diff --git a/CVE-2021/CVE-2021-225xx/CVE-2021-22518.json b/CVE-2021/CVE-2021-225xx/CVE-2021-22518.json index f022945c107..d833f53abc0 100644 --- a/CVE-2021/CVE-2021-225xx/CVE-2021-22518.json +++ b/CVE-2021/CVE-2021-225xx/CVE-2021-22518.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22518", "sourceIdentifier": "security@opentext.com", "published": "2024-09-12T13:15:08.553", - "lastModified": "2024-09-12T18:14:03.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:49:36.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:identity_manager_azuread_driver:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.4.0", + "matchCriteriaId": "C57A87C2-4CA8-4A2E-8820-603370CBFACA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/identity-manager-48-drivers/AzureADDriver514/data/AzureADDriver514.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2010.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2010.json index 6c6692c917c..a99a96a4877 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2010.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2010", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-09-12T09:15:05.210", - "lastModified": "2024-09-12T12:35:54.013", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:52:09.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ { - "source": "iletisim@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tebilisim:v5:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2", + "matchCriteriaId": "88A0FCA1-84AB-447F-96E7-7F7CCDEFD8CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-1456", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38813.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38813.json index 2e720ea1d12..a38da1c1c57 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38813.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38813", "sourceIdentifier": "security@vmware.com", "published": "2024-09-17T18:15:04.127", - "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:59:52.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@vmware.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-273" + } + ] + }, { "source": "security@vmware.com", "type": "Secondary", @@ -55,10 +85,215 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*", + "matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*", + "matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*", + "matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*", + "matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*", + "matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*", + "matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*", + "matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*", + "matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*", + "matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*", + "matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*", + "matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*", + "matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*", + "matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*", + "matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*", + "matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*", + "matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*", + "matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*", + "matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*", + "matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*", + "matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*", + "matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*", + "matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*", + "matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*", + "matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*", + "matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*", + "matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*", + "matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*", + "matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*", + "matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1e:*:*:*:*:*:*", + "matchCriteriaId": "1188E9D6-53AD-40D0-8146-3728D071008D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*", + "matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*", + "matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*", + "matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*", + "matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2d:*:*:*:*:*:*", + "matchCriteriaId": "89D5A7F9-3183-4EE7-828C-13BB9169E199" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45384.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45384.json index c4cffea0184..0b7cb6fd3a7 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45384.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45384", "sourceIdentifier": "security@apache.org", "published": "2024-09-17T19:15:28.100", - "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:57:30.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Vulnerabilidad de relleno de Oracle en la extensi\u00f3n de Apache Druid, druid-pac4j. Esto podr\u00eda permitir que un atacante manipule una cookie de sesi\u00f3n de pac4j. Este problema afecta a las versiones de Apache Druid 0.18.0 a 30.0.0. Dado que la extensi\u00f3n druid-pac4j es opcional y est\u00e1 deshabilitada de forma predeterminada, las instalaciones de Druid que no utilicen la extensi\u00f3n druid-pac4j no se ven afectadas por esta vulnerabilidad. Si bien no conocemos una forma de explotar significativamente esta falla, recomendamos actualizar a la versi\u00f3n 30.0.1 o superior que soluciona el problema y asegurarse de tener una contrase\u00f1a de cookie druid.auth.pac4j. segura como medida de precauci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.18.0", + "versionEndExcluding": "30.0.1", + "matchCriteriaId": "2C843588-2928-4CF9-BDA3-1867C8248EFC" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/gr94fnp574plb50lsp8jw4smvgv1lbz1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json index 0d901652e29..12cd2b273f0 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46805.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46805", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:13.707", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T12:58:59.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,116 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: corrige la sub\u00e1rbol de desreferenciaci\u00f3n waring. Comprueba el sub\u00e1rbol *amdgpu_hive_info que puede ser NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.167", + "matchCriteriaId": "11023E9B-B046-4BF0-AB48-269A0E833DDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.109", + "matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.50", + "matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.9", + "matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01cd55b971131b07b7ff8d622fa93bb4f8be07df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1940708ccf5aff76de4e0b399f99267c93a89193", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4ab720b6aa1ef5e71db1e534b5b45c80ac4ec58a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3f927ef0607b3c8c3f79ab6d9a4ebead3e35f4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f20d1d5cbb39802f68be24458861094f3e66f356", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json index 08ca98253b5..5f588f990b5 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46806.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46806", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:13.773", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:17:04.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Corrige la advertencia de divisi\u00f3n o m\u00f3dulo por cero. Comprueba el modo de partici\u00f3n y devuelve un error si el modo es inv\u00e1lido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.50", + "matchCriteriaId": "FAE86900-6239-4D0C-B6C0-70BF7C6BA610" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.9", + "matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1a00f2ac82d6bc6689388c7edcd2a4bd82664f3c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a01618adcba78c6bd6c4557a4a5e32f58b658cd1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d116bb921e8b104f45d1f30a473ea99ef4262b9a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json index 8910541b3f0..f6e45d67699 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46849.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46849", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:16.723", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:25:27.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: meson: axg-card: se corrige el problema 'use-after-free'. El b\u00fafer 'card->dai_link' se reasigna en 'meson_card_reallocate_links()', por lo que se mueve la inicializaci\u00f3n del puntero 'pad' despu\u00e9s de esta funci\u00f3n cuando la memoria ya est\u00e1 reasignada. Informe de error de Kasan: ===================================================================== ERROR: KASAN: slab-use-after-free en axg_card_add_link+0x76c/0x9bc Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff000000e8b260 por la tarea modprobe/356 CPU: 0 PID: 356 Comm: modprobe Contaminado: GO 6.9.12-sdkernel #1 Rastreo de llamadas: dump_backtrace+0x94/0xec show_stack+0x18/0x24 dump_stack_lvl+0x78/0x90 print_report+0xfc/0x5c0 kasan_report+0xb8/0xfc __asan_load8+0x9c/0xb8 axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card] meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils] platform_probe+0x8c/0xf4 really_probe+0x110/0x39c __driver_probe_device+0xb8/0x18c driver_probe_device+0x108/0x1d8 __driver_attach+0xd0/0x25c bus_for_each_dev+0xe0/0x154 driver_attach+0x34/0x44 bus_add_driver+0x134/0x294 registro_controlador+0xa8/0x1e8 __registro_controlador_plataforma+0x44/0x54 axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card] hacer_una_llamada_inicio+0xdc/0x25c hacer_m\u00f3dulo_inicio+0x10c/0x334 cargar_m\u00f3dulo+0x24c4/0x26cc m\u00f3dulo_inicio_desde_archivo+0xd4/0x128 __arm64_sys_finit_module+0x1f4/0x41c invocar_llamada_al_sistema+0x60/0x188 el0_svc_common.constprop.0+0x78/0x13c hacer_el0_svc+0x30/0x40 el0_svc+0x38/0x78 el0t_64_sync_handler+0x100/0x12c el0t_64_sync+0x190/0x194" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "6.1.111", + "matchCriteriaId": "2C9A750A-3F42-46E2-BCB0-A2C65765F885" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.52", + "matchCriteriaId": "02ADDA94-95BB-484D-8E95-63C0428A28E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.11", + "matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", + "matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4f9a71435953f941969a4f017e2357db62d85a86", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d318166bf55e9029d56997c3b134f4ac2ae2607", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e1a199ec31617242e1a0ea8f312341e682d0c037", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e43364f578cdc2f8083abbc0cb743ea55e827c29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json index a2f6c8c0f25..c49efc7cddf 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46852", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:16.917", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:23:33.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dma-buf: heaps: Fix off-by-one in CMA heap fault handler Hasta que se agreg\u00f3 VM_DONTEXPAND en el commit 1c1914d6e8c6 (\"dma-buf: heaps: Don't track CMA dma-buf pages under RssFile\") era posible obtener un mapeo m\u00e1s grande que el tama\u00f1o del buffer a trav\u00e9s de mremap y omitir la verificaci\u00f3n de desbordamiento en dma_buf_mmap_internal. Al usar dicho mapeo para intentar fallar m\u00e1s all\u00e1 del final del b\u00fafer, el manejador de fallas del mont\u00f3n de CMA tambi\u00e9n verifica el desplazamiento de la falla contra el tama\u00f1o del b\u00fafer, pero obtiene el l\u00edmite incorrecto por 1. Corrija la verificaci\u00f3n del l\u00edmite para que no leamos el final de la matriz de p\u00e1ginas e insertemos una p\u00e1gina arbitraria en el mapeo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "6.1.111", + "matchCriteriaId": "563A1B92-D75A-4C6E-A32F-F1FC1B083DAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.52", + "matchCriteriaId": "02ADDA94-95BB-484D-8E95-63C0428A28E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.11", + "matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", + "matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/84175dc5b2c932266a50c04e5ce342c30f817a2f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e79050882b857c37634baedbdcf7c2047c24cbff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea5ff5d351b520524019f7ff7f9ce418de2dad87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb7fc8b65cea22f9038c52398c8b22849e9620ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json index ae470e05bfc..2fbf63ffca5 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46855", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:17.133", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:21:28.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,148 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nft_socket: corrige fugas de referencias de sk Debemos poner la referencia 'sk' antes de regresar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "6.1.111", + "matchCriteriaId": "38BA5548-84B3-43C2-8ACC-316C06F26D01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.52", + "matchCriteriaId": "02ADDA94-95BB-484D-8E95-63C0428A28E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.11", + "matchCriteriaId": "F5DB5367-F1F5-4200-B3B3-FDF8AFC3D255" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:4.19.76:*:*:*:*:*:*:*", + "matchCriteriaId": "C607B632-8B10-45EC-916D-3EB478DB885A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.2.18:*:*:*:*:*:*:*", + "matchCriteriaId": "E83877D6-7D24-4C23-A545-8C9FF1CBBDE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", + "matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1f68e097e20d3c695281a9c6433acc37be47fe11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33c2258bf8cb17fba9e58b111d4c4f4cf43a4896", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83e6fb59040e8964888afcaa5612cc1243736715", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b26ff7af8c32cb4148b3e147c52f9e4c695209c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json index 07b204015e2..afa04f56118 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47528.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47528", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-01T21:15:08.273", - "lastModified": "2024-10-01T21:15:08.273", + "lastModified": "2024-10-02T13:35:02.263", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Stored Cross-Site Scripting (XSS) can be achieved by uploading a new Background for a Custom Map. Users with \"admin\" role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger on load. This led to Stored Cross-Site Scripting (XSS). The vulnerability is fixed in 24.9.0." + }, + { + "lang": "es", + "value": "LibreNMS es un sistema de monitoreo de red de c\u00f3digo abierto basado en PHP/MySQL/SNMP. Se puede lograr el Cross-Site Scripting (XSS) Almacenado cargando un nuevo fondo para un mapa personalizado. Los usuarios con rol de \"administrador\" pueden configurar el fondo para un mapa personalizado, lo que permite cargar un archivo SVG que puede contener un payload XSS que se activar\u00e1 al cargar. Esto llev\u00f3 a la creaci\u00f3n de Cross-Site Scripting (XSS) almacenado. La vulnerabilidad se solucion\u00f3 en 24.9.0." } ], "metrics": { @@ -55,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8885.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8885.json new file mode 100644 index 00000000000..f98f4a5a3c9 --- /dev/null +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8885.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8885", + "sourceIdentifier": "security-alert@sophos.com", + "published": "2024-10-02T13:15:12.410", + "lastModified": "2024-10-02T13:15:12.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local privilege escalation vulnerability in\u00a0\n\nSophos Intercept X for Windows with Central Device Encryption 2024.2.0 and older\n\n allows writing of arbitrary files." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@sophos.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-alert@sophos.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1104" + }, + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20241002-cde-lpe", + "source": "security-alert@sophos.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json index 95d63b833dc..d6341ffc66b 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9316", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-28T20:15:02.280", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:29:29.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/cookie5201314/CVE/blob/main/sql2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.278820", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278820", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.412584", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json index 2e1b19d3825..ec809853dda 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9322.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9322", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-29T03:15:02.357", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:32:17.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:supply_chain_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "108E91A7-501F-4B6A-8B3E-94AE481A75A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mengcehn/CVE/edit/main/Supply-Chain-Management-in-php-sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.278826", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278826", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.413337", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json index 6c9b9ee1f8c..5532b1a0f23 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9326.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9326", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-29T08:15:02.547", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T13:33:16.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_shopping_portal:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6E358155-68C0-4C86-8359-49F37445DC44" + } + ] + } + ] + } + ], "references": [ { "url": "https://hackmd.io/@SeaWind/ryBv7CGCR", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.278830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.414058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json index 1f3460ea6cd..dca2e311187 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9327.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9327", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-29T11:15:11.083", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T12:57:17.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Lynn1236-cell/cve1/blob/main/sql3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278836", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278836", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.415469", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9429.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9429.json new file mode 100644 index 00000000000..a7b8ddf54ab --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9429.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9429", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-02T13:15:12.617", + "lastModified": "2024-10-02T13:15:12.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"from\" to be affected. But it must be assumed that parameter \"to\" is affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ppp-src/a/issues/23", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279049", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279049", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.416904", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 28d5b38fbe2..5798ae77b3a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-02T12:00:17.192533+00:00 +2024-10-02T14:00:19.010107+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-02T11:15:11.853000+00:00 +2024-10-02T13:59:52.887000+00:00 ``` ### Last Data Feed Release @@ -33,29 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264313 +264315 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `2` -- [CVE-2024-35293](CVE-2024/CVE-2024-352xx/CVE-2024-35293.json) (`2024-10-02T10:15:03.160`) -- [CVE-2024-35294](CVE-2024/CVE-2024-352xx/CVE-2024-35294.json) (`2024-10-02T11:15:10.780`) -- [CVE-2024-44017](CVE-2024/CVE-2024-440xx/CVE-2024-44017.json) (`2024-10-02T10:15:04.113`) -- [CVE-2024-44030](CVE-2024/CVE-2024-440xx/CVE-2024-44030.json) (`2024-10-02T10:15:04.340`) -- [CVE-2024-7558](CVE-2024/CVE-2024-75xx/CVE-2024-7558.json) (`2024-10-02T11:15:11.460`) -- [CVE-2024-8037](CVE-2024/CVE-2024-80xx/CVE-2024-8037.json) (`2024-10-02T11:15:11.690`) -- [CVE-2024-8038](CVE-2024/CVE-2024-80xx/CVE-2024-8038.json) (`2024-10-02T11:15:11.853`) -- [CVE-2024-8282](CVE-2024/CVE-2024-82xx/CVE-2024-8282.json) (`2024-10-02T10:15:04.537`) -- [CVE-2024-8505](CVE-2024/CVE-2024-85xx/CVE-2024-8505.json) (`2024-10-02T10:15:04.743`) +- [CVE-2024-8885](CVE-2024/CVE-2024-88xx/CVE-2024-8885.json) (`2024-10-02T13:15:12.410`) +- [CVE-2024-9429](CVE-2024/CVE-2024-94xx/CVE-2024-9429.json) (`2024-10-02T13:15:12.617`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `14` -- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2024-10-02T11:15:11.033`) +- [CVE-2021-22518](CVE-2021/CVE-2021-225xx/CVE-2021-22518.json) (`2024-10-02T13:49:36.837`) +- [CVE-2024-2010](CVE-2024/CVE-2024-20xx/CVE-2024-2010.json) (`2024-10-02T13:52:09.270`) +- [CVE-2024-38813](CVE-2024/CVE-2024-388xx/CVE-2024-38813.json) (`2024-10-02T13:59:52.887`) +- [CVE-2024-45384](CVE-2024/CVE-2024-453xx/CVE-2024-45384.json) (`2024-10-02T13:57:30.280`) +- [CVE-2024-46805](CVE-2024/CVE-2024-468xx/CVE-2024-46805.json) (`2024-10-02T12:58:59.767`) +- [CVE-2024-46806](CVE-2024/CVE-2024-468xx/CVE-2024-46806.json) (`2024-10-02T13:17:04.640`) +- [CVE-2024-46849](CVE-2024/CVE-2024-468xx/CVE-2024-46849.json) (`2024-10-02T13:25:27.163`) +- [CVE-2024-46852](CVE-2024/CVE-2024-468xx/CVE-2024-46852.json) (`2024-10-02T13:23:33.847`) +- [CVE-2024-46855](CVE-2024/CVE-2024-468xx/CVE-2024-46855.json) (`2024-10-02T13:21:28.780`) +- [CVE-2024-47528](CVE-2024/CVE-2024-475xx/CVE-2024-47528.json) (`2024-10-02T13:35:02.263`) +- [CVE-2024-9316](CVE-2024/CVE-2024-93xx/CVE-2024-9316.json) (`2024-10-02T13:29:29.813`) +- [CVE-2024-9322](CVE-2024/CVE-2024-93xx/CVE-2024-9322.json) (`2024-10-02T13:32:17.277`) +- [CVE-2024-9326](CVE-2024/CVE-2024-93xx/CVE-2024-9326.json) (`2024-10-02T13:33:16.530`) +- [CVE-2024-9327](CVE-2024/CVE-2024-93xx/CVE-2024-9327.json) (`2024-10-02T12:57:17.787`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a784168b5bc..668413d8692 100644 --- a/_state.csv +++ b/_state.csv @@ -168741,7 +168741,7 @@ CVE-2021-22514,0,0,8e3a075292032f763628c85554f5c2f69f3a2119c7d4d915625b0f6c61d01 CVE-2021-22515,0,0,d5d9c4633cb99577d00912a48205489b53f3ad8216660fc95e68df9cb4700418,2023-11-07T03:30:17.387000 CVE-2021-22516,0,0,360fc4a2a6473080797119cb4592870152572368993c6eb823854ef0d1d34fac,2023-11-07T03:30:17.613000 CVE-2021-22517,0,0,3f8db58a324ed832f25a5c30c02cf604eadc18ad7b27ab795858edb5dc2a1474,2023-11-07T03:30:17.900000 -CVE-2021-22518,0,0,936c9415d448fd88c6c07bbdc106eabb9a3b5dc9e8bb85b2de7de75dd351a06c,2024-09-12T18:14:03.913000 +CVE-2021-22518,0,1,acd34f301ba9976948f2f9b550897f9222567bb06cde603be998153c1ef6cdba,2024-10-02T13:49:36.837000 CVE-2021-22519,0,0,9e3616afe340966651f08a0581129e9a33a0208f1e92c7b863668a89efe71aaf,2023-11-07T03:30:18.160000 CVE-2021-2252,0,0,f732e389d5f0da8a27d20c1ea9b59e42162179f0f11af0391630f653380a4d63,2021-04-29T12:58:18.223000 CVE-2021-22521,0,0,520037ed9a82a64b433b975e996f24f9dc1e905547ecb64e14a0ed212673c8fb,2023-11-07T03:30:18.417000 @@ -243156,7 +243156,7 @@ CVE-2024-20087,0,0,2f5d7a31aa34aa82f766600cc0380d879410c6c21363c39a9c898fbc9d48e CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac946fe,2024-09-05T14:27:24.840000 CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 -CVE-2024-2010,0,0,aa8252b752543a7021f6ec665f991b01935989d11bbc2ce1d9d3c73d6ca240db,2024-09-12T12:35:54.013000 +CVE-2024-2010,0,1,b3d54c217418fe6eaac723aeeab2da7590ea8caf84d69dd0f5d6f2f7fff7952b,2024-10-02T13:52:09.270000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 @@ -253913,8 +253913,8 @@ CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71 CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000 CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000 CVE-2024-35292,0,0,e3b3d736ef0c9425797f6a5a9790b2cb56e0a53578005725786d8a247ceee1f2,2024-06-11T13:54:12.057000 -CVE-2024-35293,1,1,a4e22fa188a744e9f6058246215df53e4473ae5b974108a643304f236afa6173,2024-10-02T10:15:03.160000 -CVE-2024-35294,1,1,9675f5fe061cf93b001295068f23890f2e1a548578cdf9ac342a4d3f5a5905d9,2024-10-02T11:15:10.780000 +CVE-2024-35293,0,0,a4e22fa188a744e9f6058246215df53e4473ae5b974108a643304f236afa6173,2024-10-02T10:15:03.160000 +CVE-2024-35294,0,0,9675f5fe061cf93b001295068f23890f2e1a548578cdf9ac342a4d3f5a5905d9,2024-10-02T11:15:10.780000 CVE-2024-35296,0,0,82c7767da6fa670c8aa66295178569bca6e87e99e7267708f981755194c6c0f5,2024-08-12T13:55:37.307000 CVE-2024-35297,0,0,a17fd925b730fd9803b93156d1a4f0f1baa604bce402fb65f95c09819b0a7763,2024-05-28T12:39:28.377000 CVE-2024-35298,0,0,767802677800ceed2390ec4b021eb4a1bb445bf1aba3154a6ba4d4e3eb13ec79,2024-07-03T02:01:32.613000 @@ -255335,7 +255335,7 @@ CVE-2024-37265,0,0,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5 CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40dcb1,2024-08-29T18:59:40.057000 CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000 CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000 -CVE-2024-3727,0,1,07708fffc060b3e581dd76c8ebac81d422515d67aa5ca6b7880beb234690ed60,2024-10-02T11:15:11.033000 +CVE-2024-3727,0,0,07708fffc060b3e581dd76c8ebac81d422515d67aa5ca6b7880beb234690ed60,2024-10-02T11:15:11.033000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 @@ -256475,7 +256475,7 @@ CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fc CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000 CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000 CVE-2024-38812,0,0,3bc0ffcb92946e8904680ce14e0254b1ad43552ea6c763feb1e9d771a6d16872,2024-09-20T12:30:51.220000 -CVE-2024-38813,0,0,ddced8c489af2896395c3cc23a08db07cfe477208de5fa8478ab485bc0fc2ea8,2024-09-20T12:30:51.220000 +CVE-2024-38813,0,1,3d08a10b622d3af5696a9ed2c2a45317011023f873f91120d4c5c5927c60a9b1,2024-10-02T13:59:52.887000 CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269232,2024-09-13T14:06:04.777000 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 @@ -259503,9 +259503,9 @@ CVE-2024-44007,0,0,d7d1930aeec9d62758ccc2ddf09e21d07c0b586fa0d9735f7d5dee1a37d78 CVE-2024-44008,0,0,c6d2b6687f1293a95753882058aa8ed47455c99d54b3161e64050d330a139582,2024-09-24T22:08:01.060000 CVE-2024-44009,0,0,5b0cf6c82d301fa9d5358bb5d9e7b1a016eed523b7e9c7d9c1329e61fba4852b,2024-09-24T22:06:15.843000 CVE-2024-4401,0,0,48f8e641129f81284635fb93c6fe88c5c5fc547b585fa75e650b46a3bc3c0b8f,2024-09-04T14:33:01.807000 -CVE-2024-44017,1,1,3bb0c45cc5e3bb81d1e2b53c5f1646565fa179194ed0162746b8aef745eb9ec0,2024-10-02T10:15:04.113000 +CVE-2024-44017,0,0,3bb0c45cc5e3bb81d1e2b53c5f1646565fa179194ed0162746b8aef745eb9ec0,2024-10-02T10:15:04.113000 CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408fe2,2024-06-10T18:06:22.600000 -CVE-2024-44030,1,1,6717eabe00aa50c889567d91f0e2fc09667c070e46ca38dc26015f03b8734395,2024-10-02T10:15:04.340000 +CVE-2024-44030,0,0,6717eabe00aa50c889567d91f0e2fc09667c070e46ca38dc26015f03b8734395,2024-10-02T10:15:04.340000 CVE-2024-4404,0,0,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000 CVE-2024-44047,0,0,dcb68301e676e70a82dc46628c9493a0293e3e08d4f537ef9633f5a0b67d56b5,2024-09-24T22:05:25.723000 CVE-2024-44048,0,0,e9b1cc8fc597060cfdd72752b827b4aa13d91f1cd6810edba590f679e79cd789,2024-09-26T13:32:55.343000 @@ -260069,7 +260069,7 @@ CVE-2024-45373,0,0,f227d5262560442f4412f4d20983d9dae0586dd2cf3e8b0af32f7de8050a4 CVE-2024-45374,0,0,4772ced234a2d503bc98f499430415f71ce86653942a78c695286d994a51f79c,2024-09-30T12:46:20.237000 CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000 CVE-2024-45383,0,0,235a14ef262025a5c45e6e746df2b6dcf33186b99aef4d19b36fdcfc9676da5c,2024-09-18T20:24:29.247000 -CVE-2024-45384,0,0,583f6b0150a5c6e4d0e90be5e6cc15f9937a4f3e905df3e759e07d110131191d,2024-09-20T12:30:51.220000 +CVE-2024-45384,0,1,f2a07deadcaa2c60a6f6b273b6a0503965f9217a6b6f4dbdbe6211d5c2784b64,2024-10-02T13:57:30.280000 CVE-2024-45388,0,0,28676e6d1c1faf0a789ad4f826a6462261feef9ecff64b3588c21e46509a5b28,2024-09-19T15:18:32.007000 CVE-2024-45389,0,0,3c33cfe16c07d091d7fefb5db536793f3efe9f98f40a959df73e39f6dc2254ee,2024-09-12T20:17:31.767000 CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000 @@ -260640,8 +260640,8 @@ CVE-2024-46801,0,0,239d949d680f6da2e86f32ffc06e9b107781e443c485e3945602ddf3b4e94 CVE-2024-46802,0,0,b40cd914285cdefcd5e4dfe2042b8118c515297d02218391168e1658f152bdc2,2024-09-30T12:45:57.823000 CVE-2024-46803,0,0,2e09b859425719e963f765ba90f27c8f58ab7ac1e8b05d3a66af8d6bb4800e2a,2024-09-30T12:45:57.823000 CVE-2024-46804,0,0,2fde954d7701fe2244ffccb1e1435e60de864c686b315e9228ec7893126c8498,2024-09-30T12:45:57.823000 -CVE-2024-46805,0,0,0fc5e73bf541084c92d501533c0877f3abf3b9f2ee69353f8dc61318ee2b5035,2024-09-30T12:45:57.823000 -CVE-2024-46806,0,0,6582f79f40103e18fb0bc87c6feac7d3bac4310e683063c9dbe929a8065dcab2,2024-09-30T12:45:57.823000 +CVE-2024-46805,0,1,5159fe471f89438fefa0d5d140686d61da2d0cea3c78eb408a0a4757fbac85e9,2024-10-02T12:58:59.767000 +CVE-2024-46806,0,1,ed4e1fd2116041561a62c2ee66c4e33780a9a4381fdf02b9a845a019cc19fcf8,2024-10-02T13:17:04.640000 CVE-2024-46807,0,0,b76c0c8bfa99626db7385b1837463a89a2e9018b1d828861a724cca1379fa995,2024-09-30T12:45:57.823000 CVE-2024-46808,0,0,0e595e769def5afc290f6d875d68aefbfd56e01db58514615beebbf4da8fde20,2024-09-30T12:45:57.823000 CVE-2024-46809,0,0,76e7d93e2fcac77b727fe55d77bd4ffccf126388001c0509474bbeb489abf906,2024-09-30T12:45:57.823000 @@ -260688,14 +260688,14 @@ CVE-2024-46845,0,0,d2e297a5f6a048256befcd844c26b24b6f53edb5a3284e8874908dc68c149 CVE-2024-46846,0,0,90e473ff3287976c7a74ed9b83a018488b7185ddf6d520cb6c65035a8de1c7f9,2024-09-30T12:45:57.823000 CVE-2024-46847,0,0,1e69114042530e8c198667e9f8902d0babfc7bf1c48ac2011808c7a040ba7738,2024-09-30T12:45:57.823000 CVE-2024-46848,0,0,75be985f4c307071e6330022d7ad7e21418ad2edaa3f1ab8b4ddbeb44c053e41,2024-09-30T12:45:57.823000 -CVE-2024-46849,0,0,cc82526e821f0ff4f36a8e806bb302e7c60840cab8896adacc548ad8e9eaf759,2024-09-30T12:45:57.823000 +CVE-2024-46849,0,1,7b1f01f53478d25b12adf0d307135ae5baaf89880e33ec19f4066834baf76dc3,2024-10-02T13:25:27.163000 CVE-2024-4685,0,0,38350af74ad68911fd851342727812175d5d39b6f847c1ca12945db68e23926c,2024-06-04T19:20:46.443000 CVE-2024-46850,0,0,df0fab5aa79c4224bbd3a172b9a628fd1454850eccb1477435ff857cf9584215,2024-09-30T12:45:57.823000 CVE-2024-46851,0,0,f3ed0fe4ee19ec15f4bb442357f21e0223d20c2421d00dab280963b1e02330f3,2024-09-30T12:45:57.823000 -CVE-2024-46852,0,0,f6c3cf367f5bab4a41cfddd0fb266cbdb42b9d28fc2536f259ad23f4065a578c,2024-09-30T12:45:57.823000 +CVE-2024-46852,0,1,a0196084d1fce58734a9247a1e9e2517db0c766dffe524e5820e224a714a9218,2024-10-02T13:23:33.847000 CVE-2024-46853,0,0,4868439611c1a951c75fb49a337863b87e0042c9653d37b9045f4d3c24af69c2,2024-09-30T12:45:57.823000 CVE-2024-46854,0,0,7d44de6eb6b12e1a80438c0a536ce999b328137a59e14f0a793bb51497f4e44f,2024-09-30T12:45:57.823000 -CVE-2024-46855,0,0,c2852f5a4b4af97dbb65bb99333a9c26e262e2e400498608798f5dcd0f8960bf,2024-09-30T12:45:57.823000 +CVE-2024-46855,0,1,ada62b3cfbe0f27c384cae85e52f369eacdb907484044d3eb1b00e7967bc8250,2024-10-02T13:21:28.780000 CVE-2024-46856,0,0,11c2ed807cc40e03d10f9dbb7ccab9a501dd51f31282327855c7c0711638b06f,2024-10-01T16:04:54.247000 CVE-2024-46857,0,0,8dec4e3463ee57c87efc640c94114393b6fa85793860c8b91fb9a36833ad85fa,2024-10-01T17:10:29.657000 CVE-2024-46858,0,0,49cb83621376018f4b52cc3254920fbddd535744ae8d27d488860900395f707b,2024-10-01T17:10:14.703000 @@ -260883,7 +260883,7 @@ CVE-2024-47524,0,0,3aec47c770f6d1d3bcb3c93afa50d815d55cf5bd0a76155277e66f52d1432 CVE-2024-47525,0,0,9a4e8f76e84229f4808462d3a570657a25dda99b3c44f531ee53664db59a21d0,2024-10-01T21:15:07.520000 CVE-2024-47526,0,0,43af752c3e2fc7342ec611606be28a580ed0ec758c75ca78eb986e06173bde43,2024-10-01T21:15:07.740000 CVE-2024-47527,0,0,34969198f4910991ff7dd37ae24149a4937c9d23978ca5ae81c80cd14b82849a,2024-10-01T21:15:07.967000 -CVE-2024-47528,0,0,c80083da542e7f6c3b4980993c546b6e063f1d605799a426937d87a9431cf505,2024-10-01T21:15:08.273000 +CVE-2024-47528,0,1,42a89c9de9daba9825e4f69033d8b0f23ace38d0f36e48a2e9f0b8b491aa06ad,2024-10-02T13:35:02.263000 CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000 CVE-2024-47530,0,0,fba522e024b83acf70358c93acf37e114887d5fe3a476a11c9462eadc0b44e72,2024-09-30T16:15:09.540000 CVE-2024-47531,0,0,33301edab0f0649702484b01110937da183dc72540869ebdc9cdc877c211a23a,2024-09-30T16:15:09.750000 @@ -263232,7 +263232,7 @@ CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f CVE-2024-7553,0,0,a003128917872942bd112101b4a09fecd49ec3896a9f8c6e71229fee4c654d46,2024-09-19T20:46:04.103000 CVE-2024-7554,0,0,dfc64307827dd001a7e870992bca03e6a424d33d4584f122a641b15fec5c52ce,2024-08-29T15:42:13.387000 CVE-2024-7557,0,0,ae8c41f4adb3726b27116f90c8ab746ad0ea79736dd5450dde42c0320a002e78,2024-09-18T07:15:04.293000 -CVE-2024-7558,1,1,11c6de56dbfc72772f7cbf5e9240e832f16091e1881284151bdf2cb389ca88c1,2024-10-02T11:15:11.460000 +CVE-2024-7558,0,0,11c6de56dbfc72772f7cbf5e9240e832f16091e1881284151bdf2cb389ca88c1,2024-10-02T11:15:11.460000 CVE-2024-7559,0,0,4dc25ec2b0f2eec8919ecc81f209446d933d662f72b02d2630c82c602d53e698,2024-08-23T16:18:28.547000 CVE-2024-7560,0,0,69bf0d3c1d2353061d3a66813d4df2a8a02417391648b6018a10fb1d777785c6,2024-08-08T13:04:18.753000 CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9cd1,2024-08-08T13:04:18.753000 @@ -263589,8 +263589,8 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 -CVE-2024-8037,1,1,e300f7e911d33fc923907f98e557710e23f63422aa7b5ed576c3efd1cfb681ac,2024-10-02T11:15:11.690000 -CVE-2024-8038,1,1,ff7735c7ee92165792186d2c4c552f34bc7de903db5192d931877fce9ca59087,2024-10-02T11:15:11.853000 +CVE-2024-8037,0,0,e300f7e911d33fc923907f98e557710e23f63422aa7b5ed576c3efd1cfb681ac,2024-10-02T11:15:11.690000 +CVE-2024-8038,0,0,ff7735c7ee92165792186d2c4c552f34bc7de903db5192d931877fce9ca59087,2024-10-02T11:15:11.853000 CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000 CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000 @@ -263753,7 +263753,7 @@ CVE-2024-8278,0,0,fc32e2167ccf88370e539f3d055e0ff107942d544d0900ce5dc32eec47fdcd CVE-2024-8279,0,0,a7de1f6bcd7acd612433087dd62d700c55c2713edbe09e73822c3aefec563e44,2024-09-14T11:47:14.677000 CVE-2024-8280,0,0,ee8246d9e12854e999c4fc7d4ea10afbd0920ea1f9472e1c543327a9ae0730e7,2024-09-14T11:47:14.677000 CVE-2024-8281,0,0,6e64aec5696815efe009b246052ca974dfd6e9415a9b5d9826067281cc5ba11d,2024-09-14T11:47:14.677000 -CVE-2024-8282,1,1,c64c6d4ef2d51abcb890f7279cb9e9ab9cfc48e2b7d69b75bf03ba24a965203a,2024-10-02T10:15:04.537000 +CVE-2024-8282,0,0,c64c6d4ef2d51abcb890f7279cb9e9ab9cfc48e2b7d69b75bf03ba24a965203a,2024-10-02T10:15:04.537000 CVE-2024-8283,0,0,6848a7e5ddaaf741f33ca91c04ab319f83aa3b131928c270403da97ddfd454fe,2024-10-01T14:35:04.310000 CVE-2024-8285,0,0,0dc7b9ae09e1cf8976e262dd1fffb8b648c33c9cca4195663b4b85ea560fc0be,2024-10-01T13:15:02.670000 CVE-2024-8287,0,0,a69e7cb2d3c0316abfeaff67da311f8b23d877ec163f8b4d2f35a96004b37bbb,2024-09-24T15:52:38.047000 @@ -263903,7 +263903,7 @@ CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000 -CVE-2024-8505,1,1,f523d4eb904307eaa0864abec0a602e0d7186ebe8f875e54ca2fd1a1531786f8,2024-10-02T10:15:04.743000 +CVE-2024-8505,0,0,f523d4eb904307eaa0864abec0a602e0d7186ebe8f875e54ca2fd1a1531786f8,2024-10-02T10:15:04.743000 CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 CVE-2024-8514,0,0,3849b5f6b0ecf9dcad6d512424561a84ee3a0a24c7563da023875d0ea8f1a607,2024-09-26T13:32:02.803000 CVE-2024-8515,0,0,ed645fa2ea01dcae2c31158dc09f453ce56c62e9e8f6eac45f7d2b2aec953f03,2024-09-26T13:32:02.803000 @@ -264100,6 +264100,7 @@ CVE-2024-8877,0,0,072c8e486444961bae4945079e8c7eda87a37fe8ff462296a0eff944cb3f18 CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488d1,2024-09-30T15:21:31.693000 CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000 CVE-2024-8883,0,0,d39bf3fdabe814eab7383cf7d0056d70749ac8a21f6ccaada9d165b73ef13b6c,2024-10-01T13:15:03.313000 +CVE-2024-8885,1,1,11f7b2926be281777099e8210cefb94d603d0100e80a4b9ab4503be59382bd7f,2024-10-02T13:15:12.410000 CVE-2024-8887,0,0,0407ca62fcbad308289f29aa7a81815bcc03d59968582f8cfbf5cd23bcc12817,2024-10-01T17:30:07.597000 CVE-2024-8888,0,0,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000 CVE-2024-8889,0,0,409f189e1cc8763baf41f6d7663087a2138f3ee0ecad616a441fc7d44385c004,2024-09-20T12:30:51.220000 @@ -264274,18 +264275,18 @@ CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961 CVE-2024-9301,0,0,73ba33e42a5a66e63775d86ddfdf57e7a04bcd9ceda925406fc4894f153c084a,2024-09-30T12:45:57.823000 CVE-2024-9304,0,0,77296627b4e73471315e7e445cf2a4183f5c2120111f84509ea16b607bc5907e,2024-10-01T08:15:06.943000 CVE-2024-9315,0,0,dcae3590349756096f3149f913fcd278d961f7a38fe3ece525d39bf3aa5da14a,2024-10-01T13:33:59.480000 -CVE-2024-9316,0,0,af6982dcd9c7f4909113b26e934c15a53c63fefb9a4ab04a604458d8e878131e,2024-09-30T12:45:57.823000 +CVE-2024-9316,0,1,dc1cd9e0c0f14c1ac859a7efc8a45f5e2b48ab85717e9999593b73d7873483e5,2024-10-02T13:29:29.813000 CVE-2024-9317,0,0,f67b854cd75d25217a31bdd6074d6f9f6352c2218386ab264e509a61a09e8c0d,2024-10-01T13:32:39.140000 CVE-2024-9318,0,0,75620fcd764a4142fde9ac43d2a623f754891871e755d0d2a6769beb19587b37,2024-10-01T13:31:06.420000 CVE-2024-9319,0,0,a8900d9fe2ac8185ef6285907d49bb3093acd859fdcb7febfb22e0f35d08bc58,2024-10-01T13:29:53.987000 CVE-2024-9320,0,0,f09699099fcbae251236569e3b80f87aa18c611c7a9a81741339a3f6ea9ef574,2024-10-01T13:28:52.407000 CVE-2024-9321,0,0,a14c3ea501d5675f270df02cf8d21d7014c48fd4251b0c1b324165be69ef0bfa,2024-10-01T13:28:20.110000 -CVE-2024-9322,0,0,83622da96852f8160b7cb4de275a853d47028c78a856911661c52ce661f3230d,2024-09-30T12:45:57.823000 +CVE-2024-9322,0,1,e95e70788b8a6a49aa85018220569b500de2dbb1919ebd97b01b91f0a91cc54e,2024-10-02T13:32:17.277000 CVE-2024-9323,0,0,890a6430432a24ca83a099564288fe0c5e63b6dff3bdabb06ff3376334cef2ee,2024-10-01T12:55:17.873000 CVE-2024-9324,0,0,d9b1c9975090056a56d06e6271867d8078cd6d8fe57f72ba6bd95d8f5b8dba93,2024-09-30T12:45:57.823000 CVE-2024-9325,0,0,917db361764ac408fb00b54b0b65d73b76ab0f3d7d21087de757b7eb913d62a9,2024-09-30T12:45:57.823000 -CVE-2024-9326,0,0,bc58a26c9b43fcdd4054d9300d5d0cde5547399aaa29865b7fca11d142895d07,2024-09-30T12:45:57.823000 -CVE-2024-9327,0,0,789b0175cdbfabd0a2b291c27ea4b21dfccf76f50782f3eac2c88bada4dfe956,2024-09-30T12:45:57.823000 +CVE-2024-9326,0,1,ac353111de081e75045512f212a47527fdd858d5e54a48eba79a4b87a1838dd8,2024-10-02T13:33:16.530000 +CVE-2024-9327,0,1,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39c9,2024-10-02T12:57:17.787000 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,98bed362b2a24e4db4311c4ce14eee7b5d7d3a2b87c87f5c94a31ac7bc8ac4f5,2024-09-30T12:45:57.823000 CVE-2024-9333,0,0,3a8b8751894004acbe0040a54680e8b99075c8756a62d62c518a0edb7a9ddf75,2024-10-02T06:15:11.113000 @@ -264312,3 +264313,4 @@ CVE-2024-9403,0,0,66d9e463986ac67ad9bceb6cae4045b10ea740cc9a13552aa6348c37ab2ae3 CVE-2024-9405,0,0,e9703465f499653ca07470a1ffd16e91f994c6f46933e9f402589910617b650e,2024-10-01T12:15:03.893000 CVE-2024-9407,0,0,844e60b42bd22ac882920576f0244b4221aa1cb4e0aeb01caf7aa58317c74c32,2024-10-01T21:15:08.530000 CVE-2024-9411,0,0,0ed7229fadcaa0ba2be6aae3ed0a903fea8ee7057f413ca8d29b7080b09aae26,2024-10-01T21:35:07.620000 +CVE-2024-9429,1,1,db0d8ee6274f5889e645bc8f06bc2c127c429edd7f6e0ee6aa8f7a2649e83d4c,2024-10-02T13:15:12.617000