diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json index 0626f60edf6..27074ad74ad 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42427.json @@ -2,12 +2,16 @@ "id": "CVE-2023-42427", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-03T04:15:08.830", - "lastModified": "2024-06-03T04:15:08.830", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX versions 1.0.0 to 1.0.7, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is using the product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting en UNIVERSAL PASSPORT RX versiones 1.0.0 a 1.0.7, que puede permitir que un atacante remoto autenticado ejecute un script arbitrario en el navegador web del usuario que est\u00e1 utilizando el producto." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json index bd0cadd9f90..f7380806e71 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43537", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:09.063", - "lastModified": "2024-06-03T10:15:09.063", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json index a67767ffeb2..4f50509f708 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43538", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:09.937", - "lastModified": "2024-06-03T10:15:09.937", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json index d914850145f..b867ed5e29e 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43542", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.220", - "lastModified": "2024-06-03T10:15:10.220", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json index 2f5c67e15bf..b7923f362e2 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43543", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.467", - "lastModified": "2024-06-03T10:15:10.467", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json index f312681afa2..18f3f7eb369 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43544", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.700", - "lastModified": "2024-06-03T10:15:10.700", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json index 2867a57a50f..dc46d973c19 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43545", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:10.907", - "lastModified": "2024-06-03T10:15:10.907", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json index 8ff7553d3a6..0d1b8fa51cf 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43551", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.147", - "lastModified": "2024-06-03T10:15:11.147", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json index 952e32ccdb5..f6b68531989 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43555", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.420", - "lastModified": "2024-06-03T10:15:11.420", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json index c87d85d1f61..69b2653158b 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43556", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.673", - "lastModified": "2024-06-03T10:15:11.673", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48789.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48789.json index 695e3ebc26d..c6be73e8823 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48789.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48789.json @@ -2,12 +2,16 @@ "id": "CVE-2023-48789", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T08:15:08.507", - "lastModified": "2024-06-03T08:15:08.507", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A client-side enforcement of server-side security in Fortinet FortiPortal version 6.0.0 through 6.0.14 allows attacker to improper access control via crafted HTTP requests." + }, + { + "lang": "es", + "value": "Una aplicaci\u00f3n de la seguridad del lado del servidor en Fortinet FortiPortal versi\u00f3n 6.0.0 a 6.0.14 permite al atacante realizar un control de acceso inadecuado a trav\u00e9s de solicitudes HTTP manipuladas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json index fd3bc4daea8..b54f71afea6 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51436.json @@ -2,12 +2,16 @@ "id": "CVE-2023-51436", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-03T04:15:09.287", - "lastModified": "2024-06-03T04:15:09.287", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX versions 1.0.0 to 1.0.8, which may allow a remote authenticated attacker with an administrative privilege to execute an arbitrary script on the web browser of the user who is using the product. " + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting en las versiones 1.0.0 a 1.0.8 de UNIVERSAL PASSPORT RX, que puede permitir que un atacante remoto autenticado con privilegios administrativos ejecute un script arbitrario en el navegador web del usuario que est\u00e1 utilizando el producto." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json index d2a56ec0bdb..da160fe0a41 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6382.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6382", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T05:15:08.287", - "lastModified": "2024-06-01T05:15:08.287", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Master Slider \u2013 Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ms_slide' shortcode in all versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied 'css_class' attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Master Slider \u2013 Responsive Touch Slider para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'ms_slide' del complemento en todas las versiones hasta la 3.9.9 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en el atributo 'css_class' proporcionado por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0336.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0336.json new file mode 100644 index 00000000000..bd852da6eb0 --- /dev/null +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0336.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-0336", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-06-03T14:15:08.900", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Access Control vulnerability in EMTA Grup PDKS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PDKS: before 20240603.\u00a0\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0600", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1324.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1324.json index 54ed1bef4cb..c97658b6401 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1324.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1324.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1324", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T07:15:07.850", - "lastModified": "2024-06-01T07:15:07.850", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The QQWorld Auto Save Images plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the save_remote_images_get_auto_saved_results() function hooked via a norpriv AJAX in all versions up to, and including, 1.9.8. This makes it possible for unauthenticated attackers to retrieve the contents of arbitrary posts that may not be public." + }, + { + "lang": "es", + "value": "El complemento QQWorld Auto Save Images para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n save_remote_images_get_auto_saved_results() conectada a trav\u00e9s de norpriv AJAX en todas las versiones hasta la 1.9.8 incluida. Esto hace posible que atacantes no autenticados recuperen el contenido de publicaciones arbitrarias que pueden no ser p\u00fablicas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20065.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20065.json index 32f96c9ac65..cb085135b66 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20065.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20065.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20065", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:08.463", - "lastModified": "2024-06-03T02:15:08.463", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08698617; Issue ID: MSV-1394." + }, + { + "lang": "es", + "value": "En telefon\u00eda existe una posible divulgaci\u00f3n de informaci\u00f3n debido a la falta de una verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08698617; ID del problema: MSV-1394." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20066.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20066.json index e458abbcc7e..b407c187dab 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20066.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20066.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20066", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:08.630", - "lastModified": "2024-06-03T02:15:08.630", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. Patch ID: MOLY01267281; Issue ID: MSV-1477." + }, + { + "lang": "es", + "value": "En el m\u00f3dem, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01267281; ID del problema: MSV-1477." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json index 8995ebb72b3..845b83b6c1c 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20067.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20067", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:08.770", - "lastModified": "2024-06-03T02:15:08.770", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In modem, there is a possible out of bounds write due to improper input invalidation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01267285; Issue ID: MSV-1462." + }, + { + "lang": "es", + "value": "En el m\u00f3dem, existe una posible escritura fuera de los l\u00edmites debido a una invalidaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01267285; ID del problema: MSV-1462." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20068.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20068.json index d34a2dd26fa..e401bb3a873 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20068.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20068.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20068", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:08.873", - "lastModified": "2024-06-03T02:15:08.873", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. Patch ID: MOLY01270721; Issue ID: MSV-1479." + }, + { + "lang": "es", + "value": "En el m\u00f3dem, existe una posible falla del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01270721; ID del problema: MSV-1479." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json index 29eb556231b..c8ed07608ba 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20069.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20069", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:08.977", - "lastModified": "2024-06-03T02:15:08.977", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In modem, there is a possible selection of less-secure algorithm during the VoWiFi IKE due to a missing DH downgrade check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01286330; Issue ID: MSV-1430." + }, + { + "lang": "es", + "value": "En el m\u00f3dem, existe una posible selecci\u00f3n de algoritmos menos seguros durante el IKE de VoWiFi debido a que falta una verificaci\u00f3n de degradaci\u00f3n de DH. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01286330; ID del problema: MSV-1430." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json index 145b8b0ab90..98626055671 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20070", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.093", - "lastModified": "2024-06-03T02:15:09.093", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In modem, there is a possible information disclosure due to using risky cryptographic algorithm during connection establishment negotiation. This could lead to remote information disclosure, when weak encryption algorithm is used, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00942482; Issue ID: MSV-1469." + }, + { + "lang": "es", + "value": "En los m\u00f3dems, existe una posible divulgaci\u00f3n de informaci\u00f3n debido al uso de algoritmos criptogr\u00e1ficos riesgosos durante la negociaci\u00f3n del establecimiento de la conexi\u00f3n. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n, cuando se utiliza un algoritmo de cifrado d\u00e9bil, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY00942482; ID del problema: MSV-1469." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json index c9e2caffd32..fb4f3c4295e 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20071.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20071", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.220", - "lastModified": "2024-06-03T02:15:09.220", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00364733; Issue ID: MSV-1331." + }, + { + "lang": "es", + "value": "En el controlador WLAN, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00364733; ID del problema: MSV-1331." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json index e76934dffbf..e6ffebe6710 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20072.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20072", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.320", - "lastModified": "2024-06-03T02:15:09.320", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00364732; Issue ID: MSV-1332." + }, + { + "lang": "es", + "value": "En el controlador WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00364732; ID del problema: MSV-1332." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json index 373fe9817a1..28e2f9e3a33 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20073.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20073", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.420", - "lastModified": "2024-06-03T02:15:09.420", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00367704; Issue ID: MSV-1411." + }, + { + "lang": "es", + "value": "En el servicio WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: WCNCR00367704; ID del problema: MSV-1411." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json index 21445fdb899..368f8e03e73 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20074.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20074", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.520", - "lastModified": "2024-06-03T02:15:09.520", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In dmc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08668110; Issue ID: MSV-1333." + }, + { + "lang": "es", + "value": "En dmc, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08668110; ID del problema: MSV-1333." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20075.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20075.json index 3902fcd7eb3..1965e501df0 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20075.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20075.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20075", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.620", - "lastModified": "2024-06-03T02:15:09.620", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In eemgpu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08713302; Issue ID: MSV-1393." + }, + { + "lang": "es", + "value": "En eemgpu, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08713302; ID del problema: MSV-1393." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json index 67c8dcf786c..14d9fbd7ed1 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21478", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.907", - "lastModified": "2024-06-03T10:15:11.907", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json index 06d9e595f01..2236567c5bd 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2178.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2178", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-02T11:15:07.390", - "lastModified": "2024-06-02T11:15:07.390", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'copy_to_custom_personas' endpoint in the 'lollms_personalities_infos.py' file. This vulnerability allows attackers to read arbitrary files by manipulating the 'category' and 'name' parameters during the 'Copy to custom personas folder for editing' process. By inserting '../' sequences in these parameters, attackers can traverse the directory structure and access files outside of the intended directory. Successful exploitation results in unauthorized access to sensitive information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de path traversal en parisneo/lollms-webui, espec\u00edficamente dentro del endpoint 'copy_to_custom_personas' en el archivo 'lollms_personalities_infos.py'. Esta vulnerabilidad permite a los atacantes leer archivos arbitrarios manipulando los par\u00e1metros 'categor\u00eda' y 'nombre' durante el proceso 'Copiar a la carpeta de personas personalizadas para editar'. Al insertar secuencias '../' en estos par\u00e1metros, los atacantes pueden atravesar la estructura del directorio y acceder a archivos fuera del directorio deseado. La explotaci\u00f3n exitosa da como resultado el acceso no autorizado a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2295.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2295.json index 4182830382c..9e3d125135e 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2295.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2295.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2295", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T08:15:08.407", - "lastModified": "2024-06-01T08:15:08.407", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Contact Form Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [xyz-cfm-form] shortcode in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Contact Form Manager para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado [xyz-cfm-form] del complemento en todas las versiones hasta la 1.6.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json index 965a710db32..0c3534adf5f 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23107", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T08:15:08.837", - "lastModified": "2024-06-03T08:15:08.837", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiWeb version 7.4.0, version 7.2.4 and below, version 7.0.8 and below, 6.3 all versions may allow an authenticated attacker to read password hashes of other administrators via CLI commands." + }, + { + "lang": "es", + "value": "Una exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado [CWE-200] en FortiWeb versi\u00f3n 7.4.0, versi\u00f3n 7.2.4 e inferiores, versi\u00f3n 7.0.8 e inferiores, 6.3 todas las versiones puede permitir que un atacante autenticado lea hashes de contrase\u00f1as de otros administradores a trav\u00e9s de comandos CLI." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23316.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23316.json index 3c7ece9d118..ecdf8ad5813 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23316.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23316.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23316", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-05-31T19:15:08.723", - "lastModified": "2024-05-31T19:15:08.723", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "HTTP request desynchronization in Ping Identity PingAccess, all versions prior to 8.0.1 affected allows an attacker to send specially crafted http header requests to create a request smuggling condition for proxied requests." + }, + { + "lang": "es", + "value": "La desincronizaci\u00f3n de solicitudes HTTP en Ping Identity PingAccess, todas las versiones anteriores a 8.0.1 afectadas, permite a un atacante enviar solicitudes de encabezado http especialmente manipuladas para crear una condici\u00f3n de contrabando de solicitudes para solicitudes proxy." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23360.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23360.json index 07797cb9fd0..4d4dbea1e89 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23360.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23360.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23360", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:12.130", - "lastModified": "2024-06-03T10:15:12.130", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23363.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23363.json index cd3ebd65ef7..6f28031ab59 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23363.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23363.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23363", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:12.377", - "lastModified": "2024-06-03T10:15:12.377", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json index 65c1cad8b84..80611e3bf79 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23664", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:12.620", - "lastModified": "2024-06-03T10:15:12.620", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json index 12e77f9af42..1264cbbe29b 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23665", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:12.870", - "lastModified": "2024-06-03T10:15:12.870", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json index 0cb4a130193..d36d06fd753 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23667", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:13.100", - "lastModified": "2024-06-03T10:15:13.100", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json index 752f32ceaf5..45fd3f74eeb 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23668", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:13.320", - "lastModified": "2024-06-03T10:15:13.320", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json index 5d3f4830943..4a715157e2f 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23670", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:13.523", - "lastModified": "2024-06-03T10:15:13.523", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2506.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2506.json index 1d1c04db923..a4b50518b8a 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2506.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2506.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2506", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T07:15:08.393", - "lastModified": "2024-06-01T07:15:08.393", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Popup Builder \u2013 Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom JS functionality in all versions up to, and including, 4.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Popup Builder \u2013 Create highly converting, mobile friendly marketing popups para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la funcionalidad JS personalizada en todas las versiones hasta la 4.2.7 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json index 41b3622a210..346d970f375 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27776.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27776", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T13:15:08.510", - "lastModified": "2024-06-02T13:15:08.510", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MileSight DeviceHub - \n\nCWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') may allow Unauthenticated RCE" + }, + { + "lang": "es", + "value": "MileSight DeviceHub: CWE-22 La limitaci\u00f3n incorrecta de un nombre de ruta a un directorio restringido (\"Path Traversal\") puede permitir RCE no autenticado" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2933.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2933.json index 8087dc1d2b6..e0892560514 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2933.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2933.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2933", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T02:15:47.727", - "lastModified": "2024-06-01T02:15:47.727", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Page Builder Gutenberg Blocks \u2013 CoBlocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Social Profiles widget in all versions up to, and including, 3.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Page Builder Gutenberg Blocks \u2013 CoBlocks para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de perfiles sociales en todas las versiones hasta la 3.1.9 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json index 681561a39db..e005e354776 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31493.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31493", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T08:15:09.097", - "lastModified": "2024-06-03T08:15:09.097", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An improper removal of sensitive information before storage or transfer vulnerability [CWE-212] in FortiSOAR version 7.3.0, version 7.2.2 and below, version 7.0.3 and below may allow an authenticated low privileged user to read Connector passwords in plain-text via HTTP responses." + }, + { + "lang": "es", + "value": "Una eliminaci\u00f3n inadecuada de informaci\u00f3n confidencial antes de la vulnerabilidad de almacenamiento o transferencia [CWE-212] en FortiSOAR versi\u00f3n 7.3.0, versi\u00f3n 7.2.2 e inferiores, versi\u00f3n 7.0.3 e inferiores puede permitir que un usuario autenticado con privilegios bajos lea las contrase\u00f1as del conector en formato texto plano a trav\u00e9s de respuestas HTTP." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3200.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3200.json index 59e7c13b108..fbdc92ce3ea 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3200.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3200.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3200", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T09:15:09.453", - "lastModified": "2024-06-01T09:15:09.453", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The wpForo Forum plugin for WordPress is vulnerable to SQL Injection via the 'slug' attribute of the 'wpforo' shortcode in all versions up to, and including, 2.3.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento wpForo Forum para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del atributo 'slug' del shortcode 'wpforo' en todas las versiones hasta la 2.3.3 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json index 4de5b3a85ac..b05ef68fc8d 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33996.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33996", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:09.647", - "lastModified": "2024-05-31T20:15:09.647", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Incorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to." + }, + { + "lang": "es", + "value": "La validaci\u00f3n incorrecta de los tipos de eventos permitidos en un servicio web de calendario hizo posible que algunos usuarios crearan eventos con tipos/audiencias para los que no ten\u00edan permiso para publicar." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33997.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33997.json index fb7ebe03558..9175dc0de20 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33997.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33997.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33997", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:09.797", - "lastModified": "2024-05-31T20:15:09.797", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Additional sanitizing was required when opening the equation editor to prevent a stored XSS risk when editing another user's equation." + }, + { + "lang": "es", + "value": "Se requiri\u00f3 una sanitizaci\u00f3n adicional al abrir el editor de ecuaciones para evitar un riesgo de XSS almacenado al editar la ecuaci\u00f3n de otro usuario." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33998.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33998.json index b908b369b19..dc36dfdba67 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33998.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33998.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33998", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:09.890", - "lastModified": "2024-05-31T20:15:09.890", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features." + }, + { + "lang": "es", + "value": "El escape insuficiente de los nombres de los participantes en la tabla de p\u00e1ginas de participantes result\u00f3 en un riesgo XSS almacenado al interactuar con algunas funciones." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33999.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33999.json index b89192a67fa..bb62630cb6e 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33999.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33999.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33999", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:09.987", - "lastModified": "2024-05-31T20:15:09.987", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The referrer URL used by MFA required additional sanitizing, rather than being used directly." + }, + { + "lang": "es", + "value": "La URL de referencia utilizada por MFA requiri\u00f3 una sanitizaci\u00f3n adicional, en lugar de usarse directamente." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json index d484f869e30..b83985a2f79 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34000", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:10.080", - "lastModified": "2024-05-31T20:15:10.080", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk." + }, + { + "lang": "es", + "value": "Los n\u00fameros de identificaci\u00f3n que se muestran en el informe de descripci\u00f3n general de la lecci\u00f3n requirieron una sanitizaci\u00f3n adicional para evitar un riesgo de XSS almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json index 2b867288a19..3e4fa89580c 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34001.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34001", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:10.183", - "lastModified": "2024-05-31T20:15:10.183", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk." + }, + { + "lang": "es", + "value": "Las acciones en la herramienta preestablecida de administraci\u00f3n no inclu\u00edan el token necesario para evitar un riesgo CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34002.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34002.json index ffaae3300ea..7591bf0a171 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34002.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34002.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34002", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.130", - "lastModified": "2024-05-31T21:15:09.130", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include." + }, + { + "lang": "es", + "value": "En un entorno de alojamiento compartido que ha sido mal configurado para permitir el acceso al contenido de otros usuarios, un usuario de Moodle con acceso para restaurar m\u00f3dulos de retroalimentaci\u00f3n y acceso directo al servidor web fuera de la ra\u00edz web de Moodle podr\u00eda ejecutar una inclusi\u00f3n de archivo local." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json index 76fc6a5bccb..7ea6a3374ea 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34003.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34003", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.240", - "lastModified": "2024-05-31T21:15:09.240", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include." + }, + { + "lang": "es", + "value": "En un entorno de alojamiento compartido que ha sido mal configurado para permitir el acceso al contenido de otros usuarios, un usuario de Moodle con acceso para restaurar m\u00f3dulos de taller y acceso directo al servidor web fuera de la ra\u00edz web de Moodle podr\u00eda ejecutar una inclusi\u00f3n de archivo local." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json index c69d836da5f..1294932c658 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34004.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34004", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.340", - "lastModified": "2024-05-31T21:15:09.340", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include." + }, + { + "lang": "es", + "value": "En un entorno de alojamiento compartido que ha sido mal configurado para permitir el acceso al contenido de otros usuarios, un usuario de Moodle con acceso para restaurar m\u00f3dulos wiki y acceso directo al servidor web fuera de la ra\u00edz web de Moodle podr\u00eda ejecutar una inclusi\u00f3n de archivo local." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json index 6f1ff745e71..12accb14cd1 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34005.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34005", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.440", - "lastModified": "2024-05-31T21:15:09.440", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include." + }, + { + "lang": "es", + "value": "En un entorno de alojamiento compartido que ha sido mal configurado para permitir el acceso al contenido de otros usuarios, un usuario de Moodle con acceso para restaurar los m\u00f3dulos de actividad de la base de datos y acceso directo al servidor web fuera de la ra\u00edz web de Moodle podr\u00eda ejecutar una inclusi\u00f3n de archivo local." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json index 7812584be95..52329eb548b 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34006.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34006", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.533", - "lastModified": "2024-05-31T21:15:09.533", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered." + }, + { + "lang": "es", + "value": "El informe de registro del sitio requiri\u00f3 codificaci\u00f3n adicional de las descripciones de eventos para garantizar que cualquier HTML en el contenido se muestre en texto plano en lugar de representarse." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34007.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34007.json index fd570fc00f4..c3b1edf3d51 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34007.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34007.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34007", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.647", - "lastModified": "2024-05-31T21:15:09.647", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF." + }, + { + "lang": "es", + "value": "La opci\u00f3n de cierre de sesi\u00f3n dentro de MFA no inclu\u00eda el token necesario para evitar el riesgo de que los usuarios cerraran sesi\u00f3n sin darse cuenta a trav\u00e9s de CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34008.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34008.json index e8d60b657c4..1566d805a17 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34008.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34008.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34008", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.743", - "lastModified": "2024-05-31T21:15:09.743", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk." + }, + { + "lang": "es", + "value": "Las acciones en la gesti\u00f3n administrativa de los modelos de an\u00e1lisis no incluyeron el token necesario para prevenir un riesgo CSRF." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34009.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34009.json index 44eb71f012b..47e1a027c67 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34009.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34009.json @@ -2,12 +2,16 @@ "id": "CVE-2024-34009", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T21:15:09.833", - "lastModified": "2024-05-31T21:15:09.833", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized." + }, + { + "lang": "es", + "value": "Las comprobaciones insuficientes de si ReCAPTCHA estaba habilitado hicieron posible eludir las comprobaciones en la p\u00e1gina de inicio de sesi\u00f3n. Esto no afect\u00f3 a otras p\u00e1ginas donde se utiliza ReCAPTCHA." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34385.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34385.json index ca3e1f38776..5df4183ea7e 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34385.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34385", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:08.870", - "lastModified": "2024-06-03T12:15:08.870", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34754.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34754.json index afcf0feda23..f2eefb6d8db 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34754.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34754.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34754", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:08.743", - "lastModified": "2024-06-03T11:15:08.743", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34764.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34764.json index 0f4ec8062ea..6586a28fe15 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34764.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34764.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34764", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:09.120", - "lastModified": "2024-06-03T12:15:09.120", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34766.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34766.json index 434f281b9c4..6de41a5fe55 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34766.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34766", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:09.357", - "lastModified": "2024-06-03T12:15:09.357", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json index ae739df8db5..3fdec18acd1 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34767", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:09.610", - "lastModified": "2024-06-03T12:15:09.610", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34769.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34769.json index ab98de89e6c..b72aae7dc7e 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34769.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34769.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34769", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:09.867", - "lastModified": "2024-06-03T12:15:09.867", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34770.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34770.json index 03b3727ddb3..aa5f3b820ac 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34770.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34770.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34770", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:10.120", - "lastModified": "2024-06-03T12:15:10.120", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34789.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34789.json index 182b64c3fc6..4ba01a2857f 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34789.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34789.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34789", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:09.003", - "lastModified": "2024-06-03T11:15:09.003", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34790.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34790.json index e95c742ff82..375edb8a018 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34790.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34790", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:09.233", - "lastModified": "2024-06-03T11:15:09.233", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34791.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34791.json index aa4bd1d01f2..e3ff02afd3e 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34791.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34791", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:09.467", - "lastModified": "2024-06-03T11:15:09.467", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34793.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34793.json index 7e1442b6390..e2fe6d5e8ba 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34793.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34793", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:09.687", - "lastModified": "2024-06-03T11:15:09.687", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json index 9e6bcea63c5..84b68fe385e 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34794", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:09.917", - "lastModified": "2024-06-03T11:15:09.917", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json index 882510f98b0..64218348ada 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34795", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:10.133", - "lastModified": "2024-06-03T11:15:10.133", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34796.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34796.json index 6c77b1db817..0052bb62166 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34796.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34796.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34796", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:10.360", - "lastModified": "2024-06-03T11:15:10.360", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34797.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34797.json index 71ac29689b5..f553caf1daf 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34797.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34797", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:10.580", - "lastModified": "2024-06-03T11:15:10.580", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34798.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34798.json index fac5ee39fe8..c42dc430259 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34798.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34798.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34798", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:10.813", - "lastModified": "2024-06-03T11:15:10.813", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34801.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34801.json index 9f6e3fd8ce2..29c2240c49d 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34801.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34801.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34801", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:11.040", - "lastModified": "2024-06-03T11:15:11.040", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34803.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34803.json index 2f6c962d3b5..abfa6d5ffbe 100644 --- a/CVE-2024/CVE-2024-348xx/CVE-2024-34803.json +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34803.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34803", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:11.270", - "lastModified": "2024-06-03T11:15:11.270", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35630.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35630.json index 55a5609e53c..b9f519500a8 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35630.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35630.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35630", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:11.520", - "lastModified": "2024-06-03T11:15:11.520", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35631.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35631.json index 61ea705c0b8..451c7897eab 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35631.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35631.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35631", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T11:15:11.740", - "lastModified": "2024-06-03T11:15:11.740", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35632.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35632.json index 38b4485b21c..156edb7b55d 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35632.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35632.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35632", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T12:15:10.367", - "lastModified": "2024-06-03T12:15:10.367", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35633.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35633.json index b81ecf7131e..4f6c9b96516 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35633.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35633.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35633", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T10:15:13.720", - "lastModified": "2024-06-03T10:15:13.720", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35635.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35635.json index b4c602a66e5..dbef195a823 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35635.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35635.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35635", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T10:15:14.050", - "lastModified": "2024-06-03T10:15:14.050", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35636.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35636.json index e1577b0dc55..60c13365f63 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35636.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35636.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35636", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-01T09:15:08.983", - "lastModified": "2024-06-01T09:15:08.983", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Uploadcare Uploadcare File Uploader and Adaptive Delivery (beta) uploadcare.This issue affects Uploadcare File Uploader and Adaptive Delivery (beta): from n/a through 3.0.11." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Uploadcare File Uploader y Adaptive Delivery (beta). Este problema afecta a Uploadcare File Uploader y Adaptive Delivery (beta): desde n/a hasta 3.0.11." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35637.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35637.json index 217c1b9d65d..8aa1f833203 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35637.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35637.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35637", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T09:15:09.390", - "lastModified": "2024-06-03T09:15:09.390", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Church Admin.This issue affects Church Admin: from n/a through 4.3.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en Church Admin. Este problema afecta a Church Admin: desde n/a hasta 4.3.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35638.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35638.json index 97462b56cdb..fbb1f84b955 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35638.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35638.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35638", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T09:15:09.703", - "lastModified": "2024-06-03T09:15:09.703", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in JumpDEMAND Inc. ActiveDEMAND.This issue affects ActiveDEMAND: from n/a through 0.2.43." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en JumpDEMAND Inc. ActiveDEMAND. Este problema afecta a ActiveDEMAND: desde n/a hasta 0.2.43." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35639.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35639.json index 27321f934d3..a9eff0d1903 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35639.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35639.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35639", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T09:15:09.947", - "lastModified": "2024-06-03T09:15:09.947", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Webliberty Simple Spoiler allows Stored XSS.This issue affects Simple Spoiler: from n/a through 1.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Webliberty Simple Spoiler permite XSS almacenado. Este problema afecta a Simple Spoiler: desde n/a hasta 1.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35640.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35640.json index 8b872952d4b..d5a78cce27b 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35640.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35640.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35640", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T08:15:09.330", - "lastModified": "2024-06-03T08:15:09.330", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tomas Cordero Safety Exit allows Stored XSS.This issue affects Safety Exit: from n/a through 1.7.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Tomas Cordero Safety Exit permite XSS almacenado. Este problema afecta a Safety Exit: desde n/a hasta 1.7.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35641.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35641.json index d24fc94f894..20286c93011 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35641.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35641.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35641", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T07:15:09.100", - "lastModified": "2024-06-03T07:15:09.100", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in GregRoss Just Writing Statistics allows Stored XSS.This issue affects Just Writing Statistics: from n/a through 4.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en GregRoss Just Writing Statistics permite almacenar XSS. Este problema afecta a Just Writing Statistics: desde n/a hasta 4.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35642.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35642.json index fd16a55c7c6..f4d6a8b4a73 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35642.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35642.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35642", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T07:15:09.560", - "lastModified": "2024-06-03T07:15:09.560", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bryan Hadaway Site Favicon allows Stored XSS.This issue affects Site Favicon: from n/a through 0.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Bryan Hadaway Site Favicon permite almacenar XSS. Este problema afecta a Site Favicon: desde n/a hasta 0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35643.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35643.json index 3f176a48341..8dc6be1e397 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35643.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35643.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35643", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-03T07:15:09.850", - "lastModified": "2024-06-03T07:15:09.850", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in Xabier Miranda WP Back Button allows Stored XSS.This issue affects WP Back Button: from n/a through 1.1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting (XSS) en Xabier Miranda WP Back Button permite almacenar XSS. Este problema afecta a WP Back Button: desde n/a hasta 1.1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35645.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35645.json index f431c4bcf5e..b80cbec2734 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35645.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35645.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35645", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-02T00:15:37.840", - "lastModified": "2024-06-02T00:15:37.840", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in vinoth06 Random Banner allows Stored XSS.This issue affects Random Banner: from n/a through 4.2.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en vinoth06 Random Banner permite almacenar XSS. Este problema afecta a Random Banner: desde n/a hasta 4.2.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35646.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35646.json index 6cfbbc5f9ea..7c0b35cc1bf 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35646.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35646.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35646", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-02T00:15:38.097", - "lastModified": "2024-06-02T00:15:38.097", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Smartarget Smartarget Message Bar allows Stored XSS.This issue affects Smartarget Message Bar: from n/a through 1.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Smartarget Smartarget Message Bar permite almacenar XSS. Este problema afecta a la barra de mensajes Smartarget: desde n/a hasta 1.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35647.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35647.json index cc5110cd31c..4352898562d 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35647.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35647.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35647", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-02T00:15:38.310", - "lastModified": "2024-06-02T00:15:38.310", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Notification Bar allows Stored XSS.This issue affects Global Notification Bar: from n/a through 1.0.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Global Notification Bar permite almacenar XSS. Este problema afecta a Global Notification Bar: desde n/a hasta 1.0.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json index 5e268870aad..b0bee94d319 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3564.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3564", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T04:15:08.743", - "lastModified": "2024-06-01T04:15:08.743", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the plugin's 'content_block' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Content Blocks (Widget de publicaci\u00f3n personalizado) para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 3.3.0 incluida a trav\u00e9s del c\u00f3digo corto 'content_block' del complemento. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en los casos en que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json index 9641df0f8ae..2d6c17ac094 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3565.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3565", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T04:15:09.000", - "lastModified": "2024-06-01T04:15:09.000", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'content_block' shortcode in all versions up to, and including, 3.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Content Blocks (Widget de publicaci\u00f3n personalizado) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'content_block' del complemento en todas las versiones hasta la 3.3.0 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json index 215a24ff6a1..6618d747fbf 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36042.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36042", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T06:15:09.293", - "lastModified": "2024-06-03T06:15:09.293", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Silverpeas before 6.3.5 allows authentication bypass by omitting the Password field to AuthenticationServlet, often providing an unauthenticated user with superadmin access." + }, + { + "lang": "es", + "value": "Silverpeas anterior a 6.3.5 permite omitir la autenticaci\u00f3n omitiendo el campo Contrase\u00f1a en AuthenticationServlet, lo que a menudo proporciona a un usuario no autenticado acceso de superadministrador." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36123.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36123.json new file mode 100644 index 00000000000..4a7e9e060cc --- /dev/null +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36123.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-36123", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-03T15:15:08.843", + "lastModified": "2024-06-03T15:15:08.843", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. The page `MediaWiki:Tagline` has its contents used unescaped, so custom HTML (including Javascript) can be injected by someone with the ability to edit the MediaWiki namespace (typically those with the `editinterface` permission, or sysops). This vulnerability is fixed in 2.16.0.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/c11fbf67a99366d5a40ef880469b222679e3b475/includes/Components/CitizenComponentPageHeading.php#L190-L195", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/c11fbf67a99366d5a40ef880469b222679e3b475/includes/Components/CitizenComponentPageHeading.php#L197-L201", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/4a43280242f33e54643087da4a7f40970d2640c9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/releases", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-jhm6-qjhq-5mf9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36124.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36124.json new file mode 100644 index 00000000000..773b68b5aed --- /dev/null +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36124.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-36124", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-03T15:15:09.090", + "lastModified": "2024-06-03T15:15:09.090", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "iq80 Snappy is a compression/decompression library. When uncompressing certain data, Snappy tries to read outside the bounds of the given byte arrays. Because Snappy uses the JDK class `sun.misc.Unsafe` to speed up memory access, no additional bounds checks are performed and this has similar security consequences as out-of-bounds access in C or C++, namely it can lead to non-deterministic behavior or crash the JVM. iq80 Snappy is not actively maintained anymore. As quick fix users can upgrade to version 0.5.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dain/snappy/security/advisories/GHSA-8wh2-6qhj-h7j9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36127.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36127.json new file mode 100644 index 00000000000..84e898d17b7 --- /dev/null +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36127.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-36127", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-03T15:15:09.307", + "lastModified": "2024-06-03T15:15:09.307", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "apko is an apk-based OCI image builder. apko exposures HTTP basic auth credentials from repository and keyring URLs in log output. This vulnerability is fixed in v0.14.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + }, + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/chainguard-dev/apko/commit/2c0533e4d52e83031a04f6a83ec63fc2a11eff01", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/chainguard-dev/apko/security/advisories/GHSA-v6mg-7f7p-qmqp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36128.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36128.json new file mode 100644 index 00000000000..082918853de --- /dev/null +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36128.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-36128", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-03T15:15:09.547", + "lastModified": "2024-06-03T15:15:09.547", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Directus is a real-time API and App dashboard for managing SQL database content. Prior to 10.11.2, providing a non-numeric length value to the random string generation utility will create a memory issue breaking the capability to generate random strings platform wide. This creates a denial of service situation where logged in sessions can no longer be refreshed as sessions depend on the capability to generate a random session ID. This vulnerability is fixed in 10.11.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json index 04d0d6e9151..0beeb419b12 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36388.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36388", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:08.683", - "lastModified": "2024-06-02T14:15:08.683", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MileSight DeviceHub - \n\n\n\nCWE-305 Missing Authentication for Critical Function" + }, + { + "lang": "es", + "value": "MileSight DeviceHub - Falta autenticaci\u00f3n CWE-305 para funci\u00f3n cr\u00edtica" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json index c5e2dfdab2b..2989069ace6 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36389.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36389", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:08.933", - "lastModified": "2024-06-02T14:15:08.933", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MileSight DeviceHub - \n\n\n\n\n\nCWE-330 Use of Insufficiently Random Values may allow Authentication Bypass" + }, + { + "lang": "es", + "value": "MileSight DeviceHub: CWE-330 El uso de valores insuficientemente aleatorios puede permitir la omisi\u00f3n de autenticaci\u00f3n" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json index d36b204f325..49c752b6751 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36390.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36390", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:09.163", - "lastModified": "2024-06-02T14:15:09.163", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MileSight DeviceHub -\u00a0CWE-20 Improper Input Validation may allow Denial of Service" + }, + { + "lang": "es", + "value": "MileSight DeviceHub: CWE-20 La validaci\u00f3n de entrada incorrecta puede permitir la denegaci\u00f3n de servicio" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json index d00830588bf..41c0d6b8066 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36391.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36391", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:09.413", - "lastModified": "2024-06-02T14:15:09.413", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MileSight DeviceHub -\u00a0CWE-320: Key Management Errors may allow Authentication Bypass and Man-In-The-Middle Traffic" + }, + { + "lang": "es", + "value": "MileSight DeviceHub - CWE-320: Los errores de administraci\u00f3n de claves pueden permitir la omisi\u00f3n de autenticaci\u00f3n y el tr\u00e1fico de intermediario" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json index e50aff30cfe..4404dcec32a 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36392.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36392", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-02T14:15:09.643", - "lastModified": "2024-06-02T14:15:09.643", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MileSight DeviceHub -\u00a0CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + }, + { + "lang": "es", + "value": "MileSight DeviceHub - CWE-79: Neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\"cross-site scripting\")" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36568.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36568.json new file mode 100644 index 00000000000..ca929bdbc62 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36568.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36568", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-03T14:15:09.147", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Sourcecodester Gas Agency Management System v1.0 is vulnerable to SQL Injection via /gasmark/editbrand.php?id=." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/debug601/bug_report/blob/main/vendors/mayuri_k/gas-agency-management-system/SQL-1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36569.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36569.json new file mode 100644 index 00000000000..99523c1b133 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36569.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36569", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-03T14:15:09.243", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Sourcecodester Gas Agency Management System v1.0 is vulnerable to arbitrary code execution via editClientImage.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/debug601/bug_report/blob/main/vendors/mayuri_k/gas-agency-management-system/RCE-1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36728.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36728.json new file mode 100644 index 00000000000..73b189f508e --- /dev/null +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36728.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36728", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-03T14:15:09.330", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action vlan_setting with a sufficiently long dns1 or dns 2 key." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/HouseFuzz/reports/blob/main/trendnet/TEW827/vlan_setting/vlan_setting.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36729.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36729.json new file mode 100644 index 00000000000..cb0e25f7909 --- /dev/null +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36729.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36729", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-03T14:15:09.433", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wizard_ipv6 with a sufficiently long reboot_type key." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/HouseFuzz/reports/blob/main/trendnet/TEW827/wizard_ipv6/wizard_ipv6.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json index 3bb6aaef8f2..0def331e5f1 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36843.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36843", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T20:15:10.290", - "lastModified": "2024-05-31T20:15:10.290", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "libmodbus v3.1.6 was discovered to contain a heap overflow via the modbus_mapping_free() function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que libmodbus v3.1.6 conten\u00eda un desbordamiento del mont\u00f3n mediante la funci\u00f3n modbus_mapping_free()." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36844.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36844.json index b89bc0b2107..64a573ab1c2 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36844.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36844.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36844", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T20:15:10.380", - "lastModified": "2024-05-31T20:15:10.380", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "libmodbus v3.1.6 was discovered to contain a use-after-free via the ctx->backend pointer. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que libmodbus v3.1.6 contiene un use-after-free a trav\u00e9s del puntero ctx->backend. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante un mensaje manipulado enviado al servidor de prueba unitaria." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json index 627707d5153..a9196a9946e 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36845.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36845", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-31T20:15:10.463", - "lastModified": "2024-05-31T20:15:10.463", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An invalid pointer in the modbus_receive() function of libmodbus v3.1.6 allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server." + }, + { + "lang": "es", + "value": "Un puntero no v\u00e1lido en la funci\u00f3n modbus_receive() de libmodbus v3.1.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un mensaje manipulado enviado al servidor de prueba unitaria." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json index 56470616ab6..580daaa2d8c 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.557", - "lastModified": "2024-06-03T08:15:09.557", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix invalid reads in fence signaled events\n\nCorrectly set the length of the drm_event to the size of the structure\nthat's actually used.\n\nThe length of the drm_event was set to the parent structure instead of\nto the drm_vmw_event_fence which is supposed to be read. drm_read\nuses the length parameter to copy the event to the user space thus\nresuling in oob reads." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: corrige lecturas no v\u00e1lidas en eventos se\u00f1alizados de valla establezca correctamente la longitud de drm_event al tama\u00f1o de la estructura que realmente se utiliza. La longitud de drm_event se configur\u00f3 en la estructura principal en lugar de en drm_vmw_event_fence que se supone debe leerse. drm_read usa el par\u00e1metro de longitud para copiar el evento al espacio del usuario, lo que resulta en lecturas oob." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36961.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36961.json index 3693783d342..ed94362b01c 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36961.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36961.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36961", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.660", - "lastModified": "2024-06-03T08:15:09.660", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/debugfs: Fix two locking issues with thermal zone debug\n\nWith the current thermal zone locking arrangement in the debugfs code,\nuser space can open the \"mitigations\" file for a thermal zone before\nthe zone's debugfs pointer is set which will result in a NULL pointer\ndereference in tze_seq_start().\n\nMoreover, thermal_debug_tz_remove() is not called under the thermal\nzone lock, so it can run in parallel with the other functions accessing\nthe thermal zone's struct thermal_debugfs object. Then, it may clear\ntz->debugfs after one of those functions has checked it and the\nstruct thermal_debugfs object may be freed prematurely.\n\nTo address the first problem, pass a pointer to the thermal zone's\nstruct thermal_debugfs object to debugfs_create_file() in\nthermal_debug_tz_add() and make tze_seq_start(), tze_seq_next(),\ntze_seq_stop(), and tze_seq_show() retrieve it from s->private\ninstead of a pointer to the thermal zone object. This will ensure\nthat tz_debugfs will be valid across the \"mitigations\" file accesses\nuntil thermal_debugfs_remove_id() called by thermal_debug_tz_remove()\nremoves that file.\n\nTo address the second problem, use tz->lock in thermal_debug_tz_remove()\naround the tz->debugfs value check (in case the same thermal zone is\nremoved at the same time in two different threads) and its reset to NULL.\n\nCc :6.8+ # 6.8+" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Thermal/debugfs: soluciona dos problemas de bloqueo con la depuraci\u00f3n de la zona t\u00e9rmica. Con la disposici\u00f3n actual de bloqueo de la zona t\u00e9rmica en el c\u00f3digo debugfs, el espacio de usuario puede abrir el archivo de \"mitigaciones\" para una zona t\u00e9rmica antes. El puntero debugfs de la zona est\u00e1 configurado, lo que dar\u00e1 como resultado una desreferencia del puntero NULL en tze_seq_start(). Adem\u00e1s, Thermal_debug_tz_remove() no se llama bajo el bloqueo de la zona t\u00e9rmica, por lo que puede ejecutarse en paralelo con las otras funciones que acceden al objeto struct Thermal_debugfs de la zona t\u00e9rmica. Luego, puede borrar tz->debugfs despu\u00e9s de que una de esas funciones lo haya verificado y el objeto struct Thermal_debugfs puede liberarse prematuramente. Para solucionar el primer problema, pase un puntero al objeto struct Thermal_debugfs de la zona t\u00e9rmica para debugfs_create_file() en Thermal_debug_tz_add() y haga que tze_seq_start(), tze_seq_next(), tze_seq_stop() y tze_seq_show() lo recuperen de s->private. de un puntero al objeto de la zona t\u00e9rmica. Esto garantizar\u00e1 que tz_debugfs sea v\u00e1lido en todos los accesos a archivos de \"mitigaciones\" hasta que Thermal_debugfs_remove_id() llamado por Thermal_debug_tz_remove() elimine ese archivo. Para solucionar el segundo problema, use tz->lock en Thermal_debug_tz_remove() alrededor de la verificaci\u00f3n del valor de tz->debugfs (en caso de que la misma zona t\u00e9rmica se elimine al mismo tiempo en dos subprocesos diferentes) y se restablezca a NULL. CC :6.8+ # 6.8+" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json index 6f618f470a2..5e7d11ab12e 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36962.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36962", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.740", - "lastModified": "2024-06-03T08:15:09.740", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ks8851: Queue RX packets in IRQ handler instead of disabling BHs\n\nCurrently the driver uses local_bh_disable()/local_bh_enable() in its\nIRQ handler to avoid triggering net_rx_action() softirq on exit from\nnetif_rx(). The net_rx_action() could trigger this driver .start_xmit\ncallback, which is protected by the same lock as the IRQ handler, so\ncalling the .start_xmit from netif_rx() from the IRQ handler critical\nsection protected by the lock could lead to an attempt to claim the\nalready claimed lock, and a hang.\n\nThe local_bh_disable()/local_bh_enable() approach works only in case\nthe IRQ handler is protected by a spinlock, but does not work if the\nIRQ handler is protected by mutex, i.e. this works for KS8851 with\nParallel bus interface, but not for KS8851 with SPI bus interface.\n\nRemove the BH manipulation and instead of calling netif_rx() inside\nthe IRQ handler code protected by the lock, queue all the received\nSKBs in the IRQ handler into a queue first, and once the IRQ handler\nexits the critical section protected by the lock, dequeue all the\nqueued SKBs and push them all into netif_rx(). At this point, it is\nsafe to trigger the net_rx_action() softirq, since the netif_rx()\ncall is outside of the lock that protects the IRQ handler." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ks8851: Cola de paquetes RX en el controlador IRQ en lugar de deshabilitar los BH Actualmente, el controlador usa local_bh_disable()/local_bh_enable() en su controlador IRQ para evitar activar el softirq net_rx_action() al salir de netif_rx(). net_rx_action() podr\u00eda activar esta devoluci\u00f3n de llamada del controlador .start_xmit, que est\u00e1 protegido por el mismo candado que el controlador IRQ, por lo que llamar al .start_xmit desde netif_rx() desde la secci\u00f3n cr\u00edtica del controlador IRQ protegido por el bloqueo podr\u00eda llevar a un intento de reclamar el candado ya reclamado y un colgado. El enfoque local_bh_disable()/local_bh_enable() funciona s\u00f3lo en caso de que el controlador IRQ est\u00e9 protegido por un spinlock, pero no funciona si el controlador IRQ est\u00e1 protegido por mutex, es decir, esto funciona para KS8851 con interfaz de bus paralelo, pero no para KS8851 con Interfaz de bus SPI. Elimine la manipulaci\u00f3n de BH y en lugar de llamar a netif_rx() dentro del c\u00f3digo del controlador IRQ protegido por el bloqueo, primero ponga en cola todos los SKB recibidos en el controlador IRQ y, una vez que el controlador IRQ salga de la secci\u00f3n cr\u00edtica protegida por el bloqueo, retire la cola. todos los SKB en cola y env\u00edelos todos a netif_rx(). En este punto, es seguro activar el softirq net_rx_action(), ya que la llamada netif_rx() est\u00e1 fuera del bloqueo que protege el controlador IRQ." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36963.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36963.json index 69eea5d7da9..cc84be4d59d 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36963.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36963.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36963", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.820", - "lastModified": "2024-06-03T08:15:09.820", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracefs: Reset permissions on remount if permissions are options\n\nThere's an inconsistency with the way permissions are handled in tracefs.\nBecause the permissions are generated when accessed, they default to the\nroot inode's permission if they were never set by the user. If the user\nsets the permissions, then a flag is set and the permissions are saved via\nthe inode (for tracefs files) or an internal attribute field (for\neventfs).\n\nBut if a remount happens that specify the permissions, all the files that\nwere not changed by the user gets updated, but the ones that were are not.\nIf the user were to remount the file system with a given permission, then\nall files and directories within that file system should be updated.\n\nThis can cause security issues if a file's permission was updated but the\nadmin forgot about it. They could incorrectly think that remounting with\npermissions set would update all files, but miss some.\n\nFor example:\n\n # cd /sys/kernel/tracing\n # chgrp 1002 current_tracer\n # ls -l\n[..]\n -rw-r----- 1 root root 0 May 1 21:25 buffer_size_kb\n -rw-r----- 1 root root 0 May 1 21:25 buffer_subbuf_size_kb\n -r--r----- 1 root root 0 May 1 21:25 buffer_total_size_kb\n -rw-r----- 1 root lkp 0 May 1 21:25 current_tracer\n -rw-r----- 1 root root 0 May 1 21:25 dynamic_events\n -r--r----- 1 root root 0 May 1 21:25 dyn_ftrace_total_info\n -r--r----- 1 root root 0 May 1 21:25 enabled_functions\n\nWhere current_tracer now has group \"lkp\".\n\n # mount -o remount,gid=1001 .\n # ls -l\n -rw-r----- 1 root tracing 0 May 1 21:25 buffer_size_kb\n -rw-r----- 1 root tracing 0 May 1 21:25 buffer_subbuf_size_kb\n -r--r----- 1 root tracing 0 May 1 21:25 buffer_total_size_kb\n -rw-r----- 1 root lkp 0 May 1 21:25 current_tracer\n -rw-r----- 1 root tracing 0 May 1 21:25 dynamic_events\n -r--r----- 1 root tracing 0 May 1 21:25 dyn_ftrace_total_info\n -r--r----- 1 root tracing 0 May 1 21:25 enabled_functions\n\nEverything changed but the \"current_tracer\".\n\nAdd a new link list that keeps track of all the tracefs_inodes which has\nthe permission flags that tell if the file/dir should use the root inode's\npermission or not. Then on remount, clear all the flags so that the\ndefault behavior of using the root inode's permission is done for all\nfiles and directories." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tracefs: restablece los permisos al volver a montar si los permisos son opciones. Hay una inconsistencia en la forma en que se manejan los permisos en tracefs. Debido a que los permisos se generan cuando se accede a ellos, de forma predeterminada son los permisos del inodo ra\u00edz si el usuario nunca los configur\u00f3. Si el usuario establece los permisos, entonces se establece una bandera y los permisos se guardan a trav\u00e9s del inodo (para archivos tracefs) o un campo de atributo interno (para eventfs). Pero si ocurre un reinicio que especifica los permisos, todos los archivos que no fueron modificados por el usuario se actualizan, pero los que s\u00ed no lo fueron. Si el usuario volviera a montar el sistema de archivos con un permiso determinado, entonces todos los archivos y directorios dentro de ese sistema de archivos deber\u00edan actualizarse. Esto puede causar problemas de seguridad si se actualiz\u00f3 el permiso de un archivo pero el administrador lo olvid\u00f3. Podr\u00edan pensar incorrectamente que volver a montar con los permisos establecidos actualizar\u00eda todos los archivos, pero perder\u00eda algunos. Por ejemplo: # cd /sys/kernel/tracing # chgrp 1002 current_tracer # ls -l [..] -rw-r----- 1 ra\u00edz ra\u00edz 0 1 de mayo 21:25 buffer_size_kb -rw-r---- - 1 ra\u00edz ra\u00edz 0 1 de mayo 21:25 buffer_subbuf_size_kb -r--r----- 1 ra\u00edz ra\u00edz 0 1 de mayo 21:25 buffer_total_size_kb -rw-r----- 1 ra\u00edz lkp 0 1 de mayo 21:25 current_tracer -rw-r----- 1 ra\u00edz ra\u00edz 0 1 de mayo 21:25 Dynamic_events -r--r----- 1 ra\u00edz ra\u00edz 0 1 de mayo 21:25 dyn_ftrace_total_info -r--r----- 1 root root 0 1 de mayo 21:25 enable_functions Donde current_tracer ahora tiene el grupo \"lkp\". # montar -o remontar, gid=1001. # ls -l -rw-r----- 1 rastreo de ra\u00edz 0 1 de mayo 21:25 buffer_size_kb -rw-r----- 1 rastreo de ra\u00edz 0 1 de mayo 21:25 buffer_subbuf_size_kb -r--r--- -- 1 rastreo de ra\u00edz 0 1 de mayo 21:25 buffer_total_size_kb -rw-r----- 1 rastreo de ra\u00edz 0 1 de mayo 21:25 current_tracer -rw-r----- 1 rastreo de ra\u00edz 0 1 de mayo 21:25 Dynamic_events -r--r----- 1 rastreo de ra\u00edz 0 1 de mayo 21:25 dyn_ftrace_total_info -r--r----- 1 rastreo de ra\u00edz 0 1 de mayo 21:25 enable_functions Todo cambi\u00f3 excepto el \"current_tracer\". Agregue una nueva lista de enlaces que realice un seguimiento de todos los tracefs_inodes que tienen indicadores de permiso que indican si el archivo/directorio debe usar el permiso del inodo ra\u00edz o no. Luego, al volver a montar, borre todas las banderas para que el comportamiento predeterminado de usar el permiso del inodo ra\u00edz se realice para todos los archivos y directorios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json index 46482f4338a..0afa1a7e45c 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36964", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.903", - "lastModified": "2024-06-03T08:15:09.903", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000's perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs/9p: solo traduce permisos RWX para 9P2000 simple. Se permite el paso de basura en bits permanentes de 9P2000 simple, lo que hace que pueda establecer (entre otros) el bit suid. Probablemente esta no era la intenci\u00f3n, ya que los bits extendidos de Unix se manejan expl\u00edcita y condicionalmente en .u." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37031.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37031.json index b896e96e4e5..d61f2fce60a 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37031.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37031.json @@ -2,12 +2,16 @@ "id": "CVE-2024-37031", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T06:15:10.143", - "lastModified": "2024-06-03T06:15:10.143", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Active Admin (aka activeadmin) framework before 3.2.2 for Ruby on Rails allows stored XSS in certain situations where users can create entities (to be later edited in forms) with arbitrary names, aka a \"dynamic form legends\" issue. 4.0.0.beta7 is also a fixed version." + }, + { + "lang": "es", + "value": "El framework Active Admin (tambi\u00e9n conocido como activeadmin) anterior a 3.2.2 para Ruby on Rails permite almacenar XSS en ciertas situaciones en las que los usuarios pueden crear entidades (para editarlas luego en formularios) con nombres arbitrarios, tambi\u00e9n conocido como un problema de \"leyendas de formularios din\u00e1micos\". 4.0.0.beta7 tambi\u00e9n es una versi\u00f3n fija." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3820.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3820.json index a0bbd9e159e..66ee6d97f53 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3820.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3820.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3820", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T09:15:09.660", - "lastModified": "2024-06-01T09:15:09.660", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The wpDataTables \u2013 WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to SQL Injection via the 'id_key' parameter of the wdt_delete_table_row AJAX action in all versions up to, and including, 6.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Please note this only affects the premium version of the plugin." + }, + { + "lang": "es", + "value": "El complemento wpDataTables \u2013 WordPress Data Table, Dynamic Tables & Table Charts Plugin para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id_key' de la acci\u00f3n AJAX wdt_delete_table_row en todas las versiones hasta la 6.3.1 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos. Tenga en cuenta que esto solo afecta a la versi\u00f3n premium del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3821.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3821.json index cd998d51d9d..f9b5cbb5e81 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3821.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3821.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3821", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T09:15:09.863", - "lastModified": "2024-06-01T09:15:09.863", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The wpDataTables \u2013 WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the wdt_ajax_actions.php file in all versions up to, and including, 6.3.2. This makes it possible for unauthenticated attackers to manipulate data tables. Please note this only affects the premium version of the plugin." + }, + { + "lang": "es", + "value": "El complemento wpDataTables \u2013 WordPress Data Table, Dynamic Tables & Table Charts Plugin para WordPress es vulnerable al acceso no autorizado debido a una falta de verificaci\u00f3n de capacidad en varias funciones en el archivo wdt_ajax_actions.php en todas las versiones hasta la 6.3.2 incluida. Esto hace posible que atacantes no autenticados manipulen tablas de datos. Tenga en cuenta que esto solo afecta a la versi\u00f3n premium del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3829.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3829.json index f295ad559e0..71ecc0fad00 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3829.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3829.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3829", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-03T10:15:14.267", - "lastModified": "2024-06-03T10:15:14.267", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4087.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4087.json index 197f05c66e9..3a2afe50b5f 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4087.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4087.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4087", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T06:15:08.340", - "lastModified": "2024-06-01T06:15:08.340", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Back to Top widget in all versions up to, and including, 1.3.975 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Volver al principio del complemento en todas las versiones hasta la 1.3.975 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4148.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4148.json index 7812ba55f60..a0437b9f76b 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4148.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4148.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4148", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-01T16:15:07.563", - "lastModified": "2024-06-01T16:15:07.563", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary application, version 1.2.10. An attacker can exploit this vulnerability by maliciously manipulating regular expressions, which can significantly impact the response time of the application and potentially render it completely non-functional. Specifically, the vulnerability can be triggered by sending a specially crafted request to the application, leading to a denial of service where the application crashes." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) en la aplicaci\u00f3n lunary-ai/lunary, versi\u00f3n 1.2.10. Un atacante puede aprovechar esta vulnerabilidad manipulando maliciosamente expresiones regulares, lo que puede afectar significativamente el tiempo de respuesta de la aplicaci\u00f3n y potencialmente hacerla completamente no funcional. Espec\u00edficamente, la vulnerabilidad puede desencadenarse enviando una solicitud especialmente manipulada a la aplicaci\u00f3n, lo que lleva a una denegaci\u00f3n de servicio donde la aplicaci\u00f3n falla." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4342.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4342.json index adc27620bdd..ea6ea2cfdc2 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4342.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4342.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4342", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T06:15:09.520", - "lastModified": "2024-06-01T06:15:09.520", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's image hotspot, image accordion, off canvas, woogrid, and product mini cart widgets in all versions up to, and including, 1.3.975 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Royal Elementor Addons and Templates para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del punto de acceso de imagen, acorde\u00f3n de imagen, fuera del lienzo, woogrid y widgets de mini carrito de productos del complemento en todas las versiones hasta la 1.3.975 incluida debido a una sanitizaci\u00f3n insuficiente de los insumos y escape de los productos. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4344.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4344.json index 95a6f0d2aec..65341b68f87 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4344.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4344.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4344", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-02T05:15:47.620", - "lastModified": "2024-06-02T05:15:47.620", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Shield Security \u2013 Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 19.1.13. This is due to missing or incorrect nonce validation on the exec function. This makes it possible for unauthenticated attackers to disable pin protection for the admin interface of the plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Shield Security \u2013 Smart Bot Blocking & Intrusion Prevention Security para WordPress es vulnerable a la Cross-Site Request Forgery en todas las versiones hasta la 19.1.13 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n ejecutiva. Esto hace posible que atacantes no autenticados deshabiliten la protecci\u00f3n mediante PIN para la interfaz de administraci\u00f3n del complemento mediante una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4711.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4711.json index 845929aec2d..590422693fe 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4711.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4711.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4711", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T03:15:08.413", - "lastModified": "2024-06-01T03:15:08.413", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The WordPress Infinite Scroll \u2013 Ajax Load More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ajax_load_more shortcode in versions up to, and including, 7.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WordPress Infinite Scroll \u2013 Ajax Load More para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto ajax_load_more en versiones hasta la 7.1.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4958.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4958.json index db258215131..6cc3d479061 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4958.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4958.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4958", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T08:15:08.637", - "lastModified": "2024-06-01T08:15:08.637", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The User Registration \u2013 Custom Registration Form, Login Form, and User Profile WordPress Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'import_form_action' function in versions up to, and including, 3.2.0.1. This makes it possible for authenticated attackers, with contributor-level permissions and above, to import a registration form with a default user role of administrator. If an administrator approves or publishes a post or page with the shortcode to the imported form, any user can register as an administrator." + }, + { + "lang": "es", + "value": "El complemento User Registration \u2013 Custom Registration Form, Login Form, and User Profile WordPress Plugin para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'import_form_action' en versiones hasta la 3.2.0.1 incluida. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, importen un formulario de registro con una funci\u00f3n de usuario predeterminada de administrador. Si un administrador aprueba o publica una publicaci\u00f3n o p\u00e1gina con el c\u00f3digo corto del formulario importado, cualquier usuario puede registrarse como administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5138.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5138.json index 7decaa93a6b..cd9fd680813 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5138.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5138.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5138", "sourceIdentifier": "security@ubuntu.com", "published": "2024-05-31T21:15:09.930", - "lastModified": "2024-05-31T21:15:09.930", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar." + }, + { + "lang": "es", + "value": "El componente snapctl dentro de snapd permite que un complemento confinado interact\u00fae con el daemon snapd para realizar ciertas acciones privilegiadas en nombre del complemento. Se descubri\u00f3 que snapctl no analizaba adecuadamente los argumentos de la l\u00ednea de comandos, lo que permit\u00eda a un usuario sin privilegios activar una acci\u00f3n autorizada en nombre del complemento que normalmente requerir\u00eda privilegios de administrador para realizarse. Esto posiblemente podr\u00eda permitir que un usuario sin privilegios realice una denegaci\u00f3n de servicio o algo similar." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5197.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5197.json new file mode 100644 index 00000000000..1c3576d1101 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5197.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-5197", + "sourceIdentifier": "cve-coordination@google.com", + "published": "2024-06-03T14:15:09.520", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "There exists interger overflows in libvpx in versions prior to 1.14.1.\u00a0Calling vpx_img_alloc()\u00a0with a large value of the d_w, d_h, or align\u00a0parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t\u00a0struct may be invalid.\u00a0Calling vpx_img_wrap()\u00a0with a large value of the d_w, d_h, or stride_align\u00a0parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t\u00a0struct may be invalid. We recommend upgrading to version 1.14.1 or beyond" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://g-issues.chromium.org/issues/332382766", + "source": "cve-coordination@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5311.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5311.json index 3082d2ea23b..154070db998 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5311.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5311", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-06-03T07:15:10.163", - "lastModified": "2024-06-03T07:15:10.163", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5348.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5348.json index 1e76853ad8b..3a288489268 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5348.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5348.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5348", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T09:15:10.063", - "lastModified": "2024-06-01T09:15:10.063", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Elements For Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.1 via the 'beforeafter_layout' attribute of the beforeafter widget, the 'eventsgrid_layout' attribute of the eventsgrid and list widgets, the 'marquee_layout' attribute of the marquee widget, the 'postgrid_layout' attribute of the postgrid widget, the 'woocart_layout' attribute of the woocart widget, and the 'woogrid_layout' attribute of the woogrid widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Elements For Elementor para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 2.1 incluida a trav\u00e9s del atributo 'beforeafter_layout' del widget beforeafter, el atributo 'eventsgrid_layout' de los widgets de lista y grid de eventos, el 'marquee_layout' atributo del widget de marquesina, el atributo 'postgrid_layout' del widget postgrid, el atributo 'woocart_layout' del widget woocart y el atributo 'woogrid_layout' del widget woogrid. Esto hace posible que atacantes autenticados, con acceso de nivel Colaborador y superior, incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en los casos en que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json index ac21ea22603..be1eb5d9623 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5404", "sourceIdentifier": "info@cert.vde.com", "published": "2024-06-03T09:15:10.193", - "lastModified": "2024-06-03T09:15:10.193", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5501.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5501.json index 64685a6d925..ff0dbc97fc3 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5501.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5501.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5501", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-01T06:15:09.993", - "lastModified": "2024-06-01T06:15:09.993", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Supreme Modules Lite \u2013 Divi Theme, Extra Theme and Divi Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018button_one_id\u2019 parameter in all versions up to, and including, 2.5.51 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Supreme Modules Lite \u2013 Divi Theme, Extra Theme and Divi Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'button_one_id' en todas las versiones hasta la 2.5.51 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y un escape de salida. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5564.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5564.json index 1d5cae21226..51c48dc17cf 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5564.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5564.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5564", "sourceIdentifier": "secalert@redhat.com", "published": "2024-05-31T19:15:08.883", - "lastModified": "2024-05-31T19:15:08.883", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en libndp. Esta falla permite que un usuario malintencionado local provoque un desbordamiento del b\u00fafer en NetworkManager, provocado al enviar un paquete de publicidad de enrutador IPv6 con formato incorrecto. Este problema se produjo porque libndp no validaba correctamente la informaci\u00f3n de longitud de la ruta." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5587.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5587.json index 2afde82126d..18bd84ac599 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5587.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5587.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5587", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-02T10:15:07.427", - "lastModified": "2024-06-02T10:15:07.427", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Casdoor up to 1.335.0. It has been classified as problematic. Affected is an unknown function of the file /conf/app.conf of the component Configuration File Handler. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-266838 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Casdoor hasta 1.335.0. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /conf/app.conf del componente Configuration File Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a archivos o directorios accesibles. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-266838 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5588.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5588.json index 7fdaa0164c6..95ffd7cca31 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5588.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5588.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5588", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-02T15:15:08.230", - "lastModified": "2024-06-02T15:15:08.230", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Learning Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file processscore.php. The manipulation of the argument LessonID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266839." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en itsourcecode Learning Management System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo Processscore.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento LessonID conduce a la inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-266839." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5589.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5589.json index e44bd6c19ae..2181ac5a81b 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5589.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5589.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5589", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-03T01:15:50.153", - "lastModified": "2024-06-03T01:15:50.153", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /admin/config_MT.php?action=delete. The manipulation of the argument Mid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266847. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Netentsec NS-ASG Application Security Gateway 6.3. Ha sido clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /admin/config_MT.php?action=delete. La manipulaci\u00f3n del argumento Mid conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-266847. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5590.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5590.json index 4b97d96b7f8..ad84a16e1f1 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5590.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5590.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5590", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-03T01:15:50.490", - "lastModified": "2024-06-03T01:15:50.490", - "vulnStatus": "Received", + "lastModified": "2024-06-03T14:46:24.250", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been declared as critical. This vulnerability affects unknown code of the file /protocol/iscuser/uploadiscuser.php of the component JSON Content Handler. The manipulation of the argument messagecontent leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266848. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Netentsec NS-ASG Application Security Gateway 6.3. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /protocol/iscuser/uploadiscuser.php del componente JSON Content Handler. La manipulaci\u00f3n del argumento contenido del mensaje conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-266848. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/README.md b/README.md index e3a39f31ce8..45862ab68ef 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-03T14:00:33.866038+00:00 +2024-06-03T16:00:38.722644+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-03T13:15:08.890000+00:00 +2024-06-03T15:15:09.547000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -252450 +252460 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `10` -- [CVE-2024-34385](CVE-2024/CVE-2024-343xx/CVE-2024-34385.json) (`2024-06-03T12:15:08.870`) -- [CVE-2024-34764](CVE-2024/CVE-2024-347xx/CVE-2024-34764.json) (`2024-06-03T12:15:09.120`) -- [CVE-2024-34766](CVE-2024/CVE-2024-347xx/CVE-2024-34766.json) (`2024-06-03T12:15:09.357`) -- [CVE-2024-34767](CVE-2024/CVE-2024-347xx/CVE-2024-34767.json) (`2024-06-03T12:15:09.610`) -- [CVE-2024-34769](CVE-2024/CVE-2024-347xx/CVE-2024-34769.json) (`2024-06-03T12:15:09.867`) -- [CVE-2024-34770](CVE-2024/CVE-2024-347xx/CVE-2024-34770.json) (`2024-06-03T12:15:10.120`) -- [CVE-2024-35632](CVE-2024/CVE-2024-356xx/CVE-2024-35632.json) (`2024-06-03T12:15:10.367`) +- [CVE-2024-0336](CVE-2024/CVE-2024-03xx/CVE-2024-0336.json) (`2024-06-03T14:15:08.900`) +- [CVE-2024-36123](CVE-2024/CVE-2024-361xx/CVE-2024-36123.json) (`2024-06-03T15:15:08.843`) +- [CVE-2024-36124](CVE-2024/CVE-2024-361xx/CVE-2024-36124.json) (`2024-06-03T15:15:09.090`) +- [CVE-2024-36127](CVE-2024/CVE-2024-361xx/CVE-2024-36127.json) (`2024-06-03T15:15:09.307`) +- [CVE-2024-36128](CVE-2024/CVE-2024-361xx/CVE-2024-36128.json) (`2024-06-03T15:15:09.547`) +- [CVE-2024-36568](CVE-2024/CVE-2024-365xx/CVE-2024-36568.json) (`2024-06-03T14:15:09.147`) +- [CVE-2024-36569](CVE-2024/CVE-2024-365xx/CVE-2024-36569.json) (`2024-06-03T14:15:09.243`) +- [CVE-2024-36728](CVE-2024/CVE-2024-367xx/CVE-2024-36728.json) (`2024-06-03T14:15:09.330`) +- [CVE-2024-36729](CVE-2024/CVE-2024-367xx/CVE-2024-36729.json) (`2024-06-03T14:15:09.433`) +- [CVE-2024-5197](CVE-2024/CVE-2024-51xx/CVE-2024-5197.json) (`2024-06-03T14:15:09.520`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `126` -- [CVE-2023-49086](CVE-2023/CVE-2023-490xx/CVE-2023-49086.json) (`2024-06-03T13:15:08.890`) +- [CVE-2024-36960](CVE-2024/CVE-2024-369xx/CVE-2024-36960.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-36961](CVE-2024/CVE-2024-369xx/CVE-2024-36961.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-36962](CVE-2024/CVE-2024-369xx/CVE-2024-36962.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-36963](CVE-2024/CVE-2024-369xx/CVE-2024-36963.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-36964](CVE-2024/CVE-2024-369xx/CVE-2024-36964.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-37031](CVE-2024/CVE-2024-370xx/CVE-2024-37031.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-3820](CVE-2024/CVE-2024-38xx/CVE-2024-3820.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-3821](CVE-2024/CVE-2024-38xx/CVE-2024-3821.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-3829](CVE-2024/CVE-2024-38xx/CVE-2024-3829.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-4087](CVE-2024/CVE-2024-40xx/CVE-2024-4087.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-4148](CVE-2024/CVE-2024-41xx/CVE-2024-4148.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-4342](CVE-2024/CVE-2024-43xx/CVE-2024-4342.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-4344](CVE-2024/CVE-2024-43xx/CVE-2024-4344.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-4711](CVE-2024/CVE-2024-47xx/CVE-2024-4711.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-4958](CVE-2024/CVE-2024-49xx/CVE-2024-4958.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5138](CVE-2024/CVE-2024-51xx/CVE-2024-5138.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5311](CVE-2024/CVE-2024-53xx/CVE-2024-5311.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5348](CVE-2024/CVE-2024-53xx/CVE-2024-5348.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5404](CVE-2024/CVE-2024-54xx/CVE-2024-5404.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5501](CVE-2024/CVE-2024-55xx/CVE-2024-5501.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5564](CVE-2024/CVE-2024-55xx/CVE-2024-5564.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5587](CVE-2024/CVE-2024-55xx/CVE-2024-5587.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5588](CVE-2024/CVE-2024-55xx/CVE-2024-5588.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5589](CVE-2024/CVE-2024-55xx/CVE-2024-5589.json) (`2024-06-03T14:46:24.250`) +- [CVE-2024-5590](CVE-2024/CVE-2024-55xx/CVE-2024-5590.json) (`2024-06-03T14:46:24.250`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c466627d527..0f21cf00987 100644 --- a/_state.csv +++ b/_state.csv @@ -231302,7 +231302,7 @@ CVE-2023-42419,0,0,e2fcc77eaa863f71e635a0b9b62635de4a65677cae31fdb25ad8667675011 CVE-2023-4242,0,0,9e6641b32a4726c582bab0ab2ad666c1d22d35d37ff41436ee9d550833c4de53,2023-11-07T04:22:21.677000 CVE-2023-42425,0,0,d103db8ab2cb9fd916409787c5907e84cf193d69b068a942b20e7f729c914b96,2023-11-09T00:06:40.200000 CVE-2023-42426,0,0,f2b27a2bfd49dfdf24a8d2e1d4dd58b678c541239c81fb46ad6d517a97642ae2,2023-09-26T14:39:54.583000 -CVE-2023-42427,0,0,c2b1934dab446eb1c5926250c420e693f87694cafd5983d2df2656d766378153,2024-06-03T04:15:08.830000 +CVE-2023-42427,0,1,44f0ab874878e92a86b9b62037c57f0af407b9b23ee5ce4efe6fb1f869065cc6,2024-06-03T14:46:24.250000 CVE-2023-42428,0,0,1a5186fae785f2468c230055be6fba9923a6ee7c94f2b365f251aa993fa249ba,2023-11-22T00:05:52.117000 CVE-2023-42429,0,0,716e6dbe083c19347a98c7e366c8d5f52ecf63acfa5a9c244a2604ac14a72d7d,2024-01-30T14:20:32.207000 CVE-2023-4243,0,0,b240fe9b00ad77e83f43eb1cb37a923cc50a357d33a8359ca23c1bcb45e3c918,2023-11-07T04:22:21.837000 @@ -232067,27 +232067,27 @@ CVE-2023-43533,0,0,cec1346ee365b50af03fb7e0ce641c9f914a9a51fe3e4e72d4a1c1a0cbf8c CVE-2023-43534,0,0,dba7439cea4cfc2b29f72af250575fb4036c5493c63694f3d269d919ecc92250,2024-04-12T16:15:35.230000 CVE-2023-43535,0,0,e1269d8d312a2ceaa4b0553616412d9d494e38e4a6f1965a466dad52b8ea60f6,2024-04-12T16:15:35.560000 CVE-2023-43536,0,0,76e2708fa3e9111d6523fd70d0293d879b927b408b44f21ef24c6fb42c1f6097,2024-04-12T16:15:35.820000 -CVE-2023-43537,0,0,1e51cbaadb4db61c51a04b49147eb517e1d05c253892920587cccccbdea42475,2024-06-03T10:15:09.063000 -CVE-2023-43538,0,0,7efd06eefef8a0ae3dc4431e092e96470a555317fa943b6556de5331cda560e8,2024-06-03T10:15:09.937000 +CVE-2023-43537,0,1,7ad46e11461608a133a846efa4778b7063af6977bd617a6d45639c97c345e113,2024-06-03T14:46:24.250000 +CVE-2023-43538,0,1,69b71e570f292b247f4ee9e94942dd14b7d634ce577809a37c08ea7ee1beddcf,2024-06-03T14:46:24.250000 CVE-2023-43539,0,0,a0d10ac25ff0d0f37bc7234eb89facc9efab87ef1fcabd6c86ec9bbddc79c96c,2024-04-12T15:15:21.433000 CVE-2023-4354,0,0,b3a04d1006e2f4eb94ee005944358fcae0c2bb0f216ffa6497c71e2291933a60,2024-01-31T17:15:14.710000 CVE-2023-43540,0,0,efd650e6595c39c8362f88b761fdae11642adf9b9bde5b2fe188649abb18f8e1,2024-04-12T15:15:21.530000 CVE-2023-43541,0,0,dfd1eb041ceb949b871d4f726bdc740a09a5ddb58d3ab0fafb1e00d5a19881d9,2024-04-12T15:15:21.620000 -CVE-2023-43542,0,0,2241cd6b97d978010e5cc33b5d5efcadb49989ec603305757a8cf384b9888e5a,2024-06-03T10:15:10.220000 -CVE-2023-43543,0,0,3f18f59589c3c54ba389cca8e8a40a8684d0aac7c81e50f686a026025fd43b89,2024-06-03T10:15:10.467000 -CVE-2023-43544,0,0,a10b94476746a2b405891b3e8f7bf4692399157f962f6383603ebe3b3840a6ad,2024-06-03T10:15:10.700000 -CVE-2023-43545,0,0,dbbc8faca15dc2c1118283e9db3106032cc58c2467ff147307803df401dedaa9,2024-06-03T10:15:10.907000 +CVE-2023-43542,0,1,7519773f0b2a67b28cd45cab88b13fdfc5e3d6800a2fd19f17fe90750d0e9444,2024-06-03T14:46:24.250000 +CVE-2023-43543,0,1,649b54837fac79abe49a9febce586e0d45b08319a25f4e3bf5299c92cceb94f8,2024-06-03T14:46:24.250000 +CVE-2023-43544,0,1,d979bcae2cdf10f4d1803e0caa470300d201dba8ff71b314566b6de79c2fdc57,2024-06-03T14:46:24.250000 +CVE-2023-43545,0,1,5549243a8a0b7b4baaad42ad938ac5dfbab3f9e65ac12f926ee3cd8cd3e591df,2024-06-03T14:46:24.250000 CVE-2023-43546,0,0,89e5afff2dc3b88b31894eab3ce43642da3b283fc6cb7d2e88a199d429ebcad3,2024-04-12T15:15:21.713000 CVE-2023-43547,0,0,450a59a4b4e1770738d3c56ace390dc05069b1396f6d86001db3ed0a662fe9c5,2024-04-12T15:15:21.810000 CVE-2023-43548,0,0,08de2551449157c1420de1efb291b07e659743dfd8e0661fd70a491331034253,2024-04-12T15:15:21.907000 CVE-2023-43549,0,0,f1de5fa849a4658fa863c5a64278b564558b0de4b9f2143d5edf8ce7fec403b4,2024-04-12T15:15:22.003000 CVE-2023-4355,0,0,c361aa021bb0626a0e307b5cf33dd51fde9986638cf0f3a141e01925b83f1585,2024-01-31T17:15:14.840000 CVE-2023-43550,0,0,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0384,2024-04-12T15:15:22.110000 -CVE-2023-43551,0,0,8189c89b3908130b9d13005d0d874bbcd3f8ede7ba2818c6f346aa0df6e68155,2024-06-03T10:15:11.147000 +CVE-2023-43551,0,1,75a8e4ca0375e95f5856f737b549058440f634635e653c2f39a3a5276ac7e221,2024-06-03T14:46:24.250000 CVE-2023-43552,0,0,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000 CVE-2023-43553,0,0,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000 -CVE-2023-43555,0,0,242eeb2fd5c965c2fd5393936cc73afa54815744d6510c886d351ef16ac0441e,2024-06-03T10:15:11.420000 -CVE-2023-43556,0,0,c8ad3699c541fdfeb7ce585844fcacf6cae91cc37b184913313012644c269d41,2024-06-03T10:15:11.673000 +CVE-2023-43555,0,1,7e937849bb99d3d794d81e983cc7e817314f15e39406eaf39363f51ffa1ed2d5,2024-06-03T14:46:24.250000 +CVE-2023-43556,0,1,ca6c210c4623a48a2cf721a900ca5ed6b77460c16a93579d041dff84c747d19f,2024-06-03T14:46:24.250000 CVE-2023-4356,0,0,51f331be3605818c8ee40c6a87e55b57af1424a9aa9525f64ed6c38dd6cd0ef5,2024-01-31T17:15:14.917000 CVE-2023-43566,0,0,efdf21754c3a0ae7401b084dc8cb36a979c1eb2760f721e694f6e12bacd4880b,2023-09-21T20:01:48.277000 CVE-2023-43567,0,0,9c0ac93c4f06b0c8e85604350b7bccc39b0ec28259b140e4614d9cc5a5c35bf7,2023-11-16T14:27:01.117000 @@ -235707,7 +235707,7 @@ CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4 CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000 CVE-2023-48784,0,0,2c8c9b5cd73fccd6bf717ce3db3d03b76214161101a0e621003f928d07a57cf5,2024-04-17T12:15:07.353000 CVE-2023-48788,0,0,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc141,2024-05-23T18:00:08.207000 -CVE-2023-48789,0,0,0571bd4a37f3c97e6d8e9b10601719eec33455abb7eb3af2a2662d718dd67176,2024-06-03T08:15:08.507000 +CVE-2023-48789,0,1,1e0645fec7ea3fad71b3ca71ed4dc6753766cac9708402fdc1f8d159af41e8e9,2024-06-03T14:46:24.250000 CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000 @@ -235864,7 +235864,7 @@ CVE-2023-49082,0,0,bfa07d376afe2311c6661145ec0bab012ae854aea62f7773df123f8476302 CVE-2023-49083,0,0,84c961ff7d04e706fd092550d92b72dfdc151068b0c299c2093dabee6d742a30,2024-02-17T02:15:45.350000 CVE-2023-49084,0,0,25e2ae32a44a598d2e12991dd9a08ad3d6a8538d7d217cffb3dc9a6f2c56faee,2024-03-18T20:15:08.333000 CVE-2023-49085,0,0,f332ba9dfbf70fc5fc68848d3f22dc5af5a2ec46273d88ee9f960427fe84249a,2024-03-18T20:15:08.467000 -CVE-2023-49086,0,1,0cb64efad0d9c51da2e639a1540773ddeb03720015c73f4e02832951051f13e5,2024-06-03T13:15:08.890000 +CVE-2023-49086,0,0,0cb64efad0d9c51da2e639a1540773ddeb03720015c73f4e02832951051f13e5,2024-06-03T13:15:08.890000 CVE-2023-49087,0,0,345302e91c4f8af0f1656a18b8b7d19d41c4acc3896a2d1653d33762bb5db028,2023-12-06T17:49:44.997000 CVE-2023-49088,0,0,6b7b6e25a0ecf362f624563a02be94c5573b9ac3e15061c7a6e31349a8cd7443,2024-03-18T20:15:08.690000 CVE-2023-49089,0,0,10861b7eace9025a1fa38b48a119fbb1e646ae736869241927f56b5d9a1b7a60,2023-12-14T21:00:33.137000 @@ -237254,7 +237254,7 @@ CVE-2023-51432,0,0,4f3fd4cb5623159c289f10a09b810bedac23e66a0d10d08ee4ee670996b21 CVE-2023-51433,0,0,b8dc83f5ab50c43545500f2811d3f45773d2e8a990907e7386902922217ce41f,2024-01-05T16:09:17.817000 CVE-2023-51434,0,0,c18c66478f4f646ecdb1bffd9ab109859696d38a901559a7d2490ec2a2e73028,2024-01-05T16:08:52.337000 CVE-2023-51435,0,0,6886e648ace9ec1e7b1e3588b5169a9e1d93651d8974969f424f6273501f9ead,2024-01-05T16:08:27.370000 -CVE-2023-51436,0,0,126e7c4fc600b95f8dc8972a0cf2dfb50b234f453a2ec216eaa8a734d6b9dcad,2024-06-03T04:15:09.287000 +CVE-2023-51436,0,1,2107f712f63a1e19020cfd2dedacda1fd4d3800c643011de684bf36e0ed532c5,2024-06-03T14:46:24.250000 CVE-2023-51437,0,0,cff2fa72c6f410b0d66688710679d3379510f0eb38be71b8edcccc6a345e8282,2024-02-15T04:53:10.967000 CVE-2023-51438,0,0,855a9448e478f67c468dcc7663116d45af1608148d1f8960150aa736f11b316d,2024-01-16T16:16:21.633000 CVE-2023-51439,0,0,cc269d06ee3b6379c19a2c90f0a7cb761b566cb78f2db97b1bee392fc7d9ba5b,2024-01-11T20:36:36.063000 @@ -239453,7 +239453,7 @@ CVE-2023-6378,0,0,4e5c95a250705e0dd6a8bbc06b93d64ed77669aa10d8e08cf26322a24f2351 CVE-2023-6379,0,0,b7a577bc70f83785aa29bf1c30ba879dfd82bc67d666c7986d31270d7af1419f,2023-12-15T20:33:49.850000 CVE-2023-6380,0,0,392e06acbd089517e78f47acec46283d5c2952e9063d6ec241117f7f2010ba21,2023-12-15T20:22:40.343000 CVE-2023-6381,0,0,9eb2cc86268893afb53ecfd36bf1545e56605f2230eb1c628f554cc9d2441ca9,2023-12-18T19:58:19.327000 -CVE-2023-6382,0,0,e0db7620db06593734acbcf41a0f8895a043ff10f17fcf8765faabded5015f98,2024-06-01T05:15:08.287000 +CVE-2023-6382,0,1,e51a44c9173980611401aee8f851c5494d9fb9f9c345a35bfcc943300494a335,2024-06-03T14:46:24.250000 CVE-2023-6383,0,0,eac1f58249c44013eaf9187ffa2f61b6b9c7a5a7e3f599e1a3d52dda8bd10105,2024-01-11T20:02:29.963000 CVE-2023-6384,0,0,e42c9ea468164d3f1395963798a71fe4d69d29c0523c49e6e6b388cfb04d28f8,2024-01-26T19:41:47.807000 CVE-2023-6385,0,0,049ae674d4d43f272c3f927a467a05302d852711996c1c33eaa10b46d553ec9f,2024-04-10T13:23:38.787000 @@ -240416,6 +240416,7 @@ CVE-2024-0326,0,0,157ca9564d0d5e51bf84f9a59702eacc7ff46c9422565312c6879939046496 CVE-2024-0333,0,0,78afbb7eeda64eef1807e49052b7da2d0a6435f70b81c6cbf5d31bb9f61e73da,2024-01-18T19:39:16.620000 CVE-2024-0334,0,0,f32c76623678c4e9f21494dd36d743333cae8b1c61f63840fd24766886e202b2,2024-05-01T19:50:25.633000 CVE-2024-0335,0,0,e01d60ef0e5a8a1ca9ff9e08ad549de1079ec643489c6df6d371055ae978e10d,2024-04-04T12:48:41.700000 +CVE-2024-0336,1,1,c5823e88e5ba2b148d7d06a008388a04d9bb6026fb3db98e885d903508860a2f,2024-06-03T14:46:24.250000 CVE-2024-0337,0,0,669347fc2574064a01ba98d7b6e13ae994791356ab8f183f3ab4aeb768c02d3a,2024-03-20T13:00:16.367000 CVE-2024-0338,0,0,92ebcd39fdf784ffd65dac214cbee1488e55baa90d10e33cf90090e1ac97448b,2024-02-09T19:28:45.703000 CVE-2024-0340,0,0,9a8ba654f67676e86e1f05467157251dcb3a161f2f141df45cb7a58fee558581,2024-01-16T18:49:46.600000 @@ -241304,7 +241305,7 @@ CVE-2024-1320,0,0,3a0636d373189b89337775a3f1aacdfe2e6f337604803376016d2fcbf4500c CVE-2024-1321,0,0,af85235b999d15d959919e61d6e5de59b85a9e9916fb22a2e4657d05e4933502,2024-03-13T18:16:18.563000 CVE-2024-1322,0,0,5019d30fc595e15b7284ce25283849f3514b2c7376ac1a074e5d6c20d0ba7d5b,2024-02-29T13:49:29.390000 CVE-2024-1323,0,0,f857e29b0540aed96943a25b1179a5166e6aff501672f2c505f52ee84f4e77cb,2024-02-27T14:20:06.637000 -CVE-2024-1324,0,0,1604fe7b890447a97be74760baffe24e75a7dc51128f2d57200b4593dc3cf155,2024-06-01T07:15:07.850000 +CVE-2024-1324,0,1,6d7e826ff55cc6bd029d8bf54047cf94140bf568dd5f55e191bad57e2a63d4d8,2024-06-03T14:46:24.250000 CVE-2024-1325,0,0,42176d3fb0ea047577bb43005fdd80a5b216404e4d10bfc5a87ca78c2479aa17,2024-03-20T13:00:16.367000 CVE-2024-1326,0,0,f742b2e1b0f964f5a5861c38f5d4ab056095ec8f5957f404653a524040bbf1d4,2024-03-21T12:58:51.093000 CVE-2024-1327,0,0,1b6e3f0296467e9f6b424925712e479dea0088dc2698e1adadd7f96bd6f1e88d,2024-04-03T12:38:04.840000 @@ -241947,18 +241948,18 @@ CVE-2024-20059,0,0,069a934ceb0aa0ce2c4d5b69ddba8190765f629560d198c71ae0abe51dd90 CVE-2024-2006,0,0,df4bc94ba9e1d1c638a16eca7ef98c4896fe8b4e7cd4dfad87563fdb108addf7,2024-03-13T18:15:58.530000 CVE-2024-20060,0,0,75f7569bafb5a37910c3681015f5a2d8c69cddb76f7a80e23135d23a09480ac6,2024-05-06T12:44:56.377000 CVE-2024-20064,0,0,2591925e496d0a99183c0f63a57deca1e1ee6cc6147c6c9cef55cd369d8dccb5,2024-05-06T12:44:56.377000 -CVE-2024-20065,0,0,185987c219382b5cd4de13f4138cc43799e4c1e3536f9bdf17e63ae3038a8e03,2024-06-03T02:15:08.463000 -CVE-2024-20066,0,0,0c713bea05bf5cd1fbe80617d60b7e50a73f27143efa6fbdc71266064f2a1004,2024-06-03T02:15:08.630000 -CVE-2024-20067,0,0,8b671c54095e47c7c66300eb05c2af7a5d54ded9c4695c453c55b28ee7e1a7a6,2024-06-03T02:15:08.770000 -CVE-2024-20068,0,0,95d4cf5ebd7f66d60ec4818e5c4ec82a7e62fa21062942d201418c051dbab76f,2024-06-03T02:15:08.873000 -CVE-2024-20069,0,0,ecea2aca15d3b4f292890266e2481f71364ff3f1cd8cfb8b587573dd092e21f8,2024-06-03T02:15:08.977000 +CVE-2024-20065,0,1,8ab52ef99ec3cc5757b239673490a11d1ec0d860257f5b5d3dc656099140a331,2024-06-03T14:46:24.250000 +CVE-2024-20066,0,1,f48106ad7b4ca43e5987705fe9ab68bb5e05a7ed45f830ed2c0ed90706d533c8,2024-06-03T14:46:24.250000 +CVE-2024-20067,0,1,8ca013ea49df42071de66561e1c22be3b5ac8f57cdfeaa22a3dddd5dfd181f38,2024-06-03T14:46:24.250000 +CVE-2024-20068,0,1,2f2abfaa08cd0bdd6c93098c81d84704288eb5ba32b8fc9912c23932a1791695,2024-06-03T14:46:24.250000 +CVE-2024-20069,0,1,41409e1ea73308a62da201a2f0b101a1633b5dc2e4d1b5045dfcc25270b0622c,2024-06-03T14:46:24.250000 CVE-2024-2007,0,0,eaadf0f3a9ed7b4e615e29ccca11af1a4d5565e9ea5b62f105dcbfa87f797ec4,2024-05-17T02:37:59.197000 -CVE-2024-20070,0,0,de5e63a055b4e536e7aa1beaec5d39b424a50de825559c4aa3885c1304c377dd,2024-06-03T02:15:09.093000 -CVE-2024-20071,0,0,7f0f1e82edf8767463a49c0bff05f129024e69074a6a27d9ec3f63dbb815815e,2024-06-03T02:15:09.220000 -CVE-2024-20072,0,0,5112a943fe49f1e0327e7f4e90c3d328b220a68d3870d91faba59558f9b85f1a,2024-06-03T02:15:09.320000 -CVE-2024-20073,0,0,ad9cdcb16e5dbb846927dbcea5e561f9569de09da28d991d96cce942cc6a84e2,2024-06-03T02:15:09.420000 -CVE-2024-20074,0,0,689b817d6d4d29ad64870439f9c9a88b6197ddd099cff3cb086e29f4c9519572,2024-06-03T02:15:09.520000 -CVE-2024-20075,0,0,e655dcb2165b76ff24b4512119f27da2440a280b5f6602c1730276d093f8b30e,2024-06-03T02:15:09.620000 +CVE-2024-20070,0,1,c0742d62ad8c435485d2c646bc6e3664615e7c2cd94b9b30ac32d747aa095c1c,2024-06-03T14:46:24.250000 +CVE-2024-20071,0,1,62d9d4142c30c139a3b27f6c0c1aa6c041b330e017e407121ef771b72105502e,2024-06-03T14:46:24.250000 +CVE-2024-20072,0,1,c200ff4baf6255d64deb0271583c6f0f747c9ccdf27a663d7a798dfcb83f3347,2024-06-03T14:46:24.250000 +CVE-2024-20073,0,1,a0b25eb428467d36e6c8d6b6d33dfc4191a095e61c25b5d42e8224294b10245c,2024-06-03T14:46:24.250000 +CVE-2024-20074,0,1,ae8ea4f1aeb95c2db6d96bbffc4725f4aeeca344255405cba91589fc79862e12,2024-06-03T14:46:24.250000 +CVE-2024-20075,0,1,c25b515a91dbc89ebe595fac548aad128c5354b0efe2add6f43a7dd87e7c74de,2024-06-03T14:46:24.250000 CVE-2024-2008,0,0,89351e3b3909d90b71f2b464baa5c1531110f0fc183853e9b068b202a6597011,2024-04-04T12:48:41.700000 CVE-2024-2009,0,0,71459ca320e3ba6a6c331932225f22d43a50dc1f7bd5a77e40fa738dd949aeca,2024-05-17T02:37:59.337000 CVE-2024-2014,0,0,5960248fb8bbf5de40f54070e9a0bf6ae1851c3dbf1c40767a4c730aca696f9f,2024-05-17T02:37:59.427000 @@ -242716,7 +242717,7 @@ CVE-2024-21474,0,0,f2a0bb0689e81550825d1ea2ff18872b7ed9732f71b1df2a783fa00cbbba9 CVE-2024-21475,0,0,08ca02671a08696ba0c7516ccba2f78b5a25c25f05d4d934fd4396db32490a97,2024-05-06T16:00:59.253000 CVE-2024-21476,0,0,f7f3a41ab53efd1329a1fcafe8a5c0bf5a6daefaebcf82c3ccffee4519748663,2024-05-06T16:00:59.253000 CVE-2024-21477,0,0,2dfc1d466e14269455d623dbe436a1e6d9dccf3c01b4aaeec3bd9b9f104b4ac3,2024-05-06T16:00:59.253000 -CVE-2024-21478,0,0,8f23a8cef733da9e745bc6f343469dcb38f73d49eb0921f3eacf7ed7e631023e,2024-06-03T10:15:11.907000 +CVE-2024-21478,0,1,30352f3ae2f757283a9e091c4763bcf578f1339e86a0a578c79bdd478beaa36d,2024-06-03T14:46:24.250000 CVE-2024-2148,0,0,f9ad2f00527f5c10697ce47ba63c57e584aab0240fc88e91a15c3572a9aa5790,2024-05-17T02:38:04.387000 CVE-2024-21480,0,0,8440778e45413c0e24db83877880d3ede6fda18ff0fea3fa59c66be00cec51d0,2024-05-06T16:00:59.253000 CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000 @@ -242887,7 +242888,7 @@ CVE-2024-21773,0,0,345c45cc46b4a2bc7fbfc453c1eb1fa6c31eadeab4db3115f257eaa510aff CVE-2024-21774,0,0,1a683c4386593938143db88bd83b2bc14ad5e978ab332a4ec1c1701b534f41d6,2024-05-17T18:36:05.263000 CVE-2024-21775,0,0,fa85b83de8a974be53a1271d6ef4f5e89cdc5553455da07512cbacd5d2092435,2024-02-16T19:26:55.393000 CVE-2024-21777,0,0,44618f6eca8c187e802d1fb8a5513e5c3f7a7b0ff0972cb292dc18c9e5673eb1,2024-05-17T18:36:05.263000 -CVE-2024-2178,0,0,65178c91f028e8c9caabf7b8b32f8f74cb4389b2cd99cb674ec7fb5352ae61d5,2024-06-02T11:15:07.390000 +CVE-2024-2178,0,1,9dc28451a90e8f509a9a1b870b1413dd7a56d7478bbeb05656b49782563314d4,2024-06-03T14:46:24.250000 CVE-2024-21780,0,0,206894ce9dfe6d8af29d8349b60ae2b1f1c1e4c0d8fd3377294811d2785206a2,2024-05-17T02:36:10.020000 CVE-2024-21782,0,0,a54768f93a9b07a30680122b1877fb41eae0f01a5d667d71a8861ee6fcf71d48,2024-02-14T18:04:45.380000 CVE-2024-21785,0,0,7e1dfc062139302ac105f55cd17f3473b4f4084526bd40a9261ab8229358552f,2024-05-29T13:15:48.977000 @@ -243551,7 +243552,7 @@ CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000 CVE-2024-22942,0,0,79bd7e0ad33fd20869abd839387d8922f33a08a9a291fa28b02d1093824080e6,2024-01-18T15:15:47.273000 CVE-2024-22949,0,0,422e733b9623e1850b76f79b7039472b307e7fc9b4786b379cdd80ebbc4b56bf,2024-05-17T02:36:27.340000 -CVE-2024-2295,0,0,0c554dc1ce9c659b30b867d7a62eb8efeced95148247bab8b5248e28d5b0efa4,2024-06-01T08:15:08.407000 +CVE-2024-2295,0,1,11dc70966707990fc86335121cab00f3dd8e1a5155be4d01fa09c68600a93bd1,2024-06-03T14:46:24.250000 CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000 CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000 CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000 @@ -243597,7 +243598,7 @@ CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc634 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 CVE-2024-2310,0,0,0edce614ca737c9f4f6f172b9fca4020b1a932854b13e864a7ef93ffce2dc5e8,2024-04-26T12:58:17.720000 CVE-2024-23105,0,0,4f4ecfc1737be07823bcaafc96e8879d6b5c3ae1db58c428ada8e62f19153579,2024-05-23T15:52:39.123000 -CVE-2024-23107,0,0,f95c78068a77be131b17b383b5dedbee5d41921bd626de291cf3de54dc105567,2024-06-03T08:15:08.837000 +CVE-2024-23107,0,1,322e47dd821fc1fd2d2c1cca77300d8b32f4ff697feaa94db5e3454edd4583a0,2024-06-03T14:46:24.250000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000 @@ -243770,7 +243771,7 @@ CVE-2024-23310,0,0,eec2d3d01897f03b092512705ef9c1a60bff0efbb611b5ad57ec6adf5219c CVE-2024-23313,0,0,13245e21fab07d527abf4d414da9107709ee7261ac0f2eced3f2c2d5a62b3bec,2024-04-02T15:15:53.050000 CVE-2024-23314,0,0,dd6112b5494f5f3b553193d89c0ec5a0dd61b4aa5a1d51fde0a6bbf84929e386,2024-02-14T18:04:45.380000 CVE-2024-23315,0,0,10dffad8a8f1dbff3c5c2e28a0726af9d727e5139c71bd0c06f5e9c696513a30,2024-05-29T13:15:49.203000 -CVE-2024-23316,0,0,997d6ff1f1c044325e4e353c654bbc5764f096e1a2a2c7bc66aa120ae609f46c,2024-05-31T19:15:08.723000 +CVE-2024-23316,0,1,3812af16e295e83e786aa1aab37645db678f576659c563c821a5d9097cdb6f6f,2024-06-03T14:46:24.250000 CVE-2024-23319,0,0,6250a98d8fb4de9dc7adf992ef419352b4c640948bb204f9b6b1a6a1e471f523,2024-02-15T18:44:04.737000 CVE-2024-2332,0,0,bad3de665e7a6fe09fc285529837f450dd66b631476d3cb654444ad8c9c674ae,2024-05-17T02:38:10.740000 CVE-2024-23320,0,0,ee2624eedcd0c08c0309a46e353f298bafcc0ebbc7e5a02fe31e837cfcf5accf,2024-02-23T19:31:25.817000 @@ -243804,8 +243805,8 @@ CVE-2024-2335,0,0,efe1e2a5a88779dcaa56517f16fc8862179b5ee96c6455caf55add5931f2e1 CVE-2024-23351,0,0,55afa2a1096cf0aa167ae828427ca9b1e7daf36842c51c8fe0621b3f0ec14617,2024-05-06T16:00:59.253000 CVE-2024-23354,0,0,524905b4df533efbcae0403dea5cdcdf4f507ec96e09f870f5c27c0b03f65fe6,2024-05-06T16:00:59.253000 CVE-2024-2336,0,0,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000 -CVE-2024-23360,0,0,f4d7ebb62940d9b72d8217b342fc2cced03dc772827b2c8f674afdd4c3507cbf,2024-06-03T10:15:12.130000 -CVE-2024-23363,0,0,cb81ab11c9be5032cf51438c8bb838acdabdbdf9d75fbd6f58c3f689a12af21a,2024-06-03T10:15:12.377000 +CVE-2024-23360,0,1,254a66ed949f1645b00eec2de407464a23a8360558b6883a04a1da3a37fcac85,2024-06-03T14:46:24.250000 +CVE-2024-23363,0,1,f27931df11b1b791c30c3655331edde891a194d79feb50cd5f17a09581bdcb0a,2024-06-03T14:46:24.250000 CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000 CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000 CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000 @@ -243971,11 +243972,11 @@ CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32 CVE-2024-2366,0,0,561eca4f7d46892009230ef936eca60ce1d593865f21bb5667643256074aa468,2024-05-16T13:03:05.353000 CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000 CVE-2024-23662,0,0,878b23e10c46382d5166f21a5ce8b15ca491a34151aa70377e6758a415cbb56d,2024-04-10T13:24:22.187000 -CVE-2024-23664,0,0,8d13f5909d1e04bfe76cf46330cbbcfd5a4af39ba418f383f73a06f325faf92d,2024-06-03T10:15:12.620000 -CVE-2024-23665,0,0,fce25590082d66baca226d442317a35953cf3b4cc205d6acdf98115c98799274,2024-06-03T10:15:12.870000 -CVE-2024-23667,0,0,94a6dbe54c65e75f8fb555e6711753fed006ebd88cbbc6984c1189cb31f1ec8f,2024-06-03T10:15:13.100000 -CVE-2024-23668,0,0,4fec4864cea612333f7d910f8fefddcc9af0defe95285c4ca6a47c3696cc11fe,2024-06-03T10:15:13.320000 -CVE-2024-23670,0,0,402f6750bcbc5d007fc1f77fcfb835cf819ac6b21f9a302b79af91b4b28ce95d,2024-06-03T10:15:13.523000 +CVE-2024-23664,0,1,fef7b517001d2c9ded36e59d6e6f76dd4dad49d2f1a97c16a9e2d13b8823343d,2024-06-03T14:46:24.250000 +CVE-2024-23665,0,1,9b721572a9eab0f097d40ba2bb4435bfadacb0c946c8971f2e8262fe3a7027b8,2024-06-03T14:46:24.250000 +CVE-2024-23667,0,1,56789b6d65cfb24cf53469fc30bd1ef9ec2c55d090fed01acd87410507e26bb2,2024-06-03T14:46:24.250000 +CVE-2024-23668,0,1,f824ecc20d8a28779421def62b365e05c131b29e7f5f1b0a1c4c94219889443e,2024-06-03T14:46:24.250000 +CVE-2024-23670,0,1,4d67c08986dae2f7effe1d794f6cb5ef791bdddbdc24c82df7382f96f5b8f09b,2024-06-03T14:46:24.250000 CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000 CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000 CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000 @@ -244758,7 +244759,7 @@ CVE-2024-25047,0,0,13db085f684d79ef9745d34b45d7fc06de8a1d4ab15f35cf7f17ac2900698 CVE-2024-25048,0,0,610a65aa068817d20a042aeecc25c887034723f165ecc379125f80c2bf8a57aa,2024-04-29T12:42:03.667000 CVE-2024-2505,0,0,f9efd81999a67e571786699340d45ecbc4af4577ba4f92360cdbb165e79506a4,2024-04-29T12:42:03.667000 CVE-2024-25050,0,0,2895a503880459770c96f9ab5f8cf4bc71edd50703fee0b5f0e32007918ee69d,2024-04-29T12:42:03.667000 -CVE-2024-2506,0,0,8ad373587e8f603f35f109fba476a8c7eaf4e0be07fd8830b82a826eb910cf72,2024-06-01T07:15:08.393000 +CVE-2024-2506,0,1,e15f8d6bb21612e515765b00c070f0acb363bd444917e661aa5401c0b47082de,2024-06-03T14:46:24.250000 CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000 CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000 CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525ccf,2024-03-04T22:43:15.337000 @@ -246621,7 +246622,7 @@ CVE-2024-27772,0,0,74af8eed731e5b425aab2727beacb117c28f87b19636f9d512e6f6e151c66 CVE-2024-27773,0,0,62fe67736848ea8328780066f441ea8ebe627c476f525b27318ac323bddd5d1e,2024-03-18T19:40:00.173000 CVE-2024-27774,0,0,6fe31e2c0003d4fab016c3154c886020f7c2bef625382f41f7a60dc74c0efad1,2024-03-18T19:40:00.173000 CVE-2024-27775,0,0,a887ec832dbcf6f0b1b703ebc438ac1eb2747b129f8cfe7b452debf6096772bf,2024-03-28T16:07:30.893000 -CVE-2024-27776,0,0,5e8bec267507d3a6e5a4bdfcc5b7fcd074b5cc04e6d4731dc61345f510078af3,2024-06-02T13:15:08.510000 +CVE-2024-27776,0,1,6275d390ba958ed1bba8b1d4de2ca05eb959bf7d338960cf80f1a89694c26077,2024-06-03T14:46:24.250000 CVE-2024-2778,0,0,42cbc20405f3ee35374ef4ea72808c22dd795c7f7e01e3e442c0f4aa51ec7373,2024-05-17T02:38:29.967000 CVE-2024-27789,0,0,68e55fc60c739900a6cd74c23e8202eb8ab5115250ba8dd1373addb21fa6b4f5,2024-05-14T16:13:02.773000 CVE-2024-2779,0,0,7d93945d439dc1c56122930b3da6852f346b5a9c5c7e988befb1c7629d43acd9,2024-05-17T02:38:30.057000 @@ -247518,7 +247519,7 @@ CVE-2024-2931,0,0,a6d520754016bbdab2d7efa74efc39e3254a7b8cd183192dc94878921c91c9 CVE-2024-29316,0,0,a77a66080b82cffb666cc5dc96a72ca9eacad7eb3c1a78f29a15ae578e7a1db4,2024-03-29T12:45:02.937000 CVE-2024-2932,0,0,a3c1266ff6f47dc95aa30613f077416ccee7f436989a8ec80d1c9241ff3cefc9,2024-05-17T02:38:37.813000 CVE-2024-29320,0,0,321a08ec2af8156a6831bdc4e0f91613cac88682c2798c2c52128b513367591a,2024-04-30T17:52:35.057000 -CVE-2024-2933,0,0,a9f810664b426fd297cd6d80897c2d20b389d40ce702149828bd398ef7bb339d,2024-06-01T02:15:47.727000 +CVE-2024-2933,0,1,18d1f298f2b762b4118efe96c450d68f8ae481c12b8472bb73a5759391f8f4eb,2024-06-03T14:46:24.250000 CVE-2024-29338,0,0,e2411b46399ccf809f7042628f5dc80681cab752a4fc33bfa69d55d7b188c619,2024-03-22T19:02:10.300000 CVE-2024-2934,0,0,3802ca621262b108954a2e7ca078a0b3239a058a100ed0a90d89e0faae5d736e,2024-05-17T02:38:37.907000 CVE-2024-2935,0,0,bec21ac61474c1b8576f1b42d537e6fe78cbe9ea3670df60a6cb2385d6dc491a,2024-05-17T02:38:38.003000 @@ -248838,7 +248839,7 @@ CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b19 CVE-2024-31488,0,0,8fd4ea2d7a10d03e6cc8df9fdf21315abd98246cc112d9626a2dc74747d004e0,2024-05-14T19:17:55.627000 CVE-2024-31491,0,0,5f002356f8390a8ec883fdc05cbd199fbc913871302dee308e6ee0aa04c7ac67,2024-05-14T19:17:55.627000 CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000 -CVE-2024-31493,0,0,eb92f9f4c4feadf3b90c327ee2008f971dfc30631ea4767017e0b0d47be4af71,2024-06-03T08:15:09.097000 +CVE-2024-31493,0,1,eb75479adef565517a6f58901095a4369c3b19ffe56c2adb7b05f607202960e9,2024-06-03T14:46:24.250000 CVE-2024-31497,0,0,4e1eafb2dcb4144981ef085a5b8158282c3a0977a083d73fc04d3f981acbd1e7,2024-05-10T14:33:55.323000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-31502,0,0,52fc3984aab146fd5296bbc2584fa31ec06529d852df83c020a3abdb54510354,2024-04-29T12:42:03.667000 @@ -249050,7 +249051,7 @@ CVE-2024-31995,0,0,66dfe11a273e9e10d102f877b390a578235479d84ca6da17689c27557fdb1 CVE-2024-31996,0,0,4bc228afb2f37b1ef8f323b1e059ab55f2f5ea66358ab4f20e2844a94396b7b8,2024-04-11T12:47:44.137000 CVE-2024-31997,0,0,d95ca9b47538ea73a196934e9c1064ac6bfd03df35a75cfa6de5a54ba7f14856,2024-04-11T12:47:44.137000 CVE-2024-31999,0,0,92063baa188f8d1eb46101bed0277138de32335b249687b065a40c476ebdada7,2024-04-11T12:47:44.137000 -CVE-2024-3200,0,0,c1352cf58376da334caf49545ca518e8dfdf66921c575a1da98714d4faf89d74,2024-06-01T09:15:09.453000 +CVE-2024-3200,0,1,50eee4824af89335680b4f427188be74af85a435ac22ce60b4280b3fd9f3aff7,2024-06-03T14:46:24.250000 CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02bfb,2024-04-15T13:15:31.997000 CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000 CVE-2024-32002,0,0,48be14afa98a3d0838703e3a18294dea9901ede648690c195f851d5768397209,2024-05-23T20:40:28.707000 @@ -250140,21 +250141,21 @@ CVE-2024-33953,0,0,3b3356729af80b251661673310f8c56f44f10df5bf865f8c660a36c2bb489 CVE-2024-33954,0,0,c503ae766ab5514537a2f4c6d4b14a345a29e519b230f4073c9e782b0bbe69b4,2024-05-14T16:12:23.490000 CVE-2024-33955,0,0,2ca854ebde5acdbe9a0cbc52fdc48933a592e02407281f304c8b2d9d1c5c771f,2024-05-14T16:12:23.490000 CVE-2024-33956,0,0,a3addf39e4aabbdc7e441806152a9a1df58e40ee38caf2a4eb3a2e733fe2d75d,2024-05-14T16:12:23.490000 -CVE-2024-33996,0,0,4959daa9527c3eab70f0d5a99ae84bce6b72fe0314e02bb131e992dc561c5aa6,2024-05-31T20:15:09.647000 -CVE-2024-33997,0,0,c88cd825130b7b7f6a9aacfb35b22048a51bf8378903f23fb368eeaa98d377b1,2024-05-31T20:15:09.797000 -CVE-2024-33998,0,0,fb66089584e94005eddd97aaceb860cf934ec9b3c4a375bf53b58b780e09660a,2024-05-31T20:15:09.890000 -CVE-2024-33999,0,0,b54aa16c3843d727680cc15e631a46e0646166505fdc32852941c99b1c86d541,2024-05-31T20:15:09.987000 +CVE-2024-33996,0,1,f5cf19a228c52b4c5d509cb57ba77509346ef7a0b4b5ab78a6ab7d6628a5fa53,2024-06-03T14:46:24.250000 +CVE-2024-33997,0,1,5b3612b220337f25b38467e1f212b70c162181eb47e4ddfb3415753caaffd55c,2024-06-03T14:46:24.250000 +CVE-2024-33998,0,1,8e63d48b15f2262d35a843f7a9457e23af5aee5d3e86bbbc94e2e28ec7b3fa32,2024-06-03T14:46:24.250000 +CVE-2024-33999,0,1,29bc13d19be6e74644ffe59df0021a7993dee82b6ee04438762d3af2a303cb95,2024-06-03T14:46:24.250000 CVE-2024-3400,0,0,ca612a9a9d0abd8952e404012cd7953d185fcc4b36e6c122ae2aa18b847a21b3,2024-05-29T16:00:24.093000 -CVE-2024-34000,0,0,e1e36130628573ca3eb8dd109f9b7ae61a417ca28bec0e437be8c85ed036d010,2024-05-31T20:15:10.080000 -CVE-2024-34001,0,0,95e2391357b54410d63fd86db759d10939cabd3526e32bdc01d86ab00e114fc0,2024-05-31T20:15:10.183000 -CVE-2024-34002,0,0,1e3e464ffc82f07ff9cbfe3fe1097a108318626368e91cd1603708cd2d1e58e9,2024-05-31T21:15:09.130000 -CVE-2024-34003,0,0,0598cd2e484568dfb02f3c47debe9113df4d2b2dffd96e059163b7270297c0c7,2024-05-31T21:15:09.240000 -CVE-2024-34004,0,0,fbb80dbfbb086f3ba7cb49bc034e086affb5aa587942e6b7f9a32e2eae291b05,2024-05-31T21:15:09.340000 -CVE-2024-34005,0,0,62fc2d8904af4c28f8fb3286f7cbe75d413cbd5b5354e9348bcaeaf74042e8fb,2024-05-31T21:15:09.440000 -CVE-2024-34006,0,0,bd02c6e1ed545087d645d0ed794d45df6f9384ca62e25bf334f0e24093ad33f7,2024-05-31T21:15:09.533000 -CVE-2024-34007,0,0,de30e92c4c073f115c748d23f749b9f449e3b7909f2482fb58e567407d641af9,2024-05-31T21:15:09.647000 -CVE-2024-34008,0,0,fdcf21804eed9e4b9ae003fed0a42f1ce49ecd6f59017e01756d8d13b8d19e04,2024-05-31T21:15:09.743000 -CVE-2024-34009,0,0,d153252dbe5664997654e42bc365b211827d395d00e795ad774b03c9036974bd,2024-05-31T21:15:09.833000 +CVE-2024-34000,0,1,1b1400b3cd4799709e56e84cd96e17fe69958143350c73cc3953431c0cfbc9f1,2024-06-03T14:46:24.250000 +CVE-2024-34001,0,1,506ed2018e026c3696c1b94d77a0f5d08b76286c9186b394abdd615979f316fa,2024-06-03T14:46:24.250000 +CVE-2024-34002,0,1,e20f7d66d4bb801f75c42da8485bbbac3c60286e9a30c92c02828980a462847e,2024-06-03T14:46:24.250000 +CVE-2024-34003,0,1,9cfcdaca126b2ab93eda8380cb22e57f60cad547d7d025cd259aef6101ddf4fb,2024-06-03T14:46:24.250000 +CVE-2024-34004,0,1,c514bda174a2863f34ff466c3a19f37251b541102fe3a4c330e8c4883a7a54c2,2024-06-03T14:46:24.250000 +CVE-2024-34005,0,1,100728f5097165a5959e76178c5d67a827841686e3af57acac8bc0c76f34715a,2024-06-03T14:46:24.250000 +CVE-2024-34006,0,1,efe89fc3ff42c4399155abe1dd2dc8d912048081bc181fbcd2781cba9784ebdc,2024-06-03T14:46:24.250000 +CVE-2024-34007,0,1,128bcc830b5d69de01e6d3263d335a3cdda7f94aac607ac9823d74e02f9b6c9c,2024-06-03T14:46:24.250000 +CVE-2024-34008,0,1,edc66ba59c24fe86c5737696ef5e1beb12d9c8c54bd644a71789cd3b77a014b0,2024-06-03T14:46:24.250000 +CVE-2024-34009,0,1,6ddbdcd2f8161372a9bcdefda9c8b3e3050867c707ff64c3c31650ed3f1f8522,2024-06-03T14:46:24.250000 CVE-2024-34010,0,0,c31f2f180475c1f3f2204c1feb2010c5ada948eb1b4d37517c54f97316341f08,2024-04-30T13:11:16.690000 CVE-2024-34011,0,0,4e2e0fb5d64e6e75da5ff3561c6f86ff1f891a3646e890e015512c561d328a58,2024-04-30T13:11:16.690000 CVE-2024-34020,0,0,9d9b11f4db84c3770acd92b1150bad9b802c58de4fce781bba37a89c232e029f,2024-04-30T13:11:16.690000 @@ -250338,7 +250339,7 @@ CVE-2024-34380,0,0,9c61b1e4daa61373e7002f8d2d4dce27ddb9191c5addd8bf21ddc784e9fa3 CVE-2024-34381,0,0,916a4bd3a985213873c6412e0d3b955a8474d20bf5f6f3e6ed34235933fe3fb4,2024-05-06T19:53:38.797000 CVE-2024-34382,0,0,fd733cb019894bae43485ef59a939a0b7f828c030739897752a3a7a72e0fef9b,2024-05-06T19:53:38.797000 CVE-2024-34383,0,0,97b1e9798b89fdbbe308082b82be1abdf8cbef8c3e73a4d8565890f919550b51,2024-05-09T14:15:07.317000 -CVE-2024-34385,1,1,e1b47a6e4768cbec8c107233f38f6f1bec3ebc0cfd12d8d1556eff85f75ca6c8,2024-06-03T12:15:08.870000 +CVE-2024-34385,0,1,ec4faf3c77111fb2480847eb0cfe835593111cf26220e2cf8e5217c41c0819d4,2024-06-03T14:46:24.250000 CVE-2024-34386,0,0,e12338a8bbbeb3d293a939006cafd78a680c7101ce81be98b0725e6c8b63b77a,2024-05-06T19:53:38.797000 CVE-2024-34387,0,0,0185cda5a66745277b47f25663cd88518e8be23bcd4e122a44022f61814856f8,2024-05-06T19:53:38.797000 CVE-2024-34388,0,0,917d404fa24bc1bf28f7eb85cc6edc665f0796834dfadb4e3887dcd6c4e7f677,2024-05-06T19:53:38.797000 @@ -250512,35 +250513,35 @@ CVE-2024-34749,0,0,a26a9cdaa6b9cdd859ea0f8895bc1e27a45773d0dd4321619e9dcf295b3f2 CVE-2024-3475,0,0,e528ec7d5c8727ea0d98d659186b040308d5844df7467319e5b573505cdc6e7c,2024-05-02T13:27:25.103000 CVE-2024-34751,0,0,3bc824c76b005bef3c5502f774f511888cffc942b3953fc4e78f3f0d8ad9e615,2024-05-17T18:36:31.297000 CVE-2024-34752,0,0,242ab90c6a96e91b737168caac935dedcfed36964913472cce8df4bff8adef50,2024-05-17T18:36:05.263000 -CVE-2024-34754,0,0,9d58b9d4cf84f7418dbd746b56c4062b86032da2cb5552e8ea4fc0d14e34509b,2024-06-03T11:15:08.743000 +CVE-2024-34754,0,1,42e489b57bc9b4b6e4e4645a963b026cad3c386a1eedd7cee43baeec78600fc8,2024-06-03T14:46:24.250000 CVE-2024-34755,0,0,d9d093e244bdb9881814a581fcf0cceddc50257ae74dd4a27a2c1f59b6cdc217,2024-05-17T18:35:35.070000 CVE-2024-34756,0,0,c1f51cb5304487e29b0a4c8a67e9d115a4f2b56ac322e60a8774a285c457e7c0,2024-05-17T18:35:35.070000 CVE-2024-34757,0,0,57042a3bb13f31e69b5b7fd23a19541f4fa2fb8db07ba9037fc775417523a9d1,2024-05-17T18:36:05.263000 CVE-2024-3476,0,0,8d55e08f53225fd62245e2332fbccfcb740f72480e60e1d515618aab26b24582,2024-05-02T13:27:25.103000 CVE-2024-34760,0,0,82a83a3179457fac7a33034fd056c2efc13c1726662f893ecd6b003877ae591a,2024-05-17T18:36:31.297000 -CVE-2024-34764,1,1,1716121ff1f10cfc6b4b85d4aa03b3c4f4845fb855074493796d4497747f5e5a,2024-06-03T12:15:09.120000 -CVE-2024-34766,1,1,4b144309015f6d1541838a8e2b2642d72a6c814e1d894ffbf766245ade020b04,2024-06-03T12:15:09.357000 -CVE-2024-34767,1,1,bfbef1ed10452fb7026e7e7c7d790c61d1e543b6d279b6b17f8d69a1284fced6,2024-06-03T12:15:09.610000 -CVE-2024-34769,1,1,348c58a4d59c8e559890bb4c33875823b06bdd1b45824a865b19f85aca58c695,2024-06-03T12:15:09.867000 +CVE-2024-34764,0,1,4a062b2d355bca216e61eea89a3143fd70d17f9d23f9dff7fe6c4cca332731a1,2024-06-03T14:46:24.250000 +CVE-2024-34766,0,1,22c387d44c55a71d31b88c20dd6d65754704e9027fdf30a05382b01813ba8a61,2024-06-03T14:46:24.250000 +CVE-2024-34767,0,1,6f5ea6195ddd625783e4c87a3b2ae39b2737a655a57bd059a5c57172141b2a9e,2024-06-03T14:46:24.250000 +CVE-2024-34769,0,1,0bbf8d289bb37a8c03efb2ca6ae81bbeb7528a00dc16321c8a204ebffecfc117,2024-06-03T14:46:24.250000 CVE-2024-3477,0,0,06132a9cebdd48f3a85c9e2194776daa64e508210471c8ba503616346531ad67,2024-05-02T13:27:25.103000 -CVE-2024-34770,1,1,461ab8b1f946f90b2e240df460ee540fdffa0ec5d70e7345efa5f4399377bbf3,2024-06-03T12:15:10.120000 +CVE-2024-34770,0,1,66ff853219b9474b58a10c629c833c9cba2dc24bacc723fc3e4cdff7fddfe228,2024-06-03T14:46:24.250000 CVE-2024-34771,0,0,deaa281b48d1539fc4d88a99f2c542da7d2f97b319dd410ab53213b70ec8b3e8,2024-05-14T19:17:55.627000 CVE-2024-34772,0,0,635f5a0bcdcc084928ed60d40a3f5691181a54a2efa05b50e13ad7462247110c,2024-05-14T19:17:55.627000 CVE-2024-34773,0,0,8d4786b71411a201832db647dece110e046d5ed6169dce1446e93616263bacee,2024-05-14T19:17:55.627000 CVE-2024-3478,0,0,ae882595ac6fe06ab517c1e505d55eeeed4b5c0450cbd6b83825ab78d9e88f1e,2024-05-02T13:27:25.103000 -CVE-2024-34789,0,0,3cd55374ddb45727555a4ddc1e9ad766353350411961927b16c82b2a4be3dee3,2024-06-03T11:15:09.003000 +CVE-2024-34789,0,1,175bcb04056ff40c4d592afdd740bbc7f72f65b2e59fe0bd883d321e2b34b239,2024-06-03T14:46:24.250000 CVE-2024-3479,0,0,fd58a9eee7829eb22d6cfb17d87e6b7652b13a6666535069e70c5a2768e8dce6,2024-05-03T15:32:19.637000 -CVE-2024-34790,0,0,1a5b8cee6aa93ad10ba303666024e363953d81c8116b01a1921ab0986e5235bc,2024-06-03T11:15:09.233000 -CVE-2024-34791,0,0,63a167b6d65428b715bdce7830adbd5f9dda5b5651667d6a0e8be0e00a3b3049,2024-06-03T11:15:09.467000 -CVE-2024-34793,0,0,483b50b8734b95527b8ec11dcfbaa161ab6a0bd04df0a0d4291542559e572729,2024-06-03T11:15:09.687000 -CVE-2024-34794,0,0,0fcea07d90a264c294804f910b6665efeed9385e5e6d56e31aace0afd80a626f,2024-06-03T11:15:09.917000 -CVE-2024-34795,0,0,91c02cf1e7eeb8503093139ca6f3dd4b5cf591a85079d787fe17433b511dba1f,2024-06-03T11:15:10.133000 -CVE-2024-34796,0,0,7b63d24ad2f15c716a204e2f40ba9d35a88899031da8a8b5ad2feece0a7da066,2024-06-03T11:15:10.360000 -CVE-2024-34797,0,0,5bb1f3ddf9562d7678b22979eec373c838cdffa4417e576318c8b9ceb77a0b66,2024-06-03T11:15:10.580000 -CVE-2024-34798,0,0,55a30b7aba14ebe802fee14a3141374d5bfd8987e086cdcb9c3412887a74ed08,2024-06-03T11:15:10.813000 +CVE-2024-34790,0,1,1b98c4120682b0b2d3e0de1c2300b7e42dbf871f34cef48d8cc9ee5b566ce033,2024-06-03T14:46:24.250000 +CVE-2024-34791,0,1,da7a2403c32edceddd517dcb716c6c785d93d68f98f7378e12c6e7850207c159,2024-06-03T14:46:24.250000 +CVE-2024-34793,0,1,ccb44183b9ca98b2268f508aa8346ea91314b808b8e5e88d8b0a4e4db813ca91,2024-06-03T14:46:24.250000 +CVE-2024-34794,0,1,8dd297ba1df99f72d8d7503e4dcac4c8600683410b73f0e665b6d7b7a52c5dac,2024-06-03T14:46:24.250000 +CVE-2024-34795,0,1,96509e51efb19ffb4e7a4292825966cd5519b012cea5f8257f9dd40efa3d51df,2024-06-03T14:46:24.250000 +CVE-2024-34796,0,1,777529b70ab555c80ad7aafbeb3049b18193c688a376ec22c82c5050333f5a92,2024-06-03T14:46:24.250000 +CVE-2024-34797,0,1,da690a6b3b793b8a3f68e3a5c91fee6a91a22f5ff9c0008cb03b6bc04b4229b9,2024-06-03T14:46:24.250000 +CVE-2024-34798,0,1,42d46add1bc1c4791a82745612c286a8a5886cd3299b707fb154f17207747935,2024-06-03T14:46:24.250000 CVE-2024-3480,0,0,efd268116762f9a268444b69dedc6b75682706697867d3d93c2c71f376810267,2024-05-03T15:32:19.637000 -CVE-2024-34801,0,0,5c05e9df68c6a2706d41abfa0924db6473ada533efd49d9bc853a3238dd441f6,2024-06-03T11:15:11.040000 -CVE-2024-34803,0,0,e941f12dd43c66f0a30013889c22ee9ae6cb29ead6e0b509b8f398783df82990,2024-06-03T11:15:11.270000 +CVE-2024-34801,0,1,0b6d5ae4f3fb7c32be2bc91028243c583140c1079b24d6930c86fba07f0683ba,2024-06-03T14:46:24.250000 +CVE-2024-34803,0,1,a94bf97fc8c7a222d6ea7cb0eb093b99f261f255b24601420e11db6a8f717ccf,2024-06-03T14:46:24.250000 CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000 CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000 CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000 @@ -250833,24 +250834,24 @@ CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d CVE-2024-35618,0,0,fc2572e9e8823eb6313bf2bb54c527fc11c4117d0d0837dc8f8794515acd3b77,2024-05-24T18:09:20.027000 CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c7d1,2024-05-28T17:11:47.007000 CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000 -CVE-2024-35630,0,0,89264cd1a4afa71b588d04af1510e9f5fa30a567bc8836139f915a641c8706ca,2024-06-03T11:15:11.520000 -CVE-2024-35631,0,0,7cbcaa0d94470af5584922933479b84fa5109af34d8b31d9b44346e9e0480e51,2024-06-03T11:15:11.740000 -CVE-2024-35632,1,1,bc9f34d70b61fe28c8a912483f229ad4f60feff967c7f7c36e1e2ce4bfb6ccda,2024-06-03T12:15:10.367000 -CVE-2024-35633,0,0,d1b53e557a63ad400682b1f460ac520a7a728625610b8f88b299e9e3a666395f,2024-06-03T10:15:13.720000 -CVE-2024-35635,0,0,a6648ac54f661e5b4a9c3c92e46de6c4e3ce5718e4b099218271b0d9ff75cc45,2024-06-03T10:15:14.050000 -CVE-2024-35636,0,0,50355c13300a6ac082e1c483b1ab0ef66d8d81a837d0b58fd86ac7bbb9fe7982,2024-06-01T09:15:08.983000 -CVE-2024-35637,0,0,a3bbaca3340add97b05922e5f3b6c323a82a11ee28efa6dacd9faac985e017af,2024-06-03T09:15:09.390000 -CVE-2024-35638,0,0,d40f8eb039698819fa66f21f9769dac9687415417efb672407b31b270ecc7aa0,2024-06-03T09:15:09.703000 -CVE-2024-35639,0,0,a9f6ceacf0b15e8d73d02a0e44ba7f868caccb9abf6430e27ee988ea745ef246,2024-06-03T09:15:09.947000 -CVE-2024-3564,0,0,126b0ad745c05ac2b6e0879d574d7c57b3c5395a16548c8e712a48ce4bee21ab,2024-06-01T04:15:08.743000 -CVE-2024-35640,0,0,358aecfa6522bfb60c0852d09cc5e4f8adc292000e1c5dc1db7c810f50935a8d,2024-06-03T08:15:09.330000 -CVE-2024-35641,0,0,ad916927f4dc66b26e37a696884d9ea1315a0f444182d47bd127409ab7975d3a,2024-06-03T07:15:09.100000 -CVE-2024-35642,0,0,5f0cf1abc8073c52dfacad8fd9b2a937ae549d5addf8a17283021c02e90c70af,2024-06-03T07:15:09.560000 -CVE-2024-35643,0,0,c2e75a738c426c54e453512f0b08e3b439606dd23983e8834340678e0539f0e2,2024-06-03T07:15:09.850000 -CVE-2024-35645,0,0,f4dc1bfaa7b7a0f9b97c8eccd36b4db9770029da3afa71c1b8b092b5602c6f29,2024-06-02T00:15:37.840000 -CVE-2024-35646,0,0,136c9ad2a0ac2277b18388ab5956c506568c9b987f2be8806cb4e54a2838bfe4,2024-06-02T00:15:38.097000 -CVE-2024-35647,0,0,1f9bcd2c82d474ba6e3d8a49b179040ead56f0520ffb164fd4be570952a50bc0,2024-06-02T00:15:38.310000 -CVE-2024-3565,0,0,e1b2000c5686d2ca445ed687220d6569396d5c02fc079146ba9e31752c24516d,2024-06-01T04:15:09 +CVE-2024-35630,0,1,0fb0146c10c66c8b4cc841c31e9a57e363b279979d0fe718a6d369f5a78ea195,2024-06-03T14:46:24.250000 +CVE-2024-35631,0,1,cf074c7a0f9449d076d53adcfcbee282a17b0913aafb335d0bcd25ecc5ab0c2e,2024-06-03T14:46:24.250000 +CVE-2024-35632,0,1,418be8985fb418352bd38a417d42c1ce5a36f665b68135197090bb25e6834b46,2024-06-03T14:46:24.250000 +CVE-2024-35633,0,1,e15adee1238427da8a1e1b6868d9895b4a4d4ae54ea4d0d9c0c3a9c726b4aa50,2024-06-03T14:46:24.250000 +CVE-2024-35635,0,1,419fa51ff1b2e34d82cb98584dd092a4e09cee2809a7db50836dd3bced9ae859,2024-06-03T14:46:24.250000 +CVE-2024-35636,0,1,5399187f49a498508689a07f5c0a75d47d04d4991040eda7332514cc1c8dceea,2024-06-03T14:46:24.250000 +CVE-2024-35637,0,1,184818b72ecc5550ec88e053a7683724d9fdad6195ad15385bf16e7728333599,2024-06-03T14:46:24.250000 +CVE-2024-35638,0,1,32b790ccf3ed87190d79651db8fc372f6baa09fda7da13a9a3c183f2fbbaeab8,2024-06-03T14:46:24.250000 +CVE-2024-35639,0,1,9b0d9fb21ec74f73ff9fc4f6aade181d7d325b23bf3ea2037c38036ec82f9068,2024-06-03T14:46:24.250000 +CVE-2024-3564,0,1,0ac6fb9906ffbe00353f7b4239f589d836063a9272359d6f4be28cb7ca76067c,2024-06-03T14:46:24.250000 +CVE-2024-35640,0,1,2baf5bfa9a451b5e3c8d63e10b05c533037f9095b95de773c9138d5eea3c5368,2024-06-03T14:46:24.250000 +CVE-2024-35641,0,1,a6c23b11e5a798a772e46900eee418024e9d1e872997ff9350339194985838eb,2024-06-03T14:46:24.250000 +CVE-2024-35642,0,1,d22aec36a762dad4e71631b725513447742147d1f6c65c7a9cb2a9f86bf9be94,2024-06-03T14:46:24.250000 +CVE-2024-35643,0,1,9a85f980733a203d1afe2125556ca8fd446a55a9337a6390df2cb9ebd797d15f,2024-06-03T14:46:24.250000 +CVE-2024-35645,0,1,4890cccefabc4d0ca257524f83767bb085050fd6c5aa3f9f764f54694fba20ff,2024-06-03T14:46:24.250000 +CVE-2024-35646,0,1,0e09ad267a508b8a536900d74395f7d6fd0b87a4648f067a40bf0167f0c61ae4,2024-06-03T14:46:24.250000 +CVE-2024-35647,0,1,dd07a9e9a3804b0b3fdbbe9e6cdd58e439fe4bcd9c7b53cb07e789eae1ef1bd7,2024-06-03T14:46:24.250000 +CVE-2024-3565,0,1,a4b6a30a1c15667775d02efa34a8d23be7f17c664853400b6c8d4dfd523ae02d,2024-06-03T14:46:24.250000 CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000 CVE-2024-3567,0,0,20839fe5058050b88e3eab46e96c3f4983a4ed5d3b8a31d734ec6d77ca524853,2024-04-10T19:49:51.183000 CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000 @@ -251131,7 +251132,7 @@ CVE-2024-36033,0,0,761ce8e91fd8ec725f5fd70906c3e8b3e4ae739a30faa4a1ecc4c7502a89a CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000 CVE-2024-36037,0,0,e8ddc31f39a62a0d6f93584a2886b907bf85fcebcdd4d47a54b701feefb8d09a,2024-05-31T11:15:09.563000 CVE-2024-36039,0,0,a8363180f0299206d54e6558901cb5cddfc68c9874309661faf6b2f8a76377e4,2024-05-21T16:53:56.550000 -CVE-2024-36042,0,0,37361fcb5ee378b05e6a5d8d266f49631e8a7315fcc714abcb9a572cf619ed9b,2024-06-03T06:15:09.293000 +CVE-2024-36042,0,1,2ba301066fcf3b5e2098ddfbb2759b29cc55ab5a805cf9edc9ebe22e6b436ca1,2024-06-03T14:46:24.250000 CVE-2024-36043,0,0,a692d077d358c1feb0a509deb9a8e16caf647bf207b7ab7a4cd103038bbab39e,2024-05-20T13:00:04.957000 CVE-2024-36048,0,0,e007b0325d407bc8859f041fde0fd19208cc3895dbb6e40867a5a83e255b52f5,2024-05-20T13:00:04.957000 CVE-2024-36049,0,0,3a7a1da30d4597dad4c167032717d4ea0f9bb4c5d5396bc121febaf5ae683a7e,2024-05-24T18:09:20.027000 @@ -251163,6 +251164,10 @@ CVE-2024-36118,0,0,33d8fbf029e8489b5c9f0a8940761bdd6087754b4000c59931582a52c8a89 CVE-2024-36119,0,0,df322ac6443fcc8a013c93b7e5a35f3678792028e0c0bb1f44fa863251664f98,2024-05-31T13:01:46.727000 CVE-2024-3612,0,0,d6528427cbb589467c111cbd40a18dd09640d3302d8baf887860f351407e958e,2024-05-17T02:40:01.520000 CVE-2024-36120,0,0,12c175c12bdeb4293d9514b1beb0f27c807f78064a3798691100bae1fd82d8c0,2024-05-31T19:14:47.793000 +CVE-2024-36123,1,1,03955c6f8a51c06881a2e3be7e464ff8c90cd1e3f4d9d542070841e4dd437ca7,2024-06-03T15:15:08.843000 +CVE-2024-36124,1,1,47a9e7617c96dd697b230d727f17291bc61bb86059f81437603d983cfb71f589,2024-06-03T15:15:09.090000 +CVE-2024-36127,1,1,91572bb7cdead8ab248c3c8f00c5465be85ba0b0740501f8c97b5eeb1244ef5a,2024-06-03T15:15:09.307000 +CVE-2024-36128,1,1,3627fd95b873f877b6410f8cc4eaa628445ac1815a36b364f88bfc815d6199ee,2024-06-03T15:15:09.547000 CVE-2024-3613,0,0,d7eb1ddde521e54e1fe9acae408bd9221d7036e0a03927b308a853106c490093,2024-05-17T02:40:01.607000 CVE-2024-3614,0,0,d78c7f8216ffec54e56d2e3340bc15a51d2b21c733cf27c47b22562ec2fb117c,2024-05-17T02:40:01.707000 CVE-2024-3615,0,0,64005ae223a0e1b13c6b7f52d8fc0c9c88326db37e9d2598154be43e0038ff8a,2024-04-19T13:10:25.637000 @@ -251207,11 +251212,11 @@ CVE-2024-36377,0,0,5b3a74790b8404bb50e8903b0a58fbf2f5e8fe3533f993e13f46a55b82f39 CVE-2024-36378,0,0,9a645ab04ee516fa09b03bc4e8214d07cbca3e9e91fbad3f5da1fbc4f30ef72c,2024-05-29T15:18:26.427000 CVE-2024-36383,0,0,024d8f4d1ca5f23e8a0ddc855e927c6f952336db279cffee80e19f08304118ee,2024-05-28T12:39:28.377000 CVE-2024-36384,0,0,2ec0cce63a143f80e95d7d72dd49a2947294c5f3ef9bfcaa5dd3f4682e62278f,2024-05-28T12:39:28.377000 -CVE-2024-36388,0,0,d8ba75102abaebb9c0528593547dc7f1249c77ed65f871638999e88f232ecf81,2024-06-02T14:15:08.683000 -CVE-2024-36389,0,0,394e19975d2d18affba93909f75f05c501ff213aa4613266cd7778d9aed11114,2024-06-02T14:15:08.933000 -CVE-2024-36390,0,0,f97839184834864cac743175cb196a1a716c7f17084f9e862ce9c7a58a1499a3,2024-06-02T14:15:09.163000 -CVE-2024-36391,0,0,e89c83c052a16f64c258fbdb0310fd10fbdc1ce8168ecfaa99dcbd74bfbb159a,2024-06-02T14:15:09.413000 -CVE-2024-36392,0,0,79c7f6d8c7f5f53dfe470a57bb2030577cebd3405169d5c88141ba69ac04f2a0,2024-06-02T14:15:09.643000 +CVE-2024-36388,0,1,c862c36965d96dd7dbce4ad8e507845635d584cc35880dbb4a1f42f921fb4889,2024-06-03T14:46:24.250000 +CVE-2024-36389,0,1,b7f3ae9ec80f48852fb2df638815a295e32fee22ddec84c26d88db15c966ccd5,2024-06-03T14:46:24.250000 +CVE-2024-36390,0,1,b28e05065e61bd7a9bb35d69c3db1c5b9fc640899f1d11e151111ef78e00d787,2024-06-03T14:46:24.250000 +CVE-2024-36391,0,1,912b7ffb7dfb6dfb15f70d7bea2f2a5105573bbf43d36923ced033abcc265d3d,2024-06-03T14:46:24.250000 +CVE-2024-36392,0,1,7b41af317d30bf0386ed81503024aa5664470441af94b00ab8ae6362055ee697,2024-06-03T14:46:24.250000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000 CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 @@ -251230,6 +251235,8 @@ CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000 +CVE-2024-36568,1,1,da1ad45e35e3ebd045cc1d605f7bb2f31fdab5434a117b3c1ca7da7d4ea95450,2024-06-03T14:46:24.250000 +CVE-2024-36569,1,1,6cb2ef882f018dab4ea69f61d1bc370bfefe1380a18e6327825251eff3623fff,2024-06-03T14:46:24.250000 CVE-2024-3657,0,0,b3ddc632f51ff9b9080079d8b3c5a6b7a01651c0414e2741d5c53ebe23c9db3e,2024-05-28T14:59:09.827000 CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000 CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000 @@ -251242,6 +251249,8 @@ CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef90 CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000 CVE-2024-3671,0,0,d4c07d059b6fad473ffadbf866eab2d0161459cafd3d5843ab40df0df4e33fe1,2024-05-22T12:46:53.887000 CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000 +CVE-2024-36728,1,1,c2be0d961babece611e6ef331669b97310e3200e5b725ef7082af06fa5b1b229,2024-06-03T14:46:24.250000 +CVE-2024-36729,1,1,932b1f58b1a09b0188e5d6600471eb6364a687fd2ef712c615b505ef114eedd3,2024-06-03T14:46:24.250000 CVE-2024-3674,0,0,f0fad7a5bda9e15945dde9432e31b1e267affdedcf2e230210a842bcd40fa4e1,2024-05-02T18:00:37.360000 CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000 CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000 @@ -251251,9 +251260,9 @@ CVE-2024-3680,0,0,b1ed78ba2c31e060c65591b1b4aa0e0cdd627bc790583f352919e473d1394b CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000 CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000 CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000 -CVE-2024-36843,0,0,1a54a3bda9d9117dd45ca9cecaeed628da3045145349a07c6e7d1f2d46ab39cd,2024-05-31T20:15:10.290000 -CVE-2024-36844,0,0,03b50fa8dadaa43de5a30701030ce5aa53ac888c34ba8a0bda630c036aa57651,2024-05-31T20:15:10.380000 -CVE-2024-36845,0,0,44298688a0efafeed94d06d63e0087e35044b38514668b5b77fda18c119d1629,2024-05-31T20:15:10.463000 +CVE-2024-36843,0,1,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac03982c,2024-06-03T14:46:24.250000 +CVE-2024-36844,0,1,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000 +CVE-2024-36845,0,1,4b9d7b96ab3c57fe0fa6236fc4a20ae85e48dc606d8eba3c5478623a05a01e27,2024-06-03T14:46:24.250000 CVE-2024-3685,0,0,f921a0a401f8b4f7737f6fde068e597ed9cc1b4c23e79252700a3c350a96640b,2024-05-17T02:40:03.840000 CVE-2024-3686,0,0,48e96862a2931368fc7a73a6d531fce8d2b9c3a327baf97d691f2054e9208b18,2024-05-17T02:40:03.933000 CVE-2024-3687,0,0,a3a2ae712cd6c7057b4b6b211557af56d168f80a5b75c666d660903c58451d4c,2024-05-17T02:40:04.027000 @@ -251344,18 +251353,18 @@ CVE-2024-36957,0,0,14a25382151b1945f300cd0f690fdd6ed21995daebf481bf33bcbc3cfcf88 CVE-2024-36958,0,0,27ba702862686ffcbfc7435dcc4011c841c4be08d6d6bff774be51941829ca30,2024-05-30T18:18:58.870000 CVE-2024-36959,0,0,d6bbacbe3376b8ea605862991764d4131cc35403035f548e6498def7a4bbd69c,2024-05-30T18:18:58.870000 CVE-2024-3696,0,0,54c8c42492f1c31e1d0d081b12ae9fb101d447905039b557dcc4372130239b90,2024-05-17T02:40:04.613000 -CVE-2024-36960,0,0,acf3c6f441eac5469a9c25fd1ebfdd6f1cf461c1d844318f9c119d13aa112a81,2024-06-03T08:15:09.557000 -CVE-2024-36961,0,0,f6fb90cc986c6069fd23d1d9888817e08e921f71b08213bf2b70aa68a6c4297d,2024-06-03T08:15:09.660000 -CVE-2024-36962,0,0,0786e9d15d91a5bfc2f5fd63a100e44f0f095cc32cc0a7e91d3e96757091e975,2024-06-03T08:15:09.740000 -CVE-2024-36963,0,0,6783d7e9cad5d6855f4047fc4da40186696c7d06fdbfcf7e02f88b8f9412d9ad,2024-06-03T08:15:09.820000 -CVE-2024-36964,0,0,ab7328b637a6af08291107a29c8eba501cdb343a15c8c594a58247f3b8e08077,2024-06-03T08:15:09.903000 +CVE-2024-36960,0,1,d71fb0dfe96a55b30dc290e36a70027346636bbd3e355f93054acb7154da0c92,2024-06-03T14:46:24.250000 +CVE-2024-36961,0,1,23b0844a9529f3ecfd6285bf875a287ce67af9417a3eb4ff1001834e83635e53,2024-06-03T14:46:24.250000 +CVE-2024-36962,0,1,5fce798c0bb35579e13c17bb9f54632747360d5004ae06492f537a1e1919292d,2024-06-03T14:46:24.250000 +CVE-2024-36963,0,1,603c4aee8277db74a501815fd4789e2662e4b99b616454a415c4c767068ca598,2024-06-03T14:46:24.250000 +CVE-2024-36964,0,1,1e5a2c376d4fab926c22a070cc2c21ccc7f01422382c5ba38368e087bbce6bb0,2024-06-03T14:46:24.250000 CVE-2024-3697,0,0,cc8cf5a7af305c88ebdfa6655aacb4fa5ec406664965d679a29a0cbf17ffb930,2024-05-17T02:40:04.710000 CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000 CVE-2024-37017,0,0,44054da22aca73b93b60ec210b10224ee227f383aaf683a683cb33e0b77e6e79,2024-05-31T13:01:46.727000 CVE-2024-37018,0,0,03f52f6206f7266f58022a58d4acdc5cdc5faead7410ee302d981bc236bc0afc,2024-05-31T13:01:46.727000 CVE-2024-3703,0,0,46d289814974ee20b6160fe56cc828277066d832a1c60ccf5d9c1a62d06c47e2,2024-05-03T12:48:41.067000 -CVE-2024-37031,0,0,4a187f72a5e3a84f14ee281be9b6bdd284b2e6c43a60778c6d53de323e076a75,2024-06-03T06:15:10.143000 +CVE-2024-37031,0,1,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3800,2024-06-03T14:46:24.250000 CVE-2024-37032,0,0,2685d1c2a61b0baf7e7faa92d5cf7d5d7556f92ff89a923043de9b45c0417821,2024-05-31T13:01:46.727000 CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000 CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000 @@ -251452,14 +251461,14 @@ CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000 CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000 CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000 -CVE-2024-3820,0,0,48d416ec6de0088cea36d5f27c3c88b33b9c9a808b213e785f402e355f2b1677,2024-06-01T09:15:09.660000 -CVE-2024-3821,0,0,acbaf7f547cb98d9d82a5dc597afe162d8e8477fbf56803e65654df99ac62d31,2024-06-01T09:15:09.863000 +CVE-2024-3820,0,1,fb3a38d8757de044cbf8015fa9c193a3b35f8d6ffe197f0aafece2654e2f107e,2024-06-03T14:46:24.250000 +CVE-2024-3821,0,1,f8040a1145a8780c4857123d1ae53feec89c1971b3600cb0cf6b8e92285f9888,2024-06-03T14:46:24.250000 CVE-2024-3822,0,0,fc2c97d17f172eec9f94cdc5060f4aab438cbcb9ae5ff2766add603f099f299e,2024-05-15T16:40:19.330000 CVE-2024-3823,0,0,cd28ea160a68276fdd70271b0ec926d19fdc3598e922bafa9bf05d9fdd41ea0b,2024-05-15T16:40:19.330000 CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f26,2024-05-15T16:40:19.330000 CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000 CVE-2024-3828,0,0,57a9b409ca1cac39bc20af9eb7a4e7dcc3bae1882e9b3a8ca25cdf22dad097ef,2024-05-14T16:11:39.510000 -CVE-2024-3829,0,0,119f47ebf6538814f476e14f1daa8260cc404e5b9a6cfc3dc44621c320ff0d3e,2024-06-03T10:15:14.267000 +CVE-2024-3829,0,1,5159f60b6a2a3841681b318b589fb93fce0cf087e7ec95cdfb8c271d5a01da42,2024-06-03T14:46:24.250000 CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000 CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 @@ -251627,7 +251636,7 @@ CVE-2024-4082,0,0,9bcc679f7514b7d071aa621d11dbe3b6578d11cf65d1c2f18fedd0888ce997 CVE-2024-4083,0,0,90b3f0c23e53e5107774f39811ea28166caf07e02a51ec5c595625bec75a4f5e,2024-05-02T18:00:37.360000 CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7ca8,2024-05-02T18:00:37.360000 CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000 -CVE-2024-4087,0,0,e74efa787d495285cea92567f71658c70a19cd01250c75f95c089062beb56709,2024-06-01T06:15:08.340000 +CVE-2024-4087,0,1,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2ff,2024-06-03T14:46:24.250000 CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000 CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000 CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000 @@ -251661,7 +251670,7 @@ CVE-2024-4140,0,0,bb3e400fe6c4b8cf6821bf141f5d1d6536fc52c547337b85d936fc6d6f95cc CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000 CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000 CVE-2024-4144,0,0,804f070eb7c147c92dd9f6be5c3d4dba7563c2bc35d2c208518fc5d01b232644,2024-05-14T19:17:55.627000 -CVE-2024-4148,0,0,cbbb4d86b7c31de850629fe3b4289393ee4372c301703b7606cd8deb8fb6b58d,2024-06-01T16:15:07.563000 +CVE-2024-4148,0,1,99472767520f10bad17ca80099c5e2a59b64c04b882cb0fc99c8823f2860bd7b,2024-06-03T14:46:24.250000 CVE-2024-4150,0,0,faed1039ecc56269b946edc3dde84ea0ad72d4967895c1be6d39f317de75f649,2024-05-14T16:11:39.510000 CVE-2024-4151,0,0,500903b4f0f30e11a0df3621c175651eac21ce51d803c0af0322e88c41c92b80,2024-05-20T15:17:54.513000 CVE-2024-4153,0,0,386cd319331b14b67f8ea4c2295b017273490160f5e9e3d7b1210acdd79af2b6,2024-05-22T12:46:53.887000 @@ -251793,8 +251802,8 @@ CVE-2024-4336,0,0,bea5a7f53013b694022e2bd0018a4064fb0ebf2c6ec290178b3a567f091ff4 CVE-2024-4337,0,0,08997cb0f3d0ed65aebc3b58ae13b7e381ac12042dd4375a545df1f240dc7b83,2024-04-30T13:11:16.690000 CVE-2024-4339,0,0,bea5b1829080bc48e0dd548941045de99c983236691a3af86422b1ab8f30d243,2024-05-14T16:11:39.510000 CVE-2024-4340,0,0,cc413663d0b28645506d2728a6df6437d317b717b85c09519211319a2c38a0e2,2024-04-30T17:52:35.057000 -CVE-2024-4342,0,0,8ba42011d07c0715e835d7017e1b17f289de225c8673a4061c4059f69a247601,2024-06-01T06:15:09.520000 -CVE-2024-4344,0,0,0f688ee1f8fde64fd5cfcb47cce2fcf8ca50e5f5cb0d15a777be6b26115eb917,2024-06-02T05:15:47.620000 +CVE-2024-4342,0,1,1d254042ed7598f085daf52aac1163682633368ed2cfee0004a63bcce54ce5fa,2024-06-03T14:46:24.250000 +CVE-2024-4344,0,1,04b422ffcdf205ebb39a6c7b54a03c3a26bf9363ea1e057608bf9722355aeb6b,2024-06-03T14:46:24.250000 CVE-2024-4345,0,0,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc8333,2024-05-07T13:39:32.710000 CVE-2024-4346,0,0,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000 CVE-2024-4347,0,0,15643945d0a0665e7f19da09fb1e76c15695d6c7f0b26fb83512ea8bedffd3f1,2024-05-24T01:15:30.977000 @@ -252034,7 +252043,7 @@ CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000 CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000 -CVE-2024-4711,0,0,3a11a9a87549fa06b3be5f3ee9634f6d1a64361088dba0c9e99ac1ad3898af7e,2024-06-01T03:15:08.413000 +CVE-2024-4711,0,1,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000 CVE-2024-4712,0,0,f79d5936efdb7279077ea6da35ae307312c55a147f3075b5570853347f8017b9,2024-05-14T16:11:39.510000 CVE-2024-4713,0,0,63c8fe02e071c01e10e60f543cd0776ed83adea75c2d063179e2f75e75c30c3b,2024-05-17T02:40:33.880000 CVE-2024-4714,0,0,4e7ff77f8284c93c8758bb989744763ec5c4cb8551eeb8d726beabface4981b3,2024-05-17T02:40:33.983000 @@ -252179,7 +252188,7 @@ CVE-2024-4948,0,0,2b5345a3a2ad0f0e256c8a9888ed4459968962a0ab1b7459292f31a2fc3a82 CVE-2024-4949,0,0,259df003248cd164c42bd8e14c2329886e112004798407d6615ac49c44fb7c83,2024-05-16T13:03:05.353000 CVE-2024-4950,0,0,ee7f090411e231f963c331a4d42c01705715794d425732d14831f9be8aa12a99,2024-05-16T13:03:05.353000 CVE-2024-4956,0,0,ee2bcf2dea357e2a10f3afc4aab6bf4b7aa596bd0271ebb4f60e3d58e4ce3e86,2024-05-17T18:36:31.297000 -CVE-2024-4958,0,0,04862eec13688fbded39d1b2f225094d393af4262309c9857a4e05cd2c33b531,2024-06-01T08:15:08.637000 +CVE-2024-4958,0,1,2bbe45732cede494f69801845c1ffcb7706b51daa06d3118dc1540d009abe6d9,2024-06-03T14:46:24.250000 CVE-2024-4960,0,0,ef25dcb7666716cb0b96f37296443474114cea70a21d0ab39d740c2fd1ad7b47,2024-05-17T02:40:43.877000 CVE-2024-4961,0,0,0d2d4f4239c9a9f29742a2da2d8e79004d41b07adb750c3d0ef3c07228a3521b,2024-05-17T02:40:43.983000 CVE-2024-4962,0,0,8bdf0697ee3d9e144772b39a0ef2523a003c7f01f25c4eacca12a9d372d3285d,2024-05-17T02:40:44.093000 @@ -252272,7 +252281,7 @@ CVE-2024-5134,0,0,44ea8effe91da48fa2441b74e001b5effc2d04f097b58592fa0588737465c2 CVE-2024-5135,0,0,a74f6a753fe0dfdbe9ef14fb62e3c1e241b2d21757276b9c7925f9871c2f3420,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,5cce275ffb1550a3c7261f5e567e7647a017e807bac86076084d9c82ab83e26b,2024-05-20T13:00:04.957000 CVE-2024-5137,0,0,eed8df071842e1a03ca59c05a5655638342140960be3a16fc81a02125200e22f,2024-05-20T13:00:04.957000 -CVE-2024-5138,0,0,cea083ed93aa7496cef3355babdc18e6132432c5a45e38535646477d6feeaf03,2024-05-31T21:15:09.930000 +CVE-2024-5138,0,1,3ed46b06696d079a65e133c6fd95dc6d08f3963b56086a9a24fa821689266527,2024-06-03T14:46:24.250000 CVE-2024-5142,0,0,9a7d794c7ee50b5ecd06d952c402fab37c046b0a6bb4d29e0c6b11e7df538957,2024-05-24T13:03:05.093000 CVE-2024-5143,0,0,85d2302aa16b15f892bf139ed2f510515c9c051290de1dbf060be25f39190615,2024-05-24T01:15:30.977000 CVE-2024-5144,0,0,3682eb32ab74a69dce2a20f55af124165ad49665bd2dae692d6703bd4728c599,2024-05-31T18:15:13.217000 @@ -252294,6 +252303,7 @@ CVE-2024-5193,0,0,4d23b348ad2ad7821352cf8b089f6206397bbe2e53c09d57accaf8af53496d CVE-2024-5194,0,0,3321f504c1b6983544a3447e83ada0488b239584b16073849e6aa2b7b78f0854,2024-05-22T12:46:53.887000 CVE-2024-5195,0,0,5034a516556fb6719ef0510b53ce13ad9f7c8bb2baf7c53f7067278ccbe4ad98,2024-05-22T12:46:53.887000 CVE-2024-5196,0,0,0ca59e6a4b96fe61151252754c581a4fcb5f3ee787c1cd0e864089c48d7c770a,2024-05-22T12:46:53.887000 +CVE-2024-5197,1,1,3f67025fd550e6942025252989df2709de8b1b1c80c2c55d0c2717b505c8576b,2024-06-03T14:46:24.250000 CVE-2024-5201,0,0,bf1f4d37f88403bb38854e126758e4f0ff9b7f5c32e7a6f763dbd9ae66e356bd,2024-05-24T01:15:30.977000 CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259b1,2024-05-24T01:15:30.977000 CVE-2024-5204,0,0,f5f46d30f5f5fcefc4a351787eb0bfde8706d10be20e1d771d5abcd1008399a0,2024-05-29T13:02:09.280000 @@ -252341,7 +252351,7 @@ CVE-2024-5297,0,0,00a87902d7cb688c5f453a52360105eb024acff7ed2743a841cec085f6c70d CVE-2024-5298,0,0,06eb32cfed51faae03040e262c135cd2456565f192a3fa9c39d1028a133d926f,2024-05-24T01:15:30.977000 CVE-2024-5299,0,0,ae65325eb08b6dc79f15a33a7800bb0b9af221d170dea70dbcb229fe698b5075,2024-05-24T01:15:30.977000 CVE-2024-5310,0,0,aff5601be87ae3c08dc3ce041153e17c3e7a6faa41ba6b44778c9142e5941031,2024-05-24T13:03:05.093000 -CVE-2024-5311,0,0,bc0dd8fe2c9b76c0164439ed50a0a9214ee8a9c28beab0c44f8ee299d96c6945,2024-06-03T07:15:10.163000 +CVE-2024-5311,0,1,254582b6f9bf67f7974ecb2d947c8ea8261db1fbcce62f651ad1dbc864d7bce4,2024-06-03T14:46:24.250000 CVE-2024-5312,0,0,3a9d8301087c1d7edb8976207e286d0d247ebf6ccf4b5edb4137e81b02e5ec2b,2024-05-24T13:03:05.093000 CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc4980a,2024-05-24T13:03:05.093000 CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000 @@ -252356,7 +252366,7 @@ CVE-2024-5340,0,0,c66c0c9e55de3c725084d3080da1dc604d47daf703d95b2c548541ec6a3822 CVE-2024-5341,0,0,2b72dd4ef57e598a2469a1d6786a4762ce0fcb8187c35f2f4bd1ff39b4044b7e,2024-05-30T13:15:41.297000 CVE-2024-5345,0,0,4ef09b351c74f9d110d594e3f259309be3bb624b771ff16733d9a7bb289d18d1,2024-05-31T13:01:46.727000 CVE-2024-5347,0,0,9a2a71210aaa051d4636ad0136ca45d374f37b52e66a2ab59e561ff84b7f7ab3,2024-05-31T13:01:46.727000 -CVE-2024-5348,0,0,6ccd3ae4427fc8195f55f69e99352ba2924ed63eef7a8159374aab2a5e28fc1e,2024-06-01T09:15:10.063000 +CVE-2024-5348,0,1,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000 CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000 CVE-2024-5351,0,0,75936f9a30b9b2678d667660507da4226e150a018add31c316ae6f6c8d9a34b8,2024-05-28T12:39:42.673000 CVE-2024-5352,0,0,436cc86ab2a56db91a02662bc69df77d88892fce705caf803e28ba33694f3f1c,2024-05-28T12:39:42.673000 @@ -252403,7 +252413,7 @@ CVE-2024-5397,0,0,3fa492ac656a0dc8b44c0c2439095185551e47b9b3d1d85bd44fafa325950b CVE-2024-5399,0,0,fa7eef6bbf34e07faf1acdcbb967da16ac637ca3df72c0acc1bd2e0f60228b23,2024-05-28T12:39:28.377000 CVE-2024-5400,0,0,d3c501060bf431388a2cf50edbec679a7265e7c25a2addcb59a0d9057b8884e3,2024-05-28T12:39:28.377000 CVE-2024-5403,0,0,21ef2036234b077bc1f129f4d78aa7befab02d334c0d4840a63d95ad54da2b3d,2024-05-28T12:39:28.377000 -CVE-2024-5404,0,0,42c1d4f54ccd945d042e8c46560bbcfa89e4a0b2f053599bf0821dd3b72846fe,2024-06-03T09:15:10.193000 +CVE-2024-5404,0,1,22cebf2105e6c188e1ff8d6dec2a40a79a55b856ce724929cb8b083df7da8a17,2024-06-03T14:46:24.250000 CVE-2024-5405,0,0,0726f3329c87a86f8903abd8a0efb034839b1c4fb01bb69fa1c55fb7fdc0b2ce,2024-05-28T12:39:28.377000 CVE-2024-5406,0,0,128407d22b74a56625ebded67c527f89f63de550e972932c839965bdff9c4612,2024-05-28T12:39:28.377000 CVE-2024-5407,0,0,2fcd76e27db1c908eadad490ca75346b74b5c01495e67a00eb793a48de914bb1,2024-05-28T12:39:28.377000 @@ -252429,7 +252439,7 @@ CVE-2024-5496,0,0,f9ff11a24b3abb894f34c14951341b2ee370de96e88bd569fd2da0a0739988 CVE-2024-5497,0,0,5457e11aa9912ccaa85ab2dbc667746bc0af564346b70457a8e484fb204a2400,2024-05-31T13:01:46.727000 CVE-2024-5498,0,0,dab02e844b257084ed7b3549ae0f3640a76ecb84ebd8816420b3fd7743f6bb99,2024-05-31T13:01:46.727000 CVE-2024-5499,0,0,81e89a725c57d0700c4cd096315f3d39ae027d50af2b014e3217c574a66f3e1e,2024-05-31T13:01:46.727000 -CVE-2024-5501,0,0,01b60c5bdecafbdbde7ec8a89defab59e96659e3d3cad6a10a6037081b726d85,2024-06-01T06:15:09.993000 +CVE-2024-5501,0,1,d4e4bc8b8db5b9e6fa14f6bf5c3381308561a5d72eef767955ee99c11419b1db,2024-06-03T14:46:24.250000 CVE-2024-5514,0,0,70c4aeaa591affd56aff675f51e2f18386671ce8fe86006ee8f4233a6878a480,2024-05-30T13:15:41.297000 CVE-2024-5515,0,0,fd196265a6748c0334b111d2281ee9be4310fa97b8fc4ef4c95ed6704ad31386,2024-05-30T13:40:12.593000 CVE-2024-5516,0,0,366f17d763d5c0ec591b1b02099febd07254f819bfe408d5e538d790de3751f5,2024-05-30T18:19:11.743000 @@ -252443,9 +252453,9 @@ CVE-2024-5524,0,0,cae078246cb68e9db21efee85fd3858e79fb1203c0e063487740b9c1df1ad7 CVE-2024-5525,0,0,e6c5a1ee43ca8e6712f567b8cfbba1abaf5011df1fe231dde327e809aed6654f,2024-05-31T13:01:46.727000 CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000 CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000 -CVE-2024-5564,0,0,f7faa47ddc158f9856a111ddb265bd8c9a26316b66118569da1a6c1b8891e06c,2024-05-31T19:15:08.883000 +CVE-2024-5564,0,1,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000 CVE-2024-5565,0,0,ca2b275160a932f35493ef873c1e3b3376ac0de1d1f0359f5898f4a0c4303049,2024-05-31T19:14:47.793000 -CVE-2024-5587,0,0,b1c082d0bcefeab107a153e8b81daa5aa10d2ae53cef562508c8cd35c0053fe4,2024-06-02T10:15:07.427000 -CVE-2024-5588,0,0,bf742a06e43e0ac3ff6d786a80b66ee2d0eaed59a52be297b7a94dcb187a1f55,2024-06-02T15:15:08.230000 -CVE-2024-5589,0,0,d4771d079a27bbc1340c77588a6ba08fa3ae27b893c1ca72d22885a73c16cdd3,2024-06-03T01:15:50.153000 -CVE-2024-5590,0,0,89a24d368a3c836735b06926ff47353994768b95f9d9a73dd5e9c07103894fa6,2024-06-03T01:15:50.490000 +CVE-2024-5587,0,1,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000 +CVE-2024-5588,0,1,2225b2f139cc7088d340944289b6e4caf356f2dc9f41960f350456c6d81a35aa,2024-06-03T14:46:24.250000 +CVE-2024-5589,0,1,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000 +CVE-2024-5590,0,1,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000