diff --git a/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json b/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json index b7ea073f932..967c26fd9e1 100644 --- a/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json +++ b/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json @@ -2,8 +2,8 @@ "id": "CVE-2005-10003", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T14:15:03.800", - "lastModified": "2024-10-17T14:15:03.800", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability classified as critical has been found in mikexstudios Xcomic up to 0.8.2. This affects an unknown part. The manipulation of the argument cmd leads to os command injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 0.8.3 is able to address this issue. The patch is named 6ed8e3cc336e29f09c7e791863d0559939da98bf. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Xcomic de mikexstudios hasta la versi\u00f3n 0.8.2. Afecta a una parte desconocida. La manipulaci\u00f3n del argumento cmd provoca la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El exploit se ha revelado al p\u00fablico y puede usarse. La actualizaci\u00f3n a la versi\u00f3n 0.8.3 puede solucionar este problema. El parche se llama 6ed8e3cc336e29f09c7e791863d0559939da98bf. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2018/CVE-2018-163xx/CVE-2018-16363.json b/CVE-2018/CVE-2018-163xx/CVE-2018-16363.json index be30503932e..15f9397b87f 100644 --- a/CVE-2018/CVE-2018-163xx/CVE-2018-16363.json +++ b/CVE-2018/CVE-2018-163xx/CVE-2018-16363.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16363", "sourceIdentifier": "cve@mitre.org", "published": "2018-09-07T22:29:01.947", - "lastModified": "2018-11-06T20:28:28.590", + "lastModified": "2024-10-18T12:19:40.940", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:webdesi9:file_manager:2.9:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "EED093EA-6D1C-4999-A260-C0170B5702BB" + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:2.9:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "A0EB1CA9-6920-4B64-AA45-6D35EC9599B4" } ] } diff --git a/CVE-2018/CVE-2018-169xx/CVE-2018-16966.json b/CVE-2018/CVE-2018-169xx/CVE-2018-16966.json index a223113eacc..d304220ce41 100644 --- a/CVE-2018/CVE-2018-169xx/CVE-2018-16966.json +++ b/CVE-2018/CVE-2018-169xx/CVE-2018-16966.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16966", "sourceIdentifier": "cve@mitre.org", "published": "2019-04-15T21:29:00.233", - "lastModified": "2023-05-26T17:54:55.423", + "lastModified": "2024-10-18T12:19:40.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:webdesi9:file_manager:3.0:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "75ACE73D-1116-4FA4-A5D5-F3F932794C55" + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:3.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "ADCF2E45-51A8-4E0A-9673-FC224341E504" } ] } diff --git a/CVE-2018/CVE-2018-169xx/CVE-2018-16967.json b/CVE-2018/CVE-2018-169xx/CVE-2018-16967.json index 7e6dc91db7b..f281fd43625 100644 --- a/CVE-2018/CVE-2018-169xx/CVE-2018-16967.json +++ b/CVE-2018/CVE-2018-169xx/CVE-2018-16967.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16967", "sourceIdentifier": "cve@mitre.org", "published": "2019-04-15T21:29:00.310", - "lastModified": "2023-05-26T17:54:55.423", + "lastModified": "2024-10-18T12:19:40.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:webdesi9:file_manager:3.0:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "75ACE73D-1116-4FA4-A5D5-F3F932794C55" + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:3.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "ADCF2E45-51A8-4E0A-9673-FC224341E504" } ] } diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25104.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25104.json index 6fc0f287930..d0bc420212d 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25104.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25104.json @@ -2,13 +2,17 @@ "id": "CVE-2018-25104", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T16:15:03.207", - "lastModified": "2024-10-17T16:15:03.207", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in CoinGate Plugin up to 1.2.7 on PrestaShop. It has been rated as problematic. Affected by this issue is the function postProcess of the file modules/coingate/controllers/front/callback.php of the component Payment Handler. The manipulation leads to business logic errors. The attack may be launched remotely. Upgrading to version 1.2.8 is able to address this issue. The patch is identified as 0a3097db0aec7c5d66686c142c6abaa1e126ca16. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en el complemento CoinGate hasta la versi\u00f3n 1.2.7 de PrestaShop. Se ha calificado como problem\u00e1tica. La funci\u00f3n postProcess del archivo modules/coingate/controllers/front/callback.php del componente Payment Handler se ve afectada por este problema. La manipulaci\u00f3n provoca errores de l\u00f3gica empresarial. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.2.8 puede solucionar este problema. El parche se identifica como 0a3097db0aec7c5d66686c142c6abaa1e126ca16. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json index b7366dfac5f..00bfc11edf3 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26785.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26785", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T22:15:02.743", - "lastModified": "2024-10-17T22:15:02.743", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32266.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32266.json index e8c6a8c2aa9..316a020d90b 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32266.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32266.json @@ -2,13 +2,17 @@ "id": "CVE-2023-32266", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:13.097", - "lastModified": "2024-10-16T17:15:13.097", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted Search Path vulnerability in OpenText\u2122 Application Lifecycle Management (ALM),Quality Center allows Code Inclusion. The vulnerability allows a user to archive a malicious DLLs on the system prior to the installation. \u00a0\n\nThis issue affects Application Lifecycle Management (ALM),Quality Center: 15.00, 15.01, 15.01 P1, 15.01 P2, 15.01 P3, 15.01 P4, 15.01 P5, 15.51, 15.51 P1, 15.51 P2, 15.51 P3, 16.00, 16.01 P1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de ruta de b\u00fasqueda no confiable en OpenText\u2122 Application Lifecycle Management (ALM),Quality Center permite la inclusi\u00f3n de c\u00f3digo. La vulnerabilidad permite a un usuario archivar archivos DLL maliciosos en el sistema antes de la instalaci\u00f3n. Este problema afecta a Application Lifecycle Management (ALM),Quality Center: 15.00, 15.01, 15.01 P1, 15.01 P2, 15.01 P3, 15.01 P4, 15.01 P5, 15.51, 15.51 P1, 15.51 P2, 15.51 P3, 16.00, 16.01 P1." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json index 7b1179a4768..4e088fc056c 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39593.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39593", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T22:15:02.847", - "lastModified": "2024-10-17T22:15:02.847", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json index f7fcdaf439d..da0937f0152 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49567.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49567", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.143", - "lastModified": "2024-10-18T08:15:03.143", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json index eab8c2847d4..9e95f862b1f 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49570.json @@ -2,13 +2,17 @@ "id": "CVE-2023-49570", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T09:15:02.770", - "lastModified": "2024-10-18T09:15:02.770", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software trusts a certificate issued by an entity that isn't authorized to issue certificates. This occurs when the \"Basic Constraints\" extension in the certificate indicates that it is meant to be an \"End Entity\u201d. This flaw could allow an attacker to perform a Man-in-the-Middle (MITM) attack, intercepting and potentially altering communications between the user and the website." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la funci\u00f3n de an\u00e1lisis HTTPS de Bitdefender Total Security, en la que el software conf\u00eda en un certificado emitido por una entidad que no est\u00e1 autorizada a emitir certificados. Esto ocurre cuando la extensi\u00f3n \"Basic Constraints\" del certificado indica que est\u00e1 destinado a ser una \"Entidad final\". Esta falla podr\u00eda permitir a un atacante realizar un ataque Man-in-the-Middle (MITM), interceptando y potencialmente alterando las comunicaciones entre el usuario y el sitio web." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json index cd01f866cc7..990e92c756e 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6055.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6055", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.387", - "lastModified": "2024-10-18T08:15:03.387", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Bitdefender Total Security HTTPS scanning functionality where the software fails to properly validate website certificates. Specifically, if a site certificate lacks the \"Server Authentication\" specification in the Extended Key Usage extension, the product does not verify the certificate's compliance with the site, deeming such certificates as valid. This flaw could allow an attacker to perform a Man-in-the-Middle (MITM) attack, intercepting and potentially altering communications between the user and the website." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la funci\u00f3n de an\u00e1lisis HTTPS de Bitdefender Total Security, en la que el software no puede validar correctamente los certificados de los sitios web. En concreto, si un certificado de sitio no tiene la especificaci\u00f3n \"Server Authentication\" (Autenticaci\u00f3n de servidor) en la extensi\u00f3n Extended Key Usage (Uso extendido de clave), el producto no verifica la conformidad del certificado con el sitio y considera que dichos certificados son v\u00e1lidos. Esta falla podr\u00eda permitir a un atacante realizar un ataque Man-in-the-Middle (MITM), interceptando y potencialmente alterando las comunicaciones entre el usuario y el sitio web." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json index 5a44bb32bd9..3def251a582 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6056.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6056", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.500", - "lastModified": "2024-10-18T08:15:03.500", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Bitdefender Total Security HTTPS scanning functionality that results in the improper trust of self-signed certificates. The product is found to trust certificates signed with the RIPEMD-160 hashing algorithm without proper validation, allowing an attacker to establish MITM SSL connections to arbitrary sites." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en la funci\u00f3n de an\u00e1lisis HTTPS de Bitdefender Total Security que da lugar a una confianza indebida en los certificados autofirmados. Se ha descubierto que el producto conf\u00eda en los certificados firmados con el algoritmo de hash RIPEMD-160 sin una validaci\u00f3n adecuada, lo que permite a un atacante establecer conexiones SSL MITM con sitios arbitrarios." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json index 3bf7318433b..2a2d20a6867 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6057.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6057", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.627", - "lastModified": "2024-10-18T08:15:03.627", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Bitdefender Total Security HTTPS scanning functionality that results in the improper trust of certificates issued using the DSA signature algorithm. The product does not properly check the certificate chain, allowing an attacker to establish MITM SSL connections to arbitrary sites using a DSA-signed certificate." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en la funci\u00f3n de an\u00e1lisis HTTPS de Bitdefender Total Security que da como resultado la confianza indebida en los certificados emitidos mediante el algoritmo de firma DSA. El producto no comprueba correctamente la cadena de certificados, lo que permite a un atacante establecer conexiones SSL MITM con sitios arbitrarios mediante un certificado firmado por DSA." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json index b87276c34b4..43ed1c22974 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6058.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6058", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-10-18T08:15:03.737", - "lastModified": "2024-10-18T08:15:03.737", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Bitdefender Safepay's handling of HTTPS connections. The issue arises when the product blocks a connection due to an untrusted server certificate but allows the user to add the site to exceptions, resulting in the product trusting the certificate for subsequent HTTPS scans. This vulnerability allows an attacker to perform a Man-in-the-Middle (MITM) attack by using a self-signed certificate, which the product will trust after the site has been added to exceptions. This can lead to the interception and potential alteration of secure communications." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en el manejo de conexiones HTTPS por parte de Bitdefender Safepay. El problema surge cuando el producto bloquea una conexi\u00f3n debido a un certificado de servidor que no es de confianza, pero permite al usuario agregar el sitio a las excepciones, lo que hace que el producto conf\u00ede en el certificado para los an\u00e1lisis HTTPS posteriores. Esta vulnerabilidad permite a un atacante realizar un ataque Man-in-the-Middle (MITM) mediante el uso de un certificado autofirmado, en el que el producto confiar\u00e1 despu\u00e9s de que el sitio se haya agregado a las excepciones. Esto puede provocar la interceptaci\u00f3n y posible alteraci\u00f3n de las comunicaciones seguras." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6728.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6728.json index e9a4b82eb15..eb6efebcac4 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6728.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6728.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6728", "sourceIdentifier": "b48c3b8f-639e-4c16-8725-497bc411dad0", "published": "2024-10-17T13:15:12.077", - "lastModified": "2024-10-17T13:15:12.077", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Nokia SR OS bof.cfg file encryption is vulnerable to a brute force attack. This weakness allows an attacker in possession of the encrypted file to decrypt the bof.cfg file and obtain the BOF configuration content." + }, + { + "lang": "es", + "value": "El cifrado del archivo bof.cfg del SO SR de Nokia es vulnerable a un ataque de fuerza bruta. Esta debilidad permite que un atacante en posesi\u00f3n del archivo cifrado descifre el archivo bof.cfg y obtenga el contenido de configuraci\u00f3n BOF." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6729.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6729.json index bc3563ff867..6854ee910bf 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6729.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6729.json @@ -2,13 +2,17 @@ "id": "CVE-2023-6729", "sourceIdentifier": "b48c3b8f-639e-4c16-8725-497bc411dad0", "published": "2024-10-17T13:15:12.170", - "lastModified": "2024-10-17T15:35:11.400", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Nokia SR OS routers allow read-write access to the entire file system via SFTP or SCP for users configured with \"access console.\" Consequently, a low privilege authenticated user with \"access console\" can read or replace the router configuration file as well as other files stored in the Compact Flash or SD card without using CLI commands. This type of attack can lead to a compromise or denial of service of the router after the system is rebooted." + }, + { + "lang": "es", + "value": "Los enrutadores Nokia SR OS permiten el acceso de lectura y escritura a todo el sistema de archivos a trav\u00e9s de SFTP o SCP para los usuarios configurados con \"consola de acceso\". En consecuencia, un usuario autenticado con privilegios bajos con \"consola de acceso\" puede leer o reemplazar el archivo de configuraci\u00f3n del enrutador, as\u00ed como otros archivos almacenados en la tarjeta Compact Flash o SD sin usar comandos CLI. Este tipo de ataque puede provocar un compromiso o denegaci\u00f3n de servicio del enrutador despu\u00e9s de reiniciar el sistema." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json index 5e65b52c18b..a830325dc43 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6846", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:56.887", - "lastModified": "2024-02-09T16:51:01.473", + "lastModified": "2024-10-18T12:19:40.940", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:filemanagerpro:file_manager_pro:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "8.3.4", - "matchCriteriaId": "FF983244-4C22-4F18-9E6D-0F8A9A746600" + "matchCriteriaId": "CFBF9751-C2D8-4EA3-87AB-B19578D113EC" } ] } diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json index 835cee2ac8c..d1e082e066e 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0229", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-09T07:16:00.107", - "lastModified": "2024-05-22T17:16:11.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-18T13:49:32.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,70 +81,233 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.1.11", + "matchCriteriaId": "049C23AF-DFA5-4F08-A3E6-BBBF75581F05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.2.4", + "matchCriteriaId": "1FE48099-1D7F-444E-8F0C-FAB71F25AD71" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7883DE07-470D-4160-9767-4F831B75B9A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5F4FA7-E5C5-4C23-BDA8-36A36972E4F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", + "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4DDA3E5A-8754-4C48-9A27-E2415F8A6000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9C24797C-0397-4D4F-ADC3-3B99095DBB35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BF14A415-15BD-4A6C-87CF-675E09390474" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "15D3CC6E-3A8F-4694-B3CC-0DB12A3E9A0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E881C927-DF96-4D2E-9887-FF12E456B1FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:0320", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0557", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0558", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0597", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0607", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0614", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0617", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0621", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0626", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0629", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:2169", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:2170", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:2995", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:2996", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0229", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json index 296d182b7bf..5599b21ad81 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10014", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:03.713", - "lastModified": "2024-10-18T05:15:03.713", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10025.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10025.json index ca93e2b7465..1212132d5b9 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10025.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10025.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10025", "sourceIdentifier": "psirt@sick.de", "published": "2024-10-17T10:15:03.127", - "lastModified": "2024-10-17T10:15:03.127", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the .sdd file allows an attacker to read default passwords stored in plain text within the code. By exploiting these plaintext credentials, an attacker can log into affected SICK products as an \u201cAuthorized Client\u201d if the customer has not changed the default password." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el archivo .sdd permite a un atacante leer las contrase\u00f1as predeterminadas almacenadas en texto plano dentro del c\u00f3digo. Al explotar estas credenciales en texto plano, un atacante puede iniciar sesi\u00f3n en los productos SICK afectados como un \"cliente autorizado\" si el cliente no ha cambiado la contrase\u00f1a predeterminada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json index 1277df6d26e..2947cc7f186 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10033", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-16T17:15:13.267", - "lastModified": "2024-10-16T17:15:13.267", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the gateway component. This flaw allows a malicious user to perform actions that impact users by using the \"?next=\" in a URL, which can lead to redirecting, injecting malicious script, stealing sessions and data." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en aap-gateway. Existe una vulnerabilidad de cross-site scripting (XSS) en el componente de puerta de enlace. Esta falla permite que un usuario malintencionado realice acciones que afectan a los usuarios mediante el uso del \"?next=\" en una URL, lo que puede provocar redireccionamientos, inyecci\u00f3n de secuencias de comandos maliciosas, robo de sesiones y datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10040.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10040.json index e8022be66d1..d8921889706 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10040.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10040", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:04.667", - "lastModified": "2024-10-18T05:15:04.667", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json index 317a9284008..bbf02ac0455 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10049", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:04.977", - "lastModified": "2024-10-18T05:15:04.977", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json index 74cf69a0e94..e0a46f06cad 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10055.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10055", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:03.843", - "lastModified": "2024-10-18T08:15:03.843", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Click to Chat \u2013 WP Support All-in-One Floating Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpsaio_snapchat shortcode in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Click to Chat \u2013 WP Support All-in-One Floating Widget para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto wpsaio_snapchat del complemento en todas las versiones hasta la 2.3.3 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10057.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10057.json index f58029d921d..85b07a0fda3 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10057.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10057.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10057", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T10:15:03.173", - "lastModified": "2024-10-18T10:15:03.173", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The RSS Feed Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's rfw-youtube-videos shortcode in all versions up to, and including, 2.9.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento RSS Feed Widget para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto rfw-youtube-videos del complemento en todas las versiones hasta la 2.9.9 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10068.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10068.json index 44b6b3d9e0d..b1739165e6d 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10068.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10068.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10068", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T11:15:10.390", - "lastModified": "2024-10-17T11:15:10.390", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in OpenSight Software FlashFXP 5.4.0.3970. It has been classified as critical. Affected is an unknown function in the library libcrypto-1_1.dll of the file FlashFXP.exe. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en OpenSight Software FlashFXP 5.4.0.3970. Se ha clasificado como cr\u00edtica. Se trata de una funci\u00f3n desconocida en la librer\u00eda libcrypto-1_1.dll del archivo FlashFXP.exe. La manipulaci\u00f3n conduce a una ruta de b\u00fasqueda no controlada. El ataque debe abordarse localmente. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10069.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10069.json index 75ce0798566..38668beb391 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10069.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10069.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10069", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T15:15:12.857", - "lastModified": "2024-10-17T15:15:12.857", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG 5. It has been rated as critical. Affected by this issue is the function actionPassMainApplication of the file /com/esafenet/servlet/client/MailDecryptApplicationService.java. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5. Se ha calificado como cr\u00edtica. Este problema afecta a la funci\u00f3n actionPassMainApplication del archivo /com/esafenet/servlet/client/MailDecryptApplicationService.java. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10070.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10070.json index 642f1636edf..b090e240a7a 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10070.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10070.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10070", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T15:15:13.110", - "lastModified": "2024-10-17T15:15:13.110", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in ESAFENET CDG 5. This affects the function actionPolicyPush of the file /com/esafenet/policy/action/PolicyPushControlAction.java. The manipulation of the argument policyId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5. Afecta a la funci\u00f3n actionPolicyPush del archivo /com/esafenet/policy/action/PolicyPushControlAction.java. La manipulaci\u00f3n del argumento policyId provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10071.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10071.json index 1a7ae2ebb9e..5aa236b0321 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10071.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10071.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10071", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T16:15:04.610", - "lastModified": "2024-10-17T16:15:04.610", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in ESAFENET CDG 5. This vulnerability affects the function actionUpdateEncryptPolicyEdit of the file /com/esafenet/servlet/policy/EncryptPolicyService.java. The manipulation of the argument encryptPolicyId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5. Esta vulnerabilidad afecta a la funci\u00f3n actionUpdateEncryptPolicyEdit del archivo /com/esafenet/servlet/policy/EncryptPolicyService.java. La manipulaci\u00f3n del argumento encryptPolicyId provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10072.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10072.json index 928be7361ae..de4a4705498 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10072.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10072.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10072", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T17:15:10.963", - "lastModified": "2024-10-17T17:15:10.963", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5. This issue affects the function actionAddEncryptPolicyGroup of the file /com/esafenet/servlet/policy/EncryptPolicyService.java. The manipulation of the argument checklist leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en ESAFENET CDG 5. Este problema afecta a la funci\u00f3n actionAddEncryptPolicyGroup del archivo /com/esafenet/servlet/policy/EncryptPolicyService.java. La manipulaci\u00f3n de la lista de verificaci\u00f3n de argumentos conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json index c97853f57f3..c71eda0520c 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10073", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T17:15:11.253", - "lastModified": "2024-10-17T17:15:11.253", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in flairNLP flair 0.14.0. Affected is the function ClusteringModel of the file flair\\models\\clustering.py of the component Mode File Loader. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "En flairNLP flair 0.14.0 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. La funci\u00f3n ClusteringModel del archivo flair\\models\\clustering.py del componente Mode File Loader est\u00e1 afectada. La manipulaci\u00f3n provoca la inyecci\u00f3n de c\u00f3digo. Es posible lanzar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json index 87ccf67ace8..b088d429899 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10078.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10078", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:04.060", - "lastModified": "2024-10-18T08:15:04.060", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Easy Post Types plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 1.4.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options and posts." + }, + { + "lang": "es", + "value": "El complemento WP Easy Post Types para WordPress es vulnerable al acceso no autorizado, la modificaci\u00f3n y la p\u00e9rdida de datos debido a la falta de una comprobaci\u00f3n de capacidad en varias funciones en todas las versiones hasta la 1.4.4 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, agreguen, modifiquen o eliminen opciones y publicaciones del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json index 84dcb48a35d..7576b215454 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10079.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10079", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:04.300", - "lastModified": "2024-10-18T08:15:04.300", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Easy Post Types plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.4 via deserialization of untrusted input from the 'text' parameter in the 'ajax_import_content' function. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento WP Easy Post Types para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en versiones hasta la 1.4.4 incluida, a trav\u00e9s de la deserializaci\u00f3n de la entrada no confiable del par\u00e1metro 'text' en la funci\u00f3n 'ajax_import_content'. Esto permite a los atacantes autenticados, con permisos de nivel de suscriptor y superiores, inyectar un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json index 33f9a43017f..99f33e8a9f2 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10080.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10080", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T08:15:04.507", - "lastModified": "2024-10-18T08:15:04.507", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Easy Post Types plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post meta in versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WP Easy Post Types para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de metadatos de publicaciones en versiones hasta la 1.4.4 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en atributos proporcionados por el usuario. Esto permite que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10093.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10093.json index 20fb4497ddd..c8c6ce396c0 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10093.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10093.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10093", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T23:15:11.817", - "lastModified": "2024-10-17T23:15:11.817", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json index 8620d8f6046..06c8c97ffa9 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10099.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10099", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-17T19:15:21.337", - "lastModified": "2024-10-17T19:15:21.337", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in comfyanonymous/comfyui version 0.2.2 and possibly earlier. The vulnerability occurs when an attacker uploads an HTML file containing a malicious XSS payload via the `/api/upload/image` endpoint. The payload is executed when the file is viewed through the `/view` API endpoint, leading to potential execution of arbitrary JavaScript code." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en la versi\u00f3n 0.2.2 de comfyanonymous/comfyui y posiblemente en versiones anteriores. La vulnerabilidad se produce cuando un atacante carga un archivo HTML que contiene un payload XSS malicioso a trav\u00e9s del punto de conexi\u00f3n `/api/upload/image`. El payload se ejecuta cuando el archivo se visualiza a trav\u00e9s del punto de conexi\u00f3n de API `/view`, lo que lleva a la posible ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json index 385d7ce5e17..872ed4b4342 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10100", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-17T19:15:21.533", - "lastModified": "2024-10-17T19:15:21.533", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of the file parameter, which is open to path traversal through URL encoding. This allows attackers to view any file on the host system, including sensitive files such as critical application files, SSH keys, API keys, and configuration values." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en la versi\u00f3n 3.83 de binary-husky/gpt_academic. La vulnerabilidad se debe a un manejo inadecuado del par\u00e1metro de archivo, que est\u00e1 abierto al path traversal a trav\u00e9s de la codificaci\u00f3n de URL. Esto permite a los atacantes ver cualquier archivo en el sistema host, incluidos archivos confidenciales como archivos de aplicaciones cr\u00edticas, claves SSH, claves API y valores de configuraci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json index 15a6c9a5b85..35b0ac01f39 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10101", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-17T19:15:21.713", - "lastModified": "2024-10-17T19:15:21.713", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs at the /file endpoint, which renders HTML files. Malicious HTML files containing XSS payloads can be uploaded and stored in the backend, leading to the execution of the payload in the victim's browser when the file is accessed. This can result in the theft of session cookies or other sensitive information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) almacenado en la versi\u00f3n 3.83 de binary-husky/gpt_academic. La vulnerabilidad se produce en el endpoint /file, que procesa archivos HTML. Los archivos HTML maliciosos que contienen payloads XSS se pueden cargar y almacenar en el backend, lo que lleva a la ejecuci\u00f3n de el payload en el navegador de la v\u00edctima cuando se accede al archivo. Esto puede provocar el robo de cookies de sesi\u00f3n u otra informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json index c06c1d4928a..28c01486cff 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10118", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-10-18T04:15:03.290", - "lastModified": "2024-10-18T04:15:03.290", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10119.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10119.json index 4083140c2b9..6f7efdb168e 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10119.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10119", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-10-18T05:15:05.200", - "lastModified": "2024-10-18T05:15:05.200", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json index a0258aa8c5b..7b2b22bc44b 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20280.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20280", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:13.697", - "lastModified": "2024-10-16T17:15:13.697", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files.\r\n\r\nThis vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n de copia de seguridad de Cisco UCS Central Software podr\u00eda permitir que un atacante con acceso a un archivo de copia de seguridad obtenga informaci\u00f3n confidencial almacenada en los archivos de copia de seguridad de estado completo y de configuraci\u00f3n. Esta vulnerabilidad se debe a una debilidad en el m\u00e9todo de cifrado que se utiliza para la funci\u00f3n de copia de seguridad. Un atacante podr\u00eda explotar esta vulnerabilidad accediendo a un archivo de copia de seguridad y aprovechando una clave est\u00e1tica que se utiliza para la funci\u00f3n de configuraci\u00f3n de copia de seguridad. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante con acceso a un archivo de copia de seguridad obtenga informaci\u00f3n confidencial que se almacena en los archivos de copia de seguridad de estado completo y los archivos de copia de seguridad de configuraci\u00f3n, como credenciales de usuario local, contrase\u00f1as de servidor de autenticaci\u00f3n, nombres de comunidad de Protocolo simple de administraci\u00f3n de red (SNMP) y el certificado y la clave del servidor SSL del dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json index 0d72a497595..248eb9b78af 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20420.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20420", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:13.957", - "lastModified": "2024-10-16T17:15:13.957", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with low privileges to run commands as an Admin user. \r\n\r\nThis vulnerability is due to incorrect authorization verification by the HTTP server. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to run commands as the Admin user." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del adaptador telef\u00f3nico anal\u00f3gico Cisco ATA serie 190 podr\u00eda permitir que un atacante remoto autenticado con privilegios bajos ejecute comandos como usuario administrador. Esta vulnerabilidad se debe a una verificaci\u00f3n de autorizaci\u00f3n incorrecta por parte del servidor HTTP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud maliciosa a la interfaz de administraci\u00f3n basada en web. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante ejecute comandos como usuario administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json index f2d405c6483..f80efb63b65 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20421.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20421", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.193", - "lastModified": "2024-10-16T17:15:14.193", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del adaptador telef\u00f3nico anal\u00f3gico Cisco ATA 190 Series podr\u00eda permitir que un atacante remoto no autenticado realice un ataque de cross-site request forgery (CSRF) y realice acciones arbitrarias en un dispositivo afectado. Esta vulnerabilidad se debe a que no hay suficientes protecciones CSRF para la interfaz de administraci\u00f3n basada en web de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario para que siga un enlace creado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar acciones arbitrarias en el dispositivo afectado con los privilegios del usuario objetivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json index 89256831e6c..b992611c96f 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20458.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20458", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.423", - "lastModified": "2024-10-16T17:15:14.423", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device.\r\n\r\nThis vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL. A successful exploit could allow the attacker to view or delete the configuration or change the firmware." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del adaptador telef\u00f3nico anal\u00f3gico Cisco ATA serie 190 podr\u00eda permitir que un atacante remoto no autenticado vea o elimine la configuraci\u00f3n o cambie el firmware en un dispositivo afectado. Esta vulnerabilidad se debe a la falta de autenticaci\u00f3n en endpoints HTTP espec\u00edficos. Un atacante podr\u00eda aprovechar esta vulnerabilidad navegando a una URL espec\u00edfica. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ver o eliminar la configuraci\u00f3n o cambiar el firmware." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json index e6df5623816..8ae6851117b 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20459.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20459", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.657", - "lastModified": "2024-10-16T17:15:14.657", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system.\r\n\r\nThis vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del adaptador telef\u00f3nico anal\u00f3gico Cisco ATA 190 Multiplatform Series podr\u00eda permitir que un atacante remoto autenticado con privilegios elevados ejecute comandos arbitrarios como usuario ra\u00edz en el sistema operativo subyacente. Esta vulnerabilidad se debe a la falta de desinfecci\u00f3n de entradas en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud maliciosa a la interfaz de administraci\u00f3n basada en web. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente como usuario ra\u00edz." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json index 44e39561ef2..72d2a4e08be 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20460.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20460", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:14.880", - "lastModified": "2024-10-16T17:15:14.880", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information on an affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del adaptador telef\u00f3nico anal\u00f3gico Cisco ATA 190 Series podr\u00eda permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) reflejado contra un usuario. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario para que haga clic en un link manipulado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador en un dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json index 8a9646d51e9..27623c42011 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20461.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20461", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:15.127", - "lastModified": "2024-10-16T17:15:15.127", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user.\r\n\r\nThis vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow the attacker to read and write to the underlying operating system as the root user." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la CLI del firmware del adaptador telef\u00f3nico anal\u00f3gico Cisco ATA 190 Series podr\u00eda permitir que un atacante local autenticado con privilegios elevados ejecute comandos arbitrarios como usuario ra\u00edz. Esta vulnerabilidad existe porque la entrada de la CLI no se desinfecta correctamente. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando caracteres maliciosos a la CLI. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante leer y escribir en el sistema operativo subyacente como usuario ra\u00edz." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json index 26312f6e400..68ba9b33a63 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20462.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20462", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:15.357", - "lastModified": "2024-10-16T17:15:15.357", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device.\r\n\r\nThis vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del adaptador telef\u00f3nico anal\u00f3gico multiplataforma Cisco ATA 190 Series podr\u00eda permitir que un atacante local autenticado con privilegios bajos vea las contrase\u00f1as en un dispositivo afectado. Esta vulnerabilidad se debe a una desinfecci\u00f3n incorrecta del contenido HTML de un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante vea las contrase\u00f1as que pertenecen a otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json index fc8bc3b35ca..e5bd6e70146 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20463.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20463", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:15.670", - "lastModified": "2024-10-16T17:15:15.670", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to modify the configuration or reboot an affected device.\r\n\r\nThis vulnerability is due to the HTTP server allowing state changes in GET requests. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface on an affected device. A successful exploit could allow the attacker to make limited modifications to the configuration or reboot the device, resulting in a denial of service (DoS) condition. " + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del adaptador telef\u00f3nico anal\u00f3gico Cisco ATA 190 Series podr\u00eda permitir que un atacante remoto no autenticado modifique la configuraci\u00f3n o reinicie un dispositivo afectado. Esta vulnerabilidad se debe a que el servidor HTTP permite cambios de estado en las solicitudes GET. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud maliciosa a la interfaz de administraci\u00f3n basada en web en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar modificaciones limitadas a la configuraci\u00f3n o reiniciar el dispositivo, lo que resultar\u00eda en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json index 51e9d5a28d8..8d19605a04f 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20512.json @@ -2,13 +2,17 @@ "id": "CVE-2024-20512", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-16T17:15:15.913", - "lastModified": "2024-10-16T17:15:15.913", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Unified Contact Center Management Portal (Unified CCMP) podr\u00eda permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting (XSS) reflejado contra un usuario de la interfaz. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida correctamente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario de la interfaz para que haga clic en un v\u00ednculo creado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo de secuencia de comandos arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial basada en el navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json index c72182435c7..2c30b26d77f 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27766", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T22:15:02.920", - "lastModified": "2024-10-17T22:15:02.920", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30875.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30875.json index 6e0a7c5d14b..aeebb539314 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30875.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30875", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T22:15:02.977", - "lastModified": "2024-10-17T22:15:02.977", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3184.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3184.json index d23598fb48c..9baaeeb72f5 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3184.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3184.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3184", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-10-17T08:15:01.950", - "lastModified": "2024-10-17T08:15:01.950", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple CWE-476 NULL Pointer Dereference vulnerabilities were found in GoAhead Web Server up to version 6.0.0 when compiled with the ME_GOAHEAD_REPLACE_MALLOC flag. Without a memory notifier for allocation failures, remote attackers can exploit these vulnerabilities by sending malicious requests, leading to a crash and Denial of Service (DoS)." + }, + { + "lang": "es", + "value": "Se encontraron m\u00faltiples vulnerabilidades de desreferencia de puntero nulo CWE-476 en GoAhead Web Server hasta la versi\u00f3n 6.0.0 cuando se compilaba con el indicador ME_GOAHEAD_REPLACE_MALLOC. Sin un notificador de memoria para errores de asignaci\u00f3n, los atacantes remotos pueden explotar estas vulnerabilidades enviando solicitudes maliciosas, lo que provoca un bloqueo y una denegaci\u00f3n de servicio (DoS)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3186.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3186.json index 03367362014..c8899290a05 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3186.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3186.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3186", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-10-17T08:15:02.453", - "lastModified": "2024-10-17T08:15:02.453", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-476 NULL Pointer Dereference vulnerability in the evalExpr() function of GoAhead Web Server (version <= 6.0.0) when compiled with the ME_GOAHEAD_JAVASCRIPT flag. This vulnerability allows a remote attacker with the privileges to modify JavaScript template (JST) files to trigger a crash and cause a Denial of Service (DoS) by providing malicious templates." + }, + { + "lang": "es", + "value": "Vulnerabilidad de desreferencia de puntero nulo CWE-476 en la funci\u00f3n evalExpr() de GoAhead Web Server (versi\u00f3n <= 6.0.0) cuando se compila con el indicador ME_GOAHEAD_JAVASCRIPT. Esta vulnerabilidad permite que un atacante remoto con privilegios para modificar archivos de plantilla de JavaScript (JST) provoque un bloqueo y provoque una denegaci\u00f3n de servicio (DoS) al proporcionar plantillas maliciosas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3187.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3187.json index d0381efb54b..66faf7e7cac 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3187.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3187.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3187", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-10-17T08:15:02.760", - "lastModified": "2024-10-17T08:15:02.760", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue tracks two CWE-416 Use After Free (UAF) and one CWE-415 Double Free vulnerabilities in Goahead versions <= 6.0.0. These are caused by JST values not being nulled when freed during parsing of JST templates. If the ME_GOAHEAD_JAVASCRIPT flag is enabled, a remote attacker with the privileges to modify JavaScript template (JST) files could exploit this by providing malicious templates. This may lead to memory corruption, potentially causing a Denial of Service (DoS) or, in rare cases, code execution, though the latter is highly context-dependent." + }, + { + "lang": "es", + "value": "Este problema se debe a dos vulnerabilidades CWE-416 de Use After Free (UAF) y una vulnerabilidad CWE-415 de doble liberaci\u00f3n en las versiones de Goahead anteriores a la 6.0.0. Estas vulnerabilidades se deben a que los valores JST no se anulan cuando se liberan durante el an\u00e1lisis de las plantillas JST. Si la bandera ME_GOAHEAD_JAVASCRIPT est\u00e1 habilitada, un atacante remoto con privilegios para modificar archivos de plantillas de JavaScript (JST) podr\u00eda aprovechar esto proporcionando plantillas maliciosas. Esto puede provocar una corrupci\u00f3n de la memoria, lo que puede provocar una denegaci\u00f3n de servicio (DoS) o, en casos excepcionales, la ejecuci\u00f3n de c\u00f3digo, aunque esto \u00faltimo depende en gran medida del contexto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json index 1f5e5bc97a4..bc8a1ad62bb 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33453", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T22:15:03.040", - "lastModified": "2024-10-17T22:15:03.040", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38814.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38814.json index c2e8552b0fc..bea68648d72 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38814.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38814.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38814", "sourceIdentifier": "security@vmware.com", "published": "2024-10-16T17:15:16.237", - "lastModified": "2024-10-16T17:15:16.237", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A\n malicious authenticated user with non-administrator privileges may be \nable to enter specially crafted SQL queries and perform unauthorized \nremote code execution on the HCX manager.\u00a0\nUpdates are available to remediate this vulnerability in affected VMware products." + }, + { + "lang": "es", + "value": "VMware recibi\u00f3 un informe privado sobre una vulnerabilidad de inyecci\u00f3n SQL autenticada en VMware HCX. Un usuario autenticado malintencionado con privilegios que no sean de administrador podr\u00eda ingresar consultas SQL especialmente manipuladas y ejecutar c\u00f3digo remoto no autorizado en el administrador HCX. Hay actualizaciones disponibles para solucionar esta vulnerabilidad en los productos VMware afectados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38820.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38820.json index dacd6ce7869..39a83858f63 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38820.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38820.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38820", "sourceIdentifier": "security@vmware.com", "published": "2024-10-18T06:15:03.333", - "lastModified": "2024-10-18T06:15:03.333", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json index 27a60a9eb6c..6ed8d1dabaa 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40711.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40711", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:13.260", - "lastModified": "2024-10-18T01:00:02.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-18T12:51:11.257", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-10-17", "cisaActionDue": "2024-11-07", @@ -20,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -44,6 +66,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,10 +87,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:veeam_backup_\\&_replication:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0.1420", + "versionEndExcluding": "12.2.0.334", + "matchCriteriaId": "E3AD538F-6D77-4528-9BD8-C06E1CD65354" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41128.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41128.json index dfeada4a5b9..9baedd6a247 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41128.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41128.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41128", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T18:15:06.070", - "lastModified": "2024-10-16T18:15:06.070", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Action Pack is a framework for handling and responding to web requests. Starting in version 3.1.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to version 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. One may use Ruby 3.2 as a workaround. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected." + }, + { + "lang": "es", + "value": "Action Pack es un framework de trabajo para gestionar y responder a solicitudes web. A partir de la versi\u00f3n 3.1.0 y anteriores a las versiones 6.1.7.9, 7.0.8.5, 7.1.4.1 y 7.2.1.1, existe una posible vulnerabilidad de ReDoS en las rutinas de filtrado de par\u00e1metros de consulta de Action Dispatch. Los par\u00e1metros de consulta cuidadosamente manipulados pueden hacer que el filtrado de par\u00e1metros de consulta tarde una cantidad inesperada de tiempo, lo que puede dar como resultado una vulnerabilidad de DoS. Todos los usuarios que ejecuten una versi\u00f3n afectada deben actualizar a la versi\u00f3n 6.1.7.9, 7.0.8.5, 7.1.4.1 o 7.2.1.1 o aplicar el parche correspondiente de inmediato. Se puede utilizar Ruby 3.2 como workaround. Ruby 3.2 tiene mitigaciones para este problema, por lo que las aplicaciones Rails que utilizan Ruby 3.2 o versiones m\u00e1s nuevas no se ven afectadas. Rails 8.0.0.beta1 depende de Ruby 3.2 o superior, por lo que no se ve afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json index 1dad80adc24..ffb22174881 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4184.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4184", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.370", - "lastModified": "2024-10-16T17:15:17.370", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of XML External Entity Reference vulnerability in OpenText Application Automation Tools allows DTD Injection.This issue affects OpenText Application Automation Tools: 24.1.0 and below." + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n incorrecta de referencia de entidad externa XML en OpenText Application Automation Tools permite la inyecci\u00f3n de DTD. Este problema afecta a OpenText Application Automation Tools: 24.1.0 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json index 884719308ac..569f3d6dff4 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4189.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4189", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.493", - "lastModified": "2024-10-16T17:15:17.493", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of XML External Entity Reference vulnerability in OpenText Application Automation Tools allows DTD Injection.This issue affects OpenText Application Automation Tools: 24.1.0 and below." + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n incorrecta de referencia de entidad externa XML en OpenText Application Automation Tools permite la inyecci\u00f3n de DTD. Este problema afecta a OpenText Application Automation Tools: 24.1.0 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json index 75611789d54..6d055285f43 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4211.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4211", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.617", - "lastModified": "2024-10-16T17:15:17.617", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Validation of Specified Quantity in Input vulnerability in OpenText OpenText Application Automation Tools allows Exploiting Incorrectly Configured Access Control Security Levels.\n\n\nMultiple missing permission checks - ALM job config has been discovered in OpenText Application Automation Tools. The vulnerability could allow users with Overall/Read permission to enumerate ALM server names, usernames and client IDs configured to be used with ALM servers.\n\n\nThis issue affects OpenText Application Automation Tools: 24.1.0 and below." + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n incorrecta de la cantidad especificada en la entrada en OpenText Las herramientas de automatizaci\u00f3n de aplicaciones de OpenText permiten explotar niveles de seguridad de control de acceso configurados incorrectamente. Se han descubierto m\u00faltiples comprobaciones de permisos faltantes en la configuraci\u00f3n de trabajos de ALM en las herramientas de automatizaci\u00f3n de aplicaciones de OpenText. La vulnerabilidad podr\u00eda permitir que los usuarios con permiso general/de lectura enumeren los nombres de servidor de ALM, los nombres de usuario y los ID de cliente configurados para usarse con servidores de ALM. Este problema afecta a las herramientas de automatizaci\u00f3n de aplicaciones de OpenText: 24.1.0 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43300.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43300.json index ad3b1279f86..241294ef2a6 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43300.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43300.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43300", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T11:15:02.430", - "lastModified": "2024-10-18T11:15:02.430", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json index b3ef02d0157..f7769658d4b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43566.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43566", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-17T23:15:14.940", - "lastModified": "2024-10-17T23:15:14.940", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json index 5dbaeed89f5..c8a09dfaf77 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43578", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-17T23:15:15.370", - "lastModified": "2024-10-17T23:15:15.370", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json index 476cbe177d5..96e733ec92c 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43579", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-17T23:15:15.570", - "lastModified": "2024-10-17T23:15:15.570", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json index 95abeca6168..b9640b840b0 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43580", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-17T23:15:15.767", - "lastModified": "2024-10-17T23:15:15.767", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json index 82b93458fee..6af868d274a 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43587", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-17T23:15:16.123", - "lastModified": "2024-10-18T01:15:39.687", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json index add7cdee1c3..30c10ef259f 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43595.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43595", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-17T23:15:16.463", - "lastModified": "2024-10-17T23:15:16.463", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json index 513223037a9..87682f87574 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43596", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-17T23:15:16.657", - "lastModified": "2024-10-17T23:15:16.657", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43997.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43997.json index 4ca346214c1..9033a04de65 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43997.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43997.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43997", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:04.910", - "lastModified": "2024-10-17T18:15:04.910", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in easy.Jobs EasyJobs allows Reflected XSS.This issue affects EasyJobs: from n/a through 2.4.14." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en easy.Jobs EasyJobs permite XSS reflejado. Este problema afecta a EasyJobs: desde n/a hasta 2.4.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44762.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44762.json index 87adbdd2cbb..5b8494d53f3 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44762.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44762.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44762", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T21:15:12.680", - "lastModified": "2024-10-17T17:35:06.750", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json index 7088c481244..33a823a3900 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45071.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45071", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-10-16T17:15:16.487", - "lastModified": "2024-10-16T17:15:16.487", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + }, + { + "lang": "es", + "value": "IBM WebSphere Application Server 8.5 y 9.0 es vulnerable a cross-site scripting almacenado. Esta vulnerabilidad permite que un usuario privilegiado incorpore c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n de confianza." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json index b4e468c485d..277370ea9e7 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45072.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45072", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-10-16T17:15:16.750", - "lastModified": "2024-10-16T17:15:16.750", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A privileged user could exploit this vulnerability to expose sensitive information or consume memory resources." + }, + { + "lang": "es", + "value": "IBM WebSphere Application Server 8.5 y 9.0 es vulnerable a un ataque de inyecci\u00f3n de entidad externa (XXE) de XML al procesar datos XML. Un usuario privilegiado podr\u00eda aprovechar esta vulnerabilidad para exponer informaci\u00f3n confidencial o consumir recursos de memoria." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45490.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45490.json index a8a9d75cb74..8b0acf2243c 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45490.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45490.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45490", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-30T03:15:03.757", - "lastModified": "2024-09-04T14:28:19.313", + "lastModified": "2024-10-18T12:24:23.597", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 7.5, + "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 3.6 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45713.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45713.json index 00f5959d2af..076a762f070 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45713.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45713.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45713", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-10-17T11:15:10.850", - "lastModified": "2024-10-17T11:15:10.850", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SolarWinds Kiwi CatTools is susceptible to a sensitive data disclosure vulnerability when a non-default setting has been enabled for troubleshooting purposes." + }, + { + "lang": "es", + "value": "SolarWinds Kiwi CatTools es susceptible a una vulnerabilidad de divulgaci\u00f3n de datos confidenciales cuando se ha habilitado una configuraci\u00f3n no predeterminada para fines de soluci\u00f3n de problemas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45766.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45766.json index 8afc1ca3ae8..df27a5d59c0 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45766.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45766.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45766", "sourceIdentifier": "security_alert@emc.com", "published": "2024-10-17T02:15:02.273", - "lastModified": "2024-10-17T02:15:02.273", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell OpenManage Enterprise, version(s) OME 4.1 and prior, contain(s) an Improper Control of Generation of Code ('Code Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution." + }, + { + "lang": "es", + "value": "Dell OpenManage Enterprise, versi\u00f3n(es) OME 4.1 y anteriores, contiene(n) una vulnerabilidad de control inadecuado de generaci\u00f3n de c\u00f3digo (\"inyecci\u00f3n de c\u00f3digo\"). Un atacante con privilegios reducidos y acceso remoto podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45767.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45767.json index ce27336bdf4..973cd1474c1 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45767.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45767.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45767", "sourceIdentifier": "security_alert@emc.com", "published": "2024-10-17T02:15:02.587", - "lastModified": "2024-10-17T02:15:02.587", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell OpenManage Enterprise, version(s) OME 4.1 and prior, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure." + }, + { + "lang": "es", + "value": "Dell OpenManage Enterprise, versi\u00f3n(es) OME 4.1 y anteriores, contiene(n) una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL (\"inyecci\u00f3n SQL\"). Un atacante con privilegios reducidos y acceso remoto podr\u00eda aprovechar esta vulnerabilidad, lo que dar\u00eda lugar a la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json index 0ea4a581926..7b3fa6a9b6d 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45795.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45795", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:26.660", - "lastModified": "2024-10-16T19:15:26.660", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, rules using datasets with the non-functional / unimplemented \"unset\" option can trigger an assertion during traffic parsing, leading to denial of service. This issue is addressed in 7.0.7. As a workaround, use only trusted and well tested rulesets." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.7, las reglas que utilizan conjuntos de datos con la opci\u00f3n \"unset\" no funcional o no implementada pueden activar una aserci\u00f3n durante el an\u00e1lisis del tr\u00e1fico, lo que genera una denegaci\u00f3n de servicio. Este problema se soluciona en la versi\u00f3n 7.0.7. Como workaround, utilice solo conjuntos de reglas confiables y bien probados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json index 74f79b32a13..9a522b2a9be 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45796.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45796", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:26.923", - "lastModified": "2024-10-16T19:15:26.923", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, a logic error during fragment reassembly can lead to failed reassembly for valid traffic. An attacker could craft packets to trigger this behavior.This issue has been addressed in 7.0.7." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.7, un error l\u00f3gico durante el reensamblado de fragmentos pod\u00eda provocar un reensamblado fallido para el tr\u00e1fico v\u00e1lido. Un atacante podr\u00eda crear paquetes para desencadenar este comportamiento. Este problema se ha solucionado en la versi\u00f3n 7.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45797.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45797.json index 63cec51eeb0..229226bfb13 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45797.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45797.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45797", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:27.177", - "lastModified": "2024-10-16T19:15:27.177", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Prior to version 0.5.49, unbounded processing of HTTP request and response headers can lead to excessive CPU time and memory utilization, possibly leading to extreme slowdowns. This issue is addressed in 0.5.49." + }, + { + "lang": "es", + "value": "LibHTP es un analizador que tiene en cuenta la seguridad del protocolo HTTP y sus componentes relacionados. Antes de la versi\u00f3n 0.5.49, el procesamiento ilimitado de los encabezados de solicitud y respuesta HTTP pod\u00eda generar un uso excesivo de la memoria y del tiempo de CPU, lo que posiblemente provocara ralentizaciones extremas. Este problema se solucion\u00f3 en la versi\u00f3n 0.5.49." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46212.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46212.json index 403c1e51cd5..2cc5945cf3c 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46212.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46212", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T21:15:12.840", - "lastModified": "2024-10-17T17:35:07.863", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json index fb4b2dcbcd0..b846a7af825 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46213", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T21:15:12.947", - "lastModified": "2024-10-17T17:35:08.640", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json index 4012ede10fa..37cd7593cf2 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46605", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T17:15:17.023", - "lastModified": "2024-10-16T20:35:13.927", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the component /admin.php?page=album of Piwigo v14.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente /admin.php?page=album de Piwigo v14.5.0 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload manipulado espec\u00edficamente para tal fin e inyectada en el campo Descripci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46606.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46606.json index 823626081b7..035b15f7765 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46606.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46606", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T17:15:17.117", - "lastModified": "2024-10-17T14:35:23.400", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json index 16ed508fdc1..2abca207afc 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46897", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-18T06:15:04.813", - "lastModified": "2024-10-18T06:15:04.813", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json index 02b076434dd..bdc3181c096 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4690.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4690", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.740", - "lastModified": "2024-10-16T17:15:17.740", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of XML External Entity Reference vulnerability in OpenText Application Automation Tools allows DTD Injection.This issue affects OpenText Application Automation Tools: 24.1.0 and below." + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n incorrecta de referencia de entidad externa XML en OpenText Application Automation Tools permite la inyecci\u00f3n de DTD. Este problema afecta a OpenText Application Automation Tools: 24.1.0 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json index d7c19b1c515..fcfd1bbfb32 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4692.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4692", "sourceIdentifier": "security@opentext.com", "published": "2024-10-16T17:15:17.873", - "lastModified": "2024-10-16T17:15:17.873", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Validation of Specified Quantity in Input vulnerability in OpenText OpenText Application Automation Tools allows Exploiting Incorrectly Configured Access Control Security Levels.\n\n\nMultiple missing permission checks - Service Virtualization config has been discovered in in OpenText Application Automation Tools. The vulnerability could allow users with Overall/Read permission to enumerate Service Virtualization server names.\n\nThis issue affects OpenText Application Automation Tools: 24.1.0 and below." + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n incorrecta de la cantidad especificada en la entrada en OpenText Las herramientas de automatizaci\u00f3n de aplicaciones de OpenText permiten explotar niveles de seguridad de control de acceso configurados incorrectamente. Se han descubierto m\u00faltiples comprobaciones de permisos faltantes en la configuraci\u00f3n de Service Virtualization en las herramientas de automatizaci\u00f3n de aplicaciones de OpenText. La vulnerabilidad podr\u00eda permitir que los usuarios con permiso general/de lectura enumeren los nombres de los servidores de Service Virtualization. Este problema afecta a las herramientas de automatizaci\u00f3n de aplicaciones de OpenText: 24.1.0 y anteriores." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json index 8e354c8f552..d027f469756 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47187.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47187", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:27.407", - "lastModified": "2024-10-16T19:15:27.407", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, missing initialization of the random seed for \"thash\" leads to datasets having predictable hash table behavior. This can lead to dataset file loading to use excessive time to load, as well as runtime performance issues during traffic handling. This issue has been addressed in 7.0.7. As a workaround, avoid loading datasets from untrusted sources. Avoid dataset rules that track traffic in rules." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.7, la falta de inicializaci\u00f3n de la semilla aleatoria para \"thash\" provocaba que los conjuntos de datos tuvieran un comportamiento de tabla hash predecible. Esto puede provocar que la carga de archivos de conjuntos de datos utilice un tiempo excesivo para cargarse, as\u00ed como problemas de rendimiento en tiempo de ejecuci\u00f3n durante el manejo del tr\u00e1fico. Este problema se ha solucionado en la versi\u00f3n 7.0.7. Como workaround, evite cargar conjuntos de datos de fuentes no confiables. Evite las reglas de conjuntos de datos que rastrean el tr\u00e1fico en las reglas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json index 40249689a0a..3aea0ef94d5 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47188.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47188", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T19:15:27.670", - "lastModified": "2024-10-16T19:15:27.670", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, missing initialization of the random seed for \"thash\" leads to byte-range tracking having predictable hash table behavior. This can lead to an attacker forcing lots of data into a single hash bucket, leading to severe performance degradation. This issue has been addressed in 7.0.7." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.7, la falta de inicializaci\u00f3n de la semilla aleatoria para \"thash\" provocaba que el seguimiento del rango de bytes tuviera un comportamiento de tabla hash predecible. Esto puede provocar que un atacante fuerce una gran cantidad de datos en un solo contenedor hash, lo que provoca una degradaci\u00f3n grave del rendimiento. Este problema se ha solucionado en la versi\u00f3n 7.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47240.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47240.json new file mode 100644 index 00000000000..db885c4ffdd --- /dev/null +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47240.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47240", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-10-18T12:15:02.773", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell Secure Connect Gateway (SCG) 5.24 contains an Incorrect Default Permissions vulnerability. A local attacker with low privileges can access the file system and could potentially exploit this vulnerability to gain write access to unauthorized data and cause a version update failure condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000237211/dsa-2024-407-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47304.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47304.json index 4eed900534b..63bc05db1e8 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47304.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47304.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47304", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:07.400", - "lastModified": "2024-10-17T18:15:07.400", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPManageNinja LLC Fluent Support allows SQL Injection.This issue affects Fluent Support: from n/a through 1.8.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPManageNinja LLC Fluent Support permite la inyecci\u00f3n SQL. Este problema afecta a Fluent Support: desde n/a hasta 1.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47312.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47312.json index 653d0350a19..98c375ce7bc 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47312.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47312.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47312", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:07.660", - "lastModified": "2024-10-17T18:15:07.660", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPGrim Classic Editor and Classic Widgets allows SQL Injection.This issue affects Classic Editor and Classic Widgets: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPGrim Classic Editor and Classic Widgets permite la inyecci\u00f3n SQL. Este problema afecta al Editor cl\u00e1sico y los Widgets cl\u00e1sicos: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47459.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47459.json index 48e9bd64b81..7a31ae5eab4 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47459.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47459.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47459", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-17T15:15:13.400", - "lastModified": "2024-10-17T15:15:13.400", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Sampler versions 4.5 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS) condition. An attacker could exploit this vulnerability to crash the application, resulting in a DoS. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 4.5 y anteriores de Substance3D - Sampler se ven afectadas por una vulnerabilidad de desreferencia de puntero nulo que podr\u00eda provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en la aplicaci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad para bloquear la aplicaci\u00f3n, lo que provocar\u00eda una denegaci\u00f3n de servicio. Para aprovechar este problema es necesaria la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json index e087b0026ab..95d35f045fc 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47485.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47485", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-10-18T09:15:03.093", - "lastModified": "2024-10-18T09:15:03.093", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a CSV injection vulnerability in some HikCentral Master Lite versions. If exploited, an attacker could build malicious data to generate executable commands in the CSV file." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de CSV en algunas versiones de HikCentral Master Lite. Si se aprovecha, un atacante podr\u00eda crear datos maliciosos para generar comandos ejecutables en el archivo CSV." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json index 4105f7f3d14..849b04949a7 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47486", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-10-18T09:15:03.217", - "lastModified": "2024-10-18T09:15:03.217", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an XSS vulnerability in some HikCentral Master Lite versions. If exploited, an attacker could inject scripts into certain pages by building malicious data." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad XSS en algunas versiones de HikCentral Master Lite. Si se aprovecha, un atacante podr\u00eda inyectar scripts en determinadas p\u00e1ginas mediante la creaci\u00f3n de datos maliciosos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json index 8424bb34113..389c0b097d9 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47487.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47487", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-10-18T09:15:03.400", - "lastModified": "2024-10-18T09:15:03.400", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a SQL injection vulnerability in some HikCentral Professional versions. This could allow an authenticated user to execute arbitrary SQL queries." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en algunas versiones profesionales de HikCentral. Esto podr\u00eda permitir que un usuario autenticado ejecute consultas SQL arbitrarias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json index 833218ff6b5..6c11ce8111c 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47522", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T20:15:06.083", - "lastModified": "2024-10-16T20:15:06.083", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, invalid ALPN in TLS/QUIC traffic when JA4 matching/logging is enabled can lead to Suricata aborting with a panic. This issue has been addressed in 7.0.7. One may disable ja4 as a workaround." + }, + { + "lang": "es", + "value": "Suricata es un sistema de detecci\u00f3n de intrusiones, un sistema de prevenci\u00f3n de intrusiones y un motor de monitoreo de seguridad de red. Antes de la versi\u00f3n 7.0.7, un ALPN no v\u00e1lido en el tr\u00e1fico TLS/QUIC cuando la coincidencia/registro de JA4 est\u00e1 habilitado puede provocar que Suricata cancele la conexi\u00f3n con un mensaje de p\u00e1nico. Este problema se ha solucionado en la versi\u00f3n 7.0.7. Se puede deshabilitar JA4 como workaround." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json index bae170dbb2b..1381e499bee 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47793", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-18T06:15:05.230", - "lastModified": "2024-10-18T06:15:05.230", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json index 8154313fddf..a35ca49d712 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47836", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T20:15:06.350", - "lastModified": "2024-10-16T20:15:06.350", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Admidio is an open-source user management solution. Prior to version 4.3.12, an unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server. Version 4.3.12 fixes this issue." + }, + { + "lang": "es", + "value": "Admidio es una soluci\u00f3n de gesti\u00f3n de usuarios de c\u00f3digo abierto. Antes de la versi\u00f3n 4.3.12, una vulnerabilidad de deserializaci\u00f3n insegura permit\u00eda a cualquier usuario no autenticado ejecutar c\u00f3digo arbitrario en el servidor. La versi\u00f3n 4.3.12 soluciona este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47887.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47887.json index 83c80887dc8..67bb9643379 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47887.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47887.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47887", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T20:15:06.600", - "lastModified": "2024-10-16T21:15:13.053", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Action Pack is a framework for handling and responding to web requests. Starting in version 4.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. One may choose to use Ruby 3.2 as a workaround.Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected." + }, + { + "lang": "es", + "value": "Action Pack es un framework de trabajo para gestionar y responder a solicitudes web. A partir de la versi\u00f3n 4.0.0 y anteriores a las versiones 6.1.7.9, 7.0.8.5, 7.1.4.1 y 7.2.1.1, existe una posible vulnerabilidad de ReDoS en la autenticaci\u00f3n de token HTTP de Action Controller. En el caso de las aplicaciones que utilizan la autenticaci\u00f3n de token HTTP mediante `authenticate_or_request_with_http_token` o similar, un encabezado cuidadosamente dise\u00f1ado puede provocar que el an\u00e1lisis del encabezado tarde una cantidad inesperada de tiempo, lo que posiblemente resulte en una vulnerabilidad de DoS. Todos los usuarios que ejecuten una versi\u00f3n afectada deben actualizar a las versiones 6.1.7.9, 7.0.8.5, 7.1.4.1 o 7.2.1.1 o aplicar el parche correspondiente de inmediato. Se puede optar por utilizar Ruby 3.2 como workaround. Ruby 3.2 tiene mitigaciones para este problema, por lo que las aplicaciones Rails que utilizan Ruby 3.2 o versiones m\u00e1s nuevas no se ven afectadas. Rails 8.0.0.beta1 depende de Ruby 3.2 o superior, por lo que no se ve afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47888.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47888.json index 48d31e3ea9c..9acfd52de8c 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47888.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47888.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47888", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T21:15:13.180", - "lastModified": "2024-10-16T21:15:13.180", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Action Text brings rich text content and editing to Rails. Starting in version 6.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the `plain_text_for_blockquote_node helper` in Action Text. Carefully crafted text can cause the `plain_text_for_blockquote_node` helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. As a workaround, users can avoid calling `plain_text_for_blockquote_node` or upgrade to Ruby 3.2. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected." + }, + { + "lang": "es", + "value": "Action Text aporta contenido de texto enriquecido y edici\u00f3n a Rails. A partir de la versi\u00f3n 6.0.0 y anteriores a las versiones 6.1.7.9, 7.0.8.5, 7.1.4.1 y 7.2.1.1, existe una posible vulnerabilidad de ReDoS en el asistente `plain_text_for_blockquote_node` en Action Text. Un texto cuidadosamente elaborado puede hacer que el asistente `plain_text_for_blockquote_node` tarde una cantidad inesperada de tiempo, lo que posiblemente resulte en una vulnerabilidad de DoS. Todos los usuarios que ejecuten una versi\u00f3n afectada deben actualizar a las versiones 6.1.7.9, 7.0.8.5, 7.1.4.1 o 7.2.1.1 o aplicar el parche correspondiente inmediatamente. Como workaround, los usuarios pueden evitar llamar a `plain_text_for_blockquote_node` o actualizar a Ruby 3.2. Ruby 3.2 tiene mitigaciones para este problema, por lo que las aplicaciones Rails que usan Ruby 3.2 o una versi\u00f3n m\u00e1s reciente no se ven afectadas. Rails 8.0.0.beta1 depende de Ruby 3.2 o una versi\u00f3n posterior, por lo que no se ve afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47889.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47889.json index ac34f701c58..f2626f14e61 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47889.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47889.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47889", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T21:15:13.320", - "lastModified": "2024-10-16T21:15:13.320", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Action Mailer is a framework for designing email service layers. Starting in version 3.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the block_format helper in Action Mailer. Carefully crafted text can cause the block_format helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. As a workaround, users can avoid calling the `block_format` helper or upgrade to Ruby 3.2. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires Ruby 3.2 or greater so is unaffected." + }, + { + "lang": "es", + "value": "Action Mailer es un framework para dise\u00f1ar capas de servicio de correo electr\u00f3nico. A partir de la versi\u00f3n 3.0.0 y anteriores a las versiones 6.1.7.9, 7.0.8.5, 7.1.4.1 y 7.2.1.1, existe una posible vulnerabilidad de ReDoS en el asistente block_format de Action Mailer. Un texto cuidadosamente elaborado puede hacer que el asistente block_format tarde una cantidad inesperada de tiempo, lo que puede dar como resultado una vulnerabilidad de DoS. Todos los usuarios que ejecuten una versi\u00f3n afectada deben actualizar a las versiones 6.1.7.9, 7.0.8.5, 7.1.4.1 o 7.2.1.1 o aplicar el parche correspondiente de inmediato. Como workaround, los usuarios pueden evitar llamar al asistente `block_format` o actualizar a Ruby 3.2. Ruby 3.2 tiene mitigaciones para este problema, por lo que las aplicaciones Rails que usan Ruby 3.2 o versiones m\u00e1s nuevas no se ven afectadas. Rails 8.0.0.beta1 requiere Ruby 3.2 o superior, por lo que no se ve afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4739.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4739.json index b0dac65a2b0..a742b57c5e0 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4739.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4739.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4739", "sourceIdentifier": "psirt@moxa.com", "published": "2024-10-18T09:15:03.710", - "lastModified": "2024-10-18T09:15:03.710", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource." + }, + { + "lang": "es", + "value": "La falta de restricci\u00f3n de acceso a un recurso por parte de usuarios no autorizados hace que las versiones v1.1.0 y anteriores del software MXsecurity sean vulnerables. Al obtener un autenticador v\u00e1lido, un atacante puede hacerse pasar por un usuario autorizado y acceder al recurso con \u00e9xito." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4740.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4740.json index c60ab777bf0..0f5aaf42457 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4740.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4740.json @@ -2,13 +2,17 @@ "id": "CVE-2024-4740", "sourceIdentifier": "psirt@moxa.com", "published": "2024-10-18T09:15:04.237", - "lastModified": "2024-10-18T09:15:04.237", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MXsecurity software versions v1.1.0 and prior are vulnerable because of the use of hard-coded credentials. This vulnerability could allow an attacker to tamper with sensitive data." + }, + { + "lang": "es", + "value": "Las versiones v1.1.0 y anteriores del software MXsecurity son vulnerables debido al uso de credenciales codificadas. Esta vulnerabilidad podr\u00eda permitir que un atacante altere datos confidenciales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48021.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48021.json index 0df0092da8c..44ff840d7e1 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48021.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48021.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48021", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:12.260", - "lastModified": "2024-10-17T13:15:12.260", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Scott Paterson Contact Form 7 \u2013 PayPal & Stripe Add-on allows Reflected XSS.This issue affects Contact Form 7 \u2013 PayPal & Stripe Add-on: from n/a through 2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Scott Paterson Contact Form 7 \u2013 PayPal & Stripe Add-on permite XSS reflejado. Este problema afecta a Contact Form 7 \u2013 PayPal & Stripe Add-on: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48022.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48022.json index fb57e12bc9d..98aa5f07485 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48022.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48022.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48022", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:12.513", - "lastModified": "2024-10-17T13:15:12.513", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SysBasics Shortcode For Elementor Templates allows Stored XSS.This issue affects Shortcode For Elementor Templates: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en SysBasics Shortcode For Elementor Templates permite XSS almacenado. Este problema afecta a Shortcode For Elementor Templates: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48023.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48023.json index d1a82c22ae2..2f37cae1781 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48023.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48023.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48023", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:12.790", - "lastModified": "2024-10-17T13:15:12.790", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RestaurantConnect, Inc Restaurant Reservations Widget allows Reflected XSS.This issue affects Restaurant Reservations Widget: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en RestaurantConnect, Inc Restaurant Reservations Widget permite XSS reflejado. Este problema afecta al widget de reservas de restaurantes: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48024.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48024.json index a2aff3f9e02..1308ee3ddbf 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48024.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48024.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48024", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T12:15:02.230", - "lastModified": "2024-10-17T12:15:02.230", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": ": Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Fahad Mahmood Keep Backup Daily allows Retrieve Embedded Sensitive Data.This issue affects Keep Backup Daily: from n/a through 2.0.7." + }, + { + "lang": "es", + "value": ":La vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial del sistema a una esfera de control no autorizada en Fahad Mahmood Keep Backup Daily permite recuperar datos confidenciales integrados. Este problema afecta a Keep Backup Daily: desde n/a hasta 2.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48025.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48025.json index 434d31c4624..45301bdc8d6 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48025.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48025.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48025", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:13.017", - "lastModified": "2024-10-17T13:15:13.017", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in DOGROW.NET Simple Baseball Scoreboard allows Stored XSS.This issue affects Simple Baseball Scoreboard: from n/a through 1.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en DOGROW.NET Simple Baseball Scoreboard permite XSS almacenado. Este problema afecta a Simple Baseball Scoreboard: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48031.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48031.json index 65ddb7f6bab..a3f39a48f1f 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48031.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48031.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48031", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:13.240", - "lastModified": "2024-10-17T13:15:13.240", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) allows Cross Site Request Forgery.This issue affects Featured Posts with Multiple Custom Groups (FPMCG): from n/a through 4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) permite Cross-Site Request Forgery. Este problema afecta a Publicaciones destacadas con m\u00faltiples grupos personalizados (FPMCG): desde n/a hasta 4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48032.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48032.json index 035fd39dbc4..8c44e4b9062 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48032.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48032.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48032", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:13.460", - "lastModified": "2024-10-17T13:15:13.460", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) allows Reflected XSS.This issue affects Featured Posts with Multiple Custom Groups (FPMCG): from n/a through 4.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Sumit Surai Featured Posts with Multiple Custom Groups (FPMCG) permite XSS reflejado. Este problema afecta a Publicaciones destacadas con m\u00faltiples grupos personalizados (FPMCG): desde n/a hasta 4.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json index 76248e54010..7f8dab2b83a 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48036.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48036", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:13.677", - "lastModified": "2024-10-17T13:15:13.677", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Blocks \u2013 Gutenberg based Page Builder allows Stored XSS.This issue affects SKT Blocks \u2013 Gutenberg based Page Builder: from n/a through 1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en SKT Blocks \u2013 Gutenberg based Page Builder permite XSS almacenado. Este problema afecta a SKT Blocks \u2013 Gutenberg based Page Builder: desde n/a hasta 1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json index 5d8dccaa439..186d07d8698 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48037.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48037", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:13.927", - "lastModified": "2024-10-17T13:15:13.927", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in A WP Life Contact Form Widget allows Cross Site Request Forgery.This issue affects Contact Form Widget: from n/a through 1.4.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en A WP Life Contact Form Widget permite Cross-Site Request Forgery. Este problema afecta al widget de formulario de contacto: desde n/a hasta 1.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48038.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48038.json index e37b90b2f56..ba46a50641d 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48038.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48038.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48038", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T12:15:02.457", - "lastModified": "2024-10-17T12:15:02.457", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Hans Matzen wp-Monalisa allows Cross Site Request Forgery.This issue affects wp-Monalisa: from n/a through 6.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en wp-Monalisa de Hans Matzen permite Cross-Site Request Forgery. Este problema afecta a wp-Monalisa: desde n/a hasta 6.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48043.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48043.json index 2b5aae4fc77..778c0603652 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48043.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48043.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48043", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T12:15:02.677", - "lastModified": "2024-10-17T12:15:02.677", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ShortPixel ShortPixel Image Optimizer allows Blind SQL Injection.This issue affects ShortPixel Image Optimizer: from n/a through 5.6.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en ShortPixel ShortPixel Image Optimizer permite la inyecci\u00f3n SQL ciega. Este problema afecta a ShortPixel Image Optimizer: desde n/a hasta 5.6.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json index 7fa5aa7b1b6..cb6a76106ad 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48046.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48046", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:14.170", - "lastModified": "2024-10-17T13:15:14.170", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Supsystic Contact Form by Supsystic allows Stored XSS.This issue affects Contact Form by Supsystic: from n/a through 1.7.28." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Supsystic Contact Form de Supsystic permite XSS almacenado. Este problema afecta a Contact Form de Supsystic: desde n/a hasta 1.7.28." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48047.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48047.json index 3dd3c663bc2..d3935fcdfc3 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48047.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48047.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48047", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T12:15:02.880", - "lastModified": "2024-10-17T12:15:02.880", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Razon Komar Pal Linked Variation for WooCommerce allows Cross Site Request Forgery.This issue affects Linked Variation for WooCommerce: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Razon Komar Pal Linked Variation para WooCommerce permite Cross-Site Request Forgery. Este problema afecta a Linked Variation para WooCommerce: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json index 5ae0a5c1111..da42ac9abd2 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48048.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48048", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T13:15:14.390", - "lastModified": "2024-10-17T13:15:14.390", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in WSIFY \u2013 Sales can fly Wsify Widget allows Stored XSS.This issue affects Wsify Widget: from n/a through 1.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WSIFY \u2013 Sales can fly Wsify Widget permite XSS almacenado. Este problema afecta al widget Wsify: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json index e76c104a9f0..b936dda025f 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48180", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T21:15:13.457", - "lastModified": "2024-10-17T17:35:08.990", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json index 07d130f19fb..c214ea0bae9 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48192.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48192", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T17:15:12.380", - "lastModified": "2024-10-17T18:35:11.500", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tenda G3 v15.01.0.5(2848_755)_EN was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Tenda G3 v15.01.0.5(2848_755)_EN contiene una vulnerabilidad de contrase\u00f1a codificada en /etc_ro/shadow, que permite a los atacantes iniciar sesi\u00f3n como superusuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48629.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48629.json index 9e01af4c70e..700bca1789b 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48629.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48629.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48629", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.210", - "lastModified": "2024-10-17T19:35:15.163", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the IPAddress parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro IPAddress en la funci\u00f3n SetGuestZoneRouterSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48630.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48630.json index 40319655436..428a78b5cef 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48630.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48630.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48630", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.273", - "lastModified": "2024-10-17T19:35:16.330", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the MacAddress parameter in the SetMACFilters2 function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro MacAddress en la funci\u00f3n SetMACFilters2. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48631.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48631.json index 6243b3d81a7..9f849747868 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48631.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48631.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48631", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.323", - "lastModified": "2024-10-17T19:35:17.213", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro SSID en la funci\u00f3n SetWLanRadioSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48632.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48632.json index 138c76a8a4f..d82f4d44dc3 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48632.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48632.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48632", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.373", - "lastModified": "2024-10-17T19:35:18.050", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the LocalIPAddress, TCPPorts, and UDPPorts parameters in the SetPortForwardingSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos a trav\u00e9s de los par\u00e1metros LocalIPAddress, TCPPorts y UDPPorts en la funci\u00f3n SetPortForwardingSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48633.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48633.json index a51717111d3..67a27b64f67 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48633.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48633.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48633", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.447", - "lastModified": "2024-10-17T19:35:18.907", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain multiple command injection vulnerabilities via the ExternalPort, InternalPort, ProtocolNumber, and LocalIPAddress parameters in the SetVirtualServerSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen m\u00faltiples vulnerabilidades de inyecci\u00f3n de comandos a trav\u00e9s de los par\u00e1metros ExternalPort, InternalPort, ProtocolNumber y LocalIPAddress en la funci\u00f3n SetVirtualServerSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48634.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48634.json index 32dacf82b9d..02f992c84ea 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48634.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48634.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48634", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.510", - "lastModified": "2024-10-17T19:35:19.700", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the key parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro clave en la funci\u00f3n SetWLanRadioSecurity. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48635.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48635.json index ae1bafebc08..73281cc19ce 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48635.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48635.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48635", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.573", - "lastModified": "2024-10-17T19:35:20.497", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:2/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro VLANID:2/VID en la funci\u00f3n SetVLANSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48636.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48636.json index 75049aca68c..4f831bd0ec0 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48636.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48636.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48636", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.627", - "lastModified": "2024-10-17T19:35:21.287", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:0/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro VLANID:0/VID en la funci\u00f3n SetVLANSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48637.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48637.json index 0a596c13db9..0b5d8e9772b 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48637.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48637.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48637", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.680", - "lastModified": "2024-10-17T19:35:22.077", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:1/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro VLANID:1/VID en la funci\u00f3n SetVLANSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48638.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48638.json index b0a913f22b5..fb905f5892a 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48638.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48638.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48638", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T18:15:08.730", - "lastModified": "2024-10-17T19:35:22.947", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the SubnetMask parameter in the SetGuestZoneRouterSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DIR_882_FW130B06 y DIR_878 DIR_878_FW130B08 de D-Link contienen una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro SubnetMask en la funci\u00f3n SetGuestZoneRouterSettings. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de una solicitud POST manipulada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48758.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48758.json index 7a779055e52..4cc3a799975 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48758.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48758.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48758", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T21:15:13.557", - "lastModified": "2024-10-17T17:35:09.817", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48918.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48918.json index 29b9f4e3f09..fed43f9a15c 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48918.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48918.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48918", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-16T21:15:13.650", - "lastModified": "2024-10-16T21:15:13.650", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "RDS Light is a simplified version of the Reflective Dialogue System (RDS), a self-reflecting AI framework. Versions prior to 1.1.0 contain a vulnerability that involves a lack of input validation within the RDS AI framework, specifically within the user input handling code in the main module (`main.py`). This leaves the framework open to injection attacks and potential memory tampering. Any user or external actor providing input to the system could exploit this vulnerability to inject malicious commands, corrupt stored data, or affect API calls. This is particularly critical for users employing RDS AI in production environments where it interacts with sensitive systems, performs dynamic memory caching, or retrieves user-specific data for analysis. Impacted areas include developers using the RDS AI system as a backend for AI-driven applications and systems running RDS AI that may be exposed to untrusted environments or receive unverified user inputs. The vulnerability has been patched in version 1.1.0 of the RDS AI framework. All user inputs are now sanitized and validated against a set of rules designed to mitigate malicious content. Users should upgrade to version 1.1.0 or higher and ensure all dependencies are updated to their latest versions. For users unable to upgrade to the patched version, a workaround can be implemented. The user implementing the workaround should implement custom validation checks for user inputs to filter out unsafe characters and patterns (e.g., SQL injection attempts, script injections) and limit or remove features that allow user input until the system can be patched." + }, + { + "lang": "es", + "value": "RDS Light es una versi\u00f3n simplificada del Reflective Dialogue System (RDS), un framework de trabajo de IA autorreflexivo. Las versiones anteriores a la 1.1.0 contienen una vulnerabilidad que implica una falta de validaci\u00f3n de entrada dentro del framework de trabajo de IA de RDS, espec\u00edficamente dentro del c\u00f3digo de manejo de entrada del usuario en el m\u00f3dulo principal (`main.py`). Esto deja al framework abierto a ataques de inyecci\u00f3n y posible manipulaci\u00f3n de la memoria. Cualquier usuario o actor externo que proporcione informaci\u00f3n al sistema podr\u00eda explotar esta vulnerabilidad para inyectar comandos maliciosos, corromper datos almacenados o afectar las llamadas de API. Esto es particularmente cr\u00edtico para los usuarios que emplean RDS AI en entornos de producci\u00f3n donde interact\u00faa con sistemas sensibles, realiza almacenamiento en cach\u00e9 de memoria din\u00e1mica o recupera datos espec\u00edficos del usuario para su an\u00e1lisis. Las \u00e1reas afectadas incluyen desarrolladores que utilizan el sistema de IA de RDS como backend para aplicaciones impulsadas por IA y sistemas que ejecutan RDS AI que pueden estar expuestos a entornos no confiables o recibir entradas de usuario no verificadas. La vulnerabilidad ha sido corregida en la versi\u00f3n 1.1.0 del framework de trabajo de IA de RDS. Ahora, todas las entradas de los usuarios se desinfectan y validan con un conjunto de reglas dise\u00f1adas para mitigar el contenido malicioso. Los usuarios deben actualizar a la versi\u00f3n 1.1.0 o superior y asegurarse de que todas las dependencias est\u00e9n actualizadas a sus \u00faltimas versiones. Para los usuarios que no puedan actualizar a la versi\u00f3n parcheada, se puede implementar una soluci\u00f3n alternativa. El usuario que implemente la soluci\u00f3n alternativa debe implementar verificaciones de validaci\u00f3n personalizadas para las entradas de los usuarios a fin de filtrar caracteres y patrones no seguros (por ejemplo, intentos de inyecci\u00f3n SQL, inyecciones de scripts) y limitar o eliminar las funciones que permiten la entrada de datos por parte del usuario hasta que se pueda aplicar el parche al sistema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48920.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48920.json index d8e01d4c94d..5420dda43ba 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48920.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48920.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48920", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-17T15:15:13.603", - "lastModified": "2024-10-17T15:15:13.603", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PutongOJ is online judging software. Prior to version 2.1.0-beta.1, unprivileged users can escalate privileges by constructing requests. This can lead to unauthorized access, enabling users to perform admin-level operations, potentially compromising sensitive data and system integrity. This problem has been fixed in v2.1.0.beta.1. As a workaround, one may apply the patch from commit `211dfe9` manually." + }, + { + "lang": "es", + "value": "PutongOJ es un software de evaluaci\u00f3n en l\u00ednea. Antes de la versi\u00f3n 2.1.0-beta.1, los usuarios sin privilegios pod\u00edan escalar privilegios mediante la creaci\u00f3n de solicitudes. Esto puede provocar un acceso no autorizado, lo que permite a los usuarios realizar operaciones de nivel de administrador, lo que podr\u00eda comprometer la informaci\u00f3n confidencial y la integridad del sistema. Este problema se ha solucionado en la versi\u00f3n v2.1.0.beta.1. Como workaround, se puede aplicar el parche de el commit `211dfe9` de forma manual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48924.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48924.json index 2f695b9e87c..695319ab2f6 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48924.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48924.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48924", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-17T21:15:14.070", - "lastModified": "2024-10-17T21:15:14.070", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "### Impact\n\nWhen this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by an attacker that sends data contrived to produce hash collisions, leading to large CPU consumption disproportionate to the size of the data being deserialized.\n\nThis is similar to [a prior advisory](https://github.com/MessagePack-CSharp/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf), which provided an inadequate fix for the hash collision part of the vulnerability.\n\n### Patches\n\nThe following steps are required to mitigate this risk.\n\n1. Upgrade to a version of the library where a fix is available.\n1. Review the steps in [this previous advisory](https://github.com/MessagePack-CSharp/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf) to ensure you have your application configured for untrusted data.\n\n### Workarounds\n\nIf upgrading MessagePack to a patched version is not an option for you, you may apply a manual workaround as follows:\n\n1. Declare a class that derives from `MessagePackSecurity`.\n2. Override the `GetHashCollisionResistantEqualityComparer` method to provide a collision-resistant hash function of your own and avoid calling `base.GetHashCollisionResistantEqualityComparer()`.\n3. Configure a `MessagePackSerializerOptions` with an instance of your derived type by calling `WithSecurity` on an existing options object.\n4. Use your custom options object for all deserialization operations. This may be by setting the `MessagePackSerializer.DefaultOptions` static property, if you call methods that rely on this default property, and/or by passing in the options object explicitly to any `Deserialize` method.\n\n### References\n\n- Learn more about best security practices when reading untrusted data with [MessagePack 1.x](https://github.com/MessagePack-CSharp/MessagePack-CSharp/tree/v1.x#security) or [MessagePack 2.x](https://github.com/MessagePack-CSharp/MessagePack-CSharp#security).\n- The .NET team's [discussion on hash collision vulnerabilities of their `HashCode` struct](https://github.com/GrabYourPitchforks/runtime/blob/threat_models/docs/design/security/System.HashCode.md).\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* [Start a public discussion](https://github.com/MessagePack-CSharp/MessagePack-CSharp/discussions)\n* [Email us privately](mailto:andrewarnott@live.com)" + }, + { + "lang": "es", + "value": "### Impacto Cuando esta librer\u00eda se utiliza para deserializar datos de un paquete de mensajes de una fuente no confiable, existe el riesgo de un ataque de denegaci\u00f3n de servicio por parte de un atacante que env\u00eda datos dise\u00f1ados para producir colisiones de hash, lo que lleva a un gran consumo de CPU desproporcionado al tama\u00f1o de los datos que se deserializan. Esto es similar a [un aviso anterior](https://github.com/MessagePack-CSharp/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf), que proporcion\u00f3 una soluci\u00f3n inadecuada para la parte de colisi\u00f3n de hash de la vulnerabilidad. ### Parches Se requieren los siguientes pasos para mitigar este riesgo. 1. Actualice a una versi\u00f3n de la librer\u00eda donde haya una soluci\u00f3n disponible. 1. Revise los pasos en [este aviso anterior](https://github.com/MessagePack-CSharp/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf) para asegurarse de que su aplicaci\u00f3n est\u00e9 configurada para datos no confiables. ### workarounds Si actualizar MessagePack a una versi\u00f3n parcheada no es una opci\u00f3n para usted, puede aplicar un workaround manual de la siguiente manera: 1. Declare una clase que derive de `MessagePackSecurity`. 2. Anule el m\u00e9todo `GetHashCollisionResistantEqualityComparer` para proporcionar una funci\u00f3n hash resistente a colisiones propia y evitar llamar a `base.GetHashCollisionResistantEqualityComparer()`. 3. Configure `MessagePackSerializerOptions` con una instancia de su tipo derivado llamando a `WithSecurity` en un objeto de opciones existente. 4. Utilice su objeto de opciones personalizado para todas las operaciones de deserializaci\u00f3n. Esto puede hacerse configurando la propiedad est\u00e1tica `MessagePackSerializer.DefaultOptions`, si llama a m\u00e9todos que dependen de esta propiedad predeterminada, y/o pasando el objeto de opciones expl\u00edcitamente a cualquier m\u00e9todo `Deserialize`. ### Referencias: Obtenga m\u00e1s informaci\u00f3n sobre las mejores pr\u00e1cticas de seguridad al leer datos no confiables con [MessagePack 1.x](https://github.com/MessagePack-CSharp/MessagePack-CSharp/tree/v1.x#security) o [MessagePack 2.x](https://github.com/MessagePack-CSharp/MessagePack-CSharp#security). - El equipo .NET [discusi\u00f3n sobre las vulnerabilidades de colisi\u00f3n de hash de su estructura `HashCode`](https://github.com/GrabYourPitchforks/runtime/blob/threat_models/docs/design/security/System.HashCode.md). ### Para obtener m\u00e1s informaci\u00f3n Si tiene alguna pregunta o comentario sobre este aviso: * [Inicie una discusi\u00f3n p\u00fablica](https://github.com/MessagePack-CSharp/MessagePack-CSharp/discussions) * [Env\u00edenos un correo electr\u00f3nico privado](mailto:andrewarnott@live.com)" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json index b705ae94517..691a488e1e4 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49023.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49023", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-18T01:15:40.747", - "lastModified": "2024-10-18T01:15:40.747", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49217.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49217.json index 925431e6974..5407aeaf535 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49217.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49217.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49217", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:08.830", - "lastModified": "2024-10-17T18:15:08.830", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in Madiri Salman Aashish Adding drop down roles in registration allows Privilege Escalation.This issue affects Adding drop down roles in registration: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Madiri Salman Aashish. Agregar roles desplegables en el registro permite la escalada de privilegios. Este problema afecta a Agregar roles desplegables en el registro: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49219.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49219.json index cad114004b7..32a0ff8b1de 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49219.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49219.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49219", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:09.037", - "lastModified": "2024-10-17T18:15:09.037", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in themexpo RS-Members allows Privilege Escalation.This issue affects RS-Members: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en themexpo RS-Members permite la escalada de privilegios. Este problema afecta a los RS-Members: desde n/a hasta 1.0.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49220.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49220.json index 1962d3ff27b..ce51bad63fb 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49220.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49220.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49220", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:09.227", - "lastModified": "2024-10-17T18:15:09.227", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Cookie Scanner \u2013 Nikel Schubert Cookie Scanner allows Stored XSS.This issue affects Cookie Scanner: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Cookie Scanner: Nikel Schubert Cookie Scanner permite XSS almacenado. Este problema afecta a Cookie Scanner: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49221.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49221.json index 572fa9bedcc..17d07cdfebe 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49221.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49221.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49221", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:09.450", - "lastModified": "2024-10-17T18:15:09.450", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Julian Weinert // cs&m cSlider allows Stored XSS.This issue affects cSlider: from n/a through 2.4.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Julian Weinert // cs&m cSlider permite XSS almacenado. Este problema afecta a cSlider: desde n/a hasta 2.4.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49223.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49223.json index 0457ab11d67..72d0628ae7a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49223.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49223.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49223", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:09.673", - "lastModified": "2024-10-17T18:15:09.673", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Shibu Lijack a.K.A CyberJack CJ Change Howdy allows Stored XSS.This issue affects CJ Change Howdy: from n/a through 3.3.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Shibu Lijack a.K.A CyberJack CJ Change Howdy permite XSS almacenado. Este problema afecta a CJ Change Howdy: desde n/a hasta 3.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json index 5cdc3fc5f24..ed0d0df1241 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49224.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49224", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:04.593", - "lastModified": "2024-10-18T10:15:04.593", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mahesh Patel Mitm Bug Tracker allows Reflected XSS.This issue affects Mitm Bug Tracker: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Mahesh Patel Mitm Bug Tracker permite XSS reflejado. Este problema afecta a Mitm Bug Tracker: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json index 82a7c131256..984aaa08e03 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49225.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49225", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:04.890", - "lastModified": "2024-10-18T10:15:04.890", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Swebdeveloper wpPricing Builder allows Stored XSS.This issue affects wpPricing Builder: from n/a through 1.5.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en wpPricing Builder de Swebdeveloper permite XSS almacenado. Este problema afecta a wpPricing Builder: desde n/a hasta 1.5.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json index 109178a671c..598481d0b4c 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49228.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49228", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:05.233", - "lastModified": "2024-10-18T10:15:05.233", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrossedCode bVerse Convert allows Stored XSS.This issue affects bVerse Convert: from n/a through 1.3.7.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CrossedCode bVerse Convert permite XSS almacenado. Este problema afecta a bVerse Convert: desde n/a hasta 1.3.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49229.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49229.json index eec19fcb46f..c25eeb9b10a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49229.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49229.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49229", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:09.893", - "lastModified": "2024-10-17T18:15:09.893", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Arif Nezami Better Author Bio allows Cross-Site Scripting (XSS).This issue affects Better Author Bio: from n/a through 2.7.10.11." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Arif Nezami Better Author Bio permite Cross-Site Scripting (XSS). Este problema afecta a Better Author Bio: desde n/a hasta 2.7.10.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json index eca449e3770..2c7a7351a5b 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49230.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49230", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:05.533", - "lastModified": "2024-10-18T10:15:05.533", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Harpreet Singh Ajax Custom CSS/JS allows Reflected XSS.This issue affects Ajax Custom CSS/JS: from n/a through 2.0.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Harpreet Singh Ajax Custom CSS/JS permite XSS reflejado. Este problema afecta a Ajax Custom CSS/JS: desde n/a hasta 2.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json index e4b5fdf73a3..8952081147c 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49231.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49231", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:05.817", - "lastModified": "2024-10-18T10:15:05.817", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Peter CyClop WordPress Video allows Stored XSS.This issue affects WordPress Video: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Peter CyClop WordPress Video permite XSS almacenado. Este problema afecta a WordPress Video: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json index b0e37e26e8e..87c62428b7a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49232.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49232", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:06.143", - "lastModified": "2024-10-18T10:15:06.143", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Javier Loureiro El mejor Cluster allows DOM-Based XSS.This issue affects El mejor Cluster: from n/a through 1.1.14." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Javier Loureiro El mejor Cluster permite XSS basado en DOM. Este problema afecta a El mejor Cluster: desde n/a hasta 1.1.14." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json index 24f840fd442..60bafb0c106 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49233.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49233", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:06.433", - "lastModified": "2024-10-18T10:15:06.433", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MadrasThemes MAS Elementor allows DOM-Based XSS.This issue affects MAS Elementor: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en MadrasThemes MAS Elementor permite XSS basado en DOM. Este problema afecta a MAS Elementor: desde n/a hasta 1.1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json index bb6362b3fd0..590354ea028 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49234.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49234", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:06.777", - "lastModified": "2024-10-18T10:15:06.777", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in themeworm Plexx Elementor Extension allows Stored XSS.This issue affects Plexx Elementor Extension: from n/a through 1.3.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en themeworm Plexx Elementor Extension permite XSS almacenado. Este problema afecta a Plexx Elementor Extension: desde n/a hasta 1.3.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json index 4a8a3d26082..8b018685de0 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49235.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49235", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:10.107", - "lastModified": "2024-10-17T18:15:10.107", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information Into Sent Data vulnerability in VideoWhisper.Com Contact Forms, Live Support, CRM, Video Messages allows Retrieve Embedded Sensitive Data.This issue affects Contact Forms, Live Support, CRM, Video Messages: from n/a through 1.10.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en los datos enviados en VideoWhisper.Com Contact Forms, Live Support, CRM, Video Messages permite recuperar datos confidenciales integrados. Este problema afecta a los formularios de contacto, soporte en vivo, CRM y mensajes de video: desde n/a hasta 1.10.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json index 7f4b6add299..876e87d8d80 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49236.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49236", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.103", - "lastModified": "2024-10-18T10:15:07.103", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hafiz Uddin Ahmed Crazy Call To Action Box allows Stored XSS.This issue affects Crazy Call To Action Box: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Crazy Call To Action Box de Hafiz Uddin Ahmed permite XSS almacenado. Este problema afecta a Crazy Call To Action Box: desde n/a hasta 1.0.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49237.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49237.json index 19a86f4fc3e..c8b0c78230b 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49237.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49237.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49237", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:10.670", - "lastModified": "2024-10-17T18:15:10.670", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ahmet Imamoglu Ahmeti Wp Timeline allows Stored XSS.This issue affects Ahmeti Wp Timeline: from n/a through 5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en Ahmet Imamoglu Ahmeti Wp Timeline permite XSS almacenado. Este problema afecta a Ahmet Wp Timeline: desde n/a hasta 5.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json index 6637b762c18..9353aa80ae8 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49238.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49238", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.400", - "lastModified": "2024-10-18T10:15:07.400", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in M. Konieczny, DH9SB ADIF Log Search Widget allows Reflected XSS.This issue affects ADIF Log Search Widget: from n/a through 1.0f." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en M. Konieczny, DH9SB ADIF Log Search Widget permite XSS reflejado. Este problema afecta al widget de b\u00fasqueda de registros de ADIF: desde n/a hasta 1.0f." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json index 236bb999634..5b1133f0ec7 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49239.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49239", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.653", - "lastModified": "2024-10-18T10:15:07.653", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nikhil Vaghela Add Categories Post Footer allows Reflected XSS.This issue affects Add Categories Post Footer: from n/a through 2.2.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Nikhil Vaghela Add Categories Post Footer permite XSS reflejado. Este problema afecta a Add Categories Post Footer: desde n/a hasta 2.2.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json index d867b7f8cce..b620b678f28 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49240.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49240", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:07.937", - "lastModified": "2024-10-18T10:15:07.937", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Agustin Berasategui AB Categories Search Widget allows Reflected XSS.This issue affects AB Categories Search Widget: from n/a through 0.2.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Agustin Berasategui AB Categories Search Widget permite XSS reflejado. Este problema afecta al widget de b\u00fasqueda de categor\u00edas de AB: desde n/a hasta 0.2.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json index 1c285c359b0..78d6562f87d 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49241.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49241", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:08.167", - "lastModified": "2024-10-18T10:15:08.167", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tady Walsh Tito allows DOM-Based XSS.This issue affects Tito: from n/a through 2.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Tady Walsh Tito permite XSS basado en DOM. Este problema afecta a Tito: desde n/a hasta 2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49243.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49243.json index fa81b40b29b..abffcae6c8e 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49243.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49243.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49243", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-18T10:15:08.450", - "lastModified": "2024-10-18T10:15:08.450", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jon Vincent Mendoza Dynamic Elementor Addons allows PHP Local File Inclusion.This issue affects Dynamic Elementor Addons: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en Jon Vincent Mendoza Dynamic Elementor Addons permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Dynamic Elementor Addons: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49244.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49244.json index 09bde71517e..46c713fd079 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49244.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49244.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49244", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:11.503", - "lastModified": "2024-10-17T18:15:11.503", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in cmssoft CSV Product Import Export for WooCommerce allows SQL Injection.This issue affects CSV Product Import Export for WooCommerce: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en cmssoft CSV Product Import Export for WooCommerce permite la inyecci\u00f3n SQL. Este problema afecta a CSV Product Import Export for WooCommerce: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49246.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49246.json index 121d85b0393..3837f9916a3 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49246.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49246.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49246", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:12.123", - "lastModified": "2024-10-17T18:15:12.123", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in anand23 Ajax Rating with Custom Login allows SQL Injection.This issue affects Ajax Rating with Custom Login: from n/a through 1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en anand23 Ajax Rating with Custom Login permite la inyecci\u00f3n SQL. Este problema afecta a Ajax Rating con inicio de sesi\u00f3n personalizado: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49248.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49248.json index f3904b13624..274c5411783 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49248.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49248.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49248", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:04.777", - "lastModified": "2024-10-17T20:15:04.777", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Igor Funa Ad Inserter allows Reflected XSS.This issue affects Ad Inserter: from n/a through 2.7.37." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Igor Funa Ad Inserter permite XSS reflejado. Este problema afecta a Ad Inserter: desde n/a hasta 2.7.37." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49255.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49255.json index ad1d02e39c0..a0c57246c06 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49255.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49255.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49255", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:05.373", - "lastModified": "2024-10-17T20:15:05.373", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Daniele Alessandra Da Reactions allows Stored XSS.This issue affects Da Reactions: from n/a through 5.1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Daniele Alessandra Da Reactions permite XSS almacenado. Este problema afecta a Da Reactions: desde n/a hasta 5.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49259.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49259.json index f73bb02832a..9a8e565f84f 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49259.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49259.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49259", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:06.020", - "lastModified": "2024-10-17T20:15:06.020", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Primary Addon for Elementor allows Stored XSS.This issue affects Primary Addon for Elementor: from n/a through 1.5.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NicheAddons Primary Addon for Elementor permite XSS almacenado. Este problema afecta al complemento principal de Elementor: desde n/a hasta 1.5.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49261.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49261.json index 1265e7d5025..668b102c033 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49261.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49261.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49261", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:06.577", - "lastModified": "2024-10-17T20:15:06.577", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LOOS,Inc. Arkhe Blocks allows Stored XSS.This issue affects Arkhe Blocks: from n/a through 2.23.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en LOOS, Inc. Arkhe Blocks permite XSS almacenado. Este problema afecta a Arkhe Blocks: desde n/a hasta 2.23.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49262.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49262.json index 544e639b67b..2ab5785829a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49262.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49262.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49262", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:07.193", - "lastModified": "2024-10-17T20:15:07.193", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wepic Country Flags for Elementor allows Stored XSS.This issue affects Country Flags for Elementor: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en wepic Country Flags para Elementor permite XSS almacenado. Este problema afecta a Country Flags para Elementor: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49263.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49263.json index 50dda5391a5..a7608878a21 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49263.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49263.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49263", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:07.753", - "lastModified": "2024-10-17T20:15:07.753", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Takashi Matsuyama My Favorites allows Stored XSS.This issue affects My Favorites: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Takashi Matsuyama My Favorites permite XSS almacenado. Este problema afecta a Mis favoritos: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49264.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49264.json index 83a8ae68fa3..2db4871299a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49264.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49264.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49264", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:08.290", - "lastModified": "2024-10-17T20:15:08.290", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Events Addon for Elementor allows Stored XSS.This issue affects Events Addon for Elementor: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NicheAddons Events Addon for Elementor permite XSS almacenado. Este problema afecta al complemento NicheAddons Events para Elementor: desde n/a hasta 2.2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49276.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49276.json index 88f7782fdad..3e6d9f2088a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49276.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49276.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49276", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:08.803", - "lastModified": "2024-10-17T20:15:08.803", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themis Solutions, Inc. Clio Grow allows Reflected XSS.This issue affects Clio Grow: from n/a through 1.0.2." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Themis Solutions, Inc. Clio Grow permite XSS reflejado. Este problema afecta a Clio Grow: desde n/a hasta 1.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49277.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49277.json index d4c0467528f..47282c954a3 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49277.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49277.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49277", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:09.360", - "lastModified": "2024-10-17T20:15:09.360", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeAstrology Team UltraAddons Elementor Lite allows Stored XSS.This issue affects UltraAddons Elementor Lite: from n/a through 1.1.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CodeAstrology Team UltraAddons Elementor Lite permite XSS almacenado. Este problema afecta a UltraAddons Elementor Lite: desde n/a hasta 1.1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49278.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49278.json index 0442e47405c..ec12ca1ad68 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49278.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49278.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49278", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:09.973", - "lastModified": "2024-10-17T20:15:09.973", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in omnipressteam Omnipress allows Stored XSS.This issue affects Omnipress: from n/a through 1.4.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en omnipressteam Omnipress permite XSS almacenado. Este problema afecta a Omnipress: desde n/a hasta 1.4.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49279.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49279.json index c8092a321a3..09f558b3801 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49279.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49279.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49279", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:10.563", - "lastModified": "2024-10-17T20:15:10.563", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TipTopPress Hyperlink Group Block allows Stored XSS.This issue affects Hyperlink Group Block: from n/a through 1.17.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en TipTopPress Hyperlink Group Block permite XSS almacenado. Este problema afecta al bloque de grupo de hiperv\u00ednculos: desde n/a hasta 1.17.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49280.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49280.json index dbfd902ba8d..fa6bb393b6a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49280.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49280.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49280", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:11.140", - "lastModified": "2024-10-17T20:15:11.140", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Weblizar Lightbox slider \u2013 Responsive Lightbox Gallery allows Stored XSS.This issue affects Lightbox slider \u2013 Responsive Lightbox Gallery: from n/a through 1.10.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Weblizar Lightbox slider \u2013 Responsive Lightbox Gallery permite XSS almacenado. Este problema afecta a Lightbox Slider \u2013 Responsive Lightbox Gallery: desde n/a hasta 1.10.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json index 16ed1902cf7..c64b82eb743 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49281.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49281", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:11.570", - "lastModified": "2024-10-17T20:15:11.570", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NinjaTeam Click to Chat \u2013 WP Support All-in-One Floating Widget allows Stored XSS.This issue affects Click to Chat \u2013 WP Support All-in-One Floating Widget: from n/a through 2.3.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en NinjaTeam Click to Chat \u2013 WP Support All-in-One Floating Widget permite XSS almacenado. Este problema afecta a Click to Chat \u2013 WP Support All-in-One Floating Widget: desde n/a hasta 2.3.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49282.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49282.json index ffc463ef016..a52e99f1882 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49282.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49282.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49282", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:11.800", - "lastModified": "2024-10-17T20:15:11.800", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in dFactory Responsive Lightbox allows Stored XSS.This issue affects Responsive Lightbox: from n/a through 2.4.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en dFactory Responsive Lightbox permite XSS almacenado. Este problema afecta a Responsive Lightbox: desde n/a hasta 2.4.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49283.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49283.json index f5bae0cb24b..9f7cc703493 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49283.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49283.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49283", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:12.067", - "lastModified": "2024-10-17T20:15:12.067", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VillaTheme CURCY allows Reflected XSS.This issue affects CURCY: from n/a through 2.2.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en VillaTheme CURCY permite XSS reflejado. Este problema afecta a CURCY: desde n/a hasta 2.2.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49284.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49284.json index 2d6ff94beef..9a0911153fe 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49284.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49284.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49284", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:12.353", - "lastModified": "2024-10-17T18:15:12.353", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BogdanFix WP SendFox allows Retrieve Embedded Sensitive Data.This issue affects WP SendFox: from n/a through 1.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en BogdanFix WP SendFox permite recuperar datos confidenciales integrados. Este problema afecta a WP SendFox: desde n/a hasta 1.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49285.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49285.json index 419e3cfa349..ee484e60ad9 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49285.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49285.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49285", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:12.590", - "lastModified": "2024-10-17T18:15:12.590", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Moridrin SSV MailChimp allows PHP Local File Inclusion.This issue affects SSV MailChimp: from n/a through 3.1.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Moridrin SSV MailChimp permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a SSV MailChimp: desde n/a hasta 3.1.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49287.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49287.json index 753ea29b86b..d4d2aab320e 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49287.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49287.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49287", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:12.820", - "lastModified": "2024-10-17T18:15:12.820", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Marco Heine PDF-Rechnungsverwaltung allows PHP Local File Inclusion.This issue affects PDF-Rechnungsverwaltung: from n/a through 0.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en Marco Heine PDF-Rechnungsverwaltung permite la inclusi\u00f3n de archivos locales en PHP. Este problema afecta a PDF-Rechnungsverwaltung: desde n/a hasta 0.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json index bd75068e7e7..d9ca8bd4e28 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49288", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:12.343", - "lastModified": "2024-10-17T20:15:12.343", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VillaTheme Email Template Customizer for WooCommerce allows Stored XSS.This issue affects Email Template Customizer for WooCommerce: from n/a through 1.2.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en VillaTheme Email Template Customizer para WooCommerce permite XSS almacenado. Este problema afecta a Email Template Customizer para WooCommerce: desde n/a hasta 1.2.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49289.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49289.json index 797b212d16c..8079e6598fb 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49289.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49289.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49289", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:22.550", - "lastModified": "2024-10-17T19:15:22.550", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gora Tech LLC Cooked Pro allows Stored XSS.This issue affects Cooked Pro: from n/a before 1.8.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Gora Tech LLC Cooked Pro permite XSS almacenado. Este problema afecta a Cooked Pro: desde n/a antes de 1.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49291.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49291.json index e88dada9084..52be44f5b0a 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49291.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49291.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49291", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:13.050", - "lastModified": "2024-10-17T18:15:13.050", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Gora Tech LLC Cooked Pro.This issue affects Cooked Pro: from n/a before 1.8.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Gora Tech LLC Cooked Pro. Este problema afecta a Cooked Pro: desde n/a hasta 1.8.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json index 8e51df00ffe..f17368ada79 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49292", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:22.763", - "lastModified": "2024-10-17T19:15:22.763", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Exclusive Addons Exclusive Addons Elementor allows Stored XSS.This issue affects Exclusive Addons Elementor: from n/a through 2.7.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Exclusive Addons Exclusive Addons Elementor permite XSS almacenado. Este problema afecta a Exclusive Addons Elementor: desde n/a hasta 2.7.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49295.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49295.json index 958f3a964d2..23b5cf86cb7 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49295.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49295.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49295", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:22.967", - "lastModified": "2024-10-17T19:15:22.967", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PressTigers Simple Testimonials Showcase.This issue affects Simple Testimonials Showcase: from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Simple Testimonials Showcase de PressTigers. Este problema afecta a Simple Testimonials Showcase: desde n/a hasta 1.1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49296.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49296.json index 805fbb6662d..f63f02c8d21 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49296.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49296.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49296", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:23.167", - "lastModified": "2024-10-17T19:15:23.167", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Coder426 Custom Add to Cart Button Label and Link allows Stored XSS.This issue affects Custom Add to Cart Button Label and Link: from n/a through 1.6.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Coder426 Custom Add to Cart Button Label and Link permite XSS almacenado. Este problema afecta a la etiqueta y el enlace del bot\u00f3n Agregar al carrito personalizado: desde n/a hasta 1.6.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49297.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49297.json index 963ce8470a9..863a0df6345 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49297.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49297.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49297", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:13.267", - "lastModified": "2024-10-17T18:15:13.267", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zoho CRM Zoho CRM Lead Magnet allows SQL Injection.This issue affects Zoho CRM Lead Magnet: from n/a through 1.7.9.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Zoho CRM Zoho CRM Lead Magnet permite la inyecci\u00f3n SQL. Este problema afecta a Zoho CRM Lead Magnet: desde n/a hasta 1.7.9.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49298.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49298.json index b0c0d8f74bf..fb7e65010e8 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49298.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49298.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49298", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:23.400", - "lastModified": "2024-10-17T19:15:23.400", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pepro Dev. Group PeproDev Ultimate Invoice allows Stored XSS.This issue affects PeproDev Ultimate Invoice: from n/a through 2.0.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Pepro Dev. Group PeproDev Ultimate Invoice permite XSS almacenado. Este problema afecta a PeproDev Ultimate Invoice: desde n/a hasta 2.0.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49299.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49299.json index f0e917bbd00..2bb1437df61 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49299.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49299.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49299", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:13.510", - "lastModified": "2024-10-17T18:15:13.510", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Surfer allows SQL Injection.This issue affects Surfer: from n/a through 1.5.0.502." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Surfer permite la inyecci\u00f3n SQL. Este problema afecta a Surfer: desde n/a hasta 1.5.0.502." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49301.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49301.json index e3f2d8011bd..cf4306d445e 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49301.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49301.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49301", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:23.597", - "lastModified": "2024-10-17T19:15:23.597", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sinan Yorulmaz G Meta Keywords allows Stored XSS.This issue affects G Meta Keywords: from n/a through 1.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Sinan Yorulmaz G Meta Palabras Clave permite XSS almacenado. Este problema afecta a G Meta Palabras Clave: desde n/a hasta 1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49302.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49302.json index 2dd900def73..7047d65dd5e 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49302.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49302.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49302", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:23.803", - "lastModified": "2024-10-17T19:15:23.803", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Portfoliohub WordPress Portfolio Builder \u2013 Portfolio Gallery allows Stored XSS.This issue affects WordPress Portfolio Builder \u2013 Portfolio Gallery: from n/a through 1.1.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Portfoliohub WordPress Portfolio Builder \u2013 Portfolio Gallery permite XSS almacenado. Este problema afecta a WordPress Portfolio Builder \u2013 Portfolio Gallery: desde n/a hasta 1.1.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49304.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49304.json index 23f40cbfb24..3299ce77e3e 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49304.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49304.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49304", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:13.730", - "lastModified": "2024-10-17T18:15:13.730", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in PINPOINT.WORLD Pinpoint Booking System allows Stored XSS.This issue affects Pinpoint Booking System: from n/a through 2.9.9.5.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en PINPOINT.WORLD Pinpoint Booking System permite XSS almacenado. Este problema afecta a Pinpoint Booking System: desde n/a hasta 2.9.9.5.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49305.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49305.json index 8d27340253f..7aae0bbbd26 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49305.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49305.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49305", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:13.943", - "lastModified": "2024-10-17T18:15:13.943", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPFactory Email Verification for WooCommerce allows SQL Injection.This issue affects Email Verification for WooCommerce: from n/a through 2.8.10." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPFactory Email Verification para WooCommerce permite la inyecci\u00f3n SQL. Este problema afecta a Email Verification para WooCommerce: desde n/a hasta 2.8.10." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49307.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49307.json index a796e40b5d1..7d27ce7d834 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49307.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49307.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49307", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:24.013", - "lastModified": "2024-10-17T19:15:24.013", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Oliver Schl\u00f6be Admin Management Xtended allows Stored XSS.This issue affects Admin Management Xtended: from n/a through 2.4.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Oliver Schl\u00f6be Admin Management Xtended permite XSS almacenado. Este problema afecta a Admin Management Xtended: desde n/a hasta 2.4.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49308.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49308.json index 0180826e5ca..0b36d18b5c7 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49308.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49308.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49308", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:24.217", - "lastModified": "2024-10-17T19:15:24.217", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Toast Plugins Animator allows Reflected XSS.This issue affects Animator: from n/a through 3.0.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Toast Plugins Animator permite XSS reflejado. Este problema afecta a Animator: desde n/a hasta 3.0.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49309.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49309.json index 8bc70314b5c..9539e149dbc 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49309.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49309.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49309", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:24.427", - "lastModified": "2024-10-17T19:15:24.427", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Digitally allows Reflected XSS.This issue affects Digitally: from n/a through 1.0.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Digitally permite XSS reflejado. Este problema afecta a Digitally: desde n/a hasta 1.0.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json index b9849f3ec2e..7baa21e8d01 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49310.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49310", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:24.627", - "lastModified": "2024-10-17T19:15:24.627", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themesflat Themesflat Addons For Elementor allows Stored XSS.This issue affects Themesflat Addons For Elementor: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Themesflat Themesflat Addons For Elementor permite XSS almacenado. Este problema afecta a Themesflat Addons For Elementor: desde n/a hasta 2.2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49311.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49311.json index 42a39750594..ef12e2ff594 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49311.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49311.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49311", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:24.820", - "lastModified": "2024-10-17T19:15:24.820", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WisdmLabs Edwiser Bridge allows Stored XSS.This issue affects Edwiser Bridge: from n/a through 3.0.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WisdmLabs Edwiser Bridge permite XSS almacenado. Este problema afecta a Edwiser Bridge: desde n/a hasta 3.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49312.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49312.json index 4e7676337bf..29089f91c89 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49312.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49312.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49312", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:14.160", - "lastModified": "2024-10-17T18:15:14.160", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in WisdmLabs Edwiser Bridge.This issue affects Edwiser Bridge: from n/a through 3.0.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en Edwiser Bridge de WisdmLabs. Este problema afecta a Edwiser Bridge: desde n/a hasta 3.0.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49313.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49313.json index e4d3caabd98..311bf15d673 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49313.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49313.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49313", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:14.450", - "lastModified": "2024-10-17T18:15:14.450", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in RudeStan VKontakte Wall Post allows Stored XSS.This issue affects VKontakte Wall Post: from n/a through 2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en RudeStan VKontakte Wall Post permite XSS almacenados. Este problema afecta a las publicaciones del muro de VKontakte: desde n/a hasta 2.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49314.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49314.json index 46d1041853a..6e8d49dd6f9 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49314.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49314.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49314", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:14.680", - "lastModified": "2024-10-17T18:15:14.680", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Unrestricted Upload of File with Dangerous Type vulnerability in \u9171\u8304 JiangQie Free Mini Program allows Upload a Web Shell to a Web Server.This issue affects JiangQie Free Mini Program: from n/a through 2.5.2." + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in ?? JiangQie Free Mini Program allows Upload a Web Shell to a Web Server.This issue affects JiangQie Free Mini Program: from n/a through 2.5.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de carga sin restricciones de archivos con tipos peligrosos en ?? JiangQie Free Mini Program permite cargar un shell web a un servidor web. Este problema afecta al programa gratuito JiangQie: desde n/a hasta 2.5.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json index 89d6ebe37fb..f8709e2a51f 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49315.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49315", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T14:15:14.050", - "lastModified": "2024-10-17T14:15:14.050", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CodeFlock FREE DOWNLOAD MANAGER allows Path Traversal.This issue affects FREE DOWNLOAD MANAGER: from n/a through 1.0.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido ('Path Traversal') en CodeFlock FREE DOWNLOAD MANAGER permite Path Traversal. Este problema afecta a FREE DOWNLOAD MANAGER: desde n/a hasta 1.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49316.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49316.json index 6340263047b..26e234c9c56 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49316.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49316.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49316", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:25.023", - "lastModified": "2024-10-17T19:15:25.023", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in zodiac Akismet htaccess writer allows Reflected XSS.This issue affects Akismet htaccess writer: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en zodiac Akismet htaccess writer permite XSS reflejado. Este problema afecta al escritor htaccess de Akismet: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49317.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49317.json index b44a6b3d5c9..a6887ceb876 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49317.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49317.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49317", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:14.890", - "lastModified": "2024-10-17T18:15:14.890", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ZIPANG Point Maker allows PHP Local File Inclusion.This issue affects Point Maker: from n/a through 0.1.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control inadecuado del nombre de archivo para la declaraci\u00f3n Include/Require en el programa PHP ('Inclusi\u00f3n de archivo remoto PHP') en ZIPANG Point Maker permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a Point Maker: desde n/a hasta 0.1.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49318.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49318.json index 1586a0c6653..3b4842376e2 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49318.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49318.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49318", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:15.103", - "lastModified": "2024-10-17T18:15:15.103", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Scott Olson My Reading Library allows Object Injection.This issue affects My Reading Library: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en My Reading Library de Scott Olson permite la inyecci\u00f3n de objetos. Este problema afecta a My Reading Library: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49319.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49319.json index 193ad8a0841..224d8493f38 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49319.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49319.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49319", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:25.217", - "lastModified": "2024-10-17T19:15:25.217", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in B.M. Rafiul Alam Awesome Contact Form7 for Elementor allows Stored XSS.This issue affects Awesome Contact Form7 for Elementor: from n/a through 3.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en BM Rafiul Alam Awesome Contact Form7 para Elementor permite XSS almacenado. Este problema afecta a Awesome Contact Form7 para Elementor: desde n/a hasta 3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49320.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49320.json index eaea842edc5..24b86852043 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49320.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49320.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49320", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T12:15:03.077", - "lastModified": "2024-10-17T12:15:03.077", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dennis Hoppe Encyclopedia / Glossary / Wiki allows Reflected XSS.This issue affects Encyclopedia / Glossary / Wiki: from n/a through 1.7.60." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Dennis Hoppe Encyclopedia / Glossary / Wiki permite XSS reflejado. Este problema afecta a la Enciclopedia / Glosario / Wiki: desde n/a hasta 1.7.60." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49322.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49322.json index 9d53d2436e6..f78570ac8f1 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49322.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49322.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49322", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T18:15:15.300", - "lastModified": "2024-10-17T18:15:15.300", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Privilege Assignment vulnerability in CodePassenger Job Board Manager for WordPress allows Privilege Escalation.This issue affects Job Board Manager for WordPress: from n/a through 1.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en CodePassenger Job Board Manager para WordPress permite la escalada de privilegios. Este problema afecta a Job Board Manager para WordPress: desde n/a hasta 1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49386.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49386.json index 135b8de93cb..2ddd8e66f06 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49386.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49386.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49386", "sourceIdentifier": "security@acronis.com", "published": "2024-10-17T10:15:03.547", - "lastModified": "2024-10-17T10:15:03.547", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial debido a la pirater\u00eda de hechizos. Los siguientes productos se ven afectados: Acronis Cyber Files (Windows) antes de la compilaci\u00f3n 9.0.0x24." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49389.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49389.json index 3486794d7c5..946bfdb659d 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49389.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49389.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49389", "sourceIdentifier": "security@acronis.com", "published": "2024-10-17T10:15:03.813", - "lastModified": "2024-10-17T10:15:03.813", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24." + }, + { + "lang": "es", + "value": "Escalada de privilegios locales debido a permisos de carpetas inseguros. Los siguientes productos se ven afectados: Acronis Cyber Files (Windows) antes de la compilaci\u00f3n 9.0.0x24." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49390.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49390.json index 65a74d00333..dbdb996c0bb 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49390.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49390.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49390", "sourceIdentifier": "security@acronis.com", "published": "2024-10-17T10:15:04.017", - "lastModified": "2024-10-17T10:15:04.017", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24." + }, + { + "lang": "es", + "value": "Escalada de privilegios locales debido a una vulnerabilidad de secuestro de DLL. Los siguientes productos est\u00e1n afectados: Acronis Cyber Files (Windows) antes de la compilaci\u00f3n 9.0.0x24." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49391.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49391.json index 24c57490ff3..80aec4a1afe 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49391.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49391.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49391", "sourceIdentifier": "security@acronis.com", "published": "2024-10-17T10:15:04.193", - "lastModified": "2024-10-17T10:15:04.193", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24." + }, + { + "lang": "es", + "value": "Escalada de privilegios locales debido a una vulnerabilidad de secuestro de DLL. Los siguientes productos est\u00e1n afectados: Acronis Cyber Files (Windows) antes de la compilaci\u00f3n 9.0.0x24." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49392.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49392.json index f6bd92c35a9..cbc143dfc3a 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49392.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49392.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49392", "sourceIdentifier": "security@acronis.com", "published": "2024-10-17T10:15:04.383", - "lastModified": "2024-10-17T10:15:04.383", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stored cross-site scripting (XSS) vulnerability on enrollment invitation page. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24." + }, + { + "lang": "es", + "value": "Vulnerabilidad de cross-site scripting (XSS) almacenado en la p\u00e1gina de invitaci\u00f3n a la inscripci\u00f3n. Los siguientes productos est\u00e1n afectados: Acronis Cyber Files (Windows) antes de la compilaci\u00f3n 9.0.0x24." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49396.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49396.json index 1004a540e15..3bfa7279a55 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49396.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49396.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49396", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-17T17:15:12.467", - "lastModified": "2024-10-17T17:15:12.467", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable due to insufficiently protected credentials, which may allow an attacker to impersonate Elvaco and send false information." + }, + { + "lang": "es", + "value": "El producto afectado es vulnerable debido a credenciales insuficientemente protegidas, lo que puede permitir a un atacante hacerse pasar por Elvaco y enviar informaci\u00f3n falsa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49397.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49397.json index 257f03a248d..f7a681ed1a8 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49397.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49397.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49397", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-17T17:15:12.573", - "lastModified": "2024-10-17T17:15:12.573", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to a cross-site scripting attack which may allow an attacker to bypass authentication and takeover admin accounts." + }, + { + "lang": "es", + "value": "El producto afectado es vulnerable a un ataque de Cross-Site Scripting que puede permitir a un atacante eludir la autenticaci\u00f3n y apoderarse de cuentas de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49398.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49398.json index 910db12258c..ade80751996 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49398.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49398.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49398", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-17T17:15:12.680", - "lastModified": "2024-10-17T17:15:12.680", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute code." + }, + { + "lang": "es", + "value": "El producto afectado es vulnerable a cargas de archivos sin restricciones, lo que puede permitir a un atacante ejecutar c\u00f3digo de forma remota." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49399.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49399.json index acc4a1ce7b6..04db4d531c3 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49399.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49399.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49399", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-17T17:15:12.800", - "lastModified": "2024-10-17T17:15:12.800", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to an attacker being able to use commands without providing a password which may allow an attacker to leak information." + }, + { + "lang": "es", + "value": "El producto afectado es vulnerable a que un atacante pueda usar comandos sin proporcionar una contrase\u00f1a, lo que podr\u00eda permitirle filtrar informaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49400.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49400.json index d26539f9cd9..c8907fdbde9 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49400.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49400.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49400", "sourceIdentifier": "cve-assign@fb.com", "published": "2024-10-17T18:15:15.547", - "lastModified": "2024-10-17T18:15:15.547", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tacquito prior to commit 07b49d1358e6ec0b5aa482fcd284f509191119e2 was not properly performing regex matches on authorized commands and arguments. Configured allowed commands/arguments were intended to require a match on the entire string, but instead only enforced a match on a sub-string. That would have potentially allowed unauthorized commands to be executed." + }, + { + "lang": "es", + "value": "Antes de el commit 07b49d1358e6ec0b5aa482fcd284f509191119e2, Tacquito no realizaba correctamente las coincidencias de expresiones regulares en los comandos y argumentos autorizados. Los comandos y argumentos permitidos configurados ten\u00edan como objetivo exigir una coincidencia en toda la cadena, pero en su lugar solo aplicaban una coincidencia en una subcadena. Eso podr\u00eda haber permitido la ejecuci\u00f3n de comandos no autorizados." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json index 0a90fb82abe..2d0c4e75d43 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49579", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-17T13:15:14.613", - "lastModified": "2024-10-17T13:15:14.613", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47197 insecure plugin iframe allowed arbitrary JavaScript execution and unauthorized API requests" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack anterior a 2024.3.47197, el complemento iframe inseguro permit\u00eda la ejecuci\u00f3n arbitraria de JavaScript y solicitudes de API no autorizadas" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json index d2ea9daa9cb..cebee94da13 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49580", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-17T13:15:14.853", - "lastModified": "2024-10-17T13:15:14.853", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Ktor before 3.0.0 improper caching in HttpCache Plugin could lead to response information disclosure" + }, + { + "lang": "es", + "value": "En JetBrains Ktor anterior a la versi\u00f3n 3.0.0, el almacenamiento en cach\u00e9 incorrecto en el complemento HttpCache podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n de respuesta" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49593.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49593.json index 4053ea5927d..9a98f2063c1 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49593.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49593.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49593", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-17T04:15:03.440", - "lastModified": "2024-10-17T04:15:03.440", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Advanced Custom Fields (ACF) before 6.3.9 and Secure Custom Fields before 6.3.6.3 (plugins for WordPress), using the Field Group editor to edit one of the plugin's fields can result in execution of a stored XSS payload. NOTE: if you wish to use the WP Engine alternative update mechanism for the free version of ACF, then you can follow the process shown at the advancedcustomfields.com blog URL within the References section below." + }, + { + "lang": "es", + "value": "En Advanced Custom Fields (ACF) anterior a la versi\u00f3n 6.3.9 y Secure Custom Fields anterior a la versi\u00f3n 6.3.6.3 (complementos para WordPress), el uso del editor de grupos de campos para editar uno de los campos del complemento puede provocar la ejecuci\u00f3n de un payload XSS almacenado. NOTA: si desea utilizar el mecanismo de actualizaci\u00f3n alternativo de WP Engine para la versi\u00f3n gratuita de ACF, puede seguir el proceso que se muestra en la URL del blog advancedcustomfields.com dentro de la secci\u00f3n Referencias a continuaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5429.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5429.json index 1c0196201f8..e81a858ec40 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5429.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5429.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5429", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-17T06:15:02.423", - "lastModified": "2024-10-17T19:35:24.927", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6333.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6333.json index 7e6d11cfbc4..ebfbdc24188 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6333.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6333.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6333", "sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f", "published": "2024-10-17T14:15:14.287", - "lastModified": "2024-10-17T14:15:14.287", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated Remote Code Execution in Altalink, Versalink & WorkCentre Products." + }, + { + "lang": "es", + "value": "Ejecuci\u00f3n remota de c\u00f3digo autenticada en Altalink, Versalink & WorkCentre Products. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json index b7dffd33b15..0871bcfb37d 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7316", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2024-10-17T22:15:03.313", - "lastModified": "2024-10-17T22:15:03.313", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7417.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7417.json index 39355ca2ba7..e897409bd4f 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7417.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7417.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7417", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T04:15:04.887", - "lastModified": "2024-10-17T04:15:04.887", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.986 via the data_fetch. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract data from password protected posts." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.3.986 incluida a trav\u00e9s de data_fetch. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, extraigan datos de publicaciones protegidas con contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7755.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7755.json index f112c370f22..6bb225ea6ca 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7755.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7755.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7755", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-17T19:15:25.513", - "lastModified": "2024-10-17T19:15:25.513", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The EWON FLEXY 202 transmits credentials using a weak encoding method base64. An attacker who is present in the network can sniff the traffic and decode the credentials." + }, + { + "lang": "es", + "value": "El EWON FLEXY 202 transmite credenciales mediante un m\u00e9todo de codificaci\u00f3n d\u00e9bil, base64. Un atacante que est\u00e9 presente en la red puede rastrear el tr\u00e1fico y decodificar las credenciales." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json index 7b6eb39addc..fe25c496058 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7993", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-16T22:15:03.133", - "lastModified": "2024-10-16T22:15:03.133", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo PDF manipulado con fines malintencionados, cuando se analiza a trav\u00e9s de Autodesk Revit, puede forzar una escritura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json index 355750a3482..1b7570be766 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7994.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7994", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-16T22:15:03.353", - "lastModified": "2024-10-16T22:15:03.353", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + }, + { + "lang": "es", + "value": "Un archivo RFA manipulado con fines malintencionados, cuando se analiza a trav\u00e9s de Autodesk Revit, puede provocar un desbordamiento de b\u00fafer basado en pila. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8719.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8719.json index c5bee3b7de6..3d9fd4f6deb 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8719.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8719.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8719", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T04:15:05.227", - "lastModified": "2024-10-17T04:15:05.227", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Flexmls\u00ae IDX Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters like 'MaxBeds' and 'MinBeds' in all versions up to, and including, 3.14.22 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Flexmls\u00ae IDX Plugin para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s de varios par\u00e1metros como 'MaxBeds' y 'MinBeds' en todas las versiones hasta la 3.14.22 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json index 89d8b82785f..66c516a68c1 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8740", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:05.437", - "lastModified": "2024-10-18T05:15:05.437", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json index c9ac0e3b717..77c719f94a9 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8790", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:05.647", - "lastModified": "2024-10-18T05:15:05.647", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json index 143f61dcdc4..b9eac2b0328 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8916.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8916", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:05.857", - "lastModified": "2024-10-18T05:15:05.857", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8920.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8920.json index 021bef99f1b..63e97352131 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8920.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8920.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8920", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T10:15:04.580", - "lastModified": "2024-10-17T10:15:04.580", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Fonto \u2013 Custom Web Fonts Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Fonto \u2013 Custom Web Fonts Manager para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.2.1 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9143.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9143.json index 5c85cecf8b9..418aab614f0 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9143.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9143.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9143", "sourceIdentifier": "openssl-security@openssl.org", "published": "2024-10-16T17:15:18.130", - "lastModified": "2024-10-16T17:15:18.130", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted\nexplicit values for the field polynomial can lead to out-of-bounds memory reads\nor writes.\n\nImpact summary: Out of bound memory writes can lead to an application crash or\neven a possibility of a remote code execution, however, in all the protocols\ninvolving Elliptic Curve Cryptography that we're aware of, either only \"named\ncurves\" are supported, or, if explicit curve parameters are supported, they\nspecify an X9.62 encoding of binary (GF(2^m)) curves that can't represent\nproblematic input values. Thus the likelihood of existence of a vulnerable\napplication is low.\n\nIn particular, the X9.62 encoding is used for ECC keys in X.509 certificates,\nso problematic inputs cannot occur in the context of processing X.509\ncertificates. Any problematic use-cases would have to be using an \"exotic\"\ncurve encoding.\n\nThe affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),\nand various supporting BN_GF2m_*() functions.\n\nApplications working with \"exotic\" explicit binary (GF(2^m)) curve parameters,\nthat make it possible to represent invalid field polynomials with a zero\nconstant term, via the above or similar APIs, may terminate abruptly as a\nresult of reading or writing outside of array bounds. Remote code execution\ncannot easily be ruled out.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue." + }, + { + "lang": "es", + "value": "Resumen del problema: el uso de las API de curva el\u00edptica GF(2^m) de bajo nivel con valores expl\u00edcitos no confiables para el campo polinomial puede generar lecturas o escrituras de memoria fuera de los l\u00edmites. Resumen del impacto: las escrituras de memoria fuera de los l\u00edmites pueden generar un bloqueo de la aplicaci\u00f3n o incluso la posibilidad de una ejecuci\u00f3n de c\u00f3digo remoto; sin embargo, en todos los protocolos que involucran criptograf\u00eda de curva el\u00edptica que conocemos, solo se admiten \"curvas con nombre\" o, si se admiten par\u00e1metros de curva expl\u00edcitos, especifican una codificaci\u00f3n X9.62 de curvas binarias (GF(2^m)) que no pueden representar valores de entrada problem\u00e1ticos. Por lo tanto, la probabilidad de existencia de una aplicaci\u00f3n vulnerable es baja. En particular, la codificaci\u00f3n X9.62 se utiliza para claves ECC en certificados X.509, por lo que no pueden ocurrir entradas problem\u00e1ticas en el contexto del procesamiento de certificados X.509. Cualquier caso de uso problem\u00e1tico tendr\u00eda que utilizar una codificaci\u00f3n de curva \"ex\u00f3tica\". Las API afectadas incluyen: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params() y varias funciones de soporte BN_GF2m_*(). Las aplicaciones que trabajan con par\u00e1metros de curva binarios expl\u00edcitos \"ex\u00f3ticos\" (GF(2^m)), que permiten representar polinomios de campo no v\u00e1lidos con un t\u00e9rmino constante cero, a trav\u00e9s de las API anteriores o similares, pueden terminar abruptamente como resultado de la lectura o escritura fuera de los l\u00edmites de la matriz. La ejecuci\u00f3n remota de c\u00f3digo no se puede descartar f\u00e1cilmente. Los m\u00f3dulos FIPS en 3.3, 3.2, 3.1 y 3.0 no se ven afectados por este problema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9184.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9184.json index c0b48531f9d..7495653026c 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9184.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9184", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T10:15:04.803", - "lastModified": "2024-10-17T10:15:04.803", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9206.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9206.json index c1c0273713f..9680f755c06 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9206.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9206", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T07:15:02.200", - "lastModified": "2024-10-18T07:15:02.200", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9213.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9213.json index 1c3cadd9ae7..441a3d9ff33 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9213.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9213.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9213", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T07:15:02.063", - "lastModified": "2024-10-17T07:15:02.063", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The \u0627\u0641\u0632\u0648\u0646\u0647 \u067e\u06cc\u0627\u0645\u06a9 \u0648\u0648\u06a9\u0627\u0645\u0631\u0633 Persian WooCommerce SMS plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.0.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + "value": "The ?????? ????? ??????? Persian WooCommerce SMS plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.0.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento ?????? ????? ??????? Persian WooCommerce SMS para WordPress es vulnerable a cross-site scripting reflejado debido al uso de remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 7.0.2 incluida. Esto hace posible que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9215.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9215.json index 035b4952fb4..9cff2f3681b 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9215.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9215.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9215", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:02.977", - "lastModified": "2024-10-17T02:15:02.977", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Co-Authors, Multiple Authors and Guest Authors in an Author Box with PublishPress Authors plugin for WordPress is vulnerable to Insecure Direct Object Reference to Privilege Escalation/Account Takeover in all versions up to, and including, 4.7.1 via the action_edited_author() due to missing validation on the 'authors-user_id' user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to update arbitrary user accounts email addresses, including administrators, which can then be leveraged to reset that user's account password and gain access." + }, + { + "lang": "es", + "value": "El complemento Co-Authors, Multiple Authors and Guest Authors in an Author Box with PublishPress Authors para WordPress es vulnerable a Insecure Direct Object Reference to Privilege Escalation/Account Takeover en todas las versiones hasta la 4.7.1 incluida a trav\u00e9s de action_edited_author() debido a la falta de validaci\u00f3n en la clave controlada por el usuario 'authors-user_id'. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, actualicen direcciones de correo electr\u00f3nico de cuentas de usuario arbitrarias, incluidos administradores, que luego se pueden aprovechar para restablecer la contrase\u00f1a de la cuenta de ese usuario y obtener acceso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9240.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9240.json index 7dc72233926..12ad93ef4c0 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9240.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9240.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9240", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:03.243", - "lastModified": "2024-10-17T02:15:03.243", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ReDi Restaurant Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 24.0902. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento ReDi Restaurant Reservation para WordPress es vulnerable a ataques de cross-site scripting reflejado debido al uso de add_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 24.0902 incluida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9263.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9263.json index a9c1e782e14..ea97dc24835 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9263.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9263.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9263", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T04:15:05.517", - "lastModified": "2024-10-17T04:15:05.517", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin plugin for WordPress is vulnerable to Account Takeover/Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 1.0.25 via the save() due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to reset the emails and passwords of arbitrary user accounts, including administrators, which makes account takeover and privilege escalation possible." + }, + { + "lang": "es", + "value": "El complemento WP Timetics - AI-powered Appointment Booking Calendar and Online Scheduling Plugin para WordPress es vulnerable a la apropiaci\u00f3n de cuentas/escalada de privilegios a trav\u00e9s de una referencia directa a objetos insegura en todas las versiones hasta la 1.0.25 incluida a trav\u00e9s de save() debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto hace posible que atacantes no autenticados restablezcan los correos electr\u00f3nicos y las contrase\u00f1as de cuentas de usuario arbitrarias, incluidos los administradores, lo que hace posible la apropiaci\u00f3n de cuentas y la escalada de privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9264.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9264.json index 7ee39169d6a..514102d4931 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9264.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9264", "sourceIdentifier": "security@grafana.com", "published": "2024-10-18T04:15:04.723", - "lastModified": "2024-10-18T04:15:04.723", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9347.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9347.json index 6ed4d6e0eb1..a37784770a0 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9347.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9347.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9347", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T04:15:05.810", - "lastModified": "2024-10-17T04:15:05.810", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpext-export' parameter in all versions up to, and including, 3.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento The Ultimate WordPress Toolkit \u2013 WP Extended para WordPress es vulnerable a ataques de Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'wpext-export' en todas las versiones hasta la 3.0.9 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json index 65cf339884d..b47d01dcfbf 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9350.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9350", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:06.070", - "lastModified": "2024-10-18T05:15:06.070", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json index 659bd50dca3..c37bbdb1586 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9351", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T06:15:03.433", - "lastModified": "2024-10-17T06:15:03.433", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.35.1. This is due to missing or incorrect nonce validation on the quiz 'create_module' function. This makes it possible for unauthenticated attackers to create draft quizzes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.35.1 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n 'create_module' del cuestionario. Esto permite que atacantes no autenticados creen borradores de cuestionarios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json index eb81844a351..df9c1cb9cbe 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9352", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T06:15:03.850", - "lastModified": "2024-10-17T06:15:03.850", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.35.1. This is due to missing or incorrect nonce validation on the custom form 'create_module' function. This makes it possible for unauthenticated attackers to create draft forms via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Forminator Forms \u2013 Contact Form, Payment Form & Custom Form Builder para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.35.1 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n 'create_module' del formulario personalizado. Esto permite que atacantes no autenticados creen borradores de formularios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9361.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9361.json index e1256cdfdb8..150c2d26b87 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9361.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9361.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9361", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:06.287", - "lastModified": "2024-10-18T05:15:06.287", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9364.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9364.json index 77514d72b90..dfac1887e33 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9364.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9364.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9364", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:06.513", - "lastModified": "2024-10-18T05:15:06.513", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9366.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9366.json index b159b19f28a..b102fd6d7d1 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9366.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9366", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:06.733", - "lastModified": "2024-10-18T05:15:06.733", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9373.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9373.json index b125b3dce7b..1b214750490 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9373.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9373", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:06.937", - "lastModified": "2024-10-18T05:15:06.937", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9382.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9382.json index 930ab174b98..c560cc8d803 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9382.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9382.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9382", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:07.170", - "lastModified": "2024-10-18T05:15:07.170", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9383.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9383.json index b69c18aea1b..92da0571178 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9383.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9383", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:07.387", - "lastModified": "2024-10-18T05:15:07.387", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9414.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9414.json index d80cd4ce623..a200463a72a 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9414.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9414.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9414", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-10-17T16:15:04.980", - "lastModified": "2024-10-17T16:15:04.980", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In LAquis SCADA version 4.7.1.511, a cross-site scripting vulnerability could allow an attacker to inject arbitrary code into a web page. This could allow an attacker to steal cookies, redirect users, or perform unauthorized actions." + }, + { + "lang": "es", + "value": "En la versi\u00f3n 4.7.1.511 de LAquis SCADA, una vulnerabilidad de Cross-Site Scripting podr\u00eda permitir a un atacante inyectar c\u00f3digo arbitrario en una p\u00e1gina web. Esto podr\u00eda permitirle robar cookies, redirigir a los usuarios o realizar acciones no autorizadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9425.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9425.json index 3822472e7be..3cc89dd4583 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9425.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9425.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9425", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T10:15:08.770", - "lastModified": "2024-10-18T10:15:08.770", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Advanced Category and Custom Taxonomy Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ad_tax_image shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Advanced Category and Custom Taxonomy Image para WordPress es vulnerable a la ejecuci\u00f3n de Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto ad_tax_image del complemento en todas las versiones hasta la 1.0.9 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json index 093b39dc68a..0c29f1d01ce 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9452.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9452", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:07.607", - "lastModified": "2024-10-18T05:15:07.607", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9674.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9674.json index 065cdf18523..c0566aa5ec3 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9674.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9674.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9674", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T11:15:02.750", - "lastModified": "2024-10-18T11:15:02.750", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9683.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9683.json index aef5c77bd0d..957c0930185 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9683.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9683.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9683", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-17T15:15:13.850", - "lastModified": "2024-10-17T15:15:13.850", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Quay, which allows successful authentication even when a truncated password version is provided. This flaw affects the authentication mechanism, reducing the overall security of password enforcement.\u00a0 While the risk is relatively low due to the typical length of the passwords used (73 characters), this vulnerability can still be exploited to reduce the complexity of brute-force or password-guessing attacks. The truncation of passwords weakens the overall authentication process, thereby reducing the effectiveness of password policies and potentially increasing the risk of unauthorized access in the future." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en Quay que permite la autenticaci\u00f3n incluso cuando se proporciona una versi\u00f3n truncada de la contrase\u00f1a. Esta falla afecta al mecanismo de autenticaci\u00f3n, lo que reduce la seguridad general de la aplicaci\u00f3n de contrase\u00f1as. Si bien el riesgo es relativamente bajo debido a la longitud t\u00edpica de las contrase\u00f1as utilizadas (73 caracteres), esta vulnerabilidad a\u00fan puede explotarse para reducir la complejidad de los ataques de fuerza bruta o de adivinaci\u00f3n de contrase\u00f1as. El truncamiento de las contrase\u00f1as debilita el proceso de autenticaci\u00f3n general, lo que reduce la eficacia de las pol\u00edticas de contrase\u00f1as y potencialmente aumenta el riesgo de acceso no autorizado en el futuro." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9703.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9703.json index 0a930961c7f..7b0c8ecce40 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9703.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9703.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9703", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T07:15:02.560", - "lastModified": "2024-10-18T07:15:02.560", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json index 7e83115b4cf..2c5c212329b 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9848.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9848", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:07.807", - "lastModified": "2024-10-18T05:15:07.807", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json index 35c4d79560a..b86879dae95 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9861.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9861", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:03.493", - "lastModified": "2024-10-17T02:15:03.493", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Miniorange OTP Verification with Firebase plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.6.0. This is due to missing validation on the token being supplied during the otp login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the phone number associated with that user." + }, + { + "lang": "es", + "value": "El complemento Miniorange OTP Verification con Firebase para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 3.6.0 incluida. Esto se debe a la falta de validaci\u00f3n en el token que se proporciona durante el inicio de sesi\u00f3n con OTP a trav\u00e9s del complemento. Esto permite que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si conocen el n\u00famero de tel\u00e9fono asociado con ese usuario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json index 41f98c999f9..7b201dc2eaa 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9862.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9862", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:03.767", - "lastModified": "2024-10-17T02:15:03.767", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Miniorange OTP Verification with Firebase plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 3.6.0. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources, and the user current password check is missing. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts." + }, + { + "lang": "es", + "value": "El complemento Miniorange OTP Verification con Firebase para WordPress es vulnerable a cambios arbitrarios de contrase\u00f1as de usuario en versiones hasta la 3.6.0 incluida. Esto se debe a que el complemento proporciona acceso controlado por el usuario a los objetos, lo que permite que un usuario omita la autorizaci\u00f3n y acceda a los recursos del sistema, y no se verifica la contrase\u00f1a actual del usuario. Esto hace posible que atacantes no autenticados cambien las contrase\u00f1as de los usuarios y potencialmente se apropien de las cuentas de administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9863.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9863.json index da3b067932c..71239e02f4c 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9863.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9863.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9863", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:04.030", - "lastModified": "2024-10-17T02:15:04.030", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UserPro plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.6.0 due to the insecure 'administrator' default value for the 'default_user_role' option. This makes it possible for unauthenticated attackers to register an administrator user even if the registration form is disabled." + }, + { + "lang": "es", + "value": "El complemento UserPro para WordPress es vulnerable a la escalada de privilegios en versiones hasta la 3.6.0 incluida debido al valor predeterminado inseguro \"administrador\" para la opci\u00f3n \"default_user_role\". Esto hace posible que atacantes no autenticados registren a un usuario administrador incluso si el formulario de registro est\u00e1 deshabilitado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9892.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9892.json index 1eb26f2f509..b0a5d84c416 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9892.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9892", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:08.040", - "lastModified": "2024-10-18T05:15:08.040", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9898.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9898.json index abe9baa548f..3b5e590b966 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9898.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9898.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9898", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T11:15:11.087", - "lastModified": "2024-10-17T11:15:11.087", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Parallax Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's dd-parallax shortcode in all versions up to, and including, 1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Parallax Image para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto dd-parallax del complemento en todas las versiones hasta la 1.8 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9940.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9940.json index f5d50b05500..10e3438a042 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9940.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9940.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9940", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T02:15:04.277", - "lastModified": "2024-10-17T02:15:04.277", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:53:04.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Calculated Fields Form plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 5.2.45. This is due to the plugin not properly neutralizing HTML elements from submitted forms. This makes it possible for unauthenticated attackers to inject arbitrary HTML that will render when the administrator views form submissions in their email." + }, + { + "lang": "es", + "value": "El complemento Calculated Fields Form para WordPress es vulnerable a la inyecci\u00f3n de HTML en todas las versiones hasta la 5.2.45 incluida. Esto se debe a que el complemento no neutraliza correctamente los elementos HTML de los formularios enviados. Esto permite que atacantes no autenticados inyecten HTML arbitrario que se mostrar\u00e1 cuando el administrador vea los env\u00edos de formularios en su correo electr\u00f3nico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9951.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9951.json index 1b3afa9ea73..edc56058642 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9951.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9951.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9951", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T08:15:03.040", - "lastModified": "2024-10-17T08:15:03.040", - "vulnStatus": "Received", + "lastModified": "2024-10-18T12:52:33.507", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Photo Album Plus plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wppa-tab' parameter in all versions up to, and including, 8.8.05.003 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento WP Photo Album Plus para WordPress es vulnerable a ataques de Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'wppa-tab' en todas las versiones hasta la 8.8.05.003 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { diff --git a/README.md b/README.md index a90be87aefe..fddac25f7e5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-18T12:00:18.903185+00:00 +2024-10-18T14:00:28.796987+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-18T11:15:02.750000+00:00 +2024-10-18T13:49:32.090000+00:00 ``` ### Last Data Feed Release @@ -33,37 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -266126 +266127 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `1` -- [CVE-2024-10057](CVE-2024/CVE-2024-100xx/CVE-2024-10057.json) (`2024-10-18T10:15:03.173`) -- [CVE-2024-43300](CVE-2024/CVE-2024-433xx/CVE-2024-43300.json) (`2024-10-18T11:15:02.430`) -- [CVE-2024-49224](CVE-2024/CVE-2024-492xx/CVE-2024-49224.json) (`2024-10-18T10:15:04.593`) -- [CVE-2024-49225](CVE-2024/CVE-2024-492xx/CVE-2024-49225.json) (`2024-10-18T10:15:04.890`) -- [CVE-2024-49228](CVE-2024/CVE-2024-492xx/CVE-2024-49228.json) (`2024-10-18T10:15:05.233`) -- [CVE-2024-49230](CVE-2024/CVE-2024-492xx/CVE-2024-49230.json) (`2024-10-18T10:15:05.533`) -- [CVE-2024-49231](CVE-2024/CVE-2024-492xx/CVE-2024-49231.json) (`2024-10-18T10:15:05.817`) -- [CVE-2024-49232](CVE-2024/CVE-2024-492xx/CVE-2024-49232.json) (`2024-10-18T10:15:06.143`) -- [CVE-2024-49233](CVE-2024/CVE-2024-492xx/CVE-2024-49233.json) (`2024-10-18T10:15:06.433`) -- [CVE-2024-49234](CVE-2024/CVE-2024-492xx/CVE-2024-49234.json) (`2024-10-18T10:15:06.777`) -- [CVE-2024-49236](CVE-2024/CVE-2024-492xx/CVE-2024-49236.json) (`2024-10-18T10:15:07.103`) -- [CVE-2024-49238](CVE-2024/CVE-2024-492xx/CVE-2024-49238.json) (`2024-10-18T10:15:07.400`) -- [CVE-2024-49239](CVE-2024/CVE-2024-492xx/CVE-2024-49239.json) (`2024-10-18T10:15:07.653`) -- [CVE-2024-49240](CVE-2024/CVE-2024-492xx/CVE-2024-49240.json) (`2024-10-18T10:15:07.937`) -- [CVE-2024-49241](CVE-2024/CVE-2024-492xx/CVE-2024-49241.json) (`2024-10-18T10:15:08.167`) -- [CVE-2024-49243](CVE-2024/CVE-2024-492xx/CVE-2024-49243.json) (`2024-10-18T10:15:08.450`) -- [CVE-2024-9425](CVE-2024/CVE-2024-94xx/CVE-2024-9425.json) (`2024-10-18T10:15:08.770`) -- [CVE-2024-9674](CVE-2024/CVE-2024-96xx/CVE-2024-9674.json) (`2024-10-18T11:15:02.750`) +- [CVE-2024-47240](CVE-2024/CVE-2024-472xx/CVE-2024-47240.json) (`2024-10-18T12:15:02.773`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `263` +- [CVE-2024-9264](CVE-2024/CVE-2024-92xx/CVE-2024-9264.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9347](CVE-2024/CVE-2024-93xx/CVE-2024-9347.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-9350](CVE-2024/CVE-2024-93xx/CVE-2024-9350.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9351](CVE-2024/CVE-2024-93xx/CVE-2024-9351.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-9352](CVE-2024/CVE-2024-93xx/CVE-2024-9352.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9361](CVE-2024/CVE-2024-93xx/CVE-2024-9361.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9364](CVE-2024/CVE-2024-93xx/CVE-2024-9364.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9366](CVE-2024/CVE-2024-93xx/CVE-2024-9366.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9373](CVE-2024/CVE-2024-93xx/CVE-2024-9373.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9382](CVE-2024/CVE-2024-93xx/CVE-2024-9382.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9383](CVE-2024/CVE-2024-93xx/CVE-2024-9383.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9414](CVE-2024/CVE-2024-94xx/CVE-2024-9414.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9425](CVE-2024/CVE-2024-94xx/CVE-2024-9425.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9452](CVE-2024/CVE-2024-94xx/CVE-2024-9452.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9674](CVE-2024/CVE-2024-96xx/CVE-2024-9674.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9683](CVE-2024/CVE-2024-96xx/CVE-2024-9683.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9703](CVE-2024/CVE-2024-97xx/CVE-2024-9703.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9848](CVE-2024/CVE-2024-98xx/CVE-2024-9848.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9861](CVE-2024/CVE-2024-98xx/CVE-2024-9861.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-9862](CVE-2024/CVE-2024-98xx/CVE-2024-9862.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-9863](CVE-2024/CVE-2024-98xx/CVE-2024-9863.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-9892](CVE-2024/CVE-2024-98xx/CVE-2024-9892.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9898](CVE-2024/CVE-2024-98xx/CVE-2024-9898.json) (`2024-10-18T12:52:33.507`) +- [CVE-2024-9940](CVE-2024/CVE-2024-99xx/CVE-2024-9940.json) (`2024-10-18T12:53:04.627`) +- [CVE-2024-9951](CVE-2024/CVE-2024-99xx/CVE-2024-9951.json) (`2024-10-18T12:52:33.507`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6134f2e5d26..547c7c0362b 100644 --- a/_state.csv +++ b/_state.csv @@ -11997,7 +11997,7 @@ CVE-2005-0999,0,0,ecca03fc38e9f5ae3e58e3725ca38d3553d21cd1060d462173b32ea09b9c08 CVE-2005-1000,0,0,876733ec970e875daec33609ebf439cfdd17ab98e8699b5ea8b6434b457f0939,2017-07-11T01:32:28.970000 CVE-2005-10001,0,0,2693db2d9b06c7ac36b92ee416e4e3effc2afa7e0b62b3415561be1db7294514,2024-08-08T00:15:23.127000 CVE-2005-10002,0,0,dc6fd831307ffcb4928dc15e5f0d4bca55123aa5ffaf8e97bc126f60e3f9b493,2024-05-17T00:24:26.580000 -CVE-2005-10003,0,0,b8b93c5c595ae5a9bd5a534ef6e4bea7afd4d62f8d503b2c7c465b6ad399e064,2024-10-17T14:15:03.800000 +CVE-2005-10003,0,1,28071fafeeccb75b8c30f71d271a6483af2dbee501f9b6bd00e7d5e0acfd5788,2024-10-18T12:52:33.507000 CVE-2005-1001,0,0,15f915129c529eb106d656586fee07bf3a049367ce9223cf255e6d44dfb5abdc,2017-07-11T01:32:29.047000 CVE-2005-1002,0,0,9c4a3a87f279404d6b0eb0a64f730f2b1c061844b6065693972fceeec1e57e20,2016-10-18T03:16:25.287000 CVE-2005-1003,0,0,a961fab12b3a0362183c5cb7e641f0b1d0fc1fc8dc55e4a55bb9ee3700911bfa,2017-07-11T01:32:29.110000 @@ -116715,7 +116715,7 @@ CVE-2018-16359,0,0,89b8d578d5c8408e36797906ea8486203ced2efecc69e1135a6921b6f3f6f CVE-2018-1636,0,0,6d3bbb28180dc066199f87db60f655a7c8e5b597e4327e8ef77abb81d5efe115,2023-02-24T00:30:52.007000 CVE-2018-16361,0,0,8b54180c3ac66d1344587497355017d4fedefbf5be76499c464f510a14b8565a,2018-10-25T02:18:38.917000 CVE-2018-16362,0,0,6e2cc773819bbefe6387314454dbd0984dba024ccff7a77abe06b55b4c52e006,2020-02-20T17:29:54.810000 -CVE-2018-16363,0,0,9c6b991d3d368b6096ad070f8dd2f53a7bfbf2a68b6942e09428f0b669419d0d,2018-11-06T20:28:28.590000 +CVE-2018-16363,0,1,7b2c393551a368f3b2cf57565cd0ac8c0b20bf2cfa45e0d59840f9a0aca4c962,2024-10-18T12:19:40.940000 CVE-2018-16364,0,0,0cf4ad21eaf4a7b3c6ccc92081875b1afe670df3b44006c2749063d2aef6669c,2020-09-29T19:12:28.167000 CVE-2018-16365,0,0,507547a9c1be5f3b4939fe9cb878644da6e08eb05382be9ab21fe05a10078dce,2019-04-16T18:40:58.563000 CVE-2018-16366,0,0,532ed60967f3b492636cd414157f09554c3608aecbdd3d526d3374e3c2804cdb,2019-04-16T17:38:38.120000 @@ -117234,8 +117234,8 @@ CVE-2018-16960,0,0,f20de99d96a8ca35e865347ea26c691567b78b232cbf84d8a8b5481fc4f5f CVE-2018-16961,0,0,01f649861b54c2911bcd207f710cc80095f0c8387fd92f3e2837e06ad0a7ee0b,2019-05-03T13:50:00.843000 CVE-2018-16962,0,0,11fe6a014ab8c3bc7d2c1fcdb4f0d274fca342b9813503ed02db763fc27914c1,2021-09-08T17:21:44.477000 CVE-2018-16965,0,0,c24d645b16b69568b2d7e16cfbb5d8155ce5b9f718629e7b69ea20337798ac1f,2018-11-09T17:52:23.413000 -CVE-2018-16966,0,0,ff1791bb34e492eb4339aea1703195ce3375d2ec454c22ea043796dd74ec0712,2023-05-26T17:54:55.423000 -CVE-2018-16967,0,0,8a596b57d3bf4c891336794e6f07cc9a372dd323759fb1041b20300e02ff103c,2023-05-26T17:54:55.423000 +CVE-2018-16966,0,1,09ca83b0e6897a3c84424339fbd9fc8bfcf26f7370c29367016e9bdda4909dfc,2024-10-18T12:19:40.940000 +CVE-2018-16967,0,1,8cd40a3dfd8a469f8efb37aa4462e550fb26306361619aed4d78dc2af8e0504b,2024-10-18T12:19:40.940000 CVE-2018-16968,0,0,efcf89f5eb37e4b58f44534bf400ca73806f8cc4e0ba91c83e775ffeeb1a490b,2018-11-23T16:44:52.067000 CVE-2018-16969,0,0,93a9b4010bc6c70e67487de9f3775dd3a23cf44822a9741ca7899d8c187dfcd9,2018-11-23T16:43:10.420000 CVE-2018-1697,0,0,ec13e0dc16e7ee2233817a32de711b89344e0ad24cc797527a67f109aac5e2cf,2019-10-09T23:38:54.757000 @@ -121397,7 +121397,7 @@ CVE-2018-25099,0,0,22c87c7789711d5cc0070c0c244e3b7eff042bf6e9bfc44eac77be6b7d7fb CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fde66,2024-08-01T13:41:42.160000 CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000 CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000 -CVE-2018-25104,0,0,489ca9c998220778c64a1d5770967a2f4681984149bb7b4624b5ad66bb278402,2024-10-17T16:15:03.207000 +CVE-2018-25104,0,1,c412ef65650738495a83605320ac7195d29f366a69eba1057ff5aa9aae33634c,2024-10-18T12:52:33.507000 CVE-2018-25105,0,0,63af7806a4a2bfeed5122abc8779195bd1ad11fd6e03af09c9625630d0daa033,2024-10-16T16:38:14.557000 CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,abeb87aebf654213323bee155595996aacb66704cd990a641203ef8ccfeaa82a,2020-08-24T17:37:01.140000 @@ -220148,7 +220148,7 @@ CVE-2023-26780,0,0,0a2bfcd02f53c6ac093d58cc180c519d2a43ad99184c7df9862b088ff00e7 CVE-2023-26781,0,0,3d02952edb170d494b0504990360825f38e92e8848f6f4f4ff91401983c48890,2023-05-08T17:11:51.063000 CVE-2023-26782,0,0,6ca5eec4beaebf1734dc236d1b0623f906fb3ba71dfe85419b666b3dea09a594,2023-10-06T17:20:59.803000 CVE-2023-26784,0,0,071c60b6740633a44aaf2a0e60f7735e8a7dfcdee0c5b5c97016b37b97b20983,2023-03-22T16:06:24.767000 -CVE-2023-26785,0,0,8f7ce9cba4b3bd36ab9c326446cab626601737ad374bdf09f3531a32e83252ef,2024-10-17T22:15:02.743000 +CVE-2023-26785,0,1,c422b0c3391079b54865f1deea929c3e40f28983ee1819aa550c6de337139fc9,2024-10-18T12:52:33.507000 CVE-2023-26788,0,0,7fa325a41419317b85b7654551d6158f8e6dd92063a11f6ab58476d4fa9c0e85,2023-04-14T03:53:02.843000 CVE-2023-26789,0,0,693ac4c06e973f2dddf5d5b7c84f39948ad2e205bbc59cc3058702f8b55394cb,2023-04-11T14:46:38.527000 CVE-2023-2679,0,0,d6c7eed4f9e9442e83b78abe9cd8db657b80acb7e841ef6db23187abd84f1550,2023-05-25T19:38:25.710000 @@ -224365,7 +224365,7 @@ CVE-2023-32262,0,0,b550eca0ee08972d1cae0350199922a2cc169c5b2de227991c4fabdc9201c CVE-2023-32263,0,0,93849585e3dab76d3ee6dc91178495b03a100a6882a75904921cddfc88af30b2,2023-07-28T14:22:16.300000 CVE-2023-32264,0,0,563815ef645d4cd0c2f7ecaba185753d66411c101e6dc1c31944e625cf41ef11,2024-03-08T21:19:43.127000 CVE-2023-32265,0,0,74fd75fd6b3938665d7a48805576c4b4886b4e44e5060abab91106e840f53edd,2023-07-31T17:06:15.177000 -CVE-2023-32266,0,0,c65dc6964b03b424738c20614fba0af99317e40316663e9af5cc4fd5167f5c63,2024-10-16T17:15:13.097000 +CVE-2023-32266,0,1,a6441b91e98077f10147a81858d307c5b4f609151da63abab0abdc8c24b18b8b,2024-10-18T12:53:04.627000 CVE-2023-32267,0,0,fb6655abea84136feded48381cbf46a23dbd3d49f85c79df7004e1410153de92,2023-08-21T15:48:26.110000 CVE-2023-32268,0,0,fcb33fa434d05a1a8981b1b193b8852a12a8b87556c500a9ae009a2f70014d84,2023-12-12T19:02:19.393000 CVE-2023-32269,0,0,314f75a81c22284f07db6aaad9922354c231494d7c6f3bccc72a63bf8e3eab9b,2023-05-11T23:04:37.600000 @@ -230026,7 +230026,7 @@ CVE-2023-39582,0,0,4e3c94d04c3d71f1e7474e48a5e9e5802cb614cc5caaae178c9bf4c6db83a CVE-2023-39583,0,0,682c5456d8be8d30f587ea2f337fa4ba505b49c39d80ddcb554520ba90068870,2023-11-07T04:17:33.040000 CVE-2023-39584,0,0,2c91b4e9916e8396a565550f0b2e78bd69e8dd806951ec541bdabb6ac33bc11e,2024-09-26T18:35:04.523000 CVE-2023-3959,0,0,1c8cb0b9580f83318b0c36d8bc8f73fb342f7d0f0a71af399cdaffe0ab2960a8,2024-08-02T07:16:07.870000 -CVE-2023-39593,0,0,89861ee246492bfe96e91015c0646ad202db3adbbf5e401d253a3499e825f73e,2024-10-17T22:15:02.847000 +CVE-2023-39593,0,1,def3637fb36e583cf25f1fc111cb860a6aca78959d462466d30b3df405a5d24e,2024-10-18T12:52:33.507000 CVE-2023-39598,0,0,472be8949d4750c193fc0e79e3373ee8040069ae06201b9dbce78c66cf7f4d8a,2023-11-07T04:17:33.097000 CVE-2023-39599,0,0,d846bb2751315746765d628aac10470828469ee3fe731d77fb8a34e1cea0bd8c,2023-08-28T19:08:09.323000 CVE-2023-39600,0,0,7f58febe003b75ab66793e4055525f6c3c139aad235a05622e6f81527de7c5e2,2023-11-07T04:17:34.073000 @@ -237117,11 +237117,11 @@ CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000 CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000 CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000 -CVE-2023-49567,0,0,22470bc43e2252f9d7370f257708c9f0fd58353de37f715c684e161c09ac8230,2024-10-18T08:15:03.143000 +CVE-2023-49567,0,1,80c711bb0ddf66bcd6467d67a0fd760e9e362f9e0c6a9ca4ad03be72f4756d58,2024-10-18T12:52:33.507000 CVE-2023-49568,0,0,e295bf606e29529c11cbbb43abed02bc4423081c2a4c69be87e7b9161aed1898,2024-01-22T17:57:41.193000 CVE-2023-49569,0,0,d61d891c4a84c41eb74d9a85c11d68d30d185ae64e4fcddc4c6e7a3912a15d45,2024-01-22T18:57:03.500000 CVE-2023-4957,0,0,78bb0460b3b0f290da79e035e030dce6be4d514bdd0094dcadf90329259b779e,2023-10-16T14:08:22.900000 -CVE-2023-49570,0,0,40f319f7939ac30409d031b3972348efd825f9a09de4644771f8f05df39821bd,2024-10-18T09:15:02.770000 +CVE-2023-49570,0,1,fea19fe915958a084bac97051d0a9ebf8bdcfca1a5036a510423c9e45bb2b03a,2024-10-18T12:52:33.507000 CVE-2023-49572,0,0,887de86a687a05ec36d54a2019258a2d8d5e1fc1dbf8ea3bc3a57b5c0467ed12,2024-05-24T18:09:20.027000 CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb7a7,2024-05-24T18:09:20.027000 CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000 @@ -240249,10 +240249,10 @@ CVE-2023-6051,0,0,65166b01dd71515312d91f9d8071d445b248393f92fbfdc73dd7007d9755f5 CVE-2023-6052,0,0,aade2b22db5b4363b4735382f3bc2b9b7b67324ff9b0a0e43ebe15be0d76ef4d,2024-05-17T02:33:29.807000 CVE-2023-6053,0,0,884dd7c884b65418d1acc2ea8b654cbf552035c51290cebacf8d437558597e99,2024-05-17T02:33:29.920000 CVE-2023-6054,0,0,7c33b8bac31ea414624bbc9ce8995053ec355ffc65ef3213af66e1a1cc5d7096,2024-05-17T02:33:30.020000 -CVE-2023-6055,0,0,902a8a3674cbdb322ac1900eebe4ea56becc2721495471b07c803e2f938068f9,2024-10-18T08:15:03.387000 -CVE-2023-6056,0,0,a9959bb1a90fea7157fdb0183e35149734b9f1575fafb48d0221de8cfc6be2fd,2024-10-18T08:15:03.500000 -CVE-2023-6057,0,0,c42efcfbb9170cf1db0339006c2b97cf1beac8710151d02a7e6670fc6a820ab5,2024-10-18T08:15:03.627000 -CVE-2023-6058,0,0,335bb8aea296c15c58668cad6682c7d356982f113792d1e8069d875424ead104,2024-10-18T08:15:03.737000 +CVE-2023-6055,0,1,31cf33fa523ad15a28c2abf90f3b7dc8ef18d6e5beb39bfcd37821bb4aff152a,2024-10-18T12:52:33.507000 +CVE-2023-6056,0,1,8bc631d542bf2b03e6ac351e30ccc534c312c3fec467c3b2e5fcbca497171b5c,2024-10-18T12:52:33.507000 +CVE-2023-6057,0,1,7e183426046fe1aa2ce379bfa097fa1b6018148d53cb867a22a9138b87d49258,2024-10-18T12:52:33.507000 +CVE-2023-6058,0,1,22ff0643ad58384e8c6f327d1d232b870a925b9cfe86420b0e534bacd91e9e37,2024-10-18T12:52:33.507000 CVE-2023-6061,0,0,3668adbae0969cfab0fed96f2f0cd588b0f30acaede83213c351da7fed813869,2023-12-12T22:24:14.313000 CVE-2023-6062,0,0,9acfdc2e379d5c765b916ddaf4e9e4b9e3e002ce20adb1082d4167d6fe0776c5,2023-11-29T18:01:56.163000 CVE-2023-6063,0,0,6829cec6327e2b0ca6394f26a21b2458a09f31b0b2f6c2afeecc6087b47b68d1,2023-12-08T14:39:22.200000 @@ -240825,8 +240825,8 @@ CVE-2023-6723,0,0,bc516f06b799fd16a153a5db758b99843661b1d7275b56dd1219f1a33cef70 CVE-2023-6724,0,0,4a987444faf294be99c3a8b915efad529d52daa579fbc3389c67429b7ef5f31f,2024-02-15T18:44:49.107000 CVE-2023-6725,0,0,6ba896a9300f79a0e855968fd521febe22301aa8fa4615d4c4e6bb1264e86ccc,2024-05-22T22:15:08.463000 CVE-2023-6727,0,0,55c30cd2b84fe8c26c6d900d04c5581bc0771e597f1756e309a8396bf4e4b0f4,2023-12-15T14:43:08.920000 -CVE-2023-6728,0,0,49bee4be884b007cd4cbac766baa21b202a92d32d10f2a941a97cce2e88e35ef,2024-10-17T13:15:12.077000 -CVE-2023-6729,0,0,962a7ca1117a0fe07b7933c9c0e445f75408bc91434763281c7330551b15f98c,2024-10-17T15:35:11.400000 +CVE-2023-6728,0,1,d99fc79cc1312bb6244343c340787d87a3e22ab18a57b13bafae697a6b77cb0e,2024-10-18T12:52:33.507000 +CVE-2023-6729,0,1,1fb7c2f4b17ee24ffb6345e8ccb16a40f75aa47bcebb4776ed1476df7176917e,2024-10-18T12:52:33.507000 CVE-2023-6730,0,0,d0ffb6838b9a65af4c4905bc6f307ae559cbaec8450c4b0ee798393fc6043da1,2023-12-28T17:15:33.537000 CVE-2023-6731,0,0,3d191e2c26a0a3aa0821f60da98004f88d38a1819ac9580185e4501f59332a4d,2024-05-02T18:00:37.360000 CVE-2023-6732,0,0,a8cf2e4c4dcc6f1ed4b0c8bd0cc0fcda4e222ce88394800e3628dc6aaf413fbd,2024-01-23T14:59:59.107000 @@ -240927,7 +240927,7 @@ CVE-2023-6842,0,0,f429077f58fdd7b921c4ad625695da909819a8bf771d3fbc01d9937782b597 CVE-2023-6843,0,0,00272c2fa9237b7479a8c05d266a799ecf6195c1b26d131878c3fddd111c3fe0,2024-01-19T17:53:58.730000 CVE-2023-6844,0,0,11c3632bbbb5f9ddbbc3513d7c839dea2ecd91c2a7d8b381a8eb3e1cef96339b,2024-05-24T01:15:30.977000 CVE-2023-6845,0,0,7b58d9eec1c1dcc96c79f4e992a766cf2ac1505f9ea7b19b4d46c392399d5c8c,2024-01-11T20:01:43.617000 -CVE-2023-6846,0,0,c64faa8580e59adb86a5960902c46e8cad0a0580050221bda1af6a3e7b64c3a9,2024-02-09T16:51:01.473000 +CVE-2023-6846,0,1,df2bcc26ac4e696d368a4c4ca53318d42f356010bac547646710fbd113a62589,2024-10-18T12:19:40.940000 CVE-2023-6847,0,0,65d72ac741a3be77028767966942478b4cd11e454f32b04b797b387069dc9c80,2023-12-29T19:13:35.857000 CVE-2023-6848,0,0,52706d607233af18ee30c3bacc68162c19f97f24dcaa153ade1fca1dcc9aa28e,2024-05-17T02:33:56.817000 CVE-2023-6849,0,0,0397633e97e485b3f6c0f0748586da0bbfe732bd53fe99c5eeebd8c96abdf231,2024-05-17T02:33:56.940000 @@ -241501,7 +241501,7 @@ CVE-2024-0225,0,0,0b77a69c95a19bcdfe05ed5df4808097a36664f7ca815d26c3857bfe772d94 CVE-2024-0226,0,0,e707d4aa495a869f79289c3f4b58fd576da35074608e712de021d3ce83f005b2,2024-08-30T19:15:15.420000 CVE-2024-0227,0,0,a4e84e1b9f9ff8bb72dc26c9ff00c9b99f09150a51fa56e523e138aad08ff049,2024-03-18T14:15:07.283000 CVE-2024-0228,0,0,fd96fc161d3d60477c711a5fbf3929339bbdfc61029c2327b7af9a111ceab709,2024-01-09T17:15:12.223000 -CVE-2024-0229,0,0,0c4d94a509251e66deeacdbac20cc088953aeea4e819d0a5ae0635cf311dd51e,2024-05-22T17:16:11.003000 +CVE-2024-0229,0,1,867ce1fd7c35e493f92072f0b2321fe69d2c609166ab862827f7d827ede02f18,2024-10-18T13:49:32.090000 CVE-2024-0230,0,0,24d638afd0420bef6a46df36ab91db6a8f8e82d99d85e08e0b6837b09034d463,2024-01-19T18:35:52.493000 CVE-2024-0231,0,0,d80a1c6fdad986c34ca88f080ac6103160028c174e05f2a79da18342eb92dd35,2024-09-11T15:35:27.340000 CVE-2024-0232,0,0,5f864010f1c8ba6fc12320f87c6edea78c6f5462e03dddf03718f13c882876e3,2024-09-28T04:15:07.230000 @@ -242223,43 +242223,43 @@ CVE-2024-0999,0,0,84034800a287889c8e66f3ba01c1d930a06538aadfe1b375cfd8893390aed6 CVE-2024-1000,0,0,60c836cbd4d96144c97b06caa16452d33dc82172b5cc2c653a7406010f53b5df,2024-05-17T02:35:08.790000 CVE-2024-10004,0,0,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530ed3,2024-10-16T20:35:08.850000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 -CVE-2024-10014,0,0,4221ff778b88adf6a125e5dd0743c7860f7266d252381c0c3ddb5d4f01d8cf5c,2024-10-18T05:15:03.713000 +CVE-2024-10014,0,1,1395463dc1e29fd6db71d83f72260a8cd3462c205364f301260cc7f7b129af31,2024-10-18T12:52:33.507000 CVE-2024-10018,0,0,2aa14605c63d984e9b2fdfd4b3872cd3e6ce36a0ab239799435cd07454bf385f,2024-10-16T18:35:03.460000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 CVE-2024-10021,0,0,a6b17344f3b8ed69b69af1e4c8072f0ea15408a02fd5537c80b963512d6978ea,2024-10-16T16:38:14.557000 CVE-2024-10022,0,0,0168cd514401d1be0e849bc27c7e2e366e37ce97ce04620f3f8d342cf2b43281,2024-10-16T16:38:14.557000 CVE-2024-10023,0,0,db54ebd532d797f8c44fbc00efc10b60040113385b1a36843228c76d3987b972,2024-10-16T16:38:14.557000 CVE-2024-10024,0,0,011fb00487d29d1b355fb7ab9e71d1875a267d231fe8021bcbf0d20089aa0bde,2024-10-16T16:38:14.557000 -CVE-2024-10025,0,0,a657e3a6cd20a3590296015914b590551c8ff06d45d4d15847982a0af5da7204,2024-10-17T10:15:03.127000 +CVE-2024-10025,0,1,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 -CVE-2024-10033,0,0,5f5fac31bbbb873ca41babce49ba5085a90c023337e2ffcbb5946f7099ac45c0,2024-10-16T17:15:13.267000 +CVE-2024-10033,0,1,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524766,2024-10-18T12:53:04.627000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 -CVE-2024-10040,0,0,eeddd5e2462cb89157c8d3be6b464fcfb41c6d1afab195d745d7afde26f34b76,2024-10-18T05:15:04.667000 -CVE-2024-10049,0,0,48c11324d4c5b19749fdefadd69a6949746bc6c9a3ab70064428c82c35c7ac07,2024-10-18T05:15:04.977000 +CVE-2024-10040,0,1,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 +CVE-2024-10049,0,1,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 -CVE-2024-10055,0,0,8f66996f8e070418e146fa08e256ec1fedf3f07f43f139e4d58cd06b0ff1f2f7,2024-10-18T08:15:03.843000 -CVE-2024-10057,1,1,79ebfd56be96bd25221f71339e9e4814d6863dec930e3b55e602f02cb82b43a7,2024-10-18T10:15:03.173000 +CVE-2024-10055,0,1,6d434f327f323d1d4e7933b0f8db3edb29a6b4c6a11d2f352406cae112cfb5b5,2024-10-18T12:52:33.507000 +CVE-2024-10057,0,1,f00e9b97b4e44a71501e4f152f47b736e9dfea0be964004b9f96030a2909ecb3,2024-10-18T12:52:33.507000 CVE-2024-1006,0,0,fe82f3d0065ffa9f2a59eb5b63e144d9442dc24b73dc23626043d548cf903e88,2024-05-17T02:35:09.467000 -CVE-2024-10068,0,0,edeccdb97d27b9416725ed62091d877abbfc4b3e48df84d0f4d49ab4425c3361,2024-10-17T11:15:10.390000 -CVE-2024-10069,0,0,ca455bfeb0c83b64f9ac819380d1fa3a46774822b8048de083b507c13a7a0491,2024-10-17T15:15:12.857000 +CVE-2024-10068,0,1,d30a41a047eea99fec87733a3e9cf71e01923d623f7bff84eb08ba80a39dc81d,2024-10-18T12:52:33.507000 +CVE-2024-10069,0,1,3deecf378edc88d42f5e3696d99a60fded7005d195b49a0977c4e7373c383b23,2024-10-18T12:52:33.507000 CVE-2024-1007,0,0,bb97efced7fb486712fbb95488bae5086c8742bff2dc7feb7593b966188b1cd7,2024-05-17T02:35:09.577000 -CVE-2024-10070,0,0,aadc3f57e58bdb37b48594d27f16c02663cf707d139f7ff21226e2237bd526b5,2024-10-17T15:15:13.110000 -CVE-2024-10071,0,0,786ab66514c8649b462167669a38d86b8966efae9e3f314b363e4560f65d16ba,2024-10-17T16:15:04.610000 -CVE-2024-10072,0,0,442df5887954f0bfea5fdc93995e278c4921f6640d0efcfaba91e4d6ff3a6d8e,2024-10-17T17:15:10.963000 -CVE-2024-10073,0,0,27126fc0fd851f69c083211cd22c0a268410d78deed22b8f50468ea4e048b15d,2024-10-17T17:15:11.253000 -CVE-2024-10078,0,0,5319ee8b6b8de6ee4f0b7fe8427534ecaa3184d6c30bf0e5c139f5ba0aee425d,2024-10-18T08:15:04.060000 -CVE-2024-10079,0,0,2f4d0c1bba3ae42f68ff19e54ae2b31768676440007baf3fb20e0318f9ee43a6,2024-10-18T08:15:04.300000 +CVE-2024-10070,0,1,216527c2b12202c13fd2be47484623c629dd539a42a83f166a629ff9b0de24e9,2024-10-18T12:52:33.507000 +CVE-2024-10071,0,1,d945c00f0983ef5c9b12c1ce6c9e5df8f6ef12be581b7908602be6e064d2ccff,2024-10-18T12:52:33.507000 +CVE-2024-10072,0,1,e35fdbf031c765c79e020571689365b0b4f69123f2ba73d875fa816b1fd3d823,2024-10-18T12:52:33.507000 +CVE-2024-10073,0,1,36e7a75e8440250867ac4ab2920540c9c319ac3650023a2029f396b9acec7ea2,2024-10-18T12:52:33.507000 +CVE-2024-10078,0,1,0aa7dd836d17776d3cafdf2b21a76b868a43535c39ebfa97d22b166c12681f1e,2024-10-18T12:52:33.507000 +CVE-2024-10079,0,1,16baef55e86d7a7bb7c75a8d8bda456345b338a1ddd8fc352492983721ca02a2,2024-10-18T12:52:33.507000 CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000 -CVE-2024-10080,0,0,b3b761233321020750ce7a59161230e811e21762428c0a13c64a07b01de14060,2024-10-18T08:15:04.507000 +CVE-2024-10080,0,1,7dee1bdb0654db1839e6846f51c6c9699dc09bcdb5e7141706a72d57a008f278,2024-10-18T12:52:33.507000 CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000 -CVE-2024-10093,0,0,4286f3f8eb375d5010de759aea1fd100ff00b6f6303f2464f11141eac1d4e315,2024-10-17T23:15:11.817000 -CVE-2024-10099,0,0,81378f6b423e5054cac2177a8c169ade851c544dd9c630819d2a05750ae3d5d9,2024-10-17T19:15:21.337000 +CVE-2024-10093,0,1,655dbc008c9c21b76c775eaa92108777c983716e956bf10f0085a4f9c49fc737,2024-10-18T12:52:33.507000 +CVE-2024-10099,0,1,185a137bd5523acc338e25e5a408e0f2a47c7d04067b4fee0130a9bea860bb8f,2024-10-18T12:52:33.507000 CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 -CVE-2024-10100,0,0,fe6acc2f945733c336761a20f7e8d3f20547183c59e8ef4ee5b2d8d7a9b03a3d,2024-10-17T19:15:21.533000 -CVE-2024-10101,0,0,e2f378697b1e54486edd3f25d6f43de8d8ae0ca6e63c6d7ae3db5b57c9a3a5bd,2024-10-17T19:15:21.713000 +CVE-2024-10100,0,1,551af785b2583dfc00dd65a689907bc427d5051278643ae24a3a0c57fb4f9ff3,2024-10-18T12:52:33.507000 +CVE-2024-10101,0,1,1d42831444f093da17057d1135157fc2c61373ed2c6e3aa4b33071a4d1f4b2d6,2024-10-18T12:52:33.507000 CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000 -CVE-2024-10118,0,0,0d6edd16bbce7e35307d057d438a4f23519f87befae3e763ca749669ef9d2293,2024-10-18T04:15:03.290000 -CVE-2024-10119,0,0,6c4069848b5bb609c195691d50cdf4f5c109d91eabeeca561b0d0a052b8f5ac7,2024-10-18T05:15:05.200000 +CVE-2024-10118,0,1,20c350d413130c355373caed8d6cb5911ff957b85489cebdf58c361a0299d81f,2024-10-18T12:52:33.507000 +CVE-2024-10119,0,1,3a739123963202923959a689b720abc71b056e98e226f3cc9103b43eebd575a4,2024-10-18T12:52:33.507000 CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000 CVE-2024-1013,0,0,0ecf415fc1e3c9674ce36da20d6e67872f02747822a72b780ad0899083ff5765,2024-03-18T12:38:25.490000 CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f3d,2024-02-02T02:05:39.277000 @@ -243335,7 +243335,7 @@ CVE-2024-20277,0,0,736a7d458de43e0c8ef102aeef0adf3c0541fbbca3219355ca4fb06899462 CVE-2024-20278,0,0,12aa1590b3e8a6125d7154bf2a045b19659a28fc2d4df972ed53df9e81e82c57,2024-03-27T17:48:21.140000 CVE-2024-20279,0,0,05b20e0d8f3b8cda00d50e64da3647c27567cdb3c3b97e828571e56bf1250500,2024-08-29T13:25:27.537000 CVE-2024-2028,0,0,e06846e6ba84daa4133d99af11982cf4b0bb14edf4a6a3dc6070516f4e834b30,2024-03-13T18:15:58.530000 -CVE-2024-20280,0,0,e673acf154dc8cac2b56fe6eff5705788537ac4b003b9c36b27896f512069b7a,2024-10-16T17:15:13.697000 +CVE-2024-20280,0,1,da8f41bc84f7d802575125351a783329e8aa97a8053af1d58e9a8a5382a07caa,2024-10-18T12:53:04.627000 CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558ff29,2024-04-03T17:24:18.150000 CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000 CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000 @@ -243450,8 +243450,8 @@ CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000 -CVE-2024-20420,0,0,9428b62cd26eace6be62d66862a2be78206bf5b9802afb8c8a5b6e617c5e2a83,2024-10-16T17:15:13.957000 -CVE-2024-20421,0,0,788356a6c148ba4001a3459fdeab7223d388709ec913c5cc535236457ff00c60,2024-10-16T17:15:14.193000 +CVE-2024-20420,0,1,808fb1a1636da5f128b3d2c1b67dca3ed991967043e939ee2434e6373787d74e,2024-10-18T12:53:04.627000 +CVE-2024-20421,0,1,75347908f34ca039e78aed9293f8b2d588dcf44e681cfb6cc3ab6aa41c98057e,2024-10-18T12:53:04.627000 CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000 @@ -243478,12 +243478,12 @@ CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53b CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000 CVE-2024-20455,0,0,582e47a347a8706fc3b45fb517686d3b16168e4f0adf4813dc071f3e17470c8f,2024-09-26T13:32:02.803000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 -CVE-2024-20458,0,0,1f27845239424cdea3838227264d616a18a118ff76039414c7089f6b5362caf1,2024-10-16T17:15:14.423000 -CVE-2024-20459,0,0,caa645b4650cd8a2bc7f9e255d9917207ffd769cf4f622888f7047a4a47c2c06,2024-10-16T17:15:14.657000 -CVE-2024-20460,0,0,2bd86b5a9a17fe2f93e893c2288e79ac6f1aa76459504c0a372ac11c9b867072,2024-10-16T17:15:14.880000 -CVE-2024-20461,0,0,d14d07318226192c95a3db80774dfeb3e4e66f59725c13604d97a08582150cb4,2024-10-16T17:15:15.127000 -CVE-2024-20462,0,0,c605b3afb3faef86d0f9d0f4476c12d2ef563f140953dfecc36a4889391052ef,2024-10-16T17:15:15.357000 -CVE-2024-20463,0,0,9f8dbc65040a38bcdf3715d87c54267f228aee259dd13f06130c06e6a5f297d2,2024-10-16T17:15:15.670000 +CVE-2024-20458,0,1,b618dbe74ef342b6fdef57c9f243c321a185a45ba074908883a596a8489717f6,2024-10-18T12:53:04.627000 +CVE-2024-20459,0,1,575e8ddd96681a0dd32da56fcee58eb213cc4650dcfea2e56eb58d7a247f4dc8,2024-10-18T12:53:04.627000 +CVE-2024-20460,0,1,c5260a376147cf9fcdc79a42e7972a313bd4f558663b5a24322bd62548b06946,2024-10-18T12:53:04.627000 +CVE-2024-20461,0,1,2bc3320778f8c7fbde2cbc635624380365a2cf7ce739874f0e0bf05275db58a9,2024-10-18T12:53:04.627000 +CVE-2024-20462,0,1,9b33827e8e4b313e4e6933518796ed246da290b26064695b2aaad485699a3af5,2024-10-18T12:53:04.627000 +CVE-2024-20463,0,1,7923ae064daca024865d69bf59e86e07377aeda36be579f2bc9e3eb19b920ba4,2024-10-18T12:53:04.627000 CVE-2024-20464,0,0,885e4b5fbbba0f9d8b2f4ff463c0a3d55ff5aae6f976428aa05f22d0fa4e2121,2024-09-26T13:32:02.803000 CVE-2024-20465,0,0,e6053a052da134a2b60854b5aefb33da7ab8ec9453353220c196e9e5fe323c38,2024-09-26T13:32:02.803000 CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000 @@ -243520,7 +243520,7 @@ CVE-2024-20508,0,0,0768ac64a8260ad45d8462ad7e41dbfa97c47e8f324d81868ad4103c1f94f CVE-2024-20509,0,0,5f3f949e87da33ae8e05af8dd043b1b8c4558497e54d60a20d025b6437380c68,2024-10-08T18:45:52.513000 CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 CVE-2024-20510,0,0,6fbdd0fde11e7a17f48951ee8a4206d5b5c8d1dcebb95035b098d9f8dc980dca,2024-10-03T14:52:22.627000 -CVE-2024-20512,0,0,16c4d8668ac9a002dc0db9f832fbdf1a1582ebb5e910bda921e6c346246f9453,2024-10-16T17:15:15.913000 +CVE-2024-20512,0,1,32d210efc259ab5a4a0ffbd125c9a1d01fe465030a671f22a6529c28c3c31d4f,2024-10-18T12:53:04.627000 CVE-2024-20513,0,0,59340ca02e9ac8b2ce467c4f6ba3d60a9250b41442bd8318c0745e7df94f4acd,2024-10-08T21:16:54.820000 CVE-2024-20515,0,0,a97b9b776cc799ee1ad03753f84b5adbde8d922a71a988fa6a481a074da42b1e,2024-10-08T16:11:23.440000 CVE-2024-20516,0,0,38173375d3e97a2ca4a3ada633aa8363dffa90658c88f70a1b4706a56888fef7,2024-10-08T13:44:10.840000 @@ -248907,7 +248907,7 @@ CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7 CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000 CVE-2024-27764,0,0,16ee34fde6f52e835f6174856b223e8f8048a1141bc56e5919f75be066bd1b81,2024-08-29T20:36:33.003000 CVE-2024-27765,0,0,946f1ae3b42eeddef53163b64360f4980758030270d5c196b145f2c4061e3615,2024-08-08T16:35:07.573000 -CVE-2024-27766,0,0,147b9a65f2c36a8bbd42b894aeb6bb18162e05dc4627c81626f76962b6c32298,2024-10-17T22:15:02.920000 +CVE-2024-27766,0,1,5de2f83fe4e2350e583d0de6fdca47e5d15e066c809ec051e482d8d79edfb1be,2024-10-18T12:52:33.507000 CVE-2024-27767,0,0,588021191ffc186f7dafcc065bb8b722083fff47f2715dec13cceb116744ce43,2024-03-18T19:40:00.173000 CVE-2024-27768,0,0,2a172611cfb3cb531839add9d871259e9ae7004ba84244aa574347493f81c01e,2024-03-18T19:40:00.173000 CVE-2024-27769,0,0,40c08942e7bc0a364e2e9393c4316622b03ce4f4c87f0140fc357e25906e47fa,2024-03-18T19:40:00.173000 @@ -251136,7 +251136,7 @@ CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000 CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000 CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c7062708e,2024-04-01T15:53:18.060000 -CVE-2024-30875,0,0,63cbd64a5edb35dd42d7358f2a9191a54a4413ee12eaced0da9ff74e9f285676,2024-10-17T22:15:02.977000 +CVE-2024-30875,0,1,fefcbb1e08463e1eb7d11305e32492078b94343606f393dce6dd7d33657af596,2024-10-18T12:52:33.507000 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000 CVE-2024-3088,0,0,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000 @@ -251786,7 +251786,7 @@ CVE-2024-3183,0,0,0492ca93cdfb91fe06164185f64dfd6e79760054d26b360873216c2809fc0f CVE-2024-31835,0,0,58e83917145b00ad31bbd42e3b16abd2000b8d2042437957db54dd413137311c,2024-10-07T18:55:10.790000 CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb008909a,2024-04-30T13:11:16.690000 CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000 -CVE-2024-3184,0,0,109839adb9080b787f52e62639b70d959f7b4b5a0f7f3eb18e5cd02422d32db8,2024-10-17T08:15:01.950000 +CVE-2024-3184,0,1,889f96ded695017b23219b81db946956bdd8d2bd4695b6127f3917a913ff2034,2024-10-18T12:52:33.507000 CVE-2024-31840,0,0,2a239ae6429f1e619b6ab41616165b617110dec5fa8e072accfd9e1f9e2b5f58,2024-07-26T19:12:02.190000 CVE-2024-31841,0,0,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000 CVE-2024-31842,0,0,04e10fa9b560356ffd7bccf7ebe292e92dabaedcaa77c700f62b5c2b3a2314dd,2024-09-13T14:05:23.367000 @@ -251804,7 +251804,7 @@ CVE-2024-31852,0,0,05df9e5d1e1855c684901a0f2256bf744f516ff5583847e1514009f87c86b CVE-2024-31856,0,0,5b17ff56b891e28d61d399fcd31dbd56e16c04a63e50007a8b07a5f126fa07a3,2024-05-16T13:03:05.353000 CVE-2024-31857,0,0,b57daea1515042b1254b11fea9a109934d9eaeaf743c5e6b1d4482216f0f52dd,2024-07-03T01:55:30.363000 CVE-2024-31859,0,0,c7e4bf86d17f8d38f3b896e8ada50cd27745133fc837be8a4aeca253b15d0e96,2024-05-28T12:39:42.673000 -CVE-2024-3186,0,0,ba13138a8f95a5ecef796c7a07709d40e27e3fd3db33895cdb5491ee46f632c2,2024-10-17T08:15:02.453000 +CVE-2024-3186,0,1,2c071e7a920e3222d085e85ca9f2309de7f74105a7f06cb3142cc874246f8ddc,2024-10-18T12:52:33.507000 CVE-2024-31860,0,0,0c85f33d3dadfb2fd0d5a6f2d0ed9d9d75da9aaa685f77a3492d74d36fbf93e1,2024-07-03T01:55:31.267000 CVE-2024-31861,0,0,7e520905222b40b184cd37e76ba3749bb6aceca828ca7e9efda91954bb808b66,2024-06-21T10:15:11.757000 CVE-2024-31862,0,0,3f16a6d9612f966306ce7a67b229ce3867519147d68464f4271e3881457a5a98,2024-08-21T15:35:07.937000 @@ -251815,7 +251815,7 @@ CVE-2024-31866,0,0,4d372d14b7807ced8e821f43a5c883c03fa5dbca9edfba0af795f01513fe3 CVE-2024-31867,0,0,7c90191082994197ce09c1b6019992176f2d76072856e8d65beb1a7b6ded7916,2024-05-01T18:15:23.740000 CVE-2024-31868,0,0,703c16597751f17fba32c3b61a2e58921496411599e95e2472502f1bbb33ada3,2024-10-03T13:15:14.833000 CVE-2024-31869,0,0,683e8c771fda682074fc448ea32be7db8fcec1e782121eb87243bff930796032,2024-05-01T18:15:23.843000 -CVE-2024-3187,0,0,674e932e3a00f5d068b48c0c107492550abc02c54a93c15ad68d0170342445b3,2024-10-17T08:15:02.760000 +CVE-2024-3187,0,1,9daa4400efbb95cf28ef1942a813d3b40029e3093ff205104e53b1461d32309f,2024-10-18T12:52:33.507000 CVE-2024-31870,0,0,089cc53c4c4bda98698ee28fa3173d546c896f43008726ca3e29a627fc47e14b,2024-08-01T20:37:52.127000 CVE-2024-31871,0,0,e284e485f6f33109f328b7bdefb50066e4ae8d799f85dfa5af29de93c8e9ffe1,2024-04-10T19:49:51.183000 CVE-2024-31872,0,0,3db97c936d679b09f7c0cbcf4407389ec3057292bdc2f2624578bc78bf289dfb,2024-09-20T20:15:05.120000 @@ -252952,7 +252952,7 @@ CVE-2024-33445,0,0,6e7e4efc8ec4c00f5a4d8586fbcb92cabc92474cc1d9f3d59cf859cedc450 CVE-2024-33449,0,0,65f31ebf7cac3fd744da219853727b760d519b14a5a3f0dabbd6197ba25b1997,2024-08-01T13:51:58.900000 CVE-2024-3345,0,0,636931b54021c23b6b8befb749ba186f8411eca702348865e4d3d050c16c6125,2024-05-21T12:37:59.687000 CVE-2024-33450,0,0,4e09c623b6101225f314d1df53358088e879f8d91a1a16fa51d690b1bfa25901,2024-05-29T13:02:09.280000 -CVE-2024-33453,0,0,0a1999ac6284ccb32c69e856c51cb310041f6f28cc455f1c9512056788fee2e2,2024-10-17T22:15:03.040000 +CVE-2024-33453,0,1,208f3102d30aba50a0b9529c4529c08189d94994dc6c41c000293d5f213db659,2024-10-18T12:52:33.507000 CVE-2024-33454,0,0,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e14aa,2024-07-03T01:58:17.097000 CVE-2024-3346,0,0,5fe2388e7081d85802d7eeef70ad8fdaa632fc14126ef86b4921587d73e76418,2024-06-04T19:20:19.553000 CVE-2024-33465,0,0,7dc8798fe71a3f778010ed5d146c9c87c91ee3709364cd2f1c6196073e9c2579,2024-08-01T13:51:59.690000 @@ -256872,13 +256872,13 @@ CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5 CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000 CVE-2024-38812,0,0,34d8657a2d86accb47b9e7e7219bd48126133821add77e5ea4911708e30f2104,2024-10-02T14:16:47.610000 CVE-2024-38813,0,0,3d08a10b622d3af5696a9ed2c2a45317011023f873f91120d4c5c5927c60a9b1,2024-10-02T13:59:52.887000 -CVE-2024-38814,0,0,fab2150abed7669bd1d40e8accc3827186d78d500311d6ca050868d2292cf445,2024-10-16T17:15:16.237000 +CVE-2024-38814,0,1,8775dedecf02d86af622263b1b9ec26dd68eb5ede1b378eb32dcc5ae0bc400c2,2024-10-18T12:53:04.627000 CVE-2024-38815,0,0,3a4b59062178be01e22848b989a9a62de86c1bfb989586c3092abdaac97fd53c,2024-10-10T12:51:56.987000 CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269232,2024-09-13T14:06:04.777000 CVE-2024-38817,0,0,09723b24db0d6a084c268e07b58c10ca202cbe9290f0f8fec2db45f626cd7af3,2024-10-10T12:51:56.987000 CVE-2024-38818,0,0,622849f8ff4dfc75febef96b69e498222845497635b94ea6c1bb47520700e61d,2024-10-10T12:51:56.987000 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 -CVE-2024-38820,0,0,986e556b0dc71d67b85e8ae90fc8a435d8edf87367a6abc7dee692ee8ae17064,2024-10-18T06:15:03.333000 +CVE-2024-38820,0,1,3f1307c8189a7ba97a1e7fb1069567fa3bed7d2517fc73f213c4cc7fc2195e41,2024-10-18T12:52:33.507000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000 CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000 @@ -257854,7 +257854,7 @@ CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20 CVE-2024-40709,0,0,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000 CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000 CVE-2024-40710,0,0,e69c8c2858f2cb1ca9a0784717f7a4a629a4cef8cb6ad2ae23b5e076a46451c8,2024-09-09T17:35:04.207000 -CVE-2024-40711,0,0,096ac4044d23b5e5a276bf9238b36157a243687116a9b0be7d5866fe5bf79037,2024-10-18T01:00:02.590000 +CVE-2024-40711,0,1,22f2a0ec5d60d30d489a1cbde640082edf370b191c841709c2ac9ec5e8cd3229,2024-10-18T12:51:11.257000 CVE-2024-40712,0,0,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750de64,2024-09-09T16:35:06.673000 CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000 CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000 @@ -258236,7 +258236,7 @@ CVE-2024-41122,0,0,db4a015145ff1fc63debc38645ec64fd0c8a278e5cdafdcde4b59bfb53ec7 CVE-2024-41123,0,0,e5c9227af2b887ccb9089a5ad2dc1eac1dac994eb9a8b3fb98a0a3f4b9e884f6,2024-10-10T12:56:29.837000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 CVE-2024-41127,0,0,cb656d719f797ab9b0f4b867a7e6012c2f45c355cda77a51db0501f209b4731d,2024-09-11T14:52:15.690000 -CVE-2024-41128,0,0,24728ea0aa688e7c1dfcbacd943b9236737fc176c4e5fce85695b9a056c1f423,2024-10-16T18:15:06.070000 +CVE-2024-41128,0,1,6699d58fc94bbd63c0907fe514357d798bf2b56e70b99f2ac43729b5a2957b06,2024-10-18T12:53:04.627000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000 CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000 @@ -258600,7 +258600,7 @@ CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 CVE-2024-41839,0,0,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000 -CVE-2024-4184,0,0,c35c72ef97227a5103e9747a60701c9f29d4576216836a6f640d752b7a9de560,2024-10-16T17:15:17.370000 +CVE-2024-4184,0,1,33d23b9a605bc029b53a1f05dc68dc89733f6d581d44acd5821f1f7c67a18e54,2024-10-18T12:53:04.627000 CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000 CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000 @@ -258648,7 +258648,7 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000 CVE-2024-41888,0,0,551a193b56683c8a955974406454da46e806e6e58f5cbc2dcb8dc5dd231b91d3,2024-08-29T12:55:09.210000 CVE-2024-41889,0,0,c2f8146a4c074f06a28a6e2235a6e3d92ccee3a8823a7bd377c0c9b959c16c5c,2024-08-30T17:53:40.897000 -CVE-2024-4189,0,0,11cc5f101be7712b4bae3149c700267b96b8cc3dfcc66609fca4b7d48e7fd0dc,2024-10-16T17:15:17.493000 +CVE-2024-4189,0,1,f3503e7c0468c888937257bde69063381303169eecce5486a82e4333fd127629,2024-10-18T12:53:04.627000 CVE-2024-41890,0,0,a90af16c8c7558e5227ebbc511a4c71519b3a4532e07b0a451c0d8da1663fee0,2024-08-29T12:56:47.413000 CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000 CVE-2024-41902,0,0,43ae61ebce9a8b7d3996bceeab15083df998500c68f80ca3ea2bc52db86bbada,2024-10-10T12:56:30.817000 @@ -258827,7 +258827,7 @@ CVE-2024-42106,0,0,d1be86d3a499fcbbd48fa48666a765f712be1dd5a6b971ade33744c711a65 CVE-2024-42107,0,0,6491957e69d9efbbc6993b086ea49c99500b6fccef3248643b058f90720776c1,2024-07-30T13:32:45.943000 CVE-2024-42108,0,0,07a55e64558b7f3e959e84e219b350a11c328136e4e4f1bc5343262d1bc114f5,2024-08-21T20:52:35.470000 CVE-2024-42109,0,0,7426022d2af0b7bcb0572ef1095f4b2b07e4bd980abf97c7236bd4ffbdf0f678,2024-08-27T13:44:00.143000 -CVE-2024-4211,0,0,9a7623a80554f63643f5c3d3905998a6b001053d538dbf278940e62235f140ab,2024-10-16T17:15:17.617000 +CVE-2024-4211,0,1,24a198bd094bf9e44150fb890205a61c1bb5be436ddf7e69472ba8de67c579ee,2024-10-18T12:53:04.627000 CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d076657e7,2024-07-30T13:32:45.943000 CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000 CVE-2024-42112,0,0,053ed3da7b6fa8b9c64b9dd46522be8c0a3889161664650c546eddc66722489c,2024-07-30T13:32:45.943000 @@ -259572,7 +259572,7 @@ CVE-2024-43294,0,0,115da993f44036adfff3784c8efce939e5d53bb4f7ab07ebab66e86a98521 CVE-2024-43295,0,0,4c992084e199b514575e8ec2d873a4ef1cccca3f4f5df0b2e67e418aab98a634,2024-09-12T21:20:43.847000 CVE-2024-43299,0,0,519d081700ab3294f398a4287727657f1b1d3ae45286cab56afe1bc9702f1fca,2024-09-12T21:23:30.647000 CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000 -CVE-2024-43300,1,1,3219521677e3572aaa10b86aaf1529bb5a4669588a274aa94515f527d5d0a0e2,2024-10-18T11:15:02.430000 +CVE-2024-43300,0,1,0ab3dbee23f08761bb5ad8666f78f6f922874108623f138a5989bf44c4271f39,2024-10-18T12:52:33.507000 CVE-2024-43301,0,0,36517c64264e25162f6a8960592c6f8ac4f28ee2609d1e9f07cf9e006ea49e2a,2024-09-12T21:24:20.563000 CVE-2024-43303,0,0,11d9501682f62a268ea8fd6f03971205e43f433af8e58b9f115735076a0f4308,2024-08-19T12:59:59.177000 CVE-2024-43304,0,0,0198c9c448bd60be5feef590d21005c81d3809f24efdc4b5ed5165051bdc5338,2024-08-19T12:59:59.177000 @@ -259793,7 +259793,7 @@ CVE-2024-43562,0,0,7ee00b143cbbc80d6197bd252054172ca74e7b7e23ec4a3bd5be51dd0aebb CVE-2024-43563,0,0,b92202e85ddb689d8e2080c0b2e4f8691903175d8ae92490b5f5bc783e2569cc,2024-10-17T19:01:21.967000 CVE-2024-43564,0,0,f2ffbbcb18f764264f291a6fd4382a8b6dd34491b19e7483f2ed8e3798b073af,2024-10-17T19:00:23.577000 CVE-2024-43565,0,0,b2269f62c87a0809e334aa6ab353a7e51f47ad605159a6c55f950a2f73369b2e,2024-10-17T18:59:41.177000 -CVE-2024-43566,0,0,7956f31210604c699bf74ba4111e2b09adbb631715113c7544b11fd0ce9adb52,2024-10-17T23:15:14.940000 +CVE-2024-43566,0,1,80786b3f995e2a99418fc8b62124c539bf70af655ea0645a8a4b4f5d9ca8faff,2024-10-18T12:52:33.507000 CVE-2024-43567,0,0,b1aa8d4eda561d64c2d6cb4a7fbba0f5a1685cba00aff4889ad4b33556da9802,2024-10-17T18:29:15.913000 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 CVE-2024-43570,0,0,cb1ebdbcc9f463b489680ee7f906a1b002e658802f44b1edfc93e77479cd3deb,2024-10-16T21:53:41.207000 @@ -259803,24 +259803,24 @@ CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756 CVE-2024-43574,0,0,27cb32f4bd91a68a1d79359c4fa56d2ab297703b1b8d3a2c872a415c852b6007,2024-10-17T18:58:37.100000 CVE-2024-43575,0,0,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000 CVE-2024-43576,0,0,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000 -CVE-2024-43578,0,0,5aa1539be28e455fa2e3e7f257d11151e2c115eef28ca8962244fa194c0509f9,2024-10-17T23:15:15.370000 -CVE-2024-43579,0,0,b4adfdc9c2da92a1f71eb20fe9ac6c2af0de817ce3d03195c6c70b9bc1a07452,2024-10-17T23:15:15.570000 +CVE-2024-43578,0,1,6bcb09290cc1d896aa7272a8bb5e450413ce8887077c7fa7edb31f6a839f0d08,2024-10-18T12:52:33.507000 +CVE-2024-43579,0,1,8f338733f20be344df783496954bbdc13e5a2b08b8d2c8078876e251996581fc,2024-10-18T12:52:33.507000 CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000 -CVE-2024-43580,0,0,a8bd2b9b631f4513c371a3d109b6d282430566f9f02e7059d352d183630ee29d,2024-10-17T23:15:15.767000 +CVE-2024-43580,0,1,9604f0b8ced7c21a0bb1645730a2f1594cff8770b4f72dad45129b6deb5c96f8,2024-10-18T12:52:33.507000 CVE-2024-43581,0,0,a22e98e422ecc04b0ca934a31973c1276568d5ce765f25976494433393f91166,2024-10-16T21:54:44.573000 CVE-2024-43582,0,0,293f560c4e09b299c2e18ac66941327f15925f69b715064473f34607ebe9fe26,2024-10-16T21:35:49.927000 CVE-2024-43583,0,0,644d57ca5c0876327fd1914bed083468117306cb0e7b162159599db8c7b2795a,2024-10-16T21:36:59.847000 CVE-2024-43584,0,0,362ea5a413c7ba1c32a6fee99bf2388c9e5eb62bbecc3bdbb75267eaeaf9dea9,2024-10-16T21:38:33.867000 CVE-2024-43585,0,0,6e4f086b3b625aa729537cada88bf0b054983b8ff5768ed654837466a18e4381,2024-10-16T21:38:57.467000 -CVE-2024-43587,0,0,276ca0bfcf410206d489cd57a00eceb539e4410c9681e5ff0d03e47ae1c41f1e,2024-10-18T01:15:39.687000 +CVE-2024-43587,0,1,ffc0edb4afe4f6ad8930e627cf839358004ae93d31173babb8366853207437f9,2024-10-18T12:52:33.507000 CVE-2024-43589,0,0,78d47cc785569b349dce95fb2e6d8a34e6eeefcc81296c73c51c2f00b5575977,2024-10-10T12:56:30.817000 CVE-2024-4359,0,0,14ae9b130c152b886b9b21ff0fc5d35432a1812b898a1bc13704faab705127c7,2024-08-12T13:41:36.517000 CVE-2024-43590,0,0,152277bbadbbed56789e7a47dd749f0ba30af86c181629a529a65bb7827133a9,2024-10-16T21:44:50.927000 CVE-2024-43591,0,0,21af6b0df980a2fc5a207f146dfd7c6553b24177efdeb611a01147c3bfe2bcf4,2024-10-16T21:46:38.153000 CVE-2024-43592,0,0,7ecc81cf1723714fa4e3de1f15eac00751a7a7544d8b8c45c193cc8c2f235717,2024-10-10T12:56:30.817000 CVE-2024-43593,0,0,bdb519a73d468c07de00793af221602ccf6b3af63b116f963a7af3f2dba9f29b,2024-10-10T12:56:30.817000 -CVE-2024-43595,0,0,a51cfe90a54ae8fc41967c5c3cfdee949f19c1c741eb6c73bac66e2dc573ae71,2024-10-17T23:15:16.463000 -CVE-2024-43596,0,0,896ed4b64227997cf8e0c115e15f704565b5e33d9f4492620224cb936efb3c44,2024-10-17T23:15:16.657000 +CVE-2024-43595,0,1,59d04efb4be66a9b68af99b9fb827790c2be5f69e89696c83306f99d4e4f0ba3,2024-10-18T12:52:33.507000 +CVE-2024-43596,0,1,2ef8480755597197d13404a9f254e6118faaae2caad0889ca1d0d08a30e28b19,2024-10-18T12:52:33.507000 CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 CVE-2024-43601,0,0,3e0cb684b9b72ab9715d70d4c4bb91816d9cedd3127d38e1748b786a08e8a124,2024-10-17T18:23:01.007000 @@ -260088,7 +260088,7 @@ CVE-2024-43993,0,0,c2d6d52348aca85630fcb2a37f72e9ad613ffd4f41ea865abac1f2b4dc17f CVE-2024-43994,0,0,e95fee6088b53dd53004a837f528725d2b5541f3917b446ee4145995cc44627e,2024-09-25T17:09:09.230000 CVE-2024-43995,0,0,2396672b42e203af10501efd673b9ceca7d42122b563141aea70581f2ca682b1,2024-09-25T20:01:53.380000 CVE-2024-43996,0,0,4ab5e67e8284ceee786b93aed8adbdd80e1748d0425e228e0426548655b0c3bc,2024-09-26T13:32:55.343000 -CVE-2024-43997,0,0,c76daffe3fa2dabb4fcdabc6a840432cd2d67726e7cad1fa18f23221535a5725,2024-10-17T18:15:04.910000 +CVE-2024-43997,0,1,6c8f403711524a70f603385ceb669667a4c46d7aa3512bb8c48c49bc3e88de15,2024-10-18T12:52:33.507000 CVE-2024-43999,0,0,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000 CVE-2024-4400,0,0,5b653bf54f7bd4284ff54a803a56c0860c5d3b2bf58a6f974ce1eac832bfafb8,2024-05-16T13:03:05.353000 CVE-2024-44001,0,0,346ae8bf0c871825527e18434529b8ae58c66d1360bf3ccc9a5ea96d6edee082,2024-09-25T20:13:04.160000 @@ -260374,7 +260374,7 @@ CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000 CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000 -CVE-2024-44762,0,0,0865d065da20139f09932f3d9f5ed674b0eb7ef1923a372ca4252034ba9ed3da,2024-10-17T17:35:06.750000 +CVE-2024-44762,0,1,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000 CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000 CVE-2024-44775,0,0,205ee8ae27d9197291c9317d68e5db327a872699c5adb78e1d5b21baab0f0fd4,2024-10-16T19:35:10.167000 CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000 @@ -260581,8 +260581,8 @@ CVE-2024-45060,0,0,83a57138238cb06a814cf1f01df1fffbe4a9e82af20e4c1164e77ac214e2d CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000 CVE-2024-45066,0,0,a454e9ceebd31b55929c2c0a2d42869872cfc6fb29fa46b222f3049d82b952e2,2024-10-01T16:18:10.680000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 -CVE-2024-45071,0,0,23cd0137f952a12e279e8e33fc8f7a1872d2d781478e3b740be4389f315fcaa4,2024-10-16T17:15:16.487000 -CVE-2024-45072,0,0,2f311af1f15ab4914837e95c42091100e9685b5411b53810ff15d2fcef697acc,2024-10-16T17:15:16.750000 +CVE-2024-45071,0,1,9a6dffd34b42f2030e358f6dd7ad9f1d94d4f005e3072722a3cb42e347224645,2024-10-18T12:53:04.627000 +CVE-2024-45072,0,1,7943b785a2da7e5438439da737bde75b75b32fd8ba8a4ba9eaba4055755b341c,2024-10-18T12:53:04.627000 CVE-2024-45073,0,0,e6a4e9e5d55d10a2984ecf959bd3646673680e37d22c364c1249e301fdb07f55,2024-10-04T13:51:25.567000 CVE-2024-45074,0,0,410d152e2b1ce535bb792f747dab438d63c99a6f6d04953bcc95f60bfd46ac78,2024-09-06T16:45:32.767000 CVE-2024-45075,0,0,72725abf8f0bda55b265624cd19c42b954d17e9672b7c19951b6fe04531ef578,2024-09-06T16:45:12.980000 @@ -260875,7 +260875,7 @@ CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08e CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 CVE-2024-45489,0,0,6ea1c310f6732949eac7ded3c08e0687f1be76a01c2bdfe6c41533999acd86e8,2024-09-26T13:32:55.343000 CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde15796,2024-07-03T02:07:44.057000 -CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000 +CVE-2024-45490,0,1,06cbc4e334c584d891c3ace1d9b2615373ad498dcf0899c8b0a88252c7eed788,2024-10-18T12:24:23.597000 CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 CVE-2024-45496,0,0,cb4145e26d358c15cb434585f9bcb20449ce473167aa6d60e18e039ff47cf458,2024-09-20T12:31:20.110000 @@ -260956,7 +260956,7 @@ CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c10 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-45710,0,0,234712dc1cb8c294f7ebd4de7fbb4d31c5854b6196f2020417fa62c0a52a2a3c,2024-10-17T20:18:04.277000 CVE-2024-45711,0,0,c76ce0fb0b280add38abeec887b12ed00e8aa69fc19718287cdb1c80f84d6742,2024-10-17T20:17:29.207000 -CVE-2024-45713,0,0,73d370cf3c5f1b6458f547b408d00ac34dfd405116e79a0b7e6a15b32bb06e53,2024-10-17T11:15:10.850000 +CVE-2024-45713,0,1,b322f2bac93307c369424f189efe14df580c4c3f7a294baca589b00a18f25c23,2024-10-18T12:52:33.507000 CVE-2024-45714,0,0,05df79781d57cb807340d58e5fdb395e7ff3d312e0246779106a95480e9b6b3d,2024-10-16T16:38:14.557000 CVE-2024-45715,0,0,6eeb77978f0221f2d797c4955663560bb5f3c3e2030f7e99dea779f5ed5a3be9,2024-10-16T16:38:14.557000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 @@ -260984,8 +260984,8 @@ CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4 CVE-2024-45754,0,0,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000 CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 -CVE-2024-45766,0,0,e2bca96e2749d63d15a7962d3517764bd293381cc51bfe951a91c4a3a8383b9e,2024-10-17T02:15:02.273000 -CVE-2024-45767,0,0,b2ccf96c019b52609f29b54cdbdcd14b494737e386de4bd1e06461092965b867,2024-10-17T02:15:02.587000 +CVE-2024-45766,0,1,1ac6d864cfa84a9455e326aaa02a3b21331a9d91fce801a33cf0dbf2664ff28d,2024-10-18T12:53:04.627000 +CVE-2024-45767,0,1,eb5f868ea4691213c1364b02500bffd0f089d1b21eaacec7a6a56a798a8a0e81,2024-10-18T12:53:04.627000 CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b36f,2024-09-20T12:30:17.483000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 CVE-2024-45770,0,0,e98fab17d907c24beb2a28773665764214c6145643120e7f9304697540dec889,2024-09-20T12:30:17.483000 @@ -261001,9 +261001,9 @@ CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac17822 CVE-2024-45790,0,0,339d5c59c4b08184225ef02e77057a5607db1e407fbacc8325ce6de4811d4a59,2024-09-18T18:38:04.393000 CVE-2024-45792,0,0,5abb7de999f910eaa61796ecbea33f574a65653e2aa062ee4c5c2e229e356bd5,2024-10-04T13:51:25.567000 CVE-2024-45793,0,0,9df195d476b9f18fe89dd15d9de75cbf87671a956c83113b39ce1c0cbc87094f,2024-09-26T13:32:55.343000 -CVE-2024-45795,0,0,7f2b2bba09914a193d06ae7cc31a277d11f4db6bc0af3a322ac2c67e50856100,2024-10-16T19:15:26.660000 -CVE-2024-45796,0,0,38453092b0c3d6269258fb97464079cdc0bb1fb11ac62b3eea65f9391fffc169,2024-10-16T19:15:26.923000 -CVE-2024-45797,0,0,bfeb319b0be9eb20cbdca1f21b11e65a8f6d9b5f57d4808f7de637d932e31cb9,2024-10-16T19:15:27.177000 +CVE-2024-45795,0,1,277cb478be920cf4f8c0f9ff7efe876bbe4db3988f1d35642c134b9ecd7e3f4d,2024-10-18T12:53:04.627000 +CVE-2024-45796,0,1,e89641bda5fbfe60afedf446c3403f37050dd92b2fe8e122c9341b437f687815,2024-10-18T12:53:04.627000 +CVE-2024-45797,0,1,049f9559c334598f19954ea514f0547d1d0f8c6b3863a15a6b9d40d7227d9224,2024-10-18T12:53:04.627000 CVE-2024-45798,0,0,36d6c14bd6da02b6f563e24f34a8e0ae70f5e9226b87bf40201ee0b5fcb96dec,2024-09-20T12:30:51.220000 CVE-2024-45799,0,0,57236f37d51cb52dc4abff4e8ae9968f58089f5668de4fddcdb24ddcded04f03,2024-09-20T12:31:20.110000 CVE-2024-4580,0,0,f99138bfd0684bd0d747f9e33cce7b8336876269ba637f66c2865bb254a7b704,2024-05-16T13:03:05.353000 @@ -261140,8 +261140,8 @@ CVE-2024-4618,0,0,c37ae26f2e1f44a703054cee4816ca3bf0ad845eefa4a632c5bbef4a4e755f CVE-2024-4619,0,0,4a40c989d02466215a13e8ebc90eedd665aa01db8dc0a625ac187e77f54f90ad,2024-05-21T12:37:59.687000 CVE-2024-4620,0,0,1935a4a456c9356aa20baa9af9ee846c5d3912db31523d71d257746ce19dd702,2024-07-12T16:12:03.980000 CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa869820e,2024-07-03T02:07:50.963000 -CVE-2024-46212,0,0,e079cd6b7fa77cb08df2d7bd0da13e2663c083e54f99887c172146bd83e83ca3,2024-10-17T17:35:07.863000 -CVE-2024-46213,0,0,a501c3b2c8056233359b7218257a63005a614e45d02f4e62411581a86a5b26a8,2024-10-17T17:35:08.640000 +CVE-2024-46212,0,1,3f14e03747e94fe86e42f7c8439579b16d4507788b94c0bda29c8678b6cd6b84,2024-10-18T12:53:04.627000 +CVE-2024-46213,0,1,27e374a93d05489cae0dc7b637416d222349a9ff3127ca1d693830a2cb84ab45,2024-10-18T12:53:04.627000 CVE-2024-46215,0,0,d9c9b41b37ebb8d2c46b9303b2f662f08cd28b45185e47d3a9c15d51a3370a31,2024-10-15T21:35:30.590000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 @@ -261283,8 +261283,8 @@ CVE-2024-46597,0,0,8f236358fa12b20d7d532e9a104df6fc7e0ce7ec4a140308bc23ebcdc1614 CVE-2024-46598,0,0,3f997be93c6377cc697c394dfc90ddad6cd8938191b35fea7934308cfcf432e0,2024-09-24T16:37:39.833000 CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000 CVE-2024-46600,0,0,cae524fca9cb69012594d951fa8090d3fe8d1cfa0f217e7dac4acb986038e2d7,2024-09-26T13:32:02.803000 -CVE-2024-46605,0,0,ce2dab57c9c2c2a5dbadca8e13c7c48c362b8d13253740409e0aec0f8c212299,2024-10-16T20:35:13.927000 -CVE-2024-46606,0,0,5eca249a102142ebc3f5e7107a104af85beeb9cf6a9c0993583b9e11d05dc5f2,2024-10-17T14:35:23.400000 +CVE-2024-46605,0,1,cd741604be9f1b11329c686e775aac657866e26a3c66d9c2707d0c286f14fb5d,2024-10-18T12:53:04.627000 +CVE-2024-46606,0,1,8a59186f6e37a35a98df2212faf251342d973be335e26a6de0511db920fb3694,2024-10-18T12:53:04.627000 CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000 CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000 CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000 @@ -261536,12 +261536,12 @@ CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257 CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 -CVE-2024-46897,0,0,7d9cea7454131789173c46fc3fb81e163c4d39a4065c1ca02ed74a5c4b3ea04a,2024-10-18T06:15:04.813000 +CVE-2024-46897,0,1,2a6c3f95cfcb0b32e82de00bef67f1ceb1746bdd0d3211c89edff06da9d72b65,2024-10-18T12:52:33.507000 CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000 -CVE-2024-4690,0,0,ba9c977bc56dcd4269dbaff2580f17cc2e97b152d329abc3774c21d5c0a09243,2024-10-16T17:15:17.740000 +CVE-2024-4690,0,1,8eb966e7da158512dac8730a855a36292973d8f996e8b4083d5812fd6f544439,2024-10-18T12:53:04.627000 CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000 CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000 -CVE-2024-4692,0,0,2cf7920b328c305bc2eefd1a63ad23deb0031fead03ef1442059ff5d6ac8857f,2024-10-16T17:15:17.873000 +CVE-2024-4692,0,1,8eff7521b178b42a5db567195937d3c2fd3aaa1433f28da61b2714437c8f6b91,2024-10-18T12:53:04.627000 CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000 CVE-2024-46934,0,0,39cd5d62e62d306b30cc42f4b07a71f98f69814db0958da38caca7a2aa0c372d,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,666c6a587a73311e054ad4d061f64579544880375cf82da7a9fb41d79c96b125,2024-09-26T17:39:33.123000 @@ -261678,8 +261678,8 @@ CVE-2024-47182,0,0,e5cdb75305d71a5fc3653b4e9f8414538656f5f17a6a2cce9e83d34199d18 CVE-2024-47183,0,0,0b76031324ee2fb120db4824ba5dbb2c20e3fad1aa53ab61ba1485112276da67,2024-10-07T17:48:28.117000 CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000 CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 -CVE-2024-47187,0,0,65cb98609c05a673b2ae445e27da71ac0342350704f4bc5a7adf09735e0292e9,2024-10-16T19:15:27.407000 -CVE-2024-47188,0,0,5d83036cc4ce25c59a1d4fa4fd71a70c8aa237ff50b0cc57bf3f901f4093143b,2024-10-16T19:15:27.670000 +CVE-2024-47187,0,1,e63561da77cd10fd8afade527df9fc9e05b27322e00e12bc3fe44e00592b51bb,2024-10-18T12:53:04.627000 +CVE-2024-47188,0,1,50a8d5f2a8bf42ebf2938618f00d6ca5b8da00d037eab9a7a01da2b464854dcd,2024-10-18T12:53:04.627000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47191,0,0,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000 CVE-2024-47194,0,0,0afa0b09ca6b7bbd6bd860b01b5c9153eec47be962883f1807d6c455d470088c,2024-10-16T18:15:04.043000 @@ -261700,6 +261700,7 @@ CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c8 CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000 CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000 CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb63,2024-06-04T19:20:47.830000 +CVE-2024-47240,1,1,6f25f158726aab52a97b2692120705842adb60413873377b7252be8cf1d4187a,2024-10-18T12:52:33.507000 CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000 CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000 CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000 @@ -261718,14 +261719,14 @@ CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392 CVE-2024-47300,0,0,e5260e77ae485ce7444a2bca3985a3a48c649071ed7d73d1439a6a493c414714,2024-10-07T17:47:48.410000 CVE-2024-47301,0,0,ac90c43742dd943ad9767aa191ce247a301b3e33f4d7e439daf4f0d3b09b6647,2024-10-07T17:47:48.410000 CVE-2024-47303,0,0,bf8d75e01dd1aa85338666dfdc484b4a62ecc62745a2e39a6913339b9fa92fed,2024-10-02T19:00:24.750000 -CVE-2024-47304,0,0,fde834a627c818bcd3b5afac3349eba2f027b163b0254b25d08813cc6312f390,2024-10-17T18:15:07.400000 +CVE-2024-47304,0,1,7406b4c650ebd707369265ef4b8f5066b713c8b353b6dde674c1a19490c8893f,2024-10-18T12:52:33.507000 CVE-2024-47305,0,0,7c018d03a71f28200e41a87d693293b1e365b3b52710d7dc9c8bc548afdcc447,2024-10-02T16:35:40.077000 CVE-2024-47306,0,0,eaf32b36bbd3f14919162085488bb2ae7d4855fa0c613850748fc5c60d229a8c,2024-10-07T17:47:48.410000 CVE-2024-47307,0,0,487f26513afaa1868dd378174c9d3f7237a2ae92bed0d1dfde1647ea1d3fe506,2024-10-07T17:47:48.410000 CVE-2024-47309,0,0,21dcfe3c0636d6932b8735e4db0f75a20433cb361cb491f225d3cc92dcd30979,2024-10-07T17:48:28.117000 CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000 CVE-2024-47310,0,0,8663484ee2c5b72222f0e4f9365fdd142731c8f04d18b42bdd48041cae516b98,2024-10-07T17:47:48.410000 -CVE-2024-47312,0,0,f2b948b5781154eb9808ed963f1597dacd09272add6fded74af3c38e21529f92,2024-10-17T18:15:07.660000 +CVE-2024-47312,0,1,21a9fd1102fbd401b51ac00c291ad86e50be8ec9dc455fe13fa5a7d20b8d0b36,2024-10-18T12:52:33.507000 CVE-2024-47313,0,0,bc2ecdde437531f392b35f4f3c15088fd858be1b53245b6e08dfe84901b6ce9a,2024-10-07T17:47:48.410000 CVE-2024-47315,0,0,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000 CVE-2024-47316,0,0,4bb4520f5213b3c8bde177c73e6a9c0ba6ad3dd3b6425b0d46c411f50cc87fcb,2024-10-07T17:48:28.117000 @@ -261800,7 +261801,7 @@ CVE-2024-47386,0,0,8cb1861aa24862dc38fce1bb1f3d0d3efef1813cc377d83faa4f21f06229f CVE-2024-47387,0,0,08a3b98e23e8185d509837019c1ef3a9c139ede5ad875ee88b25d1df1e39d80b,2024-10-07T17:47:48.410000 CVE-2024-47388,0,0,dc31869c2fc889c08896c96961f94aea423bc557ea63d4c8cae8b1b120c02193,2024-10-07T17:47:48.410000 CVE-2024-47389,0,0,1d36b4f30f3636f2e5fbc982d1d69e8709dc3961752cb7621f1d6a2dcf8cb49d,2024-10-07T17:47:48.410000 -CVE-2024-4739,0,0,974ac460a6d9caf8bb20b66db573a10a248e1699eceb947e3f6032627dd40b14,2024-10-18T09:15:03.710000 +CVE-2024-4739,0,1,36f5692a9e632370e0132b315e2bbdb55ee579368c17684c49edd2378043af02,2024-10-18T12:52:33.507000 CVE-2024-47390,0,0,609899d039b2d1f3f491074ef439bed613cbd5e5aeb5a6390f43ce3caca59f92,2024-10-07T17:47:48.410000 CVE-2024-47391,0,0,0ec9a4f4449faf31f9cfbe6055bdfe88e4acf6b8a151d36abdb7471992d61099,2024-10-07T17:47:48.410000 CVE-2024-47392,0,0,c1e57d415365b830226dbe3f308a9b5009db4e502bc21e205a9f212a29a477c4,2024-10-07T17:47:48.410000 @@ -261808,7 +261809,7 @@ CVE-2024-47393,0,0,58cf853d8f2d02cbccb461c82596ff01f0cdfcc3c36878d036a5e6eb40f01 CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f7e9,2024-10-07T17:47:48.410000 CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000 -CVE-2024-4740,0,0,ede01aad4afbe780922daf80612a8cfeb520b2e48d6fc47290de4207bccc3945,2024-10-18T09:15:04.237000 +CVE-2024-4740,0,1,9bfa412a1edac779e9560d980f52b48c2450312e7626b39c7e860ebb0045fddc,2024-10-18T12:52:33.507000 CVE-2024-47410,0,0,42b59896d371aa29c83e01a1ce08752b8288a889a8db3630a5c6ba7966f3731c,2024-10-10T18:26:44.857000 CVE-2024-47411,0,0,5875ac529772763bf76adfec6337ced119d16dc7bedac06df0488c853721b19e,2024-10-10T18:26:54.153000 CVE-2024-47412,0,0,391d79d5da558802eae8e86cf3dd3b740642f9484cd58363cf9ca936b2f15d9d,2024-10-10T18:27:02.867000 @@ -261829,13 +261830,13 @@ CVE-2024-47425,0,0,a447467008af7e9fe63ac1273d714471d0526dff10fa44ecdd8be176a733c CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 -CVE-2024-47459,0,0,3ae10c2a009d579c5b7f39dff89133aa65f193d162511abffb6ffe94979b7d15,2024-10-17T15:15:13.400000 +CVE-2024-47459,0,1,0b1d286cc18504287dd532d658d2383a7255013ccc216b35a3e0d03bccac4a93,2024-10-18T12:52:33.507000 CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000 CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000 CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000 -CVE-2024-47485,0,0,1ae5666bc23ffce37bdc4f5fe0ac2cfff937666ade6d2849917f165fb593bfbf,2024-10-18T09:15:03.093000 -CVE-2024-47486,0,0,9d4c7dda20b139272f6376c967467936d36db81b81cb124a1ed6a4175e610dca,2024-10-18T09:15:03.217000 -CVE-2024-47487,0,0,d25c874d3f980d84ad2a1424452ad12468a4cd2e7c7abaea0e6e86536a780b08,2024-10-18T09:15:03.400000 +CVE-2024-47485,0,1,ad983ecf2d27a8882140a86c2b8f76909d923038932c9e4c487291a554eaf4cc,2024-10-18T12:52:33.507000 +CVE-2024-47486,0,1,ebb52a6e58b7502e54c2d96f1f22f907d8d887fc6268cf25a428f304ce5cdeb2,2024-10-18T12:52:33.507000 +CVE-2024-47487,0,1,ce7934a5efbdf258c84a38c313f294ce5a0f986aa218002120ff84beedef1ca9,2024-10-18T12:52:33.507000 CVE-2024-47489,0,0,b60e5447ef49080d8bcb541a004c5061338369ecebcb53ef8b0c02387b615511,2024-10-15T12:58:51.050000 CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000 CVE-2024-47490,0,0,e3601f25126ea5528355c875251d16d0b06252aacf2c95cdc691bd121e53f290,2024-10-15T12:58:51.050000 @@ -261859,7 +261860,7 @@ CVE-2024-47508,0,0,429956ab48f11c14bf051f4f1bacba4ac8df38416461ca7db82bee8d071ff CVE-2024-47509,0,0,76ece07115d6fe55eea56c310deff86334b962222c61b334eea857efd424bcd0,2024-10-15T12:58:51.050000 CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000 CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000 -CVE-2024-47522,0,0,3fdd880817a9ec1e2154652b7d1c6d578296981e6bb27b59eafa907386bf86e9,2024-10-16T20:15:06.083000 +CVE-2024-47522,0,1,d6c93614a20f18412401d7b16d971f12d3cca15d48c0ef13225b9915d5d885f5,2024-10-18T12:53:04.627000 CVE-2024-47523,0,0,22d43e6df5f74e6749ea10e7fe6523466b29bb84b684bbdd4f0562f87b193f88,2024-10-07T19:07:30.287000 CVE-2024-47524,0,0,77296b251ba1494f06bcdfbc6ea161d149e1205d582f48b9fdc9c430ceb9a466,2024-10-04T13:50:43.727000 CVE-2024-47525,0,0,8339d8a4218b69cc82268cff155d0d4fed2713f73ada7785c822ea6568feb0cc,2024-10-07T19:08:18.707000 @@ -261990,7 +261991,7 @@ CVE-2024-47782,0,0,378aebd3accf9c3d67ee33eb38516895e49edcc53cea98d4b8c2ea1a1799f CVE-2024-47789,0,0,5cca8aa9572eb6cd0c059882137f083cb8544427e147bc3f1f0eab6346cef001,2024-10-14T11:15:11.797000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 CVE-2024-47790,0,0,d4701041e3b7826b48d6d13bc4c86004b58b4b8b272120def31051056a8f0260,2024-10-14T11:15:11.930000 -CVE-2024-47793,0,0,66693a6608ff5a9be97d0b9f24c311c0d1cad0898dd94d84370626d393c3d7c7,2024-10-18T06:15:05.230000 +CVE-2024-47793,0,1,2634e004bbe7f6eaec12ea7aebe2771258bff5340889512023f5639548b538ea,2024-10-18T12:52:33.507000 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 CVE-2024-47803,0,0,e1d97b5f24ae71b6bd2435048764e12dedac3de98ce838d43be96ca9d7087e5f,2024-10-04T13:50:43.727000 CVE-2024-47804,0,0,a4af3b64d3fcfe309769ac07755d247ecf7636977262b35234365d56289d52aa,2024-10-04T13:50:43.727000 @@ -262016,7 +262017,7 @@ CVE-2024-47830,0,0,457ed410238dd49134235c9291fcb215f555d7bf33b38d5e70e7cf82b4377 CVE-2024-47831,0,0,8378040ad1670275264457c73829ff18d4decae710e794487e001c672444fba8,2024-10-15T12:57:46.880000 CVE-2024-47832,0,0,2db718b13b3751bc3ef92e2930bbfe31f27f0a24beb6f2f6f579c1ed94f36d1a,2024-10-10T12:51:56.987000 CVE-2024-47833,0,0,6fec3debcf8c22e7cca5edd580a7219cef06b49b718a5106f83d6e8ff52a9663,2024-10-16T16:33:34.493000 -CVE-2024-47836,0,0,b02d3e91f06d58665de123d3af0debabd27fa7bfbafc8a4245978409bf654021,2024-10-16T20:15:06.350000 +CVE-2024-47836,0,1,9820902057ffe0b868812f79151bb5dbded2f7cf0e121917a52aed0157f4d3b8,2024-10-18T12:53:04.627000 CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 CVE-2024-47840,0,0,c2ff7b850c32ab1f0cd524b652cd23069ad0261af0dda33ffcd5ed7e8a17367a,2024-10-16T16:44:54.440000 CVE-2024-47841,0,0,5965eb4de1da8f2a0dd0895a3f88b849e9e6237b2cba12893d6c98b9d53e6e0f,2024-10-16T16:34:31.173000 @@ -262044,9 +262045,9 @@ CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92b CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000 CVE-2024-47885,0,0,0d40ba494c86913544c4c9553c55befe8904b360cb2214c55ae6a6aeadb78d12,2024-10-15T12:57:46.880000 -CVE-2024-47887,0,0,96d0dd568a8a49b3d7a4289f6619d1534c318426b5d7e86f721569f8b68b052d,2024-10-16T21:15:13.053000 -CVE-2024-47888,0,0,2aee8cc080352d2505fc5c075253ff58615baa7861ff37351e279238a0d599a8,2024-10-16T21:15:13.180000 -CVE-2024-47889,0,0,98b6da2d6477ff6b4a2a697aff1dbe5afaaf55dbd41145a6f93e75c7e93a8511,2024-10-16T21:15:13.320000 +CVE-2024-47887,0,1,a738abaa50c0f4cc119f2ab1db4d555ac635e57265d1892adcc800cfdded0011,2024-10-18T12:53:04.627000 +CVE-2024-47888,0,1,1ed854ade470bc163ad8c76031be0255e632797f8163938f76c7a31de7a786cb,2024-10-18T12:53:04.627000 +CVE-2024-47889,0,1,661bf5d3df9343f9d9841050fa7811eba61ad27c7b6cfb90f97b1fd9293eaac0,2024-10-18T12:53:04.627000 CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 @@ -262086,33 +262087,33 @@ CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef977 CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000 CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000 CVE-2024-48020,0,0,dcbd5af80fa4e0ff77a2481b211c24b4aca48d4b01a6d0de815360ac1c5ff406,2024-10-15T12:57:46.880000 -CVE-2024-48021,0,0,fae21041619741947cf99a443700f54a7ad1ba2bb663fe73d45937b1439f3bac,2024-10-17T13:15:12.260000 -CVE-2024-48022,0,0,ac586cf54c90f0601307cf9c1cfe678677cce2fd600d77160a18b091cdb4f96b,2024-10-17T13:15:12.513000 -CVE-2024-48023,0,0,3cde7566998f80024c1924c7c90415210cac9f50db701b35e3dd906f9a8357fd,2024-10-17T13:15:12.790000 -CVE-2024-48024,0,0,4f601d407290d85f78e34d82cc71b4261f743c6dc0a8f4bb7b5a34d7ff33df17,2024-10-17T12:15:02.230000 -CVE-2024-48025,0,0,3ff1a2bf216d5d7e6a3d596c65578f7e86038600f333d14ec80635a644592e32,2024-10-17T13:15:13.017000 +CVE-2024-48021,0,1,d91861579c30ceb9f080adcdf06bfa7cdd57f4b747fffd227caac318ccaeeeea,2024-10-18T12:52:33.507000 +CVE-2024-48022,0,1,b4175bbd9dc213c8eebde24e684b6da643869f3413bffb0c98b51bceac11ee41,2024-10-18T12:52:33.507000 +CVE-2024-48023,0,1,7606c01748b514c7af5167e4d50730634905faa7a564d1146f302f334279b213,2024-10-18T12:52:33.507000 +CVE-2024-48024,0,1,3e5ef650915dc08f1cbeceb47bfcb05ebfb5e05206181fb5517d350fcf3db590,2024-10-18T12:52:33.507000 +CVE-2024-48025,0,1,d82726b9469f51ddb2a9df717667577a65353916572c3a972202c2e9b20b9a14,2024-10-18T12:52:33.507000 CVE-2024-48026,0,0,3c2bb88a55c60e17b5998405c29f47ffbdc9b180f9180ef70c87bbb411385b63,2024-10-16T16:38:14.557000 CVE-2024-48027,0,0,bf61aef1b4b3ee3680cd0489e8cafb96be0e20eb1a0c26254d11632c0391d4c4,2024-10-16T16:38:14.557000 CVE-2024-48028,0,0,70e75ead9267ebb77fec716d49af1ac568d9e786fae6ab0fb210d210ad1411a2,2024-10-16T16:38:14.557000 CVE-2024-48029,0,0,e2057f5a9d399e7f4096e73339b7b91540247933d607ca1f14f26dee8c050343,2024-10-16T16:38:14.557000 CVE-2024-4803,0,0,9495051e0864e5e76c8973a987e9e6eb1b1cb49bec9a5ab21c9648610125fd4d,2024-06-04T19:20:50.353000 CVE-2024-48030,0,0,d2093f554efe94949369ea32c1b62693c34dc11165efe9f0ac1376df958a0274,2024-10-16T16:38:14.557000 -CVE-2024-48031,0,0,a74fc112c11d14249f2c51d38c7012d9234ca5575813f47f5a11bdf4ca077099,2024-10-17T13:15:13.240000 -CVE-2024-48032,0,0,73605aacb0f538235e608b4194cac74c0247326fb31b917d60c846dd2a67b194,2024-10-17T13:15:13.460000 +CVE-2024-48031,0,1,3ee01e22f269e21a96823bd9bcec36567140403a5082bde6e1597fb6268d179c,2024-10-18T12:52:33.507000 +CVE-2024-48032,0,1,92e1368c161f45b5a86e429306c8963eaf241c22633e36f2aca105bc8a933ea6,2024-10-18T12:52:33.507000 CVE-2024-48033,0,0,8f5c8e0edb7dcfae09a626cf6444750e299103bc74d1c2eb25573eea6cddec47,2024-10-15T12:57:46.880000 CVE-2024-48034,0,0,3c6253bf76357837e82d74b10418d02e10751ff3b719885e87b9afdc07d5b689,2024-10-16T16:38:14.557000 CVE-2024-48035,0,0,34b65d3473704d69375474d4e446271e1160e956f1c5bcc3256b28f1386c1f65,2024-10-16T16:38:14.557000 -CVE-2024-48036,0,0,5b5e72fbb21219c2d718ef318c67b555e544c00883af5e2f167d414216364415,2024-10-17T13:15:13.677000 -CVE-2024-48037,0,0,7fb1fb4812f5f18dc8294a4560ee88499b51d361e1d658805d1e3688265723d2,2024-10-17T13:15:13.927000 -CVE-2024-48038,0,0,f6fce07e505eeb461b84308f28dcc56f53364babccb2c5872ba7bf2dcf15570f,2024-10-17T12:15:02.457000 +CVE-2024-48036,0,1,1335eb269b2e09be86e757e41f1f9eb0f4166fc97d81e03e41272d1b8793a6d0,2024-10-18T12:52:33.507000 +CVE-2024-48037,0,1,af7f6d150f03a9ea7d06eae0cb148af2070972458b6f26fc03a935e4b80ee230,2024-10-18T12:52:33.507000 +CVE-2024-48038,0,1,c6e31c7f591821e9f6b478f515431fcf0cbc068549b1cf9f8fd564dc7ab1be57,2024-10-18T12:52:33.507000 CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000 CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000 CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000 CVE-2024-48042,0,0,1d99a07b4cb191da550409fc88c9e5806251fda5dee41ab744024131ce4135b3,2024-10-16T16:38:14.557000 -CVE-2024-48043,0,0,734e8941a439cdbab27a817f585c00afb63bf2eccfb8019aa7cf8d0969ad1c59,2024-10-17T12:15:02.677000 -CVE-2024-48046,0,0,6a234afcfffbcfc282a869548e4ae43282190b05ccee2513fcf29b4b2b396f10,2024-10-17T13:15:14.170000 -CVE-2024-48047,0,0,765b366d02fa99ba1a7c81b60d28cee44d721a9534c32be3845bc29dae2d9810,2024-10-17T12:15:02.880000 -CVE-2024-48048,0,0,e32b705f1d5032fc04ff2516d7f72851d3d643c00333e715a0545dac2be012d1,2024-10-17T13:15:14.390000 +CVE-2024-48043,0,1,d7022e96ce1ce67c4f59e004a095bf6b87f052300567a30fb9f9fb2d5938ddb4,2024-10-18T12:52:33.507000 +CVE-2024-48046,0,1,423091e4b5e8d6a105e8bdc778f5cf951b1df2d4a2635710b325a5130f1d15ea,2024-10-18T12:52:33.507000 +CVE-2024-48047,0,1,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c081f8,2024-10-18T12:52:33.507000 +CVE-2024-48048,0,1,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 @@ -262132,9 +262133,9 @@ CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb CVE-2024-48168,0,0,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000 CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000 -CVE-2024-48180,0,0,cb6aa3b576f6eb96b2eaf058ee8d5044b01903a7a0221600af5d9f6c48a5b423,2024-10-17T17:35:08.990000 +CVE-2024-48180,0,1,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f40ed,2024-10-18T12:53:04.627000 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 -CVE-2024-48192,0,0,f16c1f7cce3af1937da851e7e91077230a645a19a4277584cb3c0181b6144884,2024-10-17T18:35:11.500000 +CVE-2024-48192,0,1,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 @@ -262183,17 +262184,17 @@ CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33ba CVE-2024-48622,0,0,4cd7a4b67551e1c7266b414b834e1956aa3a51a75d895e45be98bc89b06ddf81,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,d049076f927dcf309023eb7c4a1c5680d5c48a2a4bd2097c596ebfe8af0f8628,2024-10-16T16:38:43.170000 CVE-2024-48624,0,0,7930a7e9130e1e7a19bdab85594b148d5dff260ece6a3fc51a1c5ffe08e0ec26,2024-10-16T16:38:43.170000 -CVE-2024-48629,0,0,22e5b49e6ea059f580c38c1004651a59f4e98e4829bbb4997ebe0c3a6f9cce18,2024-10-17T19:35:15.163000 +CVE-2024-48629,0,1,11d60dbd049fecc8ad9deb873b6122f366309f99f2cd271c06b810080e244a54,2024-10-18T12:52:33.507000 CVE-2024-4863,0,0,a7452bc03047df9dfe2f17de61b10d1bcd60cf90a2b2dad4486f933b8b326310,2024-06-17T12:42:04.623000 -CVE-2024-48630,0,0,820b86d225e3da668d68f5eafc2d8bdfc6868d80c9feafaedd0974f1e9c117ef,2024-10-17T19:35:16.330000 -CVE-2024-48631,0,0,e9f59e18d69bc714629bd69805583ca67c7e7a0b0593eee67fd73581e0c96a2b,2024-10-17T19:35:17.213000 -CVE-2024-48632,0,0,0c53d15adcbb6b6a4d0b23aa173db8d2b093b651831c6c97dd43a86b91aff59e,2024-10-17T19:35:18.050000 -CVE-2024-48633,0,0,7a0b101ab7ae0f0e7cbdfa36eb0ae29a142f945152bd96ff9503b715500df068,2024-10-17T19:35:18.907000 -CVE-2024-48634,0,0,6c81cbd28ff733330056c5fd06f5388e8e6a9ebd3b2573e8a9cdd3d5c83a8d35,2024-10-17T19:35:19.700000 -CVE-2024-48635,0,0,f7ab1add7bfd4404a9d817fc7b270b472a55f092643762e07e9ee78a2b4f90bf,2024-10-17T19:35:20.497000 -CVE-2024-48636,0,0,547c368b5ae195a9edb8e2bb74f82142739c700d8b832881c493c6bf87bdb858,2024-10-17T19:35:21.287000 -CVE-2024-48637,0,0,3d50036a04b2463c06ea6a176e1673c7630f70a72abafcd88edac5ad623768a4,2024-10-17T19:35:22.077000 -CVE-2024-48638,0,0,e394f8f862f34b0ad3a52265d13c546b4271b8937e57b57076c380de855275d2,2024-10-17T19:35:22.947000 +CVE-2024-48630,0,1,0f71d59a25d5c974d5a92cba6bc7140bc59d3c8e7826c10481221bc9732a2c37,2024-10-18T12:52:33.507000 +CVE-2024-48631,0,1,51d879a12ebd57f649ab6f5ee66133a0e9127c47cd907cef91e63be986baa9b1,2024-10-18T12:52:33.507000 +CVE-2024-48632,0,1,0cfc6c0feeeac3d2529dad7aac205dae2e790312e0bf10c858d7fcacbaa7a5bb,2024-10-18T12:52:33.507000 +CVE-2024-48633,0,1,293ad34596ca3cee3bacd4409ef0918a99253d1b2a75b471fc044336aefc64ef,2024-10-18T12:52:33.507000 +CVE-2024-48634,0,1,88a0ec47224d2be5c2f795c76acdb13a1a8f47e2195234ca1b5b87cab3084bd5,2024-10-18T12:52:33.507000 +CVE-2024-48635,0,1,70acc62db2773972323caa582098c14d2ba0630ccd28542fd3671e2f06f9a680,2024-10-18T12:52:33.507000 +CVE-2024-48636,0,1,a1b3046a0d6b06507f3010f4369f5a0d6853a8c7798cca6c53bc4bbbc77e9757,2024-10-18T12:52:33.507000 +CVE-2024-48637,0,1,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07e4e,2024-10-18T12:52:33.507000 +CVE-2024-48638,0,1,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 @@ -262209,7 +262210,7 @@ CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d8 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48744,0,0,8e19cb42cde15715851c57e1c66000fdbf20886f6db4ceeb1bd088f8a6da228c,2024-10-16T18:35:07.013000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 -CVE-2024-48758,0,0,01449c99d68d12ad38291b296187c22c1d9fbb194c61045f7b947cf02ca3032b,2024-10-17T17:35:09.817000 +CVE-2024-48758,0,1,a0017ffb6fab9626ea62b98de0c6903a7dbb8c74f73f1e588de68b4bc17a833d,2024-10-18T12:53:04.627000 CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000 CVE-2024-48768,0,0,91e2c6ddcec0eefa58d2f68380e387364241aaf16f381d6cb6f91314ddf06c84,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,111cb6e3b59af6f41642c6c2c5b8c53bc420797d62f026a9cd65018ae24e939c,2024-10-15T19:35:39.423000 @@ -262264,10 +262265,10 @@ CVE-2024-48911,0,0,f147f0790cf653449e8f662255582c7c922d3f40a3d15e4b98d08b1e5fd9c CVE-2024-48913,0,0,06d6a212c655b7ac1bbc6f5a3509e81cf89d4f1d83017b87d6e9303af3084bb1,2024-10-16T16:38:43.170000 CVE-2024-48914,0,0,8775ce8f63d45f4e21be0399438c25117df9f166b6335c0adfec50056398fb57,2024-10-16T16:38:43.170000 CVE-2024-48915,0,0,53434c02f8cd9e61d046160183bd56a99da2a89b0bd423c79e06c9bddd2f90b1,2024-10-16T16:38:43.170000 -CVE-2024-48918,0,0,83e2bd9ebcecad4a2651c905f471b8729ea3e219151f83a14b1e27ec710b9795,2024-10-16T21:15:13.650000 +CVE-2024-48918,0,1,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923776,2024-10-18T12:53:04.627000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 -CVE-2024-48920,0,0,2bdf23b44c202de5b801cef1b759b8d86ffa5981eafdc5886aaa1afe25f2fe2b,2024-10-17T15:15:13.603000 -CVE-2024-48924,0,0,2ab8966110cd8d67bd8ab4e5a4d3af377514372be1aa05d1f552af31b1c45c13,2024-10-17T21:15:14.070000 +CVE-2024-48920,0,1,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 +CVE-2024-48924,0,1,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000 @@ -262288,7 +262289,7 @@ CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b3544 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 CVE-2024-4902,0,0,7f8b77ed84307cdcb60cae6a3466b6bcba2b973c54c448794e132a0751a1718b,2024-06-07T14:56:05.647000 -CVE-2024-49023,0,0,0c74479c51af1a8becdca36faa9385359736b4c474aabc12bf79b0fc16690199,2024-10-18T01:15:40.747000 +CVE-2024-49023,0,1,717d9fae3802e75e8fcc3ff67a6a33e337246d41e325763b35b4f0ec67cc45aa,2024-10-18T12:52:33.507000 CVE-2024-4903,0,0,9834633a0ed5c23d729720f750c23f97a9d35acd2a8ef750805e2c39c4f8bfe7,2024-06-07T20:15:11.967000 CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000 CVE-2024-4905,0,0,acf7154e104fe12ce44ad2e90ccc9d1c19899bcc28d8f8bfc61002cc40187062,2024-06-04T19:20:52.480000 @@ -262312,55 +262313,55 @@ CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c6 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 CVE-2024-49216,0,0,f7822fbf9461c3133fc76f27f463206d627d215af3537c5a6a8de05e31c29804,2024-10-16T16:38:14.557000 -CVE-2024-49217,0,0,32465b0ed4acf6b862e190d4b5b815d4bb318e53e94a9146d95453cce4186915,2024-10-17T18:15:08.830000 +CVE-2024-49217,0,1,d03ae3ae7bb906a5c0350c53ea3af5b288e7f6463b03cb7a32bb31d9e72767bc,2024-10-18T12:52:33.507000 CVE-2024-49218,0,0,2570ef3627c6053c9f68adc4f61c8aa26caacb3600d9f7588bad30c345e3cf58,2024-10-16T16:38:14.557000 -CVE-2024-49219,0,0,63c166039eb4b94f59c05f5a2864e5efebfdd2bea98cd8d19b4a18c5e6d6ce0a,2024-10-17T18:15:09.037000 +CVE-2024-49219,0,1,09d3d9f1ee1897da8ab96320768337e2ebf5a5a4b1a184a805a8710456b7d1ee,2024-10-18T12:52:33.507000 CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000 -CVE-2024-49220,0,0,59566ff8432ad9c65ec967920080d274b47bde7c23b0ee0d72c73bcfacaa835d,2024-10-17T18:15:09.227000 -CVE-2024-49221,0,0,b5090a82873605b31672c321e6091b1b9b817dea0ffd643c47b189f626693b13,2024-10-17T18:15:09.450000 -CVE-2024-49223,0,0,00c8581029ab8d0678cc9fd6776c8777dca6e3d6c7ae330ee4fe36c4afeba3de,2024-10-17T18:15:09.673000 -CVE-2024-49224,1,1,a8787a79a4e270dbf5f64b4112b7980a5e9e7ce81b899f010ec82e1e9453dbcb,2024-10-18T10:15:04.593000 -CVE-2024-49225,1,1,23562e3dcd2b2b77545d8ec1f35ff93b3e4022d84f77dc200fc365aea198d88e,2024-10-18T10:15:04.890000 +CVE-2024-49220,0,1,57952046433432dd8ce12274d4b26b119c0532b2f024dacb0fa79f0239abbb05,2024-10-18T12:52:33.507000 +CVE-2024-49221,0,1,923750c677c4e142fd1f1384663b07d08d89e89ab299b2af5eff54307fddfe2c,2024-10-18T12:52:33.507000 +CVE-2024-49223,0,1,0be7b22234ee156e0f2d83dfd91e4e489d5261fae900de72d373a8df8c931b94,2024-10-18T12:52:33.507000 +CVE-2024-49224,0,1,0a7a0e5ab11d10e7a081f8b1e8896e83c6c961c8b2a1ed92807e6628891963d7,2024-10-18T12:52:33.507000 +CVE-2024-49225,0,1,4c875bf9cbafe8c51011c005dbbc98d24e40cc3ab1cb295ec705278bf1c4f617,2024-10-18T12:52:33.507000 CVE-2024-49226,0,0,13883343a5a3cf2267fd79d569e3936851ed7f1c26da716189e74a87dd9a1f8e,2024-10-16T16:38:14.557000 CVE-2024-49227,0,0,665aba79cba032a2afbdf7d35b26aa59e354ac86057ab756add03642768ff246,2024-10-16T16:38:14.557000 -CVE-2024-49228,1,1,b34983ace7a1aae6d84017f9e0a503a182644fb97a4440fac2970dfc569963d6,2024-10-18T10:15:05.233000 -CVE-2024-49229,0,0,c231700b3729b2785ec00e6dc3464545d8129527913a82db0d6bca19501b8f35,2024-10-17T18:15:09.893000 +CVE-2024-49228,0,1,ffa0093dadad540f50a509499affa5eba7a57259c265416414dea29cec418485,2024-10-18T12:52:33.507000 +CVE-2024-49229,0,1,30b75199012dde4362fdef6eb936298f876a9b6a4445d757e9fd5d137e13b1b6,2024-10-18T12:52:33.507000 CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000 -CVE-2024-49230,1,1,a95fde2b9af67c256e594c0fc462f1afb5d267a8beef7796fc608f90695ed2c3,2024-10-18T10:15:05.533000 -CVE-2024-49231,1,1,0c1f40c20c6ef974dd8028dbba01c8913a2dcf887d3789e2f940e02f43e1c491,2024-10-18T10:15:05.817000 -CVE-2024-49232,1,1,fe2302c26e45b9343ea3e3af4446784faa73449c9504428b405fabd9cff75352,2024-10-18T10:15:06.143000 -CVE-2024-49233,1,1,b501de169bdea740ab5e446a41331b0666d1424e67c927939e7535d093a2c8b5,2024-10-18T10:15:06.433000 -CVE-2024-49234,1,1,4b5bf602eff5cafa1d8c7a4417a2cd05ff4757cae06ad125ad6f73e6d6b58366,2024-10-18T10:15:06.777000 -CVE-2024-49235,0,0,806ae47fc5290f466b445e3407fc1678bb6ab063a2bf14b18a69370dbe9e7ab1,2024-10-17T18:15:10.107000 -CVE-2024-49236,1,1,78dcc86930a73326bac21e9e0725e91db76a339c7d8e34f161ab1b301e937875,2024-10-18T10:15:07.103000 -CVE-2024-49237,0,0,924304d33fb9417080fd94fd845336ba584754b177de68af139084e888b16f81,2024-10-17T18:15:10.670000 -CVE-2024-49238,1,1,607bd3867ef870e4f93309c60acabac8942da16aa72942b987ab679a7a012846,2024-10-18T10:15:07.400000 -CVE-2024-49239,1,1,39270a6fe9ef09c8a7703137a69e75f4df25dd48e64bc6402f963ab9a85f6adf,2024-10-18T10:15:07.653000 +CVE-2024-49230,0,1,fc7a6a7a831083b9c98eecbb8010a58f50f7df551fb50b4df24418a63d4789fa,2024-10-18T12:52:33.507000 +CVE-2024-49231,0,1,29df8f4b81eadb3336f3a77c3c08d02be92cafc273e55791c2bd55311849bfac,2024-10-18T12:52:33.507000 +CVE-2024-49232,0,1,12c97a1fe25c0ca353c63d28e3109f71e93f1aa02c8382d5da393ddafd85fdae,2024-10-18T12:52:33.507000 +CVE-2024-49233,0,1,562dd9741cc388a7d990cf122a9db76608dee490e9019069bd48d7295c8c1b13,2024-10-18T12:52:33.507000 +CVE-2024-49234,0,1,d1c3174ec6269ae6a2098cbdf7434658f1ce839bad40bd8a206c053b483c57f6,2024-10-18T12:52:33.507000 +CVE-2024-49235,0,1,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000 +CVE-2024-49236,0,1,f9175ddd5b00043493993cc2bbe8d4d408b8bf29ddc0f09821c75a4d0d5fed89,2024-10-18T12:52:33.507000 +CVE-2024-49237,0,1,64dcb0551ca73c40ba7dffeb043812bafa5ef4927c9ca1b4d270101db33dfadd,2024-10-18T12:52:33.507000 +CVE-2024-49238,0,1,1d5e90518314d1973218488eb787f4c9afaf77e0009379ea60d6bbf7fd5e5b3f,2024-10-18T12:52:33.507000 +CVE-2024-49239,0,1,b31c23ee9bcbe5221f250f9ee9dbd7142d31004ac40cfd09af489acaac19bd67,2024-10-18T12:52:33.507000 CVE-2024-4924,0,0,1be75affb45c8b20da2e31570d5662533bb5af7060cf2ef9bdabbaa6aefcbc3f,2024-06-13T18:36:09.013000 -CVE-2024-49240,1,1,8cce7fa836ad19c4f5d72bf4acdd989817bb56a1cb2d6cbaed0574d170067852,2024-10-18T10:15:07.937000 -CVE-2024-49241,1,1,e4802f808bcc29cbbc0488beea259e013cbbba7e5cbe08427a3506bf2545e885,2024-10-18T10:15:08.167000 +CVE-2024-49240,0,1,0c6beaa9afe4b9810f451a38d2b5c5be86ace5a23694510d5782af32543cb95d,2024-10-18T12:52:33.507000 +CVE-2024-49241,0,1,6a711d1967ff80385c8163a42d48011e3652f1e3ddaefe48e86bd53703dfc8ee,2024-10-18T12:52:33.507000 CVE-2024-49242,0,0,f6c2236908df09b243eb5f04b34016a7d391a4bdf5d7976a641bdb9eb344e89e,2024-10-16T16:38:14.557000 -CVE-2024-49243,1,1,2a28c8c957d43dbfdde737d00af08095b79ecc29c9fc16714209295ee5a30564,2024-10-18T10:15:08.450000 -CVE-2024-49244,0,0,3d15baefb645eae1748ee095cc9aa8365f6490a0d8ed13fd872b613af857a8b9,2024-10-17T18:15:11.503000 +CVE-2024-49243,0,1,4b1a7f741e6cf054fab92e99d14eff608dd56e4bfe8460eb4ee0834653621fa1,2024-10-18T12:52:33.507000 +CVE-2024-49244,0,1,b48fecbaff1a9b03923440d2dd0ef12c64c8628a3d4ea40c29e741b5ea5e7908,2024-10-18T12:52:33.507000 CVE-2024-49245,0,0,e6a792f230cfbb73bb79979025c9ba0ce9dace5f1ad8c7e9b1e04054cdece232,2024-10-16T16:38:14.557000 -CVE-2024-49246,0,0,d8a6aa3872ed68e82ed8d6d8c00c92218f7db9d9fd38a6c7827a1fc7a826d761,2024-10-17T18:15:12.123000 +CVE-2024-49246,0,1,29d95ab5e5ada47ed1ce4c5316c1ed56016d0bd62d5eaa8336ee05aabfec2d48,2024-10-18T12:52:33.507000 CVE-2024-49247,0,0,3f3ee84a63ca461f2f5448341ea64774f37ef4813adcdc83ba14dcd83630a7a5,2024-10-16T16:38:14.557000 -CVE-2024-49248,0,0,a565939230d9aca2a36bce7a803f113a228ee0125bb8cca4c8cc824820fdcb10,2024-10-17T20:15:04.777000 +CVE-2024-49248,0,1,5faff4bb312391427ded9d8a70538602237b0eda16601aaf8b69a0fc4e882c09,2024-10-18T12:52:33.507000 CVE-2024-4925,0,0,e685289dc2254f889ad5a234b3fb30d6e7f6b2466e13190ceb3e2217a8a2793e,2024-06-04T19:20:53.933000 CVE-2024-49251,0,0,480f53c0f15047d305d2699553bcbe81bef3eadd511cf29d56777664b7635b61,2024-10-16T16:38:14.557000 CVE-2024-49252,0,0,0770a0bcb738f7381f9a45afa3c006b09ea3e02ad7c3ff87420860e96f860b01,2024-10-16T16:38:14.557000 CVE-2024-49253,0,0,318fd919306033b0ba1af00f1fb24fd093afc62d50b17cdad24b4012b87e229e,2024-10-16T16:38:14.557000 CVE-2024-49254,0,0,468e6b954543a9c09dbeaa129555d2fef3c67f0cd1fda39a98a776cfe3209bab,2024-10-16T16:38:14.557000 -CVE-2024-49255,0,0,4bd4a78924a0d9a83004a9e97bdd07b0b94d196c717ae66c1c2b8dbfd44c64fa,2024-10-17T20:15:05.373000 +CVE-2024-49255,0,1,07a531b79dfc3fffbaeeacad16dafd5d0970320fb9cc66893064c6e649bea763,2024-10-18T12:52:33.507000 CVE-2024-49257,0,0,c746271630a04cc860e90dcc3327f7d3236c3185c4c288f1a83e53501d11c09d,2024-10-16T16:38:14.557000 CVE-2024-49258,0,0,607145cca293d130fa4daa1388ac2333b0492324dbfe84a2b1fc0b125bf94b24,2024-10-16T16:38:14.557000 -CVE-2024-49259,0,0,6d72aee26b60755867a0d6592ec1481525a4c6a220d60c824672f9fecb8e1a59,2024-10-17T20:15:06.020000 +CVE-2024-49259,0,1,c2aba7e31467c17e32d8186ee6b1c7a465f65ccdcbaf3cabd81e34756cdcdd1d,2024-10-18T12:52:33.507000 CVE-2024-4926,0,0,0d237df43556e4b080e4a7390a685a0eb6e73f0f5564912a819a125e3b5027a7,2024-06-04T19:20:54.033000 CVE-2024-49260,0,0,f7fbff0e8c687e5cecb849140b580b4536003bd56027a3f942394b9a49504da8,2024-10-16T16:38:14.557000 -CVE-2024-49261,0,0,f6e726a987a8eefb594a20c942a2aa5066a2cf1453e6a4dc4e892d9e51d4addd,2024-10-17T20:15:06.577000 -CVE-2024-49262,0,0,b06710c4a2fc8b9547663686d8fe4aa4773429ae0d383c1f09c76d27c33eefb7,2024-10-17T20:15:07.193000 -CVE-2024-49263,0,0,3e4e02bba9ffa6b4ef56c16b3d56026cd70a8f75e78f1dd997c98fe8261f1174,2024-10-17T20:15:07.753000 -CVE-2024-49264,0,0,7709995414cb95512a1e68991be2da5a1f1561d042d8d5ef665f495fcfce6807,2024-10-17T20:15:08.290000 +CVE-2024-49261,0,1,3778426038452d8f4736178a73de5a84167eab3be33c64f5397072da2afe0b75,2024-10-18T12:52:33.507000 +CVE-2024-49262,0,1,437b2d1c9a1c92c92007771217d75c42679db853ae4106a3330e1dbcc73f064e,2024-10-18T12:52:33.507000 +CVE-2024-49263,0,1,3bcdaf2344eec1d87d5a87ff72cb3cbd030d1cd591944c4aa384451abb43246d,2024-10-18T12:52:33.507000 +CVE-2024-49264,0,1,736e21e8114448504cc3d04a1d053b8a2214a75077bcbbb05bd0b709154d2a51,2024-10-18T12:52:33.507000 CVE-2024-49265,0,0,2cda8a33bc2d03fefdf7c3133030acb05a8e29216eb67c8ab5bbc3492433f6ca,2024-10-16T16:38:14.557000 CVE-2024-49266,0,0,c5e70b7e770ed5f3df45b9a2a53768df7b374fc1d9d19703902a29c4e17568bc,2024-10-16T16:38:14.557000 CVE-2024-49267,0,0,4b538f1207d90ff37302c6bbe76796f7901944b13de2b84e82a8e8f808237361,2024-10-16T16:38:14.557000 @@ -262368,50 +262369,50 @@ CVE-2024-49268,0,0,0fd3b370a3e22a5c2e2b790051009bad50afbb281504212fe91f7bc75fe60 CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b3606,2024-06-12T12:15:09.767000 CVE-2024-49270,0,0,005f08cde4b6782924e4200040f169e9271a9874c783fd600f7eed89bec64939,2024-10-16T16:38:14.557000 CVE-2024-49271,0,0,1b6a5992897872a55a65b35d258cee2be874a281a35ad1930932471d7ec23943,2024-10-16T16:38:14.557000 -CVE-2024-49276,0,0,e3ec520569ade6fcbaabe57f7ff9f9eccfcb5c9ddb3fb545e566aa4fb74f4380,2024-10-17T20:15:08.803000 -CVE-2024-49277,0,0,8f538ebd383591b72059490a5ca4cee26747ca5f3ac201a86e212c284dff3b72,2024-10-17T20:15:09.360000 -CVE-2024-49278,0,0,76aad63e11e789a6e0101b664554d72b2b15dfacd5e33c5992698b510803c10c,2024-10-17T20:15:09.973000 -CVE-2024-49279,0,0,1a3f955af53a86fe20235b34a63d80468f5adbc121d162c66524095c0e0e72ef,2024-10-17T20:15:10.563000 +CVE-2024-49276,0,1,6a6b58791e9512e826c457e3bee8f08f7b1de60db24c986554adb1b116c01f0f,2024-10-18T12:52:33.507000 +CVE-2024-49277,0,1,413e0fb3e700b4ddf1e7bf9c0606cf9c4881f3636c1ad9b858708a2ee8b7a3f5,2024-10-18T12:52:33.507000 +CVE-2024-49278,0,1,f5bee9930ffbbfdde604c657853a18e3b9208ed8b4b0cf0c41230a88e43b006c,2024-10-18T12:52:33.507000 +CVE-2024-49279,0,1,49ea3c9d0a7569d4937308a2bc3889c1e0fe925a73942c03f296eae5bb9f58d8,2024-10-18T12:52:33.507000 CVE-2024-4928,0,0,e26d33912989577395dd3f5446c3b9e0710db7f1a80702fd147e50c8947c1051,2024-06-04T19:20:54.230000 -CVE-2024-49280,0,0,2e2db4415f3a11faef310d5627be4869eb96b9c0062296b4cd7982da4793395e,2024-10-17T20:15:11.140000 -CVE-2024-49281,0,0,ef00fb54ecc5647a6c7e66250b9a1d395ae387ba10337e1057aa266be7f0c144,2024-10-17T20:15:11.570000 -CVE-2024-49282,0,0,489e7c40ef6bcc0364084d1e07dabd87a057260583a8dd59e74ee9d04b64214c,2024-10-17T20:15:11.800000 -CVE-2024-49283,0,0,0bb33791482c1b23269cf04ff6fa079823c589753ef3100c3b56906515aa56af,2024-10-17T20:15:12.067000 -CVE-2024-49284,0,0,6645e1d8bf7b769e4c4a465921be2df5c1ce2ac2d4e0b77f14dc7f38d3e8833d,2024-10-17T18:15:12.353000 -CVE-2024-49285,0,0,87d5cd6790a2b61a8b69955a05c8ac7475d182c84a5a89061f539950378fa667,2024-10-17T18:15:12.590000 -CVE-2024-49287,0,0,5ad36576d308c5c948299b805e956109f590cdd8c009665989717786ec09e248,2024-10-17T18:15:12.820000 -CVE-2024-49288,0,0,a5b0bf53ffc860ccda0c77d8a92bca80bdffa1090cc731c79bbcb67c1a440a35,2024-10-17T20:15:12.343000 -CVE-2024-49289,0,0,078fe75bfd1c7177236495226322bdcda68b7c051c184f4e4772fb5c7fe610a5,2024-10-17T19:15:22.550000 +CVE-2024-49280,0,1,007a73ae7293daaef2c140eac70089d76df426cd7d4c631bb5a506f2dbb10ca5,2024-10-18T12:52:33.507000 +CVE-2024-49281,0,1,42c907d4bc979ed6299b22a186b43fa795c0f4345382a7fb32348b9f38c81135,2024-10-18T12:52:33.507000 +CVE-2024-49282,0,1,3a6f5cd82ec68a1bfbe1f4f156ef6268706ea2c2772c6f37ca60ccaad2879c88,2024-10-18T12:52:33.507000 +CVE-2024-49283,0,1,261a1f8cfe011441b757e2549150d49caf0cbd82863bcb1702fead1f8711ada8,2024-10-18T12:52:33.507000 +CVE-2024-49284,0,1,bec1f0da1bcb0850e4841345e95550bca16d99530b59e5207d183ff1f4e1c3e0,2024-10-18T12:52:33.507000 +CVE-2024-49285,0,1,6f46c329c3d1526d526943e0333d6d72992c68afd2913a4ef362b73e606f2e17,2024-10-18T12:52:33.507000 +CVE-2024-49287,0,1,0066d2fce1ed85532c90a9906dc911278ca46d873038b8dcfb2d0c4b3b95c685,2024-10-18T12:52:33.507000 +CVE-2024-49288,0,1,9794858fdab905561c3b5d43269f1d3f1bacba7fba1bb0436d9d456534b0053f,2024-10-18T12:52:33.507000 +CVE-2024-49289,0,1,1007ec713acd15fdb5c2262f73a22207aad725968297cd9b79b0f4fcd3d741cb,2024-10-18T12:52:33.507000 CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000 -CVE-2024-49291,0,0,48e3cb819d766720a728fa6cc20e58543704fccbb40db389f5613eca914d8ac4,2024-10-17T18:15:13.050000 -CVE-2024-49292,0,0,da7c328f0255ea6e6ba10bdb94c23c09f6a5ac3133e81af683d881f701119d83,2024-10-17T19:15:22.763000 -CVE-2024-49295,0,0,36a8a1b01be1bb9122eb4c134eb1921d2155d89b8272c6cf6cc09998deb9465d,2024-10-17T19:15:22.967000 -CVE-2024-49296,0,0,5bf3e9866072e7e982f23f54add717439052427785322e1654f55eaf22b3eb4f,2024-10-17T19:15:23.167000 -CVE-2024-49297,0,0,dab25a1e8a793f6ddf634295e8deb5de868d5ec95ca936f3e817616d074de69b,2024-10-17T18:15:13.267000 -CVE-2024-49298,0,0,8a946ea94add7c4f08efe26b591570168c0f63d88b81e3338d7d8f1e7bf44ffb,2024-10-17T19:15:23.400000 -CVE-2024-49299,0,0,afa48b1924158f4ba2007fd629191f1b0db81078d80d09d0c18e4cb63bdbbc4c,2024-10-17T18:15:13.510000 +CVE-2024-49291,0,1,44e011055ffcc94f31147e91008bfca453f458c355b4c10d5e081a4748d73d9a,2024-10-18T12:52:33.507000 +CVE-2024-49292,0,1,5f09a14990b6c411313ed3c0517e00101a5bacb90324a262f26a26dc9ec6f772,2024-10-18T12:52:33.507000 +CVE-2024-49295,0,1,2233f6c9986d9f1a990d0d54b1c1d91ca1475b5db77026f702ef776949b63fa2,2024-10-18T12:52:33.507000 +CVE-2024-49296,0,1,f1042f70e89016c7f4e9d2a0f572f4f930b555774f6b329b232673bc13de033a,2024-10-18T12:52:33.507000 +CVE-2024-49297,0,1,c01c0683901cb1b114e43805eef512c87c392594a83094740c5f93a462c76e65,2024-10-18T12:52:33.507000 +CVE-2024-49298,0,1,f12ede0398cd630a878e884fe4e8d98cf77275ded47068caa74af1e134864895,2024-10-18T12:52:33.507000 +CVE-2024-49299,0,1,45a2c2f56751d9d76b9b9c23b7a609dc73f629de568300a7aea9893751e81f66,2024-10-18T12:52:33.507000 CVE-2024-4930,0,0,af679b04f9fd8769c21afbd06a19763f2fe78e9326434dadfeea44855b5d14c8,2024-06-04T19:20:54.437000 -CVE-2024-49301,0,0,f87d2b31d83de805a17e8e00ef8615f785f030eded7745cf4c62c1e8b4ecc42d,2024-10-17T19:15:23.597000 -CVE-2024-49302,0,0,2d3f01181f879f692cd7e3ba96f3de4b81cc2daaa8a3b4e8b0fb3e28b9f4955e,2024-10-17T19:15:23.803000 -CVE-2024-49304,0,0,3f22071c3fc56f9c9f5483065d3ada9f4b2d95e0678ff18cde92285daa619284,2024-10-17T18:15:13.730000 -CVE-2024-49305,0,0,a642bc6bc226c60592c7b31280d49e4fc9901dd0e147ad0568bb162ae8a8ab9d,2024-10-17T18:15:13.943000 -CVE-2024-49307,0,0,724f2ae05419c9727567c98b3da6d733942b06dc01ac9b14e37a2fec723dfe55,2024-10-17T19:15:24.013000 -CVE-2024-49308,0,0,c634be4e73f94da625d37655ba3c631048e1066e24e67a2ea91ca4d82fe146c7,2024-10-17T19:15:24.217000 -CVE-2024-49309,0,0,604fcd3d8ef265dff6b3858dfc37548256569277a97295c7f6ef1c058e42c5f6,2024-10-17T19:15:24.427000 +CVE-2024-49301,0,1,7d2494e642de20b5bc929cc6d54a8fb5dcf5cfdb65768055f9017f846af36d7f,2024-10-18T12:52:33.507000 +CVE-2024-49302,0,1,710ce60d767e5f3fed4efed760bfd34a8e958088ece1205aa9bb54b219723f7a,2024-10-18T12:52:33.507000 +CVE-2024-49304,0,1,58dd4c2ddea953ce346c3f95611ced2fd41151c190485df9958a7a12599bf8c0,2024-10-18T12:52:33.507000 +CVE-2024-49305,0,1,40dab16b7a70081634fde6765f3a20a4620c68c7c77381519add7b12c075078b,2024-10-18T12:52:33.507000 +CVE-2024-49307,0,1,666a5148f43aeccd18eb31fe6200f031359163a4193a62896c07267bd5dddec8,2024-10-18T12:52:33.507000 +CVE-2024-49308,0,1,80b5bf0dcffe8ff357d2779a75304405ea747e2bcb1322a132f94886c9a31297,2024-10-18T12:52:33.507000 +CVE-2024-49309,0,1,6a184f4fa1aea4b522b78b6818e7a615b1f64b5d3ee9ecb78863e4ec5e510708,2024-10-18T12:52:33.507000 CVE-2024-4931,0,0,ef61357c988a5b6da4dc964c43221d8effae72407ee13fdf99bc1e0e52699bd9,2024-06-04T19:20:54.543000 -CVE-2024-49310,0,0,28c2c498b725f21ba9228c209ef622c1d02e6771538ad5468f521625e7d1e7db,2024-10-17T19:15:24.627000 -CVE-2024-49311,0,0,d552e01c8d676b54dadc2b730cb1cafd8c5cb3a1d516bb11e610d3e4c1728f6c,2024-10-17T19:15:24.820000 -CVE-2024-49312,0,0,5422329c0297697f7275d1035df1957895e31e191de72d15249feac3aa836034,2024-10-17T18:15:14.160000 -CVE-2024-49313,0,0,089d9f8884def135f9ed7b24b8395b0a85a79b80c9f8e4e4ca253906ff7efbba,2024-10-17T18:15:14.450000 -CVE-2024-49314,0,0,1bdceeec9b86db958b13d046d17c38e177548e13e0dc38d8fe38506e7763280a,2024-10-17T18:15:14.680000 -CVE-2024-49315,0,0,891be7c5710c3e5b13186edf4ad7f268912752b8869c072221340ebfbdc96eb4,2024-10-17T14:15:14.050000 -CVE-2024-49316,0,0,e702ec38df5a5722a57c4614412efc1aca47da01d076a9d316b09c937cdba0a9,2024-10-17T19:15:25.023000 -CVE-2024-49317,0,0,dbc7ced4cd8387e172a97ee9d7ff3bfda35be6b794ef5a85dd39ce75ffa06140,2024-10-17T18:15:14.890000 -CVE-2024-49318,0,0,6019a1a96030342ec944ffe9a956747092ae44939f28969774c6324ea8caf128,2024-10-17T18:15:15.103000 -CVE-2024-49319,0,0,e30bf576b2cef48b6cdc03a3531e901bae57af2160354de3efe7e8e02709ce68,2024-10-17T19:15:25.217000 +CVE-2024-49310,0,1,c27785fff2b3cabfcf2dcbb484b7dd7be4002ad1a162afbc5342c42d032d3444,2024-10-18T12:52:33.507000 +CVE-2024-49311,0,1,655b8f0f0fd2801ebee62c4cab2c3c056128130684611e0692ceaea589cba5fe,2024-10-18T12:52:33.507000 +CVE-2024-49312,0,1,1e3e36eafcd069a7fe79509ad96d7f4dd02c8e2f5c7599561b4842ee8e36495c,2024-10-18T12:52:33.507000 +CVE-2024-49313,0,1,b81d49e40540ec5decbacf6cb1d50e1df2e38b8d0de9f78131c7efe307877a35,2024-10-18T12:52:33.507000 +CVE-2024-49314,0,1,e28782638c5532f3ac8c67770b689db44caf307d15977e296c2eba897b4800d2,2024-10-18T12:52:33.507000 +CVE-2024-49315,0,1,1b3f19eb4b90d8f93047e1e5f0210df48030df55d8d2939457cea7437b801dbb,2024-10-18T12:52:33.507000 +CVE-2024-49316,0,1,7cdd2abd122139bc397b355c43efbc35a76d0da902df6527526bb87216599011,2024-10-18T12:52:33.507000 +CVE-2024-49317,0,1,8f495e600596eb867e38ff50605f0ee7782c606acca5a9734932378036e27158,2024-10-18T12:52:33.507000 +CVE-2024-49318,0,1,02cca54ff58508f7015bdc78b225c5402ac891d24584c9a2512f1a35e3987ddd,2024-10-18T12:52:33.507000 +CVE-2024-49319,0,1,42677cde087b60b4589de437a49f5349c2181024ba44b1ead05df0b607435f60,2024-10-18T12:52:33.507000 CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b37,2024-05-17T02:40:43.357000 -CVE-2024-49320,0,0,1dbbe1a4cc47ca750e811da300b700cbb6549a664128f805e72b29d374034afd,2024-10-17T12:15:03.077000 -CVE-2024-49322,0,0,2ec2fb8c2279a0ce68d05b252a0e4b5b8d06fd66e0ae6c7d0c3c5433b995e7dc,2024-10-17T18:15:15.300000 +CVE-2024-49320,0,1,f646a0aed9b94f9c2a4b6085270ae6d0667dce332670da7784078783e12bfcb6,2024-10-18T12:52:33.507000 +CVE-2024-49322,0,1,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000 CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d17,2024-06-04T19:20:54.643000 CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000 CVE-2024-49340,0,0,37285f025630fd9eb79c4269f84ef859e190bfac2e34728b5f3d3dbad2273eb0,2024-10-16T16:38:14.557000 @@ -262419,20 +262420,20 @@ CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a6 CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 -CVE-2024-49386,0,0,88d9ef750dafb5b0f1e1bf92226ed563cc54a08fee3c6b0ca6a1a098368c9965,2024-10-17T10:15:03.547000 +CVE-2024-49386,0,1,1d25b080fbbea221c055efac9c762867f5085ee6f3d687b5cc1e664a101ca402,2024-10-18T12:52:33.507000 CVE-2024-49387,0,0,e70e4e295fee330a123c323f35cb15d527d316ee3f5221af871424ea3c5d431e,2024-10-16T13:58:39.297000 CVE-2024-49388,0,0,5d13081edde105848217330e8cc20460dfb42c426e8875787362e8bb17013386,2024-10-16T13:57:58.383000 -CVE-2024-49389,0,0,e83feddbdc89b6405989836b09f90867e5ac56892252dc8494b48677a3312aec,2024-10-17T10:15:03.813000 +CVE-2024-49389,0,1,782590fbe64673f327f13f943edfb48e7e3e6bd67714baab73ff54cb027cf9a2,2024-10-18T12:52:33.507000 CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150c3,2024-06-11T17:08:33.350000 -CVE-2024-49390,0,0,6baca18107f5cc533462346f5acbf1d2e9fe0404228790e24f98327c0b77b783,2024-10-17T10:15:04.017000 -CVE-2024-49391,0,0,3d70f3e9114e855c995af50156d159f84f68373950b34c51d590b42839188113,2024-10-17T10:15:04.193000 -CVE-2024-49392,0,0,d968d38be803f577b28f3ec92283081c0c3e6e79ceb6cb184c7b99e1105fe4a8,2024-10-17T10:15:04.383000 -CVE-2024-49396,0,0,474fd252c2444047e1dfeb57b6767d0ab584b9c1f47b3d7513aafe0be6729b3b,2024-10-17T17:15:12.467000 -CVE-2024-49397,0,0,58bf7e1c9ee9fbfa9a8d4049ee0dfe36b2274a377e1115db9f87e4621e75842a,2024-10-17T17:15:12.573000 -CVE-2024-49398,0,0,63d8294b1753b6bd40bef6466abe365b8a2fcfa7d5fd9afa7cf9a623b5374fd1,2024-10-17T17:15:12.680000 -CVE-2024-49399,0,0,775cba4b19ac0952c18550c4448e4e026ade85db92826352e6c12f1c6b913569,2024-10-17T17:15:12.800000 +CVE-2024-49390,0,1,eff95f86766f67eb2ef6ab23caa20847e22dd38f00065fcf061dc2bada50eee7,2024-10-18T12:52:33.507000 +CVE-2024-49391,0,1,311a8bb769d2e58e61220157a113938ccde2c41642ab025d6703ef0fe1dad3fa,2024-10-18T12:52:33.507000 +CVE-2024-49392,0,1,c4cc03c98af7494cb5c2554450ecefb789da2dfeb5b1d5e0f0695ab9ec810289,2024-10-18T12:52:33.507000 +CVE-2024-49396,0,1,dbaa3d388154985d86e8594d731b97904294f985dcd6b939c9b3040fa96316c2,2024-10-18T12:52:33.507000 +CVE-2024-49397,0,1,958762caa5006a67fc74324331d920e22a8fe3617537f208fec92361877cfad4,2024-10-18T12:52:33.507000 +CVE-2024-49398,0,1,1964f2918f2b62a12a26449777ec3d512771c9e0a90e6a92142f1221cf2a6f15,2024-10-18T12:52:33.507000 +CVE-2024-49399,0,1,280599d675596d0a62f92142e8a452afef09a7da5cc6b00dfa86815a1f9a12f9,2024-10-18T12:52:33.507000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 -CVE-2024-49400,0,0,6b50f9973c7de63c5d0c6406707dd32295ed1c001d2f51b0e2fd021f211bd9d7,2024-10-17T18:15:15.547000 +CVE-2024-49400,0,1,78b3aecce3915fd9b36e0db9c8e502a46d0ea1b9d18b5b296dfe9ea335712835,2024-10-18T12:52:33.507000 CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000 CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000 CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000 @@ -262445,11 +262446,11 @@ CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170a CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 -CVE-2024-49579,0,0,105d6e8093ff9aaf051731899a238d3656838aaaf5411829c54bbcb94544112c,2024-10-17T13:15:14.613000 +CVE-2024-49579,0,1,85b8fb1168559e66181366d5ecd0a3cbf5d9385b3a23eb2296d97e9422fe6782,2024-10-18T12:52:33.507000 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 -CVE-2024-49580,0,0,b0050b9bbf1029563469a5eebee7797227af50dc467f8b9c95199a7500753391,2024-10-17T13:15:14.853000 +CVE-2024-49580,0,1,2a4b2f9ee960712197ef0f3776cc1a15f015ed4f9adbe3a24755a9ff67152fdc,2024-10-18T12:52:33.507000 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 -CVE-2024-49593,0,0,f7be142be0bfe72f842162432e1a57f42eae1b6ed09489bac28255b788b80b69,2024-10-17T04:15:03.440000 +CVE-2024-49593,0,1,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000 CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000 CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a111,2024-08-01T21:15:53.893000 CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54 @@ -262877,7 +262878,7 @@ CVE-2024-5425,0,0,6a4e5f79f55def4d138c1c07874dfb0365b816ea97355d904460c326f38465 CVE-2024-5426,0,0,34afa7194afb894f777aa3dfb9357e73895bc2898fe4d0744eeb7d3dbc6f96b2,2024-06-11T18:03:58.213000 CVE-2024-5427,0,0,8f69f2258320069dff3e4ca54576ebef2bbd612c89873dcb7f321da375d5baac,2024-05-31T13:01:46.727000 CVE-2024-5428,0,0,2246dbdf3f6f57b875e58f7afe2bbf25e943033499540bdd9e572873773785a4,2024-05-28T14:59:09.827000 -CVE-2024-5429,0,0,b3e6aedd04f5322b8f59aa01fc77044c9661721be0b401c2f88022ddfb836cd0,2024-10-17T19:35:24.927000 +CVE-2024-5429,0,1,e1091591ce879e81e2f579e050a86705cb0433a287323c1d0159140124dfd1b0,2024-10-18T12:53:04.627000 CVE-2024-5430,0,0,7efa052e5c67b0f87e6df1de28f1712609827b19a2f0fa9870fd8d86a121a060,2024-06-28T13:17:34.380000 CVE-2024-5431,0,0,c05cafcca4db035c01a1ef8070f41d696cf1ed72d29d4b28e570debbe2ef62df,2024-06-25T12:24:17.873000 CVE-2024-5432,0,0,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000 @@ -263657,7 +263658,7 @@ CVE-2024-6329,0,0,86251ab842ffcb900239f67c839645a87676821122e9a881854a92c1e2f082 CVE-2024-6330,0,0,e1243e86845c9ad8bb8e14e862db7cae433088225de72050fd359fe249b90cd8,2024-08-19T16:35:30.907000 CVE-2024-6331,0,0,52c1c6ef5119330812f0b8f9d4c8f908510020273352e90ad354980012c782b6,2024-08-30T16:15:10.710000 CVE-2024-6332,0,0,6a11035168ec675eca4317d3a76c369854aee1404a3dbc4eab434b7b1210d36b,2024-09-12T12:45:37.917000 -CVE-2024-6333,0,0,7de4f28f4a03482594b89d92ae92c21e52da2be9f065c51540bd8692edcadb9a,2024-10-17T14:15:14.287000 +CVE-2024-6333,0,1,26710d2d8f1067bda384a9a83a37d660b0332951749e48820f7013ed56893ed7,2024-10-18T12:52:33.507000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6336,0,0,d15a7371f14974a83964ccd43d827dda2013bed4e54e361d69b27a97f9fa2a0d,2024-09-17T15:23:02.077000 CVE-2024-6337,0,0,11b01bdc310a03dbc48a13087ed0270063ad6dc927c6c67c79cfa387d3f39f5d,2024-09-27T17:48:00.977000 @@ -264444,7 +264445,7 @@ CVE-2024-7312,0,0,dc3f367e0f0a86ec8a8ee4af9b89c7ef895e4bddfa2b420824b06225d6049f CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000 CVE-2024-7314,0,0,64aaecd133deeb35ae51feed7f4d71099832a2945a1861cec1e5be771eb8caf9,2024-09-17T15:45:01.970000 CVE-2024-7315,0,0,4dd3ca2ac679da492124ce5590c090ad17a93d64696dae4628c710dd311ef4dc,2024-10-04T13:50:43.727000 -CVE-2024-7316,0,0,a3ed9c49fd0a862edbaee33f6974c0e9e36c771a415dbaeaf645eeba8e5e8f09,2024-10-17T22:15:03.313000 +CVE-2024-7316,0,1,5990a2a50740417de26e4a43998b50af37cfe2f1f726e85198059b2db0d2b164,2024-10-18T12:52:33.507000 CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 CVE-2024-7318,0,0,2ca5990770924d7ddfe581f7904232372b4075f7ae4cad66d6ebd58d8212e872,2024-10-07T20:15:17.153000 CVE-2024-7319,0,0,d4986d9efc8d814183831640de70bbfefdbb6a9fdd92447199ee22066cfb4c77,2024-10-07T19:15:11.090000 @@ -264532,7 +264533,7 @@ CVE-2024-7413,0,0,cc9a3132dbf30c713a640687e195177085da2f3a67f589d16f765a82cdaabb CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f70,2024-08-12T13:41:36.517000 CVE-2024-7415,0,0,4f3e91f02c270ceca383c924b673a911f19c76918de0da2e60f23a61a9c60f70,2024-09-30T17:46:46.473000 CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000 -CVE-2024-7417,0,0,35ffece01157cb98b3dbc8e9ef5e22feef8f12edf40d55130728e6211e24fa40,2024-10-17T04:15:04.887000 +CVE-2024-7417,0,1,061c820bf4a8c4e187900b3568028077850454d8dcfe9c42cdcbf7d3b1d0e752,2024-10-18T12:53:04.627000 CVE-2024-7418,0,0,6ee4a43e42207c29adb50692b9f8d069006b5e4b14e8cbac9cf9d0f431b4967c,2024-10-04T16:01:06.077000 CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000 CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000 @@ -264813,7 +264814,7 @@ CVE-2024-7751,0,0,3d4779511baf725a6e5d9f65d6769396fd6275e830b17a69e8bf93efeb313e CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470a9,2024-08-19T17:48:25.793000 CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000 CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000 -CVE-2024-7755,0,0,c11d80d8fa27a24f852494dbb7522748bb6637d90da7d02cf368015aea033151,2024-10-17T19:15:25.513000 +CVE-2024-7755,0,1,ef971a5ecbec92118875058fb4e190fc41fb035586060e0897fad69139da7909,2024-10-18T12:52:33.507000 CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888de,2024-09-14T11:47:14.677000 CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000 CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000 @@ -264995,8 +264996,8 @@ CVE-2024-7986,0,0,a43751c0931e4929788be7df13e0b692f335646e8ba6bbd66f7625d734a5da CVE-2024-7987,0,0,76927c94eae9954117a932c513da8aebd30f47001e85e588d746e509b6294d24,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,f1ca0f1a43359526a6c9585e72942b31e1455ffa80a01c452c09ecf831a670e6,2024-08-26T18:35:14.617000 CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000 -CVE-2024-7993,0,0,8bba0756993071fbc745019fb34951b7bb5798ba8f01d3c9bc90e281e552206b,2024-10-16T22:15:03.133000 -CVE-2024-7994,0,0,97d5079c642acfd299740fce5e81d7e9d3a43f83b3b455304d58bed49918b996,2024-10-16T22:15:03.353000 +CVE-2024-7993,0,1,57c99793d40ff6094d86dd28d96a6e020afc31bece92fd87ce57ef5f53613adc,2024-10-18T12:53:04.627000 +CVE-2024-7994,0,1,3c66b4f2652e615829fe7657e2b3f479dd4129ca0c3b5fd7ab054f643379ba58,2024-10-18T12:53:04.627000 CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000 @@ -265488,7 +265489,7 @@ CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce CVE-2024-8715,0,0,f0a4fb777a1271394a60c2f9ce37f6ba7325c02d49be07fd888bdf4eaa659dd6,2024-10-01T14:37:08.807000 CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000 CVE-2024-8718,0,0,c97741d12130ad5ba2ed82c528ec11a1af21fad86435451da12c39cec028d14f,2024-10-04T13:51:25.567000 -CVE-2024-8719,0,0,a1fc2be32b56b5c2ff038083012541bc30ce6eb30ae508bc2673a47ef06e03b7,2024-10-17T04:15:05.227000 +CVE-2024-8719,0,1,744fcf7d72ab5bacabdfb2f8067ccc8eaf21212ff78af93f44b80439bd89826e,2024-10-18T12:53:04.627000 CVE-2024-8720,0,0,2f0e821428fb20df24eeb1115d6165ec35266f54d9cfaa09a98cadbec3449fde,2024-10-04T13:51:25.567000 CVE-2024-8723,0,0,730229d7deadc7b514e5d898656fee12ba111958411cb7eec6e86089a429ce7e,2024-10-02T17:00:23.603000 CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000 @@ -265503,7 +265504,7 @@ CVE-2024-8733,0,0,2ad75c4913be224ff75684fa724a275e53b709dc0d7f918cc99544f1d75453 CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000 CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000 CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000 -CVE-2024-8740,0,0,30a1269cb7af22b9e34b5203020f35189a966196fadb58582387373bbd706ba7,2024-10-18T05:15:05.437000 +CVE-2024-8740,0,1,f7778ec769f511ccc331ef10142b860015a2fe93cc7020e13cb136fb1ba3886c,2024-10-18T12:52:33.507000 CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000 CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000 CVE-2024-8743,0,0,65920323e1d664fd8f354bc76b73276103c2d19a537eecec01fa5cc8c5638d58,2024-10-07T17:48:28.117000 @@ -265537,7 +265538,7 @@ CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c94343 CVE-2024-8786,0,0,98535b365547eb81c56b86d17170e324effeb134cfd99a6f8a9199c7d69b6f51,2024-10-04T13:51:25.567000 CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0ed8,2024-10-16T16:38:14.557000 CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000 -CVE-2024-8790,0,0,694170aa3a4b6b7f610b2ab6a5b1c8d49696d4827a547e526c2bd421f4ddb137,2024-10-18T05:15:05.647000 +CVE-2024-8790,0,1,75c77ab7b7403fd7bc8b87bf01e6b7a24e964ae255d6cf6681e3722ae0749f28,2024-10-18T12:52:33.507000 CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecffd5,2024-09-26T16:25:34.120000 CVE-2024-8793,0,0,959b266c850b42df4ff44733c3776bf7c1d0fcf64b78d7cab419106b5de40dbb,2024-10-07T16:04:08.490000 CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000 @@ -265593,11 +265594,11 @@ CVE-2024-8912,0,0,a4286937675e049e61563468e21e8ee394eb8618a71f95672d8446231a80ed CVE-2024-8913,0,0,fca416d77c5623788a9db07f1a3764802595b9fed9406445b458bbb4d1cd4d8c,2024-10-15T12:58:51.050000 CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000 CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da01,2024-10-15T12:57:46.880000 -CVE-2024-8916,0,0,ac120cab94ab73f892d3f1aa76caff7ccd3f9fbe7e25a2998707cf8eed7eb61c,2024-10-18T05:15:05.857000 +CVE-2024-8916,0,1,af6ed530ea37558b92dd71a0c6ed90d9e25c16596df31f0cb608f1fa2e8f4764,2024-10-18T12:52:33.507000 CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8918,0,0,adf87d72fe8bb71bb4e84db31b9473b9ff815dc1f43bef94a15bce0226f2d2fa,2024-10-17T18:25:46.967000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 -CVE-2024-8920,0,0,53c655c6d8a52f85bf37b964563db2a6df3b60cec3ba9d6a8f0ac48ff6d579c7,2024-10-17T10:15:04.580000 +CVE-2024-8920,0,1,42fc84557f46536ee5298e40d09a285310a4aead85db529ff9c7f89249448d09,2024-10-18T12:52:33.507000 CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 @@ -265730,7 +265731,7 @@ CVE-2024-9137,0,0,264d67370ab0f50b8c3f1048814084fcd11d0d542a946dd3f8623532739c73 CVE-2024-9139,0,0,4ad68147a5d9ea2e8ca6916d944791ed9c6e2cb907a5644b5fb819f412e605c8,2024-10-15T12:57:46.880000 CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000 CVE-2024-9142,0,0,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc127,2024-10-14T16:35:01.033000 -CVE-2024-9143,0,0,de39390b3c1d623a3c7d96495ebf22a385fa5359533c98b4343c242121ae5fc5,2024-10-16T17:15:18.130000 +CVE-2024-9143,0,1,72af6f2ce64369da19b732394a82c347f40298441d275f9835e3a379d1574e5a,2024-10-18T12:53:04.627000 CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000 CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000 CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 @@ -265749,7 +265750,7 @@ CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb5 CVE-2024-9174,0,0,70fba8b83f62f6c4709cde03a07baa90e2b7205b145527e48fd4fbdcbf5b21e3,2024-10-04T13:50:43.727000 CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68ef,2024-10-03T14:32:46.150000 CVE-2024-9180,0,0,0957345dface0f91f4c1f32715d0f2eae63ac12b3ef88be0b045c3e4676b2592,2024-10-17T14:58:03.987000 -CVE-2024-9184,0,0,4a2eda2c8bf304ed9e2d3075b2ede5c625318482c442536cd4f36538a0766de8,2024-10-17T10:15:04.803000 +CVE-2024-9184,0,1,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000 CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000 @@ -265760,13 +265761,13 @@ CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab2191 CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000 CVE-2024-9204,0,0,f5f991f4ad7621e1bd7fe1b28f2260110bc4f49be8b0fb440d3c802fe287a27c,2024-10-16T14:26:41.423000 CVE-2024-9205,0,0,f51eb73f6ff5e878b874b1fc87e2002dcbff618e0eb4a751eb85e6ba7e0830aa,2024-10-15T14:16:53.337000 -CVE-2024-9206,0,0,f4fca121cd6da4f9dd0a7df93a8694e642bf147139ea5a6603661f5ff59df140,2024-10-18T07:15:02.200000 +CVE-2024-9206,0,1,af032a3b8d3120d01bda23d6438f80e744777702995522aec77a4d0d90d6c2c7,2024-10-18T12:52:33.507000 CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000 CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000 CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000 CVE-2024-9211,0,0,2701fea91f9be8cf1cd1e5693145c9b46f27f6fcdb96052a4b980af632a066a4,2024-10-15T12:58:51.050000 -CVE-2024-9213,0,0,94fd8b0cd5b53665ef701f416775c1cf4adb7eb8920b48e7c8070bf94ba553a7,2024-10-17T07:15:02.063000 -CVE-2024-9215,0,0,1c63cbe16d671c9b446896d4715d431ce98d6f496b402082873568bfe54d395c,2024-10-17T02:15:02.977000 +CVE-2024-9213,0,1,31f33319f9359990d4006b16b291c444261bcf993a594e4963d2f42975eaaf14,2024-10-18T12:52:33.507000 +CVE-2024-9215,0,1,a2b4a7b85cc10e131d947f9ea57761eb1ffd891ccc6b3de8f68e6c912c75a7eb,2024-10-18T12:53:04.627000 CVE-2024-9218,0,0,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000 CVE-2024-9220,0,0,6bac7ddea6b917eb69cb1f74123e8b2dddc4799202193b6b6e16b0128e05e777,2024-10-07T19:19:59.487000 CVE-2024-9221,0,0,feb1b16d88be55b92259cd20b799cece7abb9935cf5adfed4d1f38e82a4356d4,2024-10-15T12:58:51.050000 @@ -265777,11 +265778,11 @@ CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e19 CVE-2024-9232,0,0,a07f526496bb68b184ee001c7d6cd9744d3cb563b91260e8d60bd9b70cac4bda,2024-10-15T12:58:51.050000 CVE-2024-9234,0,0,304bee6ceb91eca0cdc00d7cdc49b4c339c82fe3a2287348525c06a570d629da,2024-10-15T12:58:51.050000 CVE-2024-9237,0,0,fb69e6f6fcfba2cfafb660a24001833586540d01b0ed897e2ee22df678729e15,2024-10-16T15:10:08.390000 -CVE-2024-9240,0,0,4957c23d20d67499999c250023f1d9b46ac77ce58f84def54c120240a9ec6d9d,2024-10-17T02:15:03.243000 +CVE-2024-9240,0,1,64e490409dd599c74da5a2492515b43ccd4793b118bdb242162550231e348320,2024-10-18T12:53:04.627000 CVE-2024-9241,0,0,6c5cc70c23164aeead7a2ffa985d7e69869a7cd0428a8503a9e9f624c0c87b24,2024-10-07T18:51:20.950000 CVE-2024-9242,0,0,2931ce38d642cfa320383051a5a41609f3e037ff0fe51760f16b233825fad051,2024-10-08T16:26:06.147000 -CVE-2024-9263,0,0,4b758f54449054a3e4eb5e8c8e2a4bd1baa45c95fc22c858a0cbf1493070e0f4,2024-10-17T04:15:05.517000 -CVE-2024-9264,0,0,be237012b1d2a2d17182664f72986c44f571aafb3c94423a6108d8e522739fdd,2024-10-18T04:15:04.723000 +CVE-2024-9263,0,1,ee4f7b487368511acdd8209efd3b16cc7ea9463265fe8e2495be906cd811a62e,2024-10-18T12:53:04.627000 +CVE-2024-9264,0,1,68a622a15d52663e7e450ecda6ae0a1a095ed64cde946df7ef5ef2cad7678456,2024-10-18T12:52:33.507000 CVE-2024-9265,0,0,370ae511e2a3bdf95824ac5c42b3e844c54d5bb7a6631dfac66939ebcd808076,2024-10-07T18:48:15.380000 CVE-2024-9266,0,0,9897e7bd01e8f0fea686bbe0969277eb0e59373ffc16090ed1770b5ca7125283,2024-10-04T13:50:43.727000 CVE-2024-9267,0,0,e1783d6d7b8ba5585243c45fe350fa65068fd1659c19369f548dec592743f878,2024-10-04T13:51:25.567000 @@ -265840,31 +265841,31 @@ CVE-2024-9341,0,0,73c457dae504bd6d2ce3664dbe78931543af91dddd466bb5fc955e7dbfca49 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 -CVE-2024-9347,0,0,74bedc9c85924073092b0131f3055344b2cbf70d557cb0d4328c8dd2303c0960,2024-10-17T04:15:05.810000 +CVE-2024-9347,0,1,131d08ad666b2357ecd19b3118dbe82da22a41e64a4f3a4f02af3909537af845,2024-10-18T12:53:04.627000 CVE-2024-9348,0,0,17fd5c434e6353e0ea23dd1fe0baa28897cc37ae9e8a1286efead4e96834cb80,2024-10-16T16:38:14.557000 CVE-2024-9349,0,0,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000 -CVE-2024-9350,0,0,e2f774ad3d1b296c231784fbd33bf600adef69cb27c1cf437ce0e92dd3b5097b,2024-10-18T05:15:06.070000 -CVE-2024-9351,0,0,b7847a01935c7c84b8091c333f79f93591ecc18cd0bae85d22aafd412b7f23b8,2024-10-17T06:15:03.433000 -CVE-2024-9352,0,0,caee573a0db0b1c7cc7f25a700043b0afc881efdd8be48dfca05df4faa25adf0,2024-10-17T06:15:03.850000 +CVE-2024-9350,0,1,290e64557c531b1051792213fe1cd034817a07f758e3a220c124933ec4bc84f6,2024-10-18T12:52:33.507000 +CVE-2024-9351,0,1,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000 +CVE-2024-9352,0,1,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000 -CVE-2024-9361,0,0,353c03c3da6042ffc730f6341cb5f647a546b858177ca73b428c1c37bac02e30,2024-10-18T05:15:06.287000 -CVE-2024-9364,0,0,77e69937e8c64755b8ea49050300675cee26705c6f45fee4c905e02afc6cef25,2024-10-18T05:15:06.513000 -CVE-2024-9366,0,0,b10b592a0b348f525cd7c50f192bf157a0ecbaf5e330d7de22a44d9fbad8a3e2,2024-10-18T05:15:06.733000 +CVE-2024-9361,0,1,4693288d6f9b770f354b271d3230619579a50994dbc41bcafd3fa00ed196033b,2024-10-18T12:52:33.507000 +CVE-2024-9364,0,1,c4bf30f97e6d050bc401bbb5fb0f26647b6623b0eede1aad55e31f9565e1d57e,2024-10-18T12:52:33.507000 +CVE-2024-9366,0,1,90f1d11d4d4e992827efb06cafe2c3d70d6cfeadf1a09572a99693f1b2afc4de,2024-10-18T12:52:33.507000 CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000 CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000 -CVE-2024-9373,0,0,a9e016ffa5b27a1dd1080cf2ca192d3a896f44c3703bbe33296f1f7f1546d411,2024-10-18T05:15:06.937000 +CVE-2024-9373,0,1,2898712a037d214125a76ba38f0c96b092eaa6a462819b05de3a152779aa33de,2024-10-18T12:52:33.507000 CVE-2024-9375,0,0,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000 CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5eaf,2024-10-15T14:18:12.483000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 CVE-2024-9381,0,0,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000 -CVE-2024-9382,0,0,91b5650cee0191585564472a906a8816bcff6dac0eacb9830e6ecc7663bab7a2,2024-10-18T05:15:07.170000 -CVE-2024-9383,0,0,cb40e8dcda9a8d43ccb74804098d217b983c23f4fb038e52850e19e0a28502be,2024-10-18T05:15:07.387000 +CVE-2024-9382,0,1,29d81cd67527323cc378a0ee608ddf312cf435e75c9f7c6b4cf515651d8ede26,2024-10-18T12:52:33.507000 +CVE-2024-9383,0,1,81c346c4ea409f9dc5cd8895197e6b588f3ffc2e168be1dfb4f00fad68e5323b,2024-10-18T12:52:33.507000 CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000 CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 @@ -265885,11 +265886,11 @@ CVE-2024-9407,0,0,c86f90b2fe6be22dec486d34b9c6e67b91a5945de93bcc27372041ed6a4268 CVE-2024-9410,0,0,90cffd2b402803b1ff7e6401238cb515c8bb4e7ed816fe3e9a33e1d435f92656,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 -CVE-2024-9414,0,0,8a9a3e41b667a0b0d835942383e3d5a6adfb212b63b29e9caf9e617e694ac3aa,2024-10-17T16:15:04.980000 +CVE-2024-9414,0,1,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 -CVE-2024-9425,1,1,2a917acc689a67a5467c6255ce74eb8ab3164d718821b55674a6adaa90386829,2024-10-18T10:15:08.770000 +CVE-2024-9425,0,1,82a3b9d34c5d2773107a4f3aa79e35eb3d082ec5e30435d3d9e7d9a3673b06c7,2024-10-18T12:52:33.507000 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3e1,2024-10-15T12:58:51.050000 @@ -265899,7 +265900,7 @@ CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836 CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000 CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000 -CVE-2024-9452,0,0,a4f175991856fbd01b608f0a0ac83f616c9f3beb1391df62ef90f55b8a61d646,2024-10-18T05:15:07.607000 +CVE-2024-9452,0,1,611328d50c3715494f831c5942738c614750e5d97f90d9d50fc04089aa82bed2,2024-10-18T12:52:33.507000 CVE-2024-9455,0,0,70bc73495623b6fab8931499505a6be70a8937392cffccc260a57663b280a262,2024-10-07T17:48:28.117000 CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8eeb,2024-10-15T14:23:57.307000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 @@ -265993,15 +265994,15 @@ CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93 CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 -CVE-2024-9674,1,1,39351950c78b0f43ec7df9d75d063d3717b5a85edde7dd5a98522b02b19abb2f,2024-10-18T11:15:02.750000 +CVE-2024-9674,0,1,89e1ab6ae89b3b97a86c7a47307fb1b6ebb25204b28d62965547335f936977dd,2024-10-18T12:52:33.507000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 CVE-2024-9676,0,0,d31717e3bcb8586d94edf5a821882c847af5c510cf5d1e8e5ea8ab53ee1286ab,2024-10-16T16:38:43.170000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000 -CVE-2024-9683,0,0,eded5b54dfd028e444f29dc1ef773ba16aac341e3cb0df2c9dc100b20ed16ec6,2024-10-17T15:15:13.850000 +CVE-2024-9683,0,1,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f185407,2024-10-18T12:52:33.507000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 -CVE-2024-9703,0,0,2e5bdb245d7fa876e996a6b2f1a02ee05d27bab43479d01e628f4ff8e4aebfdb,2024-10-18T07:15:02.560000 +CVE-2024-9703,0,1,ddc4fe301197e730a44df9c0c2a55012ae7348c1e34fb75f4cc32ec5b97c5a05,2024-10-18T12:52:33.507000 CVE-2024-9704,0,0,44ebf677ae69495b92126e2eb8d9d17c07544c8235e40f4412f83b24b48e2f3a,2024-10-15T12:57:46.880000 CVE-2024-9707,0,0,cde0816a76e7682ea9f7dc3a69f12238a4d95599cfec418d205198361a6879cf,2024-10-15T12:58:51.050000 CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da6473,2024-10-15T12:57:46.880000 @@ -266048,24 +266049,24 @@ CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 -CVE-2024-9848,0,0,277c42f6ee1fae99a276722365821dfa0a295c2330488cb4ba42d6614c1c3b81,2024-10-18T05:15:07.807000 +CVE-2024-9848,0,1,c9c868f8b4dfcb8a16c343ca24b48f00207606de4438d4f715e98402b24e1592,2024-10-18T12:52:33.507000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000 CVE-2024-9858,0,0,bef02c0d9ed07a4afa527340189d49e60d5c238f08809a01d4eade734c583a54,2024-10-16T17:35:08.130000 CVE-2024-9859,0,0,144046db89cc7a1614c278bf90f5b4cc56b3ffdbde195acab46c61c2bc1b4092,2024-10-15T19:35:46.273000 CVE-2024-9860,0,0,5146b7a0224d680f933516d3f319e5a1a7abd782ae32358fb855e1c62c4df555,2024-10-15T12:57:46.880000 -CVE-2024-9861,0,0,667be6773193042bf5e7eddfdb1c7c18aad31ebb5d768b20080653b62b056270,2024-10-17T02:15:03.493000 -CVE-2024-9862,0,0,7bfd5aaccd67ad2c6307c357a2f038c2d9c94fa8a08245f073c8af665c380a89,2024-10-17T02:15:03.767000 -CVE-2024-9863,0,0,221f04bc315b2a65d0f9bdb2d5e7bf8988365ad7548e3a3182542cbc2e4bf8ba,2024-10-17T02:15:04.030000 +CVE-2024-9861,0,1,ea3da873230376cd14799b0d170e8e876683f20c285aa64f3bb5d67920c38493,2024-10-18T12:53:04.627000 +CVE-2024-9862,0,1,a125c015e3b00c8735ed8c9687686a16a9d40d9b6f2ce90b19ff292bf536d9b9,2024-10-18T12:53:04.627000 +CVE-2024-9863,0,1,5a2779f928f03a35905e31f60158c72d5505c6aaa35173f98063e46d2c1389f4,2024-10-18T12:53:04.627000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000 CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c18433f,2024-10-16T16:38:14.557000 CVE-2024-9891,0,0,53ec4da3ba927732190105b9993cdfaefd46788f3c82dc582d229482b0eb1fcc,2024-10-16T16:38:14.557000 -CVE-2024-9892,0,0,19b78f96e4b1e258062df5eedffc4dcd09835ab80dcc63552e9aef97b07312da,2024-10-18T05:15:08.040000 +CVE-2024-9892,0,1,584f5c7c0c5a775fc15fb3ba6088d5cb7abd48140a1f2b1bd6d2a1fd7b17f015,2024-10-18T12:52:33.507000 CVE-2024-9893,0,0,426d02de035749f6abb2956fee210a61cbcd97da25fe8818e92240a83b0a6b07,2024-10-16T16:38:14.557000 CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000 CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000 -CVE-2024-9898,0,0,9484ae257cdb78184616cef75f952c665b82cb2cde3794687ff2c931e23eb0ff,2024-10-17T11:15:11.087000 +CVE-2024-9898,0,1,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000 CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000 @@ -266089,9 +266090,9 @@ CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd590528 CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000 CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000 CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000 -CVE-2024-9940,0,0,d6ec2db27c79428c0b61a7eba13119ff5d712fa59873c17ed6834010233d53cd,2024-10-17T02:15:04.277000 +CVE-2024-9940,0,1,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000 CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000 -CVE-2024-9951,0,0,a8e084c90c7829b035c1b8ccb80cd348cc4d499d46375422f822d891bba697ef,2024-10-17T08:15:03.040000 +CVE-2024-9951,0,1,5d941c75af8c4072e469beaa1d6ae2855b0ca23ecdce87314ecd326f6a54014a,2024-10-18T12:52:33.507000 CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000 CVE-2024-9953,0,0,d45e8bc6b31e34e84fbff0a12af100dea5cf3de9adda836e3ebc3a7410262455,2024-10-17T20:59:01.940000 CVE-2024-9954,0,0,5f26968dac79baf55aed4010505394c902408c166cdf8894e281e7190646e9e3,2024-10-17T19:57:09.903000