, @@ -88,11 +88,37 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf1:*:*:*:*:*:*", + "matchCriteriaId": "0B90ED6E-68E4-4C14-B275-F44BAC1B9C5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf2:*:*:*:*:*:*", + "matchCriteriaId": "196E08EA-807C-4B7B-981A-96D106AC328B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf3:*:*:*:*:*:*", + "matchCriteriaId": "680FAE83-9D7A-4AD9-AFBE-480FD105ADC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf4:*:*:*:*:*:*", + "matchCriteriaId": "014C8428-8F88-4C3D-B9B1-87DE26867471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf5:*:*:*:*:*:*", + "matchCriteriaId": "06AFA271-0785-4526-B7DA-FA00672CC5B5" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", "versionEndExcluding": "10.6", - "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + "matchCriteriaId": "AEAAFA90-ACFF-47E2-A23D-728912D74B99" } ] } diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49210.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49210.json index 2eb008c334b..f82cd5d7753 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49210.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49210", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:05.970", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:13:12.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -39,14 +59,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0.0", + "versionEndExcluding": "2024.09", + "matchCriteriaId": "34F58440-3584-4424-81BD-66B2317601BB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49211.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49211.json index 81e8d734a3c..2d7c6a41e01 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49211.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49211", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:06.193", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:08:23.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -39,14 +59,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0.0", + "versionEndExcluding": "2024.09", + "matchCriteriaId": "34F58440-3584-4424-81BD-66B2317601BB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json index ebe1ac5bc84..25e1f376100 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50068", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.107", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:57:35.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/tests/sysfs-kunit.h: corrige p\u00e9rdida de memoria en damon_sysfs_test_add_targets(). La regi\u00f3n sysfs_target->regions asignada en damon_sysfs_regions_alloc() no se libera en damon_sysfs_test_add_targets(), lo que causa la siguiente p\u00e9rdida de memoria; lib\u00e9rela para corregirla. objeto sin referencia 0xffffff80c2a8db80 (tama\u00f1o 96): comm \"kunit_try_catch\", pid 187, jiffies 4294894363 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000008e6835c1>] __kmalloc_cache_noprof+0x26c/0x2f4 [<000000001286d9f8>] damon_sysfs_test_add_targets+0x1cc/0x738 [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05d43455f6bffa6abc7b937ca58be00452e6973f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d6a1c835685de3b0c8e8dc871f60f4ef92ab01a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json index e3b13b4313f..c28b01e47b5 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50069.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50069", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.180", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:58:19.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,118 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: apple: comprobar el valor devuelto por devm_kasprintf() devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto no se comprueba. Corrija esta falla y compruebe el valor devuelto. Encontrado por revisi\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.114", + "matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.58", + "matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a4d4dbef622ac8796a6665e0080da2685f9220a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d2296fb7c80fdc9925d29a8e85d617cad08731a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/665a58fe663ac7a9ea618dc0b29881649324b116", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fad940e2dd789155f99ecafa71a7baf6f96530bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json index 5a7e53a48ba..6c9ed920caa 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50070.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50070", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.257", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T16:59:39.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,104 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: stm32: comprobar el valor devuelto por devm_kasprintf() devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto no se comprueba. Corrija esta falla y compruebe el valor devuelto. Encontrado por revisi\u00f3n de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.58", + "matchCriteriaId": "EF2A1323-F872-46E8-8B68-855EFEFA193F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1f266957ae1207b0717c2d69096bc70654ae9fcb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b36bb1fca2b87f6292ca2a8593f297c5e9fab41", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0f0e3f0552a566def55c844b0d44250c58e4df6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json index 2b28747a1f2..8762f4bf0a6 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50080", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.000", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:54:17.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,104 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ublk: no se permite la copia de usuario para dispositivos sin privilegios UBLK_F_USER_COPY requiere que el espacio de usuario llame a write() en el dispositivo char ublk para llenar el b\u00fafer de solicitud y no se puede confiar en el dispositivo sin privilegios. Por lo tanto, no se permite la copia de usuario para dispositivos sin privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.6.58", + "matchCriteriaId": "FEC88080-D5B8-4C77-A0D1-810E9D61FD60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/42aafd8b48adac1c3b20fe5892b1b91b80c1a1e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6414ab5c9c9c068eca6dc4fd3a036bc4b83164dc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8f3d5686a2409877c5e8e2540774d24ed2b4a4ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json index d2b2f0ba0ed..549fe55dff2 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50081", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.073", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:45:39.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-mq: configurar queue ->tag_set antes de inicializar hctx el commit 7b815817aa58 (\"blk-mq: agregar asistente para verificar si una CPU est\u00e1 asignada a hctx especificado\") necesita verificar la asignaci\u00f3n de cola a trav\u00e9s del conjunto de etiquetas en el controlador cpuhp de hctx. Sin embargo, es posible que q->tag_set a\u00fan no est\u00e9 configurado cuando el controlador cpuhp est\u00e1 habilitado, luego se activa el error del kernel. Solucione el problema configurando queue tag_set antes de inicializar hctx." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "E1D573E2-61FD-4C3B-B3BD-5FBEFD6391F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/c25c0c9035bb8b28c844dfddeda7b8bdbcfcae95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d28b256db525d9432bc3eb2c8d83f7d3f5e1cc87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json index 26308beda8a..f12e718518a 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50082.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50082", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.147", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:44:05.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,146 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-rq-qos: se corrige el fallo en la ejecuci\u00f3n rq_qos_wait vs. rq_qos_wake_function Estamos viendo fallos de rq_qos_wake_function que se parecen a esto: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ffffafe180a40084 #PF: acceso de escritura de supervisor en modo kernel #PF: error_code(0x0002) - p\u00e1gina no presente PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0 Oops: Oops: 0002 [#1] PREEMPT SMP PTI CPU: 17 UID: 0 PID: 0 Comm: swapper/17 No contaminado 6.12.0-rc3-00013-geca631b8fe80 #11 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 01/04/2014 RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40 C\u00f3digo: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00 RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046 RAX: 000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084 RBP: 0000000000000000 R08: 000000000001e7240 R09: 0000000000000011 R10: 00000000000000028 R11: 00000000000000888 R12: 0000000000000002 R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003 FS: 000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: try_to_wake_up+0x5a/0x6a0 rq_qos_wake_function+0x71/0x80 __wake_up_common+0x75/0xa0 __wake_up+0x36/0x60 scale_up.part.0+0x50/0x110 wb_timer_fn+0x227/0x450 ... Entonces rq_qos_wake_function() llama a wake_up_process(data->task), que llama a try_to_wake_up(), que falla en raw_spin_lock_irqsave(&p->pi_lock). p viene de data->task, y data viene de la entrada de la cola de espera, que se almacena en la pila del que espera en rq_qos_wait(). Al analizar el volcado de memoria con drgn, descubr\u00ed que el que espera ya se hab\u00eda despertado y se hab\u00eda movido a una ruta de c\u00f3digo completamente no relacionada, destruyendo lo que antes era data->task. Mientras tanto, el waker estaba pasando la basura golpeada en data->task a wake_up_process(), lo que provoc\u00f3 el bloqueo. Lo que est\u00e1 sucediendo es que entre rq_qos_wake_function() eliminando la entrada de la cola de espera y llamando a wake_up_process(), rq_qos_wait() descubre que ya obtuvo un token y regresa. La ejecuci\u00f3n se ve as\u00ed: rq_qos_wait() rq_qos_wake_function() ============================================================ prepare_to_wait_exclusive() data->got_token = true; list_del_init(&curr->entry); if (data.got_token) break; finish_wait(&rqw->wait, &data.wq); ^- retorna inmediatamente porque list_empty_careful(&wq_entry->entry) es verdadero... retorna, ve a hacer otra cosa... wake_up_process(data->task) (\u00a1YA NO ES V\u00c1LIDO!)-^ Normalmente, se supone que finish_wait() se sincroniza con el activador. Pero, como se se\u00f1al\u00f3 anteriormente, retorna inmediatamente porque la entrada de la cola de espera ya se elimin\u00f3 de la cola de espera. El error es que rq_qos_wake_function() est\u00e1 accediendo a la entrada de la cola de espera DESPU\u00c9S de eliminarla. Tenga en cuenta que autoremove_wake_function() despierta al que espera y LUEGO elimina la entrada de la cola de espera, que es el orden correcto. Arr\u00e9glelo intercambiando el orden. Tambi\u00e9n debemos usar list_del_init_careful() para que coincida con list_empty_careful() en finish_wait()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "5.10.228", + "matchCriteriaId": "AC13DFD5-0BA4-4713-BBB2-F08C0E282CB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.169", + "matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.114", + "matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.58", + "matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/04f283fc16c8d5db641b6bffd2d8310aa7eccebc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3bc6d0f8b70a9101456cf02ab99acb75254e1852", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/455a469758e57a6fe070e3e342db12e4a629e0eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c5b123ab289767afe940389dbb963c5c05e594e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5e900a3612b69423a0e1b0ab67841a1fb4af80f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e972b08b91ef48488bae9789f03cfedb148667fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json index e2dd12763f6..072cff007d5 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50083", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.240", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T15:07:02.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,141 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: se corrige la corrupci\u00f3n de DSS de mptcp debido a una gran xmit pmtu Syzkaller pudo desencadenar una corrupci\u00f3n de DSS: TCP: request_sock_subflow_v4: Posible inundaci\u00f3n de SYN en el puerto [::]:20002. Env\u00edo de cookies. ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 5227 en net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 M\u00f3dulos vinculados en: CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 No contaminado 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 C\u00f3digo: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 <0f> 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff RSP: 0018:ffffc90000006db8 EFLAGS: 00010246 RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00 RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 000000000000055f0 RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8 R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 000000000000000 R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5 FS: 000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: move_skbs_to_msk net/mptcp/protocol.c:811 [en l\u00ednea] mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854 subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490 tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283 tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237 tcp_v4_do_rcv+0x96d/0xc70 red/ipv4/tcp_ipv4.c:1915 tcp_v4_rcv+0x2dc0/0x37f0 red/ipv4/tcp_ipv4.c:2350 entrega_protocolo_ip_rcu+0x22e/0x440 red/ipv4/ip_input.c:205 entrega_local_ip_finish+0x341/0x5f0 red/ipv4/ip_input.c:233 NF_HOOK+0x3a4/0x450 incluir/linux/netfilter.h:314 NF_HOOK+0x3a4/0x450 incluir/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5662 [en l\u00ednea] __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775 process_backlog+0x662/0x15b0 net/core/dev.c:6107 __napi_poll+0xcb/0x490 net/core/dev.c:6771 napi_poll net/core/dev.c:6840 [en l\u00ednea] net_rx_action+0x89b/0x1240 net/core/dev.c:6962 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 do_softirq+0x11b/0x1e0 kernel/softirq.c:455 __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [en l\u00ednea] rcu_read_unlock_bh include/linux/rcupdate.h:919 [en l\u00ednea] __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451 dev_queue_xmit include/linux/netdevice.h:3094 [en l\u00ednea] neigh_hh_output include/net/neighbour.h:526 [en l\u00ednea] neigh_output include/net/neighbour.h:540 [en l\u00ednea] ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236 ip_local_out net/ipv4/ip_output.c:130 [en l\u00ednea] __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536 __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466 tcp_transmit_skb net/ipv4/tcp_output.c:1484 [en l\u00ednea] tcp_mtu_probe net/ipv4/tcp_output.c:2547 [en l\u00ednea] tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752 __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015 tcp_push_pending_frames incluir/net/tcp.h:2107 [en l\u00ednea] tcp_data_snd_check net/ipv4/tcp_input.c:5714 [en l\u00ednea] tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239 tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915 sk_backlog_rcv incluir/net/sock.h:1113 [en l\u00ednea] __release_sock+0x214/0x350 net/core/sock.c:3072 release_sock+0x61/0x1f0 net/core/sock.c:3626 mptcp_push_ ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.228", + "matchCriteriaId": "23D95807-ADA5-452C-BBD3-C14EA7B6CC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.169", + "matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.114", + "matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.58", + "matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/229dfdc36f31a8d47433438bc0e6e1662c4ab404", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4dabcdf581217e60690467a37c956a5b8dbc6bd9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9729010a0ac5945c1bf6847dd0778d8a1a4b72ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba8e65814e519eeb17d086952bce7de93f7a40da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c38add9ac0e4d4f418e6443a688491499021add9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db04d1848777ae52a7ab93c4591e7c0bf8f55fb4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50344.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50344.json new file mode 100644 index 00000000000..7f962ba000f --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50344.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50344", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-30T16:15:04.763", + "lastModified": "2024-10-30T16:15:04.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to be executed with the application context. An attacker can exploit this vulnerability by uploading a supplementary file that contains a malicious code or script. This code will then be executed when the file is loaded in the browser. The vulnerability was fixed in version 5.11.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mkucej/i-librarian-free/commit/a67d7949ffb02fd912ebdcf552df006b44066d78", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/mkucej/i-librarian-free/security/advisories/GHSA-c2rm-w62w-5xmj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50419.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50419.json new file mode 100644 index 00000000000..e79813fea5c --- /dev/null +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50419.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50419", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-30T15:15:19.360", + "lastModified": "2024-10-30T15:15:19.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Wpsoul Greenshift \u2013 animation and page builder blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Greenshift \u2013 animation and page builder blocks: from n/a through 9.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/greenshift-animation-and-page-builder-blocks/wordpress-greenshift-animation-and-page-builder-blocks-plugin-9-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json index ed418ec6529..53d51225f93 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51257.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51257", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.267", - "lastModified": "2024-10-30T14:15:08.267", + "lastModified": "2024-10-30T16:35:28.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doCertificate function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json index 4af6533233a..d9282e4f860 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51298.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51298", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.430", - "lastModified": "2024-10-30T14:15:08.430", + "lastModified": "2024-10-30T16:35:29.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doGRETunnel function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json index c3827677266..e3aa2ddd590 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json @@ -2,13 +2,17 @@ "id": "CVE-2024-51378", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T23:15:04.083", - "lastModified": "2024-10-30T00:15:03.213", + "lastModified": "2024-10-30T15:35:23.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected." + }, + { + "lang": "es", + "value": " getresetstatus en dns/views.py y ftp/views.py en CyberPanel (tambi\u00e9n conocido como Cyber Panel) anterior a 1c0c6cb permite a atacantes remotos omitir la autenticaci\u00f3n y ejecutar comandos arbitrarios a trav\u00e9s de /dns/getresetstatus o /ftp/getresetstatus omitiendo secMiddleware (que es solo para una solicitud POST) y utilizando metacaracteres de shell en la propiedad statusfile, como lo explot\u00f3 PSAUX en octubre de 2024. Las versiones hasta 2.3.6 y 2.3.7 (sin parchear) se ven afectadas." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/420.html", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6238.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6238.json index c85b97fdac8..31f52e2e3df 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6238.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6238.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6238", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-06-25T16:15:25.727", - "lastModified": "2024-06-25T18:50:42.040", + "lastModified": "2024-10-30T16:35:29.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/pgadmin-org/pgadmin4/issues/7605", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6657.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6657.json index 3a7acf57339..a00e194cc34 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6657.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6657.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6657", "sourceIdentifier": "product-security@silabs.com", "published": "2024-10-11T14:15:05.770", - "lastModified": "2024-10-15T12:58:51.050", + "lastModified": "2024-10-30T15:15:19.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -53,7 +53,7 @@ ], "references": [ { - "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm00000E9IIbIAN?operationContext=S1", + "url": "https://community.silabs.com/068Vm00000FPVg0", "source": "product-security@silabs.com" } ] diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json index 3563e36239e..4f49d723d0a 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7941.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7941", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-08-27T13:15:06.467", - "lastModified": "2024-08-28T16:09:03.693", + "lastModified": "2024-10-30T15:29:26.673", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 6.1, + "baseScore": 4.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, - "impactScore": 2.7 + "impactScore": 1.4 }, { "source": "cybersecurity@hitachienergy.com", @@ -90,9 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.6", - "matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC" + "criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:10.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8581ADCD-38BE-457C-9EDA-368953050752" } ] } diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7976.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7976.json index 2110d8d3413..11870191682 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7976.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7976", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.583", - "lastModified": "2024-08-22T17:39:54.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T16:35:30.723", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8900.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8900.json index 08d926ad666..ead65f0f6b5 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8900.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8900.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8900", "sourceIdentifier": "security@mozilla.org", "published": "2024-09-17T19:15:29.163", - "lastModified": "2024-10-01T16:15:10.293", + "lastModified": "2024-10-30T15:35:26.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json index 07b31cd6b8a..456b806f7c6 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9287.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9287", "sourceIdentifier": "cna@python.org", "published": "2024-10-22T17:15:06.697", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-10-30T16:15:05.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -74,6 +74,10 @@ } ], "references": [ + { + "url": "https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/124651", "source": "cna@python.org" diff --git a/README.md b/README.md index 0bf4f9eaba2..a6b5cb3026c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-30T15:00:19.821059+00:00 +2024-10-30T17:00:20.690193+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-30T14:56:07.497000+00:00 +2024-10-30T16:59:39.013000+00:00 ``` ### Last Data Feed Release @@ -33,64 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267660 +267662 ``` ### CVEs added in the last Commit -Recently added CVEs: `20` +Recently added CVEs: `2` -- [CVE-2024-23309](CVE-2024/CVE-2024-233xx/CVE-2024-23309.json) (`2024-10-30T14:15:04.153`) -- [CVE-2024-24777](CVE-2024/CVE-2024-247xx/CVE-2024-24777.json) (`2024-10-30T14:15:04.457`) -- [CVE-2024-28052](CVE-2024/CVE-2024-280xx/CVE-2024-28052.json) (`2024-10-30T14:15:04.720`) -- [CVE-2024-28875](CVE-2024/CVE-2024-288xx/CVE-2024-28875.json) (`2024-10-30T14:15:04.990`) -- [CVE-2024-31151](CVE-2024/CVE-2024-311xx/CVE-2024-31151.json) (`2024-10-30T14:15:05.507`) -- [CVE-2024-31152](CVE-2024/CVE-2024-311xx/CVE-2024-31152.json) (`2024-10-30T14:15:05.773`) -- [CVE-2024-32946](CVE-2024/CVE-2024-329xx/CVE-2024-32946.json) (`2024-10-30T14:15:06.033`) -- [CVE-2024-33603](CVE-2024/CVE-2024-336xx/CVE-2024-33603.json) (`2024-10-30T14:15:06.330`) -- [CVE-2024-33623](CVE-2024/CVE-2024-336xx/CVE-2024-33623.json) (`2024-10-30T14:15:06.597`) -- [CVE-2024-33626](CVE-2024/CVE-2024-336xx/CVE-2024-33626.json) (`2024-10-30T14:15:06.850`) -- [CVE-2024-33699](CVE-2024/CVE-2024-336xx/CVE-2024-33699.json) (`2024-10-30T14:15:07.100`) -- [CVE-2024-33700](CVE-2024/CVE-2024-337xx/CVE-2024-33700.json) (`2024-10-30T14:15:07.460`) -- [CVE-2024-50353](CVE-2024/CVE-2024-503xx/CVE-2024-50353.json) (`2024-10-30T14:15:07.790`) -- [CVE-2024-51257](CVE-2024/CVE-2024-512xx/CVE-2024-51257.json) (`2024-10-30T14:15:08.267`) -- [CVE-2024-51296](CVE-2024/CVE-2024-512xx/CVE-2024-51296.json) (`2024-10-30T14:15:08.337`) -- [CVE-2024-51298](CVE-2024/CVE-2024-512xx/CVE-2024-51298.json) (`2024-10-30T14:15:08.430`) -- [CVE-2024-51299](CVE-2024/CVE-2024-512xx/CVE-2024-51299.json) (`2024-10-30T14:15:08.510`) -- [CVE-2024-51300](CVE-2024/CVE-2024-513xx/CVE-2024-51300.json) (`2024-10-30T14:15:08.597`) -- [CVE-2024-51301](CVE-2024/CVE-2024-513xx/CVE-2024-51301.json) (`2024-10-30T14:15:08.680`) -- [CVE-2024-51304](CVE-2024/CVE-2024-513xx/CVE-2024-51304.json) (`2024-10-30T13:15:14.360`) +- [CVE-2024-50344](CVE-2024/CVE-2024-503xx/CVE-2024-50344.json) (`2024-10-30T16:15:04.763`) +- [CVE-2024-50419](CVE-2024/CVE-2024-504xx/CVE-2024-50419.json) (`2024-10-30T15:15:19.360`) ### CVEs modified in the last Commit -Recently modified CVEs: `54` +Recently modified CVEs: `93` -- [CVE-2024-34669](CVE-2024/CVE-2024-346xx/CVE-2024-34669.json) (`2024-10-30T14:22:47.337`) -- [CVE-2024-38002](CVE-2024/CVE-2024-380xx/CVE-2024-38002.json) (`2024-10-30T14:47:10.953`) -- [CVE-2024-3862](CVE-2024/CVE-2024-38xx/CVE-2024-3862.json) (`2024-10-30T14:35:11.003`) -- [CVE-2024-3935](CVE-2024/CVE-2024-39xx/CVE-2024-3935.json) (`2024-10-30T14:35:11.860`) -- [CVE-2024-44278](CVE-2024/CVE-2024-442xx/CVE-2024-44278.json) (`2024-10-30T14:35:12.077`) -- [CVE-2024-44285](CVE-2024/CVE-2024-442xx/CVE-2024-44285.json) (`2024-10-30T14:35:12.353`) -- [CVE-2024-47636](CVE-2024/CVE-2024-476xx/CVE-2024-47636.json) (`2024-10-30T14:32:17.523`) -- [CVE-2024-48119](CVE-2024/CVE-2024-481xx/CVE-2024-48119.json) (`2024-10-30T14:32:43.217`) -- [CVE-2024-48963](CVE-2024/CVE-2024-489xx/CVE-2024-48963.json) (`2024-10-30T14:54:53.937`) -- [CVE-2024-48964](CVE-2024/CVE-2024-489xx/CVE-2024-48964.json) (`2024-10-30T13:46:31.657`) -- [CVE-2024-50084](CVE-2024/CVE-2024-500xx/CVE-2024-50084.json) (`2024-10-30T14:56:07.497`) -- [CVE-2024-50085](CVE-2024/CVE-2024-500xx/CVE-2024-50085.json) (`2024-10-30T14:49:42.953`) -- [CVE-2024-50086](CVE-2024/CVE-2024-500xx/CVE-2024-50086.json) (`2024-10-30T14:46:09.080`) -- [CVE-2024-50087](CVE-2024/CVE-2024-500xx/CVE-2024-50087.json) (`2024-10-30T14:40:16.377`) -- [CVE-2024-51567](CVE-2024/CVE-2024-515xx/CVE-2024-51567.json) (`2024-10-30T14:35:14.933`) -- [CVE-2024-51568](CVE-2024/CVE-2024-515xx/CVE-2024-51568.json) (`2024-10-30T14:35:15.670`) -- [CVE-2024-6130](CVE-2024/CVE-2024-61xx/CVE-2024-6130.json) (`2024-10-30T14:35:16.383`) -- [CVE-2024-6509](CVE-2024/CVE-2024-65xx/CVE-2024-6509.json) (`2024-10-30T14:35:17.297`) -- [CVE-2024-6780](CVE-2024/CVE-2024-67xx/CVE-2024-6780.json) (`2024-10-30T14:35:18.040`) -- [CVE-2024-7763](CVE-2024/CVE-2024-77xx/CVE-2024-7763.json) (`2024-10-30T14:13:45.763`) -- [CVE-2024-7824](CVE-2024/CVE-2024-78xx/CVE-2024-7824.json) (`2024-10-30T13:50:18.053`) -- [CVE-2024-7825](CVE-2024/CVE-2024-78xx/CVE-2024-7825.json) (`2024-10-30T13:49:58.980`) -- [CVE-2024-7826](CVE-2024/CVE-2024-78xx/CVE-2024-7826.json) (`2024-10-30T13:48:53.220`) -- [CVE-2024-8444](CVE-2024/CVE-2024-84xx/CVE-2024-8444.json) (`2024-10-30T14:35:18.373`) -- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-10-30T14:46:14.127`) +- [CVE-2024-48063](CVE-2024/CVE-2024-480xx/CVE-2024-48063.json) (`2024-10-30T15:35:17.993`) +- [CVE-2024-48138](CVE-2024/CVE-2024-481xx/CVE-2024-48138.json) (`2024-10-30T15:35:18.830`) +- [CVE-2024-48206](CVE-2024/CVE-2024-482xx/CVE-2024-48206.json) (`2024-10-30T15:35:19.677`) +- [CVE-2024-48572](CVE-2024/CVE-2024-485xx/CVE-2024-48572.json) (`2024-10-30T15:35:20.497`) +- [CVE-2024-48573](CVE-2024/CVE-2024-485xx/CVE-2024-48573.json) (`2024-10-30T15:35:21.227`) +- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-10-30T15:31:41.743`) +- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-30T15:35:22.063`) +- [CVE-2024-49210](CVE-2024/CVE-2024-492xx/CVE-2024-49210.json) (`2024-10-30T16:13:12.307`) +- [CVE-2024-49211](CVE-2024/CVE-2024-492xx/CVE-2024-49211.json) (`2024-10-30T16:08:23.040`) +- [CVE-2024-50068](CVE-2024/CVE-2024-500xx/CVE-2024-50068.json) (`2024-10-30T16:57:35.427`) +- [CVE-2024-50069](CVE-2024/CVE-2024-500xx/CVE-2024-50069.json) (`2024-10-30T16:58:19.983`) +- [CVE-2024-50070](CVE-2024/CVE-2024-500xx/CVE-2024-50070.json) (`2024-10-30T16:59:39.013`) +- [CVE-2024-50080](CVE-2024/CVE-2024-500xx/CVE-2024-50080.json) (`2024-10-30T15:54:17.967`) +- [CVE-2024-50081](CVE-2024/CVE-2024-500xx/CVE-2024-50081.json) (`2024-10-30T15:45:39.047`) +- [CVE-2024-50082](CVE-2024/CVE-2024-500xx/CVE-2024-50082.json) (`2024-10-30T15:44:05.180`) +- [CVE-2024-50083](CVE-2024/CVE-2024-500xx/CVE-2024-50083.json) (`2024-10-30T15:07:02.577`) +- [CVE-2024-51257](CVE-2024/CVE-2024-512xx/CVE-2024-51257.json) (`2024-10-30T16:35:28.993`) +- [CVE-2024-51298](CVE-2024/CVE-2024-512xx/CVE-2024-51298.json) (`2024-10-30T16:35:29.790`) +- [CVE-2024-51378](CVE-2024/CVE-2024-513xx/CVE-2024-51378.json) (`2024-10-30T15:35:23.600`) +- [CVE-2024-6238](CVE-2024/CVE-2024-62xx/CVE-2024-6238.json) (`2024-10-30T16:35:29.987`) +- [CVE-2024-6657](CVE-2024/CVE-2024-66xx/CVE-2024-6657.json) (`2024-10-30T15:15:19.877`) +- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-10-30T15:29:26.673`) +- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-10-30T16:35:30.723`) +- [CVE-2024-8900](CVE-2024/CVE-2024-89xx/CVE-2024-8900.json) (`2024-10-30T15:35:26.207`) +- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-30T16:15:05.100`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4d5ca162617..b6f8a29fbd6 100644 --- a/_state.csv +++ b/_state.csv @@ -138411,7 +138411,7 @@ CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000 CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000 CVE-2019-25218,0,0,5b80931fba7b5b61a09b6a7cef47b52c4c321e607f57f9764b15a065a78a0d69,2024-10-21T17:10:22.857000 -CVE-2019-25219,0,0,e88697049c6c7bfe4584917de7b3f889cee4d72f7defcac97255b8b6ae9a8f79,2024-10-29T17:15:03.567000 +CVE-2019-25219,0,1,5a9c6fd8137a5395bbebfd600a3c9429c55154de7ddd9a4e7ecf893f26288516,2024-10-30T16:35:01.230000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -193049,7 +193049,7 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521 CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000 CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000 CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000 -CVE-2022-23861,0,0,1b79df6ad607e321a06ffd4f1414ad54f48e3b8a61921f1d2f0a02f3a735e314,2024-10-23T15:12:34.673000 +CVE-2022-23861,0,1,c12e5923e506db6637da2f4d7bfffd29645fd8e22872e2626b0a16457c09b7d0,2024-10-30T15:49:36.883000 CVE-2022-23862,0,0,2b721dae3c741fa798c190bd3375737db683c0e200456780df62dd1f1d9e42d1,2024-10-23T15:12:34.673000 CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000 CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000 @@ -194502,7 +194502,7 @@ CVE-2022-2551,0,0,74b4822c5fcf4cca0c95d4c747c1372c0e3abcbf7018cb0beceb636683cd01 CVE-2022-25510,0,0,aa70a911a68b456ea37e682c426fef231bc32631e9171aabcce3dc74fac8b8c4,2022-03-22T12:48:27.790000 CVE-2022-25511,0,0,9a085807ff010494608dae4a6c41b91e6d6464d68d2a5558e6026be3efbfc58d,2022-03-22T13:00:15.057000 CVE-2022-25512,0,0,66afc2e131e08a40c22cf7efe94a4d0a493509a1ce53d597bad0a179120be566,2022-03-22T12:47:36.107000 -CVE-2022-25514,0,1,53df0c6d04a736905ecf2aea338430c80cdfffe80d3a2399275f217c4e3b611f,2024-10-30T14:35:03.257000 +CVE-2022-25514,0,0,53df0c6d04a736905ecf2aea338430c80cdfffe80d3a2399275f217c4e3b611f,2024-10-30T14:35:03.257000 CVE-2022-25515,0,0,93918fc9715b23740ee7895accacb62ac409d8c89e1e0c0a7bba6dd4d52dac9e,2024-08-03T05:16:05.693000 CVE-2022-25516,0,0,abfdd25ac596ed3123174e2dbf33c43681db8f2181de6eee9d432a459d89a96e,2024-08-03T05:16:05.790000 CVE-2022-25517,0,0,a856c8add3a41498edd8eec5f2f20319411b2ad691016d19515161c14ec135f5,2024-08-03T05:16:05.883000 @@ -198103,7 +198103,7 @@ CVE-2022-29942,0,0,fc6818e24192943f3057a8472863591b0bb410e0e79a09a779f4711b67142 CVE-2022-29943,0,0,eb71e97800ee6b5a94d1e1a421a0d55ce4cb2015dadb56eeca914938a3f2d059,2022-05-13T17:23:57.113000 CVE-2022-29944,0,0,e0453dbd280c8ec27e5d94cb7d5b123a013998c63d2761a98d606f48d9a0c42e,2023-05-03T17:27:22.773000 CVE-2022-29945,0,0,f380615d8f5440312b415143b2443943838c53f7406b1f6016a4f3d97dd61ac0,2023-08-08T14:22:24.967000 -CVE-2022-29946,0,0,35b98985e5959bf121ee889866ada3c50315477891d70bf66d8c217b0e2e59b8,2024-07-12T12:49:11.340000 +CVE-2022-29946,0,1,5ec202bd25f66840f4cdf614c9274cd0b945e73801e9e0fe77105f095424c643,2024-10-30T15:35:02.187000 CVE-2022-29947,0,0,67254d8c9a43ca264578d67120b013387788e7f1a55025339547ad0a1bfa936a,2022-05-11T13:56:37.537000 CVE-2022-29948,0,0,8d37f4431c9db2945bfb3bbbdfad7cfabf57086d1ad46e1cb618623f6774987a,2022-10-29T02:46:43.147000 CVE-2022-2995,0,0,02ae8d9183cac311d74d01f776697fe5152487245d68259e2d43f14baa91e4b5,2022-09-21T18:05:11.537000 @@ -199523,7 +199523,7 @@ CVE-2022-31618,0,0,c87bb7022df5b1cf6bfbf83b111f820a095a1522011a965e2b689b031ad72 CVE-2022-31619,0,0,25be6201f0ebe2f908d3b0f4205108852687feff28a1f4d8435170a857fa13cd,2023-02-23T17:41:22.513000 CVE-2022-3162,0,0,94c5a9808c2af6e2d144dfc5fb54a6b06a92090516f69e51d01ee6db5a74681a,2023-05-11T15:15:09.510000 CVE-2022-31620,0,0,f1c013eb788a6e6bfc9e63425793bc53ec53675319f63ab7927dff3e01ad6c01,2023-08-08T14:21:49.707000 -CVE-2022-31621,0,1,3b02962b8c67065b30dc4a1e9e38f99f6738d435ef0bd30ff4030072807865d8,2024-10-30T14:35:04.633000 +CVE-2022-31621,0,0,3b02962b8c67065b30dc4a1e9e38f99f6738d435ef0bd30ff4030072807865d8,2024-10-30T14:35:04.633000 CVE-2022-31622,0,0,a4c3ac694c0b0f5dc59f48718f1397841d0070cac2ec499b0494408342c107d5,2024-08-03T08:15:22.973000 CVE-2022-31623,0,0,c97c0883891a41bd5877fa21f0d16f792362d5d7eb05863b986d0e62854d6308,2024-08-12T13:38:09.363000 CVE-2022-31624,0,0,072eed7a5f3230c09cca78698220d2182cc895913c81b0c6e51df9d52db2c1eb,2023-08-08T14:22:24.967000 @@ -203198,7 +203198,7 @@ CVE-2022-36224,0,0,a8df48107e3438e5636b1b67645301c5d46c7f827136d7d2eecddb479297b CVE-2022-36225,0,0,bc5ff33817b075cefe645e2473f6e3ee21d74e0020eca717973ee4a2644e0e31,2022-08-22T19:54:34.733000 CVE-2022-36226,0,0,d18d91af6dd58c2f963a8b5e6f9c28aedb3937746d0423d033ce941ec368b11d,2023-08-08T14:22:24.967000 CVE-2022-36227,0,0,f9c6c598655ba70529d76222b6d51e0a6a2419795bbe07d0ce8c6f260026ead8,2024-03-27T16:04:27.210000 -CVE-2022-36228,0,0,bece7b2e6a18a9135780f02e79612de6f72c31679a1469ea88c2efb812313325,2023-10-12T18:37:26.680000 +CVE-2022-36228,0,1,957d55f748ca15de37b4228f612bb064b6017702be1774a7b3e831b0ac313c87,2024-10-30T15:35:02.480000 CVE-2022-3623,0,0,d02a8abf840926caba5dbea47b45f5bb51f70a451a618f3d86b7bcf2b8470e11,2023-08-18T18:55:40.750000 CVE-2022-36231,0,0,29a154d09509e8cc5de0ff23cd1345d0b13b28501e5a09334b4b39f337efd8e5,2023-03-03T19:28:14.753000 CVE-2022-36233,0,0,ad3393a640e2a6b7e865efbc8773573711ba1d4d4d15c42713474979d69dce4e,2022-08-21T03:32:01.793000 @@ -204680,7 +204680,7 @@ CVE-2022-3817,0,0,7d6d5e06ce4b54a69a15f245efee2d0bc975fca433f45e15e83300dcb63b4b CVE-2022-38170,0,0,fec0209b1dfb726508691f57987f06577b560c61488de81ef4d3fd8428cfc5c6,2023-08-08T14:21:49.707000 CVE-2022-38171,0,0,19564da8badda997ec23aecd8a5b76c77aa4f9d0c43cac0ebbfd31343c26a67f,2022-10-27T20:27:03.480000 CVE-2022-38172,0,0,a23c5a71823cbad61f7943c598cb50459ec8ca672cb2fe40a0943b35e2021a53,2022-08-26T20:30:24.243000 -CVE-2022-38176,0,0,0312f3b4410b7463bcd0b63f0862952c4907400bb3a3808c1ecf53143c27177a,2022-09-09T19:26:21.257000 +CVE-2022-38176,0,1,f62d403be86525e685a9bff53af5bc6e07a4870526aba05a23f51a5bd2421902,2024-10-30T16:17:27.707000 CVE-2022-38177,0,0,0082ba3dd67bb968376b404fe94580d7fcd28909b39a957b495083482112b313,2023-11-07T03:50:04.117000 CVE-2022-38178,0,0,fda06f4717ca850d5ee2668681d5b834814e5488d84760e2eb6b8385fe747302,2023-11-07T03:50:04.237000 CVE-2022-38179,0,0,c2e2f8914bfd4076ff98881e91082413ed75e5486ae489ce82bcb37bd6b344a9,2022-08-16T11:50:42.253000 @@ -207375,7 +207375,7 @@ CVE-2022-41712,0,0,be4b3a69614c5862607ade7b4f150ce6e5bd6b4cbe641a141e08b385af878 CVE-2022-41713,0,0,cf0c4c86c7d5ab77c2afd006488c1c3df633ac2279fbfdb5c397ab31a7df5146,2022-11-05T01:38:13.917000 CVE-2022-41714,0,0,d55609e936c80ee61813189ada661a2c7bb7ae448836ba659a0cd2c13fa90d55,2022-11-05T00:31:43.307000 CVE-2022-41715,0,0,b9fd76ae50e751a6e28cc4e6915889bda6e630bec593e97480857fdb63b0f669,2023-11-25T11:15:09.940000 -CVE-2022-41716,0,1,6ad0e2782744b85bab18d2bcbb1e579306720de13edd6ac56cb898c639ba0dfa,2024-10-30T14:35:05.003000 +CVE-2022-41716,0,0,6ad0e2782744b85bab18d2bcbb1e579306720de13edd6ac56cb898c639ba0dfa,2024-10-30T14:35:05.003000 CVE-2022-41717,0,0,5d049248f869e69fee29fe229f1d44571b4e34793e20b3f71fff0678967e29ca,2024-01-18T03:15:55.570000 CVE-2022-41718,0,0,ede4edf1910fc09ee7773999b62e824282ceda5088eab3fd9bae27fdceb8b0f5,2024-07-02T17:15:04.360000 CVE-2022-41719,0,0,539b5dc1df3f047123b1f8e94e4752b3901073913e492258d1bdb9f18b4c0dc0,2022-11-15T20:55:04.397000 @@ -209897,7 +209897,7 @@ CVE-2022-45165,0,0,9efab6cf6411a0fc8caccbaaf1daf9ba874b4c2f8614e971fe09e96ed6e68 CVE-2022-45166,0,0,57d394d2995f4377ba00ee929a99ae8999dd7ebccf487ee6e456c41109e40f7f,2023-01-14T04:30:32.190000 CVE-2022-45167,0,0,c5b32132424a3624b1421ce4c4354da0169e930a29c58060268e6f5667e56aa7,2023-01-14T04:30:09.657000 CVE-2022-45168,0,0,5b01b558bd8fb24fbdf559be2087ec0c16d0cf3cbb1f9a0ca1cdeb2cef67be5a,2024-07-26T19:03:18.167000 -CVE-2022-45169,0,1,2c96535c95d2b311d50c3fefe461569e397648d403df08b87d63cf722f05b9b4,2024-10-30T14:35:05.323000 +CVE-2022-45169,0,0,2c96535c95d2b311d50c3fefe461569e397648d403df08b87d63cf722f05b9b4,2024-10-30T14:35:05.323000 CVE-2022-45170,0,0,51857a95e163773d3e1200b17d50a3b3d8525cbba5e34abc9e50a76427a0d58c,2023-04-19T19:28:52.097000 CVE-2022-45171,0,0,89e3a65af60c35b314ca1326b62e088fbcbbf13dbbc6db18d831a946ec2c9f05,2024-08-26T14:35:00.503000 CVE-2022-45172,0,0,745b90eadc3009c0d643fdb6b4b3cde168f7b2e5c5311df0a93dd1a20611c5d0,2023-02-08T19:36:45.417000 @@ -211150,7 +211150,7 @@ CVE-2022-46899,0,0,47cf48c2a9fa34274d86379a7c591cdc4ec1c2991370cbbb10d8f9edd90eb CVE-2022-4690,0,0,09b82453a76ab8f1047bf7981c70909e40ea72752c4f747c5c0a5b8ae673a1dc,2022-12-30T16:25:52.877000 CVE-2022-46900,0,0,1ada8cb944acaa94afe201553723c2ea4dd7e6ff1d8d7c1b032917ea8df1332b,2024-10-29T14:35:14.353000 CVE-2022-46901,0,0,0a812e631ccd4c832094fff6bd6ba8e21eb75afdbec4ee4392ca48e1e4a21b09,2023-08-01T01:32:04.767000 -CVE-2022-46902,0,1,5838113687ec39b343aca678786a7a9a6e63ebf2b737c5bc536f7448e13fddea,2024-10-30T14:35:05.620000 +CVE-2022-46902,0,0,5838113687ec39b343aca678786a7a9a6e63ebf2b737c5bc536f7448e13fddea,2024-10-30T14:35:05.620000 CVE-2022-46903,0,0,cc109058a85ca135a9ea89d0065559940fa523aae863c9fdc92ebaab79710fc8,2022-12-15T13:50:12.330000 CVE-2022-46904,0,0,05b49b039a5aef06b139831f231d652676369c1de5a992360a0dae8fffdeeebf,2022-12-15T13:50:00.713000 CVE-2022-46905,0,0,2a072fe32b855528b14eb362c580358c0af76c35cf2aebe35eecbd2d3e9a8636,2022-12-15T13:50:30.767000 @@ -212226,7 +212226,7 @@ CVE-2022-4862,0,0,2553413418f6ad24271b84c4b6265dbfaea53531b172d691e897d8db042ae0 CVE-2022-48620,0,0,5698c281f8e8068516c8dfe700ee9a98bc0bfd9312d73b253920c8e72d6c9959,2024-03-23T03:15:08.797000 CVE-2022-48621,0,0,1cd5ad66125265477c8dc07522592260d4eec4c99a5ef37987104225c1fc205f,2024-02-20T19:50:53.960000 CVE-2022-48622,0,0,8603f3223b9efff6b371bdc90b7040dc59471154fa80a88ca2d72860d21139c6,2024-08-26T20:35:01.673000 -CVE-2022-48623,0,1,192645b132d5aad78dc224ae0449f296b9736e7b254c3ebd6e8b5afc838e7d11,2024-10-30T14:20:47.597000 +CVE-2022-48623,0,0,192645b132d5aad78dc224ae0449f296b9736e7b254c3ebd6e8b5afc838e7d11,2024-10-30T14:20:47.597000 CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000 CVE-2022-48625,0,0,f6663c1686b1284fd5202202aca248b725343b1c940d427bdd48722330db6bff,2024-08-29T20:35:08.187000 CVE-2022-48626,0,0,fc58451bcf554cb6d7596ed91f1d4bac3d14dee8e91d35aa41459c2e76fb613b,2024-08-27T18:54:45.263000 @@ -212238,11 +212238,11 @@ CVE-2022-48630,0,0,3b8d0c800bfc12bda16c507877a10fda7326e6eb492171fa2e9c1d717c882 CVE-2022-48631,0,0,aaab3ba02d20eb7ed75e56691adb619871b3eeeb9b3909dd50966148f3ed94c9,2024-04-29T12:42:03.667000 CVE-2022-48632,0,0,604f20ec0eaf6c13c4b3b66792ca33665e6d1e06fdaa3f2397f35f9bec38e179,2024-04-29T12:42:03.667000 CVE-2022-48633,0,0,d1b02d8abcad4acece798c33d4e1bda012ee764a6eb89a127c625e4eb186648a,2024-04-29T12:42:03.667000 -CVE-2022-48634,0,0,8b3f149d7efcde225ca801ea6e9ac42f0b447147b0126ce4de49bf2c5e4b3310,2024-04-29T12:42:03.667000 +CVE-2022-48634,0,1,6f9e85aad26012b70d7c8d41258b2878b0ea511ab17c91d430d2bb71c1968eaf,2024-10-30T16:35:02.927000 CVE-2022-48635,0,0,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000 CVE-2022-48636,0,0,bd119ee3a500e8de66c4e55ffa746e94e5dcf276788f5780f1a4b33a00caa150,2024-10-29T16:35:05.977000 CVE-2022-48637,0,0,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000 -CVE-2022-48638,0,0,f1f3c62f32abd9dfa0b7d8788d87905580bbfec25eb951765d8861d82d3e8214,2024-04-29T12:42:03.667000 +CVE-2022-48638,0,1,6855b79bbb70622095182cba4b392928edff874affdf1fd590bd21063729c93e,2024-10-30T16:35:03.473000 CVE-2022-48639,0,0,4a5ae1aed25211cad58cf1392921491fc3122875f222672a6b19cfd32acf6264,2024-04-29T12:42:03.667000 CVE-2022-4864,0,0,d2a18ac64f46b7de7e75713eac668d767e5348c6b6dc712ad9b2de33d41cdd0c,2023-10-11T15:24:48.003000 CVE-2022-48640,0,0,f98768d06d2bce4ee0a2ff2316c3738424f501d15f7baaa490ac56116110bd52,2024-04-29T12:42:03.667000 @@ -212260,7 +212260,7 @@ CVE-2022-48650,0,0,766619acc76f809ac3f89b4b9fbe9aa75ea430cb3be2d98085e4eead243c1 CVE-2022-48651,0,0,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000 CVE-2022-48652,0,0,05a5a1c50a1d4992042ef5994a0d5c1c6f5485af066180e574dbce1a367a6ecb,2024-04-29T12:42:03.667000 CVE-2022-48653,0,0,8f84c0201a079d8a50061e5f0d56ccc48847df28331e9cee5b020fada4dfd712,2024-04-29T12:42:03.667000 -CVE-2022-48654,0,0,188cebffd61abed2f153360dbade170f14247f30db5c3ea60832986ebf774412,2024-05-23T19:01:47.760000 +CVE-2022-48654,0,1,7e71c39d2c45027cd06e36e4438012870bcb7b54fab8df415bb6c67748e6890f,2024-10-30T16:35:04.010000 CVE-2022-48655,0,0,117c1f7933b825ff69775b7174e7dea2fe0670d0f8ada0f09471ea3ef6ecf8ba,2024-07-03T01:39:04.060000 CVE-2022-48656,0,0,40a2007fa4d639e6f83f0edc7aee784b5f7b01ef417ffc776351b17161144b2b,2024-05-16T20:41:09.867000 CVE-2022-48657,0,0,be78ff049b68a0f97aeb78e19baa31929ce72df0ecfae8aafeac4e8b40bf2819,2024-05-16T20:31:47.880000 @@ -212293,17 +212293,17 @@ CVE-2022-48685,0,0,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bb CVE-2022-48686,0,0,653933df85aeb53741c4da508441bc4178f22de8ca5ed91694baaa41b1db130d,2024-05-23T20:33:45.640000 CVE-2022-48687,0,0,0ec523c7f518c54f1476367451f0187184c8bdd6245e5a7032af6a4d4908842f,2024-05-23T20:33:49.117000 CVE-2022-48688,0,0,d455650df5c1da9bd9791ee4c72bc65174296941dc339d8a298b6c5309ca5633,2024-05-23T20:33:54.213000 -CVE-2022-48689,0,0,f6979bceccae1762d9d80494fd85b8e95b72f4d069b7c9330a4fda3fb7b2fd38,2024-05-23T20:33:57.590000 +CVE-2022-48689,0,1,348745f20f7b16f6e437efe97d505fac3dab667f37f632881a0d5b5926af8ed6,2024-10-30T16:35:04.910000 CVE-2022-4869,0,0,daf2f3101da8ef8ac50d09fde630b69f6fce1705ae93beee4322fd92abc6df7a,2024-05-17T02:17:00.030000 CVE-2022-48690,0,0,e3f3080cc94bbe09dc9a2554fc22d04dc505032f1d5abcd43d428ee8f98a164c,2024-05-06T12:44:56.377000 -CVE-2022-48691,0,0,b13e14e110b9e213ae4c85c401f23511f220263583a39620ef8ba50d80a3daa2,2024-05-23T20:34:05.590000 +CVE-2022-48691,0,1,f3cf9d8cdcc44069cb228445fc6742b749bf778cb3c28ec48e2565638e1249ff,2024-10-30T16:35:05.407000 CVE-2022-48692,0,0,46546614be66817a48b52a16773b86b62dd71ed7709b7cc7f5f2e6be9c7a9d15,2024-05-23T20:34:02.510000 CVE-2022-48693,0,0,2de2da6c1292fb939817f4985aaa3748704c5e172b80ff619c511ddeeb51fc58,2024-05-23T20:34:08.557000 CVE-2022-48694,0,0,c39c541ec46d540d96fddfe1bdcf81c083d74c7bb84ee90738a9b26551466af0,2024-05-23T20:34:12.060000 CVE-2022-48695,0,0,8970459b5cf430fc8f110f8b3b9636df1f2a218eaed323426aa62da1f67d7386,2024-05-06T12:44:56.377000 CVE-2022-48696,0,0,3533dc13616699020d365772c25d089e92f2accd7741d17aac660fb36007a062,2024-05-06T12:44:56.377000 -CVE-2022-48697,0,0,ae5b1b7204aa2a0ca95297305830517a3b3cec3cd76769643f670651bd46a259,2024-05-06T12:44:56.377000 -CVE-2022-48698,0,0,af889859fa4d5aac2c9b5b309af68b34576c74d9ba6688fbb501b9f764979027,2024-05-06T12:44:56.377000 +CVE-2022-48697,0,1,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000 +CVE-2022-48698,0,1,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000 CVE-2022-48699,0,0,acc89b565cb5cce5b9f8e8bd3da6f880e3d6b9a5e41cd82aa70c3c6804a5dd1a,2024-05-06T12:44:56.377000 CVE-2022-4870,0,0,e992349af17f597cfe5651dfb20a7ad9ae9a4ba97330151fb88be70e92531900,2023-05-25T17:41:06.867000 CVE-2022-48700,0,0,88ca7cc46b5af146038dcfc5e39f2532e471081a55d5445d724a7a174c9021e7,2024-05-06T12:44:56.377000 @@ -212318,7 +212318,7 @@ CVE-2022-48708,0,0,3d74c0532114de6a04115e08b692eed3d80cca2b1e01d5c31b7a193896d3d CVE-2022-48709,0,0,7c1e37ea20fd009be2e17dcacc36b6d370f119b42b8143088cf57ed615197c10,2024-05-21T16:53:56.550000 CVE-2022-4871,0,0,7905d6520e1c27f1cbb6f441e5d1598686722bb011c394a9d524ad16179257b5,2024-05-17T02:17:00.160000 CVE-2022-48710,0,0,7bae9b7428c55842f90af4097ed2f283707d207d75866de2320645d0389c3c29,2024-05-21T16:53:56.550000 -CVE-2022-48711,0,0,b27f23ff68af059e667fe891cf8f47b41f822e331a7df9ddc0eee44f197ae6dc,2024-06-20T12:43:25.663000 +CVE-2022-48711,0,1,fd479d2a20ad7a5e8b12450a72d66add54b0ab9d37e435b0a0c4320c4d4a2e8b,2024-10-30T16:35:06.243000 CVE-2022-48712,0,0,ccace5c10a916df674bb9392d637200516b0891ac7d4932f88a1539d40c22b70,2024-06-20T12:43:25.663000 CVE-2022-48713,0,0,43f577b3081d00bb625fc50a3475feaa155bc41741f6b85f1672e53c165db779,2024-06-20T12:43:25.663000 CVE-2022-48714,0,0,d3e55637265824378aa3c7bae71a7fa48c76755872399adfb8504da466ec168c,2024-06-20T12:43:25.663000 @@ -212353,7 +212353,7 @@ CVE-2022-4874,0,0,90cc8c4c3185a1ec38cc988f4bdad23e05202e72d0f25ddcfdaf13ee3fb346 CVE-2022-48740,0,0,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000 CVE-2022-48741,0,0,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000 CVE-2022-48742,0,0,955f0c7fbe8c4fb04c29ac68d1923a29168477849bc7b7e7e1a38f90faa04e83,2024-08-20T13:44:57.483000 -CVE-2022-48743,0,0,016aa198197a6069a5b600f7b75e21187063a616d0f2a55d2373780c15590e81,2024-08-20T13:54:00.933000 +CVE-2022-48743,0,1,2dee83a739865d1358b8ab0bde16312d292f3858b29fc6d3a871089f3cf027ae,2024-10-30T16:35:06.467000 CVE-2022-48744,0,0,db97d2408a3729b8332ee7728404bcf0a8034b20ec9bb81fa52c25169879c043,2024-06-20T12:43:25.663000 CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635b13,2024-06-20T12:43:25.663000 CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000 @@ -212364,7 +212364,7 @@ CVE-2022-4875,0,0,0248cb7e88a64eaf1154285e30f722a7ce5832425ab7216a34bbdccf82920b CVE-2022-48750,0,0,55afd22040c9a204644583104b9b0ba5a5b6f53a98ecd72808a82376e1affbba,2024-09-18T16:04:21.597000 CVE-2022-48751,0,0,be32087ff7da3afc8bbd26738891fe8c820998963c64317e4b1afedf242a7fee,2024-06-20T12:43:25.663000 CVE-2022-48752,0,0,38cf75d35e9d1cb0a011fd7ff84616d4bbbc7cc6cd1186a506f033bb40c015f3,2024-06-20T12:43:25.663000 -CVE-2022-48753,0,0,fee8018edcf35100134efb8c5bdeee9c5abc917f17d652dbef1321e8083108a6,2024-09-18T16:03:25.617000 +CVE-2022-48753,0,1,f480bdbf0728c0db5a1ac2926fd0d873642c12cdac06bb9b6481850b26aa1f47,2024-10-30T16:35:06.700000 CVE-2022-48754,0,0,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000 CVE-2022-48755,0,0,30010b42de97147ea0203eebb224554207374f1ac961584225a137f3aa742eee,2024-06-20T12:43:25.663000 CVE-2022-48756,0,0,ba335ca06870d086c208a4b61d6e4ff2c3db981eb9732fbe19a2518767ecf69b,2024-09-18T15:59:50.983000 @@ -212373,13 +212373,13 @@ CVE-2022-48758,0,0,2390cac20b5fb952629cce9f98f33922ffc2f9637f8248dc4bb4782f5e162 CVE-2022-48759,0,0,7962889d3c432d97af1edc38f6b3670b53bb47c561e33f1c213dfd68840532fe,2024-06-20T12:43:25.663000 CVE-2022-4876,0,0,e65b1d52e56908a8a506a957a5c75cf98f657410276c30e7e528870e80a276e5,2024-05-17T02:17:00.467000 CVE-2022-48760,0,0,a822cc7f5fd5d465f57fc80abb1c1a54e7b02787f15d26b19ce6fe3fda938330,2024-06-20T12:43:25.663000 -CVE-2022-48761,0,0,3cfd946ac77fc1af17cd081ed8684fb125d41afbc4ed1fc016776ff176eaeee1,2024-06-20T12:43:25.663000 +CVE-2022-48761,0,1,a0fb503b182a42adce92b4284ad999cd8d122ef26da6442d172429172a99aed1,2024-10-30T16:35:06.947000 CVE-2022-48762,0,0,f4510de1769eada9940776802a8e77e4c4286daddf6ec9206df95f4e10a02de8,2024-10-29T19:35:01.667000 CVE-2022-48763,0,0,019f757453c2977363dff510d05dc5a6e5a09147b632f78395e58e6c428efd83,2024-06-20T12:43:25.663000 -CVE-2022-48764,0,0,e13b2251f00635b9efcac93235bb561c717b11baca1d4d8de3b6f250c8e755d2,2024-06-20T12:43:25.663000 +CVE-2022-48764,0,1,1d8469156824e41f94fa6c088c0234978319f16fe9708dd8892fc7b184fb9b19,2024-10-30T16:35:07.177000 CVE-2022-48765,0,0,84ad02e5d8e4b2b68f2606184b9db643b6473e4cacb7a99b922c82145d37f1c7,2024-06-20T12:43:25.663000 CVE-2022-48766,0,0,aee9379c6937dedc065a980d6dc6c448fa04b0544ba5aa2485f663dd038070cb,2024-06-20T12:43:25.663000 -CVE-2022-48767,0,0,397068039a161989eb1e5126e2da53c6f50e5f129490a15f00ff298d0326017e,2024-06-20T12:43:25.663000 +CVE-2022-48767,0,1,f847103d72827504d342cba4ec3cd5aea429a2d2e6b886a77f0ced3f8cffee83,2024-10-30T16:35:07.380000 CVE-2022-48768,0,0,03d6c63d6763b8b5c29aaf908a5acdf73da6dfcfa8ecf0bfe0aa68dc7902959c,2024-09-09T12:59:37.460000 CVE-2022-48769,0,0,9da3594b688f3419de5209099af92b325945b83e31f6492d68a0030e2619bb31,2024-06-20T12:43:25.663000 CVE-2022-4877,0,0,7be088f764e81f3d159b624bbe89e382d534c3a5b5b12bd3cddcbca9b765980c,2024-05-17T02:17:00.577000 @@ -212739,11 +212739,11 @@ CVE-2022-4964,0,0,cffd201050df748697a7807e71c8cbb43580775567bf6802f3f386ec551d1c CVE-2022-4965,0,0,baf60e9cbde904870c558c44d15db185508e65dd8ec8fd7c3f21184d8cbd2328,2024-04-10T13:24:00.070000 CVE-2022-4966,0,0,d7772092edb1c4f6ea77758ef1a2b38cc5d3bd7ded1e7c81a0173f7456d0da48,2024-05-17T02:17:05.713000 CVE-2022-4967,0,0,acbcdcd64f9485d059508255d49aabf4f78227f1537ec6f5aeb5af6241be26cb,2024-06-14T13:15:49.633000 -CVE-2022-4968,0,1,9a17fbf13f4e41d8329babee660719152ca3e30f9b3218a566abcb9c02a6a5dd,2024-10-30T13:56:32.953000 +CVE-2022-4968,0,0,9a17fbf13f4e41d8329babee660719152ca3e30f9b3218a566abcb9c02a6a5dd,2024-10-30T13:56:32.953000 CVE-2022-4969,0,0,6da77d75911b6f9f4d4eed5e8e9a02ef51bdb2636c0fddb313d49f06fb600e32,2024-06-06T16:15:10.250000 -CVE-2022-4971,0,0,1bfa8f1c30b05158fa9137b5049bffd1194a9fc86cf513ee18ae5f0349d51bb2,2024-10-16T16:38:14.557000 -CVE-2022-4972,0,0,e887427b0b34658aa14fa77d359e8d419530cdc5f4592e927abe653e4c60f699,2024-10-16T16:38:14.557000 -CVE-2022-4973,0,0,c36422c9dfd44273cc4cd72540d7b077e02c316c4fbcf0a78468dcf17f879235,2024-10-16T16:38:14.557000 +CVE-2022-4971,0,1,f6ff69e7ed7e1feffcfd40ec8ecc2dace723d01c8e8dee7c8441179db44a8395,2024-10-30T16:37:33.237000 +CVE-2022-4972,0,1,b59aab7940af7df89b4a4014b803c15ac567db0b0d743fb31ad6d103cfe2de78,2024-10-30T16:34:55.117000 +CVE-2022-4973,0,1,c846697ac57e999699ffcd63f1eb7690000d94006aa238932cc11138832eecb6,2024-10-30T15:58:30.907000 CVE-2022-4974,0,0,14764381bacd12db5e2c67438cb3bfc3f3c80d088b68fde09bb3a022a5cf379e,2024-10-16T16:38:14.557000 CVE-2023-0001,0,0,89cc7c25326dd5727e94c3abe5ce2365a868c05aa8d47b4c236024303b20e03e,2024-01-12T22:10:50.817000 CVE-2023-0002,0,0,85151726e26db3dd412b666129cc1146d77d486c542304fa6aa1433f4f16452f,2023-11-07T03:59:26.433000 @@ -229156,7 +229156,7 @@ CVE-2023-38405,0,0,eb678e1398b0cc7afc6cadec898dca16e86921fb7075e187826e227511830 CVE-2023-38406,0,0,b4e9fee11e6ca1b95b528449b15c85e7b4af1b868f84535cfe760130604cc642,2024-04-28T07:15:08.367000 CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 CVE-2023-38408,0,0,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000 -CVE-2023-38409,0,0,838e08b6ac7468e45b0e0743452ec8eac55d08ae6cebd5146f7b96ce40e80d8e,2023-07-27T03:49:09.943000 +CVE-2023-38409,0,1,41a273a7228c0568b2310db49eed9cb552b2447de4ace94f4b54143996698810,2024-10-30T15:35:04.137000 CVE-2023-3841,0,0,d2f5ee23f09965afeb5d36623db7f402f898f5d6074e3d1a8c3e15639396c726,2024-05-17T02:27:52.550000 CVE-2023-38410,0,0,6c048eb455397479418bb47030b11f6e590486d07d435d761a9e48d83acfb861,2024-10-23T15:35:13.280000 CVE-2023-38411,0,0,878de725f745853626d009447a072e4f76f5e67940f796a7c936cf666df69e06,2023-11-21T18:44:14.920000 @@ -242503,12 +242503,12 @@ CVE-2024-10287,0,0,f35de541a09293478313fb52f4e207e82b325b3fc6432429ed8850f6465c2 CVE-2024-10288,0,0,fd731f2fa655e977394860f265053908b8d125d4076d3124439c81d187b95c3b,2024-10-24T04:07:45.110000 CVE-2024-10289,0,0,7362f8b5a4aaa787d5c8f070f69545dea8207d6f1adb78df74793ff58580e97d,2024-10-24T04:07:51.340000 CVE-2024-1029,0,0,0f58435c5c731694bc563330e2e0cc48091c7d28b092c9a25a6684c410525166,2024-05-17T02:35:11.633000 -CVE-2024-10290,0,0,32b9d717368e635aaa8618e36c6d8aa6019577a9299bfc82735cfbe7d195d08d,2024-10-25T12:56:36.827000 -CVE-2024-10291,0,1,8507b4447fcd8fcc7aa118a709f5691fbd662f3c7fbb1d55694140494fcc8310,2024-10-30T13:23:47.827000 -CVE-2024-10292,0,1,426a6dd878f8fed452ebd6448d3edb5b732c219a4b0073be487941c8e5287eea,2024-10-30T13:40:07.353000 -CVE-2024-10293,0,1,8e56039c8372aa88e5dabe6a523be86aef575434b11facd48a467e1a8dc36c3c,2024-10-30T13:37:27.067000 +CVE-2024-10290,0,1,554c14bf86d2356052ac39788fb0ad56602d77a74cd88f42cb8fe953feceae46,2024-10-30T15:06:00.617000 +CVE-2024-10291,0,0,8507b4447fcd8fcc7aa118a709f5691fbd662f3c7fbb1d55694140494fcc8310,2024-10-30T13:23:47.827000 +CVE-2024-10292,0,0,426a6dd878f8fed452ebd6448d3edb5b732c219a4b0073be487941c8e5287eea,2024-10-30T13:40:07.353000 +CVE-2024-10293,0,0,8e56039c8372aa88e5dabe6a523be86aef575434b11facd48a467e1a8dc36c3c,2024-10-30T13:37:27.067000 CVE-2024-10295,0,0,05be2217733c9dc82e0ab847a99213d443b6eb2416a14b489bddd760491fe8e9,2024-10-25T12:56:07.750000 -CVE-2024-10296,0,0,3731dd63766ea164d82646758d87e47e2e2d1ca9061034b26ec431458662311d,2024-10-25T12:56:36.827000 +CVE-2024-10296,0,1,a167e288d770dbaf1b2cdb5a1f53629a1025f7402c7add21139cd0e6f9a1db2d,2024-10-30T15:13:18.077000 CVE-2024-10297,0,0,7059e1e2bb8cf8e51a328b566020cbc23abd446f188f444527bfee9442b2adad,2024-10-25T12:56:36.827000 CVE-2024-10298,0,0,a0e9f6b5e6c68ad8ada3edbba009974fda145ba113b49020fdab65d252296669,2024-10-25T18:51:44.370000 CVE-2024-10299,0,0,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9cb42,2024-10-25T18:51:17.047000 @@ -242525,28 +242525,28 @@ CVE-2024-10331,0,0,7db3978f3af331926e6dbc0b348677f0ce3ba5cec6100247fa9b9851e7430 CVE-2024-10332,0,0,f5b2f39a2af4e4ca43edc3fb818fd22985b528866227753e69ec49cca9bc6022,2024-10-25T12:56:07.750000 CVE-2024-10335,0,0,659f6e0620614d6588fd07e5309387fdf4ea7eb7c67174683fd34316e7f3ed98,2024-10-28T15:58:13.240000 CVE-2024-10336,0,0,b6057cbdc37a7025d457bb6b96b11680d6106aa7de8d96644974542e84807905,2024-10-28T16:01:58.393000 -CVE-2024-10337,0,1,553ac6c0bfb7ee7bea21231b73146a09b2d4b7bf3dcdc9f25044a5e5cd120bd9,2024-10-30T14:02:45.627000 -CVE-2024-10338,0,1,e40da5e2e0df9994173821ada1d8ce8eb1835e59da62e56c4c3f20660a59f7a6,2024-10-30T14:02:05.743000 +CVE-2024-10337,0,0,553ac6c0bfb7ee7bea21231b73146a09b2d4b7bf3dcdc9f25044a5e5cd120bd9,2024-10-30T14:02:45.627000 +CVE-2024-10338,0,0,e40da5e2e0df9994173821ada1d8ce8eb1835e59da62e56c4c3f20660a59f7a6,2024-10-30T14:02:05.743000 CVE-2024-1034,0,0,454f09f0f5fc636699352f4449a6882a204ccb564a121fe5e40109839ef595a1,2024-05-17T02:35:12.150000 CVE-2024-10341,0,0,0e0a9affbce7c0fd1940e7153c924bfb3ba43bf71cc69020fca65383ad207429,2024-10-25T12:56:07.750000 CVE-2024-10342,0,0,a0e1e7bfbf8df77686478a8b39f35ce7b5adbe1b31b823f7a8e84fab31750de9,2024-10-25T12:56:07.750000 CVE-2024-10343,0,0,4101b5a530cab96c4e2ed3f7591bd8e9e62c4ce861db441511cf50880ecd2465,2024-10-25T12:56:07.750000 -CVE-2024-10348,0,1,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000 -CVE-2024-10349,0,1,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000 +CVE-2024-10348,0,0,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000 +CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000 CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000 -CVE-2024-10350,0,1,1eff377645f31addadbf2a414de92964c33d8decf15f763410afce73538f2275,2024-10-30T14:29:55.480000 +CVE-2024-10350,0,0,1eff377645f31addadbf2a414de92964c33d8decf15f763410afce73538f2275,2024-10-30T14:29:55.480000 CVE-2024-10351,0,0,0669fd862bd943e91d4fd75dd5a3a4f23e3a0ecf8b6b598b3fa3044b7bf8c6d6,2024-10-25T12:56:07.750000 -CVE-2024-10353,0,0,34f363c95bbc45d4e85ef2856d7e0d5110b6c82bce311f5e8fc9036257eb83b7,2024-10-25T12:56:07.750000 -CVE-2024-10354,0,0,d5bf96c00ae597f7009c34e3844c5889f0c0763a1e1b97eab0af94f26675c82a,2024-10-25T12:56:07.750000 +CVE-2024-10353,0,1,e06260810ab2f8d83e8148f12eacebfdfa4f171568dc8f755f0a84d5679240e8,2024-10-30T16:21:35.113000 +CVE-2024-10354,0,1,b93bbc475560ddb322fc6987c8bb9a496754455b51c6de71617d975e234845da,2024-10-30T16:32:48.453000 CVE-2024-10355,0,0,7a858a56547ed44307c9a540d3394b900b64454d40ccf6ae564bf35aa8fa4990,2024-10-25T12:56:07.750000 CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000 CVE-2024-10360,0,0,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000 -CVE-2024-10368,0,0,bd751cf8f0908c7885868477a03f4653af3e113fc89fdbd03353e34dff9f8f68,2024-10-25T12:56:07.750000 -CVE-2024-10369,0,0,7ae7d6c6e004766971ac0d79eb28bd21cccdeb76fc8a447fe3f3b470463f1503,2024-10-25T12:56:07.750000 +CVE-2024-10368,0,1,c8e0d6969c93ffe96acf5e0ee7b5c26394eeb4c801dc04ebad8a62cf1ce3fd82,2024-10-30T16:46:30.783000 +CVE-2024-10369,0,1,5a59dc320150c27565cde3d9105528beaf16a536e1981e9f54165bf31963ac02,2024-10-30T16:50:32.567000 CVE-2024-1037,0,0,dc80ea945a1c7339fa73e61584161c3f0eb5c7e682984c3146b230e695ed7de9,2024-02-14T19:09:45.253000 -CVE-2024-10370,0,0,27188c86ba90849a9c0d88afec58d3a2edeb9103c555ee60d22fc4a3d5210d79,2024-10-25T12:56:07.750000 -CVE-2024-10371,0,1,0850681dd0b7affd7117bf912b3d2c475da42ed7b5f5270f8839e339171d9bac,2024-10-30T14:51:07.863000 +CVE-2024-10370,0,1,810741af1a3bf30d10bf8fd3a18c7ee61ae1ab9f3ef9c730b2d4820dea325396,2024-10-30T16:38:40.240000 +CVE-2024-10371,0,0,0850681dd0b7affd7117bf912b3d2c475da42ed7b5f5270f8839e339171d9bac,2024-10-30T14:51:07.863000 CVE-2024-10372,0,0,55d82ebc64e3347208b42e044461acfe18dba6e494597fc717ca90fd21fd7f16,2024-10-25T12:56:07.750000 CVE-2024-10374,0,0,7790d94803baee2c2a9a346f5727b3f8fa2f864d9522e5ceae124a52fbb8369d,2024-10-25T12:56:07.750000 CVE-2024-10376,0,0,f82f08f1ceca9553145aba97b8462c352f4e5d7c7ee750ca3d73316f521c8aa7,2024-10-25T12:56:07.750000 @@ -242627,8 +242627,8 @@ CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000 CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 -CVE-2024-10487,0,1,d1b8bc178246d83d33a27144ea8a70d3bcde87b4297a3439f88b09ebd92962ef,2024-10-30T14:35:07.303000 -CVE-2024-10488,0,1,6de048fb6a1876c0ac1729db68b9fcc079c410d13c9e356399351989c5574a08,2024-10-30T14:35:07.517000 +CVE-2024-10487,0,0,d1b8bc178246d83d33a27144ea8a70d3bcde87b4297a3439f88b09ebd92962ef,2024-10-30T14:35:07.303000 +CVE-2024-10488,0,0,6de048fb6a1876c0ac1729db68b9fcc079c410d13c9e356399351989c5574a08,2024-10-30T14:35:07.517000 CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000 CVE-2024-10491,0,0,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000 CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000 @@ -242642,7 +242642,7 @@ CVE-2024-10507,0,0,f0d511f24f84b9e0af273e44e1eadb29e82d53fc80607d0bb45b0fad15f5c CVE-2024-10509,0,0,a617a52391f6a05c8db7614b66d9896a1a6ac7734326993025e7a689a1eda8b8,2024-10-30T03:15:04.060000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 -CVE-2024-10525,0,1,9e13346b66b67fbaf979592729bd321664520056534d883bed51d4a9ecbb4714,2024-10-30T14:35:08.430000 +CVE-2024-10525,0,0,9e13346b66b67fbaf979592729bd321664520056534d883bed51d4a9ecbb4714,2024-10-30T14:35:08.430000 CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000 @@ -244860,7 +244860,7 @@ CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740 CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000 CVE-2024-21587,0,0,6fb74afc13eaed151f7dfc73f3405ccfaec4bc45b3ea2dc8ae59dadb238cb14a,2024-01-19T17:44:35.830000 CVE-2024-21589,0,0,bf8a565022261f069a66f4b01e754b7d699f349013c5b07db7616e20369d7f8b,2024-01-19T17:41:50.160000 -CVE-2024-2159,0,1,3917b65d82c6712933a7deb2a2b9d624607084eadd4f10c853f19f8c4102da7d,2024-10-30T14:35:09.637000 +CVE-2024-2159,0,0,3917b65d82c6712933a7deb2a2b9d624607084eadd4f10c853f19f8c4102da7d,2024-10-30T14:35:09.637000 CVE-2024-21590,0,0,d08474c974f9592fef08b015c317503a18e23e40ac3eeaa76411343449e4ff8a,2024-05-16T20:15:08.473000 CVE-2024-21591,0,0,e40a687cc8061975f7bebad4323d4bb4ab97a9cba87c782ec13ee84f9e541139,2024-10-09T14:47:40.580000 CVE-2024-21593,0,0,540dea6f9467759cebeb81acc8a430afb7c98c09a21ab68c332120fcdcbd1e65,2024-05-16T20:15:08.637000 @@ -245580,7 +245580,7 @@ CVE-2024-22450,0,0,fe403e8a7fd8e390fc32bc73d33734a11d8d75e8e2adff855cffc5954c4b0 CVE-2024-22452,0,0,5a080959ec2d756b184e442711bbcbbb6cb0c52e3b6bc2f798e7179e3dcb554d,2024-03-04T13:58:23.447000 CVE-2024-22453,0,0,f9797fcda68051d8f971de586c04a2c106a15949c4e3d09d430cad58ebd8464f,2024-03-19T13:26:46 CVE-2024-22454,0,0,e9841476327230c5841a8929ea4ecb0ea65558a6dfa68436b83b2a2a5b045860,2024-02-27T17:10:16.097000 -CVE-2024-22455,0,0,302188243bd5081237aae4add79ff64341e1976ecbb49e59944afbbc1f6b61bb,2024-10-16T16:10:10.413000 +CVE-2024-22455,0,1,bc4b26eafc25ec70283fabda69920871bbe1148ce58d7c2c8d6a539864f8578e,2024-10-30T15:15:18.117000 CVE-2024-22457,0,0,cb04de6dd02e8a0381ffeb293f9eb43c468f190969ea3471927cb046b6407271,2024-03-01T14:04:04.827000 CVE-2024-22458,0,0,a8f3b6bb3f7ce3a09f59dfbc4d2b0db5234bfeb3a6e52235fbee24c30c1d9fe2,2024-03-01T14:04:04.827000 CVE-2024-22459,0,0,cabd1003173ddb6b26c1189dde137f8a2e465bcd34b07ccffe332260e291ed8f,2024-02-28T14:06:45.783000 @@ -246038,7 +246038,7 @@ CVE-2024-23305,0,0,1bec79bc4020f6ec3f876f6219b03c33047027e58293560df4d9a57dbab1f CVE-2024-23306,0,0,91f46f52d9e5de00866e9203178e37e34a29f802d826e4f6441f99c1a5c6820c,2024-02-14T18:04:45.380000 CVE-2024-23307,0,0,ce3f1c4d4ee00439ab4eb84e7304958dea526a72b7cb431c57d45239ed513046,2024-01-31T20:38:12.743000 CVE-2024-23308,0,0,ab780e3d459f30026b937323fd197ac1b2578a1b6664154111931dd5ecc07d0f,2024-02-14T18:04:45.380000 -CVE-2024-23309,1,1,f176275e78d37dd0914e06a05900ed9a19ac5ac3d8b13fe20b906d6305907b73,2024-10-30T14:15:04.153000 +CVE-2024-23309,0,0,f176275e78d37dd0914e06a05900ed9a19ac5ac3d8b13fe20b906d6305907b73,2024-10-30T14:15:04.153000 CVE-2024-2331,0,0,4ae45893d8915acf1a1828719d664bd22bca980785ca070e6d05565096dfa696,2024-05-17T02:38:10.643000 CVE-2024-23310,0,0,4179f0bf8f658e9935c63c9c35f42aea4d1771a834836f01ffe3c75ee4f84241,2024-04-02T15:15:52.963000 CVE-2024-23313,0,0,423eb5c8ce01f4dbd3ff16b47be219cc8721b4595695d3e2421bc510a6ef2931,2024-04-02T15:15:53.050000 @@ -246728,7 +246728,7 @@ CVE-2024-24275,0,0,bf48a834dac897664e81f3748e0f4d5c238116fb25905911687313cd54945 CVE-2024-24276,0,0,5140333f0f3ce7a82f9d915e370db57d18b1db0fa2de019f6fd8e7318dc67fe0,2024-03-06T15:18:08.093000 CVE-2024-24278,0,0,14023ded6ebd46997e823f79bcda294b012ff332364bf6b30ca9ff4ad7b1ffac,2024-08-27T21:35:11.103000 CVE-2024-24279,0,0,b22eaf070f797d5199ab4939d0b1561987350af33b4eba21e4910bbae462641a,2024-08-27T18:35:04.047000 -CVE-2024-2428,0,1,71012a81f113f8931195927b8ef2c2cdacd49ab525a19287f0fbcae2f8b5635c,2024-10-30T14:35:10.497000 +CVE-2024-2428,0,0,71012a81f113f8931195927b8ef2c2cdacd49ab525a19287f0fbcae2f8b5635c,2024-10-30T14:35:10.497000 CVE-2024-2429,0,0,bb9579e5fb707a5112fccfd7e64c52901e3e44384ceafa5a0281658740d435e7,2024-08-09T20:35:03.443000 CVE-2024-24291,0,0,f9a99cce2d5669fe488c53da57cec1a603932ca409a68a957e4a3be597d5560e,2024-02-13T20:13:26.593000 CVE-2024-24293,0,0,c875e8188ccf3b7557555abd825e181af9a9ca32c0aff4644dac65d414c40eba,2024-08-20T14:35:04.827000 @@ -246975,7 +246975,7 @@ CVE-2024-24773,0,0,da8b682b31febd3e2de454f238cf130a08fb6ef29c1a8b2a9f8fa2fbf84b5 CVE-2024-24774,0,0,f13aeb5a8a14a2b28434301d459936e56cbcb6271359f1132daa975be1a4e4a7,2024-02-15T18:43:22.673000 CVE-2024-24775,0,0,e8a1117081dcecbda71bf879ea5f4cf7e64e228ee31031e5b59390d8bbf84feb,2024-02-14T18:04:45.380000 CVE-2024-24776,0,0,6c7703c27939b228b8c6f0a7ac349acff88924b8a443af347b795b4df5ebf2ac,2024-02-15T18:42:25.383000 -CVE-2024-24777,1,1,56e22ca779ef43a7047331beff5bf16b9b6c0fe1b87bd0e27c519b3b15c14e81,2024-10-30T14:15:04.457000 +CVE-2024-24777,0,0,56e22ca779ef43a7047331beff5bf16b9b6c0fe1b87bd0e27c519b3b15c14e81,2024-10-30T14:15:04.457000 CVE-2024-24779,0,0,0775cb0ef2c25af6aeb51ccc0386a7ab6a666e4b0e03b7de868da93b3496f60c,2024-02-28T15:15:09.250000 CVE-2024-2478,0,0,d4988a5fe437e33a0f9a93c3fcdccaa9b2b8ddd55cfc6854092fb1866b11274a,2024-05-17T02:38:14.540000 CVE-2024-24781,0,0,27ebde0e33bd322521afeffa18295af93e85735697632ec97f1132c9ea5137ef,2024-10-18T19:00:53.347000 @@ -247234,7 +247234,7 @@ CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1 CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000 CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 -CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000 +CVE-2024-25087,0,1,d0eb5bf250014d4733c8c2cd43475d3db0483672bd5d42f237e7c0898368e6b0,2024-10-30T15:35:07.993000 CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000 CVE-2024-25089,0,0,e665d40e71849b52a984e51750a3ed30341c4f9c0766ccd2a466247b89c7c920,2024-08-26T19:35:12.087000 CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 @@ -247697,7 +247697,7 @@ CVE-2024-2578,0,0,0a9a760b0e95eba3e084425ffbc6c35fcacf81d3fe78ca7d4da72936fcaf57 CVE-2024-2579,0,0,3e2ac9285c805214de809b153e0f16bcd56ebe6adfc4df4e86808858edb81c9b,2024-03-21T19:47:03.943000 CVE-2024-2580,0,0,f1dd66fbf84d74580d929f75d3e5a752178d849505161b5daa24286248a8e976,2024-03-21T19:47:03.943000 CVE-2024-25801,0,0,28a9d6eacf99d1abdd83a784126e6c3bc5997f43f3087477c08ded27d7a7a5ff,2024-02-22T19:07:27.197000 -CVE-2024-25802,0,1,c6a1a8cbd81c2b09c9c3cffd8c169ccd639a29f720329a27af3b379bf1e80362,2024-10-30T14:35:08.663000 +CVE-2024-25802,0,0,c6a1a8cbd81c2b09c9c3cffd8c169ccd639a29f720329a27af3b379bf1e80362,2024-10-30T14:35:08.663000 CVE-2024-25807,0,0,842f9a5e9e10408e46e0a439e695cbb579bc0c4b444593c08bc5ab70315f1236,2024-08-01T21:35:13.397000 CVE-2024-25808,0,0,c8b3842916e7c06900b08f9fd62594e0f61e1918f91fddba1f15f9656576b1c8,2024-09-06T17:35:05.610000 CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000 @@ -247710,7 +247710,7 @@ CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2ba CVE-2024-25831,0,0,5b9f73c2b189e5dd33d90886632cdb674cb173750266ada8e06c07c01ebdf635,2024-08-20T20:35:09.747000 CVE-2024-25832,0,0,a4448e0b7fded4d69ae19d5a812394b0dfee60300a31f6c0311dd994464f2ea8,2024-02-29T13:49:29.390000 CVE-2024-25833,0,0,b51394028b2e438a7195762bbea65216839d5c40b4973445f19556678b890008,2024-08-21T16:35:02.683000 -CVE-2024-25837,0,0,ad7d9c7c2df86362ce1fb90c6e14af3076a01961d6031fa4b4699cf7d18f98dc,2024-08-19T13:00:23.117000 +CVE-2024-25837,0,1,e8566032733132a4e472898a09554d7d5b745597958025023019d2ffd25f360c,2024-10-30T15:35:08.810000 CVE-2024-25839,0,0,112ead546eeb57a908059ec1a3d260836a97873d0981df33665fbecb07c8a6ee,2024-08-26T20:35:15.523000 CVE-2024-2584,0,0,dd550e2c3dd90cf91d2a8279de69803860a7180796c6bc877e47cf73e9bebe16,2024-03-18T19:40:00.173000 CVE-2024-25840,0,0,446c9d87bd75b43e98b54bb5f507147f090d48ad09f8a4c53ee839f0d8bcd54b,2024-08-23T20:35:09.290000 @@ -247741,7 +247741,7 @@ CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded53 CVE-2024-25873,0,0,b0ef6e77600c842b742f164755ad8cfeb8283e0b096faea6d4ca3226ee47f51d,2024-08-26T19:35:23.777000 CVE-2024-25874,0,0,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653257,2024-08-27T19:35:17.383000 CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000 -CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000 +CVE-2024-25876,0,1,71252f27c94e104ba80cd9940e7e481f22d4a42058ace62f35175357d7df908a,2024-10-30T16:35:12.507000 CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000 CVE-2024-25885,0,0,d7b45ca9946efade56286fe216db0d8d419d93e37f8064c8e12d635de4b291aa,2024-10-10T12:56:30.817000 CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000 @@ -247913,7 +247913,7 @@ CVE-2024-26056,0,0,cdde0faae5371b6934ff40ac1740cac009f960619bf2984b3c2abc0f388d4 CVE-2024-26057,0,0,e45b3f0f152eb3c78dc9320bed534a79a66b2c35d46fd8b2b0ef0017333c4b87,2024-06-14T19:46:03.817000 CVE-2024-26058,0,0,a93e87c800fd4d920581776c16d0072b04deb406d205f9f24e685781c2f5715f,2024-06-14T19:37:56.100000 CVE-2024-26059,0,0,3a74ee7caa73ebe11f8a8e2f4a849fd43a4fe73562ba6d99358d666bb4fc6636,2024-03-18T19:40:00.173000 -CVE-2024-2606,0,0,652fdcf629adc4e92eddef80b1b9eda0bc107345b569847c2183146384125b8a,2024-03-19T13:26:46 +CVE-2024-2606,0,1,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000 CVE-2024-26060,0,0,9cdef2d575b129761f3290b88017e8f07b5021de9d3255eeba059f838c645f83,2024-06-14T18:49:08.077000 CVE-2024-26061,0,0,95eff38cd1c7e403d46e8de01e1ed3169b38a7e929aa5fe4e06324861444a4f1,2024-03-18T19:40:00.173000 CVE-2024-26062,0,0,3dc8f814b10216475d4edc6897c31db61a1f8c0a6e3b0883a2d1e46684b7142a,2024-03-18T19:40:00.173000 @@ -247956,7 +247956,7 @@ CVE-2024-26095,0,0,9f6c7bddb38cd6b8f363ea5c70ef041eaf1840874199b0d4f54fdf8f0f85f CVE-2024-26096,0,0,7fe4823fe2a7b575a3ae0ebf41ef8d560b89c2e0159509c3214f5a6c2615f8b6,2024-03-18T19:40:00.173000 CVE-2024-26097,0,0,cf64c962cadb0fc8f1556505bc07c2350b9f9285ec03ff659cd6a815a0eb0c88,2024-04-10T13:23:38.787000 CVE-2024-26098,0,0,dbbd02b23dacb0109748d3b2fc272a4103fcd271020bb791bb34007edc8f300f,2024-04-10T13:23:38.787000 -CVE-2024-2610,0,0,7b5680ac250feb9d90c8325c50eadd3949a1c7f769cbd4e582048a421664a99c,2024-03-25T17:15:51.833000 +CVE-2024-2610,0,1,8a8dfbfa641be414cd802b96cdada12ae4887a35722e5a49e14d5a6b88bfdf78,2024-10-30T16:35:13.863000 CVE-2024-26101,0,0,a3bcaed7b7153b5cc7bbbc52911724f0db36b199f4ed571b79e387b893a73377,2024-03-18T19:40:00.173000 CVE-2024-26102,0,0,35dbb61e3e6ac12fce2788e2b3706c2ebc69e7be37fd2a337727452fe09da848,2024-03-18T19:40:00.173000 CVE-2024-26103,0,0,8def4a39c13d47b53292840b50c64b12658220aacee9dc293340637f660797b8,2024-03-18T19:40:00.173000 @@ -248130,9 +248130,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000 CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000 CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000 -CVE-2024-26271,0,0,94d22f604a985174d42111d64e0b23a56810ed5aec83eeffb7fda2be0e45ea7c,2024-10-23T15:12:34.673000 -CVE-2024-26272,0,0,2cafd8fc22129f3b590189152a9df5b093c77bb6590e2fe2c8ad7ef6db6cc619,2024-10-23T15:12:34.673000 -CVE-2024-26273,0,0,1c558983e69a364df8a14cb27906a600a4f6ce5ee29c8d95d118d25203c55b4a,2024-10-23T15:12:34.673000 +CVE-2024-26271,0,1,90efe8aa58b5016b25a8857eef82f6f11ce202cf315496c4a742a78e19f3fe47,2024-10-30T15:04:11.867000 +CVE-2024-26272,0,1,c80525339098677fa4e717ed434c933352995311835a52a959174ee5867f82c0,2024-10-30T15:03:51.437000 +CVE-2024-26273,0,1,9e726bb802e7d5f73ab9b92d6026de7424a2b453f9bff0a1c38491bf0c7e5d8d,2024-10-30T15:03:35.040000 CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000 CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000 CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000 @@ -248154,7 +248154,7 @@ CVE-2024-26296,0,0,544e1c2c94ce65e70db959ad46d5372fa189de6687abd994a179048ab80cb CVE-2024-26297,0,0,af2dff5c494a25db31e51e78048442dd01fa43e7ea7ca9a2aba52748560b0484,2024-08-01T13:48:05.817000 CVE-2024-26298,0,0,59727460b37052fa0a59faa646f1b3121962ba5c31619135e5630e3a1f8617f0,2024-08-01T13:48:06.523000 CVE-2024-26299,0,0,388de7f3a87ecf2fa8513c69a452c6b2ff267b5ff8f028f7dadd75103abb070e,2024-02-28T14:06:45.783000 -CVE-2024-2630,0,0,070bc19de7c6292a3d3a6f1dc36c9928baae384b4f9f22a69378848f649a74b3,2024-04-01T15:23:32.893000 +CVE-2024-2630,0,1,ec856c27a5c03dd021fb947cb024a63c9409651759234a9bffe340d8fd7b989a,2024-10-30T16:35:14.117000 CVE-2024-26300,0,0,1ac1f21ae9a2403844c235609ee04177577ebeaf725b3bb4b2178b26e2a031f5,2024-02-28T14:06:45.783000 CVE-2024-26301,0,0,19f0f94ed5cbffac086b7363ba9897dc486d991fcb04fba1d0f3db89247a8bc8,2024-02-28T14:06:45.783000 CVE-2024-26302,0,0,ff20007eb31c0fa8781cc9c4d6fc8a55c00403a520ce07afbda60fb035b40218,2024-02-28T14:06:45.783000 @@ -249562,9 +249562,9 @@ CVE-2024-28014,0,0,16fb600a35cd34a3bc2910bc5d71fb1c433afeb8bbc697318d98ea82c7efb CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000 CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 -CVE-2024-28020,0,1,b684a40bcfa1b370d8bb34a5c1d02183662465a7ec86995d07d8d810f26ebf94,2024-10-30T14:23:14.127000 +CVE-2024-28020,0,0,b684a40bcfa1b370d8bb34a5c1d02183662465a7ec86995d07d8d810f26ebf94,2024-10-30T14:23:14.127000 CVE-2024-28021,0,0,d3b281f790deb0e028449c0547c897de30755152601ff8bfb79129f9a9b610f6,2024-10-29T15:15:09.347000 -CVE-2024-28022,0,1,9077c2e7130f01aa732cd3390b7c4ae4caddc752d7d580463d4dc1ef8afd6333,2024-10-30T14:24:16.353000 +CVE-2024-28022,0,0,9077c2e7130f01aa732cd3390b7c4ae4caddc752d7d580463d4dc1ef8afd6333,2024-10-30T14:24:16.353000 CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000 CVE-2024-28024,0,0,b0c6ecf3013967d3efc0618c902b41d32c3ab34672126ec38ab8cb1948f54213,2024-10-29T15:15:09.697000 CVE-2024-28029,0,0,9e4bd22dac92b2ff82c0b0c8dd5314b634ca4785041ee3b60958f95130ac218e,2024-10-17T19:15:22.063000 @@ -249582,7 +249582,7 @@ CVE-2024-28046,0,0,e317050e5191f1a9311172b20af408b0774a96cf976a07961cd105c21cd52 CVE-2024-28048,0,0,427932cc2219e9755e4267ffe9ddd33c638166ca04c44c64b94478c05d38f523,2024-08-07T20:35:15.970000 CVE-2024-2805,0,0,286efc9a19dc11ee0838ec500ba164305f2c14641c0d5856229be06ec762a801,2024-05-17T02:38:30.840000 CVE-2024-28050,0,0,0d145d7886c67ca4edf4d6c71f8ed46211449029687ca634366ee5c88b5e7b1e,2024-09-06T18:38:11.353000 -CVE-2024-28052,1,1,d104be7b0ed9c739fd6bb5e987047c06e1582f4552ccfce34a901b096e65c8da,2024-10-30T14:15:04.720000 +CVE-2024-28052,0,0,d104be7b0ed9c739fd6bb5e987047c06e1582f4552ccfce34a901b096e65c8da,2024-10-30T14:15:04.720000 CVE-2024-28053,0,0,c6161d8eec33d0d4874e655333f8b3d42189dbff5254c952286bcd697b2efc85,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,42bd8bafc554125a5c189382c84c5d77dd5214fa492ad959b0494172465d0aa0,2024-03-23T03:15:11.510000 CVE-2024-28056,0,0,c35a08b2cbca4e8b19728715e17e817ce4b19045fe6d73162e692c29df0fb231,2024-08-15T19:35:07.857000 @@ -250059,7 +250059,7 @@ CVE-2024-2887,0,0,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b CVE-2024-28870,0,0,a84ad55a58fed92db4d351523f55fc3cc9d3c726377b9c2c66e3f01e6b89b3d1,2024-04-04T12:48:41.700000 CVE-2024-28871,0,0,f172a75f11a332172da0d351654b3914d8a45025ba4cca839cd83e7266151a93,2024-04-04T16:33:06.610000 CVE-2024-28872,0,0,3fa653e5c53924e4238c671e5dfa807909726d40036a16f47c2e48e10d41c887,2024-07-12T18:48:45.307000 -CVE-2024-28875,1,1,c11b48c2ce271c558919e98c2eb15ea951ab9643a605a820586146708f3747ee,2024-10-30T14:15:04.990000 +CVE-2024-28875,0,0,c11b48c2ce271c558919e98c2eb15ea951ab9643a605a820586146708f3747ee,2024-10-30T14:15:04.990000 CVE-2024-28876,0,0,289ce1f406982ef8800ef1b70fd46d0b9d5b8d9ceadfdb0734ecc8b023d71b98,2024-09-06T18:35:00.337000 CVE-2024-28877,0,0,cc0627e9c2b6ba5f30332865405b5bc76f89994c49e4e390afd92f763c7891d6,2024-06-13T18:36:09.013000 CVE-2024-28878,0,0,d059bd49c00a1fffb41c41d6dd95d1c802f748f752ac96eeef423a76a468b10c,2024-04-15T13:15:51.577000 @@ -250341,7 +250341,7 @@ CVE-2024-29170,0,0,b197fa7a7096d94d37c613ba2c6a7ee9897dd072a00f8dfa13a38fc4064e1 CVE-2024-29173,0,0,b62456de8f4690ce00618be7c34a0b2cf8be7a1ae45ec9583315adfc494ef33d,2024-06-26T12:44:29.693000 CVE-2024-29174,0,0,2f89576d93360494ca2cc2b277086c2a427003cf8ac672efbf66eb7d6dd29f29,2024-09-23T21:00:33.127000 CVE-2024-29175,0,0,bf3d75b78a3d0440ae4550a31f6e6795d080c83a26a8a4e7e6b90f2099187102,2024-09-23T21:13:13.247000 -CVE-2024-29176,0,1,fd582474832c4d4f3b624db38762c8242e536b968a32cefeeca62c0f36ecae26,2024-10-30T14:15:05.240000 +CVE-2024-29176,0,0,fd582474832c4d4f3b624db38762c8242e536b968a32cefeeca62c0f36ecae26,2024-10-30T14:15:05.240000 CVE-2024-29177,0,0,00eb12a74167d5e48c93933c842de7dd3acad16859a229b4f4b9f9dbf8ef1749,2024-09-23T21:10:31.890000 CVE-2024-29178,0,0,22d635a1cbe75908c0019b5950f190aa3a6a7a13b04dc63306f00cc64a0a2d72,2024-09-10T13:59:42.720000 CVE-2024-29179,0,0,fe840eaf09e7a8e7dd10821c2db25070488ae9547e1cdb2c88feef71c243f949,2024-03-26T12:55:05.010000 @@ -251716,8 +251716,8 @@ CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f4 CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000 CVE-2024-31146,0,0,b342a247282dd82cf1f52d9b8502d9aab215fbb81ba82cfea4edb5bd4cfeb6ee,2024-09-26T13:32:02.803000 CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000 -CVE-2024-31151,1,1,4af5a128b3f1c31d99168ffab664653577047d2bc396fe2a6d1bd0475c958864,2024-10-30T14:15:05.507000 -CVE-2024-31152,1,1,9beeaa01ad59bc49ba6c24cd67029f0432f770b62b5dd1e2749c431ba923271d,2024-10-30T14:15:05.773000 +CVE-2024-31151,0,0,4af5a128b3f1c31d99168ffab664653577047d2bc396fe2a6d1bd0475c958864,2024-10-30T14:15:05.507000 +CVE-2024-31152,0,0,9beeaa01ad59bc49ba6c24cd67029f0432f770b62b5dd1e2749c431ba923271d,2024-10-30T14:15:05.773000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000 CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000 @@ -253101,7 +253101,7 @@ CVE-2024-32940,0,0,b139056212e274cc43b1d8561af3c4d12757c7b4882dc265ebef55266df1f CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 CVE-2024-32944,0,0,d0ec70387311640eb8535227f7e724b82fb2d27427be3369ff836aae4b979014,2024-10-29T15:35:25.073000 CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000 -CVE-2024-32946,1,1,ecaee23cdc0940463e55e6289b98af2d22b2abaf868e06757ee200c672454daa,2024-10-30T14:15:06.033000 +CVE-2024-32946,0,0,ecaee23cdc0940463e55e6289b98af2d22b2abaf868e06757ee200c672454daa,2024-10-30T14:15:06.033000 CVE-2024-32947,0,0,f4d3388d21b25a6b8abe5d47eaf1495f0195fc32275d8a68f778018af0164235,2024-04-24T17:16:50.397000 CVE-2024-32948,0,0,acdecd5f4ed0b407d74ae76d69c5bf1c1216a53f69bd869825d06aa6433de1ea,2024-04-24T13:39:42.883000 CVE-2024-3295,0,0,7e8dc8fb7d947b5fec16ad38c2014a5b0f40e3f43acfc4125c239589a9c410e5,2024-05-02T18:00:37.360000 @@ -253499,7 +253499,7 @@ CVE-2024-3360,0,0,3109060f810d344d932ba41f8fde09186b8026142e7b2128910fcc2070ceab CVE-2024-33600,0,0,02f564f9ce52bc11d27e3e1676100dcba6eaf4079faf69e72aa377dd994c6ac8,2024-07-22T18:15:03.417000 CVE-2024-33601,0,0,1e872276284c72121f6aaeefc175b69e15bd1ff785d0661b2fa91a7a25fea337,2024-07-22T18:15:03.493000 CVE-2024-33602,0,0,86deb6f1e6a3eb7f53cef6d50563acba68abbbbc8944080d8d45f1adacf78d24,2024-07-22T18:15:03.583000 -CVE-2024-33603,1,1,5c5e35801a94aa9562e7796d018a5a81dc684755f9a5363944d51de5582c15a6,2024-10-30T14:15:06.330000 +CVE-2024-33603,0,0,5c5e35801a94aa9562e7796d018a5a81dc684755f9a5363944d51de5582c15a6,2024-10-30T14:15:06.330000 CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877fcf5,2024-05-08T17:05:24.083000 CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000 CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000 @@ -253511,9 +253511,9 @@ CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad4 CVE-2024-33620,0,0,e869b572e67eecaa04960c7c1c826ad66c9d71964f8469bf34eb9ac43afb5484,2024-08-13T20:35:09.233000 CVE-2024-33621,0,0,ed1eec35bbbbdea80d33a8bbcfc24d343e0426fb309b2aaa07ef1d5e8aa29271,2024-07-15T07:15:04.067000 CVE-2024-33622,0,0,d58465a4a66214b50b1796cf92386e687ba2dbe496bc818c44d1f85dc4a8973b,2024-06-20T12:44:01.637000 -CVE-2024-33623,1,1,8e2ca3456dee23f4e80d6c36a39cd406a49062d0de431060b5d08967870b8751,2024-10-30T14:15:06.597000 +CVE-2024-33623,0,0,8e2ca3456dee23f4e80d6c36a39cd406a49062d0de431060b5d08967870b8751,2024-10-30T14:15:06.597000 CVE-2024-33625,0,0,645afc1357c853e892786758021f6a244aedee60fe13b747d548e0f0fed77836,2024-05-16T13:03:05.353000 -CVE-2024-33626,1,1,2401483dfda40e44456e017f9ca347173e74510b6fa5f9e1a0bdb29b99403627,2024-10-30T14:15:06.850000 +CVE-2024-33626,0,0,2401483dfda40e44456e017f9ca347173e74510b6fa5f9e1a0bdb29b99403627,2024-10-30T14:15:06.850000 CVE-2024-33627,0,0,739561a300c8e0c5d6e0776600829ec1cdfa9e9832b6a16afdce5ca14d9efae0,2024-04-29T12:42:03.667000 CVE-2024-33628,0,0,0d9fc47e7881c845fcfb40059b0a2f57cf834a162fc7588e1c4ae872cfbfa8b5,2024-06-04T16:57:41.053000 CVE-2024-33629,0,0,0775f88facd47182375f04c11c9fb90160e0ba716118a2c83830fab26520359f,2024-04-29T12:42:03.667000 @@ -253586,8 +253586,8 @@ CVE-2024-33695,0,0,496bc8a3b6cc06e0f2cb2ff5ef3180780eefdd07d63e68d063cf97ba79dd8 CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe731e7,2024-04-26T15:32:22.523000 CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000 CVE-2024-33698,0,0,757107609bb2e6f896c0b7f0b6fa39b8f34d961ef227f03387260ef6a53fe2d1,2024-10-08T09:15:10.463000 -CVE-2024-33699,1,1,205a2265e8b1b78d62f5a185c0b575bad5ceb5ae6574c2d8dcf8edd222f149d4,2024-10-30T14:15:07.100000 -CVE-2024-33700,1,1,1422c6c7bfee08f754883a7161782880572727416a93e95f58b7000bc2a4ada5,2024-10-30T14:15:07.460000 +CVE-2024-33699,0,0,205a2265e8b1b78d62f5a185c0b575bad5ceb5ae6574c2d8dcf8edd222f149d4,2024-10-30T14:15:07.100000 +CVE-2024-33700,0,0,1422c6c7bfee08f754883a7161782880572727416a93e95f58b7000bc2a4ada5,2024-10-30T14:15:07.460000 CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000 CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000 CVE-2024-3373,0,0,02bb0a6a8cf1c8cb960f2645d7165e4c706cc177e4cf5e50be0530bbf35b3163,2024-09-30T12:45:57.823000 @@ -254321,11 +254321,11 @@ CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405db CVE-2024-34662,0,0,a6658413d6b88b3373ec5926587f6541001b2a48e07597ea624b92716d312cdd,2024-10-10T12:57:21.987000 CVE-2024-34663,0,0,bc7e792d3bf9cb19b3bac7de5e5f393eda73c48981c29bad44b4305bf7709bc5,2024-10-10T12:57:21.987000 CVE-2024-34664,0,0,b864c4351ccbb106aca6a04f609ab07081f58539736f6b0a259450595fc32b90,2024-10-10T12:57:21.987000 -CVE-2024-34665,0,1,8e97b696e2825593cef2b60bbd5fe842a775ccd597e31a6a3daa4e47d15b624a,2024-10-30T14:28:55.223000 -CVE-2024-34666,0,1,6cfcd5416a4b2e4dab365ea618f0b912febb2265cdb4e40b3018629a4a8e18d8,2024-10-30T14:29:25.827000 -CVE-2024-34667,0,1,4153f5003a432e9a26124ef302ffea502190e93ae8a76b1da92c9ef8947ba7e8,2024-10-30T14:29:42.627000 -CVE-2024-34668,0,1,31c02ca4f03c2729dc2bf41e4274bbdaf5a6330d99aa4b0799e50f1bf3a3a356,2024-10-30T14:31:12.387000 -CVE-2024-34669,0,1,39ca1a2b1d0114a86d10ab1e4c3a85b90ce6b0713b5d4c5991b51608f5fe4581,2024-10-30T14:22:47.337000 +CVE-2024-34665,0,0,8e97b696e2825593cef2b60bbd5fe842a775ccd597e31a6a3daa4e47d15b624a,2024-10-30T14:28:55.223000 +CVE-2024-34666,0,0,6cfcd5416a4b2e4dab365ea618f0b912febb2265cdb4e40b3018629a4a8e18d8,2024-10-30T14:29:25.827000 +CVE-2024-34667,0,0,4153f5003a432e9a26124ef302ffea502190e93ae8a76b1da92c9ef8947ba7e8,2024-10-30T14:29:42.627000 +CVE-2024-34668,0,0,31c02ca4f03c2729dc2bf41e4274bbdaf5a6330d99aa4b0799e50f1bf3a3a356,2024-10-30T14:31:12.387000 +CVE-2024-34669,0,0,39ca1a2b1d0114a86d10ab1e4c3a85b90ce6b0713b5d4c5991b51608f5fe4581,2024-10-30T14:22:47.337000 CVE-2024-3467,0,0,cacb4fff60c492ce28d24c855ee87196a20d1b51cff8acadb6d43f71f0e4e429,2024-10-03T19:47:06.097000 CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61c6e,2024-10-10T12:57:21.987000 CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000 @@ -254799,7 +254799,7 @@ CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf CVE-2024-3548,0,0,d36c3da57ad232cab63cfe730b939da3d11ca9fb8353135fe3e907f711d131dc,2024-05-15T16:40:19.330000 CVE-2024-3549,0,0,0cde880e41c0c3ba557ce463b1ff0900f3f316d2ed3d6009897a715aae6e97e9,2024-06-11T13:54:12.057000 CVE-2024-35492,0,0,33aecacefd5370fcd53a7eb152d476421944d3120d3115b260ff90b817999987,2024-08-20T16:35:13.950000 -CVE-2024-35495,0,0,f2b66f08d983d2d8551432de2a69b265edd788ca956eb42c244416a3e4518c04,2024-10-04T13:51:25.567000 +CVE-2024-35495,0,1,444681b65907f601dc2fb6718ff6a9a46524dbc2dc6f97955af4c68af39cb4af,2024-10-30T15:35:10.887000 CVE-2024-3550,0,0,ac5bbd2b6bc618ed8d0d187264280ccbd8a80d9a5319faa69118b498969cb88c,2024-05-02T18:00:37.360000 CVE-2024-35504,0,0,e166404c83da3941ce306fedbcc958803779345d2352a83f02ebf499c8052277,2024-05-30T18:19:11.743000 CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c7707135,2024-05-17T18:36:05.263000 @@ -255523,7 +255523,7 @@ CVE-2024-36307,0,0,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c71434269 CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c973c,2024-05-15T16:40:19.330000 CVE-2024-3632,0,0,b5152c6f3734461efaf203a246eaafe8ef0e2600523c2de907e61dd2f01c5bfc,2024-08-01T13:56:37.647000 CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26 -CVE-2024-3634,0,0,5d02e3f893ea5650c3ad2b96f123134b624618fa357ff3bdcb3a7b4c93242ece,2024-05-15T16:40:19.330000 +CVE-2024-3634,0,1,09c0f8e04a3455cab5ef2b14d0e5b955d12b537618764af3142f130e0a11271e,2024-10-30T16:35:16.890000 CVE-2024-3635,0,0,b778d7b498dcea7fa24c3ef8d2fdc2e16efa86aeebfac3bfee1e098824c6eea4,2024-10-02T14:30:24.627000 CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000 CVE-2024-36359,0,0,e2a4054af1c7293cd417470c34bfb1cad308864123ebeae9851a8bc28053ec60,2024-10-03T19:49:00.337000 @@ -256328,7 +256328,7 @@ CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6 CVE-2024-37514,0,0,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000 CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000 CVE-2024-37519,0,0,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000 -CVE-2024-3752,0,0,239ab2a4fa8a03a6a793fd7bad6c5508294cfd1be75f4ce013e63852e68d9c42,2024-05-06T12:44:56.377000 +CVE-2024-3752,0,1,a5efb5effc0a5c4e1d6b4c1affd3679917ceb564b80faf8557eca4784ede510d,2024-10-30T16:35:17.613000 CVE-2024-37520,0,0,1cad459c20e2d875630bdc07513eda15868aad6421fe450388baf16c360c4642,2024-08-29T18:39:02.407000 CVE-2024-37521,0,0,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000 CVE-2024-37522,0,0,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000 @@ -256612,8 +256612,8 @@ CVE-2024-37997,0,0,10214765491aa29b8c34faf22f5e8238fda623005890c9342516743753b6c CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000 CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 -CVE-2024-38002,0,1,a488a788ece9f6902fc8a3f89310aa3b40f556b69c0e0415157e9af8e5691ca8,2024-10-30T14:47:10.953000 -CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 +CVE-2024-38002,0,0,a488a788ece9f6902fc8a3f89310aa3b40f556b69c0e0415157e9af8e5691ca8,2024-10-30T14:47:10.953000 +CVE-2024-3801,0,1,07aa9a9e6d81fba8cef5860d9c76583a9b904874d0e98aaaacf604b5d57dcd58,2024-10-30T16:35:18.490000 CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000 CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000 CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000 @@ -257168,7 +257168,7 @@ CVE-2024-38616,0,0,f8c51d530c6963ad76ff0e210ba7c38d38abd039210c3919fbdb52eed1c6b CVE-2024-38617,0,0,ce4bab86c0d0ce91f59ac9b5c7ba349b4b3e0e02c8ddb2628f883888d27c5934,2024-06-20T12:43:25.663000 CVE-2024-38618,0,0,ae9c5c1e7b66b53f2715f8c0cb125a244821a913e0d7107cdeae9e60621b4d80,2024-07-15T07:15:13.020000 CVE-2024-38619,0,0,2a0ae06dba9510c72cb1cc44a3a5a49b04cc3ac55ff0736a45ed86d4f80ea1ca,2024-07-05T08:15:03.343000 -CVE-2024-3862,0,1,85139a0055cc9a392febd90de7f92e7784deddbacf9d89972703c5c7483218b7,2024-10-30T14:35:11.003000 +CVE-2024-3862,0,0,85139a0055cc9a392febd90de7f92e7784deddbacf9d89972703c5c7483218b7,2024-10-30T14:35:11.003000 CVE-2024-38620,0,0,2b6dbacae4f898ce905a0a529ecd9c58074f5f76602dd0c9f75aadc92a8b09e9,2024-06-20T12:43:25.663000 CVE-2024-38621,0,0,2e9b7871659006d130fde15bed40ba30f741fd3871249588d5f3059423b9ae9e,2024-07-15T07:15:13.207000 CVE-2024-38622,0,0,e2962f5ea800316947cd592cef1842c6af7c2a172c1cd23c1a17c4be1f646576,2024-06-21T11:22:01.687000 @@ -257573,7 +257573,7 @@ CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a08393 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000 CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000 -CVE-2024-3935,0,1,2abe17a6a3774b504ef50f7afcb77b95f7b5d9531682345c309be8796e77a788,2024-10-30T14:35:11.860000 +CVE-2024-3935,0,0,2abe17a6a3774b504ef50f7afcb77b95f7b5d9531682345c309be8796e77a788,2024-10-30T14:35:11.860000 CVE-2024-39350,0,0,933f5cf4e1e8654d4184b998e6e3d84f4d423cc036a81e5a6851a5092c592ad5,2024-06-28T10:27:00.920000 CVE-2024-39351,0,0,9b4d39161319839f1a0a214dc211a28fd92f2da777165762a051c899eb88a499,2024-06-28T10:27:00.920000 CVE-2024-39352,0,0,2125967ac59376c4e2a4b0fc39ded99823f5fb5459f0421dba32eed656bdf603,2024-06-28T10:27:00.920000 @@ -257943,7 +257943,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 -CVE-2024-3980,0,0,ca3511d7901d042fa00bfa9c0d0aa676b250ea6c77161bee8a48883714e5741d,2024-10-29T14:15:06.670000 +CVE-2024-3980,0,1,c112ad3a9592e527e0da0797cc7aa917bbe565618aa427a8c29ee83d7bab28f6,2024-10-30T15:33:12.697000 CVE-2024-39806,0,0,707dfc0ddef50ef77e39ddae9dd446416de56337e997263c3f5b5e8fa232a33d,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 @@ -257954,7 +257954,7 @@ CVE-2024-39816,0,0,99e8d0f2ca7c7949ccc5b1fb01e67a6b8249c725e85c2220f31f36de7605b CVE-2024-39817,0,0,da37b9dcdb041f40628bdd9732b2ecb73043147c99cfbf7acdec75950efdf2c1,2024-09-11T19:36:18.050000 CVE-2024-39818,0,0,060cae25a3d44b550fdd040c9993a800c9e0d5e1283fe900d463907d0567c6f8,2024-09-11T13:27:30.923000 CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000 -CVE-2024-3982,0,0,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000 +CVE-2024-3982,0,1,6ab9b53d4a58c1bf71f942b6bcb5c49bc959baba81f92d15e8f83b5fc0f8152f,2024-10-30T15:32:23.680000 CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000 CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000 CVE-2024-39822,0,0,89aeba217fe888961e59273bc198a6d383f528aef9e342f9ebf06b5dc5cc7454,2024-09-04T21:28:37.727000 @@ -258348,7 +258348,7 @@ CVE-2024-4074,0,0,e0d606c18d1f193dcf25e2a451ef5a2bdfc69d8e090f30f7431f35132ae93a CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c8c5,2024-07-12T16:12:01.927000 CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 -CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000 +CVE-2024-40743,0,1,1ca5c18a4f8e370309e54e9979f8748e30571bbf531892fd8ed83274cf09559a,2024-10-30T15:35:12.210000 CVE-2024-40746,0,0,eead0b50026ce20d26effd54607d8bf55992b18b9630c4426d5bb7acadcc3473,2024-10-29T15:34:22.100000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 @@ -258357,7 +258357,7 @@ CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d CVE-2024-40761,0,0,04b56637ed1b4ee2d83e39ba88cb3e446c0c66fca89659ba993cbe8999f96ded,2024-09-26T13:32:02.803000 CVE-2024-40764,0,0,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000 CVE-2024-40766,0,0,9ffdda3005aa6c238f823c6e65a3a89594c21a379fd17878a86615d17b31de27,2024-09-16T19:48:30.827000 -CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000 +CVE-2024-40767,0,1,41a668ec3a3d9108df95a63cfc1397e92444c792025e20527bb6192adab7ddba,2024-10-30T15:35:12.440000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 CVE-2024-40770,0,0,a0184ec6f6517bc414460e13ef7b4dae6b47fe9304d99403525f52de9ec9d9c3,2024-09-24T14:55:38.737000 CVE-2024-40774,0,0,f727e8aeb5baa126b4b2412fe1a51e0fe6f28b6a0195e382f8e2cfe4c9297314,2024-10-28T21:35:14.033000 @@ -258376,11 +258376,11 @@ CVE-2024-40785,0,0,0ebfce5c55bfee438659b0a5ff21c26489a17105755c9acc95a453360d4cf CVE-2024-40786,0,0,1d5a22dc485257f61ad56f387446230ed28d8c6d76c2d4bb7e66185337af2307,2024-08-15T16:44:31.820000 CVE-2024-40787,0,0,e7872c59114f8bc6e1d61059bacac8cf94d2c897fdc9c325ee9cdaea3ebeeed2,2024-08-26T17:47:24.847000 CVE-2024-40788,0,0,e37f9cfa39fdb648ce78db53ddf485c5cf3db09885741b13a44f173dcb0901e4,2024-10-27T01:35:10.487000 -CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9acdf,2024-08-23T15:38:01.380000 +CVE-2024-40789,0,1,3602e32e7b4902ad10b1f750ee1eea33948cb5d6d1874e478f20149ceaf89da5,2024-10-30T15:35:13.230000 CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40790,0,0,f74af1b6450b7abb69693b13c877ce53db126e23128080b9a116672c6aa27da8,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,1462bf4b5845ed6535d6a4bb5a36a3a889e0ddd7f70e74baa361a7ba6c70fe5c,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,0,a2585380a94744be6a95f288afe3479213e76d2dc54ce4f58c8ac2539e20051b,2024-10-29T17:28:34.383000 +CVE-2024-40792,0,1,5e64c5a9ebd88a63372b8138e0e1226bf6f7a3505f73897b84f2b3055775dd49,2024-10-30T16:35:18.823000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 @@ -258423,7 +258423,7 @@ CVE-2024-40830,0,0,ca7776e0c74cfd2ad6a11e7b11560ae15ef0e22a367085df69798c9a30c56 CVE-2024-40831,0,0,99c2265cb4d2ae896b91e30bceb0318bce6f0816674b19fd0a8ff6533bf23346,2024-09-23T19:18:02.207000 CVE-2024-40832,0,0,0508ad5cde16d373df00450e2ce0c69eb3ff2fe39db1297b844b6503945a5cbf,2024-10-29T21:35:11.120000 CVE-2024-40833,0,0,3b5bd8adb9200d22552753acbaa4168e91eb7a378a926cf5206f38e0cdca97aa,2024-10-27T01:35:11.700000 -CVE-2024-40834,0,0,7e20f67bc8b08fc4adc47071793a554467422544bba4ba726067a06c6b9b9ed7,2024-08-23T14:40:52.523000 +CVE-2024-40834,0,1,cbaf51bbf3e70fb46e2d22d974c0fb2ca3cf811ec9acb1b99d8a954817a080a2,2024-10-30T15:35:14.080000 CVE-2024-40835,0,0,ffa2d0f502e7a09e89b4898498fc215520bfece3735d19b72358067234b3c222,2024-08-23T14:39:03.070000 CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe62dd,2024-08-01T13:58:15.220000 CVE-2024-40837,0,0,ccc4fbf4d07a48518f7fa02b46184c88d2b8e0a64ca26c4f8ffcf17903cd52b7,2024-09-23T18:50:16.050000 @@ -258440,7 +258440,7 @@ CVE-2024-40847,0,0,ac34ef361fd419d2c48bb6c61015668892d59a23316cf5cdc2086e1759e39 CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d92f,2024-09-24T15:57:03.893000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000 -CVE-2024-40851,0,0,d166c2651cf2b1d0771f62424448f43af8bd64c88c74e8ac42bdfd1d1ad76720,2024-10-29T17:42:35.217000 +CVE-2024-40851,0,1,2951b01099c450197931b2d3c9228abf645beafb747dcd3e2912599f5aa43484,2024-10-30T15:35:14.883000 CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000 CVE-2024-40853,0,0,8b571240b2aaeae983c05f75ab22f4e2c4695165f3df0121995d9ccc6e81c7ac,2024-10-29T20:35:25.610000 CVE-2024-40855,0,0,90f4bd8e2db22cf8648d6901c6c3a67ee009b99fe00cc69ba2463d3c3905a513,2024-10-29T17:42:18.573000 @@ -260652,7 +260652,7 @@ CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd2598 CVE-2024-44072,0,0,c15ddc9cbc2cc106650a31089cdfd669f16d12a8ad25609c42818d1d63e1458b,2024-09-10T20:35:09.990000 CVE-2024-44073,0,0,de55f1c002ffa890fb79df1a9da58802af7cfd53cb9325cc406c6e277fabf47c,2024-09-06T17:35:17.523000 CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 -CVE-2024-44080,0,0,bf49fb6efb2f36ebb00f6a34470b5f1665cbac7bcb70e23281a110ded5ff0ab8,2024-10-29T22:15:03.633000 +CVE-2024-44080,0,1,9bee276309c166c6facf28cf9cd30e5a6038b72ef2397f7e25826f1c9a81a8e6,2024-10-30T15:35:15.230000 CVE-2024-44081,0,0,07bf67c5a602c2a19603ce6d7abb6b6fa1f2ddcb8427e95085138a8c0cfb2a42,2024-10-29T22:15:03.730000 CVE-2024-44082,0,0,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000 CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 @@ -260716,7 +260716,7 @@ CVE-2024-44155,0,0,bc69f7eda0ccc25d9ce40996abffd50dd53eb3f764e8a2b160a1b820e4079 CVE-2024-44156,0,0,c7b3823189e90823d63dfcd6d29d891ddc5936a4d7c2355696b7ee8e9b86261b,2024-10-29T17:33:51.597000 CVE-2024-44157,0,0,97a910630a3e98feb305f0a101a5c0c80098e87c8c858ed1c75250af3ffe7b5f,2024-10-27T02:35:03.400000 CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000 -CVE-2024-44159,0,0,112c99577483027f4f4d46361803a0ef723bdb32f41c221ffcbe92ee2303dbad,2024-10-29T17:33:37.147000 +CVE-2024-44159,0,1,7d179919ce785cd1c8cd21feada413b24fa5e3082c0fb76a2673925d4b5b996f,2024-10-30T16:35:19.750000 CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000 CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000 CVE-2024-44162,0,0,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000 @@ -260730,8 +260730,8 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 CVE-2024-44170,0,0,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000 -CVE-2024-44174,0,0,d2cb0e7ad84890f6139370595ba064d76537c6c7d2d5c9be0cdbe685157f9470,2024-10-29T17:33:16.540000 -CVE-2024-44175,0,0,0805e9680cd4598d38e2619ed87e7fe43d1a4e74e8e872e4630253007f322a07,2024-10-29T14:34:50.257000 +CVE-2024-44174,0,1,58e94ae286d7256e79f455f95122397c43bb1dbfdfda643ceb43c228c40a57d2,2024-10-30T16:35:20.507000 +CVE-2024-44175,0,1,7afc5d4329ba4ebd4a317f125db3a537b10c67d1498a1deac5c91104e26a4bf4,2024-10-30T16:35:21.327000 CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000 @@ -260751,7 +260751,7 @@ CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6ea CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000 CVE-2024-44193,0,0,f17ea6ad74232cbfafb0dc23bcf4b401977d8786ab1d3a877fc57ebc775c3168,2024-10-04T13:50:43.727000 CVE-2024-44194,0,0,a903dcdde1fd9d3163ec05258db0160ebd2ed91097df8b113a89edcdc22938c4,2024-10-29T14:34:50.257000 -CVE-2024-44196,0,0,b08bc757892408337b10d6ec5d606c09363a1579be4fa3f75b1eb90bab9bb059,2024-10-29T14:34:50.257000 +CVE-2024-44196,0,1,28248fab8e27e7b89ddddaf6c4ec2fde647f72a4825e0a1f4e2461e08554e2da,2024-10-30T16:35:22.640000 CVE-2024-44197,0,0,e38e0235fcf85579dbe16d1dc7df7b31f0e5ecba2c502c313f48d42f4d4e4171,2024-10-29T14:34:50.257000 CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000 CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000 @@ -260785,7 +260785,7 @@ CVE-2024-44251,0,0,406183b990c31e8b289d3648e898b17ee3f61e9384718d2bc8b02eb22ceb5 CVE-2024-44252,0,0,1f56156c1b3504c9e6ce29efa3aa1850aadb21fc5cc83f9d279e387e16772ccd,2024-10-29T14:34:04.427000 CVE-2024-44253,0,0,9dfc45ca17e6731fbad34191bc8c6dd082b2ad98644cfc4500dc83643e48425f,2024-10-29T14:34:04.427000 CVE-2024-44254,0,0,9ffc01c4a01fb0cf2dfa1b937b902fdcdac883a07b08df9e5c9982b891104dde,2024-10-29T14:34:04.427000 -CVE-2024-44255,0,0,c293b56d90061943fca03b3c22094ae16c5cc4b9fe38c830f913fdf59fc5c0ed,2024-10-29T14:34:04.427000 +CVE-2024-44255,0,1,946f5df35060c9db396726e4af4a963170f6b027f300a610055beb900a58e006,2024-10-30T16:35:24.113000 CVE-2024-44256,0,0,17aa03a2ed4c3fc9cc6050efee4584273e8e878058b24cc398dd2574b5d0db34,2024-10-29T20:35:29.053000 CVE-2024-44257,0,0,fbfaa04f8cbb781c7b5c9b4d7e31917aa6b40ea53153adf50b1bee22b30132a9,2024-10-29T20:35:29.240000 CVE-2024-44258,0,0,cc430542de7d98821c8b71a980b44111ab28852dadd6ee720ceb482eaccacf5c,2024-10-29T14:34:04.427000 @@ -260797,30 +260797,30 @@ CVE-2024-44262,0,0,1e84b5b5e920ae0a5d39bb092052fca1937f3b656c20347fc26958279d316 CVE-2024-44263,0,0,a819848c86eae35a801a866c7cc8c7d5416433f8b99a5a8aa14e7494fd1ec8c4,2024-10-29T20:35:30.263000 CVE-2024-44264,0,0,373b827613c9a9c7f3a770e81e0fe9608c0c7e87e15a1473f6a79c0a693604a6,2024-10-29T14:34:04.427000 CVE-2024-44265,0,0,15fd2e5ab0bd9692c8b85fcbfa245a300e35e9c55661f38c9ca204f7cedba610,2024-10-29T14:34:04.427000 -CVE-2024-44267,0,0,f5c2dfd9358b1edbc0f2868c6f458bbbeb2bb0f961b2dba9781285f6322034e4,2024-10-29T14:34:04.427000 +CVE-2024-44267,0,1,db7d7d22b2d2ece8f2ca8d393f1769afda13d2beb2f2e94ff305ece63bb4168d,2024-10-30T16:35:26.040000 CVE-2024-44269,0,0,1c9a87340d5e4e82f40555347c8caadf6fa5b6f66b0f5a9614db97e3a7ef4b37,2024-10-29T14:34:04.427000 CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666b0,2024-05-30T13:15:41.297000 -CVE-2024-44270,0,0,fa1da7541e315914d13db03404f7944f7fff55d48c82c634d2d8fa5d00e47e2f,2024-10-29T14:34:04.427000 +CVE-2024-44270,0,1,b9dc04a4ca0dd5953d447e5de930be19747b99fec8fb45d55b8104ec62054d58,2024-10-30T16:35:26.390000 CVE-2024-44273,0,0,11a628ab450ae1f43cfd6e9012e9c8730804b871d63d3b05a279a1370eed85aa,2024-10-29T14:34:04.427000 CVE-2024-44274,0,0,7042f1a17d79ad7857d5d12b1176335958b275fae27c4e0945876e2b01ab9aec,2024-10-29T14:34:04.427000 CVE-2024-44275,0,0,d8e06bb43c158fcc4281797d1ccceef0155ebbbf771c23024f0bfd1184657b41,2024-10-29T19:35:17.777000 CVE-2024-44277,0,0,61d2c2a1458817cc145742f3d2eca621b243ba7bf6807dd615d1ca055f76ebe4,2024-10-29T21:35:17.737000 -CVE-2024-44278,0,1,6a7f9872d82db0bbf03957c1afd6ecbea3f2f06c40db6f23a06b217454e0d632,2024-10-30T14:35:12.077000 -CVE-2024-44279,0,0,3d3d2782cf38cfbab9143a09adbd7eeae67209432aad5b737f58221076c4a8cf,2024-10-29T14:34:04.427000 +CVE-2024-44278,0,0,6a7f9872d82db0bbf03957c1afd6ecbea3f2f06c40db6f23a06b217454e0d632,2024-10-30T14:35:12.077000 +CVE-2024-44279,0,1,46b4a70284608cd623dce4bf8f315595524d7e7caa51dbade793fd08dea3ec38,2024-10-30T15:35:16.063000 CVE-2024-4428,0,0,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000 -CVE-2024-44280,0,0,21de8a35b7363cadebf78d71c9679cbfa65e9991e7a3abe607be7008a71fbb5f,2024-10-29T14:34:04.427000 +CVE-2024-44280,0,1,3c88d828a58a14a85e8e2703993f405717fc468f11000fa1c0be5028b7b08202,2024-10-30T15:35:17.173000 CVE-2024-44281,0,0,836ebb72fd4fec7a9d20e240194eb06c62bd346b60d324b256da0dcc1d64341f,2024-10-29T14:34:04.427000 CVE-2024-44282,0,0,0d2af15e3522707d977fe4bc740af92cf6ebf4241f16cee27277cbdffe06cb5d,2024-10-29T21:35:17.953000 CVE-2024-44283,0,0,3ac88c7ddb1fed650f2454e0ae10df8bc4c84ca583c6c661ebf37603888b15af,2024-10-29T21:35:19.207000 CVE-2024-44284,0,0,aafaa862d706f7d4aa62b9578549e88ea4f6c2a4a88cff4811eff309dbf54c3e,2024-10-29T21:35:20.070000 -CVE-2024-44285,0,1,165dc42a02262c5425e1d7b749becd46b90cc524a173f56e70ab7173cb3084f2,2024-10-30T14:35:12.353000 +CVE-2024-44285,0,0,165dc42a02262c5425e1d7b749becd46b90cc524a173f56e70ab7173cb3084f2,2024-10-30T14:35:12.353000 CVE-2024-44287,0,0,4b2b7e8101daf580110e865664d09e9b8e738d0759f08414f92a6a6cfd3889a2,2024-10-29T14:34:04.427000 -CVE-2024-44289,0,0,95b7ed6d214067d4cbde2ea5a535523545f584614d824c4c4e1d05bd792af21f,2024-10-29T20:25:47.537000 +CVE-2024-44289,0,1,39f2c304e535f897d30f0fda10654e4d803aee074158bd870b6d7fbf5cd0aed5,2024-10-30T16:35:28.097000 CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000 CVE-2024-44294,0,0,59fc3334cee0c3e9631e7e6a5312e3c47084303bd875a30b037f9e38f2893ed1,2024-10-29T21:35:21.347000 CVE-2024-44295,0,0,fb98babf34b319b0a2af419c6d70bf7de5dce9049e181af2638c884d22361b7b,2024-10-29T21:35:21.523000 -CVE-2024-44296,0,0,a3997d33b299dc7244f17105307e9c189658ff2f95560c9d030e9921803847f6,2024-10-29T23:15:03.770000 -CVE-2024-44297,0,0,a2d7fdd78fa61e8c5def00a5081796bfd5f69bbe7fba009315ee29ab843f149e,2024-10-29T20:23:37.967000 +CVE-2024-44296,0,1,8a3539d8b1a8455313f180197289b9017621c597386d505523693a7de422292c,2024-10-30T15:35:17.433000 +CVE-2024-44297,0,1,79b1a7724e5e5ef3ea1a90918f341220daf2a3cd7bb65b3a989c955fd834b7c9,2024-10-30T15:35:17.777000 CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000 CVE-2024-44301,0,0,1947d3abeb8f3c617a953d82aff9239aa51a781f132c513eb9bd113e9e3104ce,2024-10-29T14:34:04.427000 CVE-2024-44302,0,0,135dd022b19581dad4cc89a6e95bc2764f06cd4002b60ed18a51aacb9b5fcb7d,2024-10-29T14:34:04.427000 @@ -262572,7 +262572,7 @@ CVE-2024-47632,0,0,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a CVE-2024-47633,0,0,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000 CVE-2024-47634,0,0,0db14a24577ad4cd4c39f4bd8ffd8db1b7fe5abb8b811c8dc32585acbe7b55c5,2024-10-22T18:46:02.253000 CVE-2024-47635,0,0,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000 -CVE-2024-47636,0,1,a3c5fd8a893af234192301cc917defd8faccc1c54a6bcbd7ad791f7393b694ca,2024-10-30T14:32:17.523000 +CVE-2024-47636,0,0,a3c5fd8a893af234192301cc917defd8faccc1c54a6bcbd7ad791f7393b694ca,2024-10-30T14:32:17.523000 CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986af60,2024-10-16T16:38:14.557000 CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 @@ -262797,10 +262797,10 @@ CVE-2024-47888,0,0,1ed854ade470bc163ad8c76031be0255e632797f8163938f76c7a31de7a78 CVE-2024-47889,0,0,661bf5d3df9343f9d9841050fa7811eba61ad27c7b6cfb90f97b1fd9293eaac0,2024-10-18T12:53:04.627000 CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000 -CVE-2024-47901,0,0,d704813455e1853d397b949d37588631de40839c185052fa26e621bb2fa4e0cb,2024-10-25T12:56:36.827000 -CVE-2024-47902,0,0,2e155c7d22a4c04970e17ece318ea189882cab29b016f1c35211ece78910a55b,2024-10-25T12:56:36.827000 -CVE-2024-47903,0,0,11eeb678068db65750f6560e1f1159b69f531599ad94490f298388f196efb288,2024-10-25T12:56:36.827000 -CVE-2024-47904,0,0,c161feef0618baec2e3776770bb2c41fedc6d33aa968f906cb7be80152b48818,2024-10-25T12:56:36.827000 +CVE-2024-47901,0,1,351c2de719aa37343f5b8705371f6ea3811b8e193d3e2965a197dc16aa2632d5,2024-10-30T15:39:47.430000 +CVE-2024-47902,0,1,2363b86854bd24a49201ca293fb87d24363aec990236fe9e9bf134a5daa38aeb,2024-10-30T15:48:39.207000 +CVE-2024-47903,0,1,7e28902499cd69638cf23751436e57fbe15e705859d687d60c9f544fac8af41e,2024-10-30T15:54:34.647000 +CVE-2024-47904,0,1,21b127b0effcb8b297c48dd7cd57e94387991d137ef282d6dd7cb6727add6e3b,2024-10-30T15:39:06.020000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 @@ -262870,7 +262870,7 @@ CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 -CVE-2024-48063,0,0,190121b409a37a8b767c8f91205aef8b328a98739b130be5b2e53c5705abfdd7,2024-10-29T21:15:04.080000 +CVE-2024-48063,0,1,f1898c32cb0d80af7ff886a74079ae648139d7f78816f6b5b345dcc6592ae313,2024-10-30T15:35:17.993000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 @@ -262878,11 +262878,11 @@ CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdad CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 CVE-2024-48107,0,0,b3b56031af4c83db1aa8c8b7592d603d12b933dd8dd7f5c4ea819744e41aed3a,2024-10-29T14:34:04.427000 CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000 -CVE-2024-48119,0,1,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000 +CVE-2024-48119,0,0,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 CVE-2024-48120,0,0,ac048d30db75e88feb91392efffb6e9bab5a19e9dc21f5cdbbca8a6a240da1c5,2024-10-29T20:57:53.360000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 -CVE-2024-48138,0,0,4009954e5c2c7bddd0ba9fe518d42b0a386ec055a41cedfba37c758aeaf4ed82,2024-10-29T22:15:03.810000 +CVE-2024-48138,0,1,7066ba30968daa1d80e7eb0a2b4b354fd811d0b1bdb9289276d5694cb5caa2b4,2024-10-30T15:35:18.830000 CVE-2024-48139,0,0,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 CVE-2024-48140,0,0,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000 @@ -262908,7 +262908,7 @@ CVE-2024-48195,0,0,3054a51a5210b07d7faf145209b3abc8afc3e28d4e10bf6f8fe8cb40d2a3b CVE-2024-48196,0,0,d2cd7ad27e7af883e5b6f39983b5e91f258998d179c5a9da881899be449dd56d,2024-10-29T14:34:50.257000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 -CVE-2024-48206,0,0,07b0d55a74737ece87d6a1328bdeedf66c32a2ad363d4a43f48451c595d8cf04,2024-10-29T21:15:04.190000 +CVE-2024-48206,0,1,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000 CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000 @@ -263004,8 +263004,8 @@ CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f8 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000 -CVE-2024-48572,0,0,a0c893dee31addf4f453f659711ee46559fea8a034b55d41880dbe6a13553ede,2024-10-29T22:15:03.913000 -CVE-2024-48573,0,0,a138803d5152f4750b4a1cca44f938c5e123454129ead32e2816953ab104f300,2024-10-29T22:15:04.003000 +CVE-2024-48572,0,1,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000 +CVE-2024-48573,0,1,0a68f4420e4d1b58f44b6c5009b5c0eaf6abf127f60f5f3f3e548f76f67b8ebe,2024-10-30T15:35:21.227000 CVE-2024-48579,0,0,753bc89d80ce06ee02f1517d3e6d38134feb41965d0a3e14286b4761046c72e7,2024-10-28T13:58:09.230000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 CVE-2024-48580,0,0,cecfbaeb166c1997f85eff468048926c1d6a76c932cf18638f27e79db1bfe914,2024-10-28T13:58:09.230000 @@ -263053,7 +263053,7 @@ CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba4 CVE-2024-48712,0,0,26c5ef0ec7563b7eb021e1452100a4e706852158c36c374f8078b72afb6523b7,2024-10-16T17:35:04.483000 CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35eca,2024-10-16T17:35:05.450000 CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000 -CVE-2024-4872,0,0,8b2c6820c717681d25c56a744060fc3e2d72667acf04ef8505ca37b89fed7638,2024-10-29T14:15:07.950000 +CVE-2024-4872,0,1,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000 @@ -263143,12 +263143,12 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5 CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000 CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 -CVE-2024-48955,0,0,c96a5ce1c87b3d5a9b2b4d5d855b7232ba502145857e0669df496ee4162c9fc6,2024-10-29T18:15:05.690000 +CVE-2024-48955,0,1,6a753515eadee4efaaa9ce7d086aaac0fd1d1f88a870f6a34578f374c110a15f,2024-10-30T15:35:22.063000 CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000 CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 -CVE-2024-48963,0,1,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000 -CVE-2024-48964,0,1,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000 +CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000 +CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000 CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 @@ -263180,8 +263180,8 @@ CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c6 CVE-2024-49208,0,0,3a58d346a6ade89e8c0020a10a544403e4226ebcc2dc44aeebe9f12dc5b80439,2024-10-25T20:18:20.550000 CVE-2024-49209,0,0,7815188905707c2f76092b0250e46fa9658c3c02368a05bd7a2ebfc97747dcec,2024-10-25T20:17:36.353000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 -CVE-2024-49210,0,0,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000 -CVE-2024-49211,0,0,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000 +CVE-2024-49210,0,1,fede0e1b09388373fa08476821abad3fe0da120473a4d4b6dc058c6031c67944,2024-10-30T16:13:12.307000 +CVE-2024-49211,0,1,5a695ee7d767f52160012b95bd74c374d22d486a496c62fb284212334663087a,2024-10-30T16:08:23.040000 CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000 CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 @@ -263706,9 +263706,9 @@ CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 CVE-2024-50067,0,0,24c4c2a9f57cbbf60955a0b70b9105797845f089603805c65d417718be190cc3,2024-10-29T16:30:44.217000 -CVE-2024-50068,0,0,fa1ea3e6f599930bfb2d31adb8599332b75a045a05a427c5acbfef84f36f4dea,2024-10-29T14:34:04.427000 -CVE-2024-50069,0,0,e0d06dfcabcc31158b42dd1756b72698f3ce1bc24c6ee15265e842e9564c6424,2024-10-29T14:34:04.427000 -CVE-2024-50070,0,0,18255d00f69620f2a638568afe228ad3578ea04a84acf63eb1e68ce68ed74c13,2024-10-29T14:34:04.427000 +CVE-2024-50068,0,1,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000 +CVE-2024-50069,0,1,f0efb37fce406b5577ae6affb711463f72093df862fef1ce6ec787e41a622262,2024-10-30T16:58:19.983000 +CVE-2024-50070,0,1,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d64b,2024-10-30T16:59:39.013000 CVE-2024-50071,0,0,62707d07bb4d39afcfce746e848fc0ec2081f01347fce6c0d69c478aa69fbee9,2024-10-29T14:34:04.427000 CVE-2024-50072,0,0,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000 CVE-2024-50073,0,0,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000 @@ -263719,14 +263719,14 @@ CVE-2024-50077,0,0,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299 CVE-2024-50078,0,0,edfd843daaab21e8f3881bc9f52685650308d1e7e15f322d52dbb99d6ddc0e3a,2024-10-29T14:34:04.427000 CVE-2024-50079,0,0,86e00e39a4c6f4df698328fa6af74ef3f8403f4eb5813cad15aa3ecbc54c0116,2024-10-29T14:34:04.427000 CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000 -CVE-2024-50080,0,0,b30143addf096230090c103659efad2d89f35cfe5d0ae20511cc4ad130fbd073,2024-10-29T14:34:04.427000 -CVE-2024-50081,0,0,4a716ec09fe3b7525e6ca3fc44a39dfce5c1bec47408b7be31dc943bdcd98f01,2024-10-29T14:34:04.427000 -CVE-2024-50082,0,0,1aac9135fc440cb927bdd34817c9b125ae2db53fb07a95ac91cd63b20c0c1e06,2024-10-29T14:34:04.427000 -CVE-2024-50083,0,0,fd94a2eeda3538db1b988576d10356ed0f22eab342d054a435bf2bf1d428df1d,2024-10-29T14:34:04.427000 -CVE-2024-50084,0,1,5220042c35127404cd0f78170fda586bf2f27c4455dfe8faea9ee063c5a720d5,2024-10-30T14:56:07.497000 -CVE-2024-50085,0,1,a57d9cdadbbc5cf4e1ca2a641bfe5ff538d06a7e75b6cba1f85d47ffcf3a24b8,2024-10-30T14:49:42.953000 -CVE-2024-50086,0,1,4899fd1fcdb0e30e29828cc31e053f57e8ba7925a7a6cc27c5825af59bd564e5,2024-10-30T14:46:09.080000 -CVE-2024-50087,0,1,d932d9a6f4bd94c5995e2295fafce534f1c32d33268701370882a6d9c7fefc9a,2024-10-30T14:40:16.377000 +CVE-2024-50080,0,1,fb0a9233976006e31e13d528210f2a875fd57a1186630aa7b33ed2c9b62b05db,2024-10-30T15:54:17.967000 +CVE-2024-50081,0,1,ff287bf6aa891e3d3993ac2c1de15bdf3f0c65db0dd3e9d23543b30a892b930d,2024-10-30T15:45:39.047000 +CVE-2024-50082,0,1,a4dcbd09b14dbc1fca6632f76d6b2dd6f5882ab966fd9496307593f81c7c2e4e,2024-10-30T15:44:05.180000 +CVE-2024-50083,0,1,bb1d270756f6cf1c77db32b44ebc17c8b18ec1e069dec30590ec1ad0e71318f5,2024-10-30T15:07:02.577000 +CVE-2024-50084,0,0,5220042c35127404cd0f78170fda586bf2f27c4455dfe8faea9ee063c5a720d5,2024-10-30T14:56:07.497000 +CVE-2024-50085,0,0,a57d9cdadbbc5cf4e1ca2a641bfe5ff538d06a7e75b6cba1f85d47ffcf3a24b8,2024-10-30T14:49:42.953000 +CVE-2024-50086,0,0,4899fd1fcdb0e30e29828cc31e053f57e8ba7925a7a6cc27c5825af59bd564e5,2024-10-30T14:46:09.080000 +CVE-2024-50087,0,0,d932d9a6f4bd94c5995e2295fafce534f1c32d33268701370882a6d9c7fefc9a,2024-10-30T14:40:16.377000 CVE-2024-50088,0,0,828e69b5de052dd08d7caf34940c2f4feb712b819955838e907f99359e0b0c88,2024-10-29T14:34:04.427000 CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000 CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 @@ -263753,9 +263753,10 @@ CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc5 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 +CVE-2024-50344,1,1,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000 CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 -CVE-2024-50353,1,1,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000 +CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 @@ -263775,6 +263776,7 @@ CVE-2024-50414,0,0,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6 CVE-2024-50415,0,0,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000 CVE-2024-50416,0,0,d6fa8ee755917351e975e2572b208d1eff8656e05d108ea493511ed3f6bbfdc0,2024-10-29T16:02:10.660000 CVE-2024-50418,0,0,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000 +CVE-2024-50419,1,1,d5e1d88e0d77245c4f86e43f425967a0a1eba5d52f9c69ee2ce122923f3c0b76,2024-10-30T15:15:19.360000 CVE-2024-5042,0,0,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000 CVE-2024-50420,0,0,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000 CVE-2024-50421,0,0,98ac1ae0ba7f04515a38743b156e0486e07d82e9611d46b2b591ba50ee1df54e,2024-10-29T22:15:04.083000 @@ -263964,18 +263966,18 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed4992761,2024-10-17T18:32:52.030000 -CVE-2024-51257,1,1,eece05a402ce76d5ded55a21d6501dba04a748576609d38af348b0eacc64d65e,2024-10-30T14:15:08.267000 +CVE-2024-51257,0,1,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000 CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000 CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000 -CVE-2024-51296,1,1,9a7705564b8add589868e87f6c09742274a494117c21f47f3822fe4837d98ba4,2024-10-30T14:15:08.337000 -CVE-2024-51298,1,1,05fa9142c54df0707915a358799bf8eecf0f03e625b25def0304a9b6e67499e9,2024-10-30T14:15:08.430000 -CVE-2024-51299,1,1,0ece1b0e7724506cb420cc3f500f40feedfa43a88dc890c970e5a78188a1d1c7,2024-10-30T14:15:08.510000 +CVE-2024-51296,0,0,9a7705564b8add589868e87f6c09742274a494117c21f47f3822fe4837d98ba4,2024-10-30T14:15:08.337000 +CVE-2024-51298,0,1,514609b543458b7816356ece778427649461627c080a99a1f018491e8c0ee256,2024-10-30T16:35:29.790000 +CVE-2024-51299,0,0,0ece1b0e7724506cb420cc3f500f40feedfa43a88dc890c970e5a78188a1d1c7,2024-10-30T14:15:08.510000 CVE-2024-5130,0,0,08201be0ef3110b3d4a5f221adfbbc30fa234732006b6518b80f0c4870c61cea,2024-10-03T16:57:19.050000 -CVE-2024-51300,1,1,dff9a18c0cf0e0e8d43d69d02b2ea90ae97f80e734a42b72bdbadbdca5040ffb,2024-10-30T14:15:08.597000 -CVE-2024-51301,1,1,adcc4888ae1a374ea5d952bb92f163ccfdc7b4babdc622c47d76013d87115f75,2024-10-30T14:15:08.680000 -CVE-2024-51304,1,1,1bf4a400847d4516ab1a63391d32e92aced542fd9a53ea834711c8bab078e83f,2024-10-30T13:15:14.360000 +CVE-2024-51300,0,0,dff9a18c0cf0e0e8d43d69d02b2ea90ae97f80e734a42b72bdbadbdca5040ffb,2024-10-30T14:15:08.597000 +CVE-2024-51301,0,0,adcc4888ae1a374ea5d952bb92f163ccfdc7b4babdc622c47d76013d87115f75,2024-10-30T14:15:08.680000 +CVE-2024-51304,0,0,1bf4a400847d4516ab1a63391d32e92aced542fd9a53ea834711c8bab078e83f,2024-10-30T13:15:14.360000 CVE-2024-5131,0,0,e128e407b1f44dbf47d9ef9fd7ec5fd0648bd27c90b8180b437c118e29f83c77,2024-10-03T16:59:22.137000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 @@ -263983,7 +263985,7 @@ CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 -CVE-2024-51378,0,0,4f89f5750705f49e58348ee105ef2d84da67621b9e5eeaa07aa16746bdeb6aef,2024-10-30T00:15:03.213000 +CVE-2024-51378,0,1,f6b847436d6454318a22bddb787fe79bac14b8796ff39c09e4001e54682664f0,2024-10-30T15:35:23.600000 CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 @@ -264004,8 +264006,8 @@ CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2 CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000 CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 -CVE-2024-51567,0,1,e7505ae3358d66960630383be47fb6ddc4035689f49b6ef72a3dcdc49e767450,2024-10-30T14:35:14.933000 -CVE-2024-51568,0,1,ad9515ac8c61f410f67864bce41921abbf48528c73d6a5ad446656424928c9ef,2024-10-30T14:35:15.670000 +CVE-2024-51567,0,0,e7505ae3358d66960630383be47fb6ddc4035689f49b6ef72a3dcdc49e767450,2024-10-30T14:35:14.933000 +CVE-2024-51568,0,0,ad9515ac8c61f410f67864bce41921abbf48528c73d6a5ad446656424928c9ef,2024-10-30T14:35:15.670000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000 CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 @@ -264867,7 +264869,7 @@ CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ec CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000 CVE-2024-6128,0,0,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000 CVE-2024-6129,0,0,2ff762b7cd1a3a05b9f7a7bf543ed96dfafb16d6f8890a34166ecd6ab87a1ddd,2024-09-20T19:21:03.763000 -CVE-2024-6130,0,1,ae0cb2c7568b98f1703e3f4562fc397ce82bb0b8e8d698043f4393c1cf2bdb1e,2024-10-30T14:35:16.383000 +CVE-2024-6130,0,0,ae0cb2c7568b98f1703e3f4562fc397ce82bb0b8e8d698043f4393c1cf2bdb1e,2024-10-30T14:35:16.383000 CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000 CVE-2024-6133,0,0,0fc28a92d2235a170f666cf1f2e7f51d9c2f637a1193a1e8d73b336fc781cd45,2024-08-13T01:18:26.570000 CVE-2024-6134,0,0,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dda9,2024-08-16T17:35:11.413000 @@ -264962,7 +264964,7 @@ CVE-2024-6232,0,0,df72d1f3465f3e86534783b85aee8c51cc91639c676c4fe966017792ca61cc CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000 CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000 CVE-2024-6237,0,0,42d974b137e9f6fa213536980d088f395c1fe724ef5f0786bbfbf5436af83280,2024-08-29T18:15:14.947000 -CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ffd0,2024-06-25T18:50:42.040000 +CVE-2024-6238,0,1,ed9c2d1c6c6b7ce98df1d438dedd8db9b89c4dbb8c302ebc32aa84b1d702412d,2024-10-30T16:35:29.987000 CVE-2024-6239,0,0,331baa2e2a54956b72059cf6f370c174a3a7f88f365f410b1d7435c4cb7f3fbb,2024-09-18T09:15:05.803000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 @@ -265198,7 +265200,7 @@ CVE-2024-6505,0,0,2472b280b959c45a84076dc8298b1f0ea15132bfdd2f045bf3ab100aab446d CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 CVE-2024-6508,0,0,83afbbb0c300c926d75e43d120f11132485b3123bc7f3e14a9e5aa056ca1afd1,2024-10-30T11:15:15.220000 -CVE-2024-6509,0,1,27d19b5dc195679611ad719034a0909bff9feb2ed06b67e9190999b50f1ffdd8,2024-10-30T14:35:17.297000 +CVE-2024-6509,0,0,27d19b5dc195679611ad719034a0909bff9feb2ed06b67e9190999b50f1ffdd8,2024-10-30T14:35:17.297000 CVE-2024-6510,0,0,5e8ec1aef4696d364d1cf0507192e6236a7f19c30decdfeea7966d96cda0feda,2024-10-02T17:17:46.450000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 CVE-2024-6512,0,0,906938fa7a056c51f95f91dd79dd34ac36ca181a28b11365ac04b0f9d5c62236,2024-10-01T16:36:43.733000 @@ -265328,7 +265330,7 @@ CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000 CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 -CVE-2024-6657,0,0,f7bfb8c7f988c02efa056f01906af1e9b4c649c510ad07863c97de37a1ac514c,2024-10-15T12:58:51.050000 +CVE-2024-6657,0,1,05c0e312b6717337b62bbde27360a3cb75d1b987b144a353d64d592acfd9d308,2024-10-30T15:15:19.877000 CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000 CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000 @@ -265430,7 +265432,7 @@ CVE-2024-6776,0,0,3f1ebb6e9dceea367fad64f14a324a2ed3be61cc5710cd237dd667a1644d55 CVE-2024-6777,0,0,ca29db0995c8af0d3bc27804bd1f135839d6af869a949f56fbd75929b6968b0d,2024-08-01T14:00:41.267000 CVE-2024-6778,0,0,84b088ec3020aa8ff5e55451d795a5507972d54955d86abc44832d806c764933,2024-08-01T14:00:42.093000 CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b9702520701b,2024-08-01T14:00:42.927000 -CVE-2024-6780,0,1,1eae51b7c5e34681d53ddb7bafc670b27cd3eb74ad781e859c5982fedfd46394,2024-10-30T14:35:18.040000 +CVE-2024-6780,0,0,1eae51b7c5e34681d53ddb7bafc670b27cd3eb74ad781e859c5982fedfd46394,2024-10-30T14:35:18.040000 CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000 CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000 @@ -266221,7 +266223,7 @@ CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8f CVE-2024-7755,0,0,ef971a5ecbec92118875058fb4e190fc41fb035586060e0897fad69139da7909,2024-10-18T12:52:33.507000 CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888de,2024-09-14T11:47:14.677000 CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000 -CVE-2024-7763,0,1,18f4a84296d159e45e10b504f50d280ed71a4f30d1c38b23b2a54be7a715c7d0,2024-10-30T14:13:45.763000 +CVE-2024-7763,0,0,18f4a84296d159e45e10b504f50d280ed71a4f30d1c38b23b2a54be7a715c7d0,2024-10-30T14:13:45.763000 CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000 CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000 CVE-2024-7772,0,0,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000 @@ -266264,9 +266266,9 @@ CVE-2024-7818,0,0,a8a60252768c6bfc8071e3d171ec5ea550be85793d142018d723cdcbb9fdc2 CVE-2024-7820,0,0,c0453860ab9b7e75523d5974f7f62d77644e4cfdd4c296287f5b328e58fa219d,2024-09-27T18:08:48.757000 CVE-2024-7821,0,0,a6cbf4229b3ac9caad2c13358d94e9d25b2f946f0353199ff2ed2717953ff2a4,2024-09-04T10:15:03.553000 CVE-2024-7822,0,0,3e66fd0a5154ef0743417ad63783b1476c2b8be2ef3918498eb762e4c9c4ec06,2024-09-27T18:06:41.287000 -CVE-2024-7824,0,1,5c4727f1de0c06b350100778e73537179ed539a3a2e3fc39df63c1a53323a713,2024-10-30T13:50:18.053000 -CVE-2024-7825,0,1,b8f44d941e9c5335877f30a555e4e2e314b9c5bd3371221d44c83ba983c70a89,2024-10-30T13:49:58.980000 -CVE-2024-7826,0,1,4d092d0632f4bb0086c696f146d78e9e364086f736ead2a7d67ad0cc152f38bc,2024-10-30T13:48:53.220000 +CVE-2024-7824,0,0,5c4727f1de0c06b350100778e73537179ed539a3a2e3fc39df63c1a53323a713,2024-10-30T13:50:18.053000 +CVE-2024-7825,0,0,b8f44d941e9c5335877f30a555e4e2e314b9c5bd3371221d44c83ba983c70a89,2024-10-30T13:49:58.980000 +CVE-2024-7826,0,0,4d092d0632f4bb0086c696f146d78e9e364086f736ead2a7d67ad0cc152f38bc,2024-10-30T13:48:53.220000 CVE-2024-7827,0,0,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000 CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000 CVE-2024-7829,0,0,3634da4931045efa2221e4dd20ed9805c5f347e47423b6602d3467d4b2db62e9,2024-08-19T18:34:00.040000 @@ -266366,7 +266368,7 @@ CVE-2024-7937,0,0,58f817c63d0d354ded52ec3007f0bc413c02bdd9e5e4a4484a57dcc393e994 CVE-2024-7938,0,0,05885971f29247a07809090893658b29d0c486ec3695696a5efeaad9575e9baa,2024-09-04T14:53:13.887000 CVE-2024-7939,0,0,1694bf433403f87f2893bf75dc39017446333f520bf502dae403d9f8dca4c12a,2024-09-13T07:15:06.990000 CVE-2024-7940,0,0,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000 -CVE-2024-7941,0,0,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000 +CVE-2024-7941,0,1,51b8d26737f71adb5ae5530acd71328d0aa0426f28a41276bd1870203243d487,2024-10-30T15:29:26.673000 CVE-2024-7942,0,0,10ad4e44439e447affdd92c4cf521f51989afe951a6ccfba24c688ebb8095c63,2024-09-03T20:39:07.790000 CVE-2024-7943,0,0,94f72e6ad51a66c5e4d9bb6076fffd725bc241265ce47f7b427b083f1491ead0,2024-09-03T20:35:23.587000 CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000 @@ -266395,7 +266397,7 @@ CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829 CVE-2024-7973,0,0,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000 CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000 CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000 -CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000 +CVE-2024-7976,0,1,5088084110cef04ed95fff38a405451653ecf97406b1b78dfc70a5e2f0f0fa75,2024-10-30T16:35:30.723000 CVE-2024-7977,0,0,7f96e9ae91564fe788773f7fc620ef26ab3a10a3c58ea5396e14a68a3ee2a8b8,2024-08-22T20:35:28.140000 CVE-2024-7978,0,0,32f4e05559c2808de89ac0caea53fb83c96439d90c95d7208a9711199924c25c,2024-10-29T20:35:44.730000 CVE-2024-7979,0,0,7197dd548ee44d45e84f2f2c61d6a52a80bd0fd2ed16f305497f42e667362bae,2024-08-26T15:13:19.383000 @@ -266723,7 +266725,7 @@ CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae5 CVE-2024-8440,0,0,8dcfa58740a8b45172e18897b2d796d55a68f35b9034374864c3da0c6b77c079,2024-09-25T19:34:19.683000 CVE-2024-8441,0,0,0efac0f95475c5b753f85a6e07784bad0c26116c06bdd47c81e7d9e5f2143687,2024-09-12T21:53:43.387000 CVE-2024-8443,0,0,17e8697863032f9317d28c5eea98e22f13f55f27fe238e6efc059b214854b50f,2024-10-01T13:15:03.110000 -CVE-2024-8444,0,1,13c2ceb7a5411c83a2510e0feab52decafe9feb98c83381f93a3363dddeb0381,2024-10-30T14:35:18.373000 +CVE-2024-8444,0,0,13c2ceb7a5411c83a2510e0feab52decafe9feb98c83381f93a3363dddeb0381,2024-10-30T14:35:18.373000 CVE-2024-8445,0,0,a7f7ba812fc058686a7ce9617c544a5ef0aa1db28a47ee616a0e4041709a6c78,2024-10-01T06:15:02.650000 CVE-2024-8448,0,0,ae18a026c0067b7078869d24f3685b0421255cde0e4de17dbd7702d3e9741f7f,2024-10-04T15:07:22.160000 CVE-2024-8449,0,0,a8e7eabde222d61aae43a8862e23d72e8db76b0b518b635548832e684fcc6091,2024-10-04T15:08:22.733000 @@ -267025,7 +267027,7 @@ CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775b CVE-2024-8892,0,0,b5404a9c6df12d8f66b57eddda13f138d35d7b48bdd71ae1e8b3a805c49716e0,2024-10-07T17:10:26.673000 CVE-2024-8896,0,0,a0c605576448a2e11080223e5dd725b3d72b9db8a933f1d2fd38560e97af6299,2024-10-29T22:15:08.513000 CVE-2024-8897,0,0,73bf9affb964d11dd95d3adbb34f86a16b9ae0fd786e64b4bbd48b1e4387bb49,2024-09-25T19:49:02.493000 -CVE-2024-8900,0,0,7e1ef63767445d80c050e52e96753e1c9a46fb23d2b1e0137f2a2c5bdcba53e3,2024-10-01T16:15:10.293000 +CVE-2024-8900,0,1,d930082a3862c99b4e58aa6993c3377fe493c46938169528591b4cc486e72a25,2024-10-30T15:35:26.207000 CVE-2024-8901,0,0,c42abead2f721e44cbad55763c07a3fd24e0a842c194ee61580274699db985ca,2024-10-23T21:15:14.950000 CVE-2024-8902,0,0,e5dace8ff5577040ad4e028bf354543120981f772810138844b5cb4413778526,2024-10-15T12:57:46.880000 CVE-2024-8903,0,0,2ce54562e46551a15b98a64a6437d41656e447939ac76ef855f5d59decf764b8,2024-09-26T13:32:55.343000 @@ -267077,7 +267079,7 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000 -CVE-2024-8980,0,1,34622dfc36a70206b20752d1026a226663789c42eaaff2958041a445f566dbba,2024-10-30T14:46:14.127000 +CVE-2024-8980,0,0,34622dfc36a70206b20752d1026a226663789c42eaaff2958041a445f566dbba,2024-10-30T14:46:14.127000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 @@ -267263,7 +267265,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000 -CVE-2024-9287,0,0,01199c404d57b1e8eecbc65367d66af6a025095a110abc1f609ce03c8e993fb9,2024-10-23T15:12:34.673000 +CVE-2024-9287,0,1,0f86ab1cffe327e8f075f779612d5e540dfae80c2e1ed7753f609a96564d1250,2024-10-30T16:15:05.100000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000