From fe3ed7f991f60715f1beed10fa4f921694b81b3a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 11 Sep 2024 18:03:18 +0000 Subject: [PATCH] Auto-Update: 2024-09-11T18:00:17.868597+00:00 --- CVE-2017/CVE-2017-155xx/CVE-2017-15587.json | 14 +- CVE-2017/CVE-2017-60xx/CVE-2017-6060.json | 12 +- CVE-2017/CVE-2017-92xx/CVE-2017-9216.json | 8 +- .../CVE-2018-10000xx/CVE-2018-1000051.json | 8 +- CVE-2018/CVE-2018-61xx/CVE-2018-6187.json | 8 +- CVE-2018/CVE-2018-61xx/CVE-2018-6192.json | 6 +- CVE-2019/CVE-2019-252xx/CVE-2019-25212.json | 8 +- CVE-2019/CVE-2019-61xx/CVE-2019-6130.json | 6 +- CVE-2019/CVE-2019-61xx/CVE-2019-6131.json | 6 +- CVE-2019/CVE-2019-73xx/CVE-2019-7321.json | 6 +- CVE-2020/CVE-2020-218xx/CVE-2020-21896.json | 8 +- CVE-2020/CVE-2020-266xx/CVE-2020-26683.json | 8 +- CVE-2021/CVE-2021-12xx/CVE-2021-1245.json | 13 +- CVE-2021/CVE-2021-12xx/CVE-2021-1246.json | 11 +- CVE-2021/CVE-2021-44xx/CVE-2021-4441.json | 131 ++++- CVE-2022/CVE-2022-488xx/CVE-2022-48895.json | 85 ++- CVE-2022/CVE-2022-488xx/CVE-2022-48896.json | 121 +++- CVE-2022/CVE-2022-488xx/CVE-2022-48897.json | 85 ++- CVE-2022/CVE-2022-488xx/CVE-2022-48898.json | 109 +++- CVE-2022/CVE-2022-488xx/CVE-2022-48899.json | 133 ++++- CVE-2023/CVE-2023-399xx/CVE-2023-39914.json | 12 +- CVE-2023/CVE-2023-399xx/CVE-2023-39915.json | 12 +- CVE-2023/CVE-2023-407xx/CVE-2023-40708.json | 6 +- CVE-2023/CVE-2023-407xx/CVE-2023-40709.json | 6 +- CVE-2023/CVE-2023-407xx/CVE-2023-40710.json | 8 +- CVE-2023/CVE-2023-463xx/CVE-2023-46371.json | 10 +- CVE-2023/CVE-2023-464xx/CVE-2023-46414.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46415.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46416.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46417.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46418.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46419.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46420.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46421.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46422.json | 34 +- CVE-2023/CVE-2023-464xx/CVE-2023-46423.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46520.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46521.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46522.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46523.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46525.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46526.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46527.json | 40 +- CVE-2023/CVE-2023-465xx/CVE-2023-46534.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46535.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46536.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46537.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46538.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46539.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46540.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46541.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46542.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46543.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46544.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46552.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46553.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46554.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46555.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46556.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46557.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46558.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46559.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46560.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46562.json | 34 +- CVE-2023/CVE-2023-465xx/CVE-2023-46563.json | 34 +- CVE-2023/CVE-2023-528xx/CVE-2023-52893.json | 150 ++++- CVE-2023/CVE-2023-528xx/CVE-2023-52894.json | 149 ++++- CVE-2023/CVE-2023-528xx/CVE-2023-52895.json | 68 ++- CVE-2023/CVE-2023-528xx/CVE-2023-52896.json | 133 ++++- CVE-2024/CVE-2024-01xx/CVE-2024-0104.json | 147 ++++- CVE-2024/CVE-2024-01xx/CVE-2024-0113.json | 140 ++++- CVE-2024/CVE-2024-01xx/CVE-2024-0115.json | 72 ++- CVE-2024/CVE-2024-16xx/CVE-2024-1656.json | 8 +- CVE-2024/CVE-2024-203xx/CVE-2024-20304.json | 56 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20317.json | 56 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20343.json | 56 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20381.json | 56 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20390.json | 56 ++ CVE-2024/CVE-2024-203xx/CVE-2024-20398.json | 56 ++ CVE-2024/CVE-2024-204xx/CVE-2024-20406.json | 56 ++ CVE-2024/CVE-2024-204xx/CVE-2024-20466.json | 4 +- CVE-2024/CVE-2024-204xx/CVE-2024-20483.json | 56 ++ CVE-2024/CVE-2024-204xx/CVE-2024-20489.json | 56 ++ CVE-2024/CVE-2024-215xx/CVE-2024-21529.json | 8 +- CVE-2024/CVE-2024-237xx/CVE-2024-23716.json | 8 +- CVE-2024/CVE-2024-239xx/CVE-2024-23906.json | 8 +- CVE-2024/CVE-2024-249xx/CVE-2024-24972.json | 8 +- CVE-2024/CVE-2024-271xx/CVE-2024-27112.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27113.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27114.json | 4 +- CVE-2024/CVE-2024-271xx/CVE-2024-27115.json | 4 +- CVE-2024/CVE-2024-313xx/CVE-2024-31336.json | 8 +- CVE-2024/CVE-2024-348xx/CVE-2024-34831.json | 8 +- CVE-2024/CVE-2024-38xx/CVE-2024-3899.json | 33 +- CVE-2024/CVE-2024-393xx/CVE-2024-39378.json | 56 ++ CVE-2024/CVE-2024-396xx/CVE-2024-39627.json | 47 +- CVE-2024/CVE-2024-396xx/CVE-2024-39629.json | 47 +- CVE-2024/CVE-2024-396xx/CVE-2024-39631.json | 47 +- CVE-2024/CVE-2024-396xx/CVE-2024-39643.json | 47 +- CVE-2024/CVE-2024-396xx/CVE-2024-39644.json | 47 +- CVE-2024/CVE-2024-396xx/CVE-2024-39646.json | 47 +- CVE-2024/CVE-2024-396xx/CVE-2024-39647.json | 47 +- CVE-2024/CVE-2024-398xx/CVE-2024-39808.json | 8 +- CVE-2024/CVE-2024-398xx/CVE-2024-39894.json | 10 +- CVE-2024/CVE-2024-406xx/CVE-2024-40650.json | 8 +- CVE-2024/CVE-2024-406xx/CVE-2024-40652.json | 8 +- CVE-2024/CVE-2024-406xx/CVE-2024-40654.json | 8 +- CVE-2024/CVE-2024-406xx/CVE-2024-40655.json | 4 +- CVE-2024/CVE-2024-406xx/CVE-2024-40656.json | 8 +- CVE-2024/CVE-2024-406xx/CVE-2024-40657.json | 4 +- CVE-2024/CVE-2024-406xx/CVE-2024-40658.json | 4 +- CVE-2024/CVE-2024-406xx/CVE-2024-40659.json | 8 +- CVE-2024/CVE-2024-406xx/CVE-2024-40662.json | 4 +- CVE-2024/CVE-2024-417xx/CVE-2024-41731.json | 61 +- CVE-2024/CVE-2024-417xx/CVE-2024-41732.json | 106 +++- CVE-2024/CVE-2024-418xx/CVE-2024-41810.json | 62 +- CVE-2024/CVE-2024-418xx/CVE-2024-41817.json | 68 ++- CVE-2024/CVE-2024-418xx/CVE-2024-41818.json | 74 ++- CVE-2024/CVE-2024-418xx/CVE-2024-41868.json | 56 ++ CVE-2024/CVE-2024-430xx/CVE-2024-43040.json | 8 +- CVE-2024/CVE-2024-436xx/CVE-2024-43690.json | 8 +- CVE-2024/CVE-2024-437xx/CVE-2024-43793.json | 4 +- CVE-2024/CVE-2024-441xx/CVE-2024-44103.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44104.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44105.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44106.json | 8 +- CVE-2024/CVE-2024-441xx/CVE-2024-44107.json | 8 +- CVE-2024/CVE-2024-444xx/CVE-2024-44466.json | 21 + CVE-2024/CVE-2024-445xx/CVE-2024-44570.json | 25 + CVE-2024/CVE-2024-445xx/CVE-2024-44571.json | 25 + CVE-2024/CVE-2024-445xx/CVE-2024-44572.json | 25 + CVE-2024/CVE-2024-445xx/CVE-2024-44573.json | 25 + CVE-2024/CVE-2024-445xx/CVE-2024-44574.json | 25 + CVE-2024/CVE-2024-445xx/CVE-2024-44575.json | 25 + CVE-2024/CVE-2024-445xx/CVE-2024-44577.json | 25 + CVE-2024/CVE-2024-448xx/CVE-2024-44844.json | 68 ++- CVE-2024/CVE-2024-448xx/CVE-2024-44845.json | 68 ++- CVE-2024/CVE-2024-448xx/CVE-2024-44851.json | 25 + CVE-2024/CVE-2024-44xx/CVE-2024-4465.json | 4 +- CVE-2024/CVE-2024-450xx/CVE-2024-45009.json | 33 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45010.json | 33 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45011.json | 37 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45012.json | 29 + CVE-2024/CVE-2024-450xx/CVE-2024-45013.json | 25 + CVE-2024/CVE-2024-450xx/CVE-2024-45014.json | 25 + CVE-2024/CVE-2024-450xx/CVE-2024-45015.json | 29 + CVE-2024/CVE-2024-450xx/CVE-2024-45016.json | 45 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45017.json | 25 + CVE-2024/CVE-2024-450xx/CVE-2024-45018.json | 41 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45019.json | 33 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45020.json | 29 + CVE-2024/CVE-2024-450xx/CVE-2024-45021.json | 49 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45022.json | 33 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45023.json | 25 + CVE-2024/CVE-2024-450xx/CVE-2024-45024.json | 25 + CVE-2024/CVE-2024-450xx/CVE-2024-45025.json | 49 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45026.json | 45 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45027.json | 25 + CVE-2024/CVE-2024-450xx/CVE-2024-45028.json | 49 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45029.json | 33 ++ CVE-2024/CVE-2024-450xx/CVE-2024-45030.json | 29 + CVE-2024/CVE-2024-453xx/CVE-2024-45327.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45409.json | 8 +- CVE-2024/CVE-2024-455xx/CVE-2024-45596.json | 8 +- CVE-2024/CVE-2024-455xx/CVE-2024-45597.json | 8 +- CVE-2024/CVE-2024-457xx/CVE-2024-45786.json | 4 +- CVE-2024/CVE-2024-457xx/CVE-2024-45787.json | 4 +- CVE-2024/CVE-2024-457xx/CVE-2024-45788.json | 4 +- CVE-2024/CVE-2024-457xx/CVE-2024-45789.json | 4 +- CVE-2024/CVE-2024-457xx/CVE-2024-45790.json | 4 +- CVE-2024/CVE-2024-466xx/CVE-2024-46672.json | 29 + CVE-2024/CVE-2024-52xx/CVE-2024-5290.json | 6 +- CVE-2024/CVE-2024-53xx/CVE-2024-5309.json | 32 +- CVE-2024/CVE-2024-54xx/CVE-2024-5416.json | 4 +- CVE-2024/CVE-2024-57xx/CVE-2024-5760.json | 21 + CVE-2024/CVE-2024-60xx/CVE-2024-6091.json | 4 +- CVE-2024/CVE-2024-65xx/CVE-2024-6502.json | 108 +++- CVE-2024/CVE-2024-68xx/CVE-2024-6835.json | 54 +- CVE-2024/CVE-2024-68xx/CVE-2024-6852.json | 60 +- CVE-2024/CVE-2024-68xx/CVE-2024-6853.json | 60 +- CVE-2024/CVE-2024-68xx/CVE-2024-6855.json | 60 +- CVE-2024/CVE-2024-68xx/CVE-2024-6856.json | 60 +- CVE-2024/CVE-2024-68xx/CVE-2024-6859.json | 60 +- CVE-2024/CVE-2024-68xx/CVE-2024-6894.json | 59 +- CVE-2024/CVE-2024-69xx/CVE-2024-6912.json | 79 ++- CVE-2024/CVE-2024-69xx/CVE-2024-6913.json | 79 ++- CVE-2024/CVE-2024-69xx/CVE-2024-6924.json | 60 +- CVE-2024/CVE-2024-69xx/CVE-2024-6925.json | 60 +- CVE-2024/CVE-2024-69xx/CVE-2024-6984.json | 97 +++- CVE-2024/CVE-2024-71xx/CVE-2024-7110.json | 103 +++- CVE-2024/CVE-2024-71xx/CVE-2024-7193.json | 67 ++- CVE-2024/CVE-2024-72xx/CVE-2024-7218.json | 75 ++- CVE-2024/CVE-2024-73xx/CVE-2024-7312.json | 82 +++ CVE-2024/CVE-2024-76xx/CVE-2024-7609.json | 4 +- CVE-2024/CVE-2024-76xx/CVE-2024-7626.json | 8 +- CVE-2024/CVE-2024-76xx/CVE-2024-7627.json | 55 +- CVE-2024/CVE-2024-77xx/CVE-2024-7716.json | 16 +- CVE-2024/CVE-2024-77xx/CVE-2024-7721.json | 8 +- CVE-2024/CVE-2024-77xx/CVE-2024-7727.json | 8 +- CVE-2024/CVE-2024-80xx/CVE-2024-8012.json | 8 +- CVE-2024/CVE-2024-80xx/CVE-2024-8041.json | 106 +++- CVE-2024/CVE-2024-80xx/CVE-2024-8045.json | 8 +- CVE-2024/CVE-2024-80xx/CVE-2024-8096.json | 4 +- CVE-2024/CVE-2024-80xx/CVE-2024-8097.json | 82 +++ CVE-2024/CVE-2024-81xx/CVE-2024-8190.json | 8 +- CVE-2024/CVE-2024-81xx/CVE-2024-8191.json | 8 +- CVE-2024/CVE-2024-82xx/CVE-2024-8232.json | 8 +- CVE-2024/CVE-2024-82xx/CVE-2024-8253.json | 8 +- CVE-2024/CVE-2024-82xx/CVE-2024-8277.json | 8 +- CVE-2024/CVE-2024-83xx/CVE-2024-8306.json | 4 +- CVE-2024/CVE-2024-83xx/CVE-2024-8317.json | 79 ++- CVE-2024/CVE-2024-83xx/CVE-2024-8320.json | 8 +- CVE-2024/CVE-2024-83xx/CVE-2024-8321.json | 8 +- CVE-2024/CVE-2024-83xx/CVE-2024-8322.json | 8 +- CVE-2024/CVE-2024-83xx/CVE-2024-8363.json | 64 ++- CVE-2024/CVE-2024-83xx/CVE-2024-8394.json | 70 ++- CVE-2024/CVE-2024-84xx/CVE-2024-8427.json | 37 +- CVE-2024/CVE-2024-84xx/CVE-2024-8440.json | 8 +- CVE-2024/CVE-2024-84xx/CVE-2024-8441.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8503.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8504.json | 8 +- CVE-2024/CVE-2024-85xx/CVE-2024-8570.json | 70 ++- CVE-2024/CVE-2024-85xx/CVE-2024-8571.json | 64 ++- CVE-2024/CVE-2024-86xx/CVE-2024-8636.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8637.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8638.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8639.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8642.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8646.json | 4 +- CVE-2024/CVE-2024-86xx/CVE-2024-8655.json | 8 +- CVE-2024/CVE-2024-86xx/CVE-2024-8686.json | 78 +++ CVE-2024/CVE-2024-86xx/CVE-2024-8687.json | 78 +++ CVE-2024/CVE-2024-86xx/CVE-2024-8688.json | 78 +++ CVE-2024/CVE-2024-86xx/CVE-2024-8689.json | 78 +++ CVE-2024/CVE-2024-86xx/CVE-2024-8690.json | 78 +++ CVE-2024/CVE-2024-86xx/CVE-2024-8691.json | 78 +++ README.md | 99 ++-- _state.csv | 536 ++++++++++-------- 238 files changed, 8161 insertions(+), 833 deletions(-) create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20304.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20317.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20343.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20381.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20390.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20398.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20406.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20483.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20489.json create mode 100644 CVE-2024/CVE-2024-393xx/CVE-2024-39378.json create mode 100644 CVE-2024/CVE-2024-418xx/CVE-2024-41868.json create mode 100644 CVE-2024/CVE-2024-444xx/CVE-2024-44466.json create mode 100644 CVE-2024/CVE-2024-445xx/CVE-2024-44570.json create mode 100644 CVE-2024/CVE-2024-445xx/CVE-2024-44571.json create mode 100644 CVE-2024/CVE-2024-445xx/CVE-2024-44572.json create mode 100644 CVE-2024/CVE-2024-445xx/CVE-2024-44573.json create mode 100644 CVE-2024/CVE-2024-445xx/CVE-2024-44574.json create mode 100644 CVE-2024/CVE-2024-445xx/CVE-2024-44575.json create mode 100644 CVE-2024/CVE-2024-445xx/CVE-2024-44577.json create mode 100644 CVE-2024/CVE-2024-448xx/CVE-2024-44851.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45009.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45010.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45011.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45012.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45013.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45014.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45015.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45016.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45017.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45018.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45019.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45020.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45021.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45022.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45023.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45024.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45025.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45026.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45027.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45028.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45029.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45030.json create mode 100644 CVE-2024/CVE-2024-466xx/CVE-2024-46672.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5760.json create mode 100644 CVE-2024/CVE-2024-73xx/CVE-2024-7312.json create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8097.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8686.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8687.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8688.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8689.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8690.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8691.json diff --git a/CVE-2017/CVE-2017-155xx/CVE-2017-15587.json b/CVE-2017/CVE-2017-155xx/CVE-2017-15587.json index 21000f748f8..d4fecdf63ff 100644 --- a/CVE-2017/CVE-2017-155xx/CVE-2017-15587.json +++ b/CVE-2017/CVE-2017-155xx/CVE-2017-15587.json @@ -2,7 +2,7 @@ "id": "CVE-2017-15587", "sourceIdentifier": "cve@mitre.org", "published": "2017-10-18T08:29:00.310", - "lastModified": "2023-11-07T02:40:19.917", + "lastModified": "2024-09-11T17:15:11.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -102,6 +102,18 @@ "url": "http://www.debian.org/security/2017/dsa-4006", "source": "cve@mitre.org" }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698605", + "source": "cve@mitre.org" + }, + { + "url": "https://bugs.ghostscript.com/show_bug.cgi?id=698704", + "source": "cve@mitre.org" + }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=d18bc728e46c5a5708f14d27c2b6c44e1d0c3232", + "source": "cve@mitre.org" + }, { "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00007.html", "source": "cve@mitre.org" diff --git a/CVE-2017/CVE-2017-60xx/CVE-2017-6060.json b/CVE-2017/CVE-2017-60xx/CVE-2017-6060.json index 35b990254b5..240a466c88c 100644 --- a/CVE-2017/CVE-2017-60xx/CVE-2017-6060.json +++ b/CVE-2017/CVE-2017-60xx/CVE-2017-6060.json @@ -2,8 +2,8 @@ "id": "CVE-2017-6060", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-15T14:59:00.697", - "lastModified": "2022-04-18T17:58:09.220", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T17:15:11.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -143,6 +143,14 @@ "Third Party Advisory" ] }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=06a012a42c9884e3cd653e7826cff1ddec04eb6e", + "source": "cve@mitre.org" + }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=e089b2e2c1d38c5696c7dfd741e21f8f3ef22b14", + "source": "cve@mitre.org" + }, { "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00013.html", "source": "cve@mitre.org", diff --git a/CVE-2017/CVE-2017-92xx/CVE-2017-9216.json b/CVE-2017/CVE-2017-92xx/CVE-2017-9216.json index 6e213ffc6bb..e9b1e7d4ee3 100644 --- a/CVE-2017/CVE-2017-92xx/CVE-2017-9216.json +++ b/CVE-2017/CVE-2017-92xx/CVE-2017-9216.json @@ -2,8 +2,8 @@ "id": "CVE-2017-9216", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-24T05:29:00.193", - "lastModified": "2021-11-02T13:49:42.477", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T17:15:11.320", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -131,6 +131,10 @@ "Vendor Advisory" ] }, + { + "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3ebffb1d96ba0cacec23016eccb4047dab365853", + "source": "cve@mitre.org" + }, { "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00023.html", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000051.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000051.json index 8489f073be7..038f2ee3926 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000051.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000051.json @@ -2,8 +2,8 @@ "id": "CVE-2018-1000051", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-09T23:29:01.777", - "lastModified": "2019-03-14T17:24:08.083", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:03.220", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -131,6 +131,10 @@ "Third Party Advisory" ] }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=321ba1de287016b0036bf4a56ce774ad11763384", + "source": "cve@mitre.org" + }, { "url": "https://security.gentoo.org/glsa/201811-15", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-61xx/CVE-2018-6187.json b/CVE-2018/CVE-2018-61xx/CVE-2018-6187.json index d0a8ccb951c..99e2b2410df 100644 --- a/CVE-2018/CVE-2018-61xx/CVE-2018-6187.json +++ b/CVE-2018/CVE-2018-61xx/CVE-2018-6187.json @@ -2,8 +2,8 @@ "id": "CVE-2018-6187", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-24T10:29:01.097", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T17:15:11.427", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -126,6 +126,10 @@ "Third Party Advisory" ] }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=3e30fbb7bf5efd88df431e366492356e7eb969ec", + "source": "cve@mitre.org" + }, { "url": "https://security.gentoo.org/glsa/201811-15", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-61xx/CVE-2018-6192.json b/CVE-2018/CVE-2018-61xx/CVE-2018-6192.json index bac51dd64d9..c40ad4f06ea 100644 --- a/CVE-2018/CVE-2018-61xx/CVE-2018-6192.json +++ b/CVE-2018/CVE-2018-61xx/CVE-2018-6192.json @@ -2,7 +2,7 @@ "id": "CVE-2018-6192", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-24T21:29:00.467", - "lastModified": "2019-06-28T15:15:10.783", + "lastModified": "2024-09-11T17:15:11.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -126,6 +126,10 @@ "Third Party Advisory" ] }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=5e411a99604ff6be5db9e273ee84737204113299", + "source": "cve@mitre.org" + }, { "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00027.html", "source": "cve@mitre.org" diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25212.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25212.json index ab97dd2d794..db6cdfb5e99 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25212.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25212.json @@ -2,13 +2,17 @@ "id": "CVE-2019-25212", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T09:15:01.887", - "lastModified": "2024-09-11T09:15:01.887", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The video carousel slider with lightbox plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento video carousel slider with lightbox para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.0.6 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de administrador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2019/CVE-2019-61xx/CVE-2019-6130.json b/CVE-2019/CVE-2019-61xx/CVE-2019-6130.json index 8e5a124b4c2..c03ba2e9c20 100644 --- a/CVE-2019/CVE-2019-61xx/CVE-2019-6130.json +++ b/CVE-2019/CVE-2019-61xx/CVE-2019-6130.json @@ -2,7 +2,7 @@ "id": "CVE-2019-6130", "sourceIdentifier": "cve@mitre.org", "published": "2019-01-11T05:29:01.687", - "lastModified": "2023-11-07T03:13:06.000", + "lastModified": "2024-09-11T16:15:03.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,6 +110,10 @@ "Third Party Advisory" ] }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=faf47b94e24314d74907f3f6bc874105f2c962ed", + "source": "cve@mitre.org" + }, { "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00027.html", "source": "cve@mitre.org" diff --git a/CVE-2019/CVE-2019-61xx/CVE-2019-6131.json b/CVE-2019/CVE-2019-61xx/CVE-2019-6131.json index e897b4d1225..22e3758df29 100644 --- a/CVE-2019/CVE-2019-61xx/CVE-2019-6131.json +++ b/CVE-2019/CVE-2019-61xx/CVE-2019-6131.json @@ -2,7 +2,7 @@ "id": "CVE-2019-6131", "sourceIdentifier": "cve@mitre.org", "published": "2019-01-11T05:29:01.717", - "lastModified": "2023-11-07T03:13:06.090", + "lastModified": "2024-09-11T16:15:03.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,6 +110,10 @@ "Third Party Advisory" ] }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=c8f7e48ff74720a5e984ae19d978a5ab4d5dde5b", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNJNEX5EW6YH5OARXXSSXW4HHC5PIBSY/", "source": "cve@mitre.org" diff --git a/CVE-2019/CVE-2019-73xx/CVE-2019-7321.json b/CVE-2019/CVE-2019-73xx/CVE-2019-7321.json index b36cfd6cdcc..8fbaa57a0ae 100644 --- a/CVE-2019/CVE-2019-73xx/CVE-2019-7321.json +++ b/CVE-2019/CVE-2019-73xx/CVE-2019-7321.json @@ -2,7 +2,7 @@ "id": "CVE-2019-7321", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-13T18:29:00.730", - "lastModified": "2024-07-17T22:15:02.780", + "lastModified": "2024-09-11T16:15:03.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -102,6 +102,10 @@ "url": "https://bugs.ghostscript.com/show_bug.cgi?id=700560", "source": "cve@mitre.org" }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=2be83b57e77938fddbb06bdffb11979ad89a9c7d", + "source": "cve@mitre.org" + }, { "url": "https://github.com/ereisr00/bagofbugz/tree/master/MuPDF/700560", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-218xx/CVE-2020-21896.json b/CVE-2020/CVE-2020-218xx/CVE-2020-21896.json index c46531605a4..539438e5430 100644 --- a/CVE-2020/CVE-2020-218xx/CVE-2020-21896.json +++ b/CVE-2020/CVE-2020-218xx/CVE-2020-21896.json @@ -2,8 +2,8 @@ "id": "CVE-2020-21896", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:18.793", - "lastModified": "2023-08-25T18:15:18.393", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:03.750", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,10 @@ } ], "references": [ + { + "url": "http://www.ghostscript.com/cgi-bin/findgit.cgi?8719e07834d6a72b6b4131539e49ed1e8e2ff79e", + "source": "cve@mitre.org" + }, { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=701294", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-266xx/CVE-2020-26683.json b/CVE-2020/CVE-2020-266xx/CVE-2020-26683.json index fe9cd8ed60a..7e0ea0ecdd5 100644 --- a/CVE-2020/CVE-2020-266xx/CVE-2020-26683.json +++ b/CVE-2020/CVE-2020-266xx/CVE-2020-26683.json @@ -2,8 +2,8 @@ "id": "CVE-2020-26683", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:19.997", - "lastModified": "2023-08-28T16:44:27.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:03.843", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ "Issue Tracking", "Patch" ] + }, + { + "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=05720b4ee3dbae57e65546dc2eecc3021c08eeea", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json index eb6cab2e168..5e1617e7de2 100644 --- a/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json +++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1245.json @@ -2,13 +2,13 @@ "id": "CVE-2021-1245", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-01-13T22:15:21.083", - "lastModified": "2023-11-07T03:27:46.890", + "lastModified": "2024-09-11T16:15:04.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Multiple vulnerabilities in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack and obtain potentially confidential information by leveraging a flaw in the authentication mechanism. For more information about these vulnerabilities, see the Details section of this advisory." + "value": "Cisco Finesse and Cisco Unified CVP OpenSocial Gadget Editor Cross-Site Scripting Vulnerability\r\n\r\nA vulnerability in the web-based management interface of Cisco Finesse and Cisco Unified CVP could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." }, { "lang": "es", @@ -101,7 +101,7 @@ "description": [ { "lang": "en", - "value": "CWE-306" + "value": "CWE-79" } ] } @@ -181,11 +181,8 @@ ], "references": [ { - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2", - "source": "ykramarz@cisco.com", - "tags": [ - "Vendor Advisory" - ] + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2", + "source": "ykramarz@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json b/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json index 15808d7421e..65492b3f5f2 100644 --- a/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json +++ b/CVE-2021/CVE-2021-12xx/CVE-2021-1246.json @@ -2,13 +2,13 @@ "id": "CVE-2021-1246", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-01-13T22:15:21.193", - "lastModified": "2023-11-07T03:27:47.093", + "lastModified": "2024-09-11T16:15:04.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Multiple vulnerabilities in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack and obtain potentially confidential information by leveraging a flaw in the authentication mechanism. For more information about these vulnerabilities, see the Details section of this advisory." + "value": "Cisco Finesse, Cisco Virtualized Voice Browser, and Cisco Unified CVP OpenSocial Gadget Editor Unauthenticated Access Vulnerability\r\n\r\nA vulnerability in the web management interface of Cisco Finesse, Cisco Virtualized Voice Browser, and Cisco Unified CVP could allow an unauthenticated, remote attacker to access the OpenSocial Gadget Editor without providing valid user credentials.\r\nThe vulnerability is due to missing authentication for a specific section of the web-based management interface. An attacker could exploit this vulnerability by accessing a crafted URL. A successful exploit could allow the attacker to obtain access to a section of the interface, which they could use to obtain potentially confidential information and create arbitrary XML files.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." }, { "lang": "es", @@ -181,11 +181,8 @@ ], "references": [ { - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2", - "source": "ykramarz@cisco.com", - "tags": [ - "Vendor Advisory" - ] + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multi-vuln-finesse-qp6gbUO2", + "source": "ykramarz@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4441.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4441.json index 6df6edd5b7b..2ecea339c78 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4441.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4441.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4441", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:04.563", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:43:41.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,142 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: spi-zynq-qspi: corrige una desreferencia de puntero NULL en zynq_qspi_exec_mem_op() En zynq_qspi_exec_mem_op(), kzalloc() se usa directamente en memset(), lo que podr\u00eda provocar un Desreferencia del puntero NULL en caso de falla de kzalloc(). Corrija este error agregando una verificaci\u00f3n de tmpbuf. Este error fue encontrado por un analizador est\u00e1tico. El an\u00e1lisis emplea verificaci\u00f3n diferencial para identificar operaciones de seguridad inconsistentes (por ejemplo, comprobaciones o kfrees) entre dos rutas de c\u00f3digo y confirma que las operaciones inconsistentes no se recuperan en la funci\u00f3n actual o en las personas que llaman, por lo que constituyen errores. Tenga en cuenta que, como error encontrado mediante an\u00e1lisis est\u00e1tico, puede ser un falso positivo o dif\u00edcil de activar. Varios investigadores han realizado una revisi\u00f3n cruzada del error. Las compilaciones con CONFIG_SPI_ZYNQ_QSPI=m no muestran nuevas advertencias y nuestro analizador est\u00e1tico ya no advierte sobre este c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.4.182", + "matchCriteriaId": "14A69F21-00AC-43D7-A8A1-4D144BA6E074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.103", + "matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.26", + "matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.12", + "matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", + "matchCriteriaId": "B2D2677C-5389-4AE9-869D-0F881E80D923" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", + "matchCriteriaId": "EFA3917C-C322-4D92-912D-ECE45B2E7416" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2efece1368aeee2d2552c7ec36aeb676c4d4c95f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c32405d6474a21f7d742828e73c13e326dcae82", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab3824427b848da10e9fe2727f035bbeecae6ff4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9dd08cbebe0c593c49bf86d2012a431494e54cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df14d2bed8e2455878e046e67123d9ecb2e79056", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json index 6bd8bd7a836..3c39b84dc2f 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48895.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48895", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.580", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:01:23.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/arm-smmu: no cancelar el registro al apagar Michael Walle dice que not\u00f3 el siguiente seguimiento de pila mientras realizaba un apagado con \"reboot -f\". Sugiere que tuvo \"suerte\" y dio en el lugar correcto para el reinicio mientras hab\u00eda una transmisi\u00f3n de paquetes en vuelo. No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000098 CPU: 0 PID: 23 Comm: kworker/0:1 Not tainted 6.1.0-rc5-00088-gf3600ff8e322 #1930 Nombre de hardware: Kontron KBox A-230-LS (DT) pc: iommu_get_dma_domain+0x14/0x20 lr: iommu_dma_map_page+0x9c/0x254 Rastreo de llamadas: iommu_get_dma_domain+0x14/0x20 dma_map_page_attrs+0x1ec/0x250 enetc_start_xmit+0x14c/0x10b0 enetc_xmit+0x 60/0xdc dev_hard_start_xmit+0xb8/0x210 sch_direct_xmit+0x11c/0x420 __dev_queue_xmit+0x354 /0xb20 ip6_finish_output2+0x280/0x5b0 __ip6_finish_output+0x15c/0x270 ip6_output+0x78/0x15c NF_HOOK.constprop.0+0x50/0xd0 mld_sendpack+0x1bc/0x320 mld_ifc_work+0x1d8/0x4d c proceso_one_work+0x1e8/0x460 trabajador_thread+0x178/0x534 kthread+0xe0/ 0xe4 ret_from_fork+0x10/0x20 C\u00f3digo: d503201f f9416800 d503233f d50323bf (f9404c00) ---[ end trace 00000000000000000 ]--- P\u00e1nico del kernel - no se sincroniza: Ups: excepci\u00f3n fatal en la interrupci\u00f3n Esto parece ser reproducible cuando la placa tiene una IP direcci\u00f3n, se inunda el ping desde otro host y se utiliza \"reboot -f\". La siguiente es una manifestaci\u00f3n m\u00e1s del problema: $ reboot -f kvm: saliendo de la virtualizaci\u00f3n de hardware cfg80211: no se pudo cargar regulator.db arm-smmu 5000000.iommu: deshabilitando la traducci\u00f3n sdhci-esdhc 2140000.mmc: eliminando del grupo iommu 11 sdhci- esdhc 2150000.mmc: Eliminaci\u00f3n del grupo iommu 12 fsl-edma 22c0000.dma-controller: Eliminaci\u00f3n del grupo iommu 17 dwc3 3100000.usb: Eliminaci\u00f3n del grupo iommu 9 dwc3 3110000.usb: Eliminaci\u00f3n del grupo iommu 10 ahci-qoriq 3200000.sata : Eliminaci\u00f3n de iommu grupo 2 fsl-qdma 8380000.dma-controller: Eliminaci\u00f3n de iommu grupo 20 plataforma f080000.display: Eliminaci\u00f3n de iommu grupo 0 etnaviv-gpu f0c0000.gpu: Eliminaci\u00f3n de iommu grupo 1 etnaviv etnaviv: Eliminaci\u00f3n de iommu grupo 1 caam_jr 8010000.jr: Eliminando del grupo iommu 13 caam_jr 8020000.jr: Eliminando del grupo iommu 14 caam_jr 8030000.jr: Eliminando del grupo iommu 15 caam_jr 8040000.jr: Eliminando del grupo iommu 16 fsl_enetc 0000:00:00.0: Eliminando de iommu grupo 4 arm-smmu 5000000.iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000 fsl_enetc 0000:00 :00.1: Eliminaci\u00f3n del grupo 5 de Iommu arm-smmu 5000000.iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000 arm-smmu 5000000. iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429 ; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x80000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000 fsl_enetc 0000:00 :00.2: Eliminaci\u00f3n del grupo 6 de Iommu fsl_enetc_mdio 0000:00:00.3: Eliminaci\u00f3n del grupo iommu 8 mscc_felix 0000:00:00.5: Eliminaci\u00f3n del grupo iommu 3 fsl_enetc 0000:00:00.6: Eliminaci\u00f3n del grupo iommu 7 pcieport 0001:00:00.0: Eliminaci\u00f3n del grupo iommu 1 8 brazos- smmu 5000000.iommu: ID de transmisi\u00f3n desconocida bloqueada 0x429; arranque con \"arm-smmu.disable_bypass=0\" para permitir, pero esto puede tener implicaciones de seguridad arm-smmu 5000000.iommu: GFSR 0x00000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000 pcieport 0002:00:00 .0: ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "043B7290-EDB8-4ACE-A87A-8FA7D130B565" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a1b9c7b1978aacf4b2f33e34bde1e2bb80b8497a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce31e6ca68bd7639bd3e5ef97be215031842bbab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json index dd078568e4a..491bd714314 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48896.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48896", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.640", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:06:04.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,132 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ixgbe: repara la fuga de recuento de dispositivos pci Como dice el comentario de pci_get_domain_bus_and_slot(), devuelve un dispositivo PCI con el recuento de referencia incrementado, cuando termine de usarlo, la persona que llama debe disminuir el recuento de referencias en llamando a pci_dev_put(). En ixgbe_get_first_secondary_devfn() y ixgbe_x550em_a_has_mii(), se llama a pci_dev_put() para evitar fugas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.4.229", + "matchCriteriaId": "2A559735-D7FB-49EC-A608-46802CA50E6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.164", + "matchCriteriaId": "CA742E66-32D2-459E-AB19-171C4DB3B1F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.89", + "matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/112df4cd2b09acd64bcd18f5ef83ba5d07b34bf0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c93422a54cd6a349988f42e1c6bf082cf4ea9d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53cefa802f070d46c0c518f4865be2c749818a18", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b93fb4405fcb5112c5739c5349afb52ec7f15c07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c49996c6aa03590e4ef5add8772cb6068d99fd59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json index f0bf238c320..9fdb931af79 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48897.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48897", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.693", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:10:40.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: arm64/mm: corrige file_map_count incorrecto para pmd no v\u00e1lido. La verificaci\u00f3n de la tabla de p\u00e1ginas activa BUG_ON() inesperadamente cuando se divide una p\u00e1gina enorme: ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en mm/page_table_check.c:119! Error interno: Ups - ERROR: 00000000f2000800 [#1] SMP Dumping ftrace buffer: (ftrace buffer vac\u00edo) M\u00f3dulos vinculados en: CPU: 7 PID: 210 Comm: transhuge-stres No contaminado 6.1.0-rc3+ #748 Nombre de hardware: linux ,dummy-virt (DT) pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: page_table_check_set.isra.0+0x398/0x468 lr: page_table_check_set.isra.0+0x1c0/0x468 [...] Rastreo de llamadas: page_table_check_set.isra.0+0x398/0x468 __page_table_check_pte_set+0x160/0x1c0 __split_huge_pmd_locked+0x900/0x1648 __split_huge_pmd+0x28c/0x3b8 unmap_page_range+0x428/0x858 single_vma+0xf4/0x1c8 zap_page_range+0x2b0/0x410 madvise_vma_behavior+0xc44 /0xe78 do_madvise+0x280/0x698 __arm64_sys_madvise+0x90/0xe8 invoke_syscall.constprop.0+0xdc/0x1d8 do_el0_svc+0xf4/0x3f8 el0_svc+0x58/0x120 el0t_64_sync_handler+0x b8/0xc0 el0t_64_sync+0x19c/0x1a0 [...] En arm64, pmd_leaf () devolver\u00e1 verdadero incluso si el pmd no es v\u00e1lido debido a la verificaci\u00f3n pmd_present_invalid(). Entonces, en pmdp_invalidate() file_map_count no solo disminuir\u00e1 una vez sino que tambi\u00e9n aumentar\u00e1 una vez. Luego, en set_pte_at(), file_map_count aumenta nuevamente y, por lo tanto, activa BUG_ON() inesperadamente. Agregue !pmd_present_invalid() check in pmd_user_accessible_page() para solucionar el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "A3B4D9E4-9005-47B1-B0C1-FFC9874D6FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/21e5eca0ac9046da9918a919bc92b7b5a78d27e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74c2f81054510d45b813548cb0a1c4ebf87cdd5f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json index 60d64888b37..df0ad323aad 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48898.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.750", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:19:18.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,118 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/dp: no complete dp_aux_cmd_fifo_tx() si irq no es para transferencia auxiliar. Hay 3 posibles fuentes de interrupci\u00f3n que son manejadas por el controlador DP, HPDstatus, los cambios de estado del controlador y Aux. transacci\u00f3n de lectura/escritura. En cada irq, el controlador DP debe verificar el estado isr de cada fuente de interrupci\u00f3n y atender la interrupci\u00f3n si sus bits de estado isr muestran que hay interrupciones pendientes. Existe una posible condici\u00f3n de ejecuci\u00f3n que puede ocurrir en la implementaci\u00f3n actual del controlador aux isr, ya que siempre est\u00e1 completo dp_aux_cmd_fifo_tx(), incluso irq no es para transacciones de lectura o escritura auxiliar. Esto puede causar que la transacci\u00f3n de lectura auxiliar regrese prematuramente si la lectura de datos auxiliares del host est\u00e1 en medio de la espera de que el receptor complete la transferencia de datos al host mientras ocurre la irq. Esto har\u00e1 que el b\u00fafer de recepci\u00f3n del host contenga datos inesperados. Este parche soluciona este problema verificando aux isr y regresa inmediatamente al controlador aux isr si no hay ning\u00fan bit de estado isr establecido. Actualmente hay un informe de error que indica que la corrupci\u00f3n de eDP edid ocurre durante el inicio del sistema. Despu\u00e9s de una larga depuraci\u00f3n, descubr\u00ed que la interrupci\u00f3n VIDEO_READY se activaba continuamente durante el inicio del sistema, lo que provocaba que dp_aux_isr() completara dp_aux_cmd_fifo_tx() prematuramente para recuperar datos del b\u00fafer de hardware auxiliar que a\u00fan no contiene la transferencia completa de datos desde el receptor. Esto provoc\u00f3 corrupci\u00f3n. A continuaci\u00f3n se muestra la firma en los registros del kernel cuando ocurre un problema, EDID tiene el panel de encabezado corrupto-simple-dp-aux aux-aea0000.edp: No se pudo identificar el panel a trav\u00e9s de EDID Cambios en v2: - complete si (ret == IRQ_HANDLED) ay dp-aux_isr() - agregar m\u00e1s texto de confirmaci\u00f3n Cambios en v3: - agregar Stephen sugerido - dp_aux_isr() devolver IRQ_XXX a la persona que llama - dp_ctrl_isr() devolver IRQ_XXX a la persona que llama Cambios en v4: - dividir en dos parches Cambios en v5: - eliminar l\u00ednea vac\u00eda entre etiquetas Cambios en v6: - eliminar \"eso\" adicional y l\u00ednea fija de m\u00e1s de 75 caracteres en el texto de confirmaci\u00f3n Patchwork: https://patchwork.freedesktop.org/patch/516121/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.164", + "matchCriteriaId": "0A75A69A-4F89-495D-9990-0D27E9EA3748" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.89", + "matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1cba0d150fa102439114a91b3e215909efc9f169", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/785607e5e6fb52caf141e4580de40405565f04f1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/984ad875db804948c86ca9e1c2e784ae8252715a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7dcbca46db3c77fdb02c2a9d6239e5aa3b06a59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json index 6c1dd842a27..b6f3a4520ea 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48899.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48899", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.810", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:22:26.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,146 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/virtio: corrige la creaci\u00f3n del identificador GEM. El espacio de usuario UAF puede adivinar el valor del identificador e intentar acelerar la creaci\u00f3n de objetos GEM con el cierre del identificador, lo que resulta en un use-after-free si desreferenciamos el objeto despu\u00e9s de soltar la referencia del identificador. Por esa raz\u00f3n, la eliminaci\u00f3n de la referencia del identificador debe realizarse *despu\u00e9s* de que hayamos terminado de desreferenciar el objeto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4", + "versionEndExcluding": "4.19.270", + "matchCriteriaId": "418E3384-8E40-4371-AD2F-18BCA50756EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.229", + "matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.164", + "matchCriteriaId": "CA742E66-32D2-459E-AB19-171C4DB3B1F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.89", + "matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/011ecdbcd520c90c344b872ca6b4821f7783b2f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/19ec87d06acfab2313ee82b2a689bf0c154e57ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/52531258318ed59a2dc5a43df2eaf0eb1d65438e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/68bcd063857075d2f9edfed6024387ac377923e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adc48e5e408afbb01d261bd303fd9fbbbaa3e317", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d01d6d2b06c0d8390adf8f3ba08aa60b5642ef73", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39914.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39914.json index 81744727dc3..b932aa712d4 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39914.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39914.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39914", "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2023-09-13T15:15:07.657", - "lastModified": "2023-09-15T15:17:58.497", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:04.547", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "NLnet Labs\u2019 bcder library up to and including version 0.7.2 panics while decoding certain invalid input data rather than rejecting the data with an error. This can affect both the actual decoding stage as well as accessing content of types that utilized delayed decoding." + "value": "NLnet Labs' bcder library up to and including version 0.7.2 panics while decoding certain invalid input data rather than rejecting the data with an error. This can affect both the actual decoding stage as well as accessing content of types that utilized delayed decoding." }, { "lang": "es", @@ -76,7 +76,11 @@ "description": [ { "lang": "en", - "value": "CWE-228" + "value": "CWE-232" + }, + { + "lang": "en", + "value": "CWE-240" } ] } diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39915.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39915.json index b47a5220bc7..7a8df982a50 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39915.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39915.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39915", "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2023-09-13T15:15:07.763", - "lastModified": "2023-09-15T19:04:36.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:04.700", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "NLnet Labs\u2019 Routinator up to and including version 0.12.1 may crash when trying to parse certain malformed RPKI objects. This is due to insufficient input checking in the bcder library covered by CVE-2023-39914." + "value": "NLnet Labs' Routinator up to and including version 0.12.1 may crash when trying to parse certain malformed RPKI objects. This is due to insufficient input checking in the bcder library covered by CVE-2023-39914." }, { "lang": "es", @@ -76,7 +76,11 @@ "description": [ { "lang": "en", - "value": "CWE-228" + "value": "CWE-232" + }, + { + "lang": "en", + "value": "CWE-240" } ] } diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40708.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40708.json index ecb9976ed7a..072cda112bb 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40708.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40708.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40708", "sourceIdentifier": "ot-cert@dragos.com", "published": "2023-08-24T17:15:09.067", - "lastModified": "2023-08-29T23:33:16.533", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:04.820", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-1188" } ] } diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40709.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40709.json index 06d54504771..a7bc09daf17 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40709.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40709.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40709", "sourceIdentifier": "ot-cert@dragos.com", "published": "2023-08-24T17:15:09.160", - "lastModified": "2023-08-29T23:32:09.780", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:04.970", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-770" } ] } diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40710.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40710.json index 6a87ef84aba..c217a45742b 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40710.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40710.json @@ -2,13 +2,13 @@ "id": "CVE-2023-40710", "sourceIdentifier": "ot-cert@dragos.com", "published": "2023-08-24T17:15:09.253", - "lastModified": "2023-08-30T13:37:34.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:05.057", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the\u00a0SNAP PAC S1 Firmware version R10.3b\n" + "value": "An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the\u00a0SNAP PAC S1 Firmware version R10.3b" } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-770" } ] } diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46371.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46371.json index 2ec1cc3faea..e9ecfc0635a 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46371.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46371.json @@ -2,13 +2,13 @@ "id": "CVE-2023-46371", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:37.877", - "lastModified": "2023-11-01T20:08:56.603", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:15:05.180", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "TP-Link device TL-WDR7660 2.0.30 has a stack overflow vulnerability via the function upgradeInfoJsonToBin." + "value": "TP-Link device TL-WDR7660 2.0.30 and TL-WR886N 2.0.12 has a stack overflow vulnerability via the function upgradeInfoJsonToBin." }, { "lang": "es", @@ -88,6 +88,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/Jianchun-Ding/CVE-poc-update", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46414.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46414.json index 9ef5bf06a59..f8709a11769 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46414.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46414.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46414", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.357", - "lastModified": "2023-11-01T16:36:05.017", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:02.090", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46415.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46415.json index 0db0fd34613..a963a1f9f11 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46415.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46415.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46415", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.400", - "lastModified": "2023-11-01T16:36:12.117", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:03.377", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46416.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46416.json index d96d79ac2d5..dc657d01309 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46416.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46416.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46416", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.447", - "lastModified": "2023-11-01T16:36:26.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:04.277", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46417.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46417.json index 02d586dcb3d..fbc860e61d7 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46417.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46417.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46417", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.490", - "lastModified": "2023-11-01T16:36:37.977", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:05.057", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46418.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46418.json index 207b0394882..20f50fbd2ee 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46418.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46418.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46418", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.540", - "lastModified": "2023-11-01T16:36:47.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:05.910", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46419.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46419.json index 3f2f109ad24..f210515a239 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46419.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46419.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46419", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.600", - "lastModified": "2023-11-01T16:36:59.347", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:10.787", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46420.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46420.json index 5823eaa9a19..645a333679f 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46420.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46420.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46420", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.670", - "lastModified": "2023-11-01T16:37:11.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:11.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46421.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46421.json index ad3e3ab75ec..957cd5a9ff5 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46421.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46421.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46421", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.740", - "lastModified": "2023-11-01T16:37:21.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:12.407", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46422.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46422.json index af188be5332..5c1af2e9714 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46422.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46422.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46422", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.803", - "lastModified": "2023-11-01T16:37:31.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:13.283", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46423.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46423.json index 59e572d8371..604d109b541 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46423.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46423.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46423", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T20:15:12.863", - "lastModified": "2023-11-01T16:37:41.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:14.223", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46520.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46520.json index 4844bbac10c..677454e811b 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46520.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46520.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46520", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.053", - "lastModified": "2023-10-26T22:18:36.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:15.170", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46521.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46521.json index 2c7e3683b4e..4c8a44ac430 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46521.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46521.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46521", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.100", - "lastModified": "2023-10-26T22:41:06.530", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:15.977", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46522.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46522.json index 7ee44ed3244..920b34ca92d 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46522.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46522.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46522", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.147", - "lastModified": "2023-10-26T22:41:11.743", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:16.773", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46523.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46523.json index 1219fb7ca80..dcaeadf7053 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46523.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46523.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46523", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.193", - "lastModified": "2023-10-26T22:41:16.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:17.560", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46525.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46525.json index fd34c3fb7bc..5a6fe098a7f 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46525.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46525.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46525", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.237", - "lastModified": "2023-10-26T22:41:25.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:18.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46526.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46526.json index 68385256df4..643a174dc66 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46526.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46526.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46526", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.283", - "lastModified": "2023-10-26T22:41:40.603", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:19.150", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46527.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46527.json index 19d1d862c54..923be71c466 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46527.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46527.json @@ -2,13 +2,13 @@ "id": "CVE-2023-46527", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.323", - "lastModified": "2023-10-26T22:41:32.283", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:19.963", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function bindRequestHandle." + "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin and TL-WDR7660 2.0.30 was discovered to contain a stack overflow via the function bindRequestHandle." }, { "lang": "es", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ @@ -81,6 +111,10 @@ } ], "references": [ + { + "url": "https://github.com/Jianchun-Ding/CVE-poc-update", + "source": "cve@mitre.org" + }, { "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/13/1.md", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46534.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46534.json index cde70033489..9c0f1b09a5e 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46534.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46534.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46534", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.373", - "lastModified": "2023-10-26T22:41:48.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:20.833", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46535.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46535.json index 93d1923a42d..5abc40be7fe 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46535.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46535.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46535", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.420", - "lastModified": "2023-10-26T22:41:55.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:22.007", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46536.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46536.json index 503a0ea8021..e81c4dfa579 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46536.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46536.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46536", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.463", - "lastModified": "2023-10-26T22:42:01.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:22.883", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46537.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46537.json index e18bc2e9443..21b502e01c1 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46537.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46537.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46537", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.503", - "lastModified": "2023-10-26T22:42:07.053", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:23.687", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46538.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46538.json index dbde64985e2..c3be0f198f6 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46538.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46538", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.550", - "lastModified": "2023-10-26T22:42:13.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:24.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46539.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46539.json index 6ce2df68dd6..10381aeccb1 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46539.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46539.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46539", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.593", - "lastModified": "2023-10-26T22:42:20.953", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:25.280", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46540.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46540.json index ff4d1af0284..abddf09d02a 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46540.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46540.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46540", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.637", - "lastModified": "2023-11-01T20:18:44.327", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:26.063", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46541.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46541.json index 5638386dc1f..04184c506d0 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46541.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46541.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46541", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.683", - "lastModified": "2023-11-02T12:49:01.120", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:26.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46542.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46542.json index 2ad63eb23c7..946f19a1da1 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46542.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46542", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.727", - "lastModified": "2023-11-02T13:09:06.287", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:27.667", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46543.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46543.json index f0fce4af495..ebc92f25489 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46543.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46543.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46543", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.780", - "lastModified": "2023-11-01T20:35:20.917", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:28.450", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46544.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46544.json index 5f3abbf375f..3d270420786 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46544.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46544.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46544", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:38.827", - "lastModified": "2023-11-01T20:28:38.340", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:29.257", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46552.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46552.json index 386a9a8096d..2af198e87aa 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46552.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46552.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46552", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.227", - "lastModified": "2023-11-01T18:01:24.630", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:30.173", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46553.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46553.json index 7ee5a56fe33..1c1308707aa 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46553.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46553.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46553", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.273", - "lastModified": "2023-11-01T18:01:20.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:30.983", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46554.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46554.json index 0d19b39b0a5..64d43256af0 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46554.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46554.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46554", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.317", - "lastModified": "2023-10-27T22:01:03.050", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:31.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46555.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46555.json index 54742d5d27f..da69e6f86a8 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46555.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46555.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46555", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.363", - "lastModified": "2023-10-27T22:00:56.397", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:32.637", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46556.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46556.json index b1896a647a9..353230fd46e 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46556.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46556.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46556", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.410", - "lastModified": "2023-10-27T22:00:49.937", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:33.430", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46557.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46557.json index 5ecf9975a68..dfb76a9a40a 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46557.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46557.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46557", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.450", - "lastModified": "2023-10-27T22:00:41.117", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:34.220", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46558.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46558.json index 5686712b2ad..26bb1ad3351 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46558.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46558.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46558", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.497", - "lastModified": "2023-10-27T22:00:33.390", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:35.010", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46559.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46559.json index bc47b295799..dfe75b4a05b 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46559.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46559.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46559", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.547", - "lastModified": "2023-10-27T22:00:25.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:35.797", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46560.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46560.json index 7de591c0bba..32594cc7c36 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46560.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46560.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46560", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.593", - "lastModified": "2023-10-27T22:00:15.483", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:36.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46562.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46562.json index dad3be5e414..b563ab65823 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46562.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46562.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46562", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.637", - "lastModified": "2023-10-27T22:00:06.663", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:37.377", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46563.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46563.json index 8aa88ce77ba..fa22d48291d 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46563.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46563.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46563", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:39.683", - "lastModified": "2023-10-27T22:00:00.013", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-11T16:35:38.173", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json index e81d5ac66f2..378e1d9a39b 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52893.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52893", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.880", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:24:49.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,165 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gsmi: corrige null-deref en gsmi_get_variable Podemos obtener variables EFI sin recuperar el atributo, por lo que debemos permitir eso en gsmi. commit 859748255b43 (\"efi: pstore: Omit efivars caching EFI varstore access Layer\") agreg\u00f3 una nueva llamada get_variable con attr=NULL, lo que desencadena p\u00e1nico en gsmi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "4.14.304", + "matchCriteriaId": "7484020E-A2C4-48A2-9137-7AA65DB251B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.271", + "matchCriteriaId": "D86DA289-B5BC-4629-BD56-AB453D481393" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.230", + "matchCriteriaId": "9DB7398D-9781-49C5-B2AE-1969B694B614" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32313c11bdc8a02c577abaf865be3664ab30410a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6646d769fdb0ce4318ef9afd127f8526d1ca8393", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a769b05eeed7accc4019a1ed9799dd72067f1ce8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae2a9dcc8caa60b1e14671294e5ec902ea5d1dfd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb0421d90f916dffe96b4c049ddf01c0c50620d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee5763ef829bd923033510de6d1df7c73f085e4b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffef77794fb5f1245c3249b86342bad2299accb5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json index a7b2e4e7562..6e0ed197594 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52894.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52894", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:05.943", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:27:06.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,164 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: f_ncm: corrige potencial NULL ptr deref en ncm_bitrate() En el error interno de Google 265639009 hemos recibido un informe de fallo (hasta ahora) irreproducible de un aarch64 GKI 5.10. Dispositivo en ejecuci\u00f3n 149-android13. AFAICT, el c\u00f3digo fuente est\u00e1 en: https://android.googlesource.com/kernel/common/+/refs/tags/ASB-2022-12-05_13-5.10 La pila de llamadas es: ncm_close() -> ncm_notify() - > ncm_do_notify() con el bloqueo en: ncm_do_notify+0x98/0x270 C\u00f3digo: 79000d0b b9000a6c f940012a f9400269 (b9405d4b) El cual creo que se desmonta (no conozco el ensamblaje de ARM, pero me parece bastante sensato...): / / almac\u00e9n de media palabra (16 bits) presumiblemente en evento->wLength (en el desplazamiento 6 de la estructura usb_cdc_notification) 0B 0D 00 79 strh w11, [x8, #6] // almac\u00e9n de palabra (32 bits) presumiblemente en req->Longitud (en el desplazamiento 8 de la estructura usb_request) 6C 0A 00 B9 str w12, [x19, #8] // aqu\u00ed se ley\u00f3 x10 (NULL) desde el desplazamiento 0 del puntero v\u00e1lido x9 // En mi humilde opini\u00f3n, estamos leyendo 'cdev->gadget' y obtener NULL // el gadget est\u00e1 de hecho en el desplazamiento 0 de la estructura usb_composite_dev 2A 01 40 F9 ldr x10, [x9] // cargando el puntero req->buf, que est\u00e1 en el desplazamiento 0 de la estructura usb_request 69 02 40 F9 ldr x9, [x19 ] // x10 es nulo, falla, parece ser un intento de leer cdev->gadget->max_speed 4B 5D 40 B9 ldr w11, [x10, #0x5c] que parece alinearse con ncm_do_notify() caso NCM_NOTIFY_SPEED fragmento de c\u00f3digo: evento ->wLongitud = cpu_to_le16(8); solicitud->longitud = NCM_STATUS_BYTECOUNT; /* Los datos SPEED_CHANGE son velocidades de subida/bajada en bits/seg. */ data = req->buf + sizeof *event; datos[0] = cpu_to_le32(ncm_bitrate(cdev->gadget)); Mi an\u00e1lisis de los registros y la compensaci\u00f3n de fallas de NULL ptr deref (no se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 000000000000005c) sugiere en gran medida que la falla se debe a que 'cdev->gadget' es NULL al ejecutar: datos[0] = cpu_to_le32(ncm_bitrate (cdev->gadget)); que llama: ncm_bitrate(NULL) que luego llama: gadget_is_superspeed(NULL) que lee ((struct usb_gadget *)NULL)->max_speed y entra en p\u00e1nico. AFAICT, si estoy contando bien, el desplazamiento de max_speed es de hecho 0x5C. (recuerde que hay una reserva GKI KABI de 16 bytes en la estructura work_struct) No me queda del todo claro c\u00f3mo se supone que funciona todo esto... pero devolver 0 parece mucho mejor que entrar en p\u00e1nico..." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.14.304", + "matchCriteriaId": "E8A9B982-D3D6-49CA-BF0A-196ED7947B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.271", + "matchCriteriaId": "D86DA289-B5BC-4629-BD56-AB453D481393" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.230", + "matchCriteriaId": "9DB7398D-9781-49C5-B2AE-1969B694B614" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09e4507ec8ef2d44da6ba4092b8ee2d81f216497", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/63d161f29cd39c050e8873aa36e0c9fc013bb763", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a21da7f7aae618c785f7e4a275d43c06dc8412b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a69c8dfb85b44be9cc223be07d35cc3a9baefbea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6ec929595c7443250b2a4faea988c62019d5cd2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e92c70059178da751e5af7de02384b7dfadb5ec7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fef6b29671b66dfb71f17e337c1ad14b5a2cedae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json index cd7af53f2d1..3eba440c815 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52895.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52895", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.007", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:31:31.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,73 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring/poll: no volver a emitir en caso de ejecuci\u00f3n de sondeo en solicitud de m\u00faltiples disparos. Una confirmaci\u00f3n anterior solucion\u00f3 una ejecuci\u00f3n de sondeo que puede ocurrir, pero solo se aplica a solicitudes de m\u00faltiples disparos. Para una solicitud de disparo m\u00faltiple, podemos ignorar con seguridad una activaci\u00f3n espuria, ya que, para empezar, nunca salimos de la cola de espera. Una reemisi\u00f3n contundente de una solicitud de armado de m\u00faltiples disparos puede hacer que perdamos un b\u00fafer, si se proporciona en anillo. Si bien esto parece un error en s\u00ed mismo, en realidad no es un comportamiento definido volver a emitir una solicitud multidisparo directamente. Tambi\u00e9n es menos eficiente hacerlo y no es necesario rearmar nada como lo es para solicitudes de sondeo de un solo disparo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "6E5E3E6D-B23E-4B23-9819-3DEB8963E4E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/36fc7317cdb16cfeae0f879916995037bb615ac4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8caa03f10bf92cb8657408a6ece6a8a73f96ce13", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json index 51ca26add14..7cd00c8a0b5 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52896.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52896", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.060", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:37:08.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,144 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre el rescaneo de cuotas y la deshabilitaci\u00f3n que conduce a un puntero NULL deref. Si tenemos una tarea que intenta iniciar el trabajador de rescaneo de cuotas mientras otra intenta deshabilitar las cuotas, podemos finalizar hasta llegar a una ejecuci\u00f3n que resulta en que el trabajador de rescaneo de cuotas realice una desreferencia del puntero NULL. Los pasos para esto son los siguientes: 1) Se habilitan las cuotas; 2) La tarea A llama al ioctl de rescaneo de cuotas e ingresa btrfs_qgroup_rescan(). Llama a qgroup_rescan_init() que devuelve 0 (\u00e9xito) y luego se une a una transacci\u00f3n y la confirma; 3) La tarea B llama a ioctl de desactivaci\u00f3n de cuota e ingresa btrfs_quota_disable(). Borra el bit BTRFS_FS_QUOTA_ENABLED de fs_info->flags y llama a btrfs_qgroup_wait_for_completion(), que regresa inmediatamente ya que el trabajador de rescaneo a\u00fan no se est\u00e1 ejecutando. Luego inicia una transacci\u00f3n y bloquea fs_info->qgroup_ioctl_lock; 4) La tarea A pone en cola al trabajador que vuelve a escanear, llamando a btrfs_queue_work(); 5) El trabajador de rescaneo inicia y llama a rescan_should_stop() al inicio de su ciclo while, lo que resulta en 0 iteraciones del ciclo, ya que la bandera BTRFS_FS_QUOTA_ENABLED fue borrada de fs_info->flags por la tarea B en el paso 3); 6) La tarea B establece fs_info->quota_root en NULL; 7) El trabajador de rescaneo intenta iniciar una transacci\u00f3n y usa fs_info->quota_root como argumento ra\u00edz para btrfs_start_transaction(). Esto da como resultado una desreferencia del puntero NULL en la cadena de llamadas de btrfs_start_transaction(). El seguimiento de la pila es similar al que se informa en la etiqueta de enlace a continuaci\u00f3n: falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000041: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000208-0x0000000000000020f] CPU: 1 PID: 34 Comm: kworker/u4:2 No contaminado 6.1.0-syzkaller-13872-gb6bb9676f216 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Cola de trabajo: btrfs-qgroup-rescan btrfs_work_helper RIP: 0010:start_transaction+0x48/0x10f0 fs/btrfs/transaction.c:564 C\u00f3digo: 48 89 fb 48 (...) RSP: 0018:ffffc90000ab7ab0 EFLAGS: 00010206 RAX: 0000000000000041 X: 0000000000000208 RCX: ffff88801779ba80 RDX: 00000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: dffffc0000000000 R08: 0000000000000001 R09: fffff52000156f5d R10: fffff52000156f5d R11: 2000156f5c R12: 0000000000000000 R13: 0000000000000001 R14: 0000000000000001 R15: 00000000000000003 FS: 0000000000000000(0000) 8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2bea75b718 CR3: 000000001d0cc000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 00000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: / btrfs/qgroup.c:3402 btrfs_work_helper+0x312/0x850 fs/btrfs/async-thread.c:280 Process_one_work+0x877/0xdb0 kernel/workqueue.c:2289 trabajador_thread+0xb14/0x1330 kernel/workqueue.c:2436 kthread+0x266 /0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 M\u00f3dulos vinculados en: Solucione este problema haciendo que la funci\u00f3n de trabajo de rescaneo no intente iniciar una transacci\u00f3n si No hice ning\u00fan trabajo de reexploraci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.178", + "versionEndExcluding": "5.4.230", + "matchCriteriaId": "E16E0383-9CED-439E-8DEC-DDDD9B142E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.99", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "5C13010D-C392-45FA-BB6D-957B35B6E33C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.22", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "11ABF525-41F7-480A-8DEB-5BF11C1C0C44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartExcluding": "5.16.8", + "versionEndExcluding": "5.17", + "matchCriteriaId": "F6E1B0A7-FD05-4730-935F-1A3481E6B3AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "3FB612E5-3EDB-46B7-95D9-1BA0CD61AA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1004fc90f0d79a4b7d9e3d432729914f472f9ad1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3bd43374857103ba3cac751d6d4afa8d83b5d92a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64287cd456a22373053998c1fccf14b651e9cbbd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89ac597e3e807b91e2ebd6a7c36fec7b97290233", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7adbf9ada3513d2092362c8eac5cddc5b651f5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0104.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0104.json index 2f7e3127395..8eb2f473157 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0104.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0104", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-08-08T18:15:09.800", - "lastModified": "2024-08-08T18:55:19.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:40:35.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -51,10 +81,121 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:mlnx-os:*:*:*:*:-:*:*:*", + "versionEndExcluding": "3.11.2002", + "matchCriteriaId": "D34C04D4-8472-4497-8976-A1336CA1730E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:mlnx-os:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "3.11.2202", + "matchCriteriaId": "24D950AF-5F1E-4C64-AE31-C0974D2D0593" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:metrox-2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CBE1921-C790-488B-8B8B-228C4DBC2D7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:mlnx-gw:*:*:*:*:-:*:*:*", + "versionEndExcluding": "8.2.2202", + "matchCriteriaId": "836B17DB-2E03-4D33-B3D0-87C4F989A861" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:skyway:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59E40D6B-8182-4448-A57C-E300F9750A7A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:onyx:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "3.10.4402", + "matchCriteriaId": "26CF254C-1556-4D77-9423-C4DD973B8CE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:nvda-os_xc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2.2000", + "matchCriteriaId": "BD3E5FC6-48B3-4911-92EE-258F5FDE40FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:metrox-3_xc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5440361F-B691-419C-94F1-B457873463B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5559", - "source": "psirt@nvidia.com" + "source": "psirt@nvidia.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0113.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0113.json index efcd1edf9a4..2bd35b0681b 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0113.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0113", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-08-12T13:38:12.693", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:34:37.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -51,10 +81,114 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:mellanox_os:*:*:*:*:*:mellanox_os_lts:*:*", + "versionEndExcluding": "3.10.4500", + "matchCriteriaId": "E4D632AA-754C-4160-86D6-CB1CE337405C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:mellanox_os:*:*:*:*:*:mellanox_os:*:*", + "versionEndExcluding": "3.12.1002", + "matchCriteriaId": "A0761130-9A9E-43EE-B426-03AD461743AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:mellanox_os:*:*:*:*:*:mellanox_os_lts:*:*", + "versionStartExcluding": "3.11.0000", + "versionEndIncluding": "3.11.2302", + "matchCriteriaId": "5886AC86-BB6B-4627-91D7-9A6F256500A3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:onyx:*:*:*:*:onyx_lts:*:*:*", + "versionEndExcluding": "3.10.4504", + "matchCriteriaId": "1D9AD737-499F-4926-AB18-D34D75EFA169" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:h:nvidia:skyway:*:*:*:*:*:skyway_lts:*:*", + "versionEndExcluding": "8.1.4500", + "matchCriteriaId": "629A139D-C222-48B2-BCE9-323BD1595698" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:nvidia:skyway:*:*:*:*:*:skyway:*:*", + "versionEndExcluding": "8.2.2300", + "matchCriteriaId": "EF4FB15E-A443-402B-AB78-87F047FAA16C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:h:nvidia:metrox-3_xc:*:*:*:*:*:metrox:*:*", + "versionEndExcluding": "18.2.2300", + "matchCriteriaId": "0EAD9D32-C07A-4763-ADF6-CCD72A580125" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:h:nvidia:metrox-2:*:*:*:*:*:metrox:*:*", + "versionEndExcluding": "3.12.1002", + "matchCriteriaId": "F069237E-F6C7-4D57-9AB6-DAF4E75D7561" + } + ] + } + ] + } + ], "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5563", - "source": "psirt@nvidia.com" + "source": "psirt@nvidia.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0115.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0115.json index e60f2353047..8b32cc61d2a 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0115.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0115.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0115", "sourceIdentifier": "psirt@nvidia.com", "published": "2024-08-12T13:38:12.943", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:24:27.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -51,10 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nvidia:cv-cuda:*:*:*:*:*:jetpack:*:*", + "versionStartIncluding": "0.1.0", + "versionEndIncluding": "0.10.0", + "matchCriteriaId": "C46E7E53-7D0C-4D53-A3FC-3E195E817386" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nvidia:cv-cuda:*:*:*:*:*:ubuntu_20.04:*:*", + "versionStartIncluding": "0.1.0", + "versionEndIncluding": "0.10.0", + "matchCriteriaId": "38D1DC42-30AD-423B-91FA-8EC7929F936D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nvidia:cv-cuda:*:*:*:*:*:ubuntu_22.04:*:*", + "versionStartIncluding": "0.1.0", + "versionEndIncluding": "0.10.0", + "matchCriteriaId": "44B5F90C-CD1C-4F11-BB45-717CA0C8DEED" + } + ] + } + ] + } + ], "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5560", - "source": "psirt@nvidia.com" + "source": "psirt@nvidia.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1656.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1656.json index c478392786f..d3b0da05c2d 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1656.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1656.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1656", "sourceIdentifier": "security@octopus.com", "published": "2024-09-11T05:15:02.303", - "lastModified": "2024-09-11T05:15:02.303", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Affected versions of Octopus Server had a weak content security policy." + }, + { + "lang": "es", + "value": "Las versiones afectadas de Octopus Server ten\u00edan una pol\u00edtica de seguridad de contenido d\u00e9bil." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json new file mode 100644 index 00000000000..b85856006b4 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20304.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20304", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:11.853", + "lastModified": "2024-09-11T17:15:11.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the multicast traceroute version 2 (Mtrace2) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to exhaust the UDP packet memory of an affected device.\r\n\r\nThis vulnerability exists because the Mtrace2 code does not properly handle packet memory. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to exhaust the incoming UDP packet memory. The affected device would not be able to process higher-level UDP-based protocols packets, possibly causing a denial of service (DoS) condition.\r\nNote: This vulnerability can be exploited using IPv4 or IPv6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pak-mem-exhst-3ke9FeFy", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20317.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20317.json new file mode 100644 index 00000000000..09d11dfe576 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20317.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20317", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:12.043", + "lastModified": "2024-09-11T17:15:12.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the handling of specific Ethernet frames by Cisco IOS XR Software for various Cisco Network Convergence System (NCS) platforms could allow an unauthenticated, adjacent attacker to cause critical priority packets to be dropped, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to incorrect classification of certain types of Ethernet frames that are received on an interface. An attacker could exploit this vulnerability by sending specific types of Ethernet frames to or through the affected device. A successful exploit could allow the attacker to cause control plane protocol relationships to fail, resulting in a DoS condition. For more information, see the section of this advisory.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-684" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-l2services-2mvHdNuC", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20343.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20343.json new file mode 100644 index 00000000000..a76a073ad75 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20343.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20343", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:12.223", + "lastModified": "2024-09-11T17:15:12.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to read any file in the file system of the underlying Linux operating system. The attacker must have valid credentials on the affected device.\r\n\r\nThis vulnerability is due to incorrect validation of the arguments that are passed to a specific CLI command. An attacker could exploit this vulnerability by logging in to an affected device with low-privileged credentials and using the affected command. A successful exploit could allow the attacker access files in read-only mode on the Linux file system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-shellutil-HCb278wD", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json new file mode 100644 index 00000000000..24f3d6a32f5 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20381", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:12.403", + "lastModified": "2024-09-11T17:15:12.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the JSON-RPC API feature in ConfD that is used by the web-based management interfaces of Cisco Crosswork Network Services Orchestrator (NSO), Cisco Optical Site Manager, and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.\r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20390.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20390.json new file mode 100644 index 00000000000..667465b265e --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20390.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20390", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:12.613", + "lastModified": "2024-09-11T17:15:12.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Dedicated XML Agent feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on XML TCP listen port 38751.\r\n\r\nThis vulnerability is due to a lack of proper error validation of ingress XML packets. An attacker could exploit this vulnerability by sending a sustained, crafted stream of XML traffic to a targeted device. A successful exploit could allow the attacker to cause XML TCP port 38751 to become unreachable while the attack traffic persists." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20398.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20398.json new file mode 100644 index 00000000000..857d7f0fbd5 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20398.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20398", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:12.860", + "lastModified": "2024-09-11T17:15:12.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to obtain read/write file system access on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-priv-esc-CrG5vhCq", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20406.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20406.json new file mode 100644 index 00000000000..af2e441b5c5 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20406.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20406", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:13.040", + "lastModified": "2024-09-11T17:15:13.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the segment routing feature for the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending specific IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process on all affected devices that are participating in the Flexible Algorithm to crash and restart, resulting in a DoS condition.\r\nNote: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency. This vulnerability affects segment routing for IS-IS over IPv4 and IPv6 control planes as well as devices that are configured as level 1, level 2, or multi-level routing IS-IS type." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-xehpbVNe", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json index c7222f7b620..28801a3e904 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20466.json @@ -2,13 +2,13 @@ "id": "CVE-2024-20466", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-08-21T20:15:08.737", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-09-11T16:15:05.683", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device.\r\n\r\nThis vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges for the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system." + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. \r\n\r\nThis vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges for the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20483.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20483.json new file mode 100644 index 00000000000..95ba50e66af --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20483.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20483", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:13.213", + "lastModified": "2024-09-11T17:15:13.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple vulnerabilities in Cisco Routed PON Controller Software, which runs as a docker container on hardware that is supported by Cisco IOS XR Software, could allow an authenticated, remote attacker with Administrator-level privileges on the PON Manager or direct access to the PON Manager MongoDB instance to perform command injection attacks on the PON Controller container and execute arbitrary commands as root.\r\n\r\nThese vulnerabilities are due to insufficient validation of arguments that are passed to specific configuration commands. An attacker could exploit these vulnerabilities by including crafted input as the argument of an affected configuration command. A successful exploit could allow the attacker to execute arbitrary commands as root on the PON controller." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20489.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20489.json new file mode 100644 index 00000000000..47fda851f6a --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20489.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20489", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-11T17:15:13.393", + "lastModified": "2024-09-11T17:15:13.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials.\r\n\r\nThis vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software. An attacker could exploit this vulnerability by accessing the configuration files on an affected system. A successful exploit could allow the attacker to view MongoDB credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21529.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21529.json index 362a2ece8f7..342a2d883ad 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21529.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21529.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21529", "sourceIdentifier": "report@snyk.io", "published": "2024-09-11T05:15:02.547", - "lastModified": "2024-09-11T05:15:02.547", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Versions of the package dset before 3.1.4 are vulnerable to Prototype Pollution via the dset function due improper user input sanitization. This vulnerability allows the attacker to inject malicious object property using the built-in Object property __proto__, which is recursively assigned to all the objects in the program." + }, + { + "lang": "es", + "value": "Las versiones del paquete dset anteriores a la 3.1.4 son vulnerables a la contaminaci\u00f3n de prototipos a trav\u00e9s de la funci\u00f3n dset debido a una desinfecci\u00f3n incorrecta de la entrada del usuario. Esta vulnerabilidad permite al atacante inyectar una propiedad de objeto maliciosa mediante la propiedad de objeto incorporada __proto__, que se asigna de forma recursiva a todos los objetos del programa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json index 6c758d3895d..ba909da3223 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23716", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:10.957", - "lastModified": "2024-09-11T00:15:10.957", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In DevmemIntPFNotify of devicemem_server.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En DevmemIntPFNotify de devicemem_server.c, existe un posible use after free debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23906.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23906.json index 6e4f20ca755..e270e96851e 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23906.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23906.json @@ -2,13 +2,17 @@ "id": "CVE-2024-23906", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-09-11T04:15:03.530", - "lastModified": "2024-09-11T04:15:03.530", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (CWE-79) in the Controller 6000 and Controller 7000 diagnostic webpage allows an attacker to modify Controller configuration during an authenticated Operator's session.\n\n \n\n\n\nThis issue affects: Controller 6000 and Controller 7000 9.10 prior to vCR9.10.240816a (distributed in 9.10.1530 (MR2)), 9.00 prior to vCR9.00.240816a (distributed in 9.00.2168 (MR4)), 8.90 prior to vCR8.90.240816a (distributed in 8.90.2155 (MR5)), 8.80 prior to vCR8.80.240816b (distributed in 8.80.1938 (MR6)), all versions of 8.70 and prior." + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de la p\u00e1gina web (CWE-79) en la p\u00e1gina web de diagn\u00f3stico del Controller 6000 y el Controller 7000 permite que un atacante modifique la configuraci\u00f3n del Controller durante la sesi\u00f3n de un operador autenticado. Este problema afecta a: Controller 6000 y Controller 7000 9.10 anterior a vCR9.10.240816a (distribuido en 9.10.1530 (MR2)), 9.00 anterior a vCR9.00.240816a (distribuido en 9.00.2168 (MR4)), 8.90 anterior a vCR8.90.240816a (distribuido en 8.90.2155 (MR5)), 8.80 anterior a vCR8.80.240816b (distribuido en 8.80.1938 (MR6)), todas las versiones de 8.70 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24972.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24972.json index 6af265301ee..23fa64bd202 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24972.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24972.json @@ -2,13 +2,17 @@ "id": "CVE-2024-24972", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-09-11T04:15:05.250", - "lastModified": "2024-09-11T04:15:05.250", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Copy without Checking Size of Input (CWE-120) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authorised and authenticated operator to reboot the Controller, causing a Denial of Service. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes.\n\nThis issue affects:\u00a0Controller 6000 and Controller 7000 9.10 prior to vCR9.10.240816a (distributed in 9.10.1530 (MR2)), 9.00 prior to vCR9.00.240816a (distributed in 9.00.2168 (MR4)), 8.90 prior to vCR8.90.240816a (distributed in 8.90.2155 (MR5)),\u00a08.80 prior to vCR8.80.240816b (distributed in 8.80.1938 (MR6)), all versions of 8.70 and prior." + }, + { + "lang": "es", + "value": "La copia de b\u00fafer sin comprobar el tama\u00f1o de la entrada (CWE-120) en la interfaz web de diagn\u00f3stico del Controller 6000 y el Controller 7000 permite que un operador autorizado y autenticado reinicie el Controller, lo que provoca una denegaci\u00f3n de servicio. Gallagher recomienda que la p\u00e1gina web de diagn\u00f3stico no est\u00e9 habilitada (la opci\u00f3n predeterminada est\u00e1 desactivada) a menos que lo indique el soporte t\u00e9cnico de Gallagher. Esta interfaz est\u00e1 destinada \u00fanicamente a fines de diagn\u00f3stico. Este problema afecta a: Controller 6000 y Controller 7000 9.10 anterior a vCR9.10.240816a (distribuido en 9.10.1530 (MR2)), 9.00 anterior a vCR9.00.240816a (distribuido en 9.00.2168 (MR4)), 8.90 anterior a vCR8.90.240816a (distribuido en 8.90.2155 (MR5)), 8.80 anterior a vCR8.80.240816b (distribuido en 8.80.1938 (MR6)), todas las versiones de 8.70 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27112.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27112.json index 6169dcf66eb..f63d133d34c 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27112.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27112", "sourceIdentifier": "csirt@divd.nl", "published": "2024-09-11T14:15:12.810", - "lastModified": "2024-09-11T14:15:12.810", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27113.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27113.json index 956949e7b10..786c353172a 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27113.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27113", "sourceIdentifier": "csirt@divd.nl", "published": "2024-09-11T14:15:12.947", - "lastModified": "2024-09-11T14:15:12.947", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json index 94fa718fe9b..d75af08b8cb 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27114", "sourceIdentifier": "csirt@divd.nl", "published": "2024-09-11T14:15:13.040", - "lastModified": "2024-09-11T14:15:13.040", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27115.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27115.json index bae416a3064..35e9eba8355 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27115.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27115.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27115", "sourceIdentifier": "csirt@divd.nl", "published": "2024-09-11T14:15:13.147", - "lastModified": "2024-09-11T14:15:13.147", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json index 051a3c7dd78..ba83210f030 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31336", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.023", - "lastModified": "2024-09-11T05:15:02.783", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Imagination PowerVR-GPU in Android before 2024-09-05 has a High Severity Vulnerability, aka A-337949672." + }, + { + "lang": "es", + "value": "Imagination PowerVR-GPU en Android antes del 5 de septiembre de 2024 tiene una vulnerabilidad de alta gravedad, tambi\u00e9n conocida como A-337949672." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34831.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34831.json index da6bbd759ec..e8f85a1b022 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34831.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34831.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34831", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-10T18:15:03.990", - "lastModified": "2024-09-10T20:35:07.857", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "cross-site scripting (XSS) vulnerability in Gibbon Core v26.0.00 allows an attacker to execute arbitrary code via the imageLink parameter in the library_manage_catalog_editProcess.php component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de cross-site scripting (XSS) en Gibbon Core v26.0.00 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro imageLink en el componente library_manage_catalog_editProcess.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3899.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3899.json index 372528eb8fb..c31a0bc4109 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3899.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3899.json @@ -2,16 +2,43 @@ "id": "CVE-2024-3899", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-11T06:15:01.870", - "lastModified": "2024-09-11T06:15:01.870", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:35:39.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gallery Plugin for WordPress WordPress plugin before 1.8.15 does not sanitise and escape some of its image settings, which could allow users with post-writing privilege such as Author to perform Cross-Site Scripting attacks." + }, + { + "lang": "es", + "value": "El complemento Gallery Plugin for WordPress de WordPress anterior a la versi\u00f3n 1.8.15 no desinfecta ni escapa de algunas de sus configuraciones de imagen, lo que podr\u00eda permitir a los usuarios con privilegios de escritura posterior, como el Autor, realizar ataques de cross-site scripting." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e3afadda-4d9a-4a51-b744-10de7d8d8578/", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39378.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39378.json new file mode 100644 index 00000000000..6a81cb81177 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39378.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39378", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-09-11T16:15:05.797", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Audition versions 24.4.1, 23.6.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/audition/apsb24-54.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39627.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39627.json index f6905668242..8a1a25627d9 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39627.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39627.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39627", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T23:15:51.123", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:35:37.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.59.4", + "matchCriteriaId": "01996367-237D-45FB-8142-C98706FD3BB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/nextgen-gallery/wordpress-photo-gallery-sliders-proofing-and-themes-nextgen-gallery-plugin-3-59-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39629.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39629.json index 2f2b3857ffc..7fa74b4c806 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39629.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39629.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39629", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T23:15:51.320", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:35:06.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themegrill:himalayas:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.2", + "matchCriteriaId": "A6ECD51D-ACCE-4CE3-89C9-1DAB81FBB5CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/himalayas/wordpress-himalayas-theme-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39631.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39631.json index facc256757a..16ca35a8b2d 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39631.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39631.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39631", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T23:15:51.520", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:34:08.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "0A248796-7D89-49A2-B269-A14CBED929FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-23-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39643.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39643.json index cc1841dcc9a..877818cdb28 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39643.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39643", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T23:15:51.730", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:33:14.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.0.0.2", + "matchCriteriaId": "773287C1-08C4-4402-9670-1FA164CF0B29" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-custom-registration-forms-user-registration-payment-and-user-login-plugin-6-0-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39644.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39644.json index b0ae0a0ed2a..8f2c99a8d9b 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39644.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39644.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39644", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T23:15:51.927", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:31:27.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:modernaweb:black_widgets_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.6", + "matchCriteriaId": "D879A1DE-C865-457D-93D7-242C3BEC6B0E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/black-widgets/wordpress-black-widgets-for-elementor-plugin-1-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39646.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39646.json index 8b00f79079d..f1835ca3631 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39646.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39646.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39646", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T23:15:52.127", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:31:00.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kunalnagar:custom_404_pro:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.11.2", + "matchCriteriaId": "21F7D4A4-21AB-4E04-8C1A-3D9A1C1F381B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-404-pro/wordpress-custom-404-pro-plugin-3-11-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39647.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39647.json index 2e83eb14b9b..4b67d25faf4 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39647.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39647", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T23:15:52.327", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:30:17.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kofimokome:message_filter_for_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.2", + "matchCriteriaId": "7172B75F-2D7D-486A-B496-3022EB214B98" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cf7-message-filter/wordpress-message-filter-for-contact-form-7-plugin-1-6-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39808.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39808.json index 114fa953c0d..bf7b4a2acde 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39808.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39808.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39808", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-09-11T04:15:05.597", - "lastModified": "2024-09-11T04:15:05.597", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Calculation of Buffer Size (CWE-131) in the Controller 6000 and Controller 7000 OSDP message handling, allows an attacker with physical access to Controller wiring to instigate a reboot leading to a denial of service. \n\n\n\nThis issue affects: Controller 6000 and Controller 7000 9.10 prior to vCR9.10.240816a (distributed in 9.10.1530 (MR2)), 9.00 prior to vCR9.00.240816a (distributed in 9.00.2168 (MR4)), 8.90 prior to vCR8.90.240816a (distributed in 8.90.2155 (MR5)), 8.80 prior to vCR8.80.240816b (distributed in 8.80.1938 (MR6)), all versions of 8.70 and prior." + }, + { + "lang": "es", + "value": "C\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer (CWE-131) en el manejo de mensajes OSDP del Controller 6000 y del Controller 7000, permite que un atacante con acceso f\u00edsico al cableado del Controller inicie un reinicio que conduzca a una denegaci\u00f3n de servicio. Este problema afecta a: Controller 6000 y Controller 7000 9.10 anterior a vCR9.10.240816a (distribuido en 9.10.1530 (MR2)), 9.00 anterior a vCR9.00.240816a (distribuido en 9.00.2168 (MR4)), 8.90 anterior a vCR8.90.240816a (distribuido en 8.90.2155 (MR5)), 8.80 anterior a vCR8.80.240816b (distribuido en 8.80.1938 (MR6)), todas las versiones de 8.70 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json index 2ffcfd6bd78..1068d159aac 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39894", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T18:15:03.710", - "lastModified": "2024-07-28T21:15:10.380", + "lastModified": "2024-09-11T16:15:06.003", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -68,10 +68,18 @@ "url": "http://www.openwall.com/lists/oss-security/2024/07/28/3", "source": "cve@mitre.org" }, + { + "url": "https://crzphil.github.io/posts/ssh-obfuscation-bypass/", + "source": "cve@mitre.org" + }, { "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html", "source": "cve@mitre.org" }, + { + "url": "https://news.ycombinator.com/item?id=41508530", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20240712-0004/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json index cd0607b6698..27aebdace0c 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40650", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.080", - "lastModified": "2024-09-11T00:15:11.080", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wifi_item_edit_content of styles.xml , there is a possible FRP bypass due to Missing check for FRP state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En wifi_item_edit_content de styles.xml, existe una posible omisi\u00f3n de FRP debido a la falta de verificaci\u00f3n del estado de FRP. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40652.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40652.json index 019f4151965..864f00b3deb 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40652.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40652.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40652", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.140", - "lastModified": "2024-09-11T00:15:11.140", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In onCreate of SettingsHomepageActivity.java, there is a possible way to access the Settings app while the device is provisioning due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En onCreate de SettingsHomepageActivity.java, existe una forma posible de acceder a la aplicaci\u00f3n Configuraci\u00f3n mientras el dispositivo se est\u00e1 aprovisionando debido a una verificaci\u00f3n de permisos faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40654.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40654.json index 2a95f716e80..606909aa554 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40654.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40654.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40654", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.190", - "lastModified": "2024-09-11T00:15:11.190", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, es posible que se omitan permisos debido a un subordinado confundido. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40655.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40655.json index 92bb96a85f8..f6c7b288261 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40655.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40655", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.243", - "lastModified": "2024-09-11T15:35:09.640", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json index bde24d33207..46f43f063aa 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40656.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40656", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.297", - "lastModified": "2024-09-11T00:15:11.297", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In handleCreateConferenceComplete of ConnectionServiceWrapper.java, there is a possible way to reveal images across users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En handleCreateConferenceComplete de ConnectionServiceWrapper.java, existe una forma posible de revelar im\u00e1genes entre usuarios debido a un subordinado confundido. Esto podr\u00eda generar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40657.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40657.json index 8e7f8ca43ab..39906bd0660 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40657.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40657", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.350", - "lastModified": "2024-09-11T15:35:09.923", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40658.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40658.json index 32fa1283614..883fedf6f06 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40658.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40658", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.397", - "lastModified": "2024-09-11T15:35:10.710", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json index 2d5b867f34c..40290897489 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40659.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40659", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.473", - "lastModified": "2024-09-11T00:15:11.473", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In getRegistration of RemoteProvisioningService.java, there is a possible way to permanently disable the AndroidKeyStore key generation feature by updating the attestation keys of all installed apps due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En getRegistration de RemoteProvisioningService.java, existe una forma posible de deshabilitar permanentemente la funci\u00f3n de generaci\u00f3n de claves de AndroidKeyStore mediante la actualizaci\u00f3n de las claves de certificaci\u00f3n de todas las aplicaciones instaladas debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40662.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40662.json index 184505ddda9..d2cfca8f7f2 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40662.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40662", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.530", - "lastModified": "2024-09-11T14:35:04.010", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41731.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41731.json index c73c19583f4..9e7996aff8a 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41731.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41731", "sourceIdentifier": "cna@sap.com", "published": "2024-08-13T04:15:08.330", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:48:18.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:*", + "matchCriteriaId": "6EB0EFA3-8AD2-42F2-86E1-A62ECF8340E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:business_objects_business_intelligence_platform:440:*:*:*:*:*:*:*", + "matchCriteriaId": "AD397634-7D49-454E-9854-0A8212008655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:business_objects_business_intelligence_platform:enterprise_420:*:*:*:*:*:*:*", + "matchCriteriaId": "029BEDE8-97DB-4716-8A5D-D7CC8049B93F" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3433545", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41732.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41732.json index be42090bbda..5166ed3c2c5 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41732.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41732", "sourceIdentifier": "cna@sap.com", "published": "2024-08-13T04:15:08.637", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T17:52:39.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +81,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*", + "matchCriteriaId": "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*", + "matchCriteriaId": "72491771-4492-4902-9F0C-CE6A60BAA705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:757:*:*:*:*:*:*:*", + "matchCriteriaId": "421A5354-F764-402B-A3A4-2D746EACEB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:758:*:*:*:*:*:*:*", + "matchCriteriaId": "48DFFD36-0A4A-417F-9BC5-77FD4152B637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:sap_basis_700:*:*:*:*:*:*:*", + "matchCriteriaId": "AB7909F4-1D66-4C4F-95F3-34ACB0190DB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:sap_basis_701:*:*:*:*:*:*:*", + "matchCriteriaId": "F8310EBA-2438-427F-80C2-BE151E35D97D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:sap_basis_702:*:*:*:*:*:*:*", + "matchCriteriaId": "732E155D-C866-4F0E-BC86-037B94308B7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:sap_basis_731:*:*:*:*:*:*:*", + "matchCriteriaId": "035EDBAC-C29B-49DB-ACEE-CA64750E7290" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:sap_basis_912:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC51692-5E94-4678-99B0-4EC1D633DDF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:sap_ui_754:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C94D7F-EF14-41AB-9A6A-EB99E40AD99A" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3468102", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json index 7e0fccc4d49..3360f45b72c 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41810.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41810", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T16:15:05.133", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:17:45.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -55,14 +85,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:*", + "versionEndIncluding": "24.3.0", + "matchCriteriaId": "7A8C409F-08B3-4990-AF07-2BEE13BF7581" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/twisted/twisted/commit/046a164f89a0f08d3239ecebd750360f8914df33", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/twisted/twisted/security/advisories/GHSA-cf56-g6w6-pqq2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json index bbbe18125a7..7b465e61f1d 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41817", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T16:15:05.360", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:16:23.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.11-36", + "matchCriteriaId": "0DB31638-1DA7-4EBE-B65D-E55D490107C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ImageMagick/ImageMagick/blob/3b22378a23d59d7517c43b65b1822f023df357a0/app-image/AppRun#L11-L14", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick/commit/6526a2b28510ead6a3e14de711bb991ad9abff38", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8rxc-922v-phg8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json index d8d02a9cdfb..185fe2c1121 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41818", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-29T16:15:05.570", - "lastModified": "2024-08-02T20:17:01.807", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:09:46.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,81 @@ "value": "fast-xml-parser es un analizador xml de JavaScript puro de c\u00f3digo abierto. Existe un ReDOS en currency.js. Esta vulnerabilidad se soluciona en 4.4.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fast-xml-parser_project:fast-xml-parser:4.2.4:*:*:*:*:node.js:*:*", + "matchCriteriaId": "21D98A03-652A-4E91-B323-12CEAC9245D5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/NaturalIntelligence/fast-xml-parser/blob/master/src/v5/valueParsers/currency.js#L10", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/d0bfe8a3a2813a185f39591bbef222212d856164", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-mpg4-rc92-vx8v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41868.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41868.json new file mode 100644 index 00000000000..b54b959d144 --- /dev/null +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41868.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41868", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-09-11T16:15:06.140", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Audition versions 24.4.1, 23.6.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/audition/apsb24-54.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json index 7cd54f56ad5..f0b6e175d79 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43040", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-10T20:15:04.527", - "lastModified": "2024-09-10T20:15:04.527", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Renwoxing Enterprise Intelligent Management System before v3.0 was discovered to contain a SQL injection vulnerability via the parid parameter at /fx/baseinfo/SearchInfo." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Renwoxing Enterprise Intelligent Management System anterior a la versi\u00f3n 3.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro parid en /fx/baseinfo/SearchInfo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43690.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43690.json index 15486bd1375..5e1ee52b5e4 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43690.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43690.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43690", "sourceIdentifier": "disclosures@gallagher.com", "published": "2024-09-11T05:15:02.843", - "lastModified": "2024-09-11T05:15:02.843", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inclusion of Functionality from Untrusted Control Sphere(CWE-829) in the Command Centre Server and Workstations may allow an attacker to perform Remote Code Execution (RCE).\n\nThis issue affects: Command Centre Server and Command Centre Workstations\u00a09.10 prior to vEL9.10.1530 (MR2), 9.00 prior to vEL9.00.2168 (MR4), 8.90 prior to vEL8.90.2155 (MR5), 8.80 prior to vEL8.80.1938 (MR6), all versions of 8.70 and prior." + }, + { + "lang": "es", + "value": "La inclusi\u00f3n de funcionalidad de Untrusted Control Sphere (CWE-829) en el servidor y las estaciones de trabajo del centro de comando puede permitir que un atacante realice una ejecuci\u00f3n remota de c\u00f3digo (RCE). Este problema afecta a: servidor y estaciones de trabajo del centro de comando 9.10 anteriores a vEL9.10.1530 (MR2), 9.00 anteriores a vEL9.00.2168 (MR4), 8.90 anteriores a vEL8.90.2155 (MR5), 8.80 anteriores a vEL8.80.1938 (MR6), todas las versiones de 8.70 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43793.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43793.json index f19a3ac62d4..46e6d8cfb60 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43793.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43793", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-11T15:15:17.017", - "lastModified": "2024-09-11T15:15:17.017", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44103.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44103.json index 03ffca13386..d575e73ce51 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44103.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44103.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44103", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:13.547", - "lastModified": "2024-09-10T21:15:13.547", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DLL hijacking in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "El secuestro de DLL en la consola de administraci\u00f3n de Ivanti Workspace Control versi\u00f3n 10.18.0.0 y anteriores permite que un atacante autenticado local escale sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44104.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44104.json index b887335db31..4ca0224c9b7 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44104.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44104.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44104", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:13.727", - "lastModified": "2024-09-10T21:15:13.727", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incorrectly implemented authentication scheme that is subjected to a spoofing attack in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "Un esquema de autenticaci\u00f3n implementado incorrectamente que est\u00e1 sujeto a un ataque de suplantaci\u00f3n de identidad en la consola de administraci\u00f3n de Ivanti Workspace Control versi\u00f3n 10.18.0.0 y anteriores permite que un atacante autenticado local aumente sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44105.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44105.json index 6a938a05993..df3f5d27d5c 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44105.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44105.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44105", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:13.917", - "lastModified": "2024-09-10T21:15:13.917", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to obtain OS credentials." + }, + { + "lang": "es", + "value": "La transmisi\u00f3n de texto claro de informaci\u00f3n confidencial en la consola de administraci\u00f3n de Ivanti Workspace Control versi\u00f3n 10.18.0.0 y anteriores permite que un atacante autenticado local obtenga las credenciales del sistema operativo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44106.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44106.json index 469e6aa7aaf..dd0bc6660be 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44106.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44106.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44106", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:14.110", - "lastModified": "2024-09-10T21:15:14.110", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient server-side controls in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "Los controles insuficientes del lado del servidor en la consola de administraci\u00f3n de Ivanti Workspace Control versi\u00f3n 10.18.0.0 y anteriores permiten que un atacante autenticado local aumente sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44107.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44107.json index 81db63400f1..c24702264c7 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44107.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44107.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44107", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:14.283", - "lastModified": "2024-09-10T21:15:14.283", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DLL hijacking in the management console of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges and achieve arbitrary code execution." + }, + { + "lang": "es", + "value": "El secuestro de DLL en la consola de administraci\u00f3n de Ivanti Workspace Control versi\u00f3n 10.18.0.0 y anteriores permite que un atacante autenticado local escale sus privilegios y logre la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44466.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44466.json new file mode 100644 index 00000000000..faf118d98cb --- /dev/null +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44466.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44466", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T16:15:06.330", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "COMFAST CF-XR11 V2.7.2 has a command injection vulnerability in function sub_424CB4. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter iface." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/CurryRaid/iot_vul/tree/main/comfast", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44570.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44570.json new file mode 100644 index 00000000000..fb1f5ae02d8 --- /dev/null +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44570.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44570", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T17:15:13.580", + "lastModified": "2024-09-11T17:15:13.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a code injection vulnerability via the getParams function in phpinf.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://system-on-chip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.relyum.com/web/support/vulnerability-report/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44571.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44571.json new file mode 100644 index 00000000000..db450c50fbe --- /dev/null +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44571.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44571", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T17:15:13.630", + "lastModified": "2024-09-11T17:15:13.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain incorrect access control in the mService function at phpinf.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://system-on-chip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.relyum.com/web/support/vulnerability-report/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44572.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44572.json new file mode 100644 index 00000000000..eef73328e8a --- /dev/null +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44572.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44572", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T17:15:13.677", + "lastModified": "2024-09-11T17:15:13.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the sys_mgmt function." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://system-on-chip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.relyum.com/web/support/vulnerability-report/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44573.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44573.json new file mode 100644 index 00000000000..17694428347 --- /dev/null +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44573.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44573", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T17:15:13.727", + "lastModified": "2024-09-11T17:15:13.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in the VLAN configuration of RELY-PCIe v22.2.1 to v23.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://system-on-chip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.relyum.com/web/support/vulnerability-report/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44574.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44574.json new file mode 100644 index 00000000000..da05515592c --- /dev/null +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44574.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44574", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T17:15:13.770", + "lastModified": "2024-09-11T17:15:13.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the sys_conf function." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://system-on-chip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.relyum.com/web/support/vulnerability-report/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44575.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44575.json new file mode 100644 index 00000000000..4e5df113ef5 --- /dev/null +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44575.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44575", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T17:15:13.820", + "lastModified": "2024-09-11T17:15:13.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RELY-PCIe v22.2.1 to v23.1.0 does not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP session." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://system-on-chip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.relyum.com/web/support/vulnerability-report/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44577.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44577.json new file mode 100644 index 00000000000..37052bb631b --- /dev/null +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44577.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44577", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T17:15:13.870", + "lastModified": "2024-09-11T17:15:13.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the time_date function." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://system-on-chip.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.relyum.com/web/support/vulnerability-report/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44844.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44844.json index 322e8b18a26..799329affac 100644 --- a/CVE-2024/CVE-2024-448xx/CVE-2024-44844.json +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44844.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44844", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-06T21:15:12.160", - "lastModified": "2024-09-10T17:15:37.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:24:51.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A9DA50-EDEE-4B21-83BC-6689A19297B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEECFBBC-5551-4135-9194-4216A39B04B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/3okfc/IOT-VUL-WP/blob/main/DaryTek/vigor3900_1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44845.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44845.json index 99838883e2d..ba469aafd52 100644 --- a/CVE-2024/CVE-2024-448xx/CVE-2024-44845.json +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44845.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44845", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-06T21:15:12.217", - "lastModified": "2024-09-10T17:15:37.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:24:23.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A9DA50-EDEE-4B21-83BC-6689A19297B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEECFBBC-5551-4135-9194-4216A39B04B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/3okfc/IOT-VUL-WP/blob/main/DaryTek/vigor3900_2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44851.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44851.json new file mode 100644 index 00000000000..4bc2f7ac722 --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44851.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44851", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-11T16:15:06.380", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in the Discussion section of Perfex CRM v1.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Content parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/0xashfaq/e44a6dece3be498241aebcfaa046e634", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/0xashfaq/File-Sharing-module-for-Perfex-CRM-XSS/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4465.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4465.json index efd42ef1ce2..bd609bd7d16 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4465.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4465", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-09-11T15:15:18.490", - "lastModified": "2024-09-11T15:15:18.490", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45009.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45009.json new file mode 100644 index 00000000000..e02e680aa04 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45009.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-45009", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.427", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: pm: only decrement add_addr_accepted for MPJ req\n\nAdding the following warning ...\n\n WARN_ON_ONCE(msk->pm.add_addr_accepted == 0)\n\n... before decrementing the add_addr_accepted counter helped to find a\nbug when running the \"remove single subflow\" subtest from the\nmptcp_join.sh selftest.\n\nRemoving a 'subflow' endpoint will first trigger a RM_ADDR, then the\nsubflow closure. Before this patch, and upon the reception of the\nRM_ADDR, the other peer will then try to decrement this\nadd_addr_accepted. That's not correct because the attached subflows have\nnot been created upon the reception of an ADD_ADDR.\n\nA way to solve that is to decrement the counter only if the attached\nsubflow was an MP_JOIN to a remote id that was not 0, and initiated by\nthe host receiving the RM_ADDR." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1c1f721375989579e46741f59523e39ec9b2a9bd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2060f1efab370b496c4903b840844ecaff324c3c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/85b866e4c4e63a1d7afb58f1e24273caad03d0b7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d20bf2c96d7ffd171299b32f562f70e5bf5dc608", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45010.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45010.json new file mode 100644 index 00000000000..97ee4ae6cd2 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45010.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-45010", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.483", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: pm: only mark 'subflow' endp as available\n\nAdding the following warning ...\n\n WARN_ON_ONCE(msk->pm.local_addr_used == 0)\n\n... before decrementing the local_addr_used counter helped to find a bug\nwhen running the \"remove single address\" subtest from the mptcp_join.sh\nselftests.\n\nRemoving a 'signal' endpoint will trigger the removal of all subflows\nlinked to this endpoint via mptcp_pm_nl_rm_addr_or_subflow() with\nrm_type == MPTCP_MIB_RMSUBFLOW. This will decrement the local_addr_used\ncounter, which is wrong in this case because this counter is linked to\n'subflow' endpoints, and here it is a 'signal' endpoint that is being\nremoved.\n\nNow, the counter is decremented, only if the ID is being used outside\nof mptcp_pm_nl_rm_addr_or_subflow(), only for 'subflow' endpoints, and\nif the ID is not 0 -- local_addr_used is not taking into account these\nones. This marking of the ID as being available, and the decrement is\ndone no matter if a subflow using this ID is currently available,\nbecause the subflow could have been closed before." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/322ea3778965da72862cca2a0c50253aacf65fe6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/43cf912b0b0fc7b4fd12cbc735d1f5afb8e1322d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7fdc870d08960961408a44c569f20f50940e7d4f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9849cfc67383ceb167155186f8f8fe8a896b60b3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45011.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45011.json new file mode 100644 index 00000000000..ce9cf228c5c --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45011.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-45011", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.550", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nchar: xillybus: Check USB endpoints when probing device\n\nEnsure, as the driver probes the device, that all endpoints that the\ndriver may attempt to access exist and are of the correct type.\n\nAll XillyUSB devices must have a Bulk IN and Bulk OUT endpoint at\naddress 1. This is verified in xillyusb_setup_base_eps().\n\nOn top of that, a XillyUSB device may have additional Bulk OUT\nendpoints. The information about these endpoints' addresses is deduced\nfrom a data structure (the IDT) that the driver fetches from the device\nwhile probing it. These endpoints are checked in setup_channels().\n\nA XillyUSB device never has more than one IN endpoint, as all data\ntowards the host is multiplexed in this single Bulk IN endpoint. This is\nwhy setup_channels() only checks OUT endpoints." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1371d32b95972d39c1e6e4bae8b6d0df1b573731", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2374bf7558de915edc6ec8cb10ec3291dfab9594", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/25ee8b2908200fc862c0434e5ad483817d50ceda", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4267131278f5cc98f8db31d035d64bdbbfe18658", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5cff754692ad45d5086b75fef8cc3a99c30a1005", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45012.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45012.json new file mode 100644 index 00000000000..67ac4438c2e --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45012.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45012", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.607", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau/firmware: use dma non-coherent allocator\n\nCurrently, enabling SG_DEBUG in the kernel will cause nouveau to hit a\nBUG() on startup, when the iommu is enabled:\n\nkernel BUG at include/linux/scatterlist.h:187!\ninvalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 7 PID: 930 Comm: (udev-worker) Not tainted 6.9.0-rc3Lyude-Test+ #30\nHardware name: MSI MS-7A39/A320M GAMING PRO (MS-7A39), BIOS 1.I0 01/22/2019\nRIP: 0010:sg_init_one+0x85/0xa0\nCode: 69 88 32 01 83 e1 03 f6 c3 03 75 20 a8 01 75 1e 48 09 cb 41 89 54\n24 08 49 89 1c 24 41 89 6c 24 0c 5b 5d 41 5c e9 7b b9 88 00 <0f> 0b 0f 0b\n0f 0b 48 8b 05 5e 46 9a 01 eb b2 66 66 2e 0f 1f 84 00\nRSP: 0018:ffffa776017bf6a0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffa77600d87000 RCX: 000000000000002b\nRDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffa77680d87000\nRBP: 000000000000e000 R08: 0000000000000000 R09: 0000000000000000\nR10: ffff98f4c46aa508 R11: 0000000000000000 R12: ffff98f4c46aa508\nR13: ffff98f4c46aa008 R14: ffffa77600d4a000 R15: ffffa77600d4a018\nFS: 00007feeb5aae980(0000) GS:ffff98f5c4dc0000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f22cb9a4520 CR3: 00000001043ba000 CR4: 00000000003506f0\nCall Trace:\n \n ? die+0x36/0x90\n ? do_trap+0xdd/0x100\n ? sg_init_one+0x85/0xa0\n ? do_error_trap+0x65/0x80\n ? sg_init_one+0x85/0xa0\n ? exc_invalid_op+0x50/0x70\n ? sg_init_one+0x85/0xa0\n ? asm_exc_invalid_op+0x1a/0x20\n ? sg_init_one+0x85/0xa0\n nvkm_firmware_ctor+0x14a/0x250 [nouveau]\n nvkm_falcon_fw_ctor+0x42/0x70 [nouveau]\n ga102_gsp_booter_ctor+0xb4/0x1a0 [nouveau]\n r535_gsp_oneinit+0xb3/0x15f0 [nouveau]\n ? srso_return_thunk+0x5/0x5f\n ? srso_return_thunk+0x5/0x5f\n ? nvkm_udevice_new+0x95/0x140 [nouveau]\n ? srso_return_thunk+0x5/0x5f\n ? srso_return_thunk+0x5/0x5f\n ? ktime_get+0x47/0xb0\n\nFix this by using the non-coherent allocator instead, I think there\nmight be a better answer to this, but it involve ripping up some of\nAPIs using sg lists." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/57ca481fca97ca4553e8c85d6a94baf4cb40c40e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9b340aeb26d50e9a9ec99599e2a39b035fac978e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cc29c5546c6a373648363ac49781f1d74b530707", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45013.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45013.json new file mode 100644 index 00000000000..1cf7abad201 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45013.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45013", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.663", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: move stopping keep-alive into nvme_uninit_ctrl()\n\nCommit 4733b65d82bd (\"nvme: start keep-alive after admin queue setup\")\nmoves starting keep-alive from nvme_start_ctrl() into\nnvme_init_ctrl_finish(), but don't move stopping keep-alive into\nnvme_uninit_ctrl(), so keep-alive work can be started and keep pending\nafter failing to start controller, finally use-after-free is triggered if\nnvme host driver is unloaded.\n\nThis patch fixes kernel panic when running nvme/004 in case that connection\nfailure is triggered, by moving stopping keep-alive into nvme_uninit_ctrl().\n\nThis way is reasonable because keep-alive is now started in\nnvme_init_ctrl_finish()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/4101af98ab573554c4225e328d506fec2a74bc54", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a54a93d0e3599b05856971734e15418ac551a14c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45014.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45014.json new file mode 100644 index 00000000000..3fb93ce9ce4 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45014.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45014", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.710", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/boot: Avoid possible physmem_info segment corruption\n\nWhen physical memory for the kernel image is allocated it does not\nconsider extra memory required for offsetting the image start to\nmatch it with the lower 20 bits of KASLR virtual base address. That\nmight lead to kernel access beyond its memory range." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/a944cba5d57687b747023c3bc074fcf9c790f7df", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d7fd2941ae9a67423d1c7bee985f240e4686634f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45015.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45015.json new file mode 100644 index 00000000000..6b39fd40016 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45015.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45015", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.763", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()\n\nFor cases where the crtc's connectors_changed was set without enable/active\ngetting toggled , there is an atomic_enable() call followed by an\natomic_disable() but without an atomic_mode_set().\n\nThis results in a NULL ptr access for the dpu_encoder_get_drm_fmt() call in\nthe atomic_enable() as the dpu_encoder's connector was cleared in the\natomic_disable() but not re-assigned as there was no atomic_mode_set() call.\n\nFix the NULL ptr access by moving the assignment for atomic_enable() and also\nuse drm_atomic_get_new_connector_for_encoder() to get the connector from\nthe atomic_state.\n\nPatchwork: https://patchwork.freedesktop.org/patch/606729/" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3bacf814b6a61cc683c68465f175ebd938f09c52", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3fb61718bcbe309279205d1cc275a6435611dc77", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/aedf02e46eb549dac8db4821a6b9f0c6bf6e3990", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45016.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45016.json new file mode 100644 index 00000000000..9f12dcba8a4 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45016.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-45016", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.817", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: fix return value if duplicate enqueue fails\n\nThere is a bug in netem_enqueue() introduced by\ncommit 5845f706388a (\"net: netem: fix skb length BUG_ON in __skb_to_sgvec\")\nthat can lead to a use-after-free.\n\nThis commit made netem_enqueue() always return NET_XMIT_SUCCESS\nwhen a packet is duplicated, which can cause the parent qdisc's q.qlen\nto be mistakenly incremented. When this happens qlen_notify() may be\nskipped on the parent during destruction, leaving a dangling pointer\nfor some classful qdiscs like DRR.\n\nThere are two ways for the bug happen:\n\n- If the duplicated packet is dropped by rootq->enqueue() and then\n the original packet is also dropped.\n- If rootq->enqueue() sends the duplicated packet to a different qdisc\n and the original packet is dropped.\n\nIn both cases NET_XMIT_SUCCESS is returned even though no packets\nare enqueued at the netem qdisc.\n\nThe fix is to defer the enqueue of the duplicate packet until after\nthe original packet has been guaranteed to return NET_XMIT_SUCCESS." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0486d31dd8198e22b63a4730244b38fffce6d469", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/52d99a69f3d556c6426048c9d481b912205919d8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/577d6c0619467fe90f7e8e57e45cb5bd9d936014", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/759e3e8c4a6a6b4e52ebc4547123a457f0ce90d4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c07ff8592d57ed258afee5a5e04991a48dbaf382", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c414000da1c2ea1ba9a5e5bb1a4ba774e51e202d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e5bb2988a310667abed66c7d3ffa28880cf0f883", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45017.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45017.json new file mode 100644 index 00000000000..1f2f9540ed7 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45017.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45017", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.877", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix IPsec RoCE MPV trace call\n\nPrevent the call trace below from happening, by not allowing IPsec\ncreation over a slave, if master device doesn't support IPsec.\n\nWARNING: CPU: 44 PID: 16136 at kernel/locking/rwsem.c:240 down_read+0x75/0x94\nModules linked in: esp4_offload esp4 act_mirred act_vlan cls_flower sch_ingress mlx5_vdpa vringh vhost_iotlb vdpa mst_pciconf(OE) nfsv3 nfs_acl nfs lockd grace fscache netfs xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill cuse fuse rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_ipoib iw_cm ib_cm ipmi_ssif intel_rapl_msr intel_rapl_common amd64_edac edac_mce_amd kvm_amd kvm irqbypass crct10dif_pclmul crc32_pclmul mlx5_ib ghash_clmulni_intel sha1_ssse3 dell_smbios ib_uverbs aesni_intel crypto_simd dcdbas wmi_bmof dell_wmi_descriptor cryptd pcspkr ib_core acpi_ipmi sp5100_tco ccp i2c_piix4 ipmi_si ptdma k10temp ipmi_devintf ipmi_msghandler acpi_power_meter acpi_cpufreq ext4 mbcache jbd2 sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect mlx5_core sysimgblt fb_sys_fops cec\n ahci libahci mlxfw drm pci_hyperv_intf libata tg3 sha256_ssse3 tls megaraid_sas i2c_algo_bit psample wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: mst_pci]\nCPU: 44 PID: 16136 Comm: kworker/44:3 Kdump: loaded Tainted: GOE 5.15.0-20240509.el8uek.uek7_u3_update_v6.6_ipsec_bf.x86_64 #2\nHardware name: Dell Inc. PowerEdge R7525/074H08, BIOS 2.0.3 01/15/2021\nWorkqueue: events xfrm_state_gc_task\nRIP: 0010:down_read+0x75/0x94\nCode: 00 48 8b 45 08 65 48 8b 14 25 80 fc 01 00 83 e0 02 48 09 d0 48 83 c8 01 48 89 45 08 5d 31 c0 89 c2 89 c6 89 c7 e9 cb 88 3b 00 <0f> 0b 48 8b 45 08 a8 01 74 b2 a8 02 75 ae 48 89 c2 48 83 ca 02 f0\nRSP: 0018:ffffb26387773da8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffa08b658af900 RCX: 0000000000000001\nRDX: 0000000000000000 RSI: ff886bc5e1366f2f RDI: 0000000000000000\nRBP: ffffa08b658af940 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: ffffa0a9bfb31540\nR13: ffffa0a9bfb37900 R14: 0000000000000000 R15: ffffa0a9bfb37905\nFS: 0000000000000000(0000) GS:ffffa0a9bfb00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055a45ed814e8 CR3: 000000109038a000 CR4: 0000000000350ee0\nCall Trace:\n \n ? show_trace_log_lvl+0x1d6/0x2f9\n ? show_trace_log_lvl+0x1d6/0x2f9\n ? mlx5_devcom_for_each_peer_begin+0x29/0x60 [mlx5_core]\n ? down_read+0x75/0x94\n ? __warn+0x80/0x113\n ? down_read+0x75/0x94\n ? report_bug+0xa4/0x11d\n ? handle_bug+0x35/0x8b\n ? exc_invalid_op+0x14/0x75\n ? asm_exc_invalid_op+0x16/0x1b\n ? down_read+0x75/0x94\n ? down_read+0xe/0x94\n mlx5_devcom_for_each_peer_begin+0x29/0x60 [mlx5_core]\n mlx5_ipsec_fs_roce_tx_destroy+0xb1/0x130 [mlx5_core]\n tx_destroy+0x1b/0xc0 [mlx5_core]\n tx_ft_put+0x53/0xc0 [mlx5_core]\n mlx5e_xfrm_free_state+0x45/0x90 [mlx5_core]\n ___xfrm_state_destroy+0x10f/0x1a2\n xfrm_state_gc_task+0x81/0xa9\n process_one_work+0x1f1/0x3c6\n worker_thread+0x53/0x3e4\n ? process_one_work.cold+0x46/0x3c\n kthread+0x127/0x144\n ? set_kthread_struct+0x60/0x52\n ret_from_fork+0x22/0x2d\n \n---[ end trace 5ef7896144d398e1 ]---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2ae52a65a850ded75a94e8d7ec1e09737f4c6509", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/607e1df7bd47fe91cab85a97f57870a26d066137", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45018.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45018.json new file mode 100644 index 00000000000..cb31a29a6d6 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45018.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-45018", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.933", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: initialise extack before use\n\nFix missing initialisation of extack in flow offload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/119be227bc04f5035efa64cb823b8a5ca5e2d1c1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/356beb911b63a8cff34cb57f755c2a2d2ee9dec7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7eafeec6be68ebd6140a830ce9ae68ad5b67ec78", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c7b760499f7791352b49b11667ed04b23d7f5b0f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e5ceff2196dc633c995afb080f6f44a72cff6e1d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e9767137308daf906496613fd879808a07f006a2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45019.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45019.json new file mode 100644 index 00000000000..d89d6fcd670 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45019.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-45019", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:06.990", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Take state lock during tx timeout reporter\n\nmlx5e_safe_reopen_channels() requires the state lock taken. The\nreferenced changed in the Fixes tag removed the lock to fix another\nissue. This patch adds it back but at a later point (when calling\nmlx5e_safe_reopen_channels()) to avoid the deadlock referenced in the\nFixes tag." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/03d3734bd692affe4d0e9c9d638f491aaf37411b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8e57e66ecbdd2fddc9fbf3e984b1c523b70e9809", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b3b9a87adee97854bcd71057901d46943076267e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e6b5afd30b99b43682a7764e1a74a42fe4d5f4b3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45020.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45020.json new file mode 100644 index 00000000000..633f022095f --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45020.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45020", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.050", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a kernel verifier crash in stacksafe()\n\nDaniel Hodges reported a kernel verifier crash when playing with sched-ext.\nFurther investigation shows that the crash is due to invalid memory access\nin stacksafe(). More specifically, it is the following code:\n\n if (exact != NOT_EXACT &&\n old->stack[spi].slot_type[i % BPF_REG_SIZE] !=\n cur->stack[spi].slot_type[i % BPF_REG_SIZE])\n return false;\n\nThe 'i' iterates old->allocated_stack.\nIf cur->allocated_stack < old->allocated_stack the out-of-bound\naccess will happen.\n\nTo fix the issue add 'i >= cur->allocated_stack' check such that if\nthe condition is true, stacksafe() should fail. Otherwise,\ncur->stack[spi].slot_type[i % BPF_REG_SIZE] memory access is legal." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/6e3987ac310c74bb4dd6a2fa8e46702fe505fb2b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7cad3174cc79519bf5f6c4441780264416822c08", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bed2eb964c70b780fb55925892a74f26cb590b25", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45021.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45021.json new file mode 100644 index 00000000000..ed0fdb49527 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45021.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-45021", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.103", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemcg_write_event_control(): fix a user-triggerable oops\n\nwe are *not* guaranteed that anything past the terminating NUL\nis mapped (let alone initialized with anything sane)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/046667c4d3196938e992fba0dfcde570aa85cd0e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/0fbe2a72e853a1052abe9bc2b7df8ddb102da227", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1b37ec85ad95b612307627758c6018cd9d92cca8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/21b578f1d599edb87462f11113c5b0fc7a04ac61", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/43768fa80fd192558737e24ed6548f74554611d7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ad149f5585345e383baa65f1539d816cd715fd3b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f1aa7c509aa766080db7ab3aec2e31b1df09e57c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fa5bfdf6cb5846a00e712d630a43e3cf55ccb411", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45022.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45022.json new file mode 100644 index 00000000000..9d53b6dcacd --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45022.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-45022", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.163", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0\n\nThe __vmap_pages_range_noflush() assumes its argument pages** contains\npages with the same page shift. However, since commit e9c3cda4d86e (\"mm,\nvmalloc: fix high order __GFP_NOFAIL allocations\"), if gfp_flags includes\n__GFP_NOFAIL with high order in vm_area_alloc_pages() and page allocation\nfailed for high order, the pages** may contain two different page shifts\n(high order and order-0). This could lead __vmap_pages_range_noflush() to\nperform incorrect mappings, potentially resulting in memory corruption.\n\nUsers might encounter this as follows (vmap_allow_huge = true, 2M is for\nPMD_SIZE):\n\nkvmalloc(2M, __GFP_NOFAIL|GFP_X)\n __vmalloc_node_range_noprof(vm_flags=VM_ALLOW_HUGE_VMAP)\n vm_area_alloc_pages(order=9) ---> order-9 allocation failed and fallback to order-0\n vmap_pages_range()\n vmap_pages_range_noflush()\n __vmap_pages_range_noflush(page_shift = 21) ----> wrong mapping happens\n\nWe can remove the fallback code because if a high-order allocation fails,\n__vmalloc_node_range_noprof() will retry with order-0. Therefore, it is\nunnecessary to fallback to order-0 here. Therefore, fix this by removing\nthe fallback code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/61ebe5a747da649057c37be1c37eb934b4af79ca", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c91618816f4d21fc574d7577a37722adcd4075b2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/de7bad86345c43cd040ed43e20d9fad78a3ee59f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fd1ffbb50ef4da5e1378a46616b6d7407dc795da", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45023.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45023.json new file mode 100644 index 00000000000..03a4129264b --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45023.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45023", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.230", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: Fix data corruption for degraded array with slow disk\n\nread_balance() will avoid reading from slow disks as much as possible,\nhowever, if valid data only lands in slow disks, and a new normal disk\nis still in recovery, unrecovered data can be read:\n\nraid1_read_request\n read_balance\n raid1_should_read_first\n -> return false\n choose_best_rdev\n -> normal disk is not recovered, return -1\n choose_bb_rdev\n -> missing the checking of recovery, return the normal disk\n -> read unrecovered data\n\nRoot cause is that the checking of recovery is missing in\nchoose_bb_rdev(). Hence add such checking to fix the problem.\n\nAlso fix similar problem in choose_slow_rdev()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2febf5fdbf5d9a52ddc3e986971c8609b1582d67", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c916ca35308d3187c9928664f9be249b22a3a701", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45024.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45024.json new file mode 100644 index 00000000000..0c40f889aa0 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45024.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45024", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.290", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix hugetlb vs. core-mm PT locking\n\nWe recently made GUP's common page table walking code to also walk hugetlb\nVMAs without most hugetlb special-casing, preparing for the future of\nhaving less hugetlb-specific page table walking code in the codebase. \nTurns out that we missed one page table locking detail: page table locking\nfor hugetlb folios that are not mapped using a single PMD/PUD.\n\nAssume we have hugetlb folio that spans multiple PTEs (e.g., 64 KiB\nhugetlb folios on arm64 with 4 KiB base page size). GUP, as it walks the\npage tables, will perform a pte_offset_map_lock() to grab the PTE table\nlock.\n\nHowever, hugetlb that concurrently modifies these page tables would\nactually grab the mm->page_table_lock: with USE_SPLIT_PTE_PTLOCKS, the\nlocks would differ. Something similar can happen right now with hugetlb\nfolios that span multiple PMDs when USE_SPLIT_PMD_PTLOCKS.\n\nThis issue can be reproduced [1], for example triggering:\n\n[ 3105.936100] ------------[ cut here ]------------\n[ 3105.939323] WARNING: CPU: 31 PID: 2732 at mm/gup.c:142 try_grab_folio+0x11c/0x188\n[ 3105.944634] Modules linked in: [...]\n[ 3105.974841] CPU: 31 PID: 2732 Comm: reproducer Not tainted 6.10.0-64.eln141.aarch64 #1\n[ 3105.980406] Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-4.fc40 05/24/2024\n[ 3105.986185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 3105.991108] pc : try_grab_folio+0x11c/0x188\n[ 3105.994013] lr : follow_page_pte+0xd8/0x430\n[ 3105.996986] sp : ffff80008eafb8f0\n[ 3105.999346] x29: ffff80008eafb900 x28: ffffffe8d481f380 x27: 00f80001207cff43\n[ 3106.004414] x26: 0000000000000001 x25: 0000000000000000 x24: ffff80008eafba48\n[ 3106.009520] x23: 0000ffff9372f000 x22: ffff7a54459e2000 x21: ffff7a546c1aa978\n[ 3106.014529] x20: ffffffe8d481f3c0 x19: 0000000000610041 x18: 0000000000000001\n[ 3106.019506] x17: 0000000000000001 x16: ffffffffffffffff x15: 0000000000000000\n[ 3106.024494] x14: ffffb85477fdfe08 x13: 0000ffff9372ffff x12: 0000000000000000\n[ 3106.029469] x11: 1fffef4a88a96be1 x10: ffff7a54454b5f0c x9 : ffffb854771b12f0\n[ 3106.034324] x8 : 0008000000000000 x7 : ffff7a546c1aa980 x6 : 0008000000000080\n[ 3106.038902] x5 : 00000000001207cf x4 : 0000ffff9372f000 x3 : ffffffe8d481f000\n[ 3106.043420] x2 : 0000000000610041 x1 : 0000000000000001 x0 : 0000000000000000\n[ 3106.047957] Call trace:\n[ 3106.049522] try_grab_folio+0x11c/0x188\n[ 3106.051996] follow_pmd_mask.constprop.0.isra.0+0x150/0x2e0\n[ 3106.055527] follow_page_mask+0x1a0/0x2b8\n[ 3106.058118] __get_user_pages+0xf0/0x348\n[ 3106.060647] faultin_page_range+0xb0/0x360\n[ 3106.063651] do_madvise+0x340/0x598\n\nLet's make huge_pte_lockptr() effectively use the same PT locks as any\ncore-mm page table walker would. Add ptep_lockptr() to obtain the PTE\npage table lock using a pte pointer -- unfortunately we cannot convert\npte_lockptr() because virt_to_page() doesn't work with kmap'ed page tables\nwe can have with CONFIG_HIGHPTE.\n\nHandle CONFIG_PGTABLE_LEVELS correctly by checking in reverse order, such\nthat when e.g., CONFIG_PGTABLE_LEVELS==2 with\nPGDIR_SIZE==P4D_SIZE==PUD_SIZE==PMD_SIZE will work as expected. Document\nwhy that works.\n\nThere is one ugly case: powerpc 8xx, whereby we have an 8 MiB hugetlb\nfolio being mapped using two PTE page tables. While hugetlb wants to take\nthe PMD table lock, core-mm would grab the PTE table lock of one of both\nPTE page tables. In such corner cases, we have to make sure that both\nlocks match, which is (fortunately!) currently guaranteed for 8xx as it\ndoes not support SMP and consequently doesn't use split PT locks.\n\n[1] https://lore.kernel.org/all/1bbfcc7f-f222-45a5-ac44-c5a1381c596d@redhat.com/" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5f75cfbd6bb02295ddaed48adf667b6c828ce07b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7300dadba49e531af2d890ae4e34c9b115384a62", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45025.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45025.json new file mode 100644 index 00000000000..4a81b454150 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45025.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-45025", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.440", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE\n\ncopy_fd_bitmaps(new, old, count) is expected to copy the first\ncount/BITS_PER_LONG bits from old->full_fds_bits[] and fill\nthe rest with zeroes. What it does is copying enough words\n(BITS_TO_LONGS(count/BITS_PER_LONG)), then memsets the rest.\nThat works fine, *if* all bits past the cutoff point are\nclear. Otherwise we are risking garbage from the last word\nwe'd copied.\n\nFor most of the callers that is true - expand_fdtable() has\ncount equal to old->max_fds, so there's no open descriptors\npast count, let alone fully occupied words in ->open_fds[],\nwhich is what bits in ->full_fds_bits[] correspond to.\n\nThe other caller (dup_fd()) passes sane_fdtable_size(old_fdt, max_fds),\nwhich is the smallest multiple of BITS_PER_LONG that covers all\nopened descriptors below max_fds. In the common case (copying on\nfork()) max_fds is ~0U, so all opened descriptors will be below\nit and we are fine, by the same reasons why the call in expand_fdtable()\nis safe.\n\nUnfortunately, there is a case where max_fds is less than that\nand where we might, indeed, end up with junk in ->full_fds_bits[] -\nclose_range(from, to, CLOSE_RANGE_UNSHARE) with\n\t* descriptor table being currently shared\n\t* 'to' being above the current capacity of descriptor table\n\t* 'from' being just under some chunk of opened descriptors.\nIn that case we end up with observably wrong behaviour - e.g. spawn\na child with CLONE_FILES, get all descriptors in range 0..127 open,\nthen close_range(64, ~0U, CLOSE_RANGE_UNSHARE) and watch dup(0) ending\nup with descriptor #128, despite #64 being observably not open.\n\nThe minimally invasive fix would be to deal with that in dup_fd().\nIf this proves to add measurable overhead, we can go that way, but\nlet's try to fix copy_fd_bitmaps() first.\n\n* new helper: bitmap_copy_and_expand(to, from, bits_to_copy, size).\n* make copy_fd_bitmaps() take the bitmap size in words, rather than\nbits; it's 'count' argument is always a multiple of BITS_PER_LONG,\nso we are not losing any information, and that way we can use the\nsame helper for all three bitmaps - compiler will see that count\nis a multiple of BITS_PER_LONG for the large ones, so it'll generate\nplain memcpy()+memset().\n\nReproducer added to tools/testing/selftests/core/close_range_test.c" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5053581fe5dfb09b58c65dd8462bf5dea71f41ff", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8cad3b2b3ab81ca55f37405ffd1315bcc2948058", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9a2fa1472083580b6c66bdaf291f591e1170123a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c69d18f0ac7060de724511537810f10f29a27958", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dd72ae8b0fce9c0bbe9582b9b50820f0407f8d8a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e807487a1d5fd5d941f26578ae826ca815dbfcd6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ee501f827f3db02d4e599afbbc1a7f8b792d05d7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fe5bf14881701119aeeda7cf685f3c226c7380df", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45026.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45026.json new file mode 100644 index 00000000000..d4dcfd2d17e --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45026.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-45026", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.507", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix error recovery leading to data corruption on ESE devices\n\nExtent Space Efficient (ESE) or thin provisioned volumes need to be\nformatted on demand during usual IO processing.\n\nThe dasd_ese_needs_format function checks for error codes that signal\nthe non existence of a proper track format.\n\nThe check for incorrect length is to imprecise since other error cases\nleading to transport of insufficient data also have this flag set.\nThis might lead to data corruption in certain error cases for example\nduring a storage server warmstart.\n\nFix by removing the check for incorrect length and replacing by\nexplicitly checking for invalid track format in transport mode.\n\nAlso remove the check for file protected since this is not a valid\nESE handling case." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0a228896a1b3654cd461ff654f6a64e97a9c3246", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/19f60a55b2fda49bc4f6134a5f6356ef62ee69d8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5d4a304338daf83ace2887aaacafd66fe99ed5cc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7db4042336580dfd75cb5faa82c12cd51098c90b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/93a7e2856951680cd7fe6ebd705ac10c8a8a5efd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a665e3b7ac7d5cdc26e00e3d0fc8fd490e00316a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e245a18281c252c8dbc467492e09bb5d4b012118", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45027.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45027.json new file mode 100644 index 00000000000..e23f62fa9df --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45027.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45027", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.570", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Check for xhci->interrupters being allocated in xhci_mem_clearup()\n\nIf xhci_mem_init() fails, it calls into xhci_mem_cleanup() to mop\nup the damage. If it fails early enough, before xhci->interrupters\nis allocated but after xhci->max_interrupters has been set, which\nhappens in most (all?) cases, things get uglier, as xhci_mem_cleanup()\nunconditionally derefences xhci->interrupters. With prejudice.\n\nGate the interrupt freeing loop with a check on xhci->interrupters\nbeing non-NULL.\n\nFound while debugging a DMA allocation issue that led the XHCI driver\non this exact path." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/770cacc75b0091ece17349195d72133912c1ca7c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dcdb52d948f3a17ccd3fce757d9bd981d7c32039", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45028.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45028.json new file mode 100644 index 00000000000..1604227f946 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45028.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-45028", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.647", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmc_test: Fix NULL dereference on allocation failure\n\nIf the \"test->highmem = alloc_pages()\" allocation fails then calling\n__free_pages(test->highmem) will result in a NULL dereference. Also\nchange the error code to -ENOMEM instead of returning success." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2b507b03991f44dfb202fc2a82c9874d1b1f0c06", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3b4e76ceae5b5a46c968bd952f551ce173809f63", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9b9ba386d7bfdbc38445932c90fa9444c0524bea", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a1e627af32ed60713941cbfc8075d44cad07f6dd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cac2815f49d343b2f0acc4973d2c14918ac3ab0c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e40515582141a9e7c84b269be699c05236a499a6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e97be13a9f51284da450dd2a592e3fa87b49cdc9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ecb15b8ca12c0cbdab81e307e9795214d8b90890", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45029.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45029.json new file mode 100644 index 00000000000..49753ca4e2b --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45029.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-45029", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.717", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: tegra: Do not mark ACPI devices as irq safe\n\nOn ACPI machines, the tegra i2c module encounters an issue due to a\nmutex being called inside a spinlock. This leads to the following bug:\n\n\tBUG: sleeping function called from invalid context at kernel/locking/mutex.c:585\n\t...\n\n\tCall trace:\n\t__might_sleep\n\t__mutex_lock_common\n\tmutex_lock_nested\n\tacpi_subsys_runtime_resume\n\trpm_resume\n\ttegra_i2c_xfer\n\nThe problem arises because during __pm_runtime_resume(), the spinlock\n&dev->power.lock is acquired before rpm_resume() is called. Later,\nrpm_resume() invokes acpi_subsys_runtime_resume(), which relies on\nmutexes, triggering the error.\n\nTo address this issue, devices on ACPI are now marked as not IRQ-safe,\nconsidering the dependency of acpi_subsys_runtime_resume() on mutexes." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/14d069d92951a3e150c0a81f2ca3b93e54da913b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2853e1376d8161b04c9ff18ba82b43f08a049905", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6861faf4232e4b78878f2de1ed3ee324ddae2287", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a89aef1e6cc43fa019a58080ed05c839e6c77876", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45030.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45030.json new file mode 100644 index 00000000000..e18623cf338 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45030.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-45030", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.770", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: cope with large MAX_SKB_FRAGS\n\nSabrina reports that the igb driver does not cope well with large\nMAX_SKB_FRAG values: setting MAX_SKB_FRAG to 45 causes payload\ncorruption on TX.\n\nAn easy reproducer is to run ssh to connect to the machine. With\nMAX_SKB_FRAGS=17 it works, with MAX_SKB_FRAGS=45 it fails. This has\nbeen reported originally in\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2265320\n\nThe root cause of the issue is that the driver does not take into\naccount properly the (possibly large) shared info size when selecting\nthe ring layout, and will try to fit two packets inside the same 4K\npage even when the 1st fraglist will trump over the 2nd head.\n\nAddress the issue by checking if 2K buffers are insufficient." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/8aba27c4a5020abdf60149239198297f88338a8d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8ea80ff5d8298356d28077bc30913ed37df65109", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b52bd8bcb9e8ff250c79b44f9af8b15cae8911ab", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json index b678a840496..80cec307906 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45327.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45327", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-09-11T10:15:02.023", - "lastModified": "2024-09-11T10:15:02.023", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper authorization vulnerability [CWE-285] in FortiSOAR version 7.4.0 through 7.4.3, 7.3.0 through 7.3.2, 7.2.0 through 7.2.2, 7.0.0 through 7.0.3 change password endpoint may allow an authenticated attacker to perform a brute force attack on users and administrators password via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de autorizaci\u00f3n indebida [CWE-285] en el endpoint de cambio de contrase\u00f1a de FortiSOAR versi\u00f3n 7.4.0 a 7.4.3, 7.3.0 a 7.3.2, 7.2.0 a 7.2.2, 7.0.0 a 7.0.3 puede permitir que un atacante autenticado realice un ataque de fuerza bruta en las contrase\u00f1as de usuarios y administradores a trav\u00e9s de solicitudes HTTP manipuladas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45409.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45409.json index b01b1143b04..fe65793b312 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45409.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45409.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45409", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-10T19:15:22.030", - "lastModified": "2024-09-10T19:15:22.030", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3." + }, + { + "lang": "es", + "value": "La librer\u00eda Ruby SAML sirve para implementar el lado del cliente de una autorizaci\u00f3n SAML. Ruby-SAML en <= 12.2 y 1.13.0 <= 1.16.0 no verifica correctamente la firma de la respuesta SAML. Un atacante no autenticado con acceso a cualquier documento SAML firmado (por el IdP) puede falsificar una respuesta/afirmaci\u00f3n SAML con contenido arbitrario. Esto le permitir\u00eda al atacante iniciar sesi\u00f3n como un usuario arbitrario dentro del sistema vulnerable. Esta vulnerabilidad se solucion\u00f3 en 1.17.0 y 1.12.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45596.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45596.json index ef9035b44f2..c92a3a08208 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45596.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45596.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45596", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-10T19:15:22.303", - "lastModified": "2024-09-10T19:15:22.303", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directus is a real-time API and App dashboard for managing SQL database content. An unauthenticated user can access credentials of last authenticated user via OpenID or OAuth2 where the authentication URL did not include redirect query string. This happens because on that endpoint for both OpenId and Oauth2 Directus is using the respond middleware, which by default will try to cache GET requests that met some conditions. Although, those conditions do not include this scenario, when an unauthenticated request returns user credentials. This vulnerability is fixed in 10.13.3 and 11.1.0." + }, + { + "lang": "es", + "value": "Directus es una API en tiempo real y un panel de control de aplicaciones para administrar el contenido de bases de datos SQL. Un usuario no autenticado puede acceder a las credenciales del \u00faltimo usuario autenticado a trav\u00e9s de OpenID u OAuth2 donde la URL de autenticaci\u00f3n no inclu\u00eda una cadena de consulta de redireccionamiento. Esto sucede porque en ese endpoint, tanto para OpenID como para OAuth2, Directus usa el middleware de respuesta, que de manera predeterminada intentar\u00e1 almacenar en cach\u00e9 las solicitudes GET que cumplieron con algunas condiciones. Sin embargo, esas condiciones no incluyen este escenario, cuando una solicitud no autenticada devuelve las credenciales del usuario. Esta vulnerabilidad se corrigi\u00f3 en 10.13.3 y 11.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json index aeda71d5efe..6d6405d564c 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45597.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45597", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-10T22:15:01.967", - "lastModified": "2024-09-10T22:15:01.967", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. Scripts passing user-controlled values to http.request header values are affected. An attacker could use this to send arbitrary requests, potentially leveraging authentication tokens provided in the same headers table." + }, + { + "lang": "es", + "value": "Pluto es un superconjunto de Lua 5.4 que se centra en la programaci\u00f3n de uso general. Los scripts que pasan valores controlados por el usuario a los valores del encabezado http.request se ven afectados. Un atacante podr\u00eda utilizar esto para enviar solicitudes arbitrarias, aprovechando potencialmente los tokens de autenticaci\u00f3n proporcionados en la misma tabla de encabezados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45786.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45786.json index f9099e6bf19..8349a2ffc7a 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45786.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45786.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45786", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-11T12:15:01.943", - "lastModified": "2024-09-11T12:15:01.943", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45787.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45787.json index 06b9816d6bd..f9faefaea03 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45787.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45787.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45787", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-11T12:15:02.123", - "lastModified": "2024-09-11T12:15:02.123", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45788.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45788.json index 92d8353b72a..143d74d7646 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45788.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45788.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45788", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-11T12:15:02.230", - "lastModified": "2024-09-11T12:15:02.230", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45789.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45789.json index b9366994227..e792a5d32ee 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45789.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45789.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45789", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-11T12:15:02.343", - "lastModified": "2024-09-11T12:15:02.343", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45790.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45790.json index 4bf0d2d7f2a..11c8b462b20 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45790.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45790", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-11T13:15:03.290", - "lastModified": "2024-09-11T13:15:03.290", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46672.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46672.json new file mode 100644 index 00000000000..e8f5554719a --- /dev/null +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46672.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-46672", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-09-11T16:15:07.840", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion\n\nwpa_supplicant 2.11 sends since 1efdba5fdc2c (\"Handle PMKSA flush in the\ndriver for SAE/OWE offload cases\") SSID based PMKSA del commands.\nbrcmfmac is not prepared and tries to dereference the NULL bssid and\npmkid pointers in cfg80211_pmksa. PMKID_V3 operations support SSID based\nupdates so copy the SSID." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1f566eb912d192c83475a919331aea59619e1197", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2ad4e1ada8eebafa2d75a4b75eeeca882de6ada1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4291f94f8c6b01505132c22ee27b59ed27c3584f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5290.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5290.json index 7915bea5bd8..2ce4e776892 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5290.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5290.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5290", "sourceIdentifier": "security@ubuntu.com", "published": "2024-08-07T09:16:05.553", - "lastModified": "2024-08-07T15:17:46.717", + "lastModified": "2024-09-11T16:15:07.903", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613", "source": "security@ubuntu.com" }, + { + "url": "https://snyk.io/blog/abusing-ubuntu-root-privilege-escalation/", + "source": "security@ubuntu.com" + }, { "url": "https://ubuntu.com/security/notices/USN-6945-1", "source": "security@ubuntu.com" diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5309.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5309.json index ecd846b5c3a..515bd04149d 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5309.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5309.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5309", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T09:15:04.253", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:33:17.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpvibes:form_vibes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.13", + "matchCriteriaId": "D4213D6E-3F6F-43F0-A6A7-482BBFB34272" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3128705%40form-vibes&new=3128705%40form-vibes&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aba88c4c-93a4-4c1c-b239-68b5fec87146?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5416.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5416.json index 75db800f7ba..91896949c2f 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5416.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5416.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5416", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T12:15:02.463", - "lastModified": "2024-09-11T12:15:02.463", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5760.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5760.json new file mode 100644 index 00000000000..5126f72926c --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5760.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5760", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-09-11T16:15:08.020", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Samsung Universal Print Driver for Windows is potentially vulnerable to escalation of privilege allowing the creation of a reverse shell in the tool. This is only applicable for products in the application released or manufactured before 2018." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11159589-11159645-16/hpsbpi03970", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6091.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6091.json index 9a3c103171a..e282210dfcc 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6091.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6091", "sourceIdentifier": "security@huntr.dev", "published": "2024-09-11T13:15:03.440", - "lastModified": "2024-09-11T13:15:03.440", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json index 3a7525636d2..402b7f9727d 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6502.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6502", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-22T16:15:10.377", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:49:28.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,84 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "17.1.6", + "matchCriteriaId": "7A232C67-E643-439E-9C18-40E784E044D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.4", + "matchCriteriaId": "77973797-7C54-4BBA-9BB7-A0E71BC6AB94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.3.0", + "versionEndExcluding": "17.3.1", + "matchCriteriaId": "C2925C28-DB06-4BAC-B765-CF3226A555BA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "8.2.0", + "versionEndExcluding": "17.1.6", + "matchCriteriaId": "71B48894-8CE6-4A72-8030-59D2F4330681" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.4", + "matchCriteriaId": "E1DB1E17-ECEF-4040-BDA8-2E55F75BA266" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.3.0", + "versionEndExcluding": "17.3.1", + "matchCriteriaId": "0A8C02DB-1D57-4F63-B472-E7D5BC958EDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/470647", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2574561", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6835.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6835.json index 7b76f213aaf..39bd66eca8d 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6835.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6835.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6835", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T07:15:02.657", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:32:16.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,22 +61,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivorysearch:ivory_search:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.5.7", + "matchCriteriaId": "1C51F264-07B1-4F49-845D-C63FD0601ED3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/add-search-to-menu/tags/5.5.6/public/class-is-ajax.php#L45", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/add-search-to-menu/tags/5.5.6/public/partials/is-ajax-results.php#L57", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3145289/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/013f7c26-8348-4c54-af61-473a720a5095?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6852.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6852.json index 6c95c2d9da0..aad6a3583e1 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6852.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6852", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.010", - "lastModified": "2024-09-09T20:35:19.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:23:02.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ngothang:wp_multitasking:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.12", + "matchCriteriaId": "E7B870E4-8199-46B0-95CD-11735A373DE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e6c7c153-8080-40b3-85e2-604ce7c66e32/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6853.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6853.json index f9852745615..a77860dc7a0 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6853.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6853", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.217", - "lastModified": "2024-09-09T20:35:19.540", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:22:18.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ngothang:wp_multitasking:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.12", + "matchCriteriaId": "E7B870E4-8199-46B0-95CD-11735A373DE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d1ce78c3-5d6c-465e-9ce8-6d92f7480333/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6855.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6855.json index 94d67121ecb..ce9a9f0a9c4 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6855.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6855", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.320", - "lastModified": "2024-09-09T20:35:19.770", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:21:38.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ngothang:wp_multitasking:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.12", + "matchCriteriaId": "E7B870E4-8199-46B0-95CD-11735A373DE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1124b07a-6274-49df-be77-615fda8f3a38/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6856.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6856.json index 3914d676f05..52def4c3c89 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6856.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6856", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.400", - "lastModified": "2024-09-09T20:35:20.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:20:45.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ngothang:wp_multitasking:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.12", + "matchCriteriaId": "E7B870E4-8199-46B0-95CD-11735A373DE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/9700845e-89ca-4f9b-95f0-4b46a975b662/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6859.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6859.json index 2477b74def4..3883d2c9f42 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6859.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6859.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6859", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.497", - "lastModified": "2024-09-09T20:35:20.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:19:18.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ngothang:wp_multitasking:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.12", + "matchCriteriaId": "E7B870E4-8199-46B0-95CD-11735A373DE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/34ae6121-304f-495b-bcc1-4fbd3d70a9fb/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6894.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6894.json index b58bb686b4d..5ba027637f9 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6894.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6894.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6894", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T10:15:03.737", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:36:03.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdstation:rd_station:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.4.0", + "matchCriteriaId": "EDD6D8E7-5608-4824-95BD-9944A375C2B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/integracao-rd-station/trunk/metaboxes/add_custom_scripts.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/integracao-rd-station/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa5075a8-1da1-4738-ad4b-b6c323d772ee?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json index af946f8285a..433ac002695 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6912.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6912", "sourceIdentifier": "office@cyberdanube.com", "published": "2024-07-22T21:15:05.453", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:56:52.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, { "source": "office@cyberdanube.com", "type": "Secondary", @@ -73,14 +105,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.11.6507.0", + "matchCriteriaId": "2C7ABA82-61C0-4ABF-A3E1-0106B2B16BC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/13", - "source": "office@cyberdanube.com" + "source": "office@cyberdanube.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/", - "source": "office@cyberdanube.com" + "source": "office@cyberdanube.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json index 13fd1f0a54f..a5ce1f71864 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6913", "sourceIdentifier": "office@cyberdanube.com", "published": "2024-07-22T21:15:05.560", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:58:36.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "office@cyberdanube.com", "type": "Secondary", @@ -73,14 +105,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.11.6507.0", + "matchCriteriaId": "2C7ABA82-61C0-4ABF-A3E1-0106B2B16BC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/13", - "source": "office@cyberdanube.com" + "source": "office@cyberdanube.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/", - "source": "office@cyberdanube.com" + "source": "office@cyberdanube.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6924.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6924.json index e07abe2d6a5..990b779cb46 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6924.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6924.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6924", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.580", - "lastModified": "2024-09-09T20:35:20.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:15:30.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themetechmount:truebooker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "FEF44704-054B-4F7C-BAC0-AD1BF0351CA0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/39e79801-6ec7-4579-bc6b-fd7e899733a8/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6925.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6925.json index ab68efda153..1d084737976 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6925.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6925.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6925", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.660", - "lastModified": "2024-09-09T21:35:16.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:12:24.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themetechmount:truebooker:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "FEF44704-054B-4F7C-BAC0-AD1BF0351CA0" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/1da75fd7-e44f-4043-b8f4-7ee975356982/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json index 1d83ed3502a..7b43d0be399 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6984", "sourceIdentifier": "security@ubuntu.com", "published": "2024-07-29T14:15:04.477", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:39:37.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + }, { "source": "security@ubuntu.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, { "source": "security@ubuntu.com", "type": "Secondary", @@ -51,18 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9", + "versionEndExcluding": "2.9.50", + "matchCriteriaId": "A53137FD-EC95-4BB0-87AE-5265D8B20C44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1", + "versionEndExcluding": "3.1.9", + "matchCriteriaId": "4492C790-2A93-4532-8BBA-FAAABE094605" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.3.6", + "matchCriteriaId": "2411D179-5948-4695-8774-3FB037530AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4", + "versionEndExcluding": "3.4.5", + "matchCriteriaId": "63C146EF-AF30-4A6E-97A5-11C387534EA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:canonical:juju:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.5.3", + "matchCriteriaId": "34FB1891-C153-4F19-8C3B-F2332BF21D7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/juju/juju/commit/da929676853092a29ddf8d589468cf85ba3efaf2", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/juju/juju/security/advisories/GHSA-6vjm-54vp-mxhx", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2024-6984", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json index 04e3e2acd35..40c9165eecb 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7110.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7110", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-22T16:15:10.627", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:52:37.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,10 +81,77 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.1.6", + "matchCriteriaId": "AB3177CA-651B-437F-9E68-5FB2015A5702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.4", + "matchCriteriaId": "77973797-7C54-4BBA-9BB7-A0E71BC6AB94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.3.0", + "versionEndExcluding": "17.3.1", + "matchCriteriaId": "C2925C28-DB06-4BAC-B765-CF3226A555BA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.0.0", + "versionEndExcluding": "17.1.6", + "matchCriteriaId": "0ABAEB09-BEB2-4035-9041-DA84B8C331E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.4", + "matchCriteriaId": "E1DB1E17-ECEF-4040-BDA8-2E55F75BA266" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.3.0", + "versionEndExcluding": "17.3.1", + "matchCriteriaId": "0A8C02DB-1D57-4F63-B472-E7D5BC958EDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/472603", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7193.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7193.json index 7e2effeb8e4..dbcb86f8f9d 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7193.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7193", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-29T10:15:02.107", - "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:47:59.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:florian_heidenreich:mp3tag:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.26d", + "matchCriteriaId": "F7A4E591-B705-4126-9D1B-27FD015B2734" + } + ] + } + ] + } + ], "references": [ { "url": "https://app.any.run/tasks/37401db6-5584-4f21-8cc5-73240c4ea2dc/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://community.mp3tag.de/t/mp3tag-development-build-status/455/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.272614", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.272614", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.379523", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7218.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7218.json index c12f3af0a4b..a861de19bd9 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7218.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7218", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-30T05:15:10.267", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:06:10.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +150,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:school_log_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B34C3020-AAAC-4FF4-9410-5375B07D6812" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/topsky979/86480890cc621c240c86e95a3de9ecc4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.272789", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.272789", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.380425", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7312.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7312.json new file mode 100644 index 00000000000..e7ae497db12 --- /dev/null +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7312.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-7312", + "sourceIdentifier": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "published": "2024-09-11T16:15:08.080", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payara Platform Payara Server (REST Management Interface modules) allows Session Hijacking.This issue affects Payara Server: from 6.0.0 before 6.18.0, from 6.2022.1 before 6.2024.9, from 5.2020.2 before 5.2022.5, from 5.20.0 before 5.67.0, from 4.1.2.191.0 before 4.1.2.191.50." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.0, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%205.67.0.html", + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8" + }, + { + "url": "https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.18.0.html", + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7609.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7609.json index 388d214ea73..a1ef47b9281 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7609.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7609.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7609", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-09-11T12:15:02.690", - "lastModified": "2024-09-11T12:15:02.690", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7626.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7626.json index d39ee2a120a..8a9fb347e25 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7626.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7626.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7626", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T08:15:01.950", - "lastModified": "2024-09-11T08:15:01.950", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Delicious \u2013 Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php." + }, + { + "lang": "es", + "value": "El complemento WP Delicious \u2013 Recipe Plugin for Food Bloggers (anteriormente Delicious Recipes) para WordPress es vulnerable al movimiento y la lectura arbitrarios de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la funci\u00f3n save_edit_profile_details() en todas las versiones hasta la 1.6.9 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, muevan archivos arbitrarios en el servidor, lo que puede conducir f\u00e1cilmente a la ejecuci\u00f3n remota de c\u00f3digo cuando se mueve el archivo correcto (como wp-config.php). Esto tambi\u00e9n puede conducir a la lectura de archivos arbitrarios que pueden contener informaci\u00f3n confidencial como wp-config.php." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7627.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7627.json index dd56a297b2c..2bb8eec9ab2 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7627.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7627.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7627", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T03:15:03.560", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:31:21.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,22 +61,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.5.6", + "matchCriteriaId": "1C172B11-BFF7-46F5-B415-5472866BE06D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/file-manager/trunk/backend/app/Providers/FileEditValidator.php#L39", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/file-manager/trunk/backend/app/Providers/FileEditValidator.php#L88", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3138710/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f29de7a-3f15-4b6d-aad7-6a08151e2113?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7716.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7716.json index 99567a586a9..b024a69cb1f 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7716.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7716.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7716", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-11T06:15:02.690", - "lastModified": "2024-09-11T15:35:12.190", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:35:39.790", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], "references": [ { "url": "https://wpscan.com/vulnerability/cfa67c43-6f09-43f5-9fbe-32a98a82f548/", diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7721.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7721.json index 02aeb76e043..5b988490b6e 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7721.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7721.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7721", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T05:15:03.180", - "lastModified": "2024-09-11T05:15:03.180", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTML5 Video Player \u2013 mp4 Video Player Plugin and Block plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_password' function in all versions up to, and including, 2.5.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to set any options that are not explicitly checked as false to an array, including enabling user registration if it has been disabled." + }, + { + "lang": "es", + "value": "El complemento HTML5 Video Player \u2013 mp4 Video Player Plugin and Block para WordPress son vulnerables a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'save_password' en todas las versiones hasta la 2.5.34 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, establezcan cualquier opci\u00f3n que no est\u00e9 marcada expl\u00edcitamente como falsa en una matriz, incluida la habilitaci\u00f3n del registro de usuario si se ha deshabilitado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7727.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7727.json index de4fe86360b..537ae150b3f 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7727.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7727.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7727", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T05:15:03.400", - "lastModified": "2024-09-11T05:15:03.400", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTML5 Video Player \u2013 mp4 Video Player Plugin and Block plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions called via the 'h5vp_ajax_handler' ajax action in all versions up to, and including, 2.5.32. This makes it possible for unauthenticated attackers to call these functions to manipulate data." + }, + { + "lang": "es", + "value": "El complemento HTML5 Video Player \u2013 mp4 Video Player Plugin and Block para WordPress son vulnerables al acceso no autorizado a los datos debido a una verificaci\u00f3n de capacidad faltante en varias funciones llamadas a trav\u00e9s de la acci\u00f3n ajax 'h5vp_ajax_handler' en todas las versiones hasta la 2.5.32 incluida. Esto hace posible que atacantes no autenticados llamen a estas funciones para manipular los datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8012.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8012.json index 9bd0dfc6ca8..492cc67d8f0 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8012.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8012.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8012", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:14.510", - "lastModified": "2024-09-10T21:15:14.510", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication bypass weakness in the message broker service of Ivanti Workspace Control version 10.18.0.0 and below allows a local authenticated attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "Una debilidad en la omisi\u00f3n de autenticaci\u00f3n en el servicio de agente de mensajes de Ivanti Workspace Control versi\u00f3n 10.18.0.0 y anteriores permite que un atacante autenticado local escale sus privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json index fe7598928aa..11492f3656a 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8041", "sourceIdentifier": "cve@gitlab.com", "published": "2024-08-22T16:15:10.880", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-11T16:54:10.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionEndExcluding": "17.1.6", + "matchCriteriaId": "76FB69CE-076D-474E-BC1C-652ABA66ABE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.4", + "matchCriteriaId": "77973797-7C54-4BBA-9BB7-A0E71BC6AB94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.3.0", + "versionEndExcluding": "17.3.1", + "matchCriteriaId": "C2925C28-DB06-4BAC-B765-CF3226A555BA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "17.1.6", + "matchCriteriaId": "8A34FF5F-75BF-4CDD-9E82-96BF23FCF6F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2.0", + "versionEndExcluding": "17.2.4", + "matchCriteriaId": "E1DB1E17-ECEF-4040-BDA8-2E55F75BA266" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.3.0", + "versionEndExcluding": "17.3.1", + "matchCriteriaId": "0A8C02DB-1D57-4F63-B472-E7D5BC958EDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/463092", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2499070", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8045.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8045.json index 2c51a52deec..116a3f1e727 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8045.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8045.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8045", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T08:15:02.170", - "lastModified": "2024-09-11T08:15:02.170", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Advanced WordPress Backgrounds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018imageTag\u2019 parameter in all versions up to, and including, 1.12.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Advanced WordPress Backgrounds para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro 'imageTag' en todas las versiones hasta la 1.12.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8096.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8096.json index cb6005f1ff2..5b43b0a3e3d 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8096.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8096", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-09-11T10:15:02.883", - "lastModified": "2024-09-11T14:35:05.603", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8097.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8097.json new file mode 100644 index 00000000000..cc90c939c5e --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8097.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-8097", + "sourceIdentifier": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "published": "2024-09-11T17:15:13.917", + "lastModified": "2024-09-11T17:15:13.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Payara Platform Payara Server (Logging modules) allows Sensitive credentials posted in plain-text on the server log.This issue affects Payara Server: from 6.0.0 before 6.18.0, from 6.2022.1 before 6.2024.9, from 5.20.0 before 5.67.0, from 5.2020.2 before 5.2022.5, from 4.1.2.191.0 before 4.1.2.191.50." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://docs.payara.fish/community/docs/Release%20Notes/Release%20Notes%206.2024.9.html", + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8" + }, + { + "url": "https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.18.0.html", + "source": "769c9ae7-73c3-4e47-ae19-903170fc3eb8" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8190.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8190.json index 2f3e24ff9cd..66610518772 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8190.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8190.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8190", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:14.697", - "lastModified": "2024-09-10T21:15:14.697", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows a remote authenticated attacker to obtain remote code execution. The attacker must have admin level privileges to exploit this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en las versiones 4.6, parche 518 y anteriores de Ivanti Cloud Services Appliance permite que un atacante autenticado de forma remota obtenga la ejecuci\u00f3n remota de c\u00f3digo. El atacante debe tener privilegios de nivel de administrador para aprovechar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8191.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8191.json index 200d20f5069..634c9b85e4e 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8191.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8191.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8191", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:14.880", - "lastModified": "2024-09-10T21:15:14.880", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection in the management console of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution." + }, + { + "lang": "es", + "value": "La inyecci\u00f3n de SQL en la consola de administraci\u00f3n de Ivanti EPM antes de 2022 SU6, o la actualizaci\u00f3n de septiembre de 2024, permite que un atacante remoto no autenticado logre la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8232.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8232.json index 5dfc5c9e37c..83fa2cc81ff 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8232.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8232.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8232", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-10T20:15:05.060", - "lastModified": "2024-09-10T20:15:05.060", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SpiderControl SCADA Web Server has a vulnerability that could allow an \nattacker to upload specially crafted malicious files without \nauthentication." + }, + { + "lang": "es", + "value": "El servidor web SpiderControl SCADA tiene una vulnerabilidad que podr\u00eda permitir a un atacante cargar archivos maliciosos especialmente manipulados sin autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8253.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8253.json index 40390f0671c..e98b6a31708 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8253.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8253.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8253", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T04:15:05.970", - "lastModified": "2024-09-11T04:15:05.970", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Post Grid and Gutenberg Blocks plugin for WordPress is vulnerable to privilege escalation in all versions 2.2.87 to 2.2.90. This is due to the plugin not properly restricting what user meta values can be updated and ensuring a form is active. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta to become an administrator." + }, + { + "lang": "es", + "value": "El complemento Post Grid y Gutenberg Blocks para WordPress es vulnerable a la escalada de privilegios en todas las versiones 2.2.87 a 2.2.90. Esto se debe a que el complemento no restringe adecuadamente qu\u00e9 valores meta de usuario se pueden actualizar y no garantiza que un formulario est\u00e9 activo. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen sus metadatos de usuario para convertirse en administradores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8277.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8277.json index 1ec144352ee..6e62e215121 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8277.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8277.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8277", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T09:15:02.680", - "lastModified": "2024-09-11T09:15:02.680", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Photo Reviews Premium plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.3.13.2. This is due to the plugin not properly validating what user transient is being used in the login() function and not properly verifying the user's identity. This makes it possible for unauthenticated attackers to log in as user that has dismissed an admin notice in the past 30 days, which is often an administrator. Alternatively, a user can log in as any user with any transient that has a valid user_id as the value, though it would be more difficult to exploit this successfully." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Photo Reviews Premium para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 1.3.13.2 incluida. Esto se debe a que el complemento no valida correctamente qu\u00e9 usuario transitorio se est\u00e1 utilizando en la funci\u00f3n login() y no verifica correctamente la identidad del usuario. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como un usuario que ha rechazado un aviso de administrador en los \u00faltimos 30 d\u00edas, que a menudo es un administrador. Alternativamente, un usuario puede iniciar sesi\u00f3n como cualquier usuario con cualquier transient que tenga un user_id v\u00e1lido como valor, aunque ser\u00eda m\u00e1s dif\u00edcil explotar esto con \u00e9xito." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8306.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8306.json index 8cc5acff78b..6c01b59d6c4 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8306.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8306.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8306", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-09-11T15:15:18.827", - "lastModified": "2024-09-11T15:15:18.827", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8317.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8317.json index 2f027c393d9..191aedc6d08 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8317.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8317", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-06T07:15:03.367", - "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T17:46:03.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,34 +71,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpeka:wp_adcenter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5.7", + "matchCriteriaId": "51B90B34-AE05-4395-981C-22A3C251BB72" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wpadcenter/trunk/admin/class-wpadcenter-admin.php#L2922", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpadcenter/trunk/admin/class-wpadcenter-admin.php#L3020", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpadcenter/trunk/admin/class-wpadcenter-admin.php#L3127", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3146736/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3146736/#file6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wpadcenter/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac7f95c7-2159-4327-ba09-da7721f1312e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8320.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8320.json index 38af571ad7d..62914311f35 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8320.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8320.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8320", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:15.060", - "lastModified": "2024-09-10T21:15:15.060", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to spoof Network Isolation status of managed devices." + }, + { + "lang": "es", + "value": "La falta de autenticaci\u00f3n en el aislamiento de red de Ivanti EPM antes de 2022 SU6 o la actualizaci\u00f3n de septiembre de 2024 permite que un atacante remoto no autenticado falsifique el estado de aislamiento de red de los dispositivos administrados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8321.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8321.json index c8268c8daaa..cd11a340138 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8321.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8321.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8321", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:15.247", - "lastModified": "2024-09-10T21:15:15.247", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing authentication in Network Isolation of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to isolate managed devices from the network." + }, + { + "lang": "es", + "value": "La falta de autenticaci\u00f3n en el aislamiento de red de Ivanti EPM antes de 2022 SU6 o la actualizaci\u00f3n de septiembre de 2024 permite que un atacante remoto no autenticado a\u00edsle los dispositivos administrados de la red." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8322.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8322.json index f86f57c9f5c..8c19889cec9 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8322.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8322.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8322", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:15.427", - "lastModified": "2024-09-10T21:15:15.427", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Weak authentication in Patch Management of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker to access restricted functionality." + }, + { + "lang": "es", + "value": "La autenticaci\u00f3n d\u00e9bil en la gesti\u00f3n de parches de Ivanti EPM antes de 2022 SU6 o la actualizaci\u00f3n de septiembre de 2024 permite que un atacante autenticado remoto acceda a una funcionalidad restringida." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8363.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8363.json index c0c7c0e999f..6c945f2b889 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8363.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8363.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8363", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T09:15:04.620", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:35:05.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:share-this-image:share_this_image:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.03", + "matchCriteriaId": "BBDEF0B4-8BF8-48CE-843D-80A1C4134CC3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.02/includes/class-sti-shortcodes.php#L40", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3146524/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/share-this-image/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d01b6056-a38d-4a60-9cdc-68663aa2aed6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8394.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8394.json index 8e60343d241..108ecc81620 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8394.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8394.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8394", "sourceIdentifier": "security@mozilla.org", "published": "2024-09-06T17:15:18.360", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:25:44.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Al interrumpir la verificaci\u00f3n de una sesi\u00f3n de chat OTR, un atacante podr\u00eda haber provocado un error de use-after-free que condujo a un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Thunderbird < 128.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.2.0", + "matchCriteriaId": "362EA9AE-858A-4552-B002-5BA7092690D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895737", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-43/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8427.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8427.json index c450c3cf1ff..5b3440c7bd8 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8427.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8427", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-06T07:15:03.730", - "lastModified": "2024-09-06T12:08:04.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T17:41:18.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpshuffle:frontend_post_submission_manager:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "1.2.3", + "matchCriteriaId": "243A365F-EC5D-4678-9638-3E7B83C2EB18" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/frontend-post-submission-manager-lite/tags/1.2.2/includes/classes/admin/class-fpsml-ajax-admin.php#L25", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3147218/frontend-post-submission-manager-lite/trunk/includes/classes/admin/class-fpsml-ajax-admin.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e84b68b6-1ce8-45fb-823f-a61158aa4d21?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8440.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8440.json index 4b17843253f..3c118192875 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8440.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8440.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8440", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-11T07:15:04.420", - "lastModified": "2024-09-11T07:15:04.420", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Fancy Text widget in all versions up to, and including, 6.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders para WordPress es vulnerable a cross-site scripting almacenado a trav\u00e9s del widget Fancy Text del complemento en todas las versiones hasta la 6.0.3 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8441.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8441.json index e3896c703ac..a1710add105 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8441.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8441.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8441", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-09-10T21:15:15.613", - "lastModified": "2024-09-10T21:15:15.613", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6, or the 2024 September update allows a local authenticated attacker with admin privileges to escalate their privileges to SYSTEM." + }, + { + "lang": "es", + "value": "Una ruta de b\u00fasqueda no controlada en el agente de Ivanti EPM antes de 2022 SU6 o la actualizaci\u00f3n de septiembre de 2024 permite que un atacante autenticado local con privilegios de administrador escale sus permisos a SYSTEM." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8503.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8503.json index 8c892ea2094..82079ea70cc 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8503.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8503.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8503", "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "published": "2024-09-10T20:15:05.283", - "lastModified": "2024-09-10T20:35:17.797", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial to enumerate database records. By default, VICIdial stores plaintext credentials within the database." + }, + { + "lang": "es", + "value": "Un atacante no autenticado puede aprovechar una vulnerabilidad de inyecci\u00f3n SQL basada en tiempo en VICIdial para enumerar registros de la base de datos. De manera predeterminada, VICIdial almacena credenciales de texto plano dentro de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json index 3b868f382b1..9e9fdfe0b80 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8504", "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "published": "2024-09-10T20:15:05.363", - "lastModified": "2024-09-10T20:15:05.363", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker with authenticated access to VICIdial as an \"agent\" can execute arbitrary shell commands as the \"root\" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective." + }, + { + "lang": "es", + "value": "Un atacante con acceso autenticado a VICIdial como \"agente\" puede ejecutar comandos de shell arbitrarios como usuario \"superusuario\". Este ataque se puede encadenar con CVE-2024-8503 para ejecutar comandos de shell arbitrarios a partir de una perspectiva no autenticada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8570.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8570.json index 91dd550b4d6..269359bae85 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8570.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8570", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T07:15:01.977", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:07:35.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/teachersongsec/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.276800", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276800", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.403126", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8571.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8571.json index 412c2a26092..efed1d1e733 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8571.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8571", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T08:15:13.157", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-11T16:05:34.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:erjemin:roll_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-08-31", + "matchCriteriaId": "6760B301-68D3-4FBD-B0BA-D46392FBDDB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/erjemin/roll_cms/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.276801", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276801", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.400796", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8636.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8636.json index cde12304998..1822351d575 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8636.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8636.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8636", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-09-11T14:15:13.850", - "lastModified": "2024-09-11T14:15:13.850", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8637.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8637.json index 185fdff719d..99ad1f7bfda 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8637.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8637.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8637", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-09-11T14:15:13.943", - "lastModified": "2024-09-11T14:15:13.943", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8638.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8638.json index 2144a886d70..732ec5f8de6 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8638.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8638.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8638", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-09-11T14:15:14.027", - "lastModified": "2024-09-11T14:15:14.027", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8639.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8639.json index f3b4353ff5e..8d205f13082 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8639.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8639.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8639", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-09-11T14:15:14.103", - "lastModified": "2024-09-11T14:15:14.103", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8642.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8642.json index 0e9430bad28..f42af776355 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8642.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8642.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8642", "sourceIdentifier": "emo@eclipse.org", "published": "2024-09-11T14:15:14.177", - "lastModified": "2024-09-11T14:15:14.177", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8646.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8646.json index 0ee16e5fd13..dba85210f9b 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8646.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8646.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8646", "sourceIdentifier": "emo@eclipse.org", "published": "2024-09-11T14:15:14.307", - "lastModified": "2024-09-11T14:15:14.307", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8655.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8655.json index dbd179ca85d..a62845f3fa0 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8655.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8655.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8655", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-10T20:15:05.440", - "lastModified": "2024-09-10T20:15:05.440", - "vulnStatus": "Received", + "lastModified": "2024-09-11T16:26:11.920", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Mercury MNVR816 up to 2.0.1.0.5. It has been classified as problematic. This affects an unknown part of the file /web-static/. The manipulation leads to files or directories accessible. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Mercury MNVR816 hasta la versi\u00f3n 2.0.1.0.5. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo /web-static/. La manipulaci\u00f3n hace que se pueda acceder a archivos o directorios. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8686.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8686.json new file mode 100644 index 00000000000..b5cbad9c6d8 --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8686.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8686", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-09-11T17:15:14.033", + "lastModified": "2024-09-11T17:15:14.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-8686", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8687.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8687.json new file mode 100644 index 00000000000..2876d85c92a --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8687.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8687", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-09-11T17:15:14.157", + "lastModified": "2024-09-11T17:15:14.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:D/RE:M/U:Amber", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-8687", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8688.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8688.json new file mode 100644 index 00000000000..bfc12275e9f --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8688.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8688", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-09-11T17:15:14.273", + "lastModified": "2024-09-11T17:15:14.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper neutralization of matching symbols vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables authenticated administrators (including read-only administrators) with access to the CLI to to read arbitrary files on the firewall." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-155" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-8688", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8689.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8689.json new file mode 100644 index 00000000000..797081f098e --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8689.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8689", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-09-11T17:15:14.380", + "lastModified": "2024-09-11T17:15:14.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A problem with the ActiveMQ integration for both Cortex XSOAR and Cortex XSIAM can result in the cleartext exposure of the configured ActiveMQ credentials in log bundles." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:D/RE:M/U:Amber", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-8689", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8690.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8690.json new file mode 100644 index 00000000000..1c111fc07c2 --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8690.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8690", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-09-11T17:15:14.487", + "lastModified": "2024-09-11T17:15:14.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-440" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-8690", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8691.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8691.json new file mode 100644 index 00000000000..489ee6a0fd7 --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8691.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8691", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2024-09-11T17:15:14.587", + "lastModified": "2024-09-11T17:15:14.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the GlobalProtect portal in Palo Alto Networks PAN-OS software enables a malicious authenticated GlobalProtect user to impersonate another GlobalProtect user. Active GlobalProtect users impersonated by an attacker who is exploiting this vulnerability are disconnected from GlobalProtect. Upon exploitation, PAN-OS logs indicate that the impersonated user authenticated to GlobalProtect, which hides the identity of the attacker." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:M/U:Amber", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "AUTOMATIC", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-8691", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7114dfa7b55..50ff8cea16e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-11T16:00:26.019163+00:00 +2024-09-11T18:00:17.868597+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-11T15:59:57.040000+00:00 +2024-09-11T17:52:39.477000+00:00 ``` ### Last Data Feed Release @@ -33,58 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262535 +262587 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `52` -- [CVE-2024-27112](CVE-2024/CVE-2024-271xx/CVE-2024-27112.json) (`2024-09-11T14:15:12.810`) -- [CVE-2024-27113](CVE-2024/CVE-2024-271xx/CVE-2024-27113.json) (`2024-09-11T14:15:12.947`) -- [CVE-2024-27114](CVE-2024/CVE-2024-271xx/CVE-2024-27114.json) (`2024-09-11T14:15:13.040`) -- [CVE-2024-27115](CVE-2024/CVE-2024-271xx/CVE-2024-27115.json) (`2024-09-11T14:15:13.147`) -- [CVE-2024-43793](CVE-2024/CVE-2024-437xx/CVE-2024-43793.json) (`2024-09-11T15:15:17.017`) -- [CVE-2024-4465](CVE-2024/CVE-2024-44xx/CVE-2024-4465.json) (`2024-09-11T15:15:18.490`) -- [CVE-2024-7805](CVE-2024/CVE-2024-78xx/CVE-2024-7805.json) (`2024-09-11T14:15:13.560`) -- [CVE-2024-8306](CVE-2024/CVE-2024-83xx/CVE-2024-8306.json) (`2024-09-11T15:15:18.827`) -- [CVE-2024-8636](CVE-2024/CVE-2024-86xx/CVE-2024-8636.json) (`2024-09-11T14:15:13.850`) -- [CVE-2024-8637](CVE-2024/CVE-2024-86xx/CVE-2024-8637.json) (`2024-09-11T14:15:13.943`) -- [CVE-2024-8638](CVE-2024/CVE-2024-86xx/CVE-2024-8638.json) (`2024-09-11T14:15:14.027`) -- [CVE-2024-8639](CVE-2024/CVE-2024-86xx/CVE-2024-8639.json) (`2024-09-11T14:15:14.103`) -- [CVE-2024-8642](CVE-2024/CVE-2024-86xx/CVE-2024-8642.json) (`2024-09-11T14:15:14.177`) -- [CVE-2024-8646](CVE-2024/CVE-2024-86xx/CVE-2024-8646.json) (`2024-09-11T14:15:14.307`) +- [CVE-2024-45016](CVE-2024/CVE-2024-450xx/CVE-2024-45016.json) (`2024-09-11T16:15:06.817`) +- [CVE-2024-45017](CVE-2024/CVE-2024-450xx/CVE-2024-45017.json) (`2024-09-11T16:15:06.877`) +- [CVE-2024-45018](CVE-2024/CVE-2024-450xx/CVE-2024-45018.json) (`2024-09-11T16:15:06.933`) +- [CVE-2024-45019](CVE-2024/CVE-2024-450xx/CVE-2024-45019.json) (`2024-09-11T16:15:06.990`) +- [CVE-2024-45020](CVE-2024/CVE-2024-450xx/CVE-2024-45020.json) (`2024-09-11T16:15:07.050`) +- [CVE-2024-45021](CVE-2024/CVE-2024-450xx/CVE-2024-45021.json) (`2024-09-11T16:15:07.103`) +- [CVE-2024-45022](CVE-2024/CVE-2024-450xx/CVE-2024-45022.json) (`2024-09-11T16:15:07.163`) +- [CVE-2024-45023](CVE-2024/CVE-2024-450xx/CVE-2024-45023.json) (`2024-09-11T16:15:07.230`) +- [CVE-2024-45024](CVE-2024/CVE-2024-450xx/CVE-2024-45024.json) (`2024-09-11T16:15:07.290`) +- [CVE-2024-45025](CVE-2024/CVE-2024-450xx/CVE-2024-45025.json) (`2024-09-11T16:15:07.440`) +- [CVE-2024-45026](CVE-2024/CVE-2024-450xx/CVE-2024-45026.json) (`2024-09-11T16:15:07.507`) +- [CVE-2024-45027](CVE-2024/CVE-2024-450xx/CVE-2024-45027.json) (`2024-09-11T16:15:07.570`) +- [CVE-2024-45028](CVE-2024/CVE-2024-450xx/CVE-2024-45028.json) (`2024-09-11T16:15:07.647`) +- [CVE-2024-45029](CVE-2024/CVE-2024-450xx/CVE-2024-45029.json) (`2024-09-11T16:15:07.717`) +- [CVE-2024-45030](CVE-2024/CVE-2024-450xx/CVE-2024-45030.json) (`2024-09-11T16:15:07.770`) +- [CVE-2024-46672](CVE-2024/CVE-2024-466xx/CVE-2024-46672.json) (`2024-09-11T16:15:07.840`) +- [CVE-2024-5760](CVE-2024/CVE-2024-57xx/CVE-2024-5760.json) (`2024-09-11T16:15:08.020`) +- [CVE-2024-7312](CVE-2024/CVE-2024-73xx/CVE-2024-7312.json) (`2024-09-11T16:15:08.080`) +- [CVE-2024-8097](CVE-2024/CVE-2024-80xx/CVE-2024-8097.json) (`2024-09-11T17:15:13.917`) +- [CVE-2024-8686](CVE-2024/CVE-2024-86xx/CVE-2024-8686.json) (`2024-09-11T17:15:14.033`) +- [CVE-2024-8687](CVE-2024/CVE-2024-86xx/CVE-2024-8687.json) (`2024-09-11T17:15:14.157`) +- [CVE-2024-8688](CVE-2024/CVE-2024-86xx/CVE-2024-8688.json) (`2024-09-11T17:15:14.273`) +- [CVE-2024-8689](CVE-2024/CVE-2024-86xx/CVE-2024-8689.json) (`2024-09-11T17:15:14.380`) +- [CVE-2024-8690](CVE-2024/CVE-2024-86xx/CVE-2024-8690.json) (`2024-09-11T17:15:14.487`) +- [CVE-2024-8691](CVE-2024/CVE-2024-86xx/CVE-2024-8691.json) (`2024-09-11T17:15:14.587`) ### CVEs modified in the last Commit -Recently modified CVEs: `63` +Recently modified CVEs: `184` -- [CVE-2024-41131](CVE-2024/CVE-2024-411xx/CVE-2024-41131.json) (`2024-09-11T14:40:29.460`) -- [CVE-2024-41132](CVE-2024/CVE-2024-411xx/CVE-2024-41132.json) (`2024-09-11T15:03:52.927`) -- [CVE-2024-41443](CVE-2024/CVE-2024-414xx/CVE-2024-41443.json) (`2024-09-11T15:54:29.327`) -- [CVE-2024-41572](CVE-2024/CVE-2024-415xx/CVE-2024-41572.json) (`2024-09-11T14:15:13.380`) -- [CVE-2024-41916](CVE-2024/CVE-2024-419xx/CVE-2024-41916.json) (`2024-09-11T14:25:46.180`) -- [CVE-2024-42341](CVE-2024/CVE-2024-423xx/CVE-2024-42341.json) (`2024-09-11T15:57:08.693`) -- [CVE-2024-42342](CVE-2024/CVE-2024-423xx/CVE-2024-42342.json) (`2024-09-11T15:56:58.313`) -- [CVE-2024-42343](CVE-2024/CVE-2024-423xx/CVE-2024-42343.json) (`2024-09-11T15:56:19.383`) -- [CVE-2024-43491](CVE-2024/CVE-2024-434xx/CVE-2024-43491.json) (`2024-09-11T15:14:57.713`) -- [CVE-2024-5486](CVE-2024/CVE-2024-54xx/CVE-2024-5486.json) (`2024-09-11T14:23:55.573`) -- [CVE-2024-7105](CVE-2024/CVE-2024-71xx/CVE-2024-7105.json) (`2024-09-11T14:15:33.063`) -- [CVE-2024-7204](CVE-2024/CVE-2024-72xx/CVE-2024-7204.json) (`2024-09-11T14:23:45.127`) -- [CVE-2024-7323](CVE-2024/CVE-2024-73xx/CVE-2024-7323.json) (`2024-09-11T14:22:46.903`) -- [CVE-2024-7325](CVE-2024/CVE-2024-73xx/CVE-2024-7325.json) (`2024-09-11T15:42:50.473`) -- [CVE-2024-7436](CVE-2024/CVE-2024-74xx/CVE-2024-7436.json) (`2024-09-11T14:41:56.753`) -- [CVE-2024-7437](CVE-2024/CVE-2024-74xx/CVE-2024-7437.json) (`2024-09-11T14:39:10.557`) -- [CVE-2024-7438](CVE-2024/CVE-2024-74xx/CVE-2024-7438.json) (`2024-09-11T14:39:12.583`) -- [CVE-2024-7461](CVE-2024/CVE-2024-74xx/CVE-2024-7461.json) (`2024-09-11T14:16:06.227`) -- [CVE-2024-7477](CVE-2024/CVE-2024-74xx/CVE-2024-7477.json) (`2024-09-11T15:03:06.637`) -- [CVE-2024-7480](CVE-2024/CVE-2024-74xx/CVE-2024-7480.json) (`2024-09-11T15:03:37.293`) -- [CVE-2024-7716](CVE-2024/CVE-2024-77xx/CVE-2024-7716.json) (`2024-09-11T15:35:12.190`) -- [CVE-2024-8096](CVE-2024/CVE-2024-80xx/CVE-2024-8096.json) (`2024-09-11T14:35:05.603`) -- [CVE-2024-8572](CVE-2024/CVE-2024-85xx/CVE-2024-8572.json) (`2024-09-11T15:59:57.040`) -- [CVE-2024-8584](CVE-2024/CVE-2024-85xx/CVE-2024-8584.json) (`2024-09-11T15:54:21.870`) -- [CVE-2024-8585](CVE-2024/CVE-2024-85xx/CVE-2024-8585.json) (`2024-09-11T15:53:35.693`) +- [CVE-2024-8191](CVE-2024/CVE-2024-81xx/CVE-2024-8191.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8232](CVE-2024/CVE-2024-82xx/CVE-2024-8232.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8253](CVE-2024/CVE-2024-82xx/CVE-2024-8253.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8277](CVE-2024/CVE-2024-82xx/CVE-2024-8277.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8306](CVE-2024/CVE-2024-83xx/CVE-2024-8306.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8317](CVE-2024/CVE-2024-83xx/CVE-2024-8317.json) (`2024-09-11T17:46:03.753`) +- [CVE-2024-8320](CVE-2024/CVE-2024-83xx/CVE-2024-8320.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8321](CVE-2024/CVE-2024-83xx/CVE-2024-8321.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8322](CVE-2024/CVE-2024-83xx/CVE-2024-8322.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8363](CVE-2024/CVE-2024-83xx/CVE-2024-8363.json) (`2024-09-11T16:35:05.653`) +- [CVE-2024-8394](CVE-2024/CVE-2024-83xx/CVE-2024-8394.json) (`2024-09-11T16:25:44.833`) +- [CVE-2024-8427](CVE-2024/CVE-2024-84xx/CVE-2024-8427.json) (`2024-09-11T17:41:18.733`) +- [CVE-2024-8440](CVE-2024/CVE-2024-84xx/CVE-2024-8440.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8441](CVE-2024/CVE-2024-84xx/CVE-2024-8441.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8503](CVE-2024/CVE-2024-85xx/CVE-2024-8503.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8504](CVE-2024/CVE-2024-85xx/CVE-2024-8504.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8570](CVE-2024/CVE-2024-85xx/CVE-2024-8570.json) (`2024-09-11T16:07:35.400`) +- [CVE-2024-8571](CVE-2024/CVE-2024-85xx/CVE-2024-8571.json) (`2024-09-11T16:05:34.220`) +- [CVE-2024-8636](CVE-2024/CVE-2024-86xx/CVE-2024-8636.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8637](CVE-2024/CVE-2024-86xx/CVE-2024-8637.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8638](CVE-2024/CVE-2024-86xx/CVE-2024-8638.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8639](CVE-2024/CVE-2024-86xx/CVE-2024-8639.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8642](CVE-2024/CVE-2024-86xx/CVE-2024-8642.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8646](CVE-2024/CVE-2024-86xx/CVE-2024-8646.json) (`2024-09-11T16:26:11.920`) +- [CVE-2024-8655](CVE-2024/CVE-2024-86xx/CVE-2024-8655.json) (`2024-09-11T16:26:11.920`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 021e16178a2..9e303306a99 100644 --- a/_state.csv +++ b/_state.csv @@ -98988,7 +98988,7 @@ CVE-2017-15580,0,0,1e92558118dd8b8a7baaf8299aef48acf8217519b1c70805a4a44d68dbf5a CVE-2017-15581,0,0,8136e4bed7803df04368912e9b9664b132f87783ad43757482115418e987a1ce,2019-10-03T00:03:26.223000 CVE-2017-15582,0,0,6a750fb42a6ef5946817b63c0fba96997f795cc372e10517cf11e3ad2870f3f6,2019-10-03T00:03:26.223000 CVE-2017-15583,0,0,fccf816cfe7a7b5520db095f4d4185c10c9240af6b509a1b05d2ebe4ea6546b0,2023-05-16T20:58:31.210000 -CVE-2017-15587,0,0,230c0e0f051ad738fa1d64ea595936aaf4e875d0e42d999b43eff456add51164,2023-11-07T02:40:19.917000 +CVE-2017-15587,0,1,0ca6968b326546ad84e6f39ab7c09f9bd8b15b4acb7069aeea8dff1e4ad6dfb2,2024-09-11T17:15:11.070000 CVE-2017-15588,0,0,7895921a01a474632ca8caf1a8e45d5ea49c18929917c6cb5076fa92ea19d479,2018-10-19T10:29:03.470000 CVE-2017-15589,0,0,d6dbfa89a4ae8e8ad03dede19301c345b80995510809cc6a78e5c8106776531c,2018-10-19T10:29:03.893000 CVE-2017-1559,0,0,1b857a89cd1ffacec00507f1e1c7ffcf9cb790b1ffe7947c2accc3a1a07d479c,2019-10-09T23:26:19.023000 @@ -106268,7 +106268,7 @@ CVE-2017-6055,0,0,ee8f4a46c3e431dd979447cf9196df0bed957f6d059b47608be4492a8d9a94 CVE-2017-6056,0,0,72a3858752f1ce2c9d4ed3195a109f9d808114e18392768f4bf76fc4f3c3626a,2023-11-07T02:49:49.107000 CVE-2017-6058,0,0,a873c733b7c93de100e15e66c6cdf3fd115d6f2eb5f249c81159aa56368b63ca,2023-11-07T02:49:49.190000 CVE-2017-6059,0,0,4634647af2608ecd48b65f5b7732a1b2209a5fe564804b73c0195a33e0a8f248,2023-11-07T02:49:49.250000 -CVE-2017-6060,0,0,3b058fff1798a5c1ecc81708c0bc769f814af7f731cbf588bb98d5cb3801dcbc,2022-04-18T17:58:09.220000 +CVE-2017-6060,0,1,7c4adde7c2e4a384f774ba541d2c064f95278b01b5d6f68f4bd768df3df02611,2024-09-11T17:15:11.190000 CVE-2017-6061,0,0,aff538dd35f75e256da63ddc8461f1fcc072dadd5a912074b9f69258b88470e3,2017-03-16T20:24:00.613000 CVE-2017-6062,0,0,063e423291fc19727ed2af73448f7dd202dba238009a3c9408c075fa659d5dfe,2023-11-07T02:49:49.347000 CVE-2017-6065,0,0,a38eb7069c97ebf0b0ae440859950ef7b08e60aaee291c30ea51d793c951f9cc,2017-02-23T14:53:33.863000 @@ -109042,7 +109042,7 @@ CVE-2017-9210,0,0,e2890506ebaff51adf165e01dfbc0f067aaa179dc396ec3313e3663dfa2354 CVE-2017-9211,0,0,a2b9df913669363195b5ffda07a72dd2f6c0df096a3a254d1cd5b16f5a0fbf59,2017-06-08T12:07:35.823000 CVE-2017-9212,0,0,1c88c277c923e4882b213e2c4d2ceedac22499204fa7cff42877854701584e29,2019-10-03T00:03:26.223000 CVE-2017-9214,0,0,82cf2ac17f12b11945db704abb13fe9a86d8c02ccc8858b9d810f4b4c7b2cf1d,2021-08-04T17:15:17.903000 -CVE-2017-9216,0,0,38541c3bb8cb094f61c480e26436c90fa99615442c8d927f3e2177b09b54c4aa,2021-11-02T13:49:42.477000 +CVE-2017-9216,0,1,79cfaec589500bb33abeea5710cec432c7526ddf7cda269b66dba17783237c68,2024-09-11T17:15:11.320000 CVE-2017-9217,0,0,9c16743e635e720533b8fd3902becd70b37bf7196e3decf2f4517cf14e9b753b,2022-01-31T18:09:21.210000 CVE-2017-9218,0,0,a499df40d21d726753308d72152072dc530f3acc146f68cddd96314de5b9992a,2017-06-30T17:56:47.080000 CVE-2017-9219,0,0,8ba5a617b99df896e80af10f7695229993e526a5c33a84ca347449ca64214078,2017-06-30T17:55:55.157000 @@ -110735,7 +110735,7 @@ CVE-2018-1000047,0,0,73c5614b53f3a68823b5b304ca7114f13c2120c560274e67628c08b0936 CVE-2018-1000048,0,0,59ded03230af2693a0da625581027d253d7e4b0d213d1723cfb9ecc0e6b6624c,2018-03-01T16:11:42.983000 CVE-2018-1000049,0,0,a659009b46c10f0bb07661483b724ffff942d31fb2d5577556bbc48330935734,2020-07-30T13:15:10.720000 CVE-2018-1000050,0,0,54fc50432778c0b9a41492e7ed1cb5665b3c3ea38e2d2c181be66f72a064ee63,2018-03-08T15:27:25.077000 -CVE-2018-1000051,0,0,9363db566c68479426924f2beade169917db1c9ad07693360924815df31d7f2f,2019-03-14T17:24:08.083000 +CVE-2018-1000051,0,1,7c58f846a7c55db918617dc9780af3f104e8ed784ecbb7bb74c321dab7b900e4,2024-09-11T16:15:03.220000 CVE-2018-1000052,0,0,55d0cbe268bfd8759379b50b8a77899f48bb41a21a93a740d71b56f2f69c908b,2020-08-24T17:37:01.140000 CVE-2018-1000053,0,0,40c615bc003ace9cbc2c09f56995d2a2ea894c98a6f482f24296d048d8fc724b,2018-03-08T15:23:04.023000 CVE-2018-1000054,0,0,bfaed584eb8169904fc8c0660c4286e9eea8811975f24ddbd8ef17e97ff22091,2018-03-13T13:54:36.647000 @@ -117695,7 +117695,7 @@ CVE-2018-17555,0,0,3d4ac1e4c88be4b67575829a721fa5ba19e4799db28ffd9d8b07d8e1e4def CVE-2018-17556,0,0,b9ebf39e420d655e856c41da19c0c7fffa0ea74e7e94ae4d03d74f371f91f871,2018-11-15T18:22:47.263000 CVE-2018-17557,0,0,4d2f948873fbfd60e6a29a2b959cef99ff4d640d87e09302ee3c08c1a213be69,2023-11-07T02:54:31.713000 CVE-2018-17558,0,0,44acc4604a097bcb94f666fd79deff18f85f9a092fa4e71e3b8b0a62b6ff081f,2023-11-07T16:47:19.697000 -CVE-2018-17559,0,1,ffd2046f856a3529df80d208ca809cac770fb223d7387ce21eff273fee574c2e,2024-09-11T15:35:01.833000 +CVE-2018-17559,0,0,ffd2046f856a3529df80d208ca809cac770fb223d7387ce21eff273fee574c2e,2024-09-11T15:35:01.833000 CVE-2018-1756,0,0,1fc0b3eef5db2a2025ede836e746f89fe871eb7d3288ae482d48724eaf3c9eb9,2019-10-09T23:39:01.507000 CVE-2018-17560,0,0,4793cb32ff4e77ba75ad4658b9e4bd5e454c3ffa2c335d96e28e445522e2f90b,2019-07-05T13:47:06.013000 CVE-2018-17562,0,0,923aa9c1c7e9610c03cbdae71d638b0025996157f50942fe51da4a6ca2190318,2018-11-21T23:32:30.847000 @@ -124495,12 +124495,12 @@ CVE-2018-6183,0,0,bffc46197d4f5bb4a1641e7f1f97ca780e4cb13cc70e94ae069610832ef4d5 CVE-2018-6184,0,0,9a4fc6416fe8743594cc5f8caabeefd0f0abb4fb05974845535bca782068b312,2018-02-12T15:05:56.733000 CVE-2018-6185,0,0,055a4616242f24650c253dd5760c239431de3a28671dc578617f6944eef6c3d6,2019-06-11T17:28:05.673000 CVE-2018-6186,0,0,6a8670f5881eb2fb6cb2417680163cb7aa5855a6947d8b1046927374f7ae9561,2018-03-03T02:29:01.357000 -CVE-2018-6187,0,0,ef36740353df7390389576b31e41902b8ab2f4acb75ce8f194aebb1efffb5507,2020-08-24T17:37:01.140000 +CVE-2018-6187,0,1,61418d183624ff761116c598fc051c012db69df2a09eef73aba547af7a74da46,2024-09-11T17:15:11.427000 CVE-2018-6188,0,0,9361b679d8e76449ce7e70441bfd7047b22356787f032e0b5c8a6faf01b81548,2019-03-12T17:54:42.260000 CVE-2018-6189,0,0,8d588a3fad6e7d145ff2bfc4beb5914792afb7d8cc87119890d82aee8c59d0eb,2018-03-15T13:35:33.967000 CVE-2018-6190,0,0,1785f6f3558bfbdfd6d38d96f9d1d17965b8f7077b43c7bbdf36542c4879539c,2018-02-09T18:10:04.573000 CVE-2018-6191,0,0,23af2d0a99a3a246cfedf376ef61b94cfa807156000a3780deb28a7bc2b8686e,2023-11-07T02:59:52.973000 -CVE-2018-6192,0,0,26000294b4a5210b1ef4f1169b0b94cc6e6c0fc7897026d3ab5d128de4d86f6a,2019-06-28T15:15:10.783000 +CVE-2018-6192,0,1,f0766b8ed7bc6351f010cea9061bfd846cf491d1d4d3ee2cfb0ff4c69a155cc2,2024-09-11T17:15:11.520000 CVE-2018-6193,0,0,ebea09da2f0aa32e16c356f05f72ce5659b7ed9794464f4df18f9a8737bdb1cf,2018-03-03T02:29:01.500000 CVE-2018-6194,0,0,471253379a57a1c3fb31138e411ffce993f034fa8ebebd6add3c38277dafa309,2018-02-14T17:08:42.893000 CVE-2018-6195,0,0,9efc63f4f140fb37e3c32cad98f26c880c72a832322f68d7a480259d98695d41,2022-12-02T19:09:05.783000 @@ -138392,7 +138392,7 @@ CVE-2019-2520,0,0,59ba4c21fd930851ef6ffbb2330129d4dbfa7416d73fe480e781c4f52ef721 CVE-2019-2521,0,0,557cd7afc62b8b0d5545a61da2b67008378b171f216bd58bad5399af2682286d,2020-08-24T17:37:01.140000 CVE-2019-25210,0,0,266aa4bd7522d806fa5da076db229c2449a919075778b85ff023cb6f7676cfb1,2024-09-04T18:35:00.600000 CVE-2019-25211,0,0,469c1561e074b807caf6701e40210358657a37dbe70bde81f85c8d68a4456e96,2024-08-01T13:41:57.540000 -CVE-2019-25212,0,0,b58bd1d81a8a722ec2a2377c20293f4ae1b4a4e5a5fd94029445004268a9c45f,2024-09-11T09:15:01.887000 +CVE-2019-25212,0,1,1e9bbebbf3fd2e9669fcdc5c72ffc290335998b4e39d7525ec07f707d24ef643,2024-09-11T16:26:11.920000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -141016,8 +141016,8 @@ CVE-2019-6126,0,0,91add0ca0ed981d50b434727466563bbe06407884beb0845ae2b59e8a9c1f6 CVE-2019-6127,0,0,f80d8120bf2854f28f26cc43db48c88956a3e05db6454c6876a36a8f312f41aa,2019-01-23T16:19:50.847000 CVE-2019-6128,0,0,9eea1eb234976883de2c0189067897f71d9b44418402c47c1c4fcd4ebfd1a11e,2023-03-01T18:41:36.797000 CVE-2019-6129,0,0,5359891fefd93a3a16231be3571c461a221c0dda751a6c191767a2b6584bdc9f,2024-08-04T21:15:25.470000 -CVE-2019-6130,0,0,51ff90c3f16ccfeef2aeec748afc55ec61e987532a67db701dfd300feee433fd,2023-11-07T03:13:06 -CVE-2019-6131,0,0,16b076730713cca7ee4d7e3af8570d17239a89b4b01817d2db9395e1d3a29be3,2023-11-07T03:13:06.090000 +CVE-2019-6130,0,1,ae11f57f758723772d87175ba4e28d255d852debe390395e90d738615ca90431,2024-09-11T16:15:03.420000 +CVE-2019-6131,0,1,388827f9819c9f9105f2c653044abc5916d6a83aeaa0d10a6869ea231f7e5a4a,2024-09-11T16:15:03.570000 CVE-2019-6132,0,0,5c3515f3aab0d4d7bd5e8f9ebb1b6abc3f269b842c2d3a263f141d134010421f,2020-08-24T17:37:01.140000 CVE-2019-6133,0,0,72603ca3ff3d366ec634315e142984a6c106afc15bffb9022fd3722ecebcdce8,2020-08-24T17:37:01.140000 CVE-2019-6135,0,0,08535c3aea2dd191d85d9431dfeabb74e9fb61feb65eb95a3b3e8f065bda8562,2020-08-24T17:37:01.140000 @@ -141908,7 +141908,7 @@ CVE-2019-7315,0,0,655babeca8c8699ebe56def6d52ff3c4b5fbcee0d182a155d3e1a91e48b210 CVE-2019-7316,0,0,22e4f7dc81144e2f39b945be48c90c90554c014ce135857c8859d70d0fe2a95f,2020-10-07T08:15:11.913000 CVE-2019-7317,0,0,e3ac777710ff4108a7e59a3307fb05f90498d96734fa188ef7979b224d8a565d,2022-05-23T15:02:40.667000 CVE-2019-7319,0,0,ff03b6e890c756d023fcb6ea16e98e9b0a55bbdac32849e3402df42d3c97907c,2020-08-24T17:37:01.140000 -CVE-2019-7321,0,0,1d6b4993fae010ef0105848e03183914a19e00a1b2660bc7ad64c145cfe06bde,2024-07-17T22:15:02.780000 +CVE-2019-7321,0,1,bfaa3641e9fe6e34f5a5b1caa73b0a594bc910bf5ba707e0a8b9ead1962e194d,2024-09-11T16:15:03.643000 CVE-2019-7323,0,0,d44784f70f4d24610b0d52acad664b5c526cfbb90381285299d127aa60c8eb76,2020-08-24T17:37:01.140000 CVE-2019-7324,0,0,66e1fc0708200fe70c650fed6c8ccf3507f0ad4b917597a4f02c24924038664e,2019-05-30T04:29:02.260000 CVE-2019-7325,0,0,162a3d8901e60b0c954b54fdf54634a60920b838e996dcdd8f23ac89a4ca4a01,2019-02-04T20:13:58.267000 @@ -153092,7 +153092,7 @@ CVE-2020-21883,0,0,ae5ebcaee38f4a73c9eee566684b2484b415eaa08e9d1280233245438961a CVE-2020-21884,0,0,7ae5c233a8e2affde23b85b6a96a1f77a81386082a72c1d1a8789640568b85ef,2023-11-07T03:19:45.067000 CVE-2020-2189,0,0,7957da517c89028094133272b3a4e5e9074bf67f590207d6637876e4496b8e6c,2023-10-25T18:16:35.203000 CVE-2020-21890,0,0,1f201bf1456e591d565206a7b4311cb9d20fdcd1114b349421d3bca5267b3ca5,2023-09-25T15:15:10.063000 -CVE-2020-21896,0,0,cfe200941ec5267fca7021adf66d5b279b74d9c01f79549b7e0cf1318978fb56,2023-08-25T18:15:18.393000 +CVE-2020-21896,0,1,7dd81dedcfffd61b30c2c58a2eb6aee94e250e3954c61a12985880e5f27cb00b,2024-09-11T16:15:03.750000 CVE-2020-2190,0,0,f983bd8fb07d4139e89440ceb1af1d22275288ecdca6c27e0644825eb4608cb0,2023-10-25T18:16:35.283000 CVE-2020-2191,0,0,795a70cb0f563e9b1ffdfb30629f7b1c108be861dc9f59081e554b6f40a6bf6d,2023-10-25T18:16:35.370000 CVE-2020-21913,0,0,fef695feb33c2828de4823050744d40f223b5884059342121e5ef51cb51c469d,2021-11-29T17:20:26.897000 @@ -155600,7 +155600,7 @@ CVE-2020-26679,0,0,2e07366dce589939cd24eda580e4c6389e7abc019a00fb4ebedf65c6b3f3f CVE-2020-2668,0,0,206a6bb7e7d246403c50b5ed1bff5e881649f427a1bd3ddcc36f5d0ee99c3a38,2022-07-08T19:50:34.127000 CVE-2020-26680,0,0,07f8cda344eb70852e15f13416eb20586a43db2c765b8355ad22a6971ce3b0c5,2021-06-01T13:34:15.163000 CVE-2020-26682,0,0,d0b7dfc0c295ff97499165e908a0a04693b775ccf9b4b3e4c6511475019cd00e,2022-06-15T03:12:52.113000 -CVE-2020-26683,0,0,8f5860ca881d75ce6b3a37c2b97dcf4bb6aa92730e8b7a42f30488da5ffb52e2,2023-08-28T16:44:27.123000 +CVE-2020-26683,0,1,ca0b93559574b09aa885ee9d11c63aece03e87d91b28881146f30e879b39d540,2024-09-11T16:15:03.843000 CVE-2020-2669,0,0,4e796e915a77061741ee8cbdf6ca0ec8cb59508fb935bf34d741f1053b1aca97,2022-07-08T19:50:19.647000 CVE-2020-26693,0,0,b97cc3295c9d6bacff9f2b604924258dcbf3b861185dbc6821fe8bef34302fca,2021-06-09T13:59:29.503000 CVE-2020-2670,0,0,c1c623b76fd36835dfd2341951caebfd03a5c7b4c637067ee01e0e7b69c8d129,2022-07-08T19:57:51.080000 @@ -165625,8 +165625,8 @@ CVE-2021-1241,0,0,1291cb48a67e277eb4639880f10a6330467e71dc13746949bbd27b1387a283 CVE-2021-1242,0,0,89df5aa3386faa71d56438289be280a120050b3a9802e0337bc2ec9683c25c35,2023-11-07T03:27:46.303000 CVE-2021-1243,0,0,cb7dab97ec9f02e62dbfde8d6b03009415bf8d7629faf7cacbec2ad1afdd93b7,2023-11-07T03:27:46.503000 CVE-2021-1244,0,0,d0ebafda39cd27fb4bfc6cdc757ae7e4b2681182b4071b4b408e6ca0e9067340,2023-11-07T03:27:46.707000 -CVE-2021-1245,0,0,943576d43d8cc2337e54d12d35c009f3105501f745c816b9a22c02c39764c666,2023-11-07T03:27:46.890000 -CVE-2021-1246,0,0,dd285fea6674a1cd2447e3ec932188681a8655297d10d9d42d52068cb86e849d,2023-11-07T03:27:47.093000 +CVE-2021-1245,0,1,de0ea21a37b86474a58c44d866c458df1af7a730a98a22f60165602c3c3aadba,2024-09-11T16:15:04.007000 +CVE-2021-1246,0,1,26794c4491849a7e681cb4eb825bcec4d9652010a8a269b813cd917408254f75,2024-09-11T16:15:04.190000 CVE-2021-1247,0,0,94b3235ed2bd397c3033778824f6e88e9fdcd92b008da8cdfd6462dbb1f93e59,2023-11-07T03:27:47.273000 CVE-2021-1248,0,0,c68ee75ad0e2e32f5bca2bb532ef0e52e2b2491a96769ed90c050692fd4f8da8,2023-11-07T03:27:47.530000 CVE-2021-1249,0,0,e28332e8ecf728ee876451d0dcc6964f0a13f3d09f66d91c1db3d495b8fd487a,2023-11-07T03:27:47.750000 @@ -185177,7 +185177,7 @@ CVE-2021-44406,0,0,fd9d29980c886cd8d92b361798b055341bfc74bd83c68b86f68f4ee69f46f CVE-2021-44407,0,0,fc965d75536c4301ffc608c6a377219be0371ccfaa13e6eb2cdd097661de73f2,2022-10-25T17:36:38.547000 CVE-2021-44408,0,0,1796000f44b8bb0c7587aea014ccd33a035fe99707e11f2f4a04661f9e79f691,2022-10-25T17:36:11.647000 CVE-2021-44409,0,0,9f017a891d9381c3f0a4fba6c7252ab6afe26ce20cf4bb0ee24450da9e559bae,2022-10-25T17:36:06.460000 -CVE-2021-4441,0,0,90ae33e6eaee7efba77c83071ecdede823a49973986e4623259f0cfd1e95a111,2024-08-22T12:48:02.790000 +CVE-2021-4441,0,1,482eac586ad5b05c3861f976ec349fd7ffe14805073edfa504f53dfc9bb4402a,2024-09-11T16:43:41 CVE-2021-44410,0,0,8987a8a08eefcb8e8639b8c36f8efac14850afcf28e1895fc8c826983a36d725,2022-10-25T17:35:59.223000 CVE-2021-44411,0,0,4c009c4c595fa0e30c202f045dec5c1accfd07f6c5c888dd57437e5f5fdd652a,2022-10-25T17:35:51.200000 CVE-2021-44412,0,0,9cedba985a18ced50920d0bc0b3286b490e9cc4a4b23c3bec22d94124fd12693,2022-10-25T17:35:35.607000 @@ -212427,13 +212427,13 @@ CVE-2022-4889,0,0,e28145e6bac3566714c615b828c485e97008b42961c16fdc8c566e13678a46 CVE-2022-48890,0,0,86d632bf5df80684b404ab7b8921bbf892e25d0ec1b61ff33de7d34236ea41bb,2024-09-06T15:11:16.120000 CVE-2022-48891,0,0,e53cdfff9c40301449889e2be599113f4029581bf8c097ee401be6555cedf27f,2024-09-06T15:39:03.433000 CVE-2022-48892,0,0,e5d1d64acbb59160918aa70cc9f19716880e808c7570261094b023c94b7fa4ef,2024-08-29T02:35:56.343000 -CVE-2022-48893,0,1,82f23169c230edb856c14c0fc52885cb6d1da756681e3902a2003651a22d3888,2024-09-11T15:55:09.243000 -CVE-2022-48894,0,1,736fbc494236b380a2eaf1f83139b34a82c1f0d84b0e74202965b84bde404b15,2024-09-11T15:58:04.533000 -CVE-2022-48895,0,0,4d430595bf419ec8fe28f8a9af46fb23b6be8a5d2b49039e635ba124d2677f14,2024-08-21T12:30:33.697000 -CVE-2022-48896,0,0,9b91f6a264af43579b8dcb7d959177fcb68b1104797d38568abe22a5ed99f6e6,2024-08-21T12:30:33.697000 -CVE-2022-48897,0,0,4a8d69c5ad8d0315b30ac011ad762d01081adb76dfd8e6168aa13b7e26a566c1,2024-08-21T12:30:33.697000 -CVE-2022-48898,0,0,633fe702b95c836989c70b2a253ce60179e8a5a5bb64ff07686f6a3b977be733,2024-08-21T12:30:33.697000 -CVE-2022-48899,0,0,9722eb08ca7ae697cd36c1ae34da77c5729bf1261e476222348713e6153a604f,2024-08-21T12:30:33.697000 +CVE-2022-48893,0,0,82f23169c230edb856c14c0fc52885cb6d1da756681e3902a2003651a22d3888,2024-09-11T15:55:09.243000 +CVE-2022-48894,0,0,736fbc494236b380a2eaf1f83139b34a82c1f0d84b0e74202965b84bde404b15,2024-09-11T15:58:04.533000 +CVE-2022-48895,0,1,288edfe22bd8896d0a46078542ec987764c9e77bf06c7bedba580f0d13e2f2c6,2024-09-11T16:01:23.487000 +CVE-2022-48896,0,1,9a6aaa0bed97e6d772b961833ac8fe246fb940780f29396e2ac89894463a82ed,2024-09-11T16:06:04.297000 +CVE-2022-48897,0,1,041f932f84ae541ff0cda43b635c42172ae235ecfddc1070b55e0744b2a799dd,2024-09-11T16:10:40.843000 +CVE-2022-48898,0,1,9d5dd8e327564f897f54b9b96edffffc8bfcf745dcbb3b6158a8c1b6ec465589,2024-09-11T16:19:18.350000 +CVE-2022-48899,0,1,b259a9d35504eacb9390e4c82acd7d334eb4dd0d897a0af2ebaa062eea49f3a9,2024-09-11T16:22:26.583000 CVE-2022-4890,0,0,6681cfa53e1bf5f370bc8c8bc62693e3d5b22cda3aa6b9f40531dae97a716dfa,2024-05-17T02:17:01.647000 CVE-2022-48900,0,0,3d3abc510bd2bdcb727ecba5ff8ee20443365f0e7442b7ce50fe28fe2c089d32,2024-08-22T08:15:04.233000 CVE-2022-48901,0,0,27dcaf94e83e51c704998f574606d45652a56b6673c775b1e373714e83cc418c,2024-08-22T12:48:02.790000 @@ -227919,7 +227919,7 @@ CVE-2023-37230,0,0,16174e82af28a8c8963476ae3fb392aa6acdeee683bd62908e45c74a0ebfc CVE-2023-37231,0,0,757cf6f1665639ceecb704c0774fd206eedf5d3bd12cf5ae4032e15afcc04854,2024-09-10T17:35:07.017000 CVE-2023-37232,0,0,aa77f0464252c29d90b760b2e5be26ab243190cce3a91d4377f7a712d2984ef4,2024-09-10T20:35:01.567000 CVE-2023-37233,0,0,563f80c8f15a3b56300233dc223b0716c6056b3bc1d6a532e7c118696cace502,2024-09-10T21:35:02.950000 -CVE-2023-37234,0,1,a4892170539d390c3ff9f5ad886d03b91d4cc152d6eb72dfb908c93a7af7b078,2024-09-11T15:35:04.903000 +CVE-2023-37234,0,0,a4892170539d390c3ff9f5ad886d03b91d4cc152d6eb72dfb908c93a7af7b078,2024-09-11T15:35:04.903000 CVE-2023-37237,0,0,29a5f3af5199aad5af4f0fdd6511141f4d2b435f709fd260dd5041911ad086ec,2023-07-07T16:00:14.390000 CVE-2023-37238,0,0,8c5d217b62a8efe0c30f15bea3a5d6293d9c6e0abe28ac04e3704ef99c34ccb0,2023-07-12T22:51:22.043000 CVE-2023-37239,0,0,2a2a4e372334e66e5f41ce012a4e3ce6edee956c498345781b72b50751b6e2f3,2023-07-12T18:57:30.653000 @@ -230063,8 +230063,8 @@ CVE-2023-3991,0,0,d0f4f08a67672f0631bca9bc601677c9696104d0445472749467d3c9bba2d6 CVE-2023-39910,0,0,5acf6d73da589d5f5b8b3187e11afb3ad2adadfff4f8a78c9ffa3d128d668364,2023-09-07T07:15:08.640000 CVE-2023-39912,0,0,eec2dd46965946f50c304c9678cdfc34dc25ac6dba7edc9217618ec666317da0,2024-01-01T06:15:08.007000 CVE-2023-39913,0,0,ea2044faaa150bba3fc68adac4c3a3104739ecdee0600f9db9ef851e65490157,2024-09-04T20:35:05.927000 -CVE-2023-39914,0,0,eab69fb8a4b33dfb49856eaf93db9f40266cd1eb05d0321115cbb296da659941,2023-09-15T15:17:58.497000 -CVE-2023-39915,0,0,96e32e5f52c0857edc85146de1ed5fec94880fcf56ce47fc92044d4231db5951,2023-09-15T19:04:36.513000 +CVE-2023-39914,0,1,35f3a1f79b9d089c273f5201d5969d7ba4e86dafdd865cf988eda251284f4020,2024-09-11T16:15:04.547000 +CVE-2023-39915,0,1,b6ab3085b2f2d8f701297346d4f6373f2754c321033c7709d9042fa1cdabef18,2024-09-11T16:15:04.700000 CVE-2023-39916,0,0,1a82bc3eb273639f3752b30c95040ed98ed9d31bb6a0a36c244be61c5b50588d,2023-09-19T04:05:17.463000 CVE-2023-39917,0,0,9fc8772a827eeba510f69d41dc237baea5b14dac927250bca8a7a1021943efc1,2023-10-04T21:08:21.527000 CVE-2023-39918,0,0,30e9ab32d0470d91a150e0465e95b48c5166a49303f5da38d335a957150b05a5,2023-09-06T22:25:23.327000 @@ -230798,10 +230798,10 @@ CVE-2023-40704,0,0,25aa6f9a94000f019ae480e6c475162c9a85e7c4ac89a86f5d16b67d351ba CVE-2023-40705,0,0,1eda5b358ba0f37be10f436ec87d2f785a6beaf853d5f29bdc0c3fdfc74c06ad,2023-09-08T18:48:31.770000 CVE-2023-40706,0,0,adbd436305697d32e2e9942a03d182f6db0acd7a4fd1ad3603994bd286cace6d,2023-08-29T23:34:50.430000 CVE-2023-40707,0,0,673cbc0c873be97cb20c7bf02c23c637a814b2305c2831ca2a42955e398c3f06,2023-08-29T23:34:10.753000 -CVE-2023-40708,0,0,d9da3ed14abd67dd993f4beab3601cabed4885d51ef7f1093f77f0dec14d9034,2023-08-29T23:33:16.533000 -CVE-2023-40709,0,0,d6819a296085484d44a1d4efcf10c87fa1369589ddaa3e93d0ecfc6a25be502a,2023-08-29T23:32:09.780000 +CVE-2023-40708,0,1,b8f77ddc050c03f17866c233565dbc18e1b417d070fcc7818c76b2d1e47c9abd,2024-09-11T16:15:04.820000 +CVE-2023-40709,0,1,a16439ba7676ab605c405917b05f1191c7c8c71f62f0af00e0b4035f8a34c389,2024-09-11T16:15:04.970000 CVE-2023-4071,0,0,ed7c81dde080cf31c8f614e00990d1da1a6074625d393a1dbdf59ad6afae0b97,2024-01-31T17:15:13.823000 -CVE-2023-40710,0,0,57b6c66d574236501c2d6152c875d4aa7ec905868075e14d8435c4b82f37dc5c,2023-08-30T13:37:34.677000 +CVE-2023-40710,0,1,477382ed758e118248a2320d9f96825ae7e71d52cf0808c89f0d85d40cc7bf5f,2024-09-11T16:15:05.057000 CVE-2023-40711,0,0,a909a41271e58c728cc51f58393d7c89cf154ec1e773bd55b20f4f9536962b82,2023-08-25T12:56:50.940000 CVE-2023-40712,0,0,d6c04480eef1453fbfc8b8c04596b4c823286ff0dc8ed25376811550f04f0f11,2023-09-13T03:50:38.770000 CVE-2023-40715,0,0,a323101ef9c15565c8541f96d7627fa500e92fac2c3cec36d0e856eb8283c8ff,2023-11-07T04:20:20.383000 @@ -232355,7 +232355,7 @@ CVE-2023-42842,0,0,e6c3110fb32fb31efa637e19595877e38152993b501001f3e91f7f4195c48 CVE-2023-42843,0,0,bdb5ca10e9d3a9a9fe46e77d292b8a39a4c6afdebaa449ae993bf3b835c66f09,2024-05-07T06:15:06.573000 CVE-2023-42844,0,0,66793d4e8de2c24e97a03d4cefbe2f223f4ee5ce1cd36dda628aa0655d9dc25f,2023-11-02T18:08:23.333000 CVE-2023-42845,0,0,9507f97dc4b913465e85ae62bddedca7d865f48caf294e5533af19459dc099ee,2023-11-02T18:08:38.750000 -CVE-2023-42846,0,1,848125d4c2d8d21314821b56fcf8efec7a8c30032b153bfb1279f335aea162b9,2024-09-11T15:35:06.370000 +CVE-2023-42846,0,0,848125d4c2d8d21314821b56fcf8efec7a8c30032b153bfb1279f335aea162b9,2024-09-11T15:35:06.370000 CVE-2023-42847,0,0,f5262384366a2f5658629db3892272b4f016782153ecad02f22b6a8f62fcfe98,2023-11-02T18:14:06.320000 CVE-2023-42848,0,0,02a58c6059ad2ce260ea3b35f95dfd3a1c770dc5f9d75e1cb0c71291751f6382,2024-08-26T15:35:00.597000 CVE-2023-42849,0,0,d62e0ffdd0b8dfc4034b75c8f590b3382a15531d15a6a1d9a0bf6b37b46dc96d,2023-11-02T18:16:45.047000 @@ -234676,7 +234676,7 @@ CVE-2023-46363,0,0,88add742026dacb9c5fb0ed25051b79dbf420bfd9e4dc44f99319d2fa0e9f CVE-2023-46369,0,0,05f430621e20b438c901b498a04c3792c3a816c2ac20590971f8b20317024e04,2023-11-01T20:03:48.360000 CVE-2023-4637,0,0,8e9dbb42526591aef31bf444a885002ed992c120ad0152f6dedc0aa3ba92f807,2024-02-12T15:55:22.053000 CVE-2023-46370,0,0,cbc7ea034a75728a62aff6e5259c8e40bc0c202441fa2efd5200be0598aeb76b,2023-11-01T20:05:45.640000 -CVE-2023-46371,0,0,cd8a59aaa142fe096d907503e8681fc961c27a5e1b37e6679756daeda55f549b,2023-11-01T20:08:56.603000 +CVE-2023-46371,0,1,4a552f1325781bd8a15d7118b7ac8bcf95de1db3b518f7370b4f391d4f41d4f8,2024-09-11T16:15:05.180000 CVE-2023-46373,0,0,2dfa751dfd005e9b404a1be1ca791db2c8c59bbe68feaeeec530f63da492df6f,2023-11-01T20:09:41.260000 CVE-2023-46374,0,0,448216d921bdf71b5f7ce449d21970ea99c493ba51c32dbc913439f0066d0279,2023-11-03T20:23:58.070000 CVE-2023-46375,0,0,84d5f59477bdb6e7348bcfcf2c36a58896f127e0ba6da6c408dfc1fd96ed6d24,2023-11-03T20:23:34.067000 @@ -234707,17 +234707,17 @@ CVE-2023-46410,0,0,76b9e73b5df3ec75f03268522ee3de72b67f4a7828c53325d63a414db88e1 CVE-2023-46411,0,0,e92ab8d08078fc94f293e6bee24537cd8fd5da57b54d83666c2b9f5f3b31d3b8,2023-11-01T16:35:25.430000 CVE-2023-46412,0,0,54b0ed522afa33756e2c93aa94ca3308bb531b84eba3b10f80fcaaad4cd2f186,2023-11-01T16:35:33.433000 CVE-2023-46413,0,0,1d06f7853b57157fea0e0594ba587ed8864e045ce34fe0e5e741983160ee80d4,2023-11-01T16:35:44.967000 -CVE-2023-46414,0,0,6862f06f5f809a4ebbfaccb30d239e2979d2bf725ccac728f660a0b7143ed6e0,2023-11-01T16:36:05.017000 -CVE-2023-46415,0,0,67331edde484b8c0454c2dfbf1bc8c96e6a2c6aec90686f530a7d3ea3dd11df4,2023-11-01T16:36:12.117000 -CVE-2023-46416,0,0,f0aa81c53c12dfb6a05ba0c4533fccb40ac56a70ed45f7deb55cb65548d4a7e6,2023-11-01T16:36:26.463000 -CVE-2023-46417,0,0,e8c659b53ae1e25aa62e74286abb415ece252e36ee5f9e1425123525fdc9d5a0,2023-11-01T16:36:37.977000 -CVE-2023-46418,0,0,85fd2c10b1f0512ce174dfba3318eda146797a438755d1dc96a941d6deab392c,2023-11-01T16:36:47.947000 -CVE-2023-46419,0,0,be014aec0b3024424919c5d1c938ea8a2b609b511fee852ad31470a4eb082f8f,2023-11-01T16:36:59.347000 +CVE-2023-46414,0,1,991bfd6537977bd9ea451941def68e1ddfb4c073b8dd45afc674427b090f1da0,2024-09-11T16:35:02.090000 +CVE-2023-46415,0,1,aaa901afb6039d474d1fc7a22ade509b81cdc97880875c5975fffab355e53e2f,2024-09-11T16:35:03.377000 +CVE-2023-46416,0,1,791d57e8fc075e6f65b8cf4be38c9b43527ccd0b5858ae9174bd86600321475e,2024-09-11T16:35:04.277000 +CVE-2023-46417,0,1,81f0974f26eb78ac1f81f5a26c3ece2ffe019f10f6ae4e9a35c74d863145f652,2024-09-11T16:35:05.057000 +CVE-2023-46418,0,1,cd97be6b70c171600b3f92498b3a2fadd1a821e22a3112ac12ef517b65313e77,2024-09-11T16:35:05.910000 +CVE-2023-46419,0,1,09b6d16672203c8117cfb8b0dd55d57c9775d270840936b0432c48d9564f11a7,2024-09-11T16:35:10.787000 CVE-2023-4642,0,0,644474a724e0b1ef2bd62bfd9882581dfcc6e06ef1d73a19dd3136ed8ffbd9ab,2023-12-01T19:53:18.033000 -CVE-2023-46420,0,0,25e787e0144d3acb614320bee8395f0c3e79dc8c63e09fa01bb894dad2896983,2023-11-01T16:37:11.987000 -CVE-2023-46421,0,0,f9907aa315dc022ca1180eb55114db1cc7aaea91ce0ff25aec2f7a00dff4118a,2023-11-01T16:37:21.153000 -CVE-2023-46422,0,0,9828db1651145e55303f7c90e9b80d9152a0babe8f2b6bf7c6211e8345b27c7a,2023-11-01T16:37:31.890000 -CVE-2023-46423,0,0,fae9f7621f04eecce4ee8c67ae3cb477991a1d96e9608dd2d417468ee933e47e,2023-11-01T16:37:41.027000 +CVE-2023-46420,0,1,460972e47f2ed22c74dd400ea626dd985d8cd559ffc420c0bdfb43a383837e78,2024-09-11T16:35:11.590000 +CVE-2023-46421,0,1,b4d2c321effdd7b0f03c4914847261e906fdd7399819d54121bbf88510642729,2024-09-11T16:35:12.407000 +CVE-2023-46422,0,1,5c9f3ad7d06485404164b40bc9376738e2a474887a3aa22e3653e8333d84af92,2024-09-11T16:35:13.283000 +CVE-2023-46423,0,1,3b25ad6ca8b0659cb9a479a6029d6cb5fa9c5440d1975aff133d7e2d06a3ddc3,2024-09-11T16:35:14.223000 CVE-2023-46424,0,0,50d5b8cffd7312c685b7f6280f3573716a877c1580c703fe9f896ec5081cf2ad,2023-11-01T16:37:51.027000 CVE-2023-46426,0,0,095958b9525a539d6bad1510a5c4a9bb3f3e81ffc03067e72a3a22c99ed7e1b9,2024-08-05T20:35:01.333000 CVE-2023-46427,0,0,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000 @@ -234774,26 +234774,26 @@ CVE-2023-46510,0,0,a6cb193115d8cda16b0ff9fa8d9df3095f54d11b7c2bbb05a8e6009a4bf74 CVE-2023-46517,0,0,b081a7170d3ca581d01a8ada8dfefe1c35f98b29ee4f5c66c49934bd23cc6bbf,2023-11-07T04:21:57 CVE-2023-46518,0,0,50a6b72c9eca27d9118865834eb8eeb2d6571605663676a98cbc4bc277ffc33d,2023-11-01T20:15:22.357000 CVE-2023-4652,0,0,5222738c738474475cc77f6118c2f194c8e026777ab00d0851e9cdbfda77bd35,2023-09-01T18:39:07.780000 -CVE-2023-46520,0,0,9785ada66052289feb41c5935a32b7e986de7119ea2199aed8f778193618822e,2023-10-26T22:18:36.137000 -CVE-2023-46521,0,0,def7c025f7749d6998fc736f1877e11fc914ba967290672ad4983d251f70c0c5,2023-10-26T22:41:06.530000 -CVE-2023-46522,0,0,fa0d39ba729b85093d765a3ef3a019616370d5729367b19845ea628fd5db8510,2023-10-26T22:41:11.743000 -CVE-2023-46523,0,0,ca0009f758ffddcefd593165a3a6f0ac871a176a410319592e3df956e19e4739,2023-10-26T22:41:16.507000 -CVE-2023-46525,0,0,0e56db0fd53c642bce1598d954dfaa64c2a52e95db08296cde86948799f72367,2023-10-26T22:41:25.257000 -CVE-2023-46526,0,0,e5643fd8d7b14f9cb1a8ba22ecfbcb1aab681b10e8b68950d46bf410ccab8a2d,2023-10-26T22:41:40.603000 -CVE-2023-46527,0,0,53fef7ef47ac1e580384ac82e2bbc91cb92f11de7994b8865ac923e00d8f8d05,2023-10-26T22:41:32.283000 +CVE-2023-46520,0,1,6785302a5c9677ea2ec7e929767d096b2f5d09c9a984620f2dcaf9963a74132f,2024-09-11T16:35:15.170000 +CVE-2023-46521,0,1,ba0fc3a8fc3510daceca92d9bd55661d2ae155990d59b773f724fdc9ba1fc058,2024-09-11T16:35:15.977000 +CVE-2023-46522,0,1,49f48c40226ca0753877a1c334156524ccdf4358784d31971a51417f4a4f3fb8,2024-09-11T16:35:16.773000 +CVE-2023-46523,0,1,b32818064f5423969c5b5a7f2c46b5f76f2b50349f4ee7c69655f3693d2d7bac,2024-09-11T16:35:17.560000 +CVE-2023-46525,0,1,536995641d0eae55a415097fbcf59d5e1023235e14ee48c525d45b6b231dab64,2024-09-11T16:35:18.350000 +CVE-2023-46526,0,1,330f6130a88e73fcf05e8b87b6f746fc59d12c849d672aa5a5aad838ccd9b5c1,2024-09-11T16:35:19.150000 +CVE-2023-46527,0,1,fb982985cba13009ea14007eff1ee1cfbc28d9e0b55316b635994c30264c0150,2024-09-11T16:35:19.963000 CVE-2023-4653,0,0,1e17206e1750beb4b65da0cf4b64cdbb50d115e6e2732dee724f63e07284b84a,2023-09-01T18:39:05.677000 -CVE-2023-46534,0,0,53faf802e6150da27a5482fa3451dd4eb3d99a1455697a29eab68f545e2b3ffa,2023-10-26T22:41:48.037000 -CVE-2023-46535,0,0,f5a5800b1be7c2b649436e8c2713d4c099d5aef3942fefde13db90b4ac58098f,2023-10-26T22:41:55.033000 -CVE-2023-46536,0,0,3a8c4f9d9fa4a4c1364cc3be1a145fee2a630c121c544a031791b60a49fc21ea,2023-10-26T22:42:01.013000 -CVE-2023-46537,0,0,e03e6c28e7a7ba894aaeda78237c83be65380d375587aa23d593b84fb69a2dc7,2023-10-26T22:42:07.053000 -CVE-2023-46538,0,0,2da74fc94b8a31a5d763846adefb67fea9f592f0926e7c1e82aaf84578849f69,2023-10-26T22:42:13.817000 -CVE-2023-46539,0,0,0a55d9dc5e3d8fe1897e5e6baeedcb1afb19556a3b48110c04cc96b766e6e6d8,2023-10-26T22:42:20.953000 +CVE-2023-46534,0,1,1c8474eac597902cfd98f70cbcabdce00d8ee58e6b4f1151c493a9e2300c6863,2024-09-11T16:35:20.833000 +CVE-2023-46535,0,1,49afed34b79be02179c96040bf5d55e32da2102b82bc0a0984062c720beabd65,2024-09-11T16:35:22.007000 +CVE-2023-46536,0,1,e207fadff9ba4966a861fdf9b206c68ed51a7f8fc58edbbbca2add94da5f90a9,2024-09-11T16:35:22.883000 +CVE-2023-46537,0,1,f30723f5ac807b23de1ba1594c5d91f75be86bdf9862af6f4207697219369c33,2024-09-11T16:35:23.687000 +CVE-2023-46538,0,1,a7a6ff4ad35d59393879c1184b1dc8329b9b4bdf9e43383651f0c9fb9862d9c2,2024-09-11T16:35:24.480000 +CVE-2023-46539,0,1,6de77e76d8de5bb71071002851f19aaae3d377dcf800bc11b8ad4ca2747a46ff,2024-09-11T16:35:25.280000 CVE-2023-4654,0,0,706f56971ecf74123e71a441d8e7b7ea445e4d63bf7d1f7f872ce83f662b83a4,2023-09-01T14:48:51.433000 -CVE-2023-46540,0,0,753e9080ec6aab90595c5dd5fcd832ed23f24eefc52272702ad46dfa144b67da,2023-11-01T20:18:44.327000 -CVE-2023-46541,0,0,6fc8b1d34aa1da11419f00ee6adfc94f6c39d2b45090f3dab2b7e7077d60a605,2023-11-02T12:49:01.120000 -CVE-2023-46542,0,0,b7d8a2bfa32860711f407d3fedcb33b6f1891ec5a5abafe9da43d907c431545e,2023-11-02T13:09:06.287000 -CVE-2023-46543,0,0,bdd22a414e798b2daed1cd71f41a4f20b5753d1a8eee84e374b00780379ef463,2023-11-01T20:35:20.917000 -CVE-2023-46544,0,0,ab7f641f5bc0f19f2d8ee8418cc6107e9125eed670f0d71ec3096c58f2b7b44b,2023-11-01T20:28:38.340000 +CVE-2023-46540,0,1,fe7db5c7f69f9a9abecd38fb08e89f23dfe0994770d0b376239c4880269d5390,2024-09-11T16:35:26.063000 +CVE-2023-46541,0,1,ffc8132a5aa18f0ccc5124ecaabd66b24f4f0a048e391360a6f587d1448f633e,2024-09-11T16:35:26.850000 +CVE-2023-46542,0,1,0a99701fb9656a4d23db31f3ca0faa6b6520c0acbc5d5d42598d5fe119875097,2024-09-11T16:35:27.667000 +CVE-2023-46543,0,1,017fca9e99792a5404c0c1223301327f329674f90efa005f7daa69bf048d24a1,2024-09-11T16:35:28.450000 +CVE-2023-46544,0,1,77e9bf006415293c7d980234e4300545afc78a1ebe11c36b1fe943e4a0535a73,2024-09-11T16:35:29.257000 CVE-2023-46545,0,0,08bf9ff56f34358381a590248bd7ec705716a78eb3fc26dd6a5705f975ae036c,2023-11-01T18:01:16.260000 CVE-2023-46546,0,0,88699b1f9af0c20ee08eb599b6c8c49092036d8385d8f73bcf1315c5337b98a2,2023-11-01T18:01:11.127000 CVE-2023-46547,0,0,0b5232859f58f31b2e7423303ba76bd1eef355b55e38f67b2736bfba1cb46ca9,2023-11-01T18:00:59.353000 @@ -234802,18 +234802,18 @@ CVE-2023-46549,0,0,b68adeda8c6272902d555ef4a4f25a22ba8f52be92d6ac5d5238265ee2dc8 CVE-2023-4655,0,0,99bfa86e7271b94f7a3c4021658aa7f59fb9c3cd0be245085cfe4c4c223f08d6,2023-09-01T18:39:47.187000 CVE-2023-46550,0,0,293e8bccdaaa0e24f577e51d2e2fe28eaffa4ebac5162d7da73f928c9ceea8ce,2023-11-01T18:02:00.267000 CVE-2023-46551,0,0,c35f01fb9d5db5537fd22a4290117468e0ff36df3ca8e7693905f0d5cb58ddb9,2023-11-01T18:01:28.653000 -CVE-2023-46552,0,0,3e4cdeab47ce9a5144166002da0ea2d7a10a804825619d4ee3c5d223445ab732,2023-11-01T18:01:24.630000 -CVE-2023-46553,0,0,4f18164af19896dbea89f1cebe3e301e316be1d7dd6f1cd11276cbf638331e68,2023-11-01T18:01:20.617000 -CVE-2023-46554,0,0,90cd17d59f4117d0c14f8bf795063f6c42294c083bdc4324a37398024c50a467,2023-10-27T22:01:03.050000 -CVE-2023-46555,0,0,5138283c8c5b586ab5006d34171e45434017d958445a8ac9343b66aa41913c25,2023-10-27T22:00:56.397000 -CVE-2023-46556,0,0,416be01bfe553b2fec9dd8f2e07b6b4675fdf68f082cc7eeb4dda830c61c63c3,2023-10-27T22:00:49.937000 -CVE-2023-46557,0,0,97b4c85b6b954d2f7886ab7acacc782e69fde9d820258ccaf259bd285cb628f3,2023-10-27T22:00:41.117000 -CVE-2023-46558,0,0,56eed5b190399cc6f651e57e3c23b683856f0210b3ed3bc75492bdef60b45779,2023-10-27T22:00:33.390000 -CVE-2023-46559,0,0,20f7628d5eba15ff61d40128e005306bbbc915b3424fd8420806c9619ec32ca0,2023-10-27T22:00:25.797000 -CVE-2023-46560,0,0,389aea5179f4ac304640f4a522aad07300d9295ce8a8db8d39b79a86a9c1c9fe,2023-10-27T22:00:15.483000 -CVE-2023-46562,0,0,a79f9b61b1c2e7197222fc25ebc15581b71dd46966e5e7932555149cd4e08901,2023-10-27T22:00:06.663000 -CVE-2023-46563,0,0,ac28c0fbec9871054cb1a68af11cb039b2e6d19b2476befb3ce9664599abee09,2023-10-27T22:00:00.013000 -CVE-2023-46564,0,1,9cf3cc96150c1c53f54a0c428468400559b878dc73c95b13374109b6f8290358,2024-09-11T15:35:08.437000 +CVE-2023-46552,0,1,25ef07a78584f24ef77d8c4365fbe1eaa1af49c98b3ad5cedcf31d8319ceb87d,2024-09-11T16:35:30.173000 +CVE-2023-46553,0,1,b2254920835a3faca7c3d797445d382f9bfd6b0cefcb17c406af7d4e4db05196,2024-09-11T16:35:30.983000 +CVE-2023-46554,0,1,caf8911417e67e6ad1980c419afdbcfeeec4f8ebf8b6de8ca32b5a4782ba4a6d,2024-09-11T16:35:31.783000 +CVE-2023-46555,0,1,42f1fb7be314cd65c58fc4e202e301405ca1681bb9b26024a551c7d214fbf097,2024-09-11T16:35:32.637000 +CVE-2023-46556,0,1,f4b219367bb3d23a4bb2915dcd0c7e185c27b0048e06dacb6380635bdce8fbea,2024-09-11T16:35:33.430000 +CVE-2023-46557,0,1,89f6e5789c29d4a7b41e77b358a4e4458b2c39b5ced8f68ab41f83eaca351cd9,2024-09-11T16:35:34.220000 +CVE-2023-46558,0,1,1a9e876d53052ac95bde9a11daf6d4ac41c9728ad2ddaf192bf9801442a6b0fc,2024-09-11T16:35:35.010000 +CVE-2023-46559,0,1,9c8ce912ab125d0ac95e7946bbd872e559297c785e4b28c04e91ee8466d7d5ff,2024-09-11T16:35:35.797000 +CVE-2023-46560,0,1,327937e7ffebf2be695358bd2f9ee008e16cd96374285064d7cff065f1448773,2024-09-11T16:35:36.590000 +CVE-2023-46562,0,1,0714af88a9806adf9d1ceecaac69a6178f78b96e51eb0449340bc9c3c0a7db48,2024-09-11T16:35:37.377000 +CVE-2023-46563,0,1,df206b344a83ab909fa127ada5f6bb1855932d2f31304ff0b577b5de01b1b300,2024-09-11T16:35:38.173000 +CVE-2023-46564,0,0,9cf3cc96150c1c53f54a0c428468400559b878dc73c95b13374109b6f8290358,2024-09-11T15:35:08.437000 CVE-2023-46565,0,0,c61acddd50a547aeb272553a57449790a07db5457e6196229513ca0ed4750c3f,2024-09-06T19:35:08.860000 CVE-2023-46566,0,0,817c4e8fa759c5542cbea7b815bba4eefb974ca574f472f95baa4f05798e9f10,2024-07-03T01:42:04.097000 CVE-2023-46569,0,0,c1a68b0423453677e8af6d446b59d42b683ad269115a4138364eb2988afefae4,2024-09-09T20:35:08.910000 @@ -237225,7 +237225,7 @@ CVE-2023-49912,0,0,7f28841368210bc0691c0afc3a42ead464f21102210069e934af0e2a983db CVE-2023-49913,0,0,9787c7114d73c4d417e5f8323c916fc32eab2ffa05723aeaf9a3588117501253,2024-04-10T13:24:22.187000 CVE-2023-49914,0,0,b89eb4a3a310cef0cc586b45f3748d12c2ee08c7f8dc70b5705f61fce08caebe,2023-12-07T19:04:24.117000 CVE-2023-49920,0,0,10ff3ef17084bf616ce673a67e0925690ef78be6b2b6b6630c8a8ca5b257ae2f,2023-12-28T13:49:22.483000 -CVE-2023-49921,0,1,787549bab0762495c8b3e32fae4182c061ec104f2340ef70cc2630878e217286,2024-09-11T14:09:57.070000 +CVE-2023-49921,0,0,787549bab0762495c8b3e32fae4182c061ec104f2340ef70cc2630878e217286,2024-09-11T14:09:57.070000 CVE-2023-49922,0,0,2895cd4c3f9a214bcf714282482758940b383f1b5313c3e10f62d5e5c7f90ab1,2023-12-19T15:11:00.423000 CVE-2023-49923,0,0,8c5463191a66a374ded20ebbf457fd749a3488a11cf52dd1dfa09195520416ce,2023-12-19T15:07:43.147000 CVE-2023-49926,0,0,38fff8a194f95993dded19af912bc12c507a9daed8ebe448c5987637a13e1fa2,2023-12-06T20:51:09.867000 @@ -239362,10 +239362,10 @@ CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000 CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000 CVE-2023-52892,0,0,e76a088ce4e19742d870b8476c614d46bee6f2abd88542d335617b1f2fbef53f,2024-08-21T20:35:00.760000 -CVE-2023-52893,0,0,1e6e98549d6a56d5d9270e84434d9e4aed67233fea668be7be424c93f21a79ba,2024-08-21T12:30:33.697000 -CVE-2023-52894,0,0,7ec10c0d4aaf263b51babc0099a613deae4e850303a34cb2f4accc0ea6b9281a,2024-08-21T12:30:33.697000 -CVE-2023-52895,0,0,56d31a97a500df9b641fd4bca39c806222b8ed4e28bce822e6196a3344fd3679,2024-08-21T12:30:33.697000 -CVE-2023-52896,0,0,0a6a7a17a75b82e9d2f20770c94c86bd78bf7b7e8873257109cd8d47f5df36fa,2024-08-21T12:30:33.697000 +CVE-2023-52893,0,1,9c2f38972fb9e70993a351c4c16b267a6d15a20b4593db0977c433afd0019cdc,2024-09-11T16:24:49.853000 +CVE-2023-52894,0,1,6d218b09574096830a1f66cebf0b72d0697d41881d6e7e7a0cfbbccbdc528449,2024-09-11T16:27:06.380000 +CVE-2023-52895,0,1,9af8606e42f1ce53366652ea28480cbee8f2520cb886d98166b8d3b37e5b6dcf,2024-09-11T16:31:31.597000 +CVE-2023-52896,0,1,6fe49f4668c388af2fb1f9a88e5f63a7d4d48f3f3091c277c4ba0ab76df70826,2024-09-11T16:37:08.107000 CVE-2023-52897,0,0,558ef169b610a44b7ba556172294469193852f08e7c0125b660ef6dd8975472e,2024-08-21T12:30:33.697000 CVE-2023-52898,0,0,98ec58874365faa56899adf607030137d0b9838759a93b6c999987d2252c2b09,2024-08-21T12:30:33.697000 CVE-2023-52899,0,0,3fba36cad7e7087e80a63d519b33f7765b601ccfcd23bc5d1180072367388f7a,2024-08-21T12:30:33.697000 @@ -241245,14 +241245,14 @@ CVE-2024-0100,0,0,f536814b5676db735894c02187696008c7cf1b3d39286954ee01bd7aaee5fd CVE-2024-0101,0,0,23c2c60aa2a7aeedf3e9bbc8a7c79d9624fa404c4dbd86a993b865d216205651,2024-08-08T18:55:19.180000 CVE-2024-0102,0,0,476d23a037899f61dedb3b0b21f826d7286ca045123349c57e1a25fffab3c078,2024-08-08T18:55:19.180000 CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000 -CVE-2024-0104,0,0,6595bfebe996acef1097f81c3222472df485634a19ada40e2df8b906b135763a,2024-08-08T18:55:19.180000 +CVE-2024-0104,0,1,ea7f385fc9a8d99548e260cd2bb85f1591e8d85d5187529e2ca94577bba79fd1,2024-09-11T17:40:35.430000 CVE-2024-0107,0,0,2670b459a089ae5f3cd0aa7028750cb59c956e51bd2d2b4d1317045f653eac3f,2024-08-08T18:55:19.180000 CVE-2024-0108,0,0,5d44d156a42931d34be8718fccfbc54a1ca3396e038fd79a34eb85bdcafe7c82,2024-08-08T18:55:19.180000 CVE-2024-0109,0,0,5c44fdcd8b35a29b08274338b4562d76779279af13110fd0ab530e2c32cb1b44,2024-09-03T12:59:02.453000 CVE-2024-0110,0,0,21c78f63ab34105d8082aeba0e39bac189d1aa78b4a7220e0a873b387581eb55,2024-09-03T12:59:02.453000 CVE-2024-0111,0,0,395edca60fe42a06076c313f6e24e92d57bfde6b14f4ec7bdfdef13af0793293,2024-09-03T12:59:02.453000 -CVE-2024-0113,0,0,82aa6c2d6a1230a654d03d8945e8c90c2026652fe480e569afba608925097413,2024-08-12T13:41:36.517000 -CVE-2024-0115,0,0,4fb44679050e322769dc378d58be0c8b9b5f064409d3cd72438a6c6f1e1c078d,2024-08-12T13:41:36.517000 +CVE-2024-0113,0,1,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000 +CVE-2024-0115,0,1,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000 CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000 CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000 CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000 @@ -241321,7 +241321,7 @@ CVE-2024-0227,0,0,a4e84e1b9f9ff8bb72dc26c9ff00c9b99f09150a51fa56e523e138aad08ff0 CVE-2024-0228,0,0,fd96fc161d3d60477c711a5fbf3929339bbdfc61029c2327b7af9a111ceab709,2024-01-09T17:15:12.223000 CVE-2024-0229,0,0,6602b8ec5feb6956074bc84551508bf34334ccf644b16f57e9c8158e1fe1529f,2024-05-22T17:16:11.003000 CVE-2024-0230,0,0,24d638afd0420bef6a46df36ab91db6a8f8e82d99d85e08e0b6837b09034d463,2024-01-19T18:35:52.493000 -CVE-2024-0231,0,1,d80a1c6fdad986c34ca88f080ac6103160028c174e05f2a79da18342eb92dd35,2024-09-11T15:35:27.340000 +CVE-2024-0231,0,0,d80a1c6fdad986c34ca88f080ac6103160028c174e05f2a79da18342eb92dd35,2024-09-11T15:35:27.340000 CVE-2024-0232,0,0,50f8b538617e3018d181a108bdc49b9892bbe872fc5ca5e706ebe486bdd760be,2024-03-15T11:15:08.560000 CVE-2024-0233,0,0,d56b903220eef660a47b790a5d6791a2bbbbf0dd9be28166c548968d23c1254a,2024-01-19T14:28:14.077000 CVE-2024-0235,0,0,615010b7812a96135df60a4a20a410f40f762c1296d8ced3aa653a835b32a371,2024-01-19T14:28:22.047000 @@ -242650,7 +242650,7 @@ CVE-2024-1652,0,0,9c4d4a5808d39936ad1afe87b94955a4237e3bbb52d1a3d6b1298efa7a21d7 CVE-2024-1653,0,0,e5e79d53755f75e06ba550c15b95a4191c9180e1979792cf741cfc401b4cb773,2024-02-27T14:19:41.650000 CVE-2024-1654,0,0,926984352ec2d485bb174e107c84c8a695cc018358d284142861d2235698cde0,2024-03-14T12:52:09.877000 CVE-2024-1655,0,0,6f8f5d96c23f16dd85462488caf0792739b9e6c2291572202cdaf3786063e62e,2024-04-15T13:15:31.997000 -CVE-2024-1656,0,0,c4b9dbb131bb0be9fd9320ecca40eb864c504097f0cbed91112536ddf8ae92fc,2024-09-11T05:15:02.303000 +CVE-2024-1656,0,1,4d391d4cceceefebf31c8e5783f8931736f0ba9f674edcafafb669b792ad662d,2024-09-11T16:26:11.920000 CVE-2024-1657,0,0,db1dca61fd86668e15d6de257cffb8827bc48118ce93399dcda0f29a164fb66e,2024-04-25T17:24:59.967000 CVE-2024-1658,0,0,cdf09354b8cecc8c3b3eb229e6889eceb0036447d9401d9215716ef5bb07f428,2024-03-18T19:40:00.173000 CVE-2024-1659,0,0,7c5cc8787aa4993a611968f433ba3b6f70cec73be412335113b18f509bf86fb3,2024-08-14T13:57:00.260000 @@ -243129,6 +243129,7 @@ CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bb CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000 CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000 CVE-2024-20303,0,0,393665d251452d2f76b8a508b1c314e9e2878d06110c2d34091d44dcf2cc0a6d,2024-03-27T17:48:21.140000 +CVE-2024-20304,1,1,c81c59bbb63e601bfa646562deea72e7dd1914365cb99e33e3b994f42ec36c07,2024-09-11T17:15:11.853000 CVE-2024-20305,0,0,e4850a7e4dfd71e4153c0c643b6c021aca041e6b1000ad76e287dea34422e456,2024-02-15T19:56:38.910000 CVE-2024-20306,0,0,a55540a2cb6844d768b14dffbabe4bb78cc3a5c4d9558b64001a5a52e8d62bc6,2024-03-27T17:48:21.140000 CVE-2024-20307,0,0,c9b1980d050b3fffe9b920134a5cc15d4bc4342c9015ce0f25b18451c8603eb9,2024-03-28T02:01:21.693000 @@ -243142,6 +243143,7 @@ CVE-2024-20313,0,0,96b72ec3ea9a86485607e2ffa69836dccdb51202f4c2887cc83e951c773db CVE-2024-20314,0,0,a98784f9bd6648b4e9213d024554c4bdc3787c88a73e5444218360086545b280,2024-03-27T17:48:21.140000 CVE-2024-20315,0,0,5caa6584a9f7867d452c644b063cd61c8678e63915145863d235ac082ed1caf7,2024-03-13T18:15:58.530000 CVE-2024-20316,0,0,1089bd3d53e5b2c49a8770723814eaf98c1e5899b4afab359e71b3645406a923,2024-03-27T17:48:21.140000 +CVE-2024-20317,1,1,6e2eb8d9bcdbc36d8de5a50868e1939589475ce2099972b46e78215da0825b22,2024-09-11T17:15:12.043000 CVE-2024-20318,0,0,41adde3fb857f9cea03517c6a4e2f4dbc032d61fb88e0a42b8543d819f5a2d70,2024-03-13T18:15:58.530000 CVE-2024-20319,0,0,0a1466563a9818d205ff8725c3cf2a5afe9d75f3720a76315e91f8e81770c747,2024-03-13T18:15:58.530000 CVE-2024-2032,0,0,6c9fab941a4b444e93407737c1e5c294d8f201f8109308d2a41aae9e970336f2,2024-06-07T14:56:05.647000 @@ -243162,6 +243164,7 @@ CVE-2024-20335,0,0,3ae82e4e51ce7dc67e890bbf3242dddc369bcec5a9c67ccb96545dde173de CVE-2024-20336,0,0,7da9174c756054acc761610c3354924a4d132dd65f90fcdc8e0995c2dbe104c8,2024-03-07T13:52:27.110000 CVE-2024-20337,0,0,a7c8d58b2276bc115bd59fc582b798a8fadaf5ed39ee4effba6490a0740366a8,2024-03-07T13:52:27.110000 CVE-2024-20338,0,0,510c65881ff77bd5a9b4264c80e30939b8e2e91bda87ae599bea8187a8352e74,2024-03-07T13:52:27.110000 +CVE-2024-20343,1,1,043d69c8ca4526cdda0ef9461650b14c7ec5cf70175bc87e6b29f97c78e518c6,2024-09-11T17:15:12.223000 CVE-2024-20344,0,0,0c95d8c456a266581d87105f2300bfe021552d9f4a6b780624736cdaf9bbf776,2024-02-29T13:49:29.390000 CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237eeb39,2024-03-07T13:52:27.110000 CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657528,2024-03-06T21:42:54.697000 @@ -243190,20 +243193,24 @@ CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc CVE-2024-20378,0,0,1d0c211142ee7b64cb979c7d6fe81a8dda4cc3d613763c0904f9ebf5643e5461,2024-05-01T19:50:25.633000 CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0ec,2024-05-24T01:15:30.977000 CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000 +CVE-2024-20381,1,1,702ad492819ac5969cb3884f7ab92b7cd4afd761a6b22adb92235c695282cdab,2024-09-11T17:15:12.403000 CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000 CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000 CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000 +CVE-2024-20390,1,1,c77b77364307357fd7d3b4b2c2eba2d20af5c82b0498cc5e9b37168e7ae566ce,2024-09-11T17:15:12.613000 CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000 CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000 CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000 +CVE-2024-20398,1,1,3138dc9c462ae8906df5a02dad80d95e549797bd07ee7b36fd039415c91c8739,2024-09-11T17:15:12.860000 CVE-2024-20399,0,0,1658084bea8e53da217e51840f29eeda502742ddfa8390e457cdfba97449b979,2024-08-14T19:41:18.033000 CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000 CVE-2024-20400,0,0,e22f5359b4eae3d1123c96473d077f1ed8cfcffe9256c923e22249fabd71dd12,2024-07-18T12:28:43.707000 CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002753,2024-07-18T12:28:43.707000 CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000 +CVE-2024-20406,1,1,78a6fe8d58c22cca81f92a693391c0082e148c928a904ffde9862234366a5518,2024-09-11T17:15:13.040000 CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000 CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67ce95,2024-08-29T13:25:27.537000 CVE-2024-20413,0,0,86bcdec57862054505f9b68ddff1575eb21295556bb50a8805e2f8ad7064ffd1,2024-08-29T13:25:27.537000 @@ -243224,14 +243231,16 @@ CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe7 CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000 CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 -CVE-2024-20466,0,0,d9adbd7a5cfca4a39494a47969f1c31ae3805a9aa7b4cd0a12535f31685e123d,2024-08-22T12:48:02.790000 +CVE-2024-20466,0,1,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000 CVE-2024-20469,0,0,19ccc3f5d38e2fe8fb2a0a1c766784c2e90393cd1985383de470344788153299,2024-09-05T12:53:21.110000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 CVE-2024-20478,0,0,2552b4b9bbc0a5cff57b3b8f7e9d97910094a88aceb9d33bb06e1a51f9db4e5e,2024-08-29T13:25:27.537000 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 +CVE-2024-20483,1,1,382c7e08932bc55d7336d4cf219f002a6fcc23f3238e2a33adfc1d894c7fc373,2024-09-11T17:15:13.213000 CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000 +CVE-2024-20489,1,1,2a2d28f1204394aee3df442469d4f9fedc612c0cb0dcbe5bdc6ab8bd5d219374,2024-09-11T17:15:13.393000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 @@ -244061,7 +244070,7 @@ CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235 CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000 CVE-2024-21528,0,0,20243e12426582c16920a0ab3a8036a5493484e122893e1731a0b03945a2d62b,2024-09-10T12:09:50.377000 -CVE-2024-21529,0,0,1002d4acb4efee4f01bc2c1bec01c8bc4382a6bddd411b731fdff9ac1634802c,2024-09-11T05:15:02.547000 +CVE-2024-21529,0,1,664e585ecfec877dc16e4d09f63918fa2af81f0c56860c291a634c3448dac725,2024-09-11T16:26:11.920000 CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -245338,7 +245347,7 @@ CVE-2024-23467,0,0,0f3812c8027e2b1a0387ae084b54a312746a6f4208c9fd471e82159f817c6 CVE-2024-23468,0,0,e8765a070e032d74be82ef4378840bde9abdf40be241610e53dac176bf3a85a0,2024-08-22T16:00:38.870000 CVE-2024-23469,0,0,894c7c8a40d8e1ca70f510c6d0f648a7311f3a2f70360af7fd29978cdf353b5a,2024-09-10T17:51:31.640000 CVE-2024-2347,0,0,639c42723b33042f97a80a4a3a2bc3546c4d216290aee32968515b2758b6d986,2024-04-10T13:23:38.787000 -CVE-2024-23470,0,1,2c738634992bf40ec49bab5c63cbaefd9a38361ff33874c27bc47128b832ca5f,2024-09-11T14:31:07.467000 +CVE-2024-23470,0,0,2c738634992bf40ec49bab5c63cbaefd9a38361ff33874c27bc47128b832ca5f,2024-09-11T14:31:07.467000 CVE-2024-23471,0,0,b53a52aad97cf8118fd9a4038c5c1b1b5ccfa8332880fcb40c4f3ccffc595833,2024-09-10T18:35:23.970000 CVE-2024-23472,0,0,121ca4221b4eb99e581b7a9e5e1e275d159863d781beeaa8fc9490d7cd94a082,2024-08-22T15:59:11.740000 CVE-2024-23473,0,0,fcdf3057371442a23acb771e071986edb9353b73cf0334bd53b552c2669c7305,2024-05-14T16:13:02.773000 @@ -245546,7 +245555,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 -CVE-2024-23716,0,0,4870aa8d7e96af13639b3139c8954733bf6a51589bc92bbb98e03b251a456704,2024-09-11T00:15:10.957000 +CVE-2024-23716,0,1,b8d91fec54a7796bb4940ee26af69138a73b4839567fbb8e275623c55afe157c,2024-09-11T16:26:11.920000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000 @@ -245727,7 +245736,7 @@ CVE-2024-23902,0,0,23fa1c3089afd507b048db06e4ea2ffdd19863f614f27f719de97ada3a6cc CVE-2024-23903,0,0,46f92003a51fde0f978d2b6023e8270332b2634481c35191ff5ffb1ffce33c63,2024-08-29T20:36:08.670000 CVE-2024-23904,0,0,a951ec872dbe283943db2cda1f329d6103f39dc8a3dbbab6b3bff9a6b9e2af38,2024-01-29T19:26:29.770000 CVE-2024-23905,0,0,a35e7dacddd2c1f3b32033e91045b0ad026e0a51c2fa232b2e0b46787dc2be1c,2024-01-29T19:26:11.517000 -CVE-2024-23906,0,0,943fc7fd5568135c71240b647a3b2e1cd7f8a64ca4c390452e55203031de4b22,2024-09-11T04:15:03.530000 +CVE-2024-23906,0,1,966b7632b718562b0a65745eec460b5c634f514216dcd5ec7fb3b458da32a334,2024-09-11T16:26:11.920000 CVE-2024-23907,0,0,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e80090fc,2024-09-06T20:38:29.490000 CVE-2024-23908,0,0,8bfe961f2cd2fcb2503f4aff8306f89c58f7b0b3f54719b8f5407f1616c019ad,2024-08-14T17:49:14.177000 CVE-2024-23909,0,0,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000 @@ -246320,7 +246329,7 @@ CVE-2024-24964,0,0,453b708cc71a26e1c2e6a095353d8c5371dcecf82b39d783f4d95f24daf1a CVE-2024-24966,0,0,596d9f70ed531a9ce913b647600f9cfc649827cf292b66c3b67d74e0809d7525,2024-02-14T18:04:45.380000 CVE-2024-2497,0,0,0abba4a60a0501980b979aaaf4b97236170cb15ea02aea63aa677f7cf3690b8f,2024-05-17T02:38:15.830000 CVE-2024-24970,0,0,c5c45405430c7c7f3516e99a92baceaf02c282a485cfc49b45ca53420788a4ec,2024-07-22T13:00:53.287000 -CVE-2024-24972,0,0,48c8f9e2b3530f16a34a13dcafc66ad72e2082bcd164eb21dee717567f0295ea,2024-09-11T04:15:05.250000 +CVE-2024-24972,0,1,86742d910f586bd4935529867b7e5776fe814a197e508394e6bb1b323dbec40b,2024-09-11T16:26:11.920000 CVE-2024-24973,0,0,799b88d4510d3cdfdd0382f5e91ddd3796de175c26a5f5a1ab9100b65fcefc7e,2024-08-31T03:39:37.043000 CVE-2024-24974,0,0,cdae5d3bff4e81d4d34b5b1ab313d43a0a37ce5a6a86d19a509669f375102d09,2024-08-01T13:47:31.543000 CVE-2024-24975,0,0,e45e77656a6eb7775bbf17ad859bf5d3a4697e166584b896665ee19b46725872,2024-03-15T12:53:06.423000 @@ -247009,7 +247018,7 @@ CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cda CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156748,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 -CVE-2024-26020,0,1,72caf6bcbf6e85532315d41141700a256acdb0b9130ff5b3cf9c47d5b4a216d7,2024-09-11T14:53:51.013000 +CVE-2024-26020,0,0,72caf6bcbf6e85532315d41141700a256acdb0b9130ff5b3cf9c47d5b4a216d7,2024-09-11T14:53:51.013000 CVE-2024-26022,0,0,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000 CVE-2024-26023,0,0,edcfd807fdc96925d4b0905ae74cd6e42a43795e1d81a6569987258b521eef13,2024-08-01T13:47:58.927000 CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4ac8a,2024-05-29T13:02:09.280000 @@ -247974,10 +247983,10 @@ CVE-2024-27108,0,0,493dc170d19befc3ab21d1472262747c78736b241c238bf3cc9e1fd81e388 CVE-2024-27109,0,0,d3f8df7e2e16d6aee5f99946bcfb2fb0ff8c289ba8999eb65f0360c55dca0187,2024-05-14T19:17:55.627000 CVE-2024-2711,0,0,50ffd1863952a28cb20d757a1f3a8a646342dad98b8dd38660e5f27155377268,2024-05-17T02:38:26.583000 CVE-2024-27110,0,0,cbd5f20a9295447075c0d9ddae39d8a0518f51482cf9653676931acac4a2af17,2024-05-14T19:17:55.627000 -CVE-2024-27112,1,1,ba17c75112a773240edcbb553f5e91098d78de6e40f4e97458ecef86911c2641,2024-09-11T14:15:12.810000 -CVE-2024-27113,1,1,c6b75e510cd9e17e2811ee0671a7adeafeb7ceb3cf11aa6d0b42f64632391a26,2024-09-11T14:15:12.947000 -CVE-2024-27114,1,1,ad50ae440a610b5335968f2e1d2b3399ec725833a2a074c78e73b789c1abb740,2024-09-11T14:15:13.040000 -CVE-2024-27115,1,1,9f2806289505d864ed3eeff00c3f89118e68e8c6a0805243cd8e56e766343a4b,2024-09-11T14:15:13.147000 +CVE-2024-27112,0,1,41c14305ce29ba929571729adf6232d512555280634d6a8770ba26178a7c6ad3,2024-09-11T16:26:11.920000 +CVE-2024-27113,0,1,2c82b79fa533bf59473fa978b81949df2d6b2c94e8681438945525d1559125f7,2024-09-11T16:26:11.920000 +CVE-2024-27114,0,1,c524202d503c9645b59617b2e93f59293aaa827223bce7691c27d555aae04b0e,2024-09-11T16:26:11.920000 +CVE-2024-27115,0,1,8ce6819b2281b5044808d901b951c9af48fcfc88b1321324751d7dfba9f3dbde,2024-09-11T16:26:11.920000 CVE-2024-2712,0,0,12d5f119117cab5321059a19687d0b6e7d22fe860cd65815723e1f9810583e44,2024-06-27T19:15:13.167000 CVE-2024-27120,0,0,4abe17d3c70fcebeaed9cfc849b5af8035eacfb7b2d62a88500c7d222ad02f14,2024-08-20T19:08:54.490000 CVE-2024-27121,0,0,39e3c543f4cb1f4387938b375f2e3c2bc314311eef182b0a4559027c027334eb,2024-08-16T20:35:07.017000 @@ -248217,11 +248226,11 @@ CVE-2024-27360,0,0,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c67448 CVE-2024-27361,0,0,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000 CVE-2024-27362,0,0,9d431a1116edfb20ae4c799537e5e9f5d11ebb0847e9e8bdd27f35d143873f1d,2024-07-12T14:58:02.413000 CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000 -CVE-2024-27364,0,1,02f27164deb200afca4b1d38ab76500f16a864bcb06855698108ffe4aad28278,2024-09-11T15:27:12.647000 +CVE-2024-27364,0,0,02f27164deb200afca4b1d38ab76500f16a864bcb06855698108ffe4aad28278,2024-09-11T15:27:12.647000 CVE-2024-27365,0,0,9058f84b5d198b35970a80108ecfe455ca7140ed2b490cd16c3e02517cc2fe18,2024-09-10T12:09:50.377000 -CVE-2024-27366,0,1,30a861f840063626e8e849d7d5555680b22c82c5cce090a6de789e44c30ea096,2024-09-11T15:26:58.437000 -CVE-2024-27367,0,1,71b3ea1c40f6af3adfb6c571db5463e76d68459fe590eb2bd8e09817fe6fb217,2024-09-11T15:26:42.500000 -CVE-2024-27368,0,1,41f719760ea2cb29c517e06027ad9c630fb4c688c70b168de9fccd0f230b5e48,2024-09-11T15:25:46.313000 +CVE-2024-27366,0,0,30a861f840063626e8e849d7d5555680b22c82c5cce090a6de789e44c30ea096,2024-09-11T15:26:58.437000 +CVE-2024-27367,0,0,71b3ea1c40f6af3adfb6c571db5463e76d68459fe590eb2bd8e09817fe6fb217,2024-09-11T15:26:42.500000 +CVE-2024-27368,0,0,41f719760ea2cb29c517e06027ad9c630fb4c688c70b168de9fccd0f230b5e48,2024-09-11T15:25:46.313000 CVE-2024-27370,0,0,d787ca1729f6374f316c8229cfb768db5a8087155da314897f8dbb9bbd830bc1,2024-08-20T16:35:05.843000 CVE-2024-27371,0,0,9f9543c2ab901d26d97e0899583296b8d79cc83789296e1252e008496317a15f,2024-08-21T16:35:04.317000 CVE-2024-27372,0,0,8907778c9fe6bbf87ab271d97dfb25ffd83018598cb715d55ddafede9aab4b45,2024-08-15T16:35:04.970000 @@ -248236,10 +248245,10 @@ CVE-2024-2738,0,0,a7fee4844aa4ff2acb90aab32559c9a1bc272ae0ec6a90bd82a5f6f4cc4b67 CVE-2024-27380,0,0,faebc4a3baa432ef5ecb31e1bffac55af4502d0bd3a145e79e126fdf104360dd,2024-06-27T15:52:55.140000 CVE-2024-27381,0,0,ca56a1eacfe1d85ad323f094ca6ce6a781e7b45770dc3b39a1a4a3ad0c28ba97,2024-06-27T15:54:29.327000 CVE-2024-27382,0,0,5cdede5ba0c355d88eed84640c66ff7fece892ae23f7a48063c692f8bc7ac8c7,2024-06-27T15:54:47.727000 -CVE-2024-27383,0,1,02b601cd4a72d07a2dcaa4f87eeea1f799914789414bf2c73f7548f6d0d70bf4,2024-09-11T15:25:24.303000 +CVE-2024-27383,0,0,02b601cd4a72d07a2dcaa4f87eeea1f799914789414bf2c73f7548f6d0d70bf4,2024-09-11T15:25:24.303000 CVE-2024-27385,0,0,003e283023f566a2385aab18dff3e37100c8b762c1c6dc798e412558e0acbc12,2024-08-01T13:48:25.863000 CVE-2024-27386,0,0,392763fc5ad1ba2fe130e662b117c81c5508cfa52b8d41cd60a9bfd68ddf8e96,2024-08-01T13:48:26.553000 -CVE-2024-27387,0,1,164fd65676c7b2dd164c986231cd22fd5cbb6d9c907f1f9550502c07e438cd36,2024-09-11T15:23:58.743000 +CVE-2024-27387,0,0,164fd65676c7b2dd164c986231cd22fd5cbb6d9c907f1f9550502c07e438cd36,2024-09-11T15:23:58.743000 CVE-2024-27388,0,0,8ca5a384d8f8d9a2091e5293e5ac316155597802cc78feac2a6594da98404e69,2024-06-27T13:15:57.940000 CVE-2024-27389,0,0,cc01c74893b07f0b811b8decf7e0d285abe38929fae54a3365d798c7016df82f,2024-05-01T19:50:25.633000 CVE-2024-2739,0,0,f67ee20b2bc2ca284467eaab4487259eaa12927229efc313e4a8f27526c7f5dd,2024-04-15T13:15:31.997000 @@ -248890,7 +248899,7 @@ CVE-2024-28288,0,0,f98f2f651d1f736446516dbdbf0d5790dba9ff7967167e34d1d283eb510a3 CVE-2024-2829,0,0,a34e30cdbcaace33af6819d27727866fac8140ba32c20702ce2f1d25edf955a7,2024-04-25T13:18:02.660000 CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f67cb,2024-07-03T01:51:34.303000 CVE-2024-28297,0,0,a4b240f33a30c881b1a926a2c492c4fd59edb741a84b1b986f2bad529bc90472,2024-08-05T12:41:45.957000 -CVE-2024-28298,0,1,3bc67ac88076195fad9cdc6e8b44ccb13643ba94f3e6354bb8ca3a126daef414,2024-09-11T14:54:30.973000 +CVE-2024-28298,0,0,3bc67ac88076195fad9cdc6e8b44ccb13643ba94f3e6354bb8ca3a126daef414,2024-09-11T14:54:30.973000 CVE-2024-2830,0,0,8c004c1c8fc1f8388803620250a49c9771d371ad920b272b660e7e2337499741,2024-04-04T12:48:41.700000 CVE-2024-28303,0,0,a65712a928f1b4a2335837c36c349f7d018e1f7b9e70b27cb7f99f12d8cf7ee1,2024-03-20T13:00:16.367000 CVE-2024-2831,0,0,643c5a916b3e7dd2e502ec8b69ecf4eaeb51af43509d8dd9dee1849a2f658d24,2024-05-02T18:00:37.360000 @@ -249345,7 +249354,7 @@ CVE-2024-2907,0,0,d38c3c5afe0996ef7d2afec58183dacb85dd11333a5da96f4ee973a2358a84 CVE-2024-29070,0,0,7e70b47539b534ac42449ef773f3a05c674c51a40e15b8addbcf7c05c21a85a1,2024-08-01T13:49:24.570000 CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000 CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd995,2024-06-10T18:15:30.110000 -CVE-2024-29073,0,1,2e466d2532d0389648ef44ad0b542b26dbada76098b2f6ee4aa176a2d3937451,2024-09-11T14:53:21.253000 +CVE-2024-29073,0,0,2e466d2532d0389648ef44ad0b542b26dbada76098b2f6ee4aa176a2d3937451,2024-09-11T14:53:21.253000 CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000 CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000 CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 @@ -250942,7 +250951,7 @@ CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 -CVE-2024-31336,0,0,cf29ce3f5ddb2b5373e62145db57946fb1b244bc995930ef12554352a2e9f945,2024-09-11T05:15:02.783000 +CVE-2024-31336,0,1,00037ad75b852320b53e760cf14335f32bcc6e8b8147ec73fd652c18f445295f,2024-09-11T16:26:11.920000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 @@ -251670,7 +251679,7 @@ CVE-2024-3248,0,0,250b2dbd79112a5c409f75ad686b891df81af7a505fb4de44a036ccb0053b1 CVE-2024-32480,0,0,19c71cf4b4927bc3b3fafd8de700ee992dac8872f5c7a42dd66fe5bbf9c168fa,2024-04-23T12:52:26.253000 CVE-2024-32481,0,0,c54808d23bab7c98fa436bfac9ea5eb550592b31e4fb9b6afe22c10c85cad030,2024-04-25T17:24:59.967000 CVE-2024-32482,0,0,5a4b91f74f5513de658c6d05ee36d1ae3d22e82071be37fe63fc64fe4f8fa23a,2024-04-24T13:39:42.883000 -CVE-2024-32484,0,1,841fb97965ab4479f29c48487f7eefb4217e0294c7a236e1213d3e2e18152bd5,2024-09-11T14:46:02.483000 +CVE-2024-32484,0,0,841fb97965ab4479f29c48487f7eefb4217e0294c7a236e1213d3e2e18152bd5,2024-09-11T14:46:02.483000 CVE-2024-32487,0,0,9b75323b8c9e4bc0024b685cf9b8c4f1bcf527dbb8fcae997b90b5ab98a4af95,2024-07-08T14:18:29.363000 CVE-2024-32488,0,0,a412842bd8b825cf0ccc137ff6a5e549f64f0fec820d1ace6690b9c794fe8f1d,2024-08-09T16:35:04.773000 CVE-2024-32489,0,0,159e1feadca8ba00fef63951857feba1cb8efb3d2694b3ac66347dedca764d98,2024-08-19T15:35:04.270000 @@ -251849,7 +251858,7 @@ CVE-2024-32668,0,0,fe0a58fb56fe763cf142e84ed9a793b91b7f497782b7f4a42a54a40fcca17 CVE-2024-32669,0,0,1c249494e22e7c275a812095677f2945379060d0cae4bdfd8500bbbde31f40b7,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,940010b55b9a616638f110687c77a6c496dcf0d2dfd170d1aa59ab5c8e848149,2024-04-10T13:23:38.787000 CVE-2024-32670,0,0,11e459444671f45b9f26d0cdaea8328e4da91a68f683a4e2c21fd5a0bc52f597,2024-07-11T13:05:54.930000 -CVE-2024-32671,0,1,5d677c10b76ea8cdf4bc9c7ad02a182bb55b316808c921aa232267bdda13c5e9,2024-09-11T15:57:55.473000 +CVE-2024-32671,0,0,5d677c10b76ea8cdf4bc9c7ad02a182bb55b316808c921aa232267bdda13c5e9,2024-09-11T15:57:55.473000 CVE-2024-32672,0,0,ee29fc695f581fb34ab7bf98446e86972f27b7ccbb3dc78cde6e814c3b7d95d3,2024-05-14T16:12:23.490000 CVE-2024-32673,0,0,3ba332f405fb62a9db852b3a3b63947df990ff59922b5ccf63ffb803181a7192,2024-08-16T07:15:03.693000 CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 @@ -253417,7 +253426,7 @@ CVE-2024-34826,0,0,351c22bcab8818868b07290276f62aa434130aafdd9ebc850cc6b73894d2e CVE-2024-34827,0,0,dd19689a79f1067d7d45985a043cee153e2c55a2f9cd3e74b0ee8f1e25e905fb,2024-05-14T16:12:23.490000 CVE-2024-34828,0,0,e7ae500419610a76a265629d4e156ba43b75d86bab84cd6265c5a22f7e811bd5,2024-05-14T16:12:23.490000 CVE-2024-3483,0,0,72ac121e10f0fbec3441fdc985105b5517c67c7d15c68e546183af8699afc04f,2024-05-15T18:35:11.453000 -CVE-2024-34831,0,0,e9e35645f208c0cebaf493932060a6328f6f743af4e888d137f8c8d4b364e861,2024-09-10T20:35:07.857000 +CVE-2024-34831,0,1,3f7c60c3449721b0264dd8c2a79903dd10fae14b0c1312983cdcce395d0c8560,2024-09-11T16:26:11.920000 CVE-2024-34832,0,0,9221b37c801147fa3e1f0e1374d69209bf6d3d76dd01b6b6751ad3db7ce446e9,2024-08-22T20:35:10.197000 CVE-2024-34833,0,0,d0fc9ae10a7af80da29383727746a9a28b1b3908848ebf21d8371a48e86f18df,2024-08-05T17:35:13.953000 CVE-2024-3484,0,0,615f14fdd6b7cd87ca18ef762e16cc35184db7733a3812c430864b915d907b16,2024-05-15T18:35:11.453000 @@ -253532,7 +253541,7 @@ CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6 CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000 CVE-2024-35140,0,0,f651bda48ef3720086b4e55e66eab6a11168ee8b067c959fc6ebc63397794d8e,2024-05-31T19:14:47.793000 CVE-2024-35142,0,0,eff9915c7a0945f0e06d680eabc808e5d5a4e4e1bca0bc89129e9dc0c0bf4eef,2024-05-31T19:14:47.793000 -CVE-2024-35143,0,1,91b6eeb88ab78f0a68d664e29510e254e5a4274c3ef1d98eec625c8db65a7df1,2024-09-11T14:34:13.590000 +CVE-2024-35143,0,0,91b6eeb88ab78f0a68d664e29510e254e5a4274c3ef1d98eec625c8db65a7df1,2024-09-11T14:34:13.590000 CVE-2024-3515,0,0,8fd4dcadec7780b53436525af06eb6126290740e496ba02261842790bcfc4cf4,2024-07-03T02:06:19.180000 CVE-2024-35151,0,0,50c46c119b543968ed958ecfb5b487a6d2fa4303602c68e6298210cebc9f30c1,2024-08-23T15:32:15.270000 CVE-2024-35152,0,0,6405a901c2a07c460de1a6dfaec77aa83ec13bcce14e649bd5403dd2210dc6bc,2024-08-23T18:57:54.717000 @@ -255080,7 +255089,7 @@ CVE-2024-37295,0,0,fbcc7bb2889d9597bfed9fd8e34bf110cdf869ea553c4d9c4889af667e21f CVE-2024-37296,0,0,f773e9b4096330bb10b1258fc1d1c3f8598fa34d0610a3d76b02b358a1c46fc9,2024-06-13T18:36:45.417000 CVE-2024-37297,0,0,80b2958482b49c2c594bfcbdc02294260e55ba58ad36e98395d0881554b20822,2024-07-23T20:19:46.657000 CVE-2024-37298,0,0,6f9425539bbf552d046145e15afc1050d4c995579ef3ea2bdc7c3c684a72f7a7,2024-07-02T12:09:16.907000 -CVE-2024-37299,0,1,205f0b40a758fdc1dced6d887b5ea436463fde8aa45c00a6907effc08c197fd6,2024-09-11T14:03:56.993000 +CVE-2024-37299,0,0,205f0b40a758fdc1dced6d887b5ea436463fde8aa45c00a6907effc08c197fd6,2024-09-11T14:03:56.993000 CVE-2024-3730,0,0,f3a19794b78dc38a637f07c4e7db0ac4195dbeda34c530b5cbd488b9ecb411f6,2024-04-25T13:18:02.660000 CVE-2024-37300,0,0,5590a189f2c80a2c0e69ad3b8771a19032b2ef2b4a268875ff14b77477677613,2024-06-13T18:36:09.010000 CVE-2024-37301,0,0,edc8a23be80a0adc425b4edf50a7dcbe1479a99dce59b837847fb08393ce0038,2024-06-13T18:36:09.013000 @@ -255347,7 +255356,7 @@ CVE-2024-3770,0,0,fa4beea78617deed554c70cf304b7e2f927660a5dd6add7de1e76f7fc1d644 CVE-2024-3771,0,0,1646ed765465efbfe9b2c4ddd2884445b41a894fc37412177344b47d5bf8f677,2024-05-17T02:40:07.477000 CVE-2024-3772,0,0,e9317cbebb79e9be22e844c8c1723d1676d09eadc1e2aeffc34a2fcfe946260f,2024-04-26T02:15:06.983000 CVE-2024-37726,0,0,a5107b068d66c3570343545c901feb79b0c7fc6600c054d9141acb4f14ca7b1a,2024-08-01T13:54:14.057000 -CVE-2024-37728,0,1,9fdeecb364b87bafb0b693bb4113b35750631f81ebfeac89f6ccfc0bb2fe70dc,2024-09-11T15:15:12.140000 +CVE-2024-37728,0,0,9fdeecb364b87bafb0b693bb4113b35750631f81ebfeac89f6ccfc0bb2fe70dc,2024-09-11T15:15:12.140000 CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000 CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000 CVE-2024-3774,0,0,593479bdd908b3498d235d74677575dd1f3896886cab276c51a981ed2e66af92,2024-04-15T13:15:31.997000 @@ -255518,7 +255527,7 @@ CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a55 CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000 CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000 CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000 -CVE-2024-38014,0,1,a516d670e158e2035fb037c11ddfe8adadd3aaa6e85101566bf361d19d17cd0f,2024-09-11T15:11:31.863000 +CVE-2024-38014,0,0,a516d670e158e2035fb037c11ddfe8adadd3aaa6e85101566bf361d19d17cd0f,2024-09-11T15:11:31.863000 CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000 CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000 CVE-2024-38018,0,0,bbdc2dca451b5fddb37db9148885748272e887a947585b5768d3e4d030d44598,2024-09-10T17:43:14.410000 @@ -255709,14 +255718,14 @@ CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000 CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000 CVE-2024-38216,0,0,9da2da64d36518c00c753f25b7c81a7149247eb0c35b8e9c2ae5ff39bc571f48,2024-09-10T17:43:14.410000 -CVE-2024-38217,0,1,688cdb9f8340a812edd2b82271e93244aa01546945c9fb2d94d229daf92c9e1c,2024-09-11T15:09:23.627000 +CVE-2024-38217,0,0,688cdb9f8340a812edd2b82271e93244aa01546945c9fb2d94d229daf92c9e1c,2024-09-11T15:09:23.627000 CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000 CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 CVE-2024-38220,0,0,75d1d2b4a4c084fa7a781cee5622397ece32cf08d890075be7f73458ef7b79aa,2024-09-10T17:43:14.410000 CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000 CVE-2024-38225,0,0,9fef32ff53f02aa8c1358c50b31033ff2c3e33337edda025b0788ca47e24a0a2,2024-09-10T17:43:14.410000 -CVE-2024-38226,0,1,5a94019a4e4ff3a390b125d942a080254be34610c129859a9d527efdfc7e86d5,2024-09-11T15:12:49.147000 +CVE-2024-38226,0,0,5a94019a4e4ff3a390b125d942a080254be34610c129859a9d527efdfc7e86d5,2024-09-11T15:12:49.147000 CVE-2024-38227,0,0,530a8714fe4c2026ef544b351c789cbbe0c690cb06ac9afdae49238280f9af62,2024-09-10T17:43:14.410000 CVE-2024-38228,0,0,ecd2eb588a86b904449a792d5d4a07ad323dee48eae1e800a6b0ff7710362f8d,2024-09-10T17:43:14.410000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 @@ -256189,8 +256198,8 @@ CVE-2024-38868,0,0,f5122b748e151420a9f3845d24af4920bd437f9bfb8619e2cdc643a0cfcff CVE-2024-38869,0,0,c0f887639cd5f8290b163362347e9df211e2de0bfae6dfee57ed54004469d16e,2024-08-30T18:15:07.150000 CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000 CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000 -CVE-2024-38871,0,1,57edf361883e1d6a8acb97285bfd5cacdef0784f3b2cf35520ec84b56f0b6341,2024-09-11T15:29:50.230000 -CVE-2024-38872,0,1,6a652d0f00754e6ed4c8f746ec78ed9435eea30377e39cffec01179ba6a9a283,2024-09-11T15:29:16.677000 +CVE-2024-38871,0,0,57edf361883e1d6a8acb97285bfd5cacdef0784f3b2cf35520ec84b56f0b6341,2024-09-11T15:29:50.230000 +CVE-2024-38872,0,0,6a652d0f00754e6ed4c8f746ec78ed9435eea30377e39cffec01179ba6a9a283,2024-09-11T15:29:16.677000 CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000 CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000 CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000 @@ -256243,7 +256252,7 @@ CVE-2024-38984,0,0,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4 CVE-2024-38986,0,0,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000 CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000 CVE-2024-38989,0,0,7001f996e8750f893c91dddad8450a9cd0a74e958414e4c24caf0d467ae89875,2024-08-13T14:35:23.670000 -CVE-2024-3899,0,0,7259293fb80e158a31989b7c37a6116b92456fa6eb966e5daa814491e7415907,2024-09-11T06:15:01.870000 +CVE-2024-3899,0,1,1207c1f6691f8348e562b6c9202359fce2b7ea0e7b771fe4a5ff0d48c84a5664,2024-09-11T16:35:39.437000 CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000 CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000 CVE-2024-38992,0,0,b7cf9f54a7f4c2067eaf3603c2993c981c393feec4a45aee69ee69a0c7bda224,2024-07-03T02:05:29.473000 @@ -256394,7 +256403,7 @@ CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6 CVE-2024-39317,0,0,50f7a469519b62eca16220b475bffdb7e1e0158b2b6611386cb9bf3353e1272e,2024-07-11T18:09:58.777000 CVE-2024-39318,0,0,d84809b5481c68217d59c341f89a33a753d6db4b36e662db9d71acc330a074f7,2024-08-01T12:42:36.933000 CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000 -CVE-2024-39320,0,1,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000 +CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000 CVE-2024-39321,0,0,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000 CVE-2024-39323,0,0,f9bbda9de9065c504f42e389e0c785c3032548b9fca5a4349b55a818885c8e4d,2024-07-02T17:44:45.700000 @@ -256428,7 +256437,8 @@ CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000 CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000 CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000 -CVE-2024-39379,0,1,254a12bd73909f0be093719c5b38b4eaf337f7e58beca38b827a09c853e5a892,2024-09-11T15:52:47.053000 +CVE-2024-39378,1,1,f7f5123468282f7de4ae299ed6fab3b253ceb1b2199b38ceb3e8512ca9694993,2024-09-11T16:26:11.920000 +CVE-2024-39379,0,0,254a12bd73909f0be093719c5b38b4eaf337f7e58beca38b827a09c853e5a892,2024-09-11T15:52:47.053000 CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000 CVE-2024-39383,0,0,b6e4f5fe53d1ceea626b9028f302c2f5678be6f17f3d7aec3036ac534781eb21,2024-08-20T19:26:34.947000 CVE-2024-39386,0,0,b798786f71e8e8f0735f5ce39eeb2c50d842aae88e8a43200f637f6dd2b6b086,2024-08-19T18:53:49.387000 @@ -256630,12 +256640,12 @@ CVE-2024-39621,0,0,0c249e1c45f38e7803d96351e629758e9c24acaebc0fdee9ecbe6f2310164 CVE-2024-39622,0,0,5e7d7bcbe4d60960bcc7d0a35a948631371ae2277c1c9eb9831f372ee1fb98f9,2024-08-30T16:30:11.797000 CVE-2024-39624,0,0,61c5c17120773e760fbae9a7958d22954be8f7c181114c13133411959f35ed43,2024-08-02T12:59:43.990000 CVE-2024-39626,0,0,5a5b5e6bc7f9b197e733d2625525099054f6683ed3ef19bdd786eb4f73649530,2024-08-02T12:59:43.990000 -CVE-2024-39627,0,0,943edf98b03506dacc7b177a693908a1444c36ae559a2c917fdb7ed5347edfe5,2024-08-02T12:59:43.990000 +CVE-2024-39627,0,1,07e13c8e7805345d34bba365100ff9d8fb4b41c5994c06908b9aa5fcd6462ce6,2024-09-11T17:35:37.523000 CVE-2024-39628,0,0,8abf80664dfce5db89bc155c2700a612a9b6bae119e72b4395dc2ca2da475311,2024-08-27T13:02:05.683000 -CVE-2024-39629,0,0,6ca70fef88f28268a5f308519d053a4ea177963cb0a892d1db20a245077b8d59,2024-08-02T12:59:43.990000 +CVE-2024-39629,0,1,69d55baba09f40a0592a3b91cd4c35fb4ccff70560751062aa75ee5152b4ad51,2024-09-11T17:35:06.743000 CVE-2024-3963,0,0,51376b7b644c18cc44faec2c04d1e94caccf8dc59a8984cdfb5fb430015f77f8,2024-08-01T13:56:47.180000 CVE-2024-39630,0,0,b9a415bc4650f8f2437ab21ad7881d5052dc8b427d419e2888cd7dd33acceea7,2024-08-02T12:59:43.990000 -CVE-2024-39631,0,0,c7e3a0631eb8ddeb1f9a598d12b8b4856500f9f7fcfe9c18d81acebde19057ef,2024-08-02T12:59:43.990000 +CVE-2024-39631,0,1,ea38a64cfbcf13f28ceac2f9bda87bb53247f9431226fe4a5a08c9a522115fc3,2024-09-11T17:34:08.967000 CVE-2024-39633,0,0,fc0971d1bc8793039b4953353803c462b62ac233474e83dd34dde3ab5704290d,2024-08-02T12:59:43.990000 CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c7c7,2024-08-02T12:59:43.990000 CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000 @@ -256644,11 +256654,11 @@ CVE-2024-39638,0,0,fb5565b3dcfdb2da14248c86aa5defaabbb97b66bef3bacae5b2412178231 CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000 CVE-2024-39641,0,0,82efe19acefcd120a9c9ff4b95bce8c452c5423902a3f6b1c0041639db255e62,2024-08-27T13:02:05.683000 CVE-2024-39642,0,0,a5907a7ba9601cb47d5213c09a225012a1c028d8945a3fe4fa6d61abfa537ebb,2024-08-13T12:58:25.437000 -CVE-2024-39643,0,0,9291dbfccb67a5ce7b434369b9669833da17b20294a105001a54868ffb9300ba,2024-08-02T12:59:43.990000 -CVE-2024-39644,0,0,b8849cb2d988739c38c7817ea16f299cae8bff54f64d2458d2af6662f0d1f9be,2024-08-02T12:59:43.990000 +CVE-2024-39643,0,1,1dded6874da74e5afbb63537b6a34aae6868db25023597eaaaf8ae23d994ee0d,2024-09-11T17:33:14.787000 +CVE-2024-39644,0,1,c5dc47fbf8d1981e87e457a3ee41781a683fa403d50a7465ba17272c13e17f0d,2024-09-11T17:31:27.760000 CVE-2024-39645,0,0,9d264356cb3c50b50ea46e6a6a0ecae0e3898eabe4f8946365594a1394079519,2024-08-27T13:02:05.683000 -CVE-2024-39646,0,0,e660e52d7909b2f179d6753b9261a7d59eb6c7719edc4508a92126d547794ff1,2024-08-02T12:59:43.990000 -CVE-2024-39647,0,0,96ba49b7406af10465e5bd42f32f513793209da9643eaf56b7653d2878fe105c,2024-08-02T12:59:43.990000 +CVE-2024-39646,0,1,ebb1a6c9a40f2bab7c106d16a488a2c959fc892d9540eb6de01a5701473447cf,2024-09-11T17:31:00.847000 +CVE-2024-39647,0,1,76302d6bbf2afe03f0e6f6bafa6326bb4eb55afa326a015b16287c96fa3fb250,2024-09-11T17:30:17.807000 CVE-2024-39648,0,0,ab9faea09f5f33bcf9880e5ab21b0ae5b90092067a818bd60c5199b0cda605b7,2024-08-02T12:59:43.990000 CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56ebe,2024-08-02T12:59:43.990000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 @@ -256687,10 +256697,10 @@ CVE-2024-39681,0,0,16309c066fda62bf8c08baf4cbed854332949a8e78f8b4fd38768b4f30a8c CVE-2024-39682,0,0,00b5f2210802f383ff7e836ad4fd745cef6dcd07875442cfb9d268b986c976d9,2024-07-18T12:28:43.707000 CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000 CVE-2024-39684,0,0,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000 -CVE-2024-39685,0,1,042761f44ce108a0e8b681adf57defab48684290feb2ccd00f3033b8ecdd8fc2,2024-09-11T15:33:15.003000 -CVE-2024-39686,0,1,2e6c61babe9b1c203a7674ce8864a707096efb3630e9c5b266f2ae907e30b8c0,2024-09-11T15:37:20.323000 +CVE-2024-39685,0,0,042761f44ce108a0e8b681adf57defab48684290feb2ccd00f3033b8ecdd8fc2,2024-09-11T15:33:15.003000 +CVE-2024-39686,0,0,2e6c61babe9b1c203a7674ce8864a707096efb3630e9c5b266f2ae907e30b8c0,2024-09-11T15:37:20.323000 CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000 -CVE-2024-39688,0,1,f9a109f744d8d9750bb28db20ceb187800f9a3cef74608c8a11095841eb71e45,2024-09-11T15:41:17.747000 +CVE-2024-39688,0,0,f9a109f744d8d9750bb28db20ceb187800f9a3cef74608c8a11095841eb71e45,2024-09-11T15:41:17.747000 CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,017089a8e0e25cc18c41dde22c453ecf92ec4c4a53bf3304535dbfbcbb40fc3d,2024-05-28T17:11:55.903000 CVE-2024-39690,0,0,548c1a8a7761f7a2711f05cc07ec0b531924c96fc05350235330c19432d9ad9a,2024-08-21T16:01:47.157000 @@ -256751,7 +256761,7 @@ CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 CVE-2024-3980,0,0,af7d02bc503a7625123fe3e6728981b9674a4164c60a7ca3f7e7e1561da1eb07,2024-08-30T16:15:09.517000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 -CVE-2024-39808,0,0,61e83d77c821096e9434e40362cabee25b90f393f0d1c3c58a5ad44c3640dd2b,2024-09-11T04:15:05.597000 +CVE-2024-39808,0,1,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000 CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2cc8,2024-08-20T17:14:18.587000 @@ -256814,7 +256824,7 @@ CVE-2024-39887,0,0,bcab76b5e08590d7913c7572e3483924f579ce0c6c9a43158866e543d2bd0 CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,ce65af2cc2ab9f5337749d509721b17f14cb456e8c1b3062d4901ad84093db6b,2024-07-24T14:38:43.270000 -CVE-2024-39894,0,0,8d9862066d21f5982fd2fdf927182a7ca3492baae4149413d35a0dd383269b89,2024-07-28T21:15:10.380000 +CVE-2024-39894,0,1,1740bddb6fe58de0ef1c139ba5a05d5875d6244dcec43c669506110ca6b1a045,2024-09-11T16:15:06.003000 CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000 CVE-2024-39896,0,0,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000 CVE-2024-39897,0,0,38f11367ba3345f659ee85a48448fecd8dec6f5b40a44a93fa8c3972047a7c01,2024-07-11T13:06:13.187000 @@ -257061,16 +257071,16 @@ CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 -CVE-2024-40650,0,0,6c3cc80f92519f70e36bf62879dd89773ca40a8f4f88db859b5428090ebf6be3,2024-09-11T00:15:11.080000 -CVE-2024-40652,0,0,860ac8d35bd15da5b571f64f908c53ccc1c0ff1f627ae6d53990c5c2f4da927a,2024-09-11T00:15:11.140000 -CVE-2024-40654,0,0,e20287e242febf3bfccfca4af8584f54393a91f8229966ebc86c9f93f22581fc,2024-09-11T00:15:11.190000 -CVE-2024-40655,0,1,f5ebde96096a0ef5617f6d706308ab1f2a161768b63153eb0caf1132021009b1,2024-09-11T15:35:09.640000 -CVE-2024-40656,0,0,91dad1272b865456a277c18007f24c8eff550f80b64e662feef3d6d4f3b1cee9,2024-09-11T00:15:11.297000 -CVE-2024-40657,0,1,c722b46ab5c267bff89318faa1f1e3161a938b8af06d7d43331b7a322f34bf96,2024-09-11T15:35:09.923000 -CVE-2024-40658,0,1,c7e63b2748c5461fca23d9894478c9a2894cd97dcebbaa844459db2bebbaedba,2024-09-11T15:35:10.710000 -CVE-2024-40659,0,0,c757b258e14bab6f1cecaf94d0d3ec601cef0380e96d2358fb048812859bc662,2024-09-11T00:15:11.473000 +CVE-2024-40650,0,1,f047acc09ee38f2045f941487a7c68acc94e37df091b795523ba363338dec30a,2024-09-11T16:26:11.920000 +CVE-2024-40652,0,1,eadad88b0b54924f0258b46b19b77aa50f91a0e3ef53ed12d6fce6a2a22b510b,2024-09-11T16:26:11.920000 +CVE-2024-40654,0,1,89d13eda0f67a3a9a7b2cedb1fd2e93ba750322387fa1a658c26c352ad7fc226,2024-09-11T16:26:11.920000 +CVE-2024-40655,0,1,f9e742a073d4783d6e3e69c7c29dfc537f097ccbb827a6e63290bf1fc0f97f80,2024-09-11T16:26:11.920000 +CVE-2024-40656,0,1,9008b1d1ace8817d85179a1c374bd2763172380c7573a0abf96739f5a66daa5d,2024-09-11T16:26:11.920000 +CVE-2024-40657,0,1,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b92ab,2024-09-11T16:26:11.920000 +CVE-2024-40658,0,1,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000 +CVE-2024-40659,0,1,0e81ac2fd56546b02f24d926e423376d8f26fac8c41041469b21cab23328deb3,2024-09-11T16:26:11.920000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 -CVE-2024-40662,0,1,dd66b07ab77613e1d2f1d8d54596f8e1e921830646eca06f043fb51c75b103ee,2024-09-11T14:35:04.010000 +CVE-2024-40662,0,1,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000 CVE-2024-40680,0,0,41ab7b70c7ee12d084f1da220538cd376d47c73295a5e0bc20c807a666a18193,2024-09-09T13:03:38.303000 @@ -257433,12 +257443,12 @@ CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000 CVE-2024-41123,0,0,f4b244c723cc06d0f1b3d984c60a3f38c5bb280615f1544b263a60aa7e5203a1,2024-09-05T16:12:21.557000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 -CVE-2024-41127,0,1,cb656d719f797ab9b0f4b867a7e6012c2f45c355cda77a51db0501f209b4731d,2024-09-11T14:52:15.690000 +CVE-2024-41127,0,0,cb656d719f797ab9b0f4b867a7e6012c2f45c355cda77a51db0501f209b4731d,2024-09-11T14:52:15.690000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000 CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000 -CVE-2024-41131,0,1,041c807afe028be040a043371ec00a78668416f01d9d23856bb0cdda4dbcbcb0,2024-09-11T14:40:29.460000 -CVE-2024-41132,0,1,ac017aaebadd9662233e9a561b7408263a12e1a432cbe9a3efea529066bb66a7,2024-09-11T15:03:52.927000 +CVE-2024-41131,0,0,041c807afe028be040a043371ec00a78668416f01d9d23856bb0cdda4dbcbcb0,2024-09-11T14:40:29.460000 +CVE-2024-41132,0,0,ac017aaebadd9662233e9a561b7408263a12e1a432cbe9a3efea529066bb66a7,2024-09-11T15:03:52.927000 CVE-2024-41133,0,0,ce3ead38014ece3bef261615973570bdead6b2e89f32aae85d89404455f064be,2024-08-01T13:58:20.157000 CVE-2024-41134,0,0,b774b6f72061ac4c9c311c4197da1e4a9f1d4ccf563d392e6d3a5642539d27f6,2024-08-01T13:58:20.873000 CVE-2024-41135,0,0,ab6562ed5444edf91b52483668091e684a5544a948bbbda66cdb2112f2157db0,2024-08-01T13:58:21.583000 @@ -257570,7 +257580,7 @@ CVE-2024-41438,0,0,996a6cc02fa9447bba099c45bfb4b15a572a20ecb18cd6121c0e71f3f9fd5 CVE-2024-41439,0,0,7b3c1664f9930e6509340f8cc42233a6bb9a46e8c57c131a2fcdb17cb5a1f1dc,2024-08-23T02:06:11.380000 CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000 CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000 -CVE-2024-41443,0,1,4b989230a84b85398c5698bceac0a0dd2b8192cac38c0d61b31ca0600868cc4e,2024-09-11T15:54:29.327000 +CVE-2024-41443,0,0,4b989230a84b85398c5698bceac0a0dd2b8192cac38c0d61b31ca0600868cc4e,2024-09-11T15:54:29.327000 CVE-2024-41444,0,0,5ea59719718418adee108f9ce5540b96facb8a58caf3370b9e6aa1a42ff02782,2024-09-05T18:36:39.773000 CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000 CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000 @@ -257607,7 +257617,7 @@ CVE-2024-41564,0,0,ed2eb1a56935798a0fef3d91df46815a2d063b1d7caa9d554fe7f607bff6d CVE-2024-41565,0,0,73705e4299029ad2a5306d99d1289512d405841c1f23cb5741b41f59418e695d,2024-08-29T13:25:27.537000 CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000 CVE-2024-41570,0,0,548cd2006d0021700d97d9ac462942b0586c18cb85e20f0c023fdc6e3f8676c8,2024-08-29T13:32:21.020000 -CVE-2024-41572,0,1,e3312852513c75151c7b09071c0730654908f266b196f942a02a8abd098a0bd7,2024-09-11T14:15:13.380000 +CVE-2024-41572,0,0,e3312852513c75151c7b09071c0730654908f266b196f942a02a8abd098a0bd7,2024-09-11T14:15:13.380000 CVE-2024-41577,0,0,1db7c1144df378d1f0197182c3eb7cc1bf4798d90e82fc3037fda80bd09f3f04,2024-08-12T13:41:36.517000 CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000 CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000 @@ -257706,8 +257716,8 @@ CVE-2024-41728,0,0,a44236b8b8381750bb6b36d92fffe5b7b52d9e26a485ce4cee57ecc37824d CVE-2024-41729,0,0,d9349e4b0c516aa096dba9dc989576fef69f0da894dceaf82929700fdd5be9c4,2024-09-10T12:09:50.377000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 CVE-2024-41730,0,0,c3a91737f2e086c1acf47dd27a2418a435b72c75c0ef95092d81c10a62890c2b,2024-08-13T12:58:25.437000 -CVE-2024-41731,0,0,d5e6b6d25037e68a1f79c484f53ff7d64e1c1ae1a43b0c3615ae42e47ee6cc50,2024-08-13T12:58:25.437000 -CVE-2024-41732,0,0,063372d4201118f9e93da36b31b8b38430696a4cdb5a0313aaee9d00ca06c6d0,2024-08-13T12:58:25.437000 +CVE-2024-41731,0,1,4126cd0c30302e9c7380ccee1e7323dc125073bee521b0d7988e30a845f2e7bb,2024-09-11T17:48:18.073000 +CVE-2024-41732,0,1,e2dca567214be5568571959773e28599e7cbcbeb041ed41e27c6a914c5581a4b,2024-09-11T17:52:39.477000 CVE-2024-41733,0,0,2e82423ecd8cb4f19fe185c00259d9cd1bce193133bcb8ac21493cc978360656,2024-08-13T12:58:25.437000 CVE-2024-41734,0,0,224d2e0a7bbc404b129603d7c555b8e66b4f04376b8e767df63ae5e4860b78d2,2024-08-13T12:58:25.437000 CVE-2024-41735,0,0,080743ae5a1f74ca45d978f62e415018367343d9c85ec16e323a0b3ff4c5e068,2024-08-13T12:58:25.437000 @@ -257732,14 +257742,14 @@ CVE-2024-41807,0,0,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07 CVE-2024-41808,0,0,86e573e10148db5aa9add6d5ace29d7cf6e53a0a7cc2061842040f4fa6f34f79,2024-08-13T13:40:02.497000 CVE-2024-41809,0,0,70303d2e0413c949907cbf888f2f0a84d6dd93d023a162166c01e97f9b1b2afd,2024-08-13T13:43:51.613000 CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000 -CVE-2024-41810,0,0,fce91f3a5097bda66096029639ac61031f96e05453aebf8e61cc51a84a3387b8,2024-07-29T16:21:52.517000 +CVE-2024-41810,0,1,22fe082bb3e39bbacf22f9b91e5434d3639b284e5dae985001162af5ba989b34,2024-09-11T16:17:45.290000 CVE-2024-41811,0,0,9f58aea58828abbba8408114667ccf0c9b7ba580252558bb335b961e28e91b34,2024-08-06T16:30:24.547000 CVE-2024-41812,0,0,605ecb75121956b18494e4f351202cd384be9d27e18d4bfd8c3bb9b7ae2660a2,2024-07-29T14:12:08.783000 CVE-2024-41813,0,0,fe9e6378fcfc8b99f2b48a607bb0a5dba88b4b1c10de034eea904d310b31031b,2024-07-29T14:12:08.783000 CVE-2024-41815,0,0,f7e2b8ac909844654a8d64a702e0c0d942ad081f35512901a2feeb17bc4df91e,2024-07-29T14:12:08.783000 CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000 -CVE-2024-41817,0,0,8010ff423a07f8571e12e63f4cc1152c4b85edf401db036a0eb369e6d426fe01,2024-07-29T16:21:52.517000 -CVE-2024-41818,0,0,fd6b0e1011695eb76798d6e461db1ff285ea96645ca64665b171ffd474a15f40,2024-08-02T20:17:01.807000 +CVE-2024-41817,0,1,9cb2153c741e308483085d8110b63401b0c640bfe3ba97ff298d16bc8f67bbb6,2024-09-11T16:16:23.090000 +CVE-2024-41818,0,1,34e8576dcb1a1bd2ef0841435c6e4eb9b22f044d76175d55bfedd30532739326,2024-09-11T16:09:46.303000 CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 CVE-2024-41820,0,0,66761f44932ba996701075032b581c0ebc2041a25ba2c4f14ccc68178ac408dd,2024-08-06T16:30:24.547000 @@ -257784,6 +257794,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 +CVE-2024-41868,1,1,c557561aee86e68644073c59daf1bdf943751c167cde3bf04976db642e7616a6,2024-09-11T16:26:11.920000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 CVE-2024-41875,0,0,57025102705afb3f64ed9ca037e457d95a3751eb418da98d63205817feaa131c,2024-08-27T14:45:28.927000 CVE-2024-41876,0,0,2e90360efc316da37d37f6761f555864c070f8e4b10b19f1a9af1a905273c5a3,2024-08-27T14:45:40.377000 @@ -257810,7 +257821,7 @@ CVE-2024-41912,0,0,87ea3b9bad9f8b63d89c4540ebebc21c4d13ff1285933095e3aece696e2e2 CVE-2024-41913,0,0,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe42f,2024-08-13T13:06:48.547000 CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000 CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000 -CVE-2024-41916,0,1,066c2f671cf06af6f38789b8644af442aa1cd06119863d905974296f8fe86611,2024-09-11T14:25:46.180000 +CVE-2024-41916,0,0,066c2f671cf06af6f38789b8644af442aa1cd06119863d905974296f8fe86611,2024-09-11T14:25:46.180000 CVE-2024-41918,0,0,444713f57f29ae6ab3503ccd6ce1c7bde4d2698bbfadab74cd1692649dedb241,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000 CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280973,2024-08-01T13:59:15.743000 @@ -258145,9 +258156,9 @@ CVE-2024-42338,0,0,1c166daf89824e931f66e0595fb5e5754e965336c9788e410016199689669 CVE-2024-42339,0,0,0f64f5dc7b4d98f934a7a3631edfea2fcfdfd750cae95143817c35e5cf790c70,2024-08-30T19:47:13.743000 CVE-2024-4234,0,0,18c98986f4d0c323ca7a76881b57d07f11d740fced15b647da44016411c790ed,2024-04-26T15:32:22.523000 CVE-2024-42340,0,0,708aac03ef44aeea471e9a045b752e905888f9d429c0c9806a766c67411a6e38,2024-08-30T19:47:36 -CVE-2024-42341,0,1,e71445ca4d87763fc5e3ed9872117d0d22843d65643103e073d7185f2d847e56,2024-09-11T15:57:08.693000 -CVE-2024-42342,0,1,21011468e04dc18e6767ef59d73865e3ca9e8c5e1652ef13e81caba44d1d7fba,2024-09-11T15:56:58.313000 -CVE-2024-42343,0,1,9e60faf258bf0751aa4e07b75d19caf5f35f1c96c5012b5e1334fc7cd155fc70,2024-09-11T15:56:19.383000 +CVE-2024-42341,0,0,e71445ca4d87763fc5e3ed9872117d0d22843d65643103e073d7185f2d847e56,2024-09-11T15:57:08.693000 +CVE-2024-42342,0,0,21011468e04dc18e6767ef59d73865e3ca9e8c5e1652ef13e81caba44d1d7fba,2024-09-11T15:56:58.313000 +CVE-2024-42343,0,0,9e60faf258bf0751aa4e07b75d19caf5f35f1c96c5012b5e1334fc7cd155fc70,2024-09-11T15:56:19.383000 CVE-2024-42344,0,0,077758a6aadeecb665ff9906e621b771914386c88a61bacc8fa54dc57bfeb1f8,2024-09-10T18:54:58.413000 CVE-2024-42345,0,0,fea0fc27b43b5b72ac4fd1b909813a46b1bfa82c0990ca8a87744d0e8b73abde,2024-09-10T18:54:46.653000 CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000 @@ -258519,7 +258530,7 @@ CVE-2024-43031,0,0,c3ec426a9c2d322dc356eb4fe356a9e19c60505e16e054c91bc62d391f448 CVE-2024-43032,0,0,8850a9c656ae281e32b28ba33f2ad3aef6596a2affc3579c53c1b92b428efb34,2024-08-23T18:15:07.550000 CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 -CVE-2024-43040,0,0,183686fe5b1fec67c324bfc29e56f3cb9b50de3e0326b1b25cd837bdc27f58fe,2024-09-10T20:15:04.527000 +CVE-2024-43040,0,1,0e8a64b311437af77beed652bb48ac2262cf1a4bb46f6fbcea467e98efe83c9a,2024-09-11T16:26:11.920000 CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000 CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000 CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000 @@ -258792,7 +258803,7 @@ CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69 CVE-2024-43482,0,0,6e7c134aa469a60e780cabf13e44734b4c5f233def960d877a7b1678a97c618a,2024-09-10T17:43:14.410000 CVE-2024-43487,0,0,dea08ba1cfb3ff23b9368f43188bc90a9104601ab6b01d42181bcb8180caaef5,2024-09-10T17:43:14.410000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 -CVE-2024-43491,0,1,37fe05c22abdf1d326c34d252b46db011743ef2e3b433e1b786335b3cf27a95b,2024-09-11T15:14:57.713000 +CVE-2024-43491,0,0,37fe05c22abdf1d326c34d252b46db011743ef2e3b433e1b786335b3cf27a95b,2024-09-11T15:14:57.713000 CVE-2024-43492,0,0,3dd12071c651e27e40ec4fb50ba07efcfac4fe4f70a8035620f06f9e51f7d211,2024-09-10T17:43:14.410000 CVE-2024-43495,0,0,4562605b4a917b204e73ac08fedfd131430061e6ccf42153383db64c34a941ba,2024-09-10T17:43:14.410000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 @@ -258817,7 +258828,7 @@ CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74c CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000 CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 -CVE-2024-43690,0,0,d5dba6343f677c0d99cf97c9acf2ba7c1283eff80e211b0a540a7ffa8f3948f1,2024-09-11T05:15:02.843000 +CVE-2024-43690,0,1,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 CVE-2024-43700,0,0,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000 CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 @@ -258844,7 +258855,7 @@ CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373 CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000 CVE-2024-43791,0,0,18a538447f1bfb3e89861cf1face98eaa416fbdf0215aa1ae07d7c4291ab5da0,2024-08-23T16:18:28.547000 CVE-2024-43792,0,0,b68e8edf32a9774ca7956d98971b6e48a84222a074d5236fa04ca99723a43141,2024-09-03T12:59:02.453000 -CVE-2024-43793,1,1,353006df5ef013deb61294b16f11d2cad3405598f2720a19aadee3c664c7e0d8,2024-09-11T15:15:17.017000 +CVE-2024-43793,0,1,8868ce7d603d68d97e64f7341f91401aac067debbdecaadd788c434bfd06d2ac,2024-09-11T16:26:11.920000 CVE-2024-43794,0,0,012282e0e09ace65c9817dd3efc52ee0130360e07c8e8e9b08cf3adc91c29f00,2024-08-23T18:46:31.730000 CVE-2024-43796,0,0,54b96855e5d63cdb349a0290c412f56c2ecc23a826df801184d24d561b0cca75,2024-09-10T15:50:47.237000 CVE-2024-43797,0,0,49c9a973cc996682928c758b2e25b53418f3cc9cde12f87e23b31ad352f6dc89,2024-09-03T12:59:02.453000 @@ -259035,11 +259046,11 @@ CVE-2024-44085,0,0,388300037fdfaaf78c002cc7963ec532b366316a773d7512847e1899154e3 CVE-2024-44087,0,0,9347ed429cee1548d21348e65950e40f41756fec3dfb3e096ea0331b40b59ec8,2024-09-10T12:09:50.377000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 -CVE-2024-44103,0,0,aae371d3e66dfaae0acedb4a21b3b6f2ba50730cf1aae3318966258f35de85db,2024-09-10T21:15:13.547000 -CVE-2024-44104,0,0,5b144e0284adf5a3d0a3dbd3b272dca97616d6f4c85ad9369ee2aeb396b3565c,2024-09-10T21:15:13.727000 -CVE-2024-44105,0,0,a86f95e3d4cfa098645cf278bdfbd1123e0082ad091b6164946df7557bfaf704,2024-09-10T21:15:13.917000 -CVE-2024-44106,0,0,d7a54fb6fa863ed7dc6d748f4f6e4f1408b3ac490b0c07efeee9bb9445f354b0,2024-09-10T21:15:14.110000 -CVE-2024-44107,0,0,cd4d93565fa76021b10f1f1869466a3e4fc89ba041f89be086ad7271a1fd4574,2024-09-10T21:15:14.283000 +CVE-2024-44103,0,1,4b2c6c88049b64ec95a93e5510922709900ccec94c2a5fa27a5b08f2a33f0f3d,2024-09-11T16:26:11.920000 +CVE-2024-44104,0,1,ea088efdbbe7cf1194706f688c34025c429e0c147a472c31fd0d1d86825a3e42,2024-09-11T16:26:11.920000 +CVE-2024-44105,0,1,56215c6dc92edc1f80b184309ab6ee5c60f9dc435e22913b00f7750c89ce3daa,2024-09-11T16:26:11.920000 +CVE-2024-44106,0,1,5dcd6efcf526df943aae83867b29ed3eb527ac5414bdc4e3827a55c1715d3d34,2024-09-11T16:26:11.920000 +CVE-2024-44107,0,1,a195a179a329c0abce75d89e7412dffa95d915819c2c22786ab184dddc996455,2024-09-11T16:26:11.920000 CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000 CVE-2024-44112,0,0,46e9052e9d2fbba9fe30caa56d92dbe146fc7379f395caf8a525d2f27da5bf55,2024-09-10T12:09:50.377000 CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000 @@ -259098,6 +259109,7 @@ CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17 CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000 CVE-2024-4445,0,0,bc137eb49d08335d8d2b32a3f413016c50b301d09f6a742095c80df385aba82a,2024-05-14T19:17:55.627000 CVE-2024-4446,0,0,1f8054153546c06c7cecced2dcd2c53333dc96b1e8806f72a87d7ba3a2b74b3c,2024-05-14T16:11:39.510000 +CVE-2024-44466,1,1,bae220e1cf2aed74a1158a5e28209fa62a066bb55241d1569f7fad2bc7004fdc,2024-09-11T16:26:11.920000 CVE-2024-4447,0,0,6d3e3c1756d4e08bcee828a8b84f5006760edf12deb78fbda02ebad4895c5e50,2024-07-26T14:15:03.287000 CVE-2024-4448,0,0,ff015519e7eac6c0276d907449baafc4f7a351376bd8c68f68eb22730cad6ec7,2024-05-14T16:11:39.510000 CVE-2024-4449,0,0,dfb61d36a2fe2d114407086a514e9ce225e4230ccc913df40322e3ba386dcfdc,2024-05-14T16:11:39.510000 @@ -259119,6 +259131,13 @@ CVE-2024-44558,0,0,6d87f392eda09922944831aa9fc2790f469b514dece92bfccefe48ebd558f CVE-2024-4456,0,0,4944908816b0dabd168db28a33c87155bafc589f1ccdd7f87c25aad569cea442,2024-05-08T13:15:00.690000 CVE-2024-44563,0,0,6dbd76e0f089d60e056938eea08be0958b9b4b0e2739be9b2567dba585143e70,2024-08-27T13:43:26.300000 CVE-2024-44565,0,0,e25f465e010d5d48f951ee0faaea27800251f5ba71d3aee72b61ca7f81604b74,2024-08-27T13:43:46.897000 +CVE-2024-44570,1,1,9ebcffd151f7846c67c3d6001550f1e37a943275b5f1c376985d43ab36b37448,2024-09-11T17:15:13.580000 +CVE-2024-44571,1,1,ef85b31db147780f9598841f55844393cf9d0c1cb4ae756e882db45f52c07eed,2024-09-11T17:15:13.630000 +CVE-2024-44572,1,1,27e976c23cdcc669727541f7120a9ab12403007b609050ca4f5f2e2d56da4590,2024-09-11T17:15:13.677000 +CVE-2024-44573,1,1,7242faf05c4f1c037d39722f3b4914401fdedb1c9e7c42f6531ce97c4400dbe3,2024-09-11T17:15:13.727000 +CVE-2024-44574,1,1,2d0ccc7a3fb39628eefe4a1a57bc161212b0c16a640a0ab15be2766043a955f3,2024-09-11T17:15:13.770000 +CVE-2024-44575,1,1,a8140e390cb9941c799794b1f49a931df6d1065cf22c54dbf069792986bb04a6,2024-09-11T17:15:13.820000 +CVE-2024-44577,1,1,f19b938b04f52332d328db7495a77a1c9c76537546987e6c0a348e3e589e544b,2024-09-11T17:15:13.870000 CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000 CVE-2024-44587,0,0,df65b03ef618d179da9d66b0f4fc4c4e495ab75863a2207f1a4d99901686f98d,2024-09-05T17:44:56.007000 CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000 @@ -259126,7 +259145,7 @@ CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82b CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000 CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000 CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000 -CVE-2024-4465,1,1,8894db419445d251a6c8ba45b3293cf3974da7f37a4c5f99aa8250e84cb0d0c6,2024-09-11T15:15:18.490000 +CVE-2024-4465,0,1,6ab54ec2af40a5074ac635980c4e37d6771e8e0e174afbf300c8bf29a7119fe0,2024-09-11T16:26:11.920000 CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000 CVE-2024-44667,0,0,b61b8b7f4b0f023a3cf984e8e71bd0ad0b5453c3098b622c65b24b441139eef4,2024-09-10T20:35:11.007000 CVE-2024-4467,0,0,ee2f9bc5bbc36c26f38005024ca97c3b21da7805a59dcaa3c6665d23fa511c53,2024-07-23T16:15:06.377000 @@ -259181,10 +259200,11 @@ CVE-2024-44837,0,0,af289e308b7ef679646ea84b321f67c69f09e8e064f0783e312580da95500 CVE-2024-44838,0,0,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000 CVE-2024-44839,0,0,885e68fd6f69d801656f2631b61b0e83db0adf5a0433070a496847aecb0b73e1,2024-09-09T15:35:10.797000 CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000 -CVE-2024-44844,0,0,5a31eef3db587dbd4e8e33d1e8906b3db8729d948677a23008aee00cea007726,2024-09-10T17:15:37.253000 -CVE-2024-44845,0,0,c8b720907e24d54e53db80e51beee6689261c4bbcd58757f11a6d45a8f995f7b,2024-09-10T17:15:37.347000 +CVE-2024-44844,0,1,9a842d2ccc13cfeec48302b3fab56c94809bdeacb97203bcffa4142815eb0821,2024-09-11T16:24:51.660000 +CVE-2024-44845,0,1,7b8af4da752a353dddb0d36056e69b091482efdc2b25ab0d63b311a81324d2db,2024-09-11T16:24:23.970000 CVE-2024-44849,0,0,ce27bdf59af5d49dc0ddbfb4869cd4791b14d41bd57d8cf3964a27ab97b3f16c,2024-09-09T20:35:18.097000 CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000 +CVE-2024-44851,1,1,d633dba3f6de02aa14dcdb8f5bb23b96de119e3a56b321255bbeec3246623461,2024-09-11T16:26:11.920000 CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000 CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000 CVE-2024-44867,0,0,cd6a6afd2f8bf5129300a4aaa71447e1cefe42047245db3824a71c8f9b607a2e,2024-09-10T15:50:57.713000 @@ -259293,9 +259313,31 @@ CVE-2024-45005,0,0,e451b7c2f4add710887224d994f9dffc8ac56adf3dcc9794335f8f3deeed4 CVE-2024-45006,0,0,5452c1a79742ccdebb367ec30c38e9d482e8d0678948443e98ba439908eac48e,2024-09-06T16:26:52.640000 CVE-2024-45007,0,0,9c51cc66379cf576bcd17f9e957329cedbd34ee23634a31bf340e6e230dd369f,2024-09-05T12:53:21.110000 CVE-2024-45008,0,0,37dc0718d2dd8ba9fb7eca159ff733be9b954368896d4dc7e665604ee4c36c7c,2024-09-05T12:53:21.110000 +CVE-2024-45009,1,1,adb49a5b34388a2f7b501c0b9e616f97e567ff9f5df6c5a95d04c50bfbe529fb,2024-09-11T16:26:11.920000 CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b2205353433a,2024-06-04T19:20:39.640000 +CVE-2024-45010,1,1,81e9c53dd98ff1a6581f42969addac0a00a7463ca8cf095121d947f59bf76847,2024-09-11T16:26:11.920000 +CVE-2024-45011,1,1,6df01d5595f2a917dea63248c824a1961c33db696ee158376265b5fce4633397,2024-09-11T16:26:11.920000 +CVE-2024-45012,1,1,4bad2f4f195ab90743756c0f765e4e1131704b2409a82d38cdca8adc857121c7,2024-09-11T16:26:11.920000 +CVE-2024-45013,1,1,839bc15fb6a20043fbee603765235fb8d28d24cfd29aafb499bb20041bb22f3a,2024-09-11T16:26:11.920000 +CVE-2024-45014,1,1,9941358f0269bc921b7f9dc177faa2d6ab113ac4a605e5461e70e784cee96ee9,2024-09-11T16:26:11.920000 +CVE-2024-45015,1,1,b3fc465159fe2fd139200dd2141e3af0aae775beb407266dccaa6dd46db872ef,2024-09-11T16:26:11.920000 +CVE-2024-45016,1,1,21aa982feab28592a123d701cba224c60de4805153ca92a42f918a0ff5a442a3,2024-09-11T16:26:11.920000 +CVE-2024-45017,1,1,fc45af8b7abe17cc8a404e81229ebc8a2fa5ae27163952e0241d96ecca5bc1a6,2024-09-11T16:26:11.920000 +CVE-2024-45018,1,1,2660c5fbd5a8270a2c549c50aa91a6ac93e05089a55be4cea285a7be5c76a686,2024-09-11T16:26:11.920000 +CVE-2024-45019,1,1,1a052491ebba065eff841e4bc8d36d2121f77231951f5e6f3e39d81dcb690b33,2024-09-11T16:26:11.920000 CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000 +CVE-2024-45020,1,1,93f1461ad8631c02ecd946a6d67e248b5c5083c474ff07e87fd43d150c8a72a1,2024-09-11T16:26:11.920000 +CVE-2024-45021,1,1,e024da6ca0e02245e6810c1289a4da8acdcbecfd50a05a785cc08dba1eae6083,2024-09-11T16:26:11.920000 +CVE-2024-45022,1,1,d439e7e823f780467dfce4d735457fb4b2fb1545c96c16ce74f1cab1faf240fb,2024-09-11T16:26:11.920000 +CVE-2024-45023,1,1,f1e54aa5959595ac5c8a3bf5c1fb926762659534f2bcb70b24b9012e79274981,2024-09-11T16:26:11.920000 +CVE-2024-45024,1,1,10286caf98fc4f1fac4e6dbe592a8117b241181df8534feb9752d0eb48221be4,2024-09-11T16:26:11.920000 +CVE-2024-45025,1,1,2a8bf981b8a312e2dd1cac95a292fc424d900b82b96c38f31f77fb551a05ee1e,2024-09-11T16:26:11.920000 +CVE-2024-45026,1,1,4fdb583d681de9b20cb984bf9e0a32681cb6afddf5c478a49c203e993b2b5805,2024-09-11T16:26:11.920000 +CVE-2024-45027,1,1,1bfb643abd21142aab51905ce3c47f99c70b2040a2d44edeecc6c8ec790f798e,2024-09-11T16:26:11.920000 +CVE-2024-45028,1,1,3bae2eb526a3cc9f3669c9124d3e733b6a945c3ff3f887304d195f039f87fbe7,2024-09-11T16:26:11.920000 +CVE-2024-45029,1,1,71ca803ff42276b7f64ba3239abcd8d55dd65deadf0086a3bfcabcf26d98b468,2024-09-11T16:26:11.920000 CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000 +CVE-2024-45030,1,1,eb860320ede7d32c5fbe7614296b9a1cdc9c227554e690a03fa02c07ef653ab1,2024-09-11T16:26:11.920000 CVE-2024-45032,0,0,9e9832070815f198bd13b47e9ba247da81e362143ea041571debdd67a5f9cbe7,2024-09-10T12:09:50.377000 CVE-2024-45034,0,0,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 @@ -259429,7 +259471,7 @@ CVE-2024-45314,0,0,47c1d25a326359dbe89a889c7d5cd18acfac2ad247faa78128dabc37aa838 CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000 CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000 CVE-2024-45323,0,0,bf6d6a90ce60904b71685f4c528b1a89b3acc23eb6b2486df987dee7a750f76a,2024-09-10T15:50:47.237000 -CVE-2024-45327,0,0,293c298fc8d618efc7965cb3c16b396b717640319986aba75c501c3ced25d41a,2024-09-11T10:15:02.023000 +CVE-2024-45327,0,1,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 @@ -259453,7 +259495,7 @@ CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd488 CVE-2024-45405,0,0,e0983766e4b3d0668ba058c09b44bc2ee123196af9d88b08813ded0853cf5b2e,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,1459ad14d7127012093360f5f159c85f3ceb60f90c63e19182240dfb68b6c8c4,2024-09-09T18:30:12.050000 CVE-2024-45407,0,0,b5e39243f69f41d41ec4e2c6077a931392bff1e8cd2623fcfe3bfee3724dd70d,2024-09-10T17:43:14.410000 -CVE-2024-45409,0,0,a79840fe0c46defd37e4face481d513dd8201c643fc560883f3447293cd3b14c,2024-09-10T19:15:22.030000 +CVE-2024-45409,0,1,b532308fa10db0806fb2be02b9b417df66cb6c1fd67d91be49d3e55469a4aafa,2024-09-11T16:26:11.920000 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 CVE-2024-45411,0,0,73f9cc9a45fb9019dfacefd1c32caeadc6f839e3ee71584e1458f0e26c536208,2024-09-10T12:09:50.377000 CVE-2024-45412,0,0,fa4bab62e3cf03d7c3565c4ad8afee642f9e36e340a8db661145903e7141fe20,2024-09-10T17:43:14.410000 @@ -259510,8 +259552,8 @@ CVE-2024-45591,0,0,3095138b46301853b277bd15d48e13d638424600951e5440ccaed7e7cbce6 CVE-2024-45592,0,0,a6da3331dabbde48afc9c09a6ca7109ae4814f4878288894284237183ee05f55,2024-09-10T17:43:14.410000 CVE-2024-45593,0,0,b530ea022f2e8e4aa156129a75961f9228743d411d4a1930e0d44cdca74a998e,2024-09-10T17:43:14.410000 CVE-2024-45595,0,0,649b5475221eb6226048e280295a64f14525c165ac46abdbd9b86d52afbd2a88,2024-09-10T17:43:14.410000 -CVE-2024-45596,0,0,45821d3632755e50b9567a02008899ce310b65562369c77277b373a6169d2af1,2024-09-10T19:15:22.303000 -CVE-2024-45597,0,0,1d2481fc071ab72c04aeb3b4234c6b552f5038c15de12e28a47ec5c90364e670,2024-09-10T22:15:01.967000 +CVE-2024-45596,0,1,6e565b4a7c9ad9fc7c8e22389ae667ed11775275e4e8d0d4bae0af105f45843b,2024-09-11T16:26:11.920000 +CVE-2024-45597,0,1,0fad881157bfd299e8512a05afe15ba28f7513c6a1c09923d6036dedef269a28,2024-09-11T16:26:11.920000 CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 CVE-2024-45615,0,0,b9c937a8f973f4733b0499e8694ffb8f8660ef2ac78b4a4d6df66b1c171491cf,2024-09-04T18:15:05.377000 @@ -259545,12 +259587,12 @@ CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 -CVE-2024-45786,0,0,1e51f2800e552501e54f84f7890e4244a157852ad50faf016b15826fbb164d47,2024-09-11T12:15:01.943000 -CVE-2024-45787,0,0,df2a254d3dd9d335ff0689dbf78f6fc90bc901f29c7554e5f71a026e8c14a4f7,2024-09-11T12:15:02.123000 -CVE-2024-45788,0,0,bf5cb0a1301ea8795306508b807b0d01ed1cc9aeb38406ecfc15f2bd9a20a764,2024-09-11T12:15:02.230000 -CVE-2024-45789,0,0,5eab860bd807baf16a48b4ba233f442d623103f5ad5e7c843c4e6ffc67aaf8e6,2024-09-11T12:15:02.343000 +CVE-2024-45786,0,1,cd3289d0eb068d301b9dbe3c4060bb2f7c58d92181cad55cede7171bddb69cd7,2024-09-11T16:26:11.920000 +CVE-2024-45787,0,1,11f9638d50566a7537254738148334fb9cd3ac8f2d3be39127f2c3c16399f535,2024-09-11T16:26:11.920000 +CVE-2024-45788,0,1,9078fdb38177afa8f8644d2827934dc5de472b66569ece7273dd5f111d83300f,2024-09-11T16:26:11.920000 +CVE-2024-45789,0,1,ee8ab25976d0f58596bd8ebd4c4b59df7b4375cfbc2c6a47b483666301808be9,2024-09-11T16:26:11.920000 CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000 -CVE-2024-45790,0,0,6967b2da75e4637816c1d647db7823440be6a9b9e74681b1410d31ac940fa90d,2024-09-11T13:15:03.290000 +CVE-2024-45790,0,1,bc78a0525fb1c487c69a01d2acc05058c08f308e130aa06c5852c7814b827e01,2024-09-11T16:26:11.920000 CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000 CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000 CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000 @@ -259629,6 +259671,7 @@ CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145 CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000 CVE-2024-4666,0,0,574e789fc18a09e540199055631026983551e2de180e4487a378ddd991d469a5,2024-05-15T16:40:19.330000 CVE-2024-4667,0,0,5f6a087811f370dc89d31ef88ad63586b7ea4db405d3be18d05609409a87488f,2024-07-12T14:25:13.923000 +CVE-2024-46672,1,1,06a7e230f728789568c6fa3a46c71d770ce48f791ddef073d22dd696f3de90d0,2024-09-11T16:26:11.920000 CVE-2024-4668,0,0,ecbe5c3985983203e802de76c9f88e6fca1078853835be834d70b53a54cc9e61,2024-05-30T13:15:41.297000 CVE-2024-4669,0,0,a0976f7ea3148ea450eb6167436e6be2dce8d6ef83862711f573c56cae3ce5e3,2024-06-13T18:36:09.013000 CVE-2024-4670,0,0,08919fb788216a4ef8fb408ade2563afef66ea572b0f16375f44123bc9f15eb1,2024-05-15T16:40:19.330000 @@ -260184,7 +260227,7 @@ CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee6972986 CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000 CVE-2024-5288,0,0,099c1d3c2643003d52a5f473484a6d38731263e3329a5baa027f91acf149389c,2024-08-28T12:57:39.090000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 -CVE-2024-5290,0,0,adacdfd631af0a2d0e8f586387cac872823eb4764e0466b1013d4b9bdcf14abe,2024-08-07T15:17:46.717000 +CVE-2024-5290,0,1,0a95f22ad4ca19078d58667b8e42f3f07de6161be21492c25c9011c22806f9b1,2024-09-11T16:15:07.903000 CVE-2024-5291,0,0,a73212295ca40d57df3fe276c935be7cf4995dc49a26ea7361780508749e211f,2024-05-24T01:15:30.977000 CVE-2024-5292,0,0,46d8600092b67d78419e8396a0475f44ad2d697d614c735fcdb066f1cf0c44cc,2024-05-24T01:15:30.977000 CVE-2024-5293,0,0,a0cc00d9353625760ac0d77b1ffd0d6d05d987e18d154ce46567c1580d6373f0,2024-05-24T01:15:30.977000 @@ -260201,7 +260244,7 @@ CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d002 CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000 CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000 CVE-2024-5307,0,0,9f60aac251e2e03d9552a0394a9c798214f03b8e43e7cbb0dd9de3359653dec5,2024-08-23T15:00:25.687000 -CVE-2024-5309,0,0,87bb5a0f05039dbdb9d431578ddbe3aac073a0b1462fd876f4a5fea33988fbde,2024-09-05T12:53:21.110000 +CVE-2024-5309,0,1,c9aea77aef389557d90d6203c5980313f972101a7c87b26eeedeec9679d42fb3,2024-09-11T16:33:17.950000 CVE-2024-5310,0,0,be68f6d898e4e59f65162318c0ea0836be8ef675c080dff90d77e5a0c98b0b1e,2024-06-04T19:21:04.583000 CVE-2024-5311,0,0,4e4e9b4edb642fa4d04760ded51b93254fd12f5bde190a96e2c1818c58cf4797,2024-06-03T14:46:24.250000 CVE-2024-5312,0,0,18bbe6bd336686ff14003841f43dce1a45b7d1ab8cfffd6fca5539a180b7243f,2024-05-24T13:03:05.093000 @@ -260301,7 +260344,7 @@ CVE-2024-5412,0,0,5e7f5482cbb5bbe521f2cd5ff48f80c18806840859b33baffa51a21bf41b87 CVE-2024-5413,0,0,b448c8c4fee794a9903e33e6c17f07ddeb3dd7c0bc677024b75809ef047d2c8a,2024-05-28T14:59:09.827000 CVE-2024-5414,0,0,08acc305e6c9bea4a9589fa3dba157ea62649fb0f8c0ee74aad6ddc09386f1c2,2024-05-28T14:59:09.827000 CVE-2024-5415,0,0,d8ba178a70f3cfb2a3911a07d12ef045cc2ca261b5b8d85db5edc9c9636eef1e,2024-05-28T14:59:09.827000 -CVE-2024-5416,0,0,351ca4c54096ecdc60b2eb8eecfbe8c51eb1d79a0005ec1515fa3b85106ff8f8,2024-09-11T12:15:02.463000 +CVE-2024-5416,0,1,6badaf017176dee6e3d1fd6572306777e356a081fe5b1ec36f55124ef760a2ea,2024-09-11T16:26:11.920000 CVE-2024-5417,0,0,01bd3938be19cca64eaa77290da7c3ffd83017b5f678edc0fff2e07084c72a75,2024-08-29T20:37:04.023000 CVE-2024-5418,0,0,a687af8fa8fe7200b6255f9fba7bdce69460001467d8b2873093024e735e15d4,2024-05-31T13:01:46.727000 CVE-2024-5419,0,0,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798db,2024-07-03T15:43:09.450000 @@ -260361,7 +260404,7 @@ CVE-2024-5482,0,0,3b1b42d732a855ed8e91ef26579f45fec6ebdee965d18872f2c0403904f8cd CVE-2024-5483,0,0,2e97255179d42c1fdc159b28df8a118b6b7a66fe00e7310d283bd122fc23ff3b,2024-06-11T17:19:17.143000 CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,5ff776ceb9b311264eb0a3fd1aecab1cf4920b9e3fce511521464a36e3b91a61,2024-06-04T16:57:41.053000 -CVE-2024-5486,0,1,481b714394676cd979e069fb0d35cc20dda9151861a01d0e696c9f0623b16041,2024-09-11T14:23:55.573000 +CVE-2024-5486,0,0,481b714394676cd979e069fb0d35cc20dda9151861a01d0e696c9f0623b16041,2024-09-11T14:23:55.573000 CVE-2024-5487,0,0,603a9f7b9f0723e5fc42b5dbe6b305c40aa06a72aafc0fdd27e92237c27fc66f,2024-08-16T20:22:51.930000 CVE-2024-5488,0,0,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 CVE-2024-5489,0,0,855f98d82c4255d7a1decf5a548f61d8944b9bffb6e3f6a5299c190e758f26a4,2024-06-11T18:15:01.617000 @@ -260584,6 +260627,7 @@ CVE-2024-5756,0,0,8f9e9c6b47319f2e6056e0eeab0b95c7967e08ebf1f00846244d8a548a26a9 CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000 CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 CVE-2024-5759,0,0,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000 +CVE-2024-5760,1,1,13257824bb9973aea9b1563c5213fcd5d1d2948ad21acdf31d77120bdcd9ef61,2024-09-11T16:26:11.920000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-5762,0,0,d5bc2d8a653cdaa83874769146506405c53a3f453aeae45d89ba66c89c40de90,2024-08-23T16:43:19.497000 CVE-2024-5763,0,0,d5febd3ba0b5169f42bc622129fe03814ec411b220c3b4a777b37231365ea7a6,2024-09-03T20:31:30.480000 @@ -260852,7 +260896,7 @@ CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f65 CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000 CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000 CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000 -CVE-2024-6091,0,0,acf47fda090e673b0bbc0c585f8752f8999d0312da0d491ccc12fd53092d9f43,2024-09-11T13:15:03.440000 +CVE-2024-6091,0,1,b5be6c79b304493ff02860d7d9872e5ce29e0560d1ff30428f8a9aaec56892f8,2024-09-11T16:26:11.920000 CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000 CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000 @@ -261188,7 +261232,7 @@ CVE-2024-6498,0,0,1ed281221bc697855933115a42dfe940bdc52a0072d0e3695abed7f798c88a CVE-2024-6499,0,0,692791d166e405b753065debb373657f70139bba5a26e85530dc737d8a19a270,2024-08-26T12:47:20.187000 CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 -CVE-2024-6502,0,0,4fc5956c8379dc1c951c1db7eac0edb9110d7a11b3cf96933cf800d394cd47c7,2024-08-23T16:18:28.547000 +CVE-2024-6502,0,1,7304740865a2d9646b306af4eab2981d10cf59323822892a921ddddc4962ea79,2024-09-11T16:49:28.650000 CVE-2024-6504,0,0,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe32472b,2024-09-10T13:53:28.387000 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 @@ -261426,18 +261470,18 @@ CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee6 CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000 CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000 CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd69630e,2024-08-01T14:00:44.750000 -CVE-2024-6835,0,0,3165e681a9ea2e444ee96ca49c0cd059d5708ccec2fca01dca61b4e69f2dc31e,2024-09-05T12:53:21.110000 +CVE-2024-6835,0,1,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de97130779,2024-09-11T16:32:16.247000 CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000 CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000 CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 CVE-2024-6849,0,0,e6f29da7a266dc9f2d47ff3eb73c4709c5f498e6b954324661269c57220502c9,2024-09-09T13:03:38.303000 -CVE-2024-6852,0,0,464c3b23d65dde38efd76e2eabd88159476e386bb892c6776fc7f9334e1004e5,2024-09-09T20:35:19.300000 -CVE-2024-6853,0,0,e2477f0570ce86cf16fbfc209f62802317aa3481f100a12a4b6b21b1729559a3,2024-09-09T20:35:19.540000 -CVE-2024-6855,0,0,b12f7b76a5b2a7e91847883bdd89b6e5cf006bda162a7f260d19fa8a2019be3e,2024-09-09T20:35:19.770000 -CVE-2024-6856,0,0,f2f26d726a21141f529597f9cfae0a5b87884bf27b2d0c66e198555038059933,2024-09-09T20:35:20.007000 -CVE-2024-6859,0,0,9aac1eb7dac599bde89391b55893d8097d2e282428d96383e25d7fff7259c302,2024-09-09T20:35:20.260000 +CVE-2024-6852,0,1,cd867431022b85ee5515b69c46ab068b7525885927be7fa9cfc4c875a9f47878,2024-09-11T16:23:02.500000 +CVE-2024-6853,0,1,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c118,2024-09-11T16:22:18.850000 +CVE-2024-6855,0,1,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000 +CVE-2024-6856,0,1,19b5d479e1e69973e8f497d2ae00f38aea8ffd7644169a9718f707450440aae4,2024-09-11T16:20:45.503000 +CVE-2024-6859,0,1,5a84bd798224932fef849d8b4793f644b651b362a6172317aad467bf1bad3991,2024-09-11T16:19:18.517000 CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 @@ -261458,7 +261502,7 @@ CVE-2024-6890,0,0,a4b61d6d84db517405e5620d04c7a39034adaee98aaff7a0c1a327ff7affb4 CVE-2024-6891,0,0,0319d5fe5c9f95304d92792a4ec9eb62a36bb2ecf00a0444185d206c61336dba,2024-08-08T20:53:26.090000 CVE-2024-6892,0,0,e4d4a45dea5ac3bfd3178aff9cd146ed7228dfe66d6dd24031916d015c098554,2024-09-06T16:33:34.360000 CVE-2024-6893,0,0,07759fcd96135a135ba512fb22253857e5bc78dc38f1fd228c0dfc24706d33b4,2024-08-08T20:53:37.443000 -CVE-2024-6894,0,0,e90d8411ca1fec0f49abb2aa217432801eb50bc86eece229d0b385c805db8c82,2024-09-05T12:53:21.110000 +CVE-2024-6894,0,1,f12790db6db76820d5802f2dd93995060db8181fe516a01f07594252b980b157,2024-09-11T16:36:03.347000 CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000 CVE-2024-6896,0,0,5408a7e80aa3e88cd45cfede99bb9ef131493e304d3dbf46fdd9905f82d27439,2024-08-08T20:06:25.957000 CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000 @@ -261475,8 +261519,8 @@ CVE-2024-6907,0,0,9c6270ce9f9c570726d59d5bb26a5447e18c4636767aab7051423d31252e8b CVE-2024-6908,0,0,39238ceecec75ca0113efef9ebf9de02325a2ecd066a43e78f16c4451849b776,2024-07-22T13:00:53.287000 CVE-2024-6910,0,0,f2ed544b366d5f927a78e194a0d7c1a8783c058f2e24ef5344fdc371d00f4827,2024-09-09T14:35:08.260000 CVE-2024-6911,0,0,aa647c1658e2d4e783839beaa9775eebc4c2281eddb71632c02cadc423b2c344,2024-09-10T20:56:55.167000 -CVE-2024-6912,0,0,3c65faab1f258fca4a54b1dfa1909614385f3b9406f126d28351856c324b7a3b,2024-07-24T12:55:13.223000 -CVE-2024-6913,0,0,a1e0a3537af4550f8eea980e4a1a05a6857aad018f9d3be30c6504fe1f19569f,2024-07-24T12:55:13.223000 +CVE-2024-6912,0,1,aaef278c6c6a1c27db86e96f2155c524d462972ebf60632f0a5c612a867c9412,2024-09-11T16:56:52.583000 +CVE-2024-6913,0,1,7162d90f78a0110ad31b607d8365d04160b9ec08c6c4a054f11cf6cce082b9d0,2024-09-11T16:58:36.607000 CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f7672f,2024-08-06T16:30:24.547000 CVE-2024-6916,0,0,c704088f9dee3dcd44639fed9c5b3af47a62dc7a88e4f3c99631e528254d2a2b,2024-08-23T13:44:38.453000 CVE-2024-6917,0,0,4e02075ee95758cd510fbf6b3750273e9262615bb77e37c7873232af68d2c294,2024-08-13T17:14:51.100000 @@ -261486,8 +261530,8 @@ CVE-2024-6920,0,0,744aaab347ce054c640620e9d15a192dc28f2121833a3843e0cf354f2c0d44 CVE-2024-6921,0,0,fc130b18365e3f25f9898f5e73006c1589c6e414f2e4023eec1353ee7665721a,2024-09-03T12:59:02.453000 CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000 CVE-2024-6923,0,0,0cfbd144d08a5d679110992f45e4be991e6cd9826e8a45ed46231797910890a0,2024-09-04T21:15:14.567000 -CVE-2024-6924,0,0,bbcacf88af2b0ae00d8670943e9b5c33e17b616aec8da8351ae30fc54a854106,2024-09-09T20:35:20.500000 -CVE-2024-6925,0,0,c5dcb5a15a3e00b708a97d3592e5640214567c9793f94ecb10d48bf9bb5011a2,2024-09-09T21:35:16.723000 +CVE-2024-6924,0,1,6947ace9ca6d514a5d456dd2a9068c28441adaf1914c8efe38bae12e75752dfc,2024-09-11T16:15:30.750000 +CVE-2024-6925,0,1,a5a12bc5a2ee9232c227f40ad6ea986ccef3d40fedc40c2c7add12df1c65a1e7,2024-09-11T16:12:24.103000 CVE-2024-6926,0,0,8f7a980eaebe48aff3a265873ac088d8aab7ac9e61e313ad47eb901f8ccee0e3,2024-09-04T15:35:26.253000 CVE-2024-6927,0,0,e148b46f63346622a06f6186d016b89227da86b491e3aa4a6ce8be2d756e1768,2024-08-29T20:37:07.310000 CVE-2024-6928,0,0,04e0edb45267f653103b1b4b8ed00c7e0e3fce07f9c3ed23eb9bfbde1bd8f41d,2024-09-10T14:35:09.507000 @@ -261539,7 +261583,7 @@ CVE-2024-6977,0,0,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdf CVE-2024-6978,0,0,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000 CVE-2024-6979,0,0,c462ab441dc6fef278b8d322b06d9bbe90e009e07f8beeb96cea48ccdc45139d,2024-09-10T12:09:50.377000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 -CVE-2024-6984,0,0,b8a735678309db6c41dda49955522d6536b87529616b3c230cb8ef59ce9a0d3f,2024-07-29T16:21:52.517000 +CVE-2024-6984,0,1,923e45bdbdeb390a80e72f79f52c794d2a4658d69ca6fdf4fb6edad3e12c000f,2024-09-11T16:39:37.253000 CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000 CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000 CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000 @@ -261601,9 +261645,9 @@ CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b CVE-2024-7094,0,0,d8ce6991dc787cf1fc8f383d7f348b0cc8c833a282f09c60355b50a58a302aa6,2024-08-13T12:58:25.437000 CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000 CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000 -CVE-2024-7105,0,1,46f1c8544843abdf42260f92967cf768f61b8f943bd2d80ab65735c61cbf36f4,2024-09-11T14:15:33.063000 +CVE-2024-7105,0,0,46f1c8544843abdf42260f92967cf768f61b8f943bd2d80ab65735c61cbf36f4,2024-09-11T14:15:33.063000 CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000 -CVE-2024-7110,0,0,9b9899ab9a076505d5400f355635cfb4596e4ab9bafde6af0c4935a9a42e51c1,2024-08-23T16:18:28.547000 +CVE-2024-7110,0,1,a4d256798386bbcae63cc631884c30e79e65250cc4557b1041a9bd821ab24cc0,2024-09-11T16:52:37.847000 CVE-2024-7112,0,0,474bbbb8f9446efab95c911967f261958e6c94f0135cf265bf07458c886aeb9f,2024-09-09T13:03:38.303000 CVE-2024-7113,0,0,0a8f4221b6e071d6c72a8ad7c45f4c251b092637dae636c0dfdbfb44a73d4a6e,2024-08-14T02:07:05.410000 CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000 @@ -261671,7 +261715,7 @@ CVE-2024-7189,0,0,ff23bad07ab6275204285dcbecd341c53e0f43077ff255ee222be124d95deb CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000 CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000 CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000 -CVE-2024-7193,0,0,100f0e372a51f9ebf9cc6dd6fce29de027a8161e36e53af1fafa253e18132f62,2024-07-29T14:12:08.783000 +CVE-2024-7193,0,1,dd80ed0d2df4634fbcb8c6fe154f9a55283158b63bfb6074f48bd9b87a10cf87,2024-09-11T16:47:59.613000 CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000 CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000 CVE-2024-7196,0,0,aa78bda25303d7508f05178076eb7f1847a629e60799ff5c817fd6b3a1be9a5a,2024-08-12T14:36:00.460000 @@ -261682,7 +261726,7 @@ CVE-2024-7200,0,0,562ee7e89d7efcb6c366bd01f0dce90b526172f7ec9c4cf62a24dcbb3dc30d CVE-2024-7201,0,0,1b3cb7aad7ffd235e48894146184958d5ab2d269203a9f5f6e8c5c375198584b,2024-09-10T21:16:34.543000 CVE-2024-7202,0,0,cd873862dd9c581add7def3fb09e4d862139cb04eed28a9bf2f7047259aa2b37,2024-09-10T21:11:59.230000 CVE-2024-7203,0,0,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000 -CVE-2024-7204,0,1,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee3314,2024-09-11T14:23:45.127000 +CVE-2024-7204,0,0,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee3314,2024-09-11T14:23:45.127000 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 @@ -261693,7 +261737,7 @@ CVE-2024-7214,0,0,3a78281a383bf44c352cba681f12759123f996c9d59985652a6e46e161f7ed CVE-2024-7215,0,0,1ccd67c4053d473d76bae939b895612b63aea586e844e49a089165eb2effbb7c,2024-08-06T14:20:22.733000 CVE-2024-7216,0,0,235180a54ea7f2ef077cfee27bcc7d839591542d508b94dc70e3dbb3739843eb,2024-08-06T14:28:51.927000 CVE-2024-7217,0,0,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000 -CVE-2024-7218,0,0,7b978bd6c29a8a5026dc7be3ea03922dcd3292677568b70d463d29f04a02aabe,2024-07-30T13:32:45.943000 +CVE-2024-7218,0,1,fc640932ce9b417e54fc5bb2b2187af66262307b66d85e06d2f60a28c5fa15b1,2024-09-11T16:06:10.570000 CVE-2024-7219,0,0,4d519d170b1c51762fe4fa72f5a7b1fdedb52bc8828c8d6bb4a10f468eeb941f,2024-08-23T14:14:12.883000 CVE-2024-7220,0,0,e3590840b9bbf9e5cc7c3bbba6d698ce62553f807069fceee7e6e64a56a99d19,2024-08-23T14:15:37.363000 CVE-2024-7221,0,0,91364786dd57514521ef9df7d9a02aab371dd4b0f0fea8cc17ce30c56001d60f,2024-08-23T14:15:55.353000 @@ -261756,6 +261800,7 @@ CVE-2024-7308,0,0,ff0d49d6715bec6a8fa55cef81ae277660d9ae735dc8eb5d8914001060fb38 CVE-2024-7309,0,0,0631cf8eb1a47dc64ba800513d438efa35db01116b03be489171df88adabbf79,2024-08-13T15:00:09.397000 CVE-2024-7310,0,0,47e814cc1f6c23f028dc19cfddb4fbb249afc7dd33c54329c346df582cc3dfbb,2024-08-13T15:01:01.970000 CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda21,2024-08-13T15:03:33.910000 +CVE-2024-7312,1,1,5ec606da46116c6d6318dbfcd73d1cc293b5d83b5f48d82e1ace064b06b976b8,2024-09-11T16:26:11.920000 CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000 CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000 CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 @@ -261763,9 +261808,9 @@ CVE-2024-7318,0,0,f09874cd7aabccf109b6b616f964ca583d92ddef6e5184a27f7c244dd00dff CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000 CVE-2024-7320,0,0,a6345ced50bd1b25dc54bd951c2133e1d51c039a215f4119dbfe976f4ac4ed65,2024-08-12T16:47:36.887000 CVE-2024-7321,0,0,42cb7d687a3ea14a5f795d2e8dc1d36894e3cc4a44b6104596b7ddb427645e4e,2024-08-12T16:49:01.887000 -CVE-2024-7323,0,1,32d3f5cc66e0a9c10f985d2976b96494dd80ce13754e7e5d1a52713a0319dd02,2024-09-11T14:22:46.903000 +CVE-2024-7323,0,0,32d3f5cc66e0a9c10f985d2976b96494dd80ce13754e7e5d1a52713a0319dd02,2024-09-11T14:22:46.903000 CVE-2024-7324,0,0,095fe191ca170a7ec3aafa46faf9007b467b7e450c1bcd7d0af0a45c400bd246,2024-08-01T12:42:36.933000 -CVE-2024-7325,0,1,15704cfce1c4497aa20669e5e083483cd07e8c77c6c6df6c4f8ede9406d6f1b9,2024-09-11T15:42:50.473000 +CVE-2024-7325,0,0,15704cfce1c4497aa20669e5e083483cd07e8c77c6c6df6c4f8ede9406d6f1b9,2024-09-11T15:42:50.473000 CVE-2024-7326,0,0,cfe6e3c191b97c1934771d07043ec0c06b2f753ef99e0f76186aace21678e4f0,2024-08-15T19:03:41.457000 CVE-2024-7327,0,0,93bc3f76451ae651bc4cc95aaf37590625e834a0b5eccd18b26422d55be3a3a1,2024-08-23T16:41:50.290000 CVE-2024-7328,0,0,e6c98f125062c3817b9a6e58eed6b1a1c25e930c55618550491c8fbabc1ab30f,2024-08-23T15:25:53.017000 @@ -261846,9 +261891,9 @@ CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000 CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000 CVE-2024-7435,0,0,66fc1a447d06c1e8d0a9056fadb7b0070b6d69677ecdcc565c829d3d11041847,2024-09-03T12:59:02.453000 -CVE-2024-7436,0,1,77bc4c95d4063144d84cdea1af238ebd00099087f7001defb370c91c51096e64,2024-09-11T14:41:56.753000 -CVE-2024-7437,0,1,246b693ce6552391d868b958ff9b746dcace18b15d81fb9e08c275fb53819b64,2024-09-11T14:39:10.557000 -CVE-2024-7438,0,1,65d66999d30651fb81ad54aecd070a638b80c7aab90531d952f997d52e069de5,2024-09-11T14:39:12.583000 +CVE-2024-7436,0,0,77bc4c95d4063144d84cdea1af238ebd00099087f7001defb370c91c51096e64,2024-09-11T14:41:56.753000 +CVE-2024-7437,0,0,246b693ce6552391d868b958ff9b746dcace18b15d81fb9e08c275fb53819b64,2024-09-11T14:39:10.557000 +CVE-2024-7438,0,0,65d66999d30651fb81ad54aecd070a638b80c7aab90531d952f997d52e069de5,2024-09-11T14:39:12.583000 CVE-2024-7439,0,0,204654bc435912bb662e77ea5999fe9bd86ea6af51c6399ec290489bece3b379,2024-08-06T17:46:40.733000 CVE-2024-7440,0,0,62656be9755f0ada2d43a55a5e3a040620a40ed7bbe8af33fb3aed726522eeca,2024-08-07T21:15:41.940000 CVE-2024-7441,0,0,4a0da838a1c1d69cab93448630a4051d1882c4be56020df53067927eac550ee1,2024-08-07T17:15:52.607000 @@ -261869,7 +261914,7 @@ CVE-2024-7455,0,0,601db2e3c344f8919ac22403f9206b02f1ef01887e912751e702c2d237802e CVE-2024-7458,0,0,2c9d4dd630ee9d646df3107c9eafd0e6cad217e61388b41410f8713d27f85974,2024-08-06T17:12:28.250000 CVE-2024-7459,0,0,53c79cef732ccbff6adb36bb342854abc83915346c054d98b70903c7c6347372,2024-08-06T17:14:16.667000 CVE-2024-7460,0,0,d48d1421ea3ce9fda403f952725d01106181045f180d1b45462656996088205d,2024-08-06T17:19:25.597000 -CVE-2024-7461,0,1,3ff1b23b51621f10df1a603b101076d2baf67505e31737b033751ee1d91eebb4,2024-09-11T14:16:06.227000 +CVE-2024-7461,0,0,3ff1b23b51621f10df1a603b101076d2baf67505e31737b033751ee1d91eebb4,2024-09-11T14:16:06.227000 CVE-2024-7462,0,0,2cac77ec17ae20c4dc4e5d7bf53769fdd387d45adec5f3f229688e30e8ff78fc,2024-08-15T13:16:26.113000 CVE-2024-7463,0,0,638cc4f7f70495dee2d171348ad4cef985451fd3918228f4f52868fcb07733ed,2024-08-15T13:15:55.170000 CVE-2024-7464,0,0,139bb5dec916abceb981b7aebc3328ff09288b94e952f0c1eb1a4e05e89a7bfa,2024-08-15T13:15:28.367000 @@ -261879,8 +261924,8 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56 CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000 CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000 CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000 -CVE-2024-7477,0,1,b965ae55657c73e31f78218a320569adb7f93e50d4b13da2aa9ac96583a28b42,2024-09-11T15:03:06.637000 -CVE-2024-7480,0,1,3513e9b1b40322abc4857852444e6547d08e759bdd020204145d34efe837e109,2024-09-11T15:03:37.293000 +CVE-2024-7477,0,0,b965ae55657c73e31f78218a320569adb7f93e50d4b13da2aa9ac96583a28b42,2024-09-11T15:03:06.637000 +CVE-2024-7480,0,0,3513e9b1b40322abc4857852444e6547d08e759bdd020204145d34efe837e109,2024-09-11T15:03:37.293000 CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000 CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000 CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000 @@ -261974,7 +262019,7 @@ CVE-2024-7605,0,0,67c8fd2724983750c2524d5df9b224291891141ea02f33e418eb95d3910d76 CVE-2024-7606,0,0,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed28,2024-08-30T15:43:41.773000 CVE-2024-7607,0,0,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000 CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000 -CVE-2024-7609,0,0,fe4ce2091683a0778b84edd068bcd4a089ac2f114a289d25c822c6fb722f1d8d,2024-09-11T12:15:02.690000 +CVE-2024-7609,0,1,3b083181b2e82ff0d9146a9441e20b4dcd15047270a31f74e11c6ee7b4c0aff7,2024-09-11T16:26:11.920000 CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000 CVE-2024-7611,0,0,db70058b6397d742564fc21e6b8d970c1b2568cab38c9220600047b13074fed8,2024-09-06T16:46:26.830000 CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 @@ -261988,8 +262033,8 @@ CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd70 CVE-2024-7622,0,0,41080b8f1642847053c248a2e34bb5df066f530f68fb68bf2bfb90777306d338,2024-09-06T16:46:26.830000 CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000 CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000 -CVE-2024-7626,0,0,beb44f2e649a132498f80eaf3ea57543e9afe7eae5a6f20393d2b13c7c81d668,2024-09-11T08:15:01.950000 -CVE-2024-7627,0,0,af96392fc36e867c15605b6e1dc599aeac0b5c5d59eb872427406ab6bc591879,2024-09-05T12:53:21.110000 +CVE-2024-7626,0,1,ab4302f2299005b8f4920df30dd87a3008463f5f96c444122c7e8131dd027b5f,2024-09-11T16:26:11.920000 +CVE-2024-7627,0,1,6ac6d3af060539e387faae82d1ad555da11f32786c0cb712e03cd669f141c08f,2024-09-11T16:31:21.893000 CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472cd,2024-08-15T13:01:10.150000 CVE-2024-7629,0,0,45eb45459388d6798e88edee38a7dd2ceac912098ce5cc3a42af5f252bb2fbc1,2024-08-21T12:30:33.697000 CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000 @@ -262060,15 +262105,15 @@ CVE-2024-7709,0,0,4ea4e71ad8cd2325399b6f32c817fafe76ecfe7c20ad1838061c8bb44a136e CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 -CVE-2024-7716,0,1,4cc7d97974e831dea0eb9b00b995782e9f14b0ff3839fdb7356c063f4ada4a9a,2024-09-11T15:35:12.190000 +CVE-2024-7716,0,1,88dfee0136ba1b85a390619cc3563514cfd309aa2ee08edf35baab8e16cdcd86,2024-09-11T16:35:39.790000 CVE-2024-7717,0,0,f37fc224ac1ab42d2f828caf93198cd6646f26bd1e976379d7595c5ee2d24865,2024-09-03T12:59:02.453000 CVE-2024-7720,0,0,71f1c1973f29e2c7c1373dd24daaa52398594a70072a570fc445a13cbea904ba,2024-09-06T22:33:30.767000 -CVE-2024-7721,0,0,736a0354e0ff2c8662b742b8e226621e68d9c82d2526ed26715f8e47a677c78f,2024-09-11T05:15:03.180000 +CVE-2024-7721,0,1,090b95fec086adbdf3c80a25209708a0d2e0eac4e9d870ac260e2f0598b23d50,2024-09-11T16:26:11.920000 CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000 CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000 CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000 CVE-2024-7725,0,0,71c5fab1268c5ae7612b358c83d8e419d390e8fe339c287745de342ed473d1f6,2024-08-21T17:24:59.627000 -CVE-2024-7727,0,0,a80e0c28efde9b787d39182aa83bec78ff9b56d22d4de7c340d7c59dbc767aea,2024-09-11T05:15:03.400000 +CVE-2024-7727,0,1,32048d83d273d0d5287078cddbde149d0601cf2d53c45c9212f835c6f71ea7b7,2024-09-11T16:26:11.920000 CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000 CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000 @@ -262110,7 +262155,7 @@ CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5 CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000 CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000 CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 -CVE-2024-7805,1,1,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 +CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 CVE-2024-7810,0,0,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 @@ -262243,7 +262288,7 @@ CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba966 CVE-2024-8006,0,0,092177f7b5a6e786b0c334d1c1238c9acce1b59320806ff7e04615edaed13d55,2024-09-03T12:59:02.453000 CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68f8,2024-08-23T17:06:04.643000 CVE-2024-8011,0,0,09b8f88c70bda36e1909bf5a8b76b90f81c6ac5370f0078fce3a91e6c9c17de8,2024-08-26T12:47:20.187000 -CVE-2024-8012,0,0,840b9e8ed95ef91b9ce7bbc978efe612d0d204f93f5856cba9c6cd8d19afcabc,2024-09-10T21:15:14.510000 +CVE-2024-8012,0,1,ec38a8cfe2c001bde094ddd5f7c4be066f25190f35c5711c3b0e82f05adbe145,2024-09-11T16:26:11.920000 CVE-2024-8016,0,0,2657510d64afe84d5852969b1e9344475f01e752907a5430dff930bc1f486129,2024-09-03T14:51:16.470000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 @@ -262251,9 +262296,9 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 -CVE-2024-8041,0,0,6cc075dd4dd503d7a64ec1eb36d717de84b169042dbabd262ae9b25dfe6faf7c,2024-08-23T16:18:28.547000 +CVE-2024-8041,0,1,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000 -CVE-2024-8045,0,0,50ed9204773960db5bbb0ed7ee7c40977ef3e955eb5c5d37322386940ddcb649,2024-09-11T08:15:02.170000 +CVE-2024-8045,0,1,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 @@ -262272,7 +262317,8 @@ CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800d CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000 CVE-2024-8088,0,0,8ddda94d9e5d462484d35576871f82a931bed67f85a71db29ea75a996b1d19a4,2024-09-04T23:15:13.100000 CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000 -CVE-2024-8096,0,1,d7dae999ad5c1c45d462caaad3e0a3dea7e619b9242b7da2bcdb9b66907284ec,2024-09-11T14:35:05.603000 +CVE-2024-8096,0,1,33268897f7f8b2273839db6d4e75fbc8fdf5f760a220b507e80b08e690a9edf4,2024-09-11T16:26:11.920000 +CVE-2024-8097,1,1,3eb184d8b5fd365a76bbb6de2d790e1c1ccf799a2e4afcf060bd8a283884aead,2024-09-11T17:15:13.917000 CVE-2024-8102,0,0,59b268e27a6763219f51e9e55e73ae4276fd3b992bf79726ec1ccd845c10f5f9,2024-09-05T13:28:54.747000 CVE-2024-8104,0,0,e0dd7af2b8170ad0cb122178cc67d0512cc1eb1562d671a3c4e0173a78c8b550,2024-09-05T13:28:06.817000 CVE-2024-8105,0,0,fdab1a8bdde46d997c9a9800b483d676df23e449425d94531660960b3c42e376,2024-09-09T21:35:17.320000 @@ -262330,8 +262376,8 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 -CVE-2024-8190,0,0,a05bab868c29a20c517c737a29bdea8f4261b6a44d901ed7eedb8ebe015906bc,2024-09-10T21:15:14.697000 -CVE-2024-8191,0,0,2ccc861e0450381de088e322993d384c30220aeffa615ede7dcaac9a39305678,2024-09-10T21:15:14.880000 +CVE-2024-8190,0,1,c913ae609d6f315b08791f5b03ab9d12b481a5a2f7f6e53851a1c4225976777c,2024-09-11T16:26:11.920000 +CVE-2024-8191,0,1,89f28207fc66a9c0c25f14f92fcfa33e0656470526b8f58e887f07a2b7b85497,2024-09-11T16:26:11.920000 CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000 CVE-2024-8194,0,0,0e377807b4cb936d43f2e66a722c2d573026df321eb087fd34789423400e78c7,2024-08-30T16:34:53.210000 CVE-2024-8195,0,0,e2c9f245569fa16c41c6b46038732dd5c859cc1b5cc745c49e29a7ac77cd37ba,2024-08-28T14:31:24.487000 @@ -262363,21 +262409,21 @@ CVE-2024-8228,0,0,93a2ed289eaee58adcb93cda42520d2efec521ebb9601fd9e70d3a991a36c9 CVE-2024-8229,0,0,b4e82f248689c551a8c2d56510132af8816aa6c16d8f7b5aa18c38850899c5a7,2024-08-29T00:10:09.807000 CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb4e,2024-08-29T00:08:24.643000 CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000 -CVE-2024-8232,0,0,51d7c0f139c54c9b42fe00ad2779e3a5c5c6488995dc7c74a87bbdb32741f120,2024-09-10T20:15:05.060000 +CVE-2024-8232,0,1,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff5273,2024-09-11T16:26:11.920000 CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000 CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000 CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000 CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000 CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000 CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000 -CVE-2024-8253,0,0,0231b8e696ebd1765975461c51b29cd9614ec97ec6de5e357765fb09f852522a,2024-09-11T04:15:05.970000 +CVE-2024-8253,0,1,91918f2cda2657bd2182507d0429f1a8d4a218563516f304bdbf9084cadbf1b5,2024-09-11T16:26:11.920000 CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000 CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000 CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000 CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000 CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000 CVE-2024-8276,0,0,33cf21b53b41316bc2e568f752afa4e96bbe73b4ee966f9832ffdb8137ffcc10,2024-09-03T12:59:02.453000 -CVE-2024-8277,0,0,27dc30ad4604983b0ce55b16a1b14e02c318a944ebc49cb001dadd98383a2dc4,2024-09-11T09:15:02.680000 +CVE-2024-8277,0,1,927cb844bbeb99202846ea688baa5f560a39fb495f1767a0a934290c2ae10e58,2024-09-11T16:26:11.920000 CVE-2024-8285,0,0,44d06284adb5d71c65e8f3277866d5d546f57dcd495152060c7216923cd6bd07,2024-09-03T12:59:02.453000 CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000 CVE-2024-8292,0,0,27ea852dc3661b1a76e4e5c3ea5100bde241ea5a5c464db16708c938d4cf0c30,2024-09-06T12:08:04.550000 @@ -262390,13 +262436,13 @@ CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452f CVE-2024-8302,0,0,73573fb95f4db9829ae46e4068d229d908324e137e6241c89a1030ab338e0051,2024-08-30T13:00:05.390000 CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000 CVE-2024-8304,0,0,b1d6e33c277c4c2a3cea7a584dbe53065d5f96f3f0410bcd4a103e0365afda5d,2024-08-30T13:00:05.390000 -CVE-2024-8306,1,1,7861b95da49f65a68bfefb51368a574640de0d6672bc627b2215b874930b75d9,2024-09-11T15:15:18.827000 -CVE-2024-8317,0,0,14f0c71616d0bf53804a454dd89ddfdc27bbf8ffffc05a1e254c94e626690c0a,2024-09-06T12:08:04.550000 +CVE-2024-8306,0,1,36dd8dd99f329ff35bb21190339432ffc10c69865613b1f46ae78ea6eeb05e39,2024-09-11T16:26:11.920000 +CVE-2024-8317,0,1,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000 CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000 CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000 -CVE-2024-8320,0,0,a42647fa63bf051c5427fba8929a0777a7a013416bab288f4908dbe502947477,2024-09-10T21:15:15.060000 -CVE-2024-8321,0,0,137db34723ce3a8f81154be0269e41e440070d36f0a4021349adcc3e60acd6e6,2024-09-10T21:15:15.247000 -CVE-2024-8322,0,0,559ce18ba5422008e9bc8336a0fbd79cbe09af75a8e15af4dc307ecbd3c3aed9,2024-09-10T21:15:15.427000 +CVE-2024-8320,0,1,891ed7c28649ef0d3ca7507d6e34eedf57e61fccee790e5b42446b6b308c4ca8,2024-09-11T16:26:11.920000 +CVE-2024-8321,0,1,b61800c98acf618636fd22c9aae58d8e2b7279a56d8a81fdd2ac909e90ab1777,2024-09-11T16:26:11.920000 +CVE-2024-8322,0,1,4d34594d208a6fc8d34b69c7ff793fde83a39c88969bb4c0731f4bdd18ad6918,2024-09-11T16:26:11.920000 CVE-2024-8325,0,0,6acbe28b7e23bada826026212a2fb1b0115adaa2c5e690e584f377990b0f6742,2024-09-04T13:05:36.067000 CVE-2024-8327,0,0,6596679653e59e232d9a636653bb7ef76ebcd0b7674f3704360634000a96dff3,2024-09-04T17:11:23.533000 CVE-2024-8328,0,0,108819f537a57d4b33892521031f4d00462659f72abf40066992dd6f06ea1545,2024-09-04T17:11:19.827000 @@ -262421,7 +262467,7 @@ CVE-2024-8346,0,0,b4457249ac6e42b712016be7384df47b946c6e796e6e27191d31db6f56c093 CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3cb,2024-09-04T16:42:49.037000 CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000 CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000 -CVE-2024-8363,0,0,af0962dd51bcebdc887e4ce4a8598e88a5b0ecccc78df75ecf0b87457872beee,2024-09-05T12:53:21.110000 +CVE-2024-8363,0,1,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000 CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000 CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000 CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000 @@ -262443,7 +262489,7 @@ CVE-2024-8387,0,0,0236f6236e30b259f0ad5d7ef58b73e88f9716952aaecf201cfb31f83aed0c CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f97c,2024-09-04T15:49:19.170000 CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000 CVE-2024-8391,0,0,5bd08b18ac433cde09363f315177dc23a8e8f006a5caceda77295698d66d7d2f,2024-09-05T12:53:21.110000 -CVE-2024-8394,0,0,df587691bbe4f201b28819da96c7c26bbfaa45ba63acfa7ab03d21f072362898,2024-09-09T13:03:38.303000 +CVE-2024-8394,0,1,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000 CVE-2024-8395,0,0,480d042a5c72097c1b9eeb3ece44eb267c07f48edf022a545c49392ffb4e36a0,2024-09-06T12:08:04.550000 CVE-2024-8399,0,0,a078080a08061bf31e935f5665595dbeb479ce34672e558d767724f4eab00569,2024-09-04T13:05:36.067000 CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000 @@ -262458,11 +262504,11 @@ CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30 CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000 CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076fcb,2024-09-05T12:53:21.110000 CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000 -CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000 +CVE-2024-8427,0,1,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,32f99662d2ff0a82eac2c387b5879cdce3b74766786e4d561b16e1b245df448a,2024-09-06T16:46:26.830000 CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 -CVE-2024-8440,0,0,2813db90a2bd9d917cf763410fbca65100265076dacf1d4a3ac57618771c79b2,2024-09-11T07:15:04.420000 -CVE-2024-8441,0,0,aedbc8a66ddb38b5f71cfe5675419cb4b6e877a83ac45ee35ca64b7c476af2ed,2024-09-10T21:15:15.613000 +CVE-2024-8440,0,1,3f774411c50724b8840130cb17d025796db2f754e3a11341f494d3734f6b4db5,2024-09-11T16:26:11.920000 +CVE-2024-8441,0,1,75bcbf016b1064ffa10f954a12d17bdf7a49aca9b32da47c4c769029d1d18539,2024-09-11T16:26:11.920000 CVE-2024-8443,0,0,621bd25e7d9546c644348ac90f0deeaf8d46e336b2b394eb76981445962692b5,2024-09-10T15:50:57.713000 CVE-2024-8445,0,0,27d6183cbf221ef18e3639e3533cc8ca212a51b0f7239a93c253eea652cb910f,2024-09-05T17:44:56.007000 CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000 @@ -262481,8 +262527,8 @@ CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918c CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000 CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000 -CVE-2024-8503,0,0,de8060560c75774db51dd39ff262f935d0edb0b2193b55e9bd2550f179677d8e,2024-09-10T20:35:17.797000 -CVE-2024-8504,0,0,f154c785ad3fefa493d1ca5f24e3c610e0dfcbe61d59e0de82205fac84867d99,2024-09-10T20:15:05.363000 +CVE-2024-8503,0,1,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 +CVE-2024-8504,0,1,e3d0352d19d0c9df25b7281c4df070771b7e9095eb887ab8e1eb94f72060aa4b,2024-09-11T16:26:11.920000 CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 CVE-2024-8517,0,0,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 @@ -262504,9 +262550,9 @@ CVE-2024-8566,0,0,b697d2f2d8dab369399702d62c565693e4b82d2b91e05adb154f01cb1c8382 CVE-2024-8567,0,0,49659b49a666f0018bb5744af39b0142ede6c7f436b35449bf81fb3596426b7c,2024-09-10T15:44:31.283000 CVE-2024-8568,0,0,4021a3f0e72a6d171048f0a7b13a93327102ce9af57868999c56debd16b33d55,2024-09-09T13:03:38.303000 CVE-2024-8569,0,0,aaed184af7e4134cfe1a8ea6b899c2f66a4c7610f73679d8a682587becf0ed8f,2024-09-10T15:45:24.237000 -CVE-2024-8570,0,0,a35ad2ed8f4e40daba99661193190c020bbec00950eacb9abfa9a2b177a3196f,2024-09-09T13:03:38.303000 -CVE-2024-8571,0,0,bc72f3f150d06377644ebf4c0afa9d59046664e5cf502a539ace8bb639b609c4,2024-09-09T13:03:38.303000 -CVE-2024-8572,0,1,bf1c9cec2f49e136717c80b3917be5c269da0b80d9c62651a7ce7952283c48e3,2024-09-11T15:59:57.040000 +CVE-2024-8570,0,1,bc68640c6c75a567a3dc53e9637ef970c70443205716d3966201c32a94304c8e,2024-09-11T16:07:35.400000 +CVE-2024-8571,0,1,5cce23306b6ec0516f16b428475d85317f6d2cd8394be676570b33092f0a1f8e,2024-09-11T16:05:34.220000 +CVE-2024-8572,0,0,bf1c9cec2f49e136717c80b3917be5c269da0b80d9c62651a7ce7952283c48e3,2024-09-11T15:59:57.040000 CVE-2024-8573,0,0,e2248f2e9fabf9390d946aa934f8785dd212725150f7676501e18fb9191a46dd,2024-09-10T12:08:12.567000 CVE-2024-8574,0,0,19894d99d3070776fb1a44f17a54df633ea25e6bfa91923d40be07d8e4a21b2e,2024-09-09T18:47:10.577000 CVE-2024-8575,0,0,1a894f380aae23a0c95d0f445bdf8ed48f5f6c32fa54c136a25ec7a57fd27b16,2024-09-09T18:47:45.917000 @@ -262517,20 +262563,26 @@ CVE-2024-8579,0,0,5ca39278224613960d2995fc71f5451de91cb55696583bb2c29af9edc66fba CVE-2024-8580,0,0,f51aa5c8e3665529b80cf204d693b0b0f66df0f643575c721707f6f32dd401a5,2024-09-10T15:47:47.397000 CVE-2024-8582,0,0,929f6a4eccde08c2101d65daf5f8492ec1f09acd5b572ce0e385ece7e31d5365,2024-09-10T15:48:30.537000 CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a570641936171,2024-09-10T15:49:29.103000 -CVE-2024-8584,0,1,1451411865bc291c4a5addf7963b08818eda87632520fd6c30725a9bead1b55e,2024-09-11T15:54:21.870000 -CVE-2024-8585,0,1,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000 +CVE-2024-8584,0,0,1451411865bc291c4a5addf7963b08818eda87632520fd6c30725a9bead1b55e,2024-09-11T15:54:21.870000 +CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000 CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000 CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000 CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000 CVE-2024-8605,0,0,05de9fb886966e208a1d4ea135c5ccec7205233c650e87f0027c612a99575815,2024-09-09T18:30:12.050000 CVE-2024-8610,0,0,473e0782947d4bb5808f93b8ea2243b42a4e82997b690a69a9a95368e1eef9c1,2024-09-10T12:09:50.377000 CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000 -CVE-2024-8636,1,1,322bdac4829aca2ba7855a957c42f7779314f3dc87f6cc714ecf397adeeddc36,2024-09-11T14:15:13.850000 -CVE-2024-8637,1,1,92442c6fdf5d27b0de28bb38135c1813b0477fdeaad72d8e9cfc303c5e927eaf,2024-09-11T14:15:13.943000 -CVE-2024-8638,1,1,7105d507f06001a8d5b864aac5020eaf009b0c1d663350e5599d0ea8eae9a3b1,2024-09-11T14:15:14.027000 -CVE-2024-8639,1,1,867c3580b35b6bde8e54bfa6446b49f278fb85d282545924a017c9b427ae0e8c,2024-09-11T14:15:14.103000 -CVE-2024-8642,1,1,8482db81afe87b4d2fa7cac54e360146a224f41707b4182bdbaff178e8ad3bd4,2024-09-11T14:15:14.177000 +CVE-2024-8636,0,1,23f70499434b57456041aa391eb7cc6603534210128847805cb5db4da618bb8e,2024-09-11T16:26:11.920000 +CVE-2024-8637,0,1,53816211fb44c2b9a228b7f5de1a2345e05c81ac2d065af97294bf55b710ee26,2024-09-11T16:26:11.920000 +CVE-2024-8638,0,1,314a9e7775d91ca843659445b7937519b197feaea5ae0e102bfcc7cdf8b7bf50,2024-09-11T16:26:11.920000 +CVE-2024-8639,0,1,d94a19bedeeb060b600ed0b2e427bb16c80b783a49fcb7f9eafb63123f220870,2024-09-11T16:26:11.920000 +CVE-2024-8642,0,1,0d7698e3a321d872dd4620edf9b803daeb8e08e2d186a2da501f5948a83a77e6,2024-09-11T16:26:11.920000 CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 -CVE-2024-8646,1,1,6c4f4bf698d6f8b449423f1f6599b25f8eb81ff57f4b4a66ccde545ec076f365,2024-09-11T14:15:14.307000 +CVE-2024-8646,0,1,19fa9f650168d587e83426e12fdaf58fb8d99e18fbbdb4568c4c398d745e4ed2,2024-09-11T16:26:11.920000 CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000 -CVE-2024-8655,0,0,3e802d11c5d27fc9d40c0fbcc99b0d121a26ebda611f924f95158a8fe8e9d22c,2024-09-10T20:15:05.440000 +CVE-2024-8655,0,1,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000 +CVE-2024-8686,1,1,169e0b30175740baf021783dff48097d1c9e56fb0654aae344af4eeb8333feab,2024-09-11T17:15:14.033000 +CVE-2024-8687,1,1,5975a6c972f0bf6584f64f0f75319f6d6e3b00efd7ab6a35100b8e0c4e5906ba,2024-09-11T17:15:14.157000 +CVE-2024-8688,1,1,ac013fc23bdb49879a5736db21cb1609969404edd3e461ab0e86a4da6dff8ade,2024-09-11T17:15:14.273000 +CVE-2024-8689,1,1,66f164a181d51f390ea0050c4ae9ed7e8f3c06b559ba3f8f0a5d26e32fd6bf32,2024-09-11T17:15:14.380000 +CVE-2024-8690,1,1,c55a40e2e4ec0235c309cd5c94133cc30a0aff4514187551a68ad26aa808ddbf,2024-09-11T17:15:14.487000 +CVE-2024-8691,1,1,fb234e47a852558c19316948d1a8e47632a6d1658c0ca3efa4c2187af0effe1f,2024-09-11T17:15:14.587000