Auto-Update: 2024-10-30T17:00:20.690193+00:00

This commit is contained in:
cad-safe-bot 2024-10-30 17:03:21 +00:00
parent 879c229124
commit eb2565b3f8
97 changed files with 4091 additions and 524 deletions

View File

@ -2,16 +2,55 @@
"id": "CVE-2019-25219",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T17:15:03.567",
"lastModified": "2024-10-29T17:15:03.567",
"lastModified": "2024-10-30T16:35:01.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Asio C++ Library before 1.13.0 lacks a fallback error code in the case of SSL_ERROR_SYSCALL with no associated error information from the SSL library being used."
},
{
"lang": "es",
"value": "La librer\u00eda Asio C++ anterior a 1.13.0 carece de un c\u00f3digo de error de respaldo en el caso de SSL_ERROR_SYSCALL sin informaci\u00f3n de error asociada de la librer\u00eda SSL que se est\u00e1 utilizando."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/chriskohlhoff/asio/commit/93337cba7b013150f5aa6194393e1d94be2853ec",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-23861",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T16:15:04.897",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:49:36.883",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build_53:*:*:*:*:*:*",
"matchCriteriaId": "4BF6B709-569F-425B-8909-C52FB5ECC9EE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://ysoft.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-29946",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-11T21:15:10.480",
"lastModified": "2024-07-12T12:49:11.340",
"lastModified": "2024-10-30T15:35:02.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "NATS.io NATS Server anterior a 2.8.2 y Streaming Server anterior a 0.24.6 podr\u00edan permitir a un atacante remoto omitir las restricciones de seguridad, causadas por no aplicar permisos de usuario negativos en un escenario. Al utilizar una suscripci\u00f3n a cola en el comod\u00edn, un atacante podr\u00eda aprovechar esta vulnerabilidad para permitir sujetos denegados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://github.com/nats-io/advisories/blob/main/CVE/CVE-2022-29946.txt",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36228",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T21:15:09.850",
"lastModified": "2023-10-12T18:37:26.680",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:02.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38176",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-06T21:15:08.967",
"lastModified": "2022-09-09T19:26:21.257",
"lastModified": "2024-10-30T16:17:27.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -56,16 +56,7 @@
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ysoft:safeq:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.72",
"matchCriteriaId": "00BCA96F-949D-46C7-A349-F7A880E94D86"
}
]
"negate": false
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48634",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T13:15:06.617",
"lastModified": "2024-04-29T12:42:03.667",
"lastModified": "2024-10-30T16:35:02.927",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/gma500: Correcci\u00f3n de ERROR: funci\u00f3n inactiva llamada desde errores de contexto no v\u00e1lidos gma_crtc_page_flip() estaba manteniendo el spinlock event_lock mientras llamaba a crtc_funcs->mode_set_base() que toma ww_mutex. La \u00fanica raz\u00f3n para mantener event_lock es borrar los errores de gma_crtc->page_flip_event en mode_set_base(). En su lugar, desbloqu\u00e9elo despu\u00e9s de configurar gma_crtc->page_flip_event y, en caso de errores, vuelva a tomar el bloqueo y borre gma_crtc->page_flip_event si todav\u00eda est\u00e1 configurado. Esto corrige la siguiente ADVERTENCIA/stacktrace: [512.122953] ERROR: funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en kernel/locking/mutex.c:870 [512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, nombre: gnome-shell [512.123031] preempt_count: 1, esperado: 0 [512.123048] Profundidad del nido de RCU: 0, esperado: 0 [512.123066] INFORMACI\u00d3N: lockdep est\u00e1 desactivado. [ 512.123080] sello de evento irq: 0 [ 512.123094] hardirqs habilitado por \u00faltima vez en (0): [<0000000000000000>] 0x0 [ 512.123134] hardirqs deshabilitado por \u00faltima vez en (0): [] copy_process+0x9fc/0x1de0 [ 5 12.123176] softirqs habilitado por \u00faltima vez en (0): [] copy_process+0x9fc/0x1de0 [ 512.123207] softirqs deshabilitado por \u00faltima vez en (0): [<0000000000000000>] 0x0 [ 512.123233] Preferencia deshabilitada en: [ 512.123241] 0000000000>] 0x0 [ 512.123275] CPU: 3 PID: 1253 Comunicaciones: gnome-shell Contaminado: GW 5.19.0+ #1 [ 512.123304] Nombre de hardware: Packard Bell dot s/SJE01_CT, BIOS V1.10 23/07/2013 [ 512.123323] Seguimiento de llamadas : [ 512.123346] [ 512.123370] dump_stack_lvl+0x5b/0x77 [ 512.123412] __might_resched.cold+0xff/0x13a [ 512.123458] ww_mutex_lock+0x1e/0xa0 [ 512.123495 ] psb_gem_pin+0x2c/0x150 [gma500_gfx] [ 512.123601] gma_pipe_set_base+0x76 /0x240 [gma500_gfx] [ 512.123708] gma_crtc_page_flip+0x95/0x130 [gma500_gfx] [ 512.123808] drm_mode_page_flip_ioctl+0x57d/0x5d0 [ 512.123897] ? drm_mode_cursor2_ioctl+0x10/0x10 [ 512.123936] drm_ioctl_kernel+0xa1/0x150 [ 512.123984] drm_ioctl+0x21f/0x420 [ 512.124025] ? drm_mode_cursor2_ioctl+0x10/0x10 [512.124070]? rcu_read_lock_bh_held+0xb/0x60 [512.124104]? lock_release+0x1ef/0x2d0 [ 512.124161] __x64_sys_ioctl+0x8d/0xd0 [ 512.124203] do_syscall_64+0x58/0x80 [ 512.124239] ? do_syscall_64+0x67/0x80 [512.124267]? trace_hardirqs_on_prepare+0x55/0xe0 [512.124300]? do_syscall_64+0x67/0x80 [512.124340]? rcu_read_lock_sched_held+0x10/0x80 [ 512.124377] Entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 512.124411] RIP: 0033:0x7fcc4a70740f [ 512.124442] C\u00f3digo: 00 48 89 44 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 24470]RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f [ 512.124524] RDX: 7ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009 [ 512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034 12.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0 [ 512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0 [ 512.124647 ] "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/63e37a79f7bd939314997e29c2f5a9f0ef184281",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48638",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T13:15:06.807",
"lastModified": "2024-04-29T12:42:03.667",
"lastModified": "2024-10-30T16:35:03.473",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cgroup: cgroup_get_from_id() debe verificar que el kn buscado sea un directorio. cgroup tiene que ser un directorio kernfs; de lo contrario, se produce un p\u00e1nico en el kernel, especialmente la identificaci\u00f3n de cgroup se proporciona desde el espacio de usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/1e9571887f97b17cf3ffe9aa4da89090ea60988b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48654",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T13:15:07.580",
"lastModified": "2024-05-23T19:01:47.760",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:04.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48689",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-03T15:15:07.833",
"lastModified": "2024-05-23T20:33:57.590",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:04.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48691",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-03T15:15:07.887",
"lastModified": "2024-05-23T20:34:05.590",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:05.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48697",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-03T16:15:08.363",
"lastModified": "2024-05-06T12:44:56.377",
"lastModified": "2024-10-30T16:35:05.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: corrige un use-after-free. Solucione la siguiente queja de use-after-free activada por blktests nvme/004: ERROR: KASAN: acceso a la memoria del usuario en blk_mq_complete_request_remote+0xac /0x350 Lectura de tama\u00f1o 4 en la direcci\u00f3n 0000607bd1835943 por tarea kworker/13:1/460 Cola de trabajo: nvmet-wq nvme_loop_execute_work [nvme_loop] Seguimiento de llamadas: show_stack+0x52/0x58 dump_stack_lvl+0x49/0x5e /0x1e2 informe_kasan+0xb9 /0xf0 __asan_load4+0x6b/0x80 blk_mq_complete_request_remote+0xac/0x350 nvme_loop_queue_response+0x1df/0x275 [nvme_loop] __nvmet_req_complete+0x132/0x4f0 [nvmet_req_complete+0x15/0x 40 [nvmet] nvmet_execute_io_connect+0x18a/0x1f0 [nvmet] nvme_loop_execute_work+0x20/0x30 [ nvme_loop] proceso_one_work+0x56e/0xa70 trabajador_thread+0x2d1/0x640 kthread+0x183/0x1c0 ret_from_fork+0x1f/0x30"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/17f121ca3ec6be0fb32d77c7f65362934a38cc8e",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48698",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-03T16:15:08.410",
"lastModified": "2024-05-06T12:44:56.377",
"lastModified": "2024-10-30T16:35:06.023",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: soluciona la p\u00e9rdida de memoria al usar debugfs_lookup() Al llamar a debugfs_lookup(), el resultado debe tener llamado dput(); de lo contrario, la memoria se perder\u00e1 con el tiempo. Solucione este problema llamando correctamente a dput()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/3a6279d243cb035eaaff1450980b40cf19748f05",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48711",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T11:15:54.793",
"lastModified": "2024-06-20T12:43:25.663",
"lastModified": "2024-10-30T16:35:06.243",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tipc: mejorar las validaciones de tama\u00f1o para los registros de dominio recibidos. La funci\u00f3n tipc_mon_rcv() permite que un nodo reciba y procese estructuras domain_record de nodos pares para rastrear sus vistas de la topolog\u00eda de la red. Este parche verifica que la cantidad de miembros en un registro de dominio recibido no exceda el l\u00edmite definido por MAX_MON_DOMAIN, algo que de otro modo podr\u00eda provocar un desbordamiento de pila. tipc_mon_rcv() se llama desde la funci\u00f3n tipc_link_proto_rcv(), donde leemos un campo de longitud de datos de mensaje de 32 bits en un uint16. Para evitar cualquier riesgo de desbordamiento de bits, agregamos una verificaci\u00f3n de cordura adicional en esa funci\u00f3n. No podemos ver que eso suceda con el c\u00f3digo actual, pero los futuros dise\u00f1adores, al desconocer este riesgo, pueden introducirlo permitiendo la entrega de b\u00faferes sk muy grandes (> 64k) desde la capa portadora. Este problema potencial fue identificado por Eric Dumazet. Esto corrige CVE-2022-0435"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/175db196e45d6f0e6047eccd09c8ba55465eb131",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48743",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:12.610",
"lastModified": "2024-08-20T13:54:00.933",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:06.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48753",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:13.480",
"lastModified": "2024-09-18T16:03:25.617",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:06.700",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48761",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:14.203",
"lastModified": "2024-06-20T12:43:25.663",
"lastModified": "2024-10-30T16:35:06.947",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: xhci-plat: corrige el bloqueo al suspender si se habilita la activaci\u00f3n remota. Fall\u00f3 en la plataforma i.mx8qm al suspender si se habilita la activaci\u00f3n remota. Error interno: aborto externo sincr\u00f3nico: 96000210 [#1] PREEMPT M\u00f3dulos SMP vinculados en: CPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12 Nombre del hardware: Freescale i.MX8QM MEK (DT) Cola de trabajo: events_unbound async_run_entry_fn pstate: 600000c5 (nZCv daIF - PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: xhci_disable_hub_port_wake.isra.62+0x60/0xf8 lr: xhci_disable_hub_port_wake.isra.62+0x34/0xf8 sp: ffff80001394bbf0 x29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578 x26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000 x23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001 x20: 0000000000000000 x19: ffff800014e90490 x18: 000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0 x8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453 x5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff000811 93a29c x2: 0000000000000001 x1: 0000000000000000 x0: ffff000814591620 Rastreo de llamadas: xhci_disable_hub_port_wake.isra.62+0x60/0xf8 xhci_suspend+0x58/0x510 0x50/ 0x78 platform_pm_suspend+0x2c/0x78 dpm_run_callback.isra.25+0x50/0xe8 __device_suspend+0x108/0x3c0 El flujo b\u00e1sico: 1. llamada de suspensi\u00f3n en tiempo de ejecuci\u00f3n xhci_suspend, los dispositivos principales xhci controlan el reloj. 2. echo mem >/sys/power/state, system _device_suspend llama a xhci_suspend 3. xhci_suspend llama a xhci_disable_hub_port_wake, que accede al registro, pero el reloj ya est\u00e1 cerrado por la suspensi\u00f3n del tiempo de ejecuci\u00f3n. Este problema fue ocultado por el controlador de dominio de energ\u00eda, que solicita la reanudaci\u00f3n del tiempo de ejecuci\u00f3n antes. Pero el siguiente compromiso lo elimina y hace que este problema suceda. commit c1df456d0f06e (\"PM: dominios: no reanudar el tiempo de ejecuci\u00f3n de los dispositivos en genpd_prepare()\") Este parche llama al tiempo de ejecuci\u00f3n para reanudar antes de la suspensi\u00f3n para asegurarse de que el reloj est\u00e9 encendido antes del registro de acceso. Testeb-by: Abel Vesa "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48764",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:14.450",
"lastModified": "2024-06-20T12:43:25.663",
"lastModified": "2024-10-30T16:35:07.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Libere la matriz kvm_cpuid_entry2 en KVM_RUN KVM_SET_CPUID{,2} posterior a KVM_RUN KVM_SET_CPUID{,2} Libere la matriz \"struct kvm_cpuid_entry2\" en KVM_RUN KVM_SET_CPUID{,2} posterior a \u00e9xito para corregir una p\u00e9rdida de memoria , las personas que llaman a kvm_set_cpuid() liberan la matriz solo en caso de falla. ERROR: p\u00e9rdida de memoria, objeto sin referencia 0xffff88810963a800 (size 2048): comm \"syz-executor025\", pid 3610, jiffies 4294944928 (age 8.080s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 00 00 ................ 47 65 6e 75 6e 74 65 6c 69 6e 65 49 00 00 00 00 GenuntelineI.... backtrace: [] kmalloc_node include/linux/slab.h:604 [inline] [] kvmalloc_node+0x3e/0x100 mm/util.c:580 [] kvmalloc include/linux/slab.h:732 [inline] [] vmemdup_user+0x22/0x100 mm/util.c:199 [] kvm_vcpu_ioctl_set_cpuid2+0x8f/0xf0 arch/x86/kvm/cpuid.c:423 [] kvm_arch_vcpu_ioctl+0xb99/0x1e60 arch/x86/kvm/x86.c:5251 [] kvm_vcpu_ioctl+0x4ad/0x950 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4066 [] vfs_ioctl fs/ioctl.c:51 [inline] [] __do_sys_ioctl fs/ioctl.c:874 [inline] [] __se_sys_ioctl fs/ioctl.c:860 [inline] [] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:860 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/811f95ff95270e6048197821434d9301e3d7f07c",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48767",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-20T12:15:14.703",
"lastModified": "2024-06-20T12:43:25.663",
"lastModified": "2024-10-30T16:35:07.380",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ceph: coloque correctamente la referencia ceph_string despu\u00e9s del intento de creaci\u00f3n as\u00edncrona. La referencia adquirida por try_prep_async_create se ha filtrado actualmente. Aseg\u00farate de que lo pongamos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/36d433ae3242aa714176378850e6d1a5a3e78f18",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4971",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T07:15:12.040",
"lastModified": "2024-10-16T16:38:14.557",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:37:33.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heateor:sassy_social_share:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.3.3",
"matchCriteriaId": "510E5801-7AF4-4A61-9B4E-F4EDEA16C82E"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/4631519b-2060-43a0-b69b-b3d7ed94c705/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/85277960-2bba-4cd7-9f4c-e04f6743b96c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4972",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T07:15:12.257",
"lastModified": "2024-10-16T16:38:14.557",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:34:55.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,7 +41,7 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -49,16 +49,50 @@
"value": "CWE-862"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.7.51",
"matchCriteriaId": "E34EAF21-939D-46CD-9DCC-5809E0175AEC"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2822758/download-monitor/trunk/src/Admin/Reports/class-dlm-reports.php?contextall=1&old=2821522&old_path=%2Fdownload-monitor%2Ftrunk%2Fsrc%2FAdmin%2FReports%2Fclass-dlm-reports.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9000c52-fdd7-43e2-ae6a-9f127c4a9fcd?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4973",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T07:15:12.497",
"lastModified": "2024-10-16T16:38:14.557",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:58:30.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,22 +71,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.0.2",
"matchCriteriaId": "A54B0FB0-4E00-4D19-A948-394A668C9312"
}
]
}
]
}
],
"references": [
{
"url": "https://core.trac.wordpress.org/changeset/53961",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38409",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T22:15:09.540",
"lastModified": "2023-07-27T03:49:09.943",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:04.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10290",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T15:15:30.110",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:06:00.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +150,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*",
"matchCriteriaId": "654D0493-9784-4B2B-BC05-69B4BB6F86F4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/LvZCh/zzcms2023/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.281559",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.281559",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.427069",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10296",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T17:15:13.690",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:13:18.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA0DF27-1627-47C5-B007-78DC8E84DCCB"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.281563",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281563",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.427400",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10353",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-25T00:15:02.800",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:21:35.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,26 +150,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:online_exam_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A488EE-05AF-47AC-8F21-317C507E55C0"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1hEXfbOOkWdYzaSI6ORQvPGBtn09R12Ui/view?usp=drive_link",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?ctiid.281700",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281700",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.427957",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10354",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-25T01:15:13.213",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:32:48.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/K1nako0/tmp_vuln3/blob/main/README.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.281701",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281701",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.430074",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10368",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-25T02:15:02.327",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:46:30.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/17",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281760",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281760",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.430114",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10369",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-25T02:15:02.613",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:50:32.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -109,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +150,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/18",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281761",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281761",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.430115",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10370",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-25T02:15:02.910",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:38:40.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/19",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281762",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281762",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.430607",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-22455",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-02-14T07:15:09.803",
"lastModified": "2024-10-16T16:10:10.413",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:15:18.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nDell E-Lab Navigator, [3.1.9, 3.2.0], contains an Insecure Direct Object Reference Vulnerability in Feedback submission. An attacker could potentially exploit this vulnerability, to manipulate the email's appearance, potentially deceiving recipients and causing reputational and security risks.\n\n"
"value": "Dell Mobility - E-Lab Navigator, version(s) 3.1.9, 3.2.0, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Launch of phishing attacks."
},
{
"lang": "es",
@ -61,7 +61,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
@ -71,12 +71,12 @@
]
},
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-451"
"value": "CWE-639"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25087",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T16:15:04.157",
"lastModified": "2024-07-05T17:04:43.917",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:07.993",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25837",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-16T18:15:08.907",
"lastModified": "2024-08-19T13:00:23.117",
"lastModified": "2024-10-30T15:35:08.810",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en el complemento CMS Bloghub v1.3.8 y anteriores de octubre permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado en la secci\u00f3n Comentarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/RatMD/bloghub-plugin/blob/master/CHANGELOG.md#version-139---stable",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25876",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-22T14:15:47.033",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-10-30T16:35:12.507",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de cross site scripting (XSS) en el m\u00f3dulo de encabezado de Enhavo CMS v0.13.1 permite a los atacantes ejecutar scrips web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto T\u00edtulo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-titel-v0.13.1.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26271",
"sourceIdentifier": "security@liferay.com",
"published": "2024-10-22T15:15:05.523",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:04:11.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -51,10 +81,112 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
"matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
"matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
"matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
"matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
"matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
"matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
"matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
"matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
"matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
"matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
"matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
"matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.1:*:*:*:*:*:*",
"matchCriteriaId": "1A13C2E9-9260-466E-9D98-0021CB2F41F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.5:*:*:*:*:*:*",
"matchCriteriaId": "08FB7951-AEED-4B44-8504-ACA10D5B99B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.0:*:*:*:*:*:*",
"matchCriteriaId": "B6C54C71-6885-475B-939B-CEC309579BBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.2:*:*:*:*:*:*",
"matchCriteriaId": "4E4B4759-C7D4-4A33-B1B8-29869F60FEE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.3.75",
"versionEndExcluding": "7.4.3.112",
"matchCriteriaId": "FEDE37FB-83BC-41D6-94D7-DE087BC4FE14"
}
]
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26271",
"source": "security@liferay.com"
"source": "security@liferay.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26272",
"sourceIdentifier": "security@liferay.com",
"published": "2024-10-22T15:15:05.740",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:03:51.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -51,10 +81,129 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
"matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
"matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
"matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
"matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
"matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
"matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
"matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
"matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
"matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
"matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
"matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
"matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
"matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.1:*:*:*:*:*:*",
"matchCriteriaId": "1A13C2E9-9260-466E-9D98-0021CB2F41F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.5:*:*:*:*:*:*",
"matchCriteriaId": "08FB7951-AEED-4B44-8504-ACA10D5B99B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.0:*:*:*:*:*:*",
"matchCriteriaId": "B6C54C71-6885-475B-939B-CEC309579BBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.2:*:*:*:*:*:*",
"matchCriteriaId": "4E4B4759-C7D4-4A33-B1B8-29869F60FEE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3.2",
"versionEndIncluding": "7.3.7",
"matchCriteriaId": "4F2C2272-3E19-4836-BCA5-660208D5985D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.3.108",
"matchCriteriaId": "D23EB185-798C-4F89-8AAA-6D229BCD8BA4"
}
]
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26272",
"source": "security@liferay.com"
"source": "security@liferay.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26273",
"sourceIdentifier": "security@liferay.com",
"published": "2024-10-22T15:15:05.937",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:03:35.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "security@liferay.com",
"type": "Secondary",
@ -51,10 +81,82 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*",
"matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
"matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
"matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
"matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
"matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
"matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.1:*:*:*:*:*:*",
"matchCriteriaId": "1A13C2E9-9260-466E-9D98-0021CB2F41F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q3.5:*:*:*:*:*:*",
"matchCriteriaId": "08FB7951-AEED-4B44-8504-ACA10D5B99B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.0:*:*:*:*:*:*",
"matchCriteriaId": "B6C54C71-6885-475B-939B-CEC309579BBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023:q4.2:*:*:*:*:*:*",
"matchCriteriaId": "4E4B4759-C7D4-4A33-B1B8-29869F60FEE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.3.104",
"matchCriteriaId": "2BF93004-E003-45A8-A84A-86710D138F3F"
}
]
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26273",
"source": "security@liferay.com"
"source": "security@liferay.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2606",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.740",
"lastModified": "2024-03-19T13:26:46.000",
"lastModified": "2024-10-30T15:35:09.973",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Pasar datos no v\u00e1lidos podr\u00eda haber dado lugar a la creaci\u00f3n de valores wasm no v\u00e1lidos, como n\u00fameros enteros arbitrarios que se convierten en valores de puntero. Esta vulnerabilidad afecta a Firefox < 124. "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879237",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2610",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.957",
"lastModified": "2024-03-25T17:15:51.833",
"lastModified": "2024-10-30T16:35:13.863",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Al utilizar una inyecci\u00f3n de marcado, un atacante podr\u00eda haber robado valores nonce. Esto podr\u00eda haberse utilizado para eludir las estrictas pol\u00edticas de seguridad de contenido. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2630",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-20T17:15:07.660",
"lastModified": "2024-04-01T15:23:32.893",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:14.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35495",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-30T18:15:05.713",
"lastModified": "2024-10-04T13:51:25.567",
"lastModified": "2024-10-30T15:35:10.887",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente Telemetr\u00eda en TP-Link Kasa KP125M V1.0.0 y Tapo P125M 1.0.0 Build 220930 Rel.143947 permite a los atacantes observar el estado del dispositivo mediante la observaci\u00f3n del tr\u00e1fico de la red."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://github.com/Chapoly1305/tp-link-cve/blob/main/CVE-2024-35495.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3634",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-15T06:15:13.447",
"lastModified": "2024-05-15T16:40:19.330",
"lastModified": "2024-10-30T16:35:16.890",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -16,6 +16,18 @@
}
],
"metrics": {},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/76e000e0-314f-4e39-8871-68bf8cc95b22/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3752",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-06T06:15:07.080",
"lastModified": "2024-05-06T12:44:56.377",
"lastModified": "2024-10-30T16:35:17.613",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El complemento Crelly Slider de WordPress hasta la versi\u00f3n 1.4.5 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3801",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T13:15:03.157",
"lastModified": "2024-07-03T14:36:52.797",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:18.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3980",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.210",
"lastModified": "2024-10-29T14:15:06.670",
"vulnStatus": "Modified",
"lastModified": "2024-10-30T15:33:12.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-88"
"value": "CWE-22"
}
]
},
@ -88,11 +88,42 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_1:*:*:*:*:*:*",
"matchCriteriaId": "BC4CE02B-F8CF-4A9E-B9FC-AEFE59F4BCE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf1:*:*:*:*:*:*",
"matchCriteriaId": "0B90ED6E-68E4-4C14-B275-F44BAC1B9C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf2:*:*:*:*:*:*",
"matchCriteriaId": "196E08EA-807C-4B7B-981A-96D106AC328B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf3:*:*:*:*:*:*",
"matchCriteriaId": "680FAE83-9D7A-4AD9-AFBE-480FD105ADC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf4:*:*:*:*:*:*",
"matchCriteriaId": "014C8428-8F88-4C3D-B9B1-87DE26867471"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf5:*:*:*:*:*:*",
"matchCriteriaId": "06AFA271-0785-4526-B7DA-FA00672CC5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
"matchCriteriaId": "AEAAFA90-ACFF-47E2-A23D-728912D74B99"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3982",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.557",
"lastModified": "2024-08-28T16:30:50.080",
"lastModified": "2024-10-30T15:32:23.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -91,8 +91,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
"matchCriteriaId": "AEAAFA90-ACFF-47E2-A23D-728912D74B99"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40743",
"sourceIdentifier": "security@joomla.org",
"published": "2024-08-20T16:15:11.457",
"lastModified": "2024-08-21T12:30:33.697",
"lastModified": "2024-10-30T15:35:12.210",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Los m\u00e9todos stripImages y stripIframes no procesaron correctamente las entradas, lo que gener\u00f3 vectores XSS."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@joomla.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40767",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T05:15:12.907",
"lastModified": "2024-07-30T19:19:40.767",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:12.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40789",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.270",
"lastModified": "2024-08-23T15:38:01.380",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:13.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40792",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:04.670",
"lastModified": "2024-10-29T17:28:34.383",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:18.823",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40834",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:14.413",
"lastModified": "2024-08-23T14:40:52.523",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:14.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40851",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:04.740",
"lastModified": "2024-10-29T17:42:35.217",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:14.883",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
]
},

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-44080",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T22:15:03.633",
"lastModified": "2024-10-29T22:15:03.633",
"lastModified": "2024-10-30T15:35:15.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Jitsi Meet before 2.0.9779, the functionality to share an image using giphy was implemented in an insecure way, resulting in clients loading GIFs from any arbitrary URL if a message from another participant contains a URL encoded in the expected format."
},
{
"lang": "es",
"value": " En Jitsi Meet anterior a 2.0.9779, la funcionalidad para compartir una imagen usando giphy se implement\u00f3 de manera insegura, lo que provocaba que los clientes cargaran GIF desde cualquier URL arbitraria si un mensaje de otro participante conten\u00eda una URL codificada en el formato esperado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jitsi/jitsi-meet/compare/jitsi-meet_9672...jitsi-meet_9673",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44159",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:05.603",
"lastModified": "2024-10-29T17:33:37.147",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:19.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44174",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:05.667",
"lastModified": "2024-10-29T17:33:16.540",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:20.507",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-754"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44175",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:05.737",
"lastModified": "2024-10-29T14:34:50.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:35:21.327",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sequoia 15 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44196",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:05.860",
"lastModified": "2024-10-29T14:34:50.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:35:22.640",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121568",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44255",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:07.003",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:35:24.113",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Se solucion\u00f3 un problema de manejo de rutas con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en visionOS 2.1, iOS 18.1 y iPadOS 18.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y tvOS 18.1. Una aplicaci\u00f3n maliciosa podr\u00eda ejecutar accesos directos arbitrarios sin el consentimiento del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121563",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44267",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:07.513",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:35:26.040",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/121568",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44270",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:07.667",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:35:26.390",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un proceso aislado puede eludir las restricciones de la zona protegida."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121568",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44279",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:08.110",
"lastModified": "2024-10-29T14:34:04.427",
"lastModified": "2024-10-30T15:35:16.063",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121568",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44280",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:08.180",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:35:17.173",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Se solucion\u00f3 un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/121568",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44289",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:08.680",
"lastModified": "2024-10-29T20:25:47.537",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:28.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44296",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:08.830",
"lastModified": "2024-10-29T23:15:03.770",
"lastModified": "2024-10-30T15:35:17.433",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de contenido web manipulado con fines malintencionados puede impedir que se aplique la Pol\u00edtica de seguridad de contenido."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/121563",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44297",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:08.910",
"lastModified": "2024-10-29T20:23:37.967",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T15:35:17.777",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47901",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-23T15:15:30.930",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:39:47.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,8 +62,28 @@
],
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
@ -95,10 +115,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.12",
"matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.12",
"matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47902",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-23T15:15:31.163",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:48:39.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,8 +62,28 @@
],
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
@ -95,10 +115,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.12",
"matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.12",
"matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47903",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-23T15:15:31.397",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:54:34.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,8 +62,28 @@
],
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
@ -85,8 +105,18 @@
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -95,10 +125,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.12",
"matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.12",
"matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47904",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-23T15:15:31.687",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:39:06.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,8 +85,18 @@
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -95,10 +105,71 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.2.12",
"matchCriteriaId": "12B63A68-D767-4C6A-814F-3497C5CA7695"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB6C0BE-87DC-485D-8E27-B0AE1846B300"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2.12",
"matchCriteriaId": "E371E8BF-4604-4B60-9172-6C544E84D09C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA2F22E-95E2-479C-9962-3F9CD9259720"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-333468.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48063",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T21:15:04.080",
"lastModified": "2024-10-29T21:15:04.080",
"lastModified": "2024-10-30T15:35:17.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE."
},
{
"lang": "es",
"value": " En PyTorch &lt;=2.4.1, RemoteModule tiene RCE de deserializaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/hexian2001/c046c066895a963ecc0a2cf9e1180065",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48138",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T22:15:03.810",
"lastModified": "2024-10-29T22:15:03.810",
"lastModified": "2024-10-30T15:35:18.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template."
},
{
"lang": "es",
"value": " Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en el componente /PluXml/core/admin/parametres_edittpl.php de PluXml v5.8.16 y anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la inyecci\u00f3n de un payload manipulado en una plantilla."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/pluxml/PluXml/issues/829",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48206",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T21:15:04.190",
"lastModified": "2024-10-29T21:15:04.190",
"lastModified": "2024-10-30T15:35:19.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Deserialization of Untrusted Data vulnerability in chainer v7.8.1.post1 leads to execution of arbitrary code."
},
{
"lang": "es",
"value": " Una vulnerabilidad de deserializaci\u00f3n de datos no confiables en chainer v7.8.1.post1 conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/hexian2001/51c6257351098e5b086a12ad247cc6ca",

View File

@ -2,16 +2,32 @@
"id": "CVE-2024-48572",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T22:15:03.913",
"lastModified": "2024-10-29T22:15:03.913",
"lastModified": "2024-10-30T15:35:20.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A User enumeration vulnerability in AquilaCMS 1.409.20 and prior allows unauthenticated attackers to obtain email addresses via the \"Add a user\" feature. The vulnerability occurs due to insufficiently validated user input being processed as a regular expression, which is then matched against email addresses to find duplicate entries."
},
{
"lang": "es",
"value": " Una vulnerabilidad de enumeraci\u00f3n de usuarios en AquilaCMS 1.409.20 y versiones anteriores permite a atacantes no autenticados obtener direcciones de correo electr\u00f3nico a trav\u00e9s de la funci\u00f3n \"Agregar un usuario\". La vulnerabilidad se produce debido a que la entrada de usuario no validada de forma suficiente se procesa como una expresi\u00f3n regular, que luego se compara con las direcciones de correo electr\u00f3nico para encontrar entradas duplicadas."
}
],
"metrics": {},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-48572",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48573",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T22:15:04.003",
"lastModified": "2024-10-29T22:15:04.003",
"lastModified": "2024-10-30T15:35:21.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NoSQL injection vulnerability in AquilaCMS 1.409.20 and prior allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n NoSQL en AquilaCMS 1.409.20 y versiones anteriores permite a atacantes no autenticados restablecer las contrase\u00f1as de cuentas de usuario y administrador a trav\u00e9s de la funci\u00f3n \"Restablecer contrase\u00f1a\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-48573",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48955",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T18:15:05.690",
"lastModified": "2024-10-29T18:15:05.690",
"lastModified": "2024-10-30T15:35:22.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In NetAdmin 4.0.30319, an attacker can steal a valid session cookie and inject it into another device, granting unauthorized access. This type of attack is commonly referred to as session hijacking."
},
{
"lang": "es",
"value": " En NetAdmin 4.0.30319, un atacante puede robar una cookie de sesi\u00f3n v\u00e1lida e inyectarla en otro dispositivo, lo que le otorga acceso no autorizado. Este tipo de ataque se conoce com\u00fanmente como secuestro de sesi\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4872",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:05.890",
"lastModified": "2024-10-29T14:15:07.950",
"vulnStatus": "Modified",
"lastModified": "2024-10-30T15:31:41.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,19 +22,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-89"
"value": "NVD-CWE-Other"
}
]
},
@ -88,11 +88,37 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf1:*:*:*:*:*:*",
"matchCriteriaId": "0B90ED6E-68E4-4C14-B275-F44BAC1B9C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf2:*:*:*:*:*:*",
"matchCriteriaId": "196E08EA-807C-4B7B-981A-96D106AC328B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf3:*:*:*:*:*:*",
"matchCriteriaId": "680FAE83-9D7A-4AD9-AFBE-480FD105ADC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf4:*:*:*:*:*:*",
"matchCriteriaId": "014C8428-8F88-4C3D-B9B1-87DE26867471"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf5:*:*:*:*:*:*",
"matchCriteriaId": "06AFA271-0785-4526-B7DA-FA00672CC5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
"matchCriteriaId": "AEAAFA90-ACFF-47E2-A23D-728912D74B99"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49210",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:05.970",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:13:12.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -39,14 +59,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0.0",
"versionEndExcluding": "2024.09",
"matchCriteriaId": "34F58440-3584-4424-81BD-66B2317601BB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49211",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T17:15:06.193",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:08:23.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -39,14 +59,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0.0",
"versionEndExcluding": "2024.09",
"matchCriteriaId": "34F58440-3584-4424-81BD-66B2317601BB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50068",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:04.107",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:57:35.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/tests/sysfs-kunit.h: corrige p\u00e9rdida de memoria en damon_sysfs_test_add_targets(). La regi\u00f3n sysfs_target-&gt;regions asignada en damon_sysfs_regions_alloc() no se libera en damon_sysfs_test_add_targets(), lo que causa la siguiente p\u00e9rdida de memoria; lib\u00e9rela para corregirla. objeto sin referencia 0xffffff80c2a8db80 (tama\u00f1o 96): comm \"kunit_try_catch\", pid 187, jiffies 4294894363 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [&lt;0000000001e3714d&gt;] kmemleak_alloc+0x34/0x40 [&lt;000000008e6835c1&gt;] __kmalloc_cache_noprof+0x26c/0x2f4 [&lt;000000001286d9f8&gt;] damon_sysfs_test_add_targets+0x1cc/0x738 [&lt;0000000032ef8f77&gt;] kunit_try_run_case+0x13c/0x3ac [&lt;00000000f3edea23&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [&lt;00000000adf936cf&gt;] kthread+0x2e8/0x374 [&lt;0000000041bb1628&gt;] ret_from_fork+0x10/0x20"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/05d43455f6bffa6abc7b937ca58be00452e6973f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2d6a1c835685de3b0c8e8dc871f60f4ef92ab01a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50069",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:04.180",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:58:19.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,118 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: apple: comprobar el valor devuelto por devm_kasprintf() devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto no se comprueba. Corrija esta falla y compruebe el valor devuelto. Encontrado por revisi\u00f3n de c\u00f3digo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.114",
"matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.58",
"matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0a4d4dbef622ac8796a6665e0080da2685f9220a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4d2296fb7c80fdc9925d29a8e85d617cad08731a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/665a58fe663ac7a9ea618dc0b29881649324b116",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fad940e2dd789155f99ecafa71a7baf6f96530bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50070",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:04.257",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T16:59:39.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,104 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: stm32: comprobar el valor devuelto por devm_kasprintf() devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto no se comprueba. Corrija esta falla y compruebe el valor devuelto. Encontrado por revisi\u00f3n de c\u00f3digo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.58",
"matchCriteriaId": "EF2A1323-F872-46E8-8B68-855EFEFA193F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1f266957ae1207b0717c2d69096bc70654ae9fcb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b36bb1fca2b87f6292ca2a8593f297c5e9fab41",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b0f0e3f0552a566def55c844b0d44250c58e4df6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50080",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:05.000",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:54:17.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,104 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ublk: no se permite la copia de usuario para dispositivos sin privilegios UBLK_F_USER_COPY requiere que el espacio de usuario llame a write() en el dispositivo char ublk para llenar el b\u00fafer de solicitud y no se puede confiar en el dispositivo sin privilegios. Por lo tanto, no se permite la copia de usuario para dispositivos sin privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.58",
"matchCriteriaId": "FEC88080-D5B8-4C77-A0D1-810E9D61FD60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/42aafd8b48adac1c3b20fe5892b1b91b80c1a1e6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6414ab5c9c9c068eca6dc4fd3a036bc4b83164dc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8f3d5686a2409877c5e8e2540774d24ed2b4a4ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50081",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:05.073",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:45:39.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-mq: configurar queue -&gt;tag_set antes de inicializar hctx el commit 7b815817aa58 (\"blk-mq: agregar asistente para verificar si una CPU est\u00e1 asignada a hctx especificado\") necesita verificar la asignaci\u00f3n de cola a trav\u00e9s del conjunto de etiquetas en el controlador cpuhp de hctx. Sin embargo, es posible que q-&gt;tag_set a\u00fan no est\u00e9 configurado cuando el controlador cpuhp est\u00e1 habilitado, luego se activa el error del kernel. Solucione el problema configurando queue tag_set antes de inicializar hctx."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "E1D573E2-61FD-4C3B-B3BD-5FBEFD6391F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/c25c0c9035bb8b28c844dfddeda7b8bdbcfcae95",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d28b256db525d9432bc3eb2c8d83f7d3f5e1cc87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50082",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:05.147",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:44:05.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,146 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-rq-qos: se corrige el fallo en la ejecuci\u00f3n rq_qos_wait vs. rq_qos_wake_function Estamos viendo fallos de rq_qos_wake_function que se parecen a esto: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ffffafe180a40084 #PF: acceso de escritura de supervisor en modo kernel #PF: error_code(0x0002) - p\u00e1gina no presente PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0 Oops: Oops: 0002 [#1] PREEMPT SMP PTI CPU: 17 UID: 0 PID: 0 Comm: swapper/17 No contaminado 6.12.0-rc3-00013-geca631b8fe80 #11 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 01/04/2014 RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40 C\u00f3digo: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00 RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046 RAX: 000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084 RBP: 0000000000000000 R08: 000000000001e7240 R09: 0000000000000011 R10: 00000000000000028 R11: 00000000000000888 R12: 0000000000000002 R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003 FS: 000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: try_to_wake_up+0x5a/0x6a0 rq_qos_wake_function+0x71/0x80 __wake_up_common+0x75/0xa0 __wake_up+0x36/0x60 scale_up.part.0+0x50/0x110 wb_timer_fn+0x227/0x450 ... Entonces rq_qos_wake_function() llama a wake_up_process(data-&gt;task), que llama a try_to_wake_up(), que falla en raw_spin_lock_irqsave(&amp;p-&gt;pi_lock). p viene de data-&gt;task, y data viene de la entrada de la cola de espera, que se almacena en la pila del que espera en rq_qos_wait(). Al analizar el volcado de memoria con drgn, descubr\u00ed que el que espera ya se hab\u00eda despertado y se hab\u00eda movido a una ruta de c\u00f3digo completamente no relacionada, destruyendo lo que antes era data-&gt;task. Mientras tanto, el waker estaba pasando la basura golpeada en data-&gt;task a wake_up_process(), lo que provoc\u00f3 el bloqueo. Lo que est\u00e1 sucediendo es que entre rq_qos_wake_function() eliminando la entrada de la cola de espera y llamando a wake_up_process(), rq_qos_wait() descubre que ya obtuvo un token y regresa. La ejecuci\u00f3n se ve as\u00ed: rq_qos_wait() rq_qos_wake_function() ============================================================ prepare_to_wait_exclusive() data-&gt;got_token = true; list_del_init(&amp;curr-&gt;entry); if (data.got_token) break; finish_wait(&amp;rqw-&gt;wait, &amp;data.wq); ^- retorna inmediatamente porque list_empty_careful(&amp;wq_entry-&gt;entry) es verdadero... retorna, ve a hacer otra cosa... wake_up_process(data-&gt;task) (\u00a1YA NO ES V\u00c1LIDO!)-^ Normalmente, se supone que finish_wait() se sincroniza con el activador. Pero, como se se\u00f1al\u00f3 anteriormente, retorna inmediatamente porque la entrada de la cola de espera ya se elimin\u00f3 de la cola de espera. El error es que rq_qos_wake_function() est\u00e1 accediendo a la entrada de la cola de espera DESPU\u00c9S de eliminarla. Tenga en cuenta que autoremove_wake_function() despierta al que espera y LUEGO elimina la entrada de la cola de espera, que es el orden correcto. Arr\u00e9glelo intercambiando el orden. Tambi\u00e9n debemos usar list_del_init_careful() para que coincida con list_empty_careful() en finish_wait()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19",
"versionEndExcluding": "5.10.228",
"matchCriteriaId": "AC13DFD5-0BA4-4713-BBB2-F08C0E282CB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.169",
"matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.114",
"matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.58",
"matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/04f283fc16c8d5db641b6bffd2d8310aa7eccebc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3bc6d0f8b70a9101456cf02ab99acb75254e1852",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/455a469758e57a6fe070e3e342db12e4a629e0eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4c5b123ab289767afe940389dbb963c5c05e594e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b5e900a3612b69423a0e1b0ab67841a1fb4af80f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e972b08b91ef48488bae9789f03cfedb148667fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50083",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-29T01:15:05.240",
"lastModified": "2024-10-29T14:34:04.427",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-30T15:07:02.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,141 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: se corrige la corrupci\u00f3n de DSS de mptcp debido a una gran xmit pmtu Syzkaller pudo desencadenar una corrupci\u00f3n de DSS: TCP: request_sock_subflow_v4: Posible inundaci\u00f3n de SYN en el puerto [::]:20002. Env\u00edo de cookies. ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 5227 en net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 M\u00f3dulos vinculados en: CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 No contaminado 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695 C\u00f3digo: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 &lt;0f&gt; 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff RSP: 0018:ffffc90000006db8 EFLAGS: 00010246 RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00 RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 000000000000055f0 RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8 R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 000000000000000 R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5 FS: 000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: move_skbs_to_msk net/mptcp/protocol.c:811 [en l\u00ednea] mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854 subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490 tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283 tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237 tcp_v4_do_rcv+0x96d/0xc70 red/ipv4/tcp_ipv4.c:1915 tcp_v4_rcv+0x2dc0/0x37f0 red/ipv4/tcp_ipv4.c:2350 entrega_protocolo_ip_rcu+0x22e/0x440 red/ipv4/ip_input.c:205 entrega_local_ip_finish+0x341/0x5f0 red/ipv4/ip_input.c:233 NF_HOOK+0x3a4/0x450 incluir/linux/netfilter.h:314 NF_HOOK+0x3a4/0x450 incluir/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5662 [en l\u00ednea] __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775 process_backlog+0x662/0x15b0 net/core/dev.c:6107 __napi_poll+0xcb/0x490 net/core/dev.c:6771 napi_poll net/core/dev.c:6840 [en l\u00ednea] net_rx_action+0x89b/0x1240 net/core/dev.c:6962 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 do_softirq+0x11b/0x1e0 kernel/softirq.c:455 __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [en l\u00ednea] rcu_read_unlock_bh include/linux/rcupdate.h:919 [en l\u00ednea] __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451 dev_queue_xmit include/linux/netdevice.h:3094 [en l\u00ednea] neigh_hh_output include/net/neighbour.h:526 [en l\u00ednea] neigh_output include/net/neighbour.h:540 [en l\u00ednea] ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236 ip_local_out net/ipv4/ip_output.c:130 [en l\u00ednea] __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536 __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466 tcp_transmit_skb net/ipv4/tcp_output.c:1484 [en l\u00ednea] tcp_mtu_probe net/ipv4/tcp_output.c:2547 [en l\u00ednea] tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752 __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015 tcp_push_pending_frames incluir/net/tcp.h:2107 [en l\u00ednea] tcp_data_snd_check net/ipv4/tcp_input.c:5714 [en l\u00ednea] tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239 tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915 sk_backlog_rcv incluir/net/sock.h:1113 [en l\u00ednea] __release_sock+0x214/0x350 net/core/sock.c:3072 release_sock+0x61/0x1f0 net/core/sock.c:3626 mptcp_push_ ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.6",
"versionEndExcluding": "5.10.228",
"matchCriteriaId": "23D95807-ADA5-452C-BBD3-C14EA7B6CC6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.169",
"matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.114",
"matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.58",
"matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/229dfdc36f31a8d47433438bc0e6e1662c4ab404",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4dabcdf581217e60690467a37c956a5b8dbc6bd9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9729010a0ac5945c1bf6847dd0778d8a1a4b72ac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba8e65814e519eeb17d086952bce7de93f7a40da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c38add9ac0e4d4f418e6443a688491499021add9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/db04d1848777ae52a7ab93c4591e7c0bf8f55fb4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50344",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-30T16:15:04.763",
"lastModified": "2024-10-30T16:15:04.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to be executed with the application context. An attacker can exploit this vulnerability by uploading a supplementary file that contains a malicious code or script. This code will then be executed when the file is loaded in the browser. The vulnerability was fixed in version 5.11.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://github.com/mkucej/i-librarian-free/commit/a67d7949ffb02fd912ebdcf552df006b44066d78",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/mkucej/i-librarian-free/security/advisories/GHSA-c2rm-w62w-5xmj",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-50419",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-30T15:15:19.360",
"lastModified": "2024-10-30T15:15:19.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Authorization vulnerability in Wpsoul Greenshift \u2013 animation and page builder blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Greenshift \u2013 animation and page builder blocks: from n/a through 9.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/greenshift-animation-and-page-builder-blocks/wordpress-greenshift-animation-and-page-builder-blocks-plugin-9-7-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51257",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-30T14:15:08.267",
"lastModified": "2024-10-30T14:15:08.267",
"lastModified": "2024-10-30T16:35:28.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doCertificate function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51298",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-30T14:15:08.430",
"lastModified": "2024-10-30T14:15:08.430",
"lastModified": "2024-10-30T16:35:29.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doGRETunnel function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-51378",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T23:15:04.083",
"lastModified": "2024-10-30T00:15:03.213",
"lastModified": "2024-10-30T15:35:23.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected."
},
{
"lang": "es",
"value": " getresetstatus en dns/views.py y ftp/views.py en CyberPanel (tambi\u00e9n conocido como Cyber Panel) anterior a 1c0c6cb permite a atacantes remotos omitir la autenticaci\u00f3n y ejecutar comandos arbitrarios a trav\u00e9s de /dns/getresetstatus o /ftp/getresetstatus omitiendo secMiddleware (que es solo para una solicitud POST) y utilizando metacaracteres de shell en la propiedad statusfile, como lo explot\u00f3 PSAUX en octubre de 2024. Las versiones hasta 2.3.6 y 2.3.7 (sin parchear) se ven afectadas."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/420.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6238",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-06-25T16:15:25.727",
"lastModified": "2024-06-25T18:50:42.040",
"lastModified": "2024-10-30T16:35:29.987",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://github.com/pgadmin-org/pgadmin4/issues/7605",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6657",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-10-11T14:15:05.770",
"lastModified": "2024-10-15T12:58:51.050",
"lastModified": "2024-10-30T15:15:19.877",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -53,7 +53,7 @@
],
"references": [
{
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm00000E9IIbIAN?operationContext=S1",
"url": "https://community.silabs.com/068Vm00000FPVg0",
"source": "product-security@silabs.com"
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7941",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2024-08-27T13:15:06.467",
"lastModified": "2024-08-28T16:09:03.693",
"lastModified": "2024-10-30T15:29:26.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
"impactScore": 1.4
},
{
"source": "cybersecurity@hitachienergy.com",
@ -90,9 +90,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.6",
"matchCriteriaId": "DF883AE0-876F-4A66-AAD1-19B9695F14CC"
"criteria": "cpe:2.3:a:hitachienergy:microscada_x_sys600:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8581ADCD-38BE-457C-9EDA-368953050752"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7976",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.583",
"lastModified": "2024-08-22T17:39:54.540",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-30T16:35:30.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8900",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-09-17T19:15:29.163",
"lastModified": "2024-10-01T16:15:10.293",
"lastModified": "2024-10-30T15:35:26.207",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-9287",
"sourceIdentifier": "cna@python.org",
"published": "2024-10-22T17:15:06.697",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-10-30T16:15:05.100",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -74,6 +74,10 @@
}
],
"references": [
{
"url": "https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/issues/124651",
"source": "cna@python.org"

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-30T15:00:19.821059+00:00
2024-10-30T17:00:20.690193+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-30T14:56:07.497000+00:00
2024-10-30T16:59:39.013000+00:00
```
### Last Data Feed Release
@ -33,64 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
267660
267662
```
### CVEs added in the last Commit
Recently added CVEs: `20`
Recently added CVEs: `2`
- [CVE-2024-23309](CVE-2024/CVE-2024-233xx/CVE-2024-23309.json) (`2024-10-30T14:15:04.153`)
- [CVE-2024-24777](CVE-2024/CVE-2024-247xx/CVE-2024-24777.json) (`2024-10-30T14:15:04.457`)
- [CVE-2024-28052](CVE-2024/CVE-2024-280xx/CVE-2024-28052.json) (`2024-10-30T14:15:04.720`)
- [CVE-2024-28875](CVE-2024/CVE-2024-288xx/CVE-2024-28875.json) (`2024-10-30T14:15:04.990`)
- [CVE-2024-31151](CVE-2024/CVE-2024-311xx/CVE-2024-31151.json) (`2024-10-30T14:15:05.507`)
- [CVE-2024-31152](CVE-2024/CVE-2024-311xx/CVE-2024-31152.json) (`2024-10-30T14:15:05.773`)
- [CVE-2024-32946](CVE-2024/CVE-2024-329xx/CVE-2024-32946.json) (`2024-10-30T14:15:06.033`)
- [CVE-2024-33603](CVE-2024/CVE-2024-336xx/CVE-2024-33603.json) (`2024-10-30T14:15:06.330`)
- [CVE-2024-33623](CVE-2024/CVE-2024-336xx/CVE-2024-33623.json) (`2024-10-30T14:15:06.597`)
- [CVE-2024-33626](CVE-2024/CVE-2024-336xx/CVE-2024-33626.json) (`2024-10-30T14:15:06.850`)
- [CVE-2024-33699](CVE-2024/CVE-2024-336xx/CVE-2024-33699.json) (`2024-10-30T14:15:07.100`)
- [CVE-2024-33700](CVE-2024/CVE-2024-337xx/CVE-2024-33700.json) (`2024-10-30T14:15:07.460`)
- [CVE-2024-50353](CVE-2024/CVE-2024-503xx/CVE-2024-50353.json) (`2024-10-30T14:15:07.790`)
- [CVE-2024-51257](CVE-2024/CVE-2024-512xx/CVE-2024-51257.json) (`2024-10-30T14:15:08.267`)
- [CVE-2024-51296](CVE-2024/CVE-2024-512xx/CVE-2024-51296.json) (`2024-10-30T14:15:08.337`)
- [CVE-2024-51298](CVE-2024/CVE-2024-512xx/CVE-2024-51298.json) (`2024-10-30T14:15:08.430`)
- [CVE-2024-51299](CVE-2024/CVE-2024-512xx/CVE-2024-51299.json) (`2024-10-30T14:15:08.510`)
- [CVE-2024-51300](CVE-2024/CVE-2024-513xx/CVE-2024-51300.json) (`2024-10-30T14:15:08.597`)
- [CVE-2024-51301](CVE-2024/CVE-2024-513xx/CVE-2024-51301.json) (`2024-10-30T14:15:08.680`)
- [CVE-2024-51304](CVE-2024/CVE-2024-513xx/CVE-2024-51304.json) (`2024-10-30T13:15:14.360`)
- [CVE-2024-50344](CVE-2024/CVE-2024-503xx/CVE-2024-50344.json) (`2024-10-30T16:15:04.763`)
- [CVE-2024-50419](CVE-2024/CVE-2024-504xx/CVE-2024-50419.json) (`2024-10-30T15:15:19.360`)
### CVEs modified in the last Commit
Recently modified CVEs: `54`
Recently modified CVEs: `93`
- [CVE-2024-34669](CVE-2024/CVE-2024-346xx/CVE-2024-34669.json) (`2024-10-30T14:22:47.337`)
- [CVE-2024-38002](CVE-2024/CVE-2024-380xx/CVE-2024-38002.json) (`2024-10-30T14:47:10.953`)
- [CVE-2024-3862](CVE-2024/CVE-2024-38xx/CVE-2024-3862.json) (`2024-10-30T14:35:11.003`)
- [CVE-2024-3935](CVE-2024/CVE-2024-39xx/CVE-2024-3935.json) (`2024-10-30T14:35:11.860`)
- [CVE-2024-44278](CVE-2024/CVE-2024-442xx/CVE-2024-44278.json) (`2024-10-30T14:35:12.077`)
- [CVE-2024-44285](CVE-2024/CVE-2024-442xx/CVE-2024-44285.json) (`2024-10-30T14:35:12.353`)
- [CVE-2024-47636](CVE-2024/CVE-2024-476xx/CVE-2024-47636.json) (`2024-10-30T14:32:17.523`)
- [CVE-2024-48119](CVE-2024/CVE-2024-481xx/CVE-2024-48119.json) (`2024-10-30T14:32:43.217`)
- [CVE-2024-48963](CVE-2024/CVE-2024-489xx/CVE-2024-48963.json) (`2024-10-30T14:54:53.937`)
- [CVE-2024-48964](CVE-2024/CVE-2024-489xx/CVE-2024-48964.json) (`2024-10-30T13:46:31.657`)
- [CVE-2024-50084](CVE-2024/CVE-2024-500xx/CVE-2024-50084.json) (`2024-10-30T14:56:07.497`)
- [CVE-2024-50085](CVE-2024/CVE-2024-500xx/CVE-2024-50085.json) (`2024-10-30T14:49:42.953`)
- [CVE-2024-50086](CVE-2024/CVE-2024-500xx/CVE-2024-50086.json) (`2024-10-30T14:46:09.080`)
- [CVE-2024-50087](CVE-2024/CVE-2024-500xx/CVE-2024-50087.json) (`2024-10-30T14:40:16.377`)
- [CVE-2024-51567](CVE-2024/CVE-2024-515xx/CVE-2024-51567.json) (`2024-10-30T14:35:14.933`)
- [CVE-2024-51568](CVE-2024/CVE-2024-515xx/CVE-2024-51568.json) (`2024-10-30T14:35:15.670`)
- [CVE-2024-6130](CVE-2024/CVE-2024-61xx/CVE-2024-6130.json) (`2024-10-30T14:35:16.383`)
- [CVE-2024-6509](CVE-2024/CVE-2024-65xx/CVE-2024-6509.json) (`2024-10-30T14:35:17.297`)
- [CVE-2024-6780](CVE-2024/CVE-2024-67xx/CVE-2024-6780.json) (`2024-10-30T14:35:18.040`)
- [CVE-2024-7763](CVE-2024/CVE-2024-77xx/CVE-2024-7763.json) (`2024-10-30T14:13:45.763`)
- [CVE-2024-7824](CVE-2024/CVE-2024-78xx/CVE-2024-7824.json) (`2024-10-30T13:50:18.053`)
- [CVE-2024-7825](CVE-2024/CVE-2024-78xx/CVE-2024-7825.json) (`2024-10-30T13:49:58.980`)
- [CVE-2024-7826](CVE-2024/CVE-2024-78xx/CVE-2024-7826.json) (`2024-10-30T13:48:53.220`)
- [CVE-2024-8444](CVE-2024/CVE-2024-84xx/CVE-2024-8444.json) (`2024-10-30T14:35:18.373`)
- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-10-30T14:46:14.127`)
- [CVE-2024-48063](CVE-2024/CVE-2024-480xx/CVE-2024-48063.json) (`2024-10-30T15:35:17.993`)
- [CVE-2024-48138](CVE-2024/CVE-2024-481xx/CVE-2024-48138.json) (`2024-10-30T15:35:18.830`)
- [CVE-2024-48206](CVE-2024/CVE-2024-482xx/CVE-2024-48206.json) (`2024-10-30T15:35:19.677`)
- [CVE-2024-48572](CVE-2024/CVE-2024-485xx/CVE-2024-48572.json) (`2024-10-30T15:35:20.497`)
- [CVE-2024-48573](CVE-2024/CVE-2024-485xx/CVE-2024-48573.json) (`2024-10-30T15:35:21.227`)
- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-10-30T15:31:41.743`)
- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-30T15:35:22.063`)
- [CVE-2024-49210](CVE-2024/CVE-2024-492xx/CVE-2024-49210.json) (`2024-10-30T16:13:12.307`)
- [CVE-2024-49211](CVE-2024/CVE-2024-492xx/CVE-2024-49211.json) (`2024-10-30T16:08:23.040`)
- [CVE-2024-50068](CVE-2024/CVE-2024-500xx/CVE-2024-50068.json) (`2024-10-30T16:57:35.427`)
- [CVE-2024-50069](CVE-2024/CVE-2024-500xx/CVE-2024-50069.json) (`2024-10-30T16:58:19.983`)
- [CVE-2024-50070](CVE-2024/CVE-2024-500xx/CVE-2024-50070.json) (`2024-10-30T16:59:39.013`)
- [CVE-2024-50080](CVE-2024/CVE-2024-500xx/CVE-2024-50080.json) (`2024-10-30T15:54:17.967`)
- [CVE-2024-50081](CVE-2024/CVE-2024-500xx/CVE-2024-50081.json) (`2024-10-30T15:45:39.047`)
- [CVE-2024-50082](CVE-2024/CVE-2024-500xx/CVE-2024-50082.json) (`2024-10-30T15:44:05.180`)
- [CVE-2024-50083](CVE-2024/CVE-2024-500xx/CVE-2024-50083.json) (`2024-10-30T15:07:02.577`)
- [CVE-2024-51257](CVE-2024/CVE-2024-512xx/CVE-2024-51257.json) (`2024-10-30T16:35:28.993`)
- [CVE-2024-51298](CVE-2024/CVE-2024-512xx/CVE-2024-51298.json) (`2024-10-30T16:35:29.790`)
- [CVE-2024-51378](CVE-2024/CVE-2024-513xx/CVE-2024-51378.json) (`2024-10-30T15:35:23.600`)
- [CVE-2024-6238](CVE-2024/CVE-2024-62xx/CVE-2024-6238.json) (`2024-10-30T16:35:29.987`)
- [CVE-2024-6657](CVE-2024/CVE-2024-66xx/CVE-2024-6657.json) (`2024-10-30T15:15:19.877`)
- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-10-30T15:29:26.673`)
- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-10-30T16:35:30.723`)
- [CVE-2024-8900](CVE-2024/CVE-2024-89xx/CVE-2024-8900.json) (`2024-10-30T15:35:26.207`)
- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-30T16:15:05.100`)
## Download and Usage

View File

@ -138411,7 +138411,7 @@ CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd
CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000
CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000
CVE-2019-25218,0,0,5b80931fba7b5b61a09b6a7cef47b52c4c321e607f57f9764b15a065a78a0d69,2024-10-21T17:10:22.857000
CVE-2019-25219,0,0,e88697049c6c7bfe4584917de7b3f889cee4d72f7defcac97255b8b6ae9a8f79,2024-10-29T17:15:03.567000
CVE-2019-25219,0,1,5a9c6fd8137a5395bbebfd600a3c9429c55154de7ddd9a4e7ecf893f26288516,2024-10-30T16:35:01.230000
CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000
CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000
CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000
@ -193049,7 +193049,7 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521
CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000
CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000
CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000
CVE-2022-23861,0,0,1b79df6ad607e321a06ffd4f1414ad54f48e3b8a61921f1d2f0a02f3a735e314,2024-10-23T15:12:34.673000
CVE-2022-23861,0,1,c12e5923e506db6637da2f4d7bfffd29645fd8e22872e2626b0a16457c09b7d0,2024-10-30T15:49:36.883000
CVE-2022-23862,0,0,2b721dae3c741fa798c190bd3375737db683c0e200456780df62dd1f1d9e42d1,2024-10-23T15:12:34.673000
CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000
CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000
@ -194502,7 +194502,7 @@ CVE-2022-2551,0,0,74b4822c5fcf4cca0c95d4c747c1372c0e3abcbf7018cb0beceb636683cd01
CVE-2022-25510,0,0,aa70a911a68b456ea37e682c426fef231bc32631e9171aabcce3dc74fac8b8c4,2022-03-22T12:48:27.790000
CVE-2022-25511,0,0,9a085807ff010494608dae4a6c41b91e6d6464d68d2a5558e6026be3efbfc58d,2022-03-22T13:00:15.057000
CVE-2022-25512,0,0,66afc2e131e08a40c22cf7efe94a4d0a493509a1ce53d597bad0a179120be566,2022-03-22T12:47:36.107000
CVE-2022-25514,0,1,53df0c6d04a736905ecf2aea338430c80cdfffe80d3a2399275f217c4e3b611f,2024-10-30T14:35:03.257000
CVE-2022-25514,0,0,53df0c6d04a736905ecf2aea338430c80cdfffe80d3a2399275f217c4e3b611f,2024-10-30T14:35:03.257000
CVE-2022-25515,0,0,93918fc9715b23740ee7895accacb62ac409d8c89e1e0c0a7bba6dd4d52dac9e,2024-08-03T05:16:05.693000
CVE-2022-25516,0,0,abfdd25ac596ed3123174e2dbf33c43681db8f2181de6eee9d432a459d89a96e,2024-08-03T05:16:05.790000
CVE-2022-25517,0,0,a856c8add3a41498edd8eec5f2f20319411b2ad691016d19515161c14ec135f5,2024-08-03T05:16:05.883000
@ -198103,7 +198103,7 @@ CVE-2022-29942,0,0,fc6818e24192943f3057a8472863591b0bb410e0e79a09a779f4711b67142
CVE-2022-29943,0,0,eb71e97800ee6b5a94d1e1a421a0d55ce4cb2015dadb56eeca914938a3f2d059,2022-05-13T17:23:57.113000
CVE-2022-29944,0,0,e0453dbd280c8ec27e5d94cb7d5b123a013998c63d2761a98d606f48d9a0c42e,2023-05-03T17:27:22.773000
CVE-2022-29945,0,0,f380615d8f5440312b415143b2443943838c53f7406b1f6016a4f3d97dd61ac0,2023-08-08T14:22:24.967000
CVE-2022-29946,0,0,35b98985e5959bf121ee889866ada3c50315477891d70bf66d8c217b0e2e59b8,2024-07-12T12:49:11.340000
CVE-2022-29946,0,1,5ec202bd25f66840f4cdf614c9274cd0b945e73801e9e0fe77105f095424c643,2024-10-30T15:35:02.187000
CVE-2022-29947,0,0,67254d8c9a43ca264578d67120b013387788e7f1a55025339547ad0a1bfa936a,2022-05-11T13:56:37.537000
CVE-2022-29948,0,0,8d37f4431c9db2945bfb3bbbdfad7cfabf57086d1ad46e1cb618623f6774987a,2022-10-29T02:46:43.147000
CVE-2022-2995,0,0,02ae8d9183cac311d74d01f776697fe5152487245d68259e2d43f14baa91e4b5,2022-09-21T18:05:11.537000
@ -199523,7 +199523,7 @@ CVE-2022-31618,0,0,c87bb7022df5b1cf6bfbf83b111f820a095a1522011a965e2b689b031ad72
CVE-2022-31619,0,0,25be6201f0ebe2f908d3b0f4205108852687feff28a1f4d8435170a857fa13cd,2023-02-23T17:41:22.513000
CVE-2022-3162,0,0,94c5a9808c2af6e2d144dfc5fb54a6b06a92090516f69e51d01ee6db5a74681a,2023-05-11T15:15:09.510000
CVE-2022-31620,0,0,f1c013eb788a6e6bfc9e63425793bc53ec53675319f63ab7927dff3e01ad6c01,2023-08-08T14:21:49.707000
CVE-2022-31621,0,1,3b02962b8c67065b30dc4a1e9e38f99f6738d435ef0bd30ff4030072807865d8,2024-10-30T14:35:04.633000
CVE-2022-31621,0,0,3b02962b8c67065b30dc4a1e9e38f99f6738d435ef0bd30ff4030072807865d8,2024-10-30T14:35:04.633000
CVE-2022-31622,0,0,a4c3ac694c0b0f5dc59f48718f1397841d0070cac2ec499b0494408342c107d5,2024-08-03T08:15:22.973000
CVE-2022-31623,0,0,c97c0883891a41bd5877fa21f0d16f792362d5d7eb05863b986d0e62854d6308,2024-08-12T13:38:09.363000
CVE-2022-31624,0,0,072eed7a5f3230c09cca78698220d2182cc895913c81b0c6e51df9d52db2c1eb,2023-08-08T14:22:24.967000
@ -203198,7 +203198,7 @@ CVE-2022-36224,0,0,a8df48107e3438e5636b1b67645301c5d46c7f827136d7d2eecddb479297b
CVE-2022-36225,0,0,bc5ff33817b075cefe645e2473f6e3ee21d74e0020eca717973ee4a2644e0e31,2022-08-22T19:54:34.733000
CVE-2022-36226,0,0,d18d91af6dd58c2f963a8b5e6f9c28aedb3937746d0423d033ce941ec368b11d,2023-08-08T14:22:24.967000
CVE-2022-36227,0,0,f9c6c598655ba70529d76222b6d51e0a6a2419795bbe07d0ce8c6f260026ead8,2024-03-27T16:04:27.210000
CVE-2022-36228,0,0,bece7b2e6a18a9135780f02e79612de6f72c31679a1469ea88c2efb812313325,2023-10-12T18:37:26.680000
CVE-2022-36228,0,1,957d55f748ca15de37b4228f612bb064b6017702be1774a7b3e831b0ac313c87,2024-10-30T15:35:02.480000
CVE-2022-3623,0,0,d02a8abf840926caba5dbea47b45f5bb51f70a451a618f3d86b7bcf2b8470e11,2023-08-18T18:55:40.750000
CVE-2022-36231,0,0,29a154d09509e8cc5de0ff23cd1345d0b13b28501e5a09334b4b39f337efd8e5,2023-03-03T19:28:14.753000
CVE-2022-36233,0,0,ad3393a640e2a6b7e865efbc8773573711ba1d4d4d15c42713474979d69dce4e,2022-08-21T03:32:01.793000
@ -204680,7 +204680,7 @@ CVE-2022-3817,0,0,7d6d5e06ce4b54a69a15f245efee2d0bc975fca433f45e15e83300dcb63b4b
CVE-2022-38170,0,0,fec0209b1dfb726508691f57987f06577b560c61488de81ef4d3fd8428cfc5c6,2023-08-08T14:21:49.707000
CVE-2022-38171,0,0,19564da8badda997ec23aecd8a5b76c77aa4f9d0c43cac0ebbfd31343c26a67f,2022-10-27T20:27:03.480000
CVE-2022-38172,0,0,a23c5a71823cbad61f7943c598cb50459ec8ca672cb2fe40a0943b35e2021a53,2022-08-26T20:30:24.243000
CVE-2022-38176,0,0,0312f3b4410b7463bcd0b63f0862952c4907400bb3a3808c1ecf53143c27177a,2022-09-09T19:26:21.257000
CVE-2022-38176,0,1,f62d403be86525e685a9bff53af5bc6e07a4870526aba05a23f51a5bd2421902,2024-10-30T16:17:27.707000
CVE-2022-38177,0,0,0082ba3dd67bb968376b404fe94580d7fcd28909b39a957b495083482112b313,2023-11-07T03:50:04.117000
CVE-2022-38178,0,0,fda06f4717ca850d5ee2668681d5b834814e5488d84760e2eb6b8385fe747302,2023-11-07T03:50:04.237000
CVE-2022-38179,0,0,c2e2f8914bfd4076ff98881e91082413ed75e5486ae489ce82bcb37bd6b344a9,2022-08-16T11:50:42.253000
@ -207375,7 +207375,7 @@ CVE-2022-41712,0,0,be4b3a69614c5862607ade7b4f150ce6e5bd6b4cbe641a141e08b385af878
CVE-2022-41713,0,0,cf0c4c86c7d5ab77c2afd006488c1c3df633ac2279fbfdb5c397ab31a7df5146,2022-11-05T01:38:13.917000
CVE-2022-41714,0,0,d55609e936c80ee61813189ada661a2c7bb7ae448836ba659a0cd2c13fa90d55,2022-11-05T00:31:43.307000
CVE-2022-41715,0,0,b9fd76ae50e751a6e28cc4e6915889bda6e630bec593e97480857fdb63b0f669,2023-11-25T11:15:09.940000
CVE-2022-41716,0,1,6ad0e2782744b85bab18d2bcbb1e579306720de13edd6ac56cb898c639ba0dfa,2024-10-30T14:35:05.003000
CVE-2022-41716,0,0,6ad0e2782744b85bab18d2bcbb1e579306720de13edd6ac56cb898c639ba0dfa,2024-10-30T14:35:05.003000
CVE-2022-41717,0,0,5d049248f869e69fee29fe229f1d44571b4e34793e20b3f71fff0678967e29ca,2024-01-18T03:15:55.570000
CVE-2022-41718,0,0,ede4edf1910fc09ee7773999b62e824282ceda5088eab3fd9bae27fdceb8b0f5,2024-07-02T17:15:04.360000
CVE-2022-41719,0,0,539b5dc1df3f047123b1f8e94e4752b3901073913e492258d1bdb9f18b4c0dc0,2022-11-15T20:55:04.397000
@ -209897,7 +209897,7 @@ CVE-2022-45165,0,0,9efab6cf6411a0fc8caccbaaf1daf9ba874b4c2f8614e971fe09e96ed6e68
CVE-2022-45166,0,0,57d394d2995f4377ba00ee929a99ae8999dd7ebccf487ee6e456c41109e40f7f,2023-01-14T04:30:32.190000
CVE-2022-45167,0,0,c5b32132424a3624b1421ce4c4354da0169e930a29c58060268e6f5667e56aa7,2023-01-14T04:30:09.657000
CVE-2022-45168,0,0,5b01b558bd8fb24fbdf559be2087ec0c16d0cf3cbb1f9a0ca1cdeb2cef67be5a,2024-07-26T19:03:18.167000
CVE-2022-45169,0,1,2c96535c95d2b311d50c3fefe461569e397648d403df08b87d63cf722f05b9b4,2024-10-30T14:35:05.323000
CVE-2022-45169,0,0,2c96535c95d2b311d50c3fefe461569e397648d403df08b87d63cf722f05b9b4,2024-10-30T14:35:05.323000
CVE-2022-45170,0,0,51857a95e163773d3e1200b17d50a3b3d8525cbba5e34abc9e50a76427a0d58c,2023-04-19T19:28:52.097000
CVE-2022-45171,0,0,89e3a65af60c35b314ca1326b62e088fbcbbf13dbbc6db18d831a946ec2c9f05,2024-08-26T14:35:00.503000
CVE-2022-45172,0,0,745b90eadc3009c0d643fdb6b4b3cde168f7b2e5c5311df0a93dd1a20611c5d0,2023-02-08T19:36:45.417000
@ -211150,7 +211150,7 @@ CVE-2022-46899,0,0,47cf48c2a9fa34274d86379a7c591cdc4ec1c2991370cbbb10d8f9edd90eb
CVE-2022-4690,0,0,09b82453a76ab8f1047bf7981c70909e40ea72752c4f747c5c0a5b8ae673a1dc,2022-12-30T16:25:52.877000
CVE-2022-46900,0,0,1ada8cb944acaa94afe201553723c2ea4dd7e6ff1d8d7c1b032917ea8df1332b,2024-10-29T14:35:14.353000
CVE-2022-46901,0,0,0a812e631ccd4c832094fff6bd6ba8e21eb75afdbec4ee4392ca48e1e4a21b09,2023-08-01T01:32:04.767000
CVE-2022-46902,0,1,5838113687ec39b343aca678786a7a9a6e63ebf2b737c5bc536f7448e13fddea,2024-10-30T14:35:05.620000
CVE-2022-46902,0,0,5838113687ec39b343aca678786a7a9a6e63ebf2b737c5bc536f7448e13fddea,2024-10-30T14:35:05.620000
CVE-2022-46903,0,0,cc109058a85ca135a9ea89d0065559940fa523aae863c9fdc92ebaab79710fc8,2022-12-15T13:50:12.330000
CVE-2022-46904,0,0,05b49b039a5aef06b139831f231d652676369c1de5a992360a0dae8fffdeeebf,2022-12-15T13:50:00.713000
CVE-2022-46905,0,0,2a072fe32b855528b14eb362c580358c0af76c35cf2aebe35eecbd2d3e9a8636,2022-12-15T13:50:30.767000
@ -212226,7 +212226,7 @@ CVE-2022-4862,0,0,2553413418f6ad24271b84c4b6265dbfaea53531b172d691e897d8db042ae0
CVE-2022-48620,0,0,5698c281f8e8068516c8dfe700ee9a98bc0bfd9312d73b253920c8e72d6c9959,2024-03-23T03:15:08.797000
CVE-2022-48621,0,0,1cd5ad66125265477c8dc07522592260d4eec4c99a5ef37987104225c1fc205f,2024-02-20T19:50:53.960000
CVE-2022-48622,0,0,8603f3223b9efff6b371bdc90b7040dc59471154fa80a88ca2d72860d21139c6,2024-08-26T20:35:01.673000
CVE-2022-48623,0,1,192645b132d5aad78dc224ae0449f296b9736e7b254c3ebd6e8b5afc838e7d11,2024-10-30T14:20:47.597000
CVE-2022-48623,0,0,192645b132d5aad78dc224ae0449f296b9736e7b254c3ebd6e8b5afc838e7d11,2024-10-30T14:20:47.597000
CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000
CVE-2022-48625,0,0,f6663c1686b1284fd5202202aca248b725343b1c940d427bdd48722330db6bff,2024-08-29T20:35:08.187000
CVE-2022-48626,0,0,fc58451bcf554cb6d7596ed91f1d4bac3d14dee8e91d35aa41459c2e76fb613b,2024-08-27T18:54:45.263000
@ -212238,11 +212238,11 @@ CVE-2022-48630,0,0,3b8d0c800bfc12bda16c507877a10fda7326e6eb492171fa2e9c1d717c882
CVE-2022-48631,0,0,aaab3ba02d20eb7ed75e56691adb619871b3eeeb9b3909dd50966148f3ed94c9,2024-04-29T12:42:03.667000
CVE-2022-48632,0,0,604f20ec0eaf6c13c4b3b66792ca33665e6d1e06fdaa3f2397f35f9bec38e179,2024-04-29T12:42:03.667000
CVE-2022-48633,0,0,d1b02d8abcad4acece798c33d4e1bda012ee764a6eb89a127c625e4eb186648a,2024-04-29T12:42:03.667000
CVE-2022-48634,0,0,8b3f149d7efcde225ca801ea6e9ac42f0b447147b0126ce4de49bf2c5e4b3310,2024-04-29T12:42:03.667000
CVE-2022-48634,0,1,6f9e85aad26012b70d7c8d41258b2878b0ea511ab17c91d430d2bb71c1968eaf,2024-10-30T16:35:02.927000
CVE-2022-48635,0,0,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000
CVE-2022-48636,0,0,bd119ee3a500e8de66c4e55ffa746e94e5dcf276788f5780f1a4b33a00caa150,2024-10-29T16:35:05.977000
CVE-2022-48637,0,0,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000
CVE-2022-48638,0,0,f1f3c62f32abd9dfa0b7d8788d87905580bbfec25eb951765d8861d82d3e8214,2024-04-29T12:42:03.667000
CVE-2022-48638,0,1,6855b79bbb70622095182cba4b392928edff874affdf1fd590bd21063729c93e,2024-10-30T16:35:03.473000
CVE-2022-48639,0,0,4a5ae1aed25211cad58cf1392921491fc3122875f222672a6b19cfd32acf6264,2024-04-29T12:42:03.667000
CVE-2022-4864,0,0,d2a18ac64f46b7de7e75713eac668d767e5348c6b6dc712ad9b2de33d41cdd0c,2023-10-11T15:24:48.003000
CVE-2022-48640,0,0,f98768d06d2bce4ee0a2ff2316c3738424f501d15f7baaa490ac56116110bd52,2024-04-29T12:42:03.667000
@ -212260,7 +212260,7 @@ CVE-2022-48650,0,0,766619acc76f809ac3f89b4b9fbe9aa75ea430cb3be2d98085e4eead243c1
CVE-2022-48651,0,0,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000
CVE-2022-48652,0,0,05a5a1c50a1d4992042ef5994a0d5c1c6f5485af066180e574dbce1a367a6ecb,2024-04-29T12:42:03.667000
CVE-2022-48653,0,0,8f84c0201a079d8a50061e5f0d56ccc48847df28331e9cee5b020fada4dfd712,2024-04-29T12:42:03.667000
CVE-2022-48654,0,0,188cebffd61abed2f153360dbade170f14247f30db5c3ea60832986ebf774412,2024-05-23T19:01:47.760000
CVE-2022-48654,0,1,7e71c39d2c45027cd06e36e4438012870bcb7b54fab8df415bb6c67748e6890f,2024-10-30T16:35:04.010000
CVE-2022-48655,0,0,117c1f7933b825ff69775b7174e7dea2fe0670d0f8ada0f09471ea3ef6ecf8ba,2024-07-03T01:39:04.060000
CVE-2022-48656,0,0,40a2007fa4d639e6f83f0edc7aee784b5f7b01ef417ffc776351b17161144b2b,2024-05-16T20:41:09.867000
CVE-2022-48657,0,0,be78ff049b68a0f97aeb78e19baa31929ce72df0ecfae8aafeac4e8b40bf2819,2024-05-16T20:31:47.880000
@ -212293,17 +212293,17 @@ CVE-2022-48685,0,0,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bb
CVE-2022-48686,0,0,653933df85aeb53741c4da508441bc4178f22de8ca5ed91694baaa41b1db130d,2024-05-23T20:33:45.640000
CVE-2022-48687,0,0,0ec523c7f518c54f1476367451f0187184c8bdd6245e5a7032af6a4d4908842f,2024-05-23T20:33:49.117000
CVE-2022-48688,0,0,d455650df5c1da9bd9791ee4c72bc65174296941dc339d8a298b6c5309ca5633,2024-05-23T20:33:54.213000
CVE-2022-48689,0,0,f6979bceccae1762d9d80494fd85b8e95b72f4d069b7c9330a4fda3fb7b2fd38,2024-05-23T20:33:57.590000
CVE-2022-48689,0,1,348745f20f7b16f6e437efe97d505fac3dab667f37f632881a0d5b5926af8ed6,2024-10-30T16:35:04.910000
CVE-2022-4869,0,0,daf2f3101da8ef8ac50d09fde630b69f6fce1705ae93beee4322fd92abc6df7a,2024-05-17T02:17:00.030000
CVE-2022-48690,0,0,e3f3080cc94bbe09dc9a2554fc22d04dc505032f1d5abcd43d428ee8f98a164c,2024-05-06T12:44:56.377000
CVE-2022-48691,0,0,b13e14e110b9e213ae4c85c401f23511f220263583a39620ef8ba50d80a3daa2,2024-05-23T20:34:05.590000
CVE-2022-48691,0,1,f3cf9d8cdcc44069cb228445fc6742b749bf778cb3c28ec48e2565638e1249ff,2024-10-30T16:35:05.407000
CVE-2022-48692,0,0,46546614be66817a48b52a16773b86b62dd71ed7709b7cc7f5f2e6be9c7a9d15,2024-05-23T20:34:02.510000
CVE-2022-48693,0,0,2de2da6c1292fb939817f4985aaa3748704c5e172b80ff619c511ddeeb51fc58,2024-05-23T20:34:08.557000
CVE-2022-48694,0,0,c39c541ec46d540d96fddfe1bdcf81c083d74c7bb84ee90738a9b26551466af0,2024-05-23T20:34:12.060000
CVE-2022-48695,0,0,8970459b5cf430fc8f110f8b3b9636df1f2a218eaed323426aa62da1f67d7386,2024-05-06T12:44:56.377000
CVE-2022-48696,0,0,3533dc13616699020d365772c25d089e92f2accd7741d17aac660fb36007a062,2024-05-06T12:44:56.377000
CVE-2022-48697,0,0,ae5b1b7204aa2a0ca95297305830517a3b3cec3cd76769643f670651bd46a259,2024-05-06T12:44:56.377000
CVE-2022-48698,0,0,af889859fa4d5aac2c9b5b309af68b34576c74d9ba6688fbb501b9f764979027,2024-05-06T12:44:56.377000
CVE-2022-48697,0,1,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000
CVE-2022-48698,0,1,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000
CVE-2022-48699,0,0,acc89b565cb5cce5b9f8e8bd3da6f880e3d6b9a5e41cd82aa70c3c6804a5dd1a,2024-05-06T12:44:56.377000
CVE-2022-4870,0,0,e992349af17f597cfe5651dfb20a7ad9ae9a4ba97330151fb88be70e92531900,2023-05-25T17:41:06.867000
CVE-2022-48700,0,0,88ca7cc46b5af146038dcfc5e39f2532e471081a55d5445d724a7a174c9021e7,2024-05-06T12:44:56.377000
@ -212318,7 +212318,7 @@ CVE-2022-48708,0,0,3d74c0532114de6a04115e08b692eed3d80cca2b1e01d5c31b7a193896d3d
CVE-2022-48709,0,0,7c1e37ea20fd009be2e17dcacc36b6d370f119b42b8143088cf57ed615197c10,2024-05-21T16:53:56.550000
CVE-2022-4871,0,0,7905d6520e1c27f1cbb6f441e5d1598686722bb011c394a9d524ad16179257b5,2024-05-17T02:17:00.160000
CVE-2022-48710,0,0,7bae9b7428c55842f90af4097ed2f283707d207d75866de2320645d0389c3c29,2024-05-21T16:53:56.550000
CVE-2022-48711,0,0,b27f23ff68af059e667fe891cf8f47b41f822e331a7df9ddc0eee44f197ae6dc,2024-06-20T12:43:25.663000
CVE-2022-48711,0,1,fd479d2a20ad7a5e8b12450a72d66add54b0ab9d37e435b0a0c4320c4d4a2e8b,2024-10-30T16:35:06.243000
CVE-2022-48712,0,0,ccace5c10a916df674bb9392d637200516b0891ac7d4932f88a1539d40c22b70,2024-06-20T12:43:25.663000
CVE-2022-48713,0,0,43f577b3081d00bb625fc50a3475feaa155bc41741f6b85f1672e53c165db779,2024-06-20T12:43:25.663000
CVE-2022-48714,0,0,d3e55637265824378aa3c7bae71a7fa48c76755872399adfb8504da466ec168c,2024-06-20T12:43:25.663000
@ -212353,7 +212353,7 @@ CVE-2022-4874,0,0,90cc8c4c3185a1ec38cc988f4bdad23e05202e72d0f25ddcfdaf13ee3fb346
CVE-2022-48740,0,0,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000
CVE-2022-48741,0,0,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000
CVE-2022-48742,0,0,955f0c7fbe8c4fb04c29ac68d1923a29168477849bc7b7e7e1a38f90faa04e83,2024-08-20T13:44:57.483000
CVE-2022-48743,0,0,016aa198197a6069a5b600f7b75e21187063a616d0f2a55d2373780c15590e81,2024-08-20T13:54:00.933000
CVE-2022-48743,0,1,2dee83a739865d1358b8ab0bde16312d292f3858b29fc6d3a871089f3cf027ae,2024-10-30T16:35:06.467000
CVE-2022-48744,0,0,db97d2408a3729b8332ee7728404bcf0a8034b20ec9bb81fa52c25169879c043,2024-06-20T12:43:25.663000
CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635b13,2024-06-20T12:43:25.663000
CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000
@ -212364,7 +212364,7 @@ CVE-2022-4875,0,0,0248cb7e88a64eaf1154285e30f722a7ce5832425ab7216a34bbdccf82920b
CVE-2022-48750,0,0,55afd22040c9a204644583104b9b0ba5a5b6f53a98ecd72808a82376e1affbba,2024-09-18T16:04:21.597000
CVE-2022-48751,0,0,be32087ff7da3afc8bbd26738891fe8c820998963c64317e4b1afedf242a7fee,2024-06-20T12:43:25.663000
CVE-2022-48752,0,0,38cf75d35e9d1cb0a011fd7ff84616d4bbbc7cc6cd1186a506f033bb40c015f3,2024-06-20T12:43:25.663000
CVE-2022-48753,0,0,fee8018edcf35100134efb8c5bdeee9c5abc917f17d652dbef1321e8083108a6,2024-09-18T16:03:25.617000
CVE-2022-48753,0,1,f480bdbf0728c0db5a1ac2926fd0d873642c12cdac06bb9b6481850b26aa1f47,2024-10-30T16:35:06.700000
CVE-2022-48754,0,0,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000
CVE-2022-48755,0,0,30010b42de97147ea0203eebb224554207374f1ac961584225a137f3aa742eee,2024-06-20T12:43:25.663000
CVE-2022-48756,0,0,ba335ca06870d086c208a4b61d6e4ff2c3db981eb9732fbe19a2518767ecf69b,2024-09-18T15:59:50.983000
@ -212373,13 +212373,13 @@ CVE-2022-48758,0,0,2390cac20b5fb952629cce9f98f33922ffc2f9637f8248dc4bb4782f5e162
CVE-2022-48759,0,0,7962889d3c432d97af1edc38f6b3670b53bb47c561e33f1c213dfd68840532fe,2024-06-20T12:43:25.663000
CVE-2022-4876,0,0,e65b1d52e56908a8a506a957a5c75cf98f657410276c30e7e528870e80a276e5,2024-05-17T02:17:00.467000
CVE-2022-48760,0,0,a822cc7f5fd5d465f57fc80abb1c1a54e7b02787f15d26b19ce6fe3fda938330,2024-06-20T12:43:25.663000
CVE-2022-48761,0,0,3cfd946ac77fc1af17cd081ed8684fb125d41afbc4ed1fc016776ff176eaeee1,2024-06-20T12:43:25.663000
CVE-2022-48761,0,1,a0fb503b182a42adce92b4284ad999cd8d122ef26da6442d172429172a99aed1,2024-10-30T16:35:06.947000
CVE-2022-48762,0,0,f4510de1769eada9940776802a8e77e4c4286daddf6ec9206df95f4e10a02de8,2024-10-29T19:35:01.667000
CVE-2022-48763,0,0,019f757453c2977363dff510d05dc5a6e5a09147b632f78395e58e6c428efd83,2024-06-20T12:43:25.663000
CVE-2022-48764,0,0,e13b2251f00635b9efcac93235bb561c717b11baca1d4d8de3b6f250c8e755d2,2024-06-20T12:43:25.663000
CVE-2022-48764,0,1,1d8469156824e41f94fa6c088c0234978319f16fe9708dd8892fc7b184fb9b19,2024-10-30T16:35:07.177000
CVE-2022-48765,0,0,84ad02e5d8e4b2b68f2606184b9db643b6473e4cacb7a99b922c82145d37f1c7,2024-06-20T12:43:25.663000
CVE-2022-48766,0,0,aee9379c6937dedc065a980d6dc6c448fa04b0544ba5aa2485f663dd038070cb,2024-06-20T12:43:25.663000
CVE-2022-48767,0,0,397068039a161989eb1e5126e2da53c6f50e5f129490a15f00ff298d0326017e,2024-06-20T12:43:25.663000
CVE-2022-48767,0,1,f847103d72827504d342cba4ec3cd5aea429a2d2e6b886a77f0ced3f8cffee83,2024-10-30T16:35:07.380000
CVE-2022-48768,0,0,03d6c63d6763b8b5c29aaf908a5acdf73da6dfcfa8ecf0bfe0aa68dc7902959c,2024-09-09T12:59:37.460000
CVE-2022-48769,0,0,9da3594b688f3419de5209099af92b325945b83e31f6492d68a0030e2619bb31,2024-06-20T12:43:25.663000
CVE-2022-4877,0,0,7be088f764e81f3d159b624bbe89e382d534c3a5b5b12bd3cddcbca9b765980c,2024-05-17T02:17:00.577000
@ -212739,11 +212739,11 @@ CVE-2022-4964,0,0,cffd201050df748697a7807e71c8cbb43580775567bf6802f3f386ec551d1c
CVE-2022-4965,0,0,baf60e9cbde904870c558c44d15db185508e65dd8ec8fd7c3f21184d8cbd2328,2024-04-10T13:24:00.070000
CVE-2022-4966,0,0,d7772092edb1c4f6ea77758ef1a2b38cc5d3bd7ded1e7c81a0173f7456d0da48,2024-05-17T02:17:05.713000
CVE-2022-4967,0,0,acbcdcd64f9485d059508255d49aabf4f78227f1537ec6f5aeb5af6241be26cb,2024-06-14T13:15:49.633000
CVE-2022-4968,0,1,9a17fbf13f4e41d8329babee660719152ca3e30f9b3218a566abcb9c02a6a5dd,2024-10-30T13:56:32.953000
CVE-2022-4968,0,0,9a17fbf13f4e41d8329babee660719152ca3e30f9b3218a566abcb9c02a6a5dd,2024-10-30T13:56:32.953000
CVE-2022-4969,0,0,6da77d75911b6f9f4d4eed5e8e9a02ef51bdb2636c0fddb313d49f06fb600e32,2024-06-06T16:15:10.250000
CVE-2022-4971,0,0,1bfa8f1c30b05158fa9137b5049bffd1194a9fc86cf513ee18ae5f0349d51bb2,2024-10-16T16:38:14.557000
CVE-2022-4972,0,0,e887427b0b34658aa14fa77d359e8d419530cdc5f4592e927abe653e4c60f699,2024-10-16T16:38:14.557000
CVE-2022-4973,0,0,c36422c9dfd44273cc4cd72540d7b077e02c316c4fbcf0a78468dcf17f879235,2024-10-16T16:38:14.557000
CVE-2022-4971,0,1,f6ff69e7ed7e1feffcfd40ec8ecc2dace723d01c8e8dee7c8441179db44a8395,2024-10-30T16:37:33.237000
CVE-2022-4972,0,1,b59aab7940af7df89b4a4014b803c15ac567db0b0d743fb31ad6d103cfe2de78,2024-10-30T16:34:55.117000
CVE-2022-4973,0,1,c846697ac57e999699ffcd63f1eb7690000d94006aa238932cc11138832eecb6,2024-10-30T15:58:30.907000
CVE-2022-4974,0,0,14764381bacd12db5e2c67438cb3bfc3f3c80d088b68fde09bb3a022a5cf379e,2024-10-16T16:38:14.557000
CVE-2023-0001,0,0,89cc7c25326dd5727e94c3abe5ce2365a868c05aa8d47b4c236024303b20e03e,2024-01-12T22:10:50.817000
CVE-2023-0002,0,0,85151726e26db3dd412b666129cc1146d77d486c542304fa6aa1433f4f16452f,2023-11-07T03:59:26.433000
@ -229156,7 +229156,7 @@ CVE-2023-38405,0,0,eb678e1398b0cc7afc6cadec898dca16e86921fb7075e187826e227511830
CVE-2023-38406,0,0,b4e9fee11e6ca1b95b528449b15c85e7b4af1b868f84535cfe760130604cc642,2024-04-28T07:15:08.367000
CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000
CVE-2023-38408,0,0,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000
CVE-2023-38409,0,0,838e08b6ac7468e45b0e0743452ec8eac55d08ae6cebd5146f7b96ce40e80d8e,2023-07-27T03:49:09.943000
CVE-2023-38409,0,1,41a273a7228c0568b2310db49eed9cb552b2447de4ace94f4b54143996698810,2024-10-30T15:35:04.137000
CVE-2023-3841,0,0,d2f5ee23f09965afeb5d36623db7f402f898f5d6074e3d1a8c3e15639396c726,2024-05-17T02:27:52.550000
CVE-2023-38410,0,0,6c048eb455397479418bb47030b11f6e590486d07d435d761a9e48d83acfb861,2024-10-23T15:35:13.280000
CVE-2023-38411,0,0,878de725f745853626d009447a072e4f76f5e67940f796a7c936cf666df69e06,2023-11-21T18:44:14.920000
@ -242503,12 +242503,12 @@ CVE-2024-10287,0,0,f35de541a09293478313fb52f4e207e82b325b3fc6432429ed8850f6465c2
CVE-2024-10288,0,0,fd731f2fa655e977394860f265053908b8d125d4076d3124439c81d187b95c3b,2024-10-24T04:07:45.110000
CVE-2024-10289,0,0,7362f8b5a4aaa787d5c8f070f69545dea8207d6f1adb78df74793ff58580e97d,2024-10-24T04:07:51.340000
CVE-2024-1029,0,0,0f58435c5c731694bc563330e2e0cc48091c7d28b092c9a25a6684c410525166,2024-05-17T02:35:11.633000
CVE-2024-10290,0,0,32b9d717368e635aaa8618e36c6d8aa6019577a9299bfc82735cfbe7d195d08d,2024-10-25T12:56:36.827000
CVE-2024-10291,0,1,8507b4447fcd8fcc7aa118a709f5691fbd662f3c7fbb1d55694140494fcc8310,2024-10-30T13:23:47.827000
CVE-2024-10292,0,1,426a6dd878f8fed452ebd6448d3edb5b732c219a4b0073be487941c8e5287eea,2024-10-30T13:40:07.353000
CVE-2024-10293,0,1,8e56039c8372aa88e5dabe6a523be86aef575434b11facd48a467e1a8dc36c3c,2024-10-30T13:37:27.067000
CVE-2024-10290,0,1,554c14bf86d2356052ac39788fb0ad56602d77a74cd88f42cb8fe953feceae46,2024-10-30T15:06:00.617000
CVE-2024-10291,0,0,8507b4447fcd8fcc7aa118a709f5691fbd662f3c7fbb1d55694140494fcc8310,2024-10-30T13:23:47.827000
CVE-2024-10292,0,0,426a6dd878f8fed452ebd6448d3edb5b732c219a4b0073be487941c8e5287eea,2024-10-30T13:40:07.353000
CVE-2024-10293,0,0,8e56039c8372aa88e5dabe6a523be86aef575434b11facd48a467e1a8dc36c3c,2024-10-30T13:37:27.067000
CVE-2024-10295,0,0,05be2217733c9dc82e0ab847a99213d443b6eb2416a14b489bddd760491fe8e9,2024-10-25T12:56:07.750000
CVE-2024-10296,0,0,3731dd63766ea164d82646758d87e47e2e2d1ca9061034b26ec431458662311d,2024-10-25T12:56:36.827000
CVE-2024-10296,0,1,a167e288d770dbaf1b2cdb5a1f53629a1025f7402c7add21139cd0e6f9a1db2d,2024-10-30T15:13:18.077000
CVE-2024-10297,0,0,7059e1e2bb8cf8e51a328b566020cbc23abd446f188f444527bfee9442b2adad,2024-10-25T12:56:36.827000
CVE-2024-10298,0,0,a0e9f6b5e6c68ad8ada3edbba009974fda145ba113b49020fdab65d252296669,2024-10-25T18:51:44.370000
CVE-2024-10299,0,0,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9cb42,2024-10-25T18:51:17.047000
@ -242525,28 +242525,28 @@ CVE-2024-10331,0,0,7db3978f3af331926e6dbc0b348677f0ce3ba5cec6100247fa9b9851e7430
CVE-2024-10332,0,0,f5b2f39a2af4e4ca43edc3fb818fd22985b528866227753e69ec49cca9bc6022,2024-10-25T12:56:07.750000
CVE-2024-10335,0,0,659f6e0620614d6588fd07e5309387fdf4ea7eb7c67174683fd34316e7f3ed98,2024-10-28T15:58:13.240000
CVE-2024-10336,0,0,b6057cbdc37a7025d457bb6b96b11680d6106aa7de8d96644974542e84807905,2024-10-28T16:01:58.393000
CVE-2024-10337,0,1,553ac6c0bfb7ee7bea21231b73146a09b2d4b7bf3dcdc9f25044a5e5cd120bd9,2024-10-30T14:02:45.627000
CVE-2024-10338,0,1,e40da5e2e0df9994173821ada1d8ce8eb1835e59da62e56c4c3f20660a59f7a6,2024-10-30T14:02:05.743000
CVE-2024-10337,0,0,553ac6c0bfb7ee7bea21231b73146a09b2d4b7bf3dcdc9f25044a5e5cd120bd9,2024-10-30T14:02:45.627000
CVE-2024-10338,0,0,e40da5e2e0df9994173821ada1d8ce8eb1835e59da62e56c4c3f20660a59f7a6,2024-10-30T14:02:05.743000
CVE-2024-1034,0,0,454f09f0f5fc636699352f4449a6882a204ccb564a121fe5e40109839ef595a1,2024-05-17T02:35:12.150000
CVE-2024-10341,0,0,0e0a9affbce7c0fd1940e7153c924bfb3ba43bf71cc69020fca65383ad207429,2024-10-25T12:56:07.750000
CVE-2024-10342,0,0,a0e1e7bfbf8df77686478a8b39f35ce7b5adbe1b31b823f7a8e84fab31750de9,2024-10-25T12:56:07.750000
CVE-2024-10343,0,0,4101b5a530cab96c4e2ed3f7591bd8e9e62c4ce861db441511cf50880ecd2465,2024-10-25T12:56:07.750000
CVE-2024-10348,0,1,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000
CVE-2024-10349,0,1,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000
CVE-2024-10348,0,0,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000
CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000
CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000
CVE-2024-10350,0,1,1eff377645f31addadbf2a414de92964c33d8decf15f763410afce73538f2275,2024-10-30T14:29:55.480000
CVE-2024-10350,0,0,1eff377645f31addadbf2a414de92964c33d8decf15f763410afce73538f2275,2024-10-30T14:29:55.480000
CVE-2024-10351,0,0,0669fd862bd943e91d4fd75dd5a3a4f23e3a0ecf8b6b598b3fa3044b7bf8c6d6,2024-10-25T12:56:07.750000
CVE-2024-10353,0,0,34f363c95bbc45d4e85ef2856d7e0d5110b6c82bce311f5e8fc9036257eb83b7,2024-10-25T12:56:07.750000
CVE-2024-10354,0,0,d5bf96c00ae597f7009c34e3844c5889f0c0763a1e1b97eab0af94f26675c82a,2024-10-25T12:56:07.750000
CVE-2024-10353,0,1,e06260810ab2f8d83e8148f12eacebfdfa4f171568dc8f755f0a84d5679240e8,2024-10-30T16:21:35.113000
CVE-2024-10354,0,1,b93bbc475560ddb322fc6987c8bb9a496754455b51c6de71617d975e234845da,2024-10-30T16:32:48.453000
CVE-2024-10355,0,0,7a858a56547ed44307c9a540d3394b900b64454d40ccf6ae564bf35aa8fa4990,2024-10-25T12:56:07.750000
CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000
CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000
CVE-2024-10360,0,0,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000
CVE-2024-10368,0,0,bd751cf8f0908c7885868477a03f4653af3e113fc89fdbd03353e34dff9f8f68,2024-10-25T12:56:07.750000
CVE-2024-10369,0,0,7ae7d6c6e004766971ac0d79eb28bd21cccdeb76fc8a447fe3f3b470463f1503,2024-10-25T12:56:07.750000
CVE-2024-10368,0,1,c8e0d6969c93ffe96acf5e0ee7b5c26394eeb4c801dc04ebad8a62cf1ce3fd82,2024-10-30T16:46:30.783000
CVE-2024-10369,0,1,5a59dc320150c27565cde3d9105528beaf16a536e1981e9f54165bf31963ac02,2024-10-30T16:50:32.567000
CVE-2024-1037,0,0,dc80ea945a1c7339fa73e61584161c3f0eb5c7e682984c3146b230e695ed7de9,2024-02-14T19:09:45.253000
CVE-2024-10370,0,0,27188c86ba90849a9c0d88afec58d3a2edeb9103c555ee60d22fc4a3d5210d79,2024-10-25T12:56:07.750000
CVE-2024-10371,0,1,0850681dd0b7affd7117bf912b3d2c475da42ed7b5f5270f8839e339171d9bac,2024-10-30T14:51:07.863000
CVE-2024-10370,0,1,810741af1a3bf30d10bf8fd3a18c7ee61ae1ab9f3ef9c730b2d4820dea325396,2024-10-30T16:38:40.240000
CVE-2024-10371,0,0,0850681dd0b7affd7117bf912b3d2c475da42ed7b5f5270f8839e339171d9bac,2024-10-30T14:51:07.863000
CVE-2024-10372,0,0,55d82ebc64e3347208b42e044461acfe18dba6e494597fc717ca90fd21fd7f16,2024-10-25T12:56:07.750000
CVE-2024-10374,0,0,7790d94803baee2c2a9a346f5727b3f8fa2f864d9522e5ceae124a52fbb8369d,2024-10-25T12:56:07.750000
CVE-2024-10376,0,0,f82f08f1ceca9553145aba97b8462c352f4e5d7c7ee750ca3d73316f521c8aa7,2024-10-25T12:56:07.750000
@ -242627,8 +242627,8 @@ CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b
CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000
CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000
CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000
CVE-2024-10487,0,1,d1b8bc178246d83d33a27144ea8a70d3bcde87b4297a3439f88b09ebd92962ef,2024-10-30T14:35:07.303000
CVE-2024-10488,0,1,6de048fb6a1876c0ac1729db68b9fcc079c410d13c9e356399351989c5574a08,2024-10-30T14:35:07.517000
CVE-2024-10487,0,0,d1b8bc178246d83d33a27144ea8a70d3bcde87b4297a3439f88b09ebd92962ef,2024-10-30T14:35:07.303000
CVE-2024-10488,0,0,6de048fb6a1876c0ac1729db68b9fcc079c410d13c9e356399351989c5574a08,2024-10-30T14:35:07.517000
CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000
CVE-2024-10491,0,0,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000
CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000
@ -242642,7 +242642,7 @@ CVE-2024-10507,0,0,f0d511f24f84b9e0af273e44e1eadb29e82d53fc80607d0bb45b0fad15f5c
CVE-2024-10509,0,0,a617a52391f6a05c8db7614b66d9896a1a6ac7734326993025e7a689a1eda8b8,2024-10-30T03:15:04.060000
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
CVE-2024-10525,0,1,9e13346b66b67fbaf979592729bd321664520056534d883bed51d4a9ecbb4714,2024-10-30T14:35:08.430000
CVE-2024-10525,0,0,9e13346b66b67fbaf979592729bd321664520056534d883bed51d4a9ecbb4714,2024-10-30T14:35:08.430000
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000
@ -244860,7 +244860,7 @@ CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740
CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000
CVE-2024-21587,0,0,6fb74afc13eaed151f7dfc73f3405ccfaec4bc45b3ea2dc8ae59dadb238cb14a,2024-01-19T17:44:35.830000
CVE-2024-21589,0,0,bf8a565022261f069a66f4b01e754b7d699f349013c5b07db7616e20369d7f8b,2024-01-19T17:41:50.160000
CVE-2024-2159,0,1,3917b65d82c6712933a7deb2a2b9d624607084eadd4f10c853f19f8c4102da7d,2024-10-30T14:35:09.637000
CVE-2024-2159,0,0,3917b65d82c6712933a7deb2a2b9d624607084eadd4f10c853f19f8c4102da7d,2024-10-30T14:35:09.637000
CVE-2024-21590,0,0,d08474c974f9592fef08b015c317503a18e23e40ac3eeaa76411343449e4ff8a,2024-05-16T20:15:08.473000
CVE-2024-21591,0,0,e40a687cc8061975f7bebad4323d4bb4ab97a9cba87c782ec13ee84f9e541139,2024-10-09T14:47:40.580000
CVE-2024-21593,0,0,540dea6f9467759cebeb81acc8a430afb7c98c09a21ab68c332120fcdcbd1e65,2024-05-16T20:15:08.637000
@ -245580,7 +245580,7 @@ CVE-2024-22450,0,0,fe403e8a7fd8e390fc32bc73d33734a11d8d75e8e2adff855cffc5954c4b0
CVE-2024-22452,0,0,5a080959ec2d756b184e442711bbcbbb6cb0c52e3b6bc2f798e7179e3dcb554d,2024-03-04T13:58:23.447000
CVE-2024-22453,0,0,f9797fcda68051d8f971de586c04a2c106a15949c4e3d09d430cad58ebd8464f,2024-03-19T13:26:46
CVE-2024-22454,0,0,e9841476327230c5841a8929ea4ecb0ea65558a6dfa68436b83b2a2a5b045860,2024-02-27T17:10:16.097000
CVE-2024-22455,0,0,302188243bd5081237aae4add79ff64341e1976ecbb49e59944afbbc1f6b61bb,2024-10-16T16:10:10.413000
CVE-2024-22455,0,1,bc4b26eafc25ec70283fabda69920871bbe1148ce58d7c2c8d6a539864f8578e,2024-10-30T15:15:18.117000
CVE-2024-22457,0,0,cb04de6dd02e8a0381ffeb293f9eb43c468f190969ea3471927cb046b6407271,2024-03-01T14:04:04.827000
CVE-2024-22458,0,0,a8f3b6bb3f7ce3a09f59dfbc4d2b0db5234bfeb3a6e52235fbee24c30c1d9fe2,2024-03-01T14:04:04.827000
CVE-2024-22459,0,0,cabd1003173ddb6b26c1189dde137f8a2e465bcd34b07ccffe332260e291ed8f,2024-02-28T14:06:45.783000
@ -246038,7 +246038,7 @@ CVE-2024-23305,0,0,1bec79bc4020f6ec3f876f6219b03c33047027e58293560df4d9a57dbab1f
CVE-2024-23306,0,0,91f46f52d9e5de00866e9203178e37e34a29f802d826e4f6441f99c1a5c6820c,2024-02-14T18:04:45.380000
CVE-2024-23307,0,0,ce3f1c4d4ee00439ab4eb84e7304958dea526a72b7cb431c57d45239ed513046,2024-01-31T20:38:12.743000
CVE-2024-23308,0,0,ab780e3d459f30026b937323fd197ac1b2578a1b6664154111931dd5ecc07d0f,2024-02-14T18:04:45.380000
CVE-2024-23309,1,1,f176275e78d37dd0914e06a05900ed9a19ac5ac3d8b13fe20b906d6305907b73,2024-10-30T14:15:04.153000
CVE-2024-23309,0,0,f176275e78d37dd0914e06a05900ed9a19ac5ac3d8b13fe20b906d6305907b73,2024-10-30T14:15:04.153000
CVE-2024-2331,0,0,4ae45893d8915acf1a1828719d664bd22bca980785ca070e6d05565096dfa696,2024-05-17T02:38:10.643000
CVE-2024-23310,0,0,4179f0bf8f658e9935c63c9c35f42aea4d1771a834836f01ffe3c75ee4f84241,2024-04-02T15:15:52.963000
CVE-2024-23313,0,0,423eb5c8ce01f4dbd3ff16b47be219cc8721b4595695d3e2421bc510a6ef2931,2024-04-02T15:15:53.050000
@ -246728,7 +246728,7 @@ CVE-2024-24275,0,0,bf48a834dac897664e81f3748e0f4d5c238116fb25905911687313cd54945
CVE-2024-24276,0,0,5140333f0f3ce7a82f9d915e370db57d18b1db0fa2de019f6fd8e7318dc67fe0,2024-03-06T15:18:08.093000
CVE-2024-24278,0,0,14023ded6ebd46997e823f79bcda294b012ff332364bf6b30ca9ff4ad7b1ffac,2024-08-27T21:35:11.103000
CVE-2024-24279,0,0,b22eaf070f797d5199ab4939d0b1561987350af33b4eba21e4910bbae462641a,2024-08-27T18:35:04.047000
CVE-2024-2428,0,1,71012a81f113f8931195927b8ef2c2cdacd49ab525a19287f0fbcae2f8b5635c,2024-10-30T14:35:10.497000
CVE-2024-2428,0,0,71012a81f113f8931195927b8ef2c2cdacd49ab525a19287f0fbcae2f8b5635c,2024-10-30T14:35:10.497000
CVE-2024-2429,0,0,bb9579e5fb707a5112fccfd7e64c52901e3e44384ceafa5a0281658740d435e7,2024-08-09T20:35:03.443000
CVE-2024-24291,0,0,f9a99cce2d5669fe488c53da57cec1a603932ca409a68a957e4a3be597d5560e,2024-02-13T20:13:26.593000
CVE-2024-24293,0,0,c875e8188ccf3b7557555abd825e181af9a9ca32c0aff4644dac65d414c40eba,2024-08-20T14:35:04.827000
@ -246975,7 +246975,7 @@ CVE-2024-24773,0,0,da8b682b31febd3e2de454f238cf130a08fb6ef29c1a8b2a9f8fa2fbf84b5
CVE-2024-24774,0,0,f13aeb5a8a14a2b28434301d459936e56cbcb6271359f1132daa975be1a4e4a7,2024-02-15T18:43:22.673000
CVE-2024-24775,0,0,e8a1117081dcecbda71bf879ea5f4cf7e64e228ee31031e5b59390d8bbf84feb,2024-02-14T18:04:45.380000
CVE-2024-24776,0,0,6c7703c27939b228b8c6f0a7ac349acff88924b8a443af347b795b4df5ebf2ac,2024-02-15T18:42:25.383000
CVE-2024-24777,1,1,56e22ca779ef43a7047331beff5bf16b9b6c0fe1b87bd0e27c519b3b15c14e81,2024-10-30T14:15:04.457000
CVE-2024-24777,0,0,56e22ca779ef43a7047331beff5bf16b9b6c0fe1b87bd0e27c519b3b15c14e81,2024-10-30T14:15:04.457000
CVE-2024-24779,0,0,0775cb0ef2c25af6aeb51ccc0386a7ab6a666e4b0e03b7de868da93b3496f60c,2024-02-28T15:15:09.250000
CVE-2024-2478,0,0,d4988a5fe437e33a0f9a93c3fcdccaa9b2b8ddd55cfc6854092fb1866b11274a,2024-05-17T02:38:14.540000
CVE-2024-24781,0,0,27ebde0e33bd322521afeffa18295af93e85735697632ec97f1132c9ea5137ef,2024-10-18T19:00:53.347000
@ -247234,7 +247234,7 @@ CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1
CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000
CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000
CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000
CVE-2024-25087,0,1,d0eb5bf250014d4733c8c2cd43475d3db0483672bd5d42f237e7c0898368e6b0,2024-10-30T15:35:07.993000
CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000
CVE-2024-25089,0,0,e665d40e71849b52a984e51750a3ed30341c4f9c0766ccd2a466247b89c7c920,2024-08-26T19:35:12.087000
CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000
@ -247697,7 +247697,7 @@ CVE-2024-2578,0,0,0a9a760b0e95eba3e084425ffbc6c35fcacf81d3fe78ca7d4da72936fcaf57
CVE-2024-2579,0,0,3e2ac9285c805214de809b153e0f16bcd56ebe6adfc4df4e86808858edb81c9b,2024-03-21T19:47:03.943000
CVE-2024-2580,0,0,f1dd66fbf84d74580d929f75d3e5a752178d849505161b5daa24286248a8e976,2024-03-21T19:47:03.943000
CVE-2024-25801,0,0,28a9d6eacf99d1abdd83a784126e6c3bc5997f43f3087477c08ded27d7a7a5ff,2024-02-22T19:07:27.197000
CVE-2024-25802,0,1,c6a1a8cbd81c2b09c9c3cffd8c169ccd639a29f720329a27af3b379bf1e80362,2024-10-30T14:35:08.663000
CVE-2024-25802,0,0,c6a1a8cbd81c2b09c9c3cffd8c169ccd639a29f720329a27af3b379bf1e80362,2024-10-30T14:35:08.663000
CVE-2024-25807,0,0,842f9a5e9e10408e46e0a439e695cbb579bc0c4b444593c08bc5ab70315f1236,2024-08-01T21:35:13.397000
CVE-2024-25808,0,0,c8b3842916e7c06900b08f9fd62594e0f61e1918f91fddba1f15f9656576b1c8,2024-09-06T17:35:05.610000
CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000
@ -247710,7 +247710,7 @@ CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2ba
CVE-2024-25831,0,0,5b9f73c2b189e5dd33d90886632cdb674cb173750266ada8e06c07c01ebdf635,2024-08-20T20:35:09.747000
CVE-2024-25832,0,0,a4448e0b7fded4d69ae19d5a812394b0dfee60300a31f6c0311dd994464f2ea8,2024-02-29T13:49:29.390000
CVE-2024-25833,0,0,b51394028b2e438a7195762bbea65216839d5c40b4973445f19556678b890008,2024-08-21T16:35:02.683000
CVE-2024-25837,0,0,ad7d9c7c2df86362ce1fb90c6e14af3076a01961d6031fa4b4699cf7d18f98dc,2024-08-19T13:00:23.117000
CVE-2024-25837,0,1,e8566032733132a4e472898a09554d7d5b745597958025023019d2ffd25f360c,2024-10-30T15:35:08.810000
CVE-2024-25839,0,0,112ead546eeb57a908059ec1a3d260836a97873d0981df33665fbecb07c8a6ee,2024-08-26T20:35:15.523000
CVE-2024-2584,0,0,dd550e2c3dd90cf91d2a8279de69803860a7180796c6bc877e47cf73e9bebe16,2024-03-18T19:40:00.173000
CVE-2024-25840,0,0,446c9d87bd75b43e98b54bb5f507147f090d48ad09f8a4c53ee839f0d8bcd54b,2024-08-23T20:35:09.290000
@ -247741,7 +247741,7 @@ CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded53
CVE-2024-25873,0,0,b0ef6e77600c842b742f164755ad8cfeb8283e0b096faea6d4ca3226ee47f51d,2024-08-26T19:35:23.777000
CVE-2024-25874,0,0,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653257,2024-08-27T19:35:17.383000
CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000
CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000
CVE-2024-25876,0,1,71252f27c94e104ba80cd9940e7e481f22d4a42058ace62f35175357d7df908a,2024-10-30T16:35:12.507000
CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000
CVE-2024-25885,0,0,d7b45ca9946efade56286fe216db0d8d419d93e37f8064c8e12d635de4b291aa,2024-10-10T12:56:30.817000
CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000
@ -247913,7 +247913,7 @@ CVE-2024-26056,0,0,cdde0faae5371b6934ff40ac1740cac009f960619bf2984b3c2abc0f388d4
CVE-2024-26057,0,0,e45b3f0f152eb3c78dc9320bed534a79a66b2c35d46fd8b2b0ef0017333c4b87,2024-06-14T19:46:03.817000
CVE-2024-26058,0,0,a93e87c800fd4d920581776c16d0072b04deb406d205f9f24e685781c2f5715f,2024-06-14T19:37:56.100000
CVE-2024-26059,0,0,3a74ee7caa73ebe11f8a8e2f4a849fd43a4fe73562ba6d99358d666bb4fc6636,2024-03-18T19:40:00.173000
CVE-2024-2606,0,0,652fdcf629adc4e92eddef80b1b9eda0bc107345b569847c2183146384125b8a,2024-03-19T13:26:46
CVE-2024-2606,0,1,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000
CVE-2024-26060,0,0,9cdef2d575b129761f3290b88017e8f07b5021de9d3255eeba059f838c645f83,2024-06-14T18:49:08.077000
CVE-2024-26061,0,0,95eff38cd1c7e403d46e8de01e1ed3169b38a7e929aa5fe4e06324861444a4f1,2024-03-18T19:40:00.173000
CVE-2024-26062,0,0,3dc8f814b10216475d4edc6897c31db61a1f8c0a6e3b0883a2d1e46684b7142a,2024-03-18T19:40:00.173000
@ -247956,7 +247956,7 @@ CVE-2024-26095,0,0,9f6c7bddb38cd6b8f363ea5c70ef041eaf1840874199b0d4f54fdf8f0f85f
CVE-2024-26096,0,0,7fe4823fe2a7b575a3ae0ebf41ef8d560b89c2e0159509c3214f5a6c2615f8b6,2024-03-18T19:40:00.173000
CVE-2024-26097,0,0,cf64c962cadb0fc8f1556505bc07c2350b9f9285ec03ff659cd6a815a0eb0c88,2024-04-10T13:23:38.787000
CVE-2024-26098,0,0,dbbd02b23dacb0109748d3b2fc272a4103fcd271020bb791bb34007edc8f300f,2024-04-10T13:23:38.787000
CVE-2024-2610,0,0,7b5680ac250feb9d90c8325c50eadd3949a1c7f769cbd4e582048a421664a99c,2024-03-25T17:15:51.833000
CVE-2024-2610,0,1,8a8dfbfa641be414cd802b96cdada12ae4887a35722e5a49e14d5a6b88bfdf78,2024-10-30T16:35:13.863000
CVE-2024-26101,0,0,a3bcaed7b7153b5cc7bbbc52911724f0db36b199f4ed571b79e387b893a73377,2024-03-18T19:40:00.173000
CVE-2024-26102,0,0,35dbb61e3e6ac12fce2788e2b3706c2ebc69e7be37fd2a337727452fe09da848,2024-03-18T19:40:00.173000
CVE-2024-26103,0,0,8def4a39c13d47b53292840b50c64b12658220aacee9dc293340637f660797b8,2024-03-18T19:40:00.173000
@ -248130,9 +248130,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c
CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000
CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000
CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000
CVE-2024-26271,0,0,94d22f604a985174d42111d64e0b23a56810ed5aec83eeffb7fda2be0e45ea7c,2024-10-23T15:12:34.673000
CVE-2024-26272,0,0,2cafd8fc22129f3b590189152a9df5b093c77bb6590e2fe2c8ad7ef6db6cc619,2024-10-23T15:12:34.673000
CVE-2024-26273,0,0,1c558983e69a364df8a14cb27906a600a4f6ce5ee29c8d95d118d25203c55b4a,2024-10-23T15:12:34.673000
CVE-2024-26271,0,1,90efe8aa58b5016b25a8857eef82f6f11ce202cf315496c4a742a78e19f3fe47,2024-10-30T15:04:11.867000
CVE-2024-26272,0,1,c80525339098677fa4e717ed434c933352995311835a52a959174ee5867f82c0,2024-10-30T15:03:51.437000
CVE-2024-26273,0,1,9e726bb802e7d5f73ab9b92d6026de7424a2b453f9bff0a1c38491bf0c7e5d8d,2024-10-30T15:03:35.040000
CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000
CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000
CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000
@ -248154,7 +248154,7 @@ CVE-2024-26296,0,0,544e1c2c94ce65e70db959ad46d5372fa189de6687abd994a179048ab80cb
CVE-2024-26297,0,0,af2dff5c494a25db31e51e78048442dd01fa43e7ea7ca9a2aba52748560b0484,2024-08-01T13:48:05.817000
CVE-2024-26298,0,0,59727460b37052fa0a59faa646f1b3121962ba5c31619135e5630e3a1f8617f0,2024-08-01T13:48:06.523000
CVE-2024-26299,0,0,388de7f3a87ecf2fa8513c69a452c6b2ff267b5ff8f028f7dadd75103abb070e,2024-02-28T14:06:45.783000
CVE-2024-2630,0,0,070bc19de7c6292a3d3a6f1dc36c9928baae384b4f9f22a69378848f649a74b3,2024-04-01T15:23:32.893000
CVE-2024-2630,0,1,ec856c27a5c03dd021fb947cb024a63c9409651759234a9bffe340d8fd7b989a,2024-10-30T16:35:14.117000
CVE-2024-26300,0,0,1ac1f21ae9a2403844c235609ee04177577ebeaf725b3bb4b2178b26e2a031f5,2024-02-28T14:06:45.783000
CVE-2024-26301,0,0,19f0f94ed5cbffac086b7363ba9897dc486d991fcb04fba1d0f3db89247a8bc8,2024-02-28T14:06:45.783000
CVE-2024-26302,0,0,ff20007eb31c0fa8781cc9c4d6fc8a55c00403a520ce07afbda60fb035b40218,2024-02-28T14:06:45.783000
@ -249562,9 +249562,9 @@ CVE-2024-28014,0,0,16fb600a35cd34a3bc2910bc5d71fb1c433afeb8bbc697318d98ea82c7efb
CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000
CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000
CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000
CVE-2024-28020,0,1,b684a40bcfa1b370d8bb34a5c1d02183662465a7ec86995d07d8d810f26ebf94,2024-10-30T14:23:14.127000
CVE-2024-28020,0,0,b684a40bcfa1b370d8bb34a5c1d02183662465a7ec86995d07d8d810f26ebf94,2024-10-30T14:23:14.127000
CVE-2024-28021,0,0,d3b281f790deb0e028449c0547c897de30755152601ff8bfb79129f9a9b610f6,2024-10-29T15:15:09.347000
CVE-2024-28022,0,1,9077c2e7130f01aa732cd3390b7c4ae4caddc752d7d580463d4dc1ef8afd6333,2024-10-30T14:24:16.353000
CVE-2024-28022,0,0,9077c2e7130f01aa732cd3390b7c4ae4caddc752d7d580463d4dc1ef8afd6333,2024-10-30T14:24:16.353000
CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000
CVE-2024-28024,0,0,b0c6ecf3013967d3efc0618c902b41d32c3ab34672126ec38ab8cb1948f54213,2024-10-29T15:15:09.697000
CVE-2024-28029,0,0,9e4bd22dac92b2ff82c0b0c8dd5314b634ca4785041ee3b60958f95130ac218e,2024-10-17T19:15:22.063000
@ -249582,7 +249582,7 @@ CVE-2024-28046,0,0,e317050e5191f1a9311172b20af408b0774a96cf976a07961cd105c21cd52
CVE-2024-28048,0,0,427932cc2219e9755e4267ffe9ddd33c638166ca04c44c64b94478c05d38f523,2024-08-07T20:35:15.970000
CVE-2024-2805,0,0,286efc9a19dc11ee0838ec500ba164305f2c14641c0d5856229be06ec762a801,2024-05-17T02:38:30.840000
CVE-2024-28050,0,0,0d145d7886c67ca4edf4d6c71f8ed46211449029687ca634366ee5c88b5e7b1e,2024-09-06T18:38:11.353000
CVE-2024-28052,1,1,d104be7b0ed9c739fd6bb5e987047c06e1582f4552ccfce34a901b096e65c8da,2024-10-30T14:15:04.720000
CVE-2024-28052,0,0,d104be7b0ed9c739fd6bb5e987047c06e1582f4552ccfce34a901b096e65c8da,2024-10-30T14:15:04.720000
CVE-2024-28053,0,0,c6161d8eec33d0d4874e655333f8b3d42189dbff5254c952286bcd697b2efc85,2024-03-15T12:53:06.423000
CVE-2024-28054,0,0,42bd8bafc554125a5c189382c84c5d77dd5214fa492ad959b0494172465d0aa0,2024-03-23T03:15:11.510000
CVE-2024-28056,0,0,c35a08b2cbca4e8b19728715e17e817ce4b19045fe6d73162e692c29df0fb231,2024-08-15T19:35:07.857000
@ -250059,7 +250059,7 @@ CVE-2024-2887,0,0,c42af46d10c700fa850ea04bb590acb930d5f5fd1c428610962643eaa93a7b
CVE-2024-28870,0,0,a84ad55a58fed92db4d351523f55fc3cc9d3c726377b9c2c66e3f01e6b89b3d1,2024-04-04T12:48:41.700000
CVE-2024-28871,0,0,f172a75f11a332172da0d351654b3914d8a45025ba4cca839cd83e7266151a93,2024-04-04T16:33:06.610000
CVE-2024-28872,0,0,3fa653e5c53924e4238c671e5dfa807909726d40036a16f47c2e48e10d41c887,2024-07-12T18:48:45.307000
CVE-2024-28875,1,1,c11b48c2ce271c558919e98c2eb15ea951ab9643a605a820586146708f3747ee,2024-10-30T14:15:04.990000
CVE-2024-28875,0,0,c11b48c2ce271c558919e98c2eb15ea951ab9643a605a820586146708f3747ee,2024-10-30T14:15:04.990000
CVE-2024-28876,0,0,289ce1f406982ef8800ef1b70fd46d0b9d5b8d9ceadfdb0734ecc8b023d71b98,2024-09-06T18:35:00.337000
CVE-2024-28877,0,0,cc0627e9c2b6ba5f30332865405b5bc76f89994c49e4e390afd92f763c7891d6,2024-06-13T18:36:09.013000
CVE-2024-28878,0,0,d059bd49c00a1fffb41c41d6dd95d1c802f748f752ac96eeef423a76a468b10c,2024-04-15T13:15:51.577000
@ -250341,7 +250341,7 @@ CVE-2024-29170,0,0,b197fa7a7096d94d37c613ba2c6a7ee9897dd072a00f8dfa13a38fc4064e1
CVE-2024-29173,0,0,b62456de8f4690ce00618be7c34a0b2cf8be7a1ae45ec9583315adfc494ef33d,2024-06-26T12:44:29.693000
CVE-2024-29174,0,0,2f89576d93360494ca2cc2b277086c2a427003cf8ac672efbf66eb7d6dd29f29,2024-09-23T21:00:33.127000
CVE-2024-29175,0,0,bf3d75b78a3d0440ae4550a31f6e6795d080c83a26a8a4e7e6b90f2099187102,2024-09-23T21:13:13.247000
CVE-2024-29176,0,1,fd582474832c4d4f3b624db38762c8242e536b968a32cefeeca62c0f36ecae26,2024-10-30T14:15:05.240000
CVE-2024-29176,0,0,fd582474832c4d4f3b624db38762c8242e536b968a32cefeeca62c0f36ecae26,2024-10-30T14:15:05.240000
CVE-2024-29177,0,0,00eb12a74167d5e48c93933c842de7dd3acad16859a229b4f4b9f9dbf8ef1749,2024-09-23T21:10:31.890000
CVE-2024-29178,0,0,22d635a1cbe75908c0019b5950f190aa3a6a7a13b04dc63306f00cc64a0a2d72,2024-09-10T13:59:42.720000
CVE-2024-29179,0,0,fe840eaf09e7a8e7dd10821c2db25070488ae9547e1cdb2c88feef71c243f949,2024-03-26T12:55:05.010000
@ -251716,8 +251716,8 @@ CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f4
CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000
CVE-2024-31146,0,0,b342a247282dd82cf1f52d9b8502d9aab215fbb81ba82cfea4edb5bd4cfeb6ee,2024-09-26T13:32:02.803000
CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
CVE-2024-31151,1,1,4af5a128b3f1c31d99168ffab664653577047d2bc396fe2a6d1bd0475c958864,2024-10-30T14:15:05.507000
CVE-2024-31152,1,1,9beeaa01ad59bc49ba6c24cd67029f0432f770b62b5dd1e2749c431ba923271d,2024-10-30T14:15:05.773000
CVE-2024-31151,0,0,4af5a128b3f1c31d99168ffab664653577047d2bc396fe2a6d1bd0475c958864,2024-10-30T14:15:05.507000
CVE-2024-31152,0,0,9beeaa01ad59bc49ba6c24cd67029f0432f770b62b5dd1e2749c431ba923271d,2024-10-30T14:15:05.773000
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000
CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000
@ -253101,7 +253101,7 @@ CVE-2024-32940,0,0,b139056212e274cc43b1d8561af3c4d12757c7b4882dc265ebef55266df1f
CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000
CVE-2024-32944,0,0,d0ec70387311640eb8535227f7e724b82fb2d27427be3369ff836aae4b979014,2024-10-29T15:35:25.073000
CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000
CVE-2024-32946,1,1,ecaee23cdc0940463e55e6289b98af2d22b2abaf868e06757ee200c672454daa,2024-10-30T14:15:06.033000
CVE-2024-32946,0,0,ecaee23cdc0940463e55e6289b98af2d22b2abaf868e06757ee200c672454daa,2024-10-30T14:15:06.033000
CVE-2024-32947,0,0,f4d3388d21b25a6b8abe5d47eaf1495f0195fc32275d8a68f778018af0164235,2024-04-24T17:16:50.397000
CVE-2024-32948,0,0,acdecd5f4ed0b407d74ae76d69c5bf1c1216a53f69bd869825d06aa6433de1ea,2024-04-24T13:39:42.883000
CVE-2024-3295,0,0,7e8dc8fb7d947b5fec16ad38c2014a5b0f40e3f43acfc4125c239589a9c410e5,2024-05-02T18:00:37.360000
@ -253499,7 +253499,7 @@ CVE-2024-3360,0,0,3109060f810d344d932ba41f8fde09186b8026142e7b2128910fcc2070ceab
CVE-2024-33600,0,0,02f564f9ce52bc11d27e3e1676100dcba6eaf4079faf69e72aa377dd994c6ac8,2024-07-22T18:15:03.417000
CVE-2024-33601,0,0,1e872276284c72121f6aaeefc175b69e15bd1ff785d0661b2fa91a7a25fea337,2024-07-22T18:15:03.493000
CVE-2024-33602,0,0,86deb6f1e6a3eb7f53cef6d50563acba68abbbbc8944080d8d45f1adacf78d24,2024-07-22T18:15:03.583000
CVE-2024-33603,1,1,5c5e35801a94aa9562e7796d018a5a81dc684755f9a5363944d51de5582c15a6,2024-10-30T14:15:06.330000
CVE-2024-33603,0,0,5c5e35801a94aa9562e7796d018a5a81dc684755f9a5363944d51de5582c15a6,2024-10-30T14:15:06.330000
CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877fcf5,2024-05-08T17:05:24.083000
CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000
CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000
@ -253511,9 +253511,9 @@ CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad4
CVE-2024-33620,0,0,e869b572e67eecaa04960c7c1c826ad66c9d71964f8469bf34eb9ac43afb5484,2024-08-13T20:35:09.233000
CVE-2024-33621,0,0,ed1eec35bbbbdea80d33a8bbcfc24d343e0426fb309b2aaa07ef1d5e8aa29271,2024-07-15T07:15:04.067000
CVE-2024-33622,0,0,d58465a4a66214b50b1796cf92386e687ba2dbe496bc818c44d1f85dc4a8973b,2024-06-20T12:44:01.637000
CVE-2024-33623,1,1,8e2ca3456dee23f4e80d6c36a39cd406a49062d0de431060b5d08967870b8751,2024-10-30T14:15:06.597000
CVE-2024-33623,0,0,8e2ca3456dee23f4e80d6c36a39cd406a49062d0de431060b5d08967870b8751,2024-10-30T14:15:06.597000
CVE-2024-33625,0,0,645afc1357c853e892786758021f6a244aedee60fe13b747d548e0f0fed77836,2024-05-16T13:03:05.353000
CVE-2024-33626,1,1,2401483dfda40e44456e017f9ca347173e74510b6fa5f9e1a0bdb29b99403627,2024-10-30T14:15:06.850000
CVE-2024-33626,0,0,2401483dfda40e44456e017f9ca347173e74510b6fa5f9e1a0bdb29b99403627,2024-10-30T14:15:06.850000
CVE-2024-33627,0,0,739561a300c8e0c5d6e0776600829ec1cdfa9e9832b6a16afdce5ca14d9efae0,2024-04-29T12:42:03.667000
CVE-2024-33628,0,0,0d9fc47e7881c845fcfb40059b0a2f57cf834a162fc7588e1c4ae872cfbfa8b5,2024-06-04T16:57:41.053000
CVE-2024-33629,0,0,0775f88facd47182375f04c11c9fb90160e0ba716118a2c83830fab26520359f,2024-04-29T12:42:03.667000
@ -253586,8 +253586,8 @@ CVE-2024-33695,0,0,496bc8a3b6cc06e0f2cb2ff5ef3180780eefdd07d63e68d063cf97ba79dd8
CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe731e7,2024-04-26T15:32:22.523000
CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000
CVE-2024-33698,0,0,757107609bb2e6f896c0b7f0b6fa39b8f34d961ef227f03387260ef6a53fe2d1,2024-10-08T09:15:10.463000
CVE-2024-33699,1,1,205a2265e8b1b78d62f5a185c0b575bad5ceb5ae6574c2d8dcf8edd222f149d4,2024-10-30T14:15:07.100000
CVE-2024-33700,1,1,1422c6c7bfee08f754883a7161782880572727416a93e95f58b7000bc2a4ada5,2024-10-30T14:15:07.460000
CVE-2024-33699,0,0,205a2265e8b1b78d62f5a185c0b575bad5ceb5ae6574c2d8dcf8edd222f149d4,2024-10-30T14:15:07.100000
CVE-2024-33700,0,0,1422c6c7bfee08f754883a7161782880572727416a93e95f58b7000bc2a4ada5,2024-10-30T14:15:07.460000
CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000
CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000
CVE-2024-3373,0,0,02bb0a6a8cf1c8cb960f2645d7165e4c706cc177e4cf5e50be0530bbf35b3163,2024-09-30T12:45:57.823000
@ -254321,11 +254321,11 @@ CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405db
CVE-2024-34662,0,0,a6658413d6b88b3373ec5926587f6541001b2a48e07597ea624b92716d312cdd,2024-10-10T12:57:21.987000
CVE-2024-34663,0,0,bc7e792d3bf9cb19b3bac7de5e5f393eda73c48981c29bad44b4305bf7709bc5,2024-10-10T12:57:21.987000
CVE-2024-34664,0,0,b864c4351ccbb106aca6a04f609ab07081f58539736f6b0a259450595fc32b90,2024-10-10T12:57:21.987000
CVE-2024-34665,0,1,8e97b696e2825593cef2b60bbd5fe842a775ccd597e31a6a3daa4e47d15b624a,2024-10-30T14:28:55.223000
CVE-2024-34666,0,1,6cfcd5416a4b2e4dab365ea618f0b912febb2265cdb4e40b3018629a4a8e18d8,2024-10-30T14:29:25.827000
CVE-2024-34667,0,1,4153f5003a432e9a26124ef302ffea502190e93ae8a76b1da92c9ef8947ba7e8,2024-10-30T14:29:42.627000
CVE-2024-34668,0,1,31c02ca4f03c2729dc2bf41e4274bbdaf5a6330d99aa4b0799e50f1bf3a3a356,2024-10-30T14:31:12.387000
CVE-2024-34669,0,1,39ca1a2b1d0114a86d10ab1e4c3a85b90ce6b0713b5d4c5991b51608f5fe4581,2024-10-30T14:22:47.337000
CVE-2024-34665,0,0,8e97b696e2825593cef2b60bbd5fe842a775ccd597e31a6a3daa4e47d15b624a,2024-10-30T14:28:55.223000
CVE-2024-34666,0,0,6cfcd5416a4b2e4dab365ea618f0b912febb2265cdb4e40b3018629a4a8e18d8,2024-10-30T14:29:25.827000
CVE-2024-34667,0,0,4153f5003a432e9a26124ef302ffea502190e93ae8a76b1da92c9ef8947ba7e8,2024-10-30T14:29:42.627000
CVE-2024-34668,0,0,31c02ca4f03c2729dc2bf41e4274bbdaf5a6330d99aa4b0799e50f1bf3a3a356,2024-10-30T14:31:12.387000
CVE-2024-34669,0,0,39ca1a2b1d0114a86d10ab1e4c3a85b90ce6b0713b5d4c5991b51608f5fe4581,2024-10-30T14:22:47.337000
CVE-2024-3467,0,0,cacb4fff60c492ce28d24c855ee87196a20d1b51cff8acadb6d43f71f0e4e429,2024-10-03T19:47:06.097000
CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61c6e,2024-10-10T12:57:21.987000
CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000
@ -254799,7 +254799,7 @@ CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf
CVE-2024-3548,0,0,d36c3da57ad232cab63cfe730b939da3d11ca9fb8353135fe3e907f711d131dc,2024-05-15T16:40:19.330000
CVE-2024-3549,0,0,0cde880e41c0c3ba557ce463b1ff0900f3f316d2ed3d6009897a715aae6e97e9,2024-06-11T13:54:12.057000
CVE-2024-35492,0,0,33aecacefd5370fcd53a7eb152d476421944d3120d3115b260ff90b817999987,2024-08-20T16:35:13.950000
CVE-2024-35495,0,0,f2b66f08d983d2d8551432de2a69b265edd788ca956eb42c244416a3e4518c04,2024-10-04T13:51:25.567000
CVE-2024-35495,0,1,444681b65907f601dc2fb6718ff6a9a46524dbc2dc6f97955af4c68af39cb4af,2024-10-30T15:35:10.887000
CVE-2024-3550,0,0,ac5bbd2b6bc618ed8d0d187264280ccbd8a80d9a5319faa69118b498969cb88c,2024-05-02T18:00:37.360000
CVE-2024-35504,0,0,e166404c83da3941ce306fedbcc958803779345d2352a83f02ebf499c8052277,2024-05-30T18:19:11.743000
CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c7707135,2024-05-17T18:36:05.263000
@ -255523,7 +255523,7 @@ CVE-2024-36307,0,0,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c71434269
CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c973c,2024-05-15T16:40:19.330000
CVE-2024-3632,0,0,b5152c6f3734461efaf203a246eaafe8ef0e2600523c2de907e61dd2f01c5bfc,2024-08-01T13:56:37.647000
CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26
CVE-2024-3634,0,0,5d02e3f893ea5650c3ad2b96f123134b624618fa357ff3bdcb3a7b4c93242ece,2024-05-15T16:40:19.330000
CVE-2024-3634,0,1,09c0f8e04a3455cab5ef2b14d0e5b955d12b537618764af3142f130e0a11271e,2024-10-30T16:35:16.890000
CVE-2024-3635,0,0,b778d7b498dcea7fa24c3ef8d2fdc2e16efa86aeebfac3bfee1e098824c6eea4,2024-10-02T14:30:24.627000
CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000
CVE-2024-36359,0,0,e2a4054af1c7293cd417470c34bfb1cad308864123ebeae9851a8bc28053ec60,2024-10-03T19:49:00.337000
@ -256328,7 +256328,7 @@ CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6
CVE-2024-37514,0,0,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000
CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000
CVE-2024-37519,0,0,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000
CVE-2024-3752,0,0,239ab2a4fa8a03a6a793fd7bad6c5508294cfd1be75f4ce013e63852e68d9c42,2024-05-06T12:44:56.377000
CVE-2024-3752,0,1,a5efb5effc0a5c4e1d6b4c1affd3679917ceb564b80faf8557eca4784ede510d,2024-10-30T16:35:17.613000
CVE-2024-37520,0,0,1cad459c20e2d875630bdc07513eda15868aad6421fe450388baf16c360c4642,2024-08-29T18:39:02.407000
CVE-2024-37521,0,0,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000
CVE-2024-37522,0,0,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000
@ -256612,8 +256612,8 @@ CVE-2024-37997,0,0,10214765491aa29b8c34faf22f5e8238fda623005890c9342516743753b6c
CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000
CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
CVE-2024-38002,0,1,a488a788ece9f6902fc8a3f89310aa3b40f556b69c0e0415157e9af8e5691ca8,2024-10-30T14:47:10.953000
CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
CVE-2024-38002,0,0,a488a788ece9f6902fc8a3f89310aa3b40f556b69c0e0415157e9af8e5691ca8,2024-10-30T14:47:10.953000
CVE-2024-3801,0,1,07aa9a9e6d81fba8cef5860d9c76583a9b904874d0e98aaaacf604b5d57dcd58,2024-10-30T16:35:18.490000
CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000
CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000
CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000
@ -257168,7 +257168,7 @@ CVE-2024-38616,0,0,f8c51d530c6963ad76ff0e210ba7c38d38abd039210c3919fbdb52eed1c6b
CVE-2024-38617,0,0,ce4bab86c0d0ce91f59ac9b5c7ba349b4b3e0e02c8ddb2628f883888d27c5934,2024-06-20T12:43:25.663000
CVE-2024-38618,0,0,ae9c5c1e7b66b53f2715f8c0cb125a244821a913e0d7107cdeae9e60621b4d80,2024-07-15T07:15:13.020000
CVE-2024-38619,0,0,2a0ae06dba9510c72cb1cc44a3a5a49b04cc3ac55ff0736a45ed86d4f80ea1ca,2024-07-05T08:15:03.343000
CVE-2024-3862,0,1,85139a0055cc9a392febd90de7f92e7784deddbacf9d89972703c5c7483218b7,2024-10-30T14:35:11.003000
CVE-2024-3862,0,0,85139a0055cc9a392febd90de7f92e7784deddbacf9d89972703c5c7483218b7,2024-10-30T14:35:11.003000
CVE-2024-38620,0,0,2b6dbacae4f898ce905a0a529ecd9c58074f5f76602dd0c9f75aadc92a8b09e9,2024-06-20T12:43:25.663000
CVE-2024-38621,0,0,2e9b7871659006d130fde15bed40ba30f741fd3871249588d5f3059423b9ae9e,2024-07-15T07:15:13.207000
CVE-2024-38622,0,0,e2962f5ea800316947cd592cef1842c6af7c2a172c1cd23c1a17c4be1f646576,2024-06-21T11:22:01.687000
@ -257573,7 +257573,7 @@ CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a08393
CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000
CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000
CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000
CVE-2024-3935,0,1,2abe17a6a3774b504ef50f7afcb77b95f7b5d9531682345c309be8796e77a788,2024-10-30T14:35:11.860000
CVE-2024-3935,0,0,2abe17a6a3774b504ef50f7afcb77b95f7b5d9531682345c309be8796e77a788,2024-10-30T14:35:11.860000
CVE-2024-39350,0,0,933f5cf4e1e8654d4184b998e6e3d84f4d423cc036a81e5a6851a5092c592ad5,2024-06-28T10:27:00.920000
CVE-2024-39351,0,0,9b4d39161319839f1a0a214dc211a28fd92f2da777165762a051c899eb88a499,2024-06-28T10:27:00.920000
CVE-2024-39352,0,0,2125967ac59376c4e2a4b0fc39ded99823f5fb5459f0421dba32eed656bdf603,2024-06-28T10:27:00.920000
@ -257943,7 +257943,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000
CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000
CVE-2024-3980,0,0,ca3511d7901d042fa00bfa9c0d0aa676b250ea6c77161bee8a48883714e5741d,2024-10-29T14:15:06.670000
CVE-2024-3980,0,1,c112ad3a9592e527e0da0797cc7aa917bbe565618aa427a8c29ee83d7bab28f6,2024-10-30T15:33:12.697000
CVE-2024-39806,0,0,707dfc0ddef50ef77e39ddae9dd446416de56337e997263c3f5b5e8fa232a33d,2024-10-16T16:49:41.507000
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000
@ -257954,7 +257954,7 @@ CVE-2024-39816,0,0,99e8d0f2ca7c7949ccc5b1fb01e67a6b8249c725e85c2220f31f36de7605b
CVE-2024-39817,0,0,da37b9dcdb041f40628bdd9732b2ecb73043147c99cfbf7acdec75950efdf2c1,2024-09-11T19:36:18.050000
CVE-2024-39818,0,0,060cae25a3d44b550fdd040c9993a800c9e0d5e1283fe900d463907d0567c6f8,2024-09-11T13:27:30.923000
CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000
CVE-2024-3982,0,0,2c1fd479e7699ecf469abfee8d6518a9d65222765727c23ebb6f762db081a48f,2024-08-28T16:30:50.080000
CVE-2024-3982,0,1,6ab9b53d4a58c1bf71f942b6bcb5c49bc959baba81f92d15e8f83b5fc0f8152f,2024-10-30T15:32:23.680000
CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000
CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000
CVE-2024-39822,0,0,89aeba217fe888961e59273bc198a6d383f528aef9e342f9ebf06b5dc5cc7454,2024-09-04T21:28:37.727000
@ -258348,7 +258348,7 @@ CVE-2024-4074,0,0,e0d606c18d1f193dcf25e2a451ef5a2bdfc69d8e090f30f7431f35132ae93a
CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c8c5,2024-07-12T16:12:01.927000
CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000
CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000
CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000
CVE-2024-40743,0,1,1ca5c18a4f8e370309e54e9979f8748e30571bbf531892fd8ed83274cf09559a,2024-10-30T15:35:12.210000
CVE-2024-40746,0,0,eead0b50026ce20d26effd54607d8bf55992b18b9630c4426d5bb7acadcc3473,2024-10-29T15:34:22.100000
CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
@ -258357,7 +258357,7 @@ CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d
CVE-2024-40761,0,0,04b56637ed1b4ee2d83e39ba88cb3e446c0c66fca89659ba993cbe8999f96ded,2024-09-26T13:32:02.803000
CVE-2024-40764,0,0,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000
CVE-2024-40766,0,0,9ffdda3005aa6c238f823c6e65a3a89594c21a379fd17878a86615d17b31de27,2024-09-16T19:48:30.827000
CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
CVE-2024-40767,0,1,41a668ec3a3d9108df95a63cfc1397e92444c792025e20527bb6192adab7ddba,2024-10-30T15:35:12.440000
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
CVE-2024-40770,0,0,a0184ec6f6517bc414460e13ef7b4dae6b47fe9304d99403525f52de9ec9d9c3,2024-09-24T14:55:38.737000
CVE-2024-40774,0,0,f727e8aeb5baa126b4b2412fe1a51e0fe6f28b6a0195e382f8e2cfe4c9297314,2024-10-28T21:35:14.033000
@ -258376,11 +258376,11 @@ CVE-2024-40785,0,0,0ebfce5c55bfee438659b0a5ff21c26489a17105755c9acc95a453360d4cf
CVE-2024-40786,0,0,1d5a22dc485257f61ad56f387446230ed28d8c6d76c2d4bb7e66185337af2307,2024-08-15T16:44:31.820000
CVE-2024-40787,0,0,e7872c59114f8bc6e1d61059bacac8cf94d2c897fdc9c325ee9cdaea3ebeeed2,2024-08-26T17:47:24.847000
CVE-2024-40788,0,0,e37f9cfa39fdb648ce78db53ddf485c5cf3db09885741b13a44f173dcb0901e4,2024-10-27T01:35:10.487000
CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9acdf,2024-08-23T15:38:01.380000
CVE-2024-40789,0,1,3602e32e7b4902ad10b1f750ee1eea33948cb5d6d1874e478f20149ceaf89da5,2024-10-30T15:35:13.230000
CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000
CVE-2024-40790,0,0,f74af1b6450b7abb69693b13c877ce53db126e23128080b9a116672c6aa27da8,2024-09-23T22:55:36.537000
CVE-2024-40791,0,0,1462bf4b5845ed6535d6a4bb5a36a3a889e0ddd7f70e74baa361a7ba6c70fe5c,2024-09-24T15:44:24.397000
CVE-2024-40792,0,0,a2585380a94744be6a95f288afe3479213e76d2dc54ce4f58c8ac2539e20051b,2024-10-29T17:28:34.383000
CVE-2024-40792,0,1,5e64c5a9ebd88a63372b8138e0e1226bf6f7a3505f73897b84f2b3055775dd49,2024-10-30T16:35:18.823000
CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000
CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000
CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000
@ -258423,7 +258423,7 @@ CVE-2024-40830,0,0,ca7776e0c74cfd2ad6a11e7b11560ae15ef0e22a367085df69798c9a30c56
CVE-2024-40831,0,0,99c2265cb4d2ae896b91e30bceb0318bce6f0816674b19fd0a8ff6533bf23346,2024-09-23T19:18:02.207000
CVE-2024-40832,0,0,0508ad5cde16d373df00450e2ce0c69eb3ff2fe39db1297b844b6503945a5cbf,2024-10-29T21:35:11.120000
CVE-2024-40833,0,0,3b5bd8adb9200d22552753acbaa4168e91eb7a378a926cf5206f38e0cdca97aa,2024-10-27T01:35:11.700000
CVE-2024-40834,0,0,7e20f67bc8b08fc4adc47071793a554467422544bba4ba726067a06c6b9b9ed7,2024-08-23T14:40:52.523000
CVE-2024-40834,0,1,cbaf51bbf3e70fb46e2d22d974c0fb2ca3cf811ec9acb1b99d8a954817a080a2,2024-10-30T15:35:14.080000
CVE-2024-40835,0,0,ffa2d0f502e7a09e89b4898498fc215520bfece3735d19b72358067234b3c222,2024-08-23T14:39:03.070000
CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe62dd,2024-08-01T13:58:15.220000
CVE-2024-40837,0,0,ccc4fbf4d07a48518f7fa02b46184c88d2b8e0a64ca26c4f8ffcf17903cd52b7,2024-09-23T18:50:16.050000
@ -258440,7 +258440,7 @@ CVE-2024-40847,0,0,ac34ef361fd419d2c48bb6c61015668892d59a23316cf5cdc2086e1759e39
CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d92f,2024-09-24T15:57:03.893000
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000
CVE-2024-40851,0,0,d166c2651cf2b1d0771f62424448f43af8bd64c88c74e8ac42bdfd1d1ad76720,2024-10-29T17:42:35.217000
CVE-2024-40851,0,1,2951b01099c450197931b2d3c9228abf645beafb747dcd3e2912599f5aa43484,2024-10-30T15:35:14.883000
CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000
CVE-2024-40853,0,0,8b571240b2aaeae983c05f75ab22f4e2c4695165f3df0121995d9ccc6e81c7ac,2024-10-29T20:35:25.610000
CVE-2024-40855,0,0,90f4bd8e2db22cf8648d6901c6c3a67ee009b99fe00cc69ba2463d3c3905a513,2024-10-29T17:42:18.573000
@ -260652,7 +260652,7 @@ CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd2598
CVE-2024-44072,0,0,c15ddc9cbc2cc106650a31089cdfd669f16d12a8ad25609c42818d1d63e1458b,2024-09-10T20:35:09.990000
CVE-2024-44073,0,0,de55f1c002ffa890fb79df1a9da58802af7cfd53cb9325cc406c6e277fabf47c,2024-09-06T17:35:17.523000
CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000
CVE-2024-44080,0,0,bf49fb6efb2f36ebb00f6a34470b5f1665cbac7bcb70e23281a110ded5ff0ab8,2024-10-29T22:15:03.633000
CVE-2024-44080,0,1,9bee276309c166c6facf28cf9cd30e5a6038b72ef2397f7e25826f1c9a81a8e6,2024-10-30T15:35:15.230000
CVE-2024-44081,0,0,07bf67c5a602c2a19603ce6d7abb6b6fa1f2ddcb8427e95085138a8c0cfb2a42,2024-10-29T22:15:03.730000
CVE-2024-44082,0,0,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000
CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
@ -260716,7 +260716,7 @@ CVE-2024-44155,0,0,bc69f7eda0ccc25d9ce40996abffd50dd53eb3f764e8a2b160a1b820e4079
CVE-2024-44156,0,0,c7b3823189e90823d63dfcd6d29d891ddc5936a4d7c2355696b7ee8e9b86261b,2024-10-29T17:33:51.597000
CVE-2024-44157,0,0,97a910630a3e98feb305f0a101a5c0c80098e87c8c858ed1c75250af3ffe7b5f,2024-10-27T02:35:03.400000
CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000
CVE-2024-44159,0,0,112c99577483027f4f4d46361803a0ef723bdb32f41c221ffcbe92ee2303dbad,2024-10-29T17:33:37.147000
CVE-2024-44159,0,1,7d179919ce785cd1c8cd21feada413b24fa5e3082c0fb76a2673925d4b5b996f,2024-10-30T16:35:19.750000
CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000
CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000
CVE-2024-44162,0,0,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000
@ -260730,8 +260730,8 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
CVE-2024-44170,0,0,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000
CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000
CVE-2024-44174,0,0,d2cb0e7ad84890f6139370595ba064d76537c6c7d2d5c9be0cdbe685157f9470,2024-10-29T17:33:16.540000
CVE-2024-44175,0,0,0805e9680cd4598d38e2619ed87e7fe43d1a4e74e8e872e4630253007f322a07,2024-10-29T14:34:50.257000
CVE-2024-44174,0,1,58e94ae286d7256e79f455f95122397c43bb1dbfdfda643ceb43c228c40a57d2,2024-10-30T16:35:20.507000
CVE-2024-44175,0,1,7afc5d4329ba4ebd4a317f125db3a537b10c67d1498a1deac5c91104e26a4bf4,2024-10-30T16:35:21.327000
CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000
CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000
CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000
@ -260751,7 +260751,7 @@ CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6ea
CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000
CVE-2024-44193,0,0,f17ea6ad74232cbfafb0dc23bcf4b401977d8786ab1d3a877fc57ebc775c3168,2024-10-04T13:50:43.727000
CVE-2024-44194,0,0,a903dcdde1fd9d3163ec05258db0160ebd2ed91097df8b113a89edcdc22938c4,2024-10-29T14:34:50.257000
CVE-2024-44196,0,0,b08bc757892408337b10d6ec5d606c09363a1579be4fa3f75b1eb90bab9bb059,2024-10-29T14:34:50.257000
CVE-2024-44196,0,1,28248fab8e27e7b89ddddaf6c4ec2fde647f72a4825e0a1f4e2461e08554e2da,2024-10-30T16:35:22.640000
CVE-2024-44197,0,0,e38e0235fcf85579dbe16d1dc7df7b31f0e5ecba2c502c313f48d42f4d4e4171,2024-10-29T14:34:50.257000
CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000
CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000
@ -260785,7 +260785,7 @@ CVE-2024-44251,0,0,406183b990c31e8b289d3648e898b17ee3f61e9384718d2bc8b02eb22ceb5
CVE-2024-44252,0,0,1f56156c1b3504c9e6ce29efa3aa1850aadb21fc5cc83f9d279e387e16772ccd,2024-10-29T14:34:04.427000
CVE-2024-44253,0,0,9dfc45ca17e6731fbad34191bc8c6dd082b2ad98644cfc4500dc83643e48425f,2024-10-29T14:34:04.427000
CVE-2024-44254,0,0,9ffc01c4a01fb0cf2dfa1b937b902fdcdac883a07b08df9e5c9982b891104dde,2024-10-29T14:34:04.427000
CVE-2024-44255,0,0,c293b56d90061943fca03b3c22094ae16c5cc4b9fe38c830f913fdf59fc5c0ed,2024-10-29T14:34:04.427000
CVE-2024-44255,0,1,946f5df35060c9db396726e4af4a963170f6b027f300a610055beb900a58e006,2024-10-30T16:35:24.113000
CVE-2024-44256,0,0,17aa03a2ed4c3fc9cc6050efee4584273e8e878058b24cc398dd2574b5d0db34,2024-10-29T20:35:29.053000
CVE-2024-44257,0,0,fbfaa04f8cbb781c7b5c9b4d7e31917aa6b40ea53153adf50b1bee22b30132a9,2024-10-29T20:35:29.240000
CVE-2024-44258,0,0,cc430542de7d98821c8b71a980b44111ab28852dadd6ee720ceb482eaccacf5c,2024-10-29T14:34:04.427000
@ -260797,30 +260797,30 @@ CVE-2024-44262,0,0,1e84b5b5e920ae0a5d39bb092052fca1937f3b656c20347fc26958279d316
CVE-2024-44263,0,0,a819848c86eae35a801a866c7cc8c7d5416433f8b99a5a8aa14e7494fd1ec8c4,2024-10-29T20:35:30.263000
CVE-2024-44264,0,0,373b827613c9a9c7f3a770e81e0fe9608c0c7e87e15a1473f6a79c0a693604a6,2024-10-29T14:34:04.427000
CVE-2024-44265,0,0,15fd2e5ab0bd9692c8b85fcbfa245a300e35e9c55661f38c9ca204f7cedba610,2024-10-29T14:34:04.427000
CVE-2024-44267,0,0,f5c2dfd9358b1edbc0f2868c6f458bbbeb2bb0f961b2dba9781285f6322034e4,2024-10-29T14:34:04.427000
CVE-2024-44267,0,1,db7d7d22b2d2ece8f2ca8d393f1769afda13d2beb2f2e94ff305ece63bb4168d,2024-10-30T16:35:26.040000
CVE-2024-44269,0,0,1c9a87340d5e4e82f40555347c8caadf6fa5b6f66b0f5a9614db97e3a7ef4b37,2024-10-29T14:34:04.427000
CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666b0,2024-05-30T13:15:41.297000
CVE-2024-44270,0,0,fa1da7541e315914d13db03404f7944f7fff55d48c82c634d2d8fa5d00e47e2f,2024-10-29T14:34:04.427000
CVE-2024-44270,0,1,b9dc04a4ca0dd5953d447e5de930be19747b99fec8fb45d55b8104ec62054d58,2024-10-30T16:35:26.390000
CVE-2024-44273,0,0,11a628ab450ae1f43cfd6e9012e9c8730804b871d63d3b05a279a1370eed85aa,2024-10-29T14:34:04.427000
CVE-2024-44274,0,0,7042f1a17d79ad7857d5d12b1176335958b275fae27c4e0945876e2b01ab9aec,2024-10-29T14:34:04.427000
CVE-2024-44275,0,0,d8e06bb43c158fcc4281797d1ccceef0155ebbbf771c23024f0bfd1184657b41,2024-10-29T19:35:17.777000
CVE-2024-44277,0,0,61d2c2a1458817cc145742f3d2eca621b243ba7bf6807dd615d1ca055f76ebe4,2024-10-29T21:35:17.737000
CVE-2024-44278,0,1,6a7f9872d82db0bbf03957c1afd6ecbea3f2f06c40db6f23a06b217454e0d632,2024-10-30T14:35:12.077000
CVE-2024-44279,0,0,3d3d2782cf38cfbab9143a09adbd7eeae67209432aad5b737f58221076c4a8cf,2024-10-29T14:34:04.427000
CVE-2024-44278,0,0,6a7f9872d82db0bbf03957c1afd6ecbea3f2f06c40db6f23a06b217454e0d632,2024-10-30T14:35:12.077000
CVE-2024-44279,0,1,46b4a70284608cd623dce4bf8f315595524d7e7caa51dbade793fd08dea3ec38,2024-10-30T15:35:16.063000
CVE-2024-4428,0,0,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000
CVE-2024-44280,0,0,21de8a35b7363cadebf78d71c9679cbfa65e9991e7a3abe607be7008a71fbb5f,2024-10-29T14:34:04.427000
CVE-2024-44280,0,1,3c88d828a58a14a85e8e2703993f405717fc468f11000fa1c0be5028b7b08202,2024-10-30T15:35:17.173000
CVE-2024-44281,0,0,836ebb72fd4fec7a9d20e240194eb06c62bd346b60d324b256da0dcc1d64341f,2024-10-29T14:34:04.427000
CVE-2024-44282,0,0,0d2af15e3522707d977fe4bc740af92cf6ebf4241f16cee27277cbdffe06cb5d,2024-10-29T21:35:17.953000
CVE-2024-44283,0,0,3ac88c7ddb1fed650f2454e0ae10df8bc4c84ca583c6c661ebf37603888b15af,2024-10-29T21:35:19.207000
CVE-2024-44284,0,0,aafaa862d706f7d4aa62b9578549e88ea4f6c2a4a88cff4811eff309dbf54c3e,2024-10-29T21:35:20.070000
CVE-2024-44285,0,1,165dc42a02262c5425e1d7b749becd46b90cc524a173f56e70ab7173cb3084f2,2024-10-30T14:35:12.353000
CVE-2024-44285,0,0,165dc42a02262c5425e1d7b749becd46b90cc524a173f56e70ab7173cb3084f2,2024-10-30T14:35:12.353000
CVE-2024-44287,0,0,4b2b7e8101daf580110e865664d09e9b8e738d0759f08414f92a6a6cfd3889a2,2024-10-29T14:34:04.427000
CVE-2024-44289,0,0,95b7ed6d214067d4cbde2ea5a535523545f584614d824c4c4e1d05bd792af21f,2024-10-29T20:25:47.537000
CVE-2024-44289,0,1,39f2c304e535f897d30f0fda10654e4d803aee074158bd870b6d7fbf5cd0aed5,2024-10-30T16:35:28.097000
CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000
CVE-2024-44294,0,0,59fc3334cee0c3e9631e7e6a5312e3c47084303bd875a30b037f9e38f2893ed1,2024-10-29T21:35:21.347000
CVE-2024-44295,0,0,fb98babf34b319b0a2af419c6d70bf7de5dce9049e181af2638c884d22361b7b,2024-10-29T21:35:21.523000
CVE-2024-44296,0,0,a3997d33b299dc7244f17105307e9c189658ff2f95560c9d030e9921803847f6,2024-10-29T23:15:03.770000
CVE-2024-44297,0,0,a2d7fdd78fa61e8c5def00a5081796bfd5f69bbe7fba009315ee29ab843f149e,2024-10-29T20:23:37.967000
CVE-2024-44296,0,1,8a3539d8b1a8455313f180197289b9017621c597386d505523693a7de422292c,2024-10-30T15:35:17.433000
CVE-2024-44297,0,1,79b1a7724e5e5ef3ea1a90918f341220daf2a3cd7bb65b3a989c955fd834b7c9,2024-10-30T15:35:17.777000
CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000
CVE-2024-44301,0,0,1947d3abeb8f3c617a953d82aff9239aa51a781f132c513eb9bd113e9e3104ce,2024-10-29T14:34:04.427000
CVE-2024-44302,0,0,135dd022b19581dad4cc89a6e95bc2764f06cd4002b60ed18a51aacb9b5fcb7d,2024-10-29T14:34:04.427000
@ -262572,7 +262572,7 @@ CVE-2024-47632,0,0,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a
CVE-2024-47633,0,0,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000
CVE-2024-47634,0,0,0db14a24577ad4cd4c39f4bd8ffd8db1b7fe5abb8b811c8dc32585acbe7b55c5,2024-10-22T18:46:02.253000
CVE-2024-47635,0,0,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000
CVE-2024-47636,0,1,a3c5fd8a893af234192301cc917defd8faccc1c54a6bcbd7ad791f7393b694ca,2024-10-30T14:32:17.523000
CVE-2024-47636,0,0,a3c5fd8a893af234192301cc917defd8faccc1c54a6bcbd7ad791f7393b694ca,2024-10-30T14:32:17.523000
CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986af60,2024-10-16T16:38:14.557000
CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000
CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000
@ -262797,10 +262797,10 @@ CVE-2024-47888,0,0,1ed854ade470bc163ad8c76031be0255e632797f8163938f76c7a31de7a78
CVE-2024-47889,0,0,661bf5d3df9343f9d9841050fa7811eba61ad27c7b6cfb90f97b1fd9293eaac0,2024-10-18T12:53:04.627000
CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000
CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000
CVE-2024-47901,0,0,d704813455e1853d397b949d37588631de40839c185052fa26e621bb2fa4e0cb,2024-10-25T12:56:36.827000
CVE-2024-47902,0,0,2e155c7d22a4c04970e17ece318ea189882cab29b016f1c35211ece78910a55b,2024-10-25T12:56:36.827000
CVE-2024-47903,0,0,11eeb678068db65750f6560e1f1159b69f531599ad94490f298388f196efb288,2024-10-25T12:56:36.827000
CVE-2024-47904,0,0,c161feef0618baec2e3776770bb2c41fedc6d33aa968f906cb7be80152b48818,2024-10-25T12:56:36.827000
CVE-2024-47901,0,1,351c2de719aa37343f5b8705371f6ea3811b8e193d3e2965a197dc16aa2632d5,2024-10-30T15:39:47.430000
CVE-2024-47902,0,1,2363b86854bd24a49201ca293fb87d24363aec990236fe9e9bf134a5daa38aeb,2024-10-30T15:48:39.207000
CVE-2024-47903,0,1,7e28902499cd69638cf23751436e57fbe15e705859d687d60c9f544fac8af41e,2024-10-30T15:54:34.647000
CVE-2024-47904,0,1,21b127b0effcb8b297c48dd7cd57e94387991d137ef282d6dd7cb6727add6e3b,2024-10-30T15:39:06.020000
CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000
CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000
CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000
@ -262870,7 +262870,7 @@ CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac
CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
CVE-2024-48063,0,0,190121b409a37a8b767c8f91205aef8b328a98739b130be5b2e53c5705abfdd7,2024-10-29T21:15:04.080000
CVE-2024-48063,0,1,f1898c32cb0d80af7ff886a74079ae648139d7f78816f6b5b345dcc6592ae313,2024-10-30T15:35:17.993000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000
CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000
@ -262878,11 +262878,11 @@ CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdad
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
CVE-2024-48107,0,0,b3b56031af4c83db1aa8c8b7592d603d12b933dd8dd7f5c4ea819744e41aed3a,2024-10-29T14:34:04.427000
CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000
CVE-2024-48119,0,1,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000
CVE-2024-48119,0,0,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
CVE-2024-48120,0,0,ac048d30db75e88feb91392efffb6e9bab5a19e9dc21f5cdbbca8a6a240da1c5,2024-10-29T20:57:53.360000
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
CVE-2024-48138,0,0,4009954e5c2c7bddd0ba9fe518d42b0a386ec055a41cedfba37c758aeaf4ed82,2024-10-29T22:15:03.810000
CVE-2024-48138,0,1,7066ba30968daa1d80e7eb0a2b4b354fd811d0b1bdb9289276d5694cb5caa2b4,2024-10-30T15:35:18.830000
CVE-2024-48139,0,0,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
CVE-2024-48140,0,0,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000
@ -262908,7 +262908,7 @@ CVE-2024-48195,0,0,3054a51a5210b07d7faf145209b3abc8afc3e28d4e10bf6f8fe8cb40d2a3b
CVE-2024-48196,0,0,d2cd7ad27e7af883e5b6f39983b5e91f258998d179c5a9da881899be449dd56d,2024-10-29T14:34:50.257000
CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000
CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000
CVE-2024-48206,0,0,07b0d55a74737ece87d6a1328bdeedf66c32a2ad363d4a43f48451c595d8cf04,2024-10-29T21:15:04.190000
CVE-2024-48206,0,1,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000
CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000
CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000
CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000
@ -263004,8 +263004,8 @@ CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f8
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000
CVE-2024-48572,0,0,a0c893dee31addf4f453f659711ee46559fea8a034b55d41880dbe6a13553ede,2024-10-29T22:15:03.913000
CVE-2024-48573,0,0,a138803d5152f4750b4a1cca44f938c5e123454129ead32e2816953ab104f300,2024-10-29T22:15:04.003000
CVE-2024-48572,0,1,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000
CVE-2024-48573,0,1,0a68f4420e4d1b58f44b6c5009b5c0eaf6abf127f60f5f3f3e548f76f67b8ebe,2024-10-30T15:35:21.227000
CVE-2024-48579,0,0,753bc89d80ce06ee02f1517d3e6d38134feb41965d0a3e14286b4761046c72e7,2024-10-28T13:58:09.230000
CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000
CVE-2024-48580,0,0,cecfbaeb166c1997f85eff468048926c1d6a76c932cf18638f27e79db1bfe914,2024-10-28T13:58:09.230000
@ -263053,7 +263053,7 @@ CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba4
CVE-2024-48712,0,0,26c5ef0ec7563b7eb021e1452100a4e706852158c36c374f8078b72afb6523b7,2024-10-16T17:35:04.483000
CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35eca,2024-10-16T17:35:05.450000
CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000
CVE-2024-4872,0,0,8b2c6820c717681d25c56a744060fc3e2d72667acf04ef8505ca37b89fed7638,2024-10-29T14:15:07.950000
CVE-2024-4872,0,1,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000
@ -263143,12 +263143,12 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5
CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000
CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
CVE-2024-48955,0,0,c96a5ce1c87b3d5a9b2b4d5d855b7232ba502145857e0669df496ee4162c9fc6,2024-10-29T18:15:05.690000
CVE-2024-48955,0,1,6a753515eadee4efaaa9ce7d086aaac0fd1d1f88a870f6a34578f374c110a15f,2024-10-30T15:35:22.063000
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
CVE-2024-48963,0,1,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000
CVE-2024-48964,0,1,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000
CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000
CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000
CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000
@ -263180,8 +263180,8 @@ CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c6
CVE-2024-49208,0,0,3a58d346a6ade89e8c0020a10a544403e4226ebcc2dc44aeebe9f12dc5b80439,2024-10-25T20:18:20.550000
CVE-2024-49209,0,0,7815188905707c2f76092b0250e46fa9658c3c02368a05bd7a2ebfc97747dcec,2024-10-25T20:17:36.353000
CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000
CVE-2024-49210,0,0,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000
CVE-2024-49211,0,0,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000
CVE-2024-49210,0,1,fede0e1b09388373fa08476821abad3fe0da120473a4d4b6dc058c6031c67944,2024-10-30T16:13:12.307000
CVE-2024-49211,0,1,5a695ee7d767f52160012b95bd74c374d22d486a496c62fb284212334663087a,2024-10-30T16:08:23.040000
CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000
CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
@ -263706,9 +263706,9 @@ CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7
CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000
CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000
CVE-2024-50067,0,0,24c4c2a9f57cbbf60955a0b70b9105797845f089603805c65d417718be190cc3,2024-10-29T16:30:44.217000
CVE-2024-50068,0,0,fa1ea3e6f599930bfb2d31adb8599332b75a045a05a427c5acbfef84f36f4dea,2024-10-29T14:34:04.427000
CVE-2024-50069,0,0,e0d06dfcabcc31158b42dd1756b72698f3ce1bc24c6ee15265e842e9564c6424,2024-10-29T14:34:04.427000
CVE-2024-50070,0,0,18255d00f69620f2a638568afe228ad3578ea04a84acf63eb1e68ce68ed74c13,2024-10-29T14:34:04.427000
CVE-2024-50068,0,1,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000
CVE-2024-50069,0,1,f0efb37fce406b5577ae6affb711463f72093df862fef1ce6ec787e41a622262,2024-10-30T16:58:19.983000
CVE-2024-50070,0,1,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d64b,2024-10-30T16:59:39.013000
CVE-2024-50071,0,0,62707d07bb4d39afcfce746e848fc0ec2081f01347fce6c0d69c478aa69fbee9,2024-10-29T14:34:04.427000
CVE-2024-50072,0,0,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000
CVE-2024-50073,0,0,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000
@ -263719,14 +263719,14 @@ CVE-2024-50077,0,0,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299
CVE-2024-50078,0,0,edfd843daaab21e8f3881bc9f52685650308d1e7e15f322d52dbb99d6ddc0e3a,2024-10-29T14:34:04.427000
CVE-2024-50079,0,0,86e00e39a4c6f4df698328fa6af74ef3f8403f4eb5813cad15aa3ecbc54c0116,2024-10-29T14:34:04.427000
CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000
CVE-2024-50080,0,0,b30143addf096230090c103659efad2d89f35cfe5d0ae20511cc4ad130fbd073,2024-10-29T14:34:04.427000
CVE-2024-50081,0,0,4a716ec09fe3b7525e6ca3fc44a39dfce5c1bec47408b7be31dc943bdcd98f01,2024-10-29T14:34:04.427000
CVE-2024-50082,0,0,1aac9135fc440cb927bdd34817c9b125ae2db53fb07a95ac91cd63b20c0c1e06,2024-10-29T14:34:04.427000
CVE-2024-50083,0,0,fd94a2eeda3538db1b988576d10356ed0f22eab342d054a435bf2bf1d428df1d,2024-10-29T14:34:04.427000
CVE-2024-50084,0,1,5220042c35127404cd0f78170fda586bf2f27c4455dfe8faea9ee063c5a720d5,2024-10-30T14:56:07.497000
CVE-2024-50085,0,1,a57d9cdadbbc5cf4e1ca2a641bfe5ff538d06a7e75b6cba1f85d47ffcf3a24b8,2024-10-30T14:49:42.953000
CVE-2024-50086,0,1,4899fd1fcdb0e30e29828cc31e053f57e8ba7925a7a6cc27c5825af59bd564e5,2024-10-30T14:46:09.080000
CVE-2024-50087,0,1,d932d9a6f4bd94c5995e2295fafce534f1c32d33268701370882a6d9c7fefc9a,2024-10-30T14:40:16.377000
CVE-2024-50080,0,1,fb0a9233976006e31e13d528210f2a875fd57a1186630aa7b33ed2c9b62b05db,2024-10-30T15:54:17.967000
CVE-2024-50081,0,1,ff287bf6aa891e3d3993ac2c1de15bdf3f0c65db0dd3e9d23543b30a892b930d,2024-10-30T15:45:39.047000
CVE-2024-50082,0,1,a4dcbd09b14dbc1fca6632f76d6b2dd6f5882ab966fd9496307593f81c7c2e4e,2024-10-30T15:44:05.180000
CVE-2024-50083,0,1,bb1d270756f6cf1c77db32b44ebc17c8b18ec1e069dec30590ec1ad0e71318f5,2024-10-30T15:07:02.577000
CVE-2024-50084,0,0,5220042c35127404cd0f78170fda586bf2f27c4455dfe8faea9ee063c5a720d5,2024-10-30T14:56:07.497000
CVE-2024-50085,0,0,a57d9cdadbbc5cf4e1ca2a641bfe5ff538d06a7e75b6cba1f85d47ffcf3a24b8,2024-10-30T14:49:42.953000
CVE-2024-50086,0,0,4899fd1fcdb0e30e29828cc31e053f57e8ba7925a7a6cc27c5825af59bd564e5,2024-10-30T14:46:09.080000
CVE-2024-50087,0,0,d932d9a6f4bd94c5995e2295fafce534f1c32d33268701370882a6d9c7fefc9a,2024-10-30T14:40:16.377000
CVE-2024-50088,0,0,828e69b5de052dd08d7caf34940c2f4feb712b819955838e907f99359e0b0c88,2024-10-29T14:34:04.427000
CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000
CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000
@ -263753,9 +263753,10 @@ CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc5
CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000
CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
CVE-2024-50344,1,1,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000
CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000
CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000
CVE-2024-50353,1,1,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000
CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
@ -263775,6 +263776,7 @@ CVE-2024-50414,0,0,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6
CVE-2024-50415,0,0,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000
CVE-2024-50416,0,0,d6fa8ee755917351e975e2572b208d1eff8656e05d108ea493511ed3f6bbfdc0,2024-10-29T16:02:10.660000
CVE-2024-50418,0,0,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000
CVE-2024-50419,1,1,d5e1d88e0d77245c4f86e43f425967a0a1eba5d52f9c69ee2ce122923f3c0b76,2024-10-30T15:15:19.360000
CVE-2024-5042,0,0,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000
CVE-2024-50420,0,0,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000
CVE-2024-50421,0,0,98ac1ae0ba7f04515a38743b156e0486e07d82e9611d46b2b591ba50ee1df54e,2024-10-29T22:15:04.083000
@ -263964,18 +263966,18 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed4992761,2024-10-17T18:32:52.030000
CVE-2024-51257,1,1,eece05a402ce76d5ded55a21d6501dba04a748576609d38af348b0eacc64d65e,2024-10-30T14:15:08.267000
CVE-2024-51257,0,1,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000
CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000
CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000
CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000
CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000
CVE-2024-51296,1,1,9a7705564b8add589868e87f6c09742274a494117c21f47f3822fe4837d98ba4,2024-10-30T14:15:08.337000
CVE-2024-51298,1,1,05fa9142c54df0707915a358799bf8eecf0f03e625b25def0304a9b6e67499e9,2024-10-30T14:15:08.430000
CVE-2024-51299,1,1,0ece1b0e7724506cb420cc3f500f40feedfa43a88dc890c970e5a78188a1d1c7,2024-10-30T14:15:08.510000
CVE-2024-51296,0,0,9a7705564b8add589868e87f6c09742274a494117c21f47f3822fe4837d98ba4,2024-10-30T14:15:08.337000
CVE-2024-51298,0,1,514609b543458b7816356ece778427649461627c080a99a1f018491e8c0ee256,2024-10-30T16:35:29.790000
CVE-2024-51299,0,0,0ece1b0e7724506cb420cc3f500f40feedfa43a88dc890c970e5a78188a1d1c7,2024-10-30T14:15:08.510000
CVE-2024-5130,0,0,08201be0ef3110b3d4a5f221adfbbc30fa234732006b6518b80f0c4870c61cea,2024-10-03T16:57:19.050000
CVE-2024-51300,1,1,dff9a18c0cf0e0e8d43d69d02b2ea90ae97f80e734a42b72bdbadbdca5040ffb,2024-10-30T14:15:08.597000
CVE-2024-51301,1,1,adcc4888ae1a374ea5d952bb92f163ccfdc7b4babdc622c47d76013d87115f75,2024-10-30T14:15:08.680000
CVE-2024-51304,1,1,1bf4a400847d4516ab1a63391d32e92aced542fd9a53ea834711c8bab078e83f,2024-10-30T13:15:14.360000
CVE-2024-51300,0,0,dff9a18c0cf0e0e8d43d69d02b2ea90ae97f80e734a42b72bdbadbdca5040ffb,2024-10-30T14:15:08.597000
CVE-2024-51301,0,0,adcc4888ae1a374ea5d952bb92f163ccfdc7b4babdc622c47d76013d87115f75,2024-10-30T14:15:08.680000
CVE-2024-51304,0,0,1bf4a400847d4516ab1a63391d32e92aced542fd9a53ea834711c8bab078e83f,2024-10-30T13:15:14.360000
CVE-2024-5131,0,0,e128e407b1f44dbf47d9ef9fd7ec5fd0648bd27c90b8180b437c118e29f83c77,2024-10-03T16:59:22.137000
CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
@ -263983,7 +263985,7 @@ CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51378,0,0,4f89f5750705f49e58348ee105ef2d84da67621b9e5eeaa07aa16746bdeb6aef,2024-10-30T00:15:03.213000
CVE-2024-51378,0,1,f6b847436d6454318a22bddb787fe79bac14b8796ff39c09e4001e54682664f0,2024-10-30T15:35:23.600000
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000
@ -264004,8 +264006,8 @@ CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2
CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000
CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000
CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000
CVE-2024-51567,0,1,e7505ae3358d66960630383be47fb6ddc4035689f49b6ef72a3dcdc49e767450,2024-10-30T14:35:14.933000
CVE-2024-51568,0,1,ad9515ac8c61f410f67864bce41921abbf48528c73d6a5ad446656424928c9ef,2024-10-30T14:35:15.670000
CVE-2024-51567,0,0,e7505ae3358d66960630383be47fb6ddc4035689f49b6ef72a3dcdc49e767450,2024-10-30T14:35:14.933000
CVE-2024-51568,0,0,ad9515ac8c61f410f67864bce41921abbf48528c73d6a5ad446656424928c9ef,2024-10-30T14:35:15.670000
CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000
CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000
CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000
@ -264867,7 +264869,7 @@ CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ec
CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000
CVE-2024-6128,0,0,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000
CVE-2024-6129,0,0,2ff762b7cd1a3a05b9f7a7bf543ed96dfafb16d6f8890a34166ecd6ab87a1ddd,2024-09-20T19:21:03.763000
CVE-2024-6130,0,1,ae0cb2c7568b98f1703e3f4562fc397ce82bb0b8e8d698043f4393c1cf2bdb1e,2024-10-30T14:35:16.383000
CVE-2024-6130,0,0,ae0cb2c7568b98f1703e3f4562fc397ce82bb0b8e8d698043f4393c1cf2bdb1e,2024-10-30T14:35:16.383000
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
CVE-2024-6133,0,0,0fc28a92d2235a170f666cf1f2e7f51d9c2f637a1193a1e8d73b336fc781cd45,2024-08-13T01:18:26.570000
CVE-2024-6134,0,0,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dda9,2024-08-16T17:35:11.413000
@ -264962,7 +264964,7 @@ CVE-2024-6232,0,0,df72d1f3465f3e86534783b85aee8c51cc91639c676c4fe966017792ca61cc
CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000
CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000
CVE-2024-6237,0,0,42d974b137e9f6fa213536980d088f395c1fe724ef5f0786bbfbf5436af83280,2024-08-29T18:15:14.947000
CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ffd0,2024-06-25T18:50:42.040000
CVE-2024-6238,0,1,ed9c2d1c6c6b7ce98df1d438dedd8db9b89c4dbb8c302ebc32aa84b1d702412d,2024-10-30T16:35:29.987000
CVE-2024-6239,0,0,331baa2e2a54956b72059cf6f370c174a3a7f88f365f410b1d7435c4cb7f3fbb,2024-09-18T09:15:05.803000
CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000
CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000
@ -265198,7 +265200,7 @@ CVE-2024-6505,0,0,2472b280b959c45a84076dc8298b1f0ea15132bfdd2f045bf3ab100aab446d
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000
CVE-2024-6508,0,0,83afbbb0c300c926d75e43d120f11132485b3123bc7f3e14a9e5aa056ca1afd1,2024-10-30T11:15:15.220000
CVE-2024-6509,0,1,27d19b5dc195679611ad719034a0909bff9feb2ed06b67e9190999b50f1ffdd8,2024-10-30T14:35:17.297000
CVE-2024-6509,0,0,27d19b5dc195679611ad719034a0909bff9feb2ed06b67e9190999b50f1ffdd8,2024-10-30T14:35:17.297000
CVE-2024-6510,0,0,5e8ec1aef4696d364d1cf0507192e6236a7f19c30decdfeea7966d96cda0feda,2024-10-02T17:17:46.450000
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
CVE-2024-6512,0,0,906938fa7a056c51f95f91dd79dd34ac36ca181a28b11365ac04b0f9d5c62236,2024-10-01T16:36:43.733000
@ -265328,7 +265330,7 @@ CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c
CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000
CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000
CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000
CVE-2024-6657,0,0,f7bfb8c7f988c02efa056f01906af1e9b4c649c510ad07863c97de37a1ac514c,2024-10-15T12:58:51.050000
CVE-2024-6657,0,1,05c0e312b6717337b62bbde27360a3cb75d1b987b144a353d64d592acfd9d308,2024-10-30T15:15:19.877000
CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000
CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000
@ -265430,7 +265432,7 @@ CVE-2024-6776,0,0,3f1ebb6e9dceea367fad64f14a324a2ed3be61cc5710cd237dd667a1644d55
CVE-2024-6777,0,0,ca29db0995c8af0d3bc27804bd1f135839d6af869a949f56fbd75929b6968b0d,2024-08-01T14:00:41.267000
CVE-2024-6778,0,0,84b088ec3020aa8ff5e55451d795a5507972d54955d86abc44832d806c764933,2024-08-01T14:00:42.093000
CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b9702520701b,2024-08-01T14:00:42.927000
CVE-2024-6780,0,1,1eae51b7c5e34681d53ddb7bafc670b27cd3eb74ad781e859c5982fedfd46394,2024-10-30T14:35:18.040000
CVE-2024-6780,0,0,1eae51b7c5e34681d53ddb7bafc670b27cd3eb74ad781e859c5982fedfd46394,2024-10-30T14:35:18.040000
CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
@ -266221,7 +266223,7 @@ CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8f
CVE-2024-7755,0,0,ef971a5ecbec92118875058fb4e190fc41fb035586060e0897fad69139da7909,2024-10-18T12:52:33.507000
CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888de,2024-09-14T11:47:14.677000
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
CVE-2024-7763,0,1,18f4a84296d159e45e10b504f50d280ed71a4f30d1c38b23b2a54be7a715c7d0,2024-10-30T14:13:45.763000
CVE-2024-7763,0,0,18f4a84296d159e45e10b504f50d280ed71a4f30d1c38b23b2a54be7a715c7d0,2024-10-30T14:13:45.763000
CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000
CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000
CVE-2024-7772,0,0,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000
@ -266264,9 +266266,9 @@ CVE-2024-7818,0,0,a8a60252768c6bfc8071e3d171ec5ea550be85793d142018d723cdcbb9fdc2
CVE-2024-7820,0,0,c0453860ab9b7e75523d5974f7f62d77644e4cfdd4c296287f5b328e58fa219d,2024-09-27T18:08:48.757000
CVE-2024-7821,0,0,a6cbf4229b3ac9caad2c13358d94e9d25b2f946f0353199ff2ed2717953ff2a4,2024-09-04T10:15:03.553000
CVE-2024-7822,0,0,3e66fd0a5154ef0743417ad63783b1476c2b8be2ef3918498eb762e4c9c4ec06,2024-09-27T18:06:41.287000
CVE-2024-7824,0,1,5c4727f1de0c06b350100778e73537179ed539a3a2e3fc39df63c1a53323a713,2024-10-30T13:50:18.053000
CVE-2024-7825,0,1,b8f44d941e9c5335877f30a555e4e2e314b9c5bd3371221d44c83ba983c70a89,2024-10-30T13:49:58.980000
CVE-2024-7826,0,1,4d092d0632f4bb0086c696f146d78e9e364086f736ead2a7d67ad0cc152f38bc,2024-10-30T13:48:53.220000
CVE-2024-7824,0,0,5c4727f1de0c06b350100778e73537179ed539a3a2e3fc39df63c1a53323a713,2024-10-30T13:50:18.053000
CVE-2024-7825,0,0,b8f44d941e9c5335877f30a555e4e2e314b9c5bd3371221d44c83ba983c70a89,2024-10-30T13:49:58.980000
CVE-2024-7826,0,0,4d092d0632f4bb0086c696f146d78e9e364086f736ead2a7d67ad0cc152f38bc,2024-10-30T13:48:53.220000
CVE-2024-7827,0,0,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000
CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000
CVE-2024-7829,0,0,3634da4931045efa2221e4dd20ed9805c5f347e47423b6602d3467d4b2db62e9,2024-08-19T18:34:00.040000
@ -266366,7 +266368,7 @@ CVE-2024-7937,0,0,58f817c63d0d354ded52ec3007f0bc413c02bdd9e5e4a4484a57dcc393e994
CVE-2024-7938,0,0,05885971f29247a07809090893658b29d0c486ec3695696a5efeaad9575e9baa,2024-09-04T14:53:13.887000
CVE-2024-7939,0,0,1694bf433403f87f2893bf75dc39017446333f520bf502dae403d9f8dca4c12a,2024-09-13T07:15:06.990000
CVE-2024-7940,0,0,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000
CVE-2024-7941,0,0,f84a573c5184fa9f02bbf2be035433cf04406330bf9f18b5c31c6f416d5532c2,2024-08-28T16:09:03.693000
CVE-2024-7941,0,1,51b8d26737f71adb5ae5530acd71328d0aa0426f28a41276bd1870203243d487,2024-10-30T15:29:26.673000
CVE-2024-7942,0,0,10ad4e44439e447affdd92c4cf521f51989afe951a6ccfba24c688ebb8095c63,2024-09-03T20:39:07.790000
CVE-2024-7943,0,0,94f72e6ad51a66c5e4d9bb6076fffd725bc241265ce47f7b427b083f1491ead0,2024-09-03T20:35:23.587000
CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000
@ -266395,7 +266397,7 @@ CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829
CVE-2024-7973,0,0,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000
CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000
CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000
CVE-2024-7976,0,0,8ea67749dc2e0457db6f465664717bd53fa70c14a92a0f107f894d380039b546,2024-08-22T17:39:54.540000
CVE-2024-7976,0,1,5088084110cef04ed95fff38a405451653ecf97406b1b78dfc70a5e2f0f0fa75,2024-10-30T16:35:30.723000
CVE-2024-7977,0,0,7f96e9ae91564fe788773f7fc620ef26ab3a10a3c58ea5396e14a68a3ee2a8b8,2024-08-22T20:35:28.140000
CVE-2024-7978,0,0,32f4e05559c2808de89ac0caea53fb83c96439d90c95d7208a9711199924c25c,2024-10-29T20:35:44.730000
CVE-2024-7979,0,0,7197dd548ee44d45e84f2f2c61d6a52a80bd0fd2ed16f305497f42e667362bae,2024-08-26T15:13:19.383000
@ -266723,7 +266725,7 @@ CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae5
CVE-2024-8440,0,0,8dcfa58740a8b45172e18897b2d796d55a68f35b9034374864c3da0c6b77c079,2024-09-25T19:34:19.683000
CVE-2024-8441,0,0,0efac0f95475c5b753f85a6e07784bad0c26116c06bdd47c81e7d9e5f2143687,2024-09-12T21:53:43.387000
CVE-2024-8443,0,0,17e8697863032f9317d28c5eea98e22f13f55f27fe238e6efc059b214854b50f,2024-10-01T13:15:03.110000
CVE-2024-8444,0,1,13c2ceb7a5411c83a2510e0feab52decafe9feb98c83381f93a3363dddeb0381,2024-10-30T14:35:18.373000
CVE-2024-8444,0,0,13c2ceb7a5411c83a2510e0feab52decafe9feb98c83381f93a3363dddeb0381,2024-10-30T14:35:18.373000
CVE-2024-8445,0,0,a7f7ba812fc058686a7ce9617c544a5ef0aa1db28a47ee616a0e4041709a6c78,2024-10-01T06:15:02.650000
CVE-2024-8448,0,0,ae18a026c0067b7078869d24f3685b0421255cde0e4de17dbd7702d3e9741f7f,2024-10-04T15:07:22.160000
CVE-2024-8449,0,0,a8e7eabde222d61aae43a8862e23d72e8db76b0b518b635548832e684fcc6091,2024-10-04T15:08:22.733000
@ -267025,7 +267027,7 @@ CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775b
CVE-2024-8892,0,0,b5404a9c6df12d8f66b57eddda13f138d35d7b48bdd71ae1e8b3a805c49716e0,2024-10-07T17:10:26.673000
CVE-2024-8896,0,0,a0c605576448a2e11080223e5dd725b3d72b9db8a933f1d2fd38560e97af6299,2024-10-29T22:15:08.513000
CVE-2024-8897,0,0,73bf9affb964d11dd95d3adbb34f86a16b9ae0fd786e64b4bbd48b1e4387bb49,2024-09-25T19:49:02.493000
CVE-2024-8900,0,0,7e1ef63767445d80c050e52e96753e1c9a46fb23d2b1e0137f2a2c5bdcba53e3,2024-10-01T16:15:10.293000
CVE-2024-8900,0,1,d930082a3862c99b4e58aa6993c3377fe493c46938169528591b4cc486e72a25,2024-10-30T15:35:26.207000
CVE-2024-8901,0,0,c42abead2f721e44cbad55763c07a3fd24e0a842c194ee61580274699db985ca,2024-10-23T21:15:14.950000
CVE-2024-8902,0,0,e5dace8ff5577040ad4e028bf354543120981f772810138844b5cb4413778526,2024-10-15T12:57:46.880000
CVE-2024-8903,0,0,2ce54562e46551a15b98a64a6437d41656e447939ac76ef855f5d59decf764b8,2024-09-26T13:32:55.343000
@ -267077,7 +267079,7 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4
CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000
CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000
CVE-2024-8980,0,1,34622dfc36a70206b20752d1026a226663789c42eaaff2958041a445f566dbba,2024-10-30T14:46:14.127000
CVE-2024-8980,0,0,34622dfc36a70206b20752d1026a226663789c42eaaff2958041a445f566dbba,2024-10-30T14:46:14.127000
CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000
CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
@ -267263,7 +267265,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f
CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000
CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000
CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000
CVE-2024-9287,0,0,01199c404d57b1e8eecbc65367d66af6a025095a110abc1f609ce03c8e993fb9,2024-10-23T15:12:34.673000
CVE-2024-9287,0,1,0f86ab1cffe327e8f075f779612d5e540dfae80c2e1ed7753f609a96564d1250,2024-10-30T16:15:05.100000
CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000
CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000
CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000

Can't render this file because it is too large.